K logix Blog Content that helps security professionals align information security with business objectives.
- Future-proofing and Storytellingby Meghan Mulkeen on December 10, 2025 at 6:48 pm
Â
- Future Proof Leadership:Â What Security Leaders Need Nowby khaug@klogixcorp.com (Katie Haug) on December 8, 2025 at 7:07 pm
Across conversations with cybersecurity leaders featured in Feats of Strength, one message is unmistakably clear: the future will not reward those who stand still. It will belong to leaders who adapt, learn, unlearn, and lead with clarity in a world defined by rapid technological change.Artificial intelligence may be the most visible force shaping todayâs strategy, but true future-proof leaders see beyond tools. They understand that technology alone does not secure a business or guide a team. Instead, it is the leaderâs mindset, communication style, culture building, and vision that determine whether an organization thrives in the years ahead.In our latest set of interviews, 100 percent of security leaders mentioned AI, and 75 percent identified it as one of their top strategic priorities. But when you listen closely, what emerges is not an AI story. It is a leadership story, one about adaptability, clarity, and the ability to create structure amid uncertainty.The future-proof leader is not a technologist. They are a strategist. An enabler. A communicator. And above all, a guide.
- Profile: Jeff Spear, CISO, Tufinby khaug@klogixcorp.com (Katie Haug) on December 8, 2025 at 6:43 pm
Â
- Profile: Kyle Thomas, Senior Director, Global Information Security, Wexby khaug@klogixcorp.com (Katie Haug) on December 8, 2025 at 6:40 pm
Kyle Thomas describes his path into cybersecurity as ânonlinear,â yet it is precisely that diversity of experience that exemplifies his strength as a leader. His career began in the late 1990s as technology was taking shape, and he grew alongside it, earning certifications across everything from database design, to JavaScript, and firewalls. Over time, his adept curiosity led him into security leadership, where his ability to bridge technology and strategy became a defining skill.In 2022, Kyleâs career journey led him to WEX, a global commerce platform, where he took on the role of Director, then Senior Director of Global Information Security. When joining the organization, Kyle was drawn not only to the technology stack but to what he describes as a âtrue culture of security.â âWhen I joined, we had roughly fifty people in security,â he recalls. âThatâs a large number for an organization our size, but it reflected the complexity of what we do.âWEX operates across three lines of business including Mobility, Corporate Payments, and Benefits, and provides services to clients in over 200 countries. The company processed more than $200 billion in payment volume last year, managing data across 20 currencies and tens-of-millions of user accounts. âItâs a global organization with a highly regulated environment,â Kyle explains. âWeâre subject to PCI, SOX, SOC, HIPAA/HITRUST, GDPR, and numerous other global privacy frameworks. That level of maturity made me confident this was a place where security had real influence.âCulture of SecuritySince joining WEX, Kyleâs scope of responsibilities has grown significantly. Starting at two teams and 13 people, he now leads a team of 40 members across five countries, overseeing network security, data protection, identity protection, automation, and security applications. He is closely partnered with Application Security, Architecture, and GRC teams, serving on advisory boards, and working with senior technology leaders to align security with innovation.One of his primary focuses is helping the organization balance product velocity with security oversight. âOur goal is to enable rapid experimentation and innovation while maintaining compliance and protecting data,â he says. âThat means staying closely connected to digital and product leadership and making security part of the business rhythm.âEach year, Kyle and his teams begin with what he calls âbrag booksâ, internal reports that track metrics, project milestones, and wins. âWe aggregate those into an annual brag book and present it across the organization,â he explains. âItâs not just about showing numbers like the 120 million threat blocks we average per day, or the 400,000 daily container runtime scans, itâs about showing what we can achieve when we work together.â That transparency helps build trust and alignment across departments, reinforcing securityâs role as a business enabler.AI and the Future-Ready EnterpriseKyle describes artificial intelligence as both a driving force and a challenge for the modern security leader. âAI is everyoneâs focus right now,â he says. âWeâve built AI-powered tools to simplify processes, but that means our focus must include securing those models, monitoring them for vulnerabilities, and ensuring we use AI responsibly.âFor WEX, the integration of AI is not only operational but also strategic. The organization continues to explore how AI can streamline operations, identify threats faster, and even support defensive automation. âWe use AI to fight fire with fire,â Kyle explains. âIf threat actors are using AI, so should we.âHe notes that AI security overlaps with several other domains. âItâs similar to application and identity security. Overprivileged AI agents can create risk just like any other non-human account. Itâs about managing those permissions and maintaining control.âAs part of his annual planning, Kyle focuses on short, actionable roadmaps rather than multi-year strategies. âSecurity evolves too fast for long-term static plans,â he says. âThree years ago, no one had AI in their strategy, and now itâs a major priority. Being future-ready means staying adaptable and focusing on measurable progress each year.âBuilding TrustTo translate complex security strategies into business language, Kyle believes communication must start with âthe why.â He believes in a philosophy of purpose-driven communication. âSecurity canât just say no, we have to show why something matters, what the risk is, and how we can partner to solve it,â he says.That philosophy has helped him earn the trust of executives and peers across the organization. His team conducts annual roadshows to share results, discuss upcoming initiatives, and gather feedback from product and technology leadership. âThose sessions are key,â he says. âThey turn security into a shared mission instead of a separate function.âKyle also emphasizes a service-oriented mindset. âIn security, our customers are usually internal. If a security control creates friction, our job is to guide and support, not to punish,â he explains. âTrust is built in small moments. You earn it by showing up and helping.âLeadership with Transparency Kyle describes his leadership style as open and honest. Every new employee receives the same speech on their first day: clear expectations, candid feedback, and empowerment to take ownership. âIf I have to do their job for them, Iâm either overpaying or Iâm not doing my job,â he says with a laugh. âMy job is to create space for people to excel.âHe encourages his team to innovate and challenge convention. âWe say the box is where we put our ideas when weâre done,â he notes. Each team member is required to set two annual development goals, one technical and one professional. âItâs my responsibility to develop leaders,â he says. âThat means giving them room to fail safely and learn from it.âWhen hiring, Kyle prioritizes cultural fit and capability over credentials. âWe removed degree and certification requirements from our roles,â he explains. âSkills and mindset matter more. We can help someone earn a certification later if they have the drive and curiosity to learn.âHe believes diverse experiences strengthen the team. âWe operate globally, and certifications popular in the U.S. may not carry the same weight in India or the UK. I care about competence and problem-solving. The rest can be developed.âA Lifelong Learner Kyle practices what he teaches by setting his own development goals each year. He reads, listens to leadership podcasts, and attends industry conferences to stay current. âIâm a big believer in lifelong learning,â he says. âEvery day, I try to learn something new.âHe also values the network of peers heâs built through professional events. âWe all need someone to call when we hit a new challenge,â he says. âConferences and groups give you that lifeline. You can ask, âHave you seen this before?â And learn from each other.âLooking ahead, Kyle hopes to see more collaboration across technology disciplines. âWe talk a lot about breaking down silos, but we still tend to separate CISOs, CIOs, and CTOs into different circles,â he reflects. âWe have so much to learn from each other. If we want to move the industry forward, we need more of those mixed conversations.âAt WEX, Kyle is leading by example, proving that future-proof leadership means more than adapting to technology. It means empowering people, communicating purpose, and building a culture of trust that stands ready for whatever comes next.
- The Smishing Surge and the Crackdown Behind Itby egildea@klogixsecurity.com (Elizabeth Gildea) on December 8, 2025 at 6:29 pm
Over the past year, people in the United States have seen a sharp increase in smishing attacks (phishing done via SMS). These are the texts about unpaid tolls and undeliverable USPS packages that seem to have hit every phone at this point. The links often lead to convincing fake websites, sometimes even using Google’s branding to look legitimate.
- Profile: Lisa Lafleur, Director, External Party Risk Management, Walmartby khaug@klogixcorp.com (Katie Haug) on December 8, 2025 at 5:58 pm
Lisa Lafleur didnât plan a career in cybersecurity, she built one out of curiosity and conviction. âI was the first cybersecurity person at a bank I worked at during the beginning of my career,â she says. âWhen I hired on as a network manager, I saw a need for cybersecurity and talked to my boss about it. He said, âDo we even need cybersecurity people?â That was really the attitude at the time.âLisa convinced him otherwise, laying the groundwork for what would become a long and distinguished career in information security. âThat was my first entry into security, but there were always elements of it in my work,â she explains. âI had been writing policies for ten years, and I worked in audit, doing some auditing of cybersecurity as well.âHer early years reflect the infancy of the cybersecurity industry. âWhen I was in audit, the main control was making sure we had power strips and we knew where the policy was,â she recalls with a laugh. âAuditors would read books to figure out what they needed to ask me. They once said we needed firewalls, but we werenât even on the internet yet. I said, âWe donât need firewalls; we donât have anything to firewall off.â It was such an interesting time.âFinding Her Place at WalmartToday, Lisa is the Senior Director of External Party Risk Management at Walmart, a role she has held for more than four years. Her path to Walmart began long before the opportunity appeared. She spent years building a reputation in financial services, defense, and manufacturing, working in positions that exposed her to governance, audit, networking, policy writing, and eventually security leadership.During her time at Raytheon she worked for a leader who became a long-term mentor. âThe person who hired me at Raytheon hired her at Walmart. It is important to maintain your network and keep relationships going even if you change roles.â  The position at Walmart offered Lisa the chance to build something new. Lisa saw the External Party Risk Management program as an opportunity to apply decades of strategy and governance experience toward a large-scale initiative. âThis was my opportunity to build something meaningful and give back to the community if I could build it the right way.âLeading a Complex Global ProgramLisaâs role focuses on vendors that donât supply the products on Walmartâs shelves but still handle sensitive data. âAny vendor with whom we exchange protected information has to go through my team,â she explains. âWe look at it from two perspectives: onboarding and continuous management.âHer team ensures that every vendor meets Walmartâs strict security standards before work begins. âWe use NIST and other industry frameworks to make sure vendors meet our requirements,â she says. âWe make sure theyâre protecting data in the same way we would protect it in-house, with all the same or equivalent controls.âThe team has full authority to reject vendors that donât meet those standards. âWe absolutely have the power to say no,â she says. âAnd so far, every decision weâve made has been backed one hundred percent.âOnce a vendor is approved, Lisaâs team monitors them continuously. âWe make sure they maintain that level using mostly OSINT data,â she says. âWe look for vulnerabilities on their external servers and make sure nothingâs falling through the cracks.âHer groupâs scope extends well beyond third-party oversight. âWeâre not just third-party risk management; weâre external party risk management,â she explains. âThat means we also look at fourth parties and beyond. Sometimes those fourth-party relationships pose even bigger risks to the supply chain than the third parties themselves.âAI, Data, and the Expanding Risk LandscapeAs with nearly every area of security, AI is both an opportunity and a challenge. âAI is probably the biggest change and the biggest challenge,â Lisa says. âAll of a sudden, everybody can code and create tools. Weâre going to need strong strategies and leaders to stand beside them to make sure these developments align with our goals and donât become distractions.âHer team is also exploring how AI can improve visibility into Walmartâs vast vendor ecosystem. âFor years, weâve been collecting data on all of our vendors,â she explains. âNow weâre asking, how can we use that data to make better risk-informed decisions and increase the health of the ecosystem?âLisa sees her work as part of something much larger. âThe more data we analyze, the more we realize how interconnected every company is,â she says. âPeople joke about six degrees of separation, but in cybersecurity, itâs more like two. One vendorâs issue can quickly become everyoneâs issue.âLooking ahead, Lisaâs priorities include expanding the program internationally and integrating AI responsibly. âWe want to leverage AI to increase insights and efficiency, but it has to be tied to the overall strategy,â she says. âAnd internationally, weâre figuring out how to scale our processes and make sure theyâre built into everything we do.âTranslating Security into Business ImpactFor Lisa, communication is as critical as technology. âThatâs why I got my MBA,â she says. âI wanted to be able to explain what we do to the business and talk to executives in their language.âShe uses an agile framework to track progress and align with corporate strategy. âWe capture everything in sprints, stories, and epics,â she explains. âI work with the program management office to make sure what Iâm doing reads into their strategy. I meet with strategic leads all the time to explain my business cases and make sure our priorities are aligned.âThat alignment with business value is essential in Walmartâs culture. âAt the end of the day, our job is to increase shareholder wealth,â she says. âWalmart is very particular about everyday low cost or EDLC. We look at every penny because we really do care about providing the lowest costs for our customers. It all makes sense when you walk into a store and see how that strategy connects.âLeadership with Purpose and IntegrityLisa describes herself as a servant leader, a philosophy that defines her approach to management. âMy job is to empower the people around me to reach their full potential,â she says. âI tell my team all the time: my job is to get obstacles out of your way.âShe values transparency and open dialogue, even around difficult topics like AI. âWe had an honest conversation about AI and its existential threat to some of the work we do,â she says. âOne of my team members told me they were surprised I brought it up. But I think talking about it makes it less scary. Avoiding it doesnât.âHer empathy and honesty create a culture of trust. âI like to be honest and always say Iâm too lazy to be dishonest,â she laughs. âItâs just too hard. Iâd rather be upfront.âLisa also believes in giving back. âAt a certain point in your career, itâs important to contribute to the community,â she says. âIâm active in ISC² and InfraGard and serve on chapter boards. I think itâs especially important as a woman in this field. Young women donât always see opportunities for themselves, and sometimes theyâre too hard on themselves. I want to change that.âShe makes time for mentorship wherever she can. âI love it when young women reach out,â she says. âIf I can fit it in, Iâll always prioritize those conversations. We need more women in this field, and if sharing my story helps even one person, itâs worth it.âBuilding a Diverse and Inclusive FutureDiversity and inclusion are more than talking points for Lisa, theyâre daily priorities. âAs a leader, I think itâs important to understand generational, cultural, and gender differences,â she says. âThose things can become barriers if we donât take time to learn about them.âShe makes a point of learning from her global team members. âI have people from Panama, Ghana, Mexico, India, and it is fascinating to learn from them,â she says. âIâm constantly asking questions about where theyâre from and how they see things. When you understand different perspectives, it builds appreciation and teamwork.âLisa believes that diversity strengthens security. âWhen you bring people with different backgrounds and experiences together, you get better ideas,â she says. âThatâs how we build stronger teams and a stronger industry.âAt Walmart, Lisa leads with humility and a deep sense of purpose. âEvery day is different,â she says. âThereâs no playbook, but thatâs what makes it exciting. My goal is to help my team succeed, support the business, and hopefully leave this program and this industry better than I found it.â
- Profile: Michael Brewer, CISO, Neurocrine Biosciencesby khaug@klogixcorp.com (Katie Haug) on December 8, 2025 at 5:55 pm
Michael Brewerâs journey into cybersecurity began in the U.S. Army, where his career quickly evolved from running telephone lines to building complex network systems. He shares, âNetworking was just starting to become something the Army was going to use for their forward deployed data packages. I attached myself to that team because I saw where the future was going and wanted to make sure, I kept up and had a good career.âThat decision set him on a lifelong path of technical curiosity and leadership. He eventually led teams that deployed mobile data networks, gaining early experience in how to secure environments and keep operations running under pressure. âI took a liking to security concepts including different ways of securing an environment, physical and logical, keeping bad people out, and allowing people on site to do what they need to do,â he says.After leaving active duty, Michael started his own company before moving into defense contracting in San Diego, supporting the Navy and various Department of Defense entities. âThereâs a big footprint here for DoD contractors,â he says. âFrom there I joined as a government employee running the NMCI network as the lead engineer, and later moved to the private sector to do product security for Teradata.âWhen the pandemic hit, he pivoted again, this time leading pre-sales engineering for a security vendor. During that period, he conducted a cybersecurity assessment for Neurocrine Biosciences. âThe CIO liked what I was doing and what I delivered,â he recalls. âThat was that, I moved over to the Chief Information Security Officer position.âBecoming a Business LeaderMichael quickly realized that being a CISO required both technical depth and business and leadership skills. âThere are some skill sets that map well like critical thinking, storytelling, and the ability to condense very technical concepts to a non-technical audience,â he explains. âBut there were other aspects I wasnât aware of at the time, mainly around legal and compliance for Biotech.âHe also discovered that the expectations for CISOs have evolved far beyond traditional IT. âWe have to know finance, we have to know the business, we have to know marketing,â he says. âWe have to be able to articulate cases and tell stories, not only our cybersecurity capabilities but our acumen as business leaders.âBuilding a Modern Cybersecurity ProgramToday, Michael oversees all aspects of Neurocrineâs cybersecurity program, including data protection, identity and access management, security architecture, engineering, governance, and incident response. âItâs the entire cybersecurity program,â he says. âWe also just christened AI security, which Iâm sure everybodyâs dealing with now.âSecurity awareness is a major priority for him. Michael views it as a cultural issue rather than a compliance checkbox. âPeople across the business are very smart, but they donât always know the jargon, the risks, or the impact if something goes wrong,â he explains. âMy goal is to build a culture where people feel comfortable reporting issues. Itâs not a punitive thing if something bad happens. We need employees to tell us when something seems off.âLooking to the year ahead, his top priorities are risk management, automation, AI security, and maturing third-party risk. âWeâre a publicly traded company, so we have to deal with audits just like everyone else,â he says. âThat can take up a lot of time for engineers and architects. Weâre focused on automating controls and artifacts so we can standardize the process. It shouldnât depend on whoâs in the role, anyone should be able to step in and close out that audit artifact.âMichael is also working to gamify security training. âThe punitive approach doesnât work,â he says. âWeâre moving toward a gamified, positive approach with department leaderboards and small competitions. Itâs about getting people to pay attention and making awareness something they want to be part of.âAI, Risk, and the Changing LandscapeArtificial intelligence is one of the most significant challenges facing security leaders today. âAI has hit us all sideways,â Michael says. âThereâs no Cyber AI bachelorâs degree coming out of school anywhere. Thereâs no formal training because these things, like Model Context Protocol (MCP), just came into realization last year.â âWeâre learning about these technologies at the same time as the adversaries,â he says. âThereâs really no getting ahead of it. You just have to stay current and agile.âRegulatory complexity adds another layer of pressure. âWe have a lot of uncertainty with whatâs coming out of the current administration,â he says. âThereâs also the state-level piece, and then the global considerations. Itâs constantly evolving.âThat evolving threat landscape requires a balance between security and innovation. âWe want to be secure and take a risk-based approach, but the business wants to move quickly,â he says. âIf we donât adopt new technologies, it can negatively impact the business, but if we move too fast, that can also create risk. Finding that middle ground is the challenge.âLeading with EmpowermentMichaelâs leadership philosophy centers on trust and empowerment and he encourages innovation and continuous learning. âIf someone goes off and learns something new, I want them to bring it back to the team,â he says. âWe can figure out together how to adopt it or modify the idea moving forward.âMentorship has become one of his most meaningful responsibilities. âHelping others grow in their careers is incredibly rewarding. I might only get to work with someone for a small window of their life, but I want to set them up for success.âWhen hiring, he looks for curiosity and a hunger to learn. âThe biggest thing I look for is eagerness, a person whoâs hungry to learn, self-taught, and collaborative. Everything else can be trained.âStaying Connected and Giving BackMichael stays connected to the cybersecurity community through local and national groups. âHere in San Diego, we have many groups, and a small brain trust of CISOs in biotech that meet once a month for lunch,â he says. âWe just talk about whatâs going on.â He also participates in national industry networks. âThese types of groups offer open communication, message boards, Slack channels, all ways to share whatâs landing and what isnât.âAt Neurocrine Biosciences, Michael leads with the same principles that have guided him from the Army to the C-suite including empowerment, communication, and purpose. âBeing a CISO is about more than keeping bad actors out,â he says. âItâs about helping people do what they need to do safely and creating an environment where security enables innovation instead of limiting it.â
- Profile: Yash Murali, CTO, Therabodyby khaug@klogixcorp.com (Katie Haug) on December 8, 2025 at 5:51 pm
For Yash Murali, technology has always been a space where curiosity meets creativity. âIâve always been fascinated by how things work,â he says. âGrowing up, Iâd take things apart just to see how they fit together.â That same mindset shaped his early career in engineering, where he built systems that merged design, function, and innovation.His career spanned across private-equity-backed consumer technology and health and wellnessâindustries that taught him distinct lessons. Private equity taught him how to move fast, consumer technology showed him the importance of design and user experience, and health and wellness taught him that trust is everything.Before joining Therabody, Yash held several senior technology roles where he led global teams and built scalable digital platforms. âIâve always loved the challenge of connecting technology with purpose,â he explains. âFor me, success is when technology disappears and when it becomes so intuitive that people donât even realize how much innovation is behind it.âLeading at the Intersection of Health and TechnologyWhen Yash joined Therabody as Chief Technology Officer, he saw an opportunity to merge advanced technology with the science of human performance. âWeâre a wellness technology company,â he says. âThat means we sit at the intersection of health, science, and innovation. Our job is to make recovery and wellness accessible to everyone, whether youâre a professional athlete or someone who just wants to feel better.âAt Therabody, Yash oversees the companyâs global technology strategy from software and connected devices to data analytics, automation, and security. âMy team is responsible for building and securing the digital ecosystem that powers our products,â he says. âThat includes everything from mobile apps to AI-driven recommendations.âHe approaches his work with the mindset of a product visionary. âTechnology has to create value for the business and for the user,â he says. âI focus on how every product, and every data point can help someone move, sleep, or recover better.âThat connection between product and purpose is what keeps him energized. âOur mission isnât about selling devices, itâs about improving lives through smarter technology,â he says. âEverything we do ties back to that mission.âInnovation Through Data and AIArtificial intelligence plays a central role in Therabodyâs innovation roadmap. âAI helps us understand how the body responds to different treatments,â Yash explains. âIt allows us to personalize recommendations and make recovery more efficient.âThe company uses AI to analyze sensor data, track behavioral trends, and optimize device performance. âThe future of wellness is personalized,â Yash says. âAI helps us connect the dots, from usage patterns to health outcomes, so we can design experiences that adapt to each individual.âBut he is equally focused on doing it responsibly. âConsumers trust us with their data,â he says. âThat trust is sacred. Weâre very intentional about how we collect, store, and use data. Transparency and security are non-negotiable.âHe often describes AI as a partner to human intelligence, not a replacement. âAI can amplify creativity and accelerate discovery,â he says. âIt can make connections we might miss. But it still takes human empathy and judgment to decide what to do with that information.âThat philosophy drives how his teams design and deploy technology. âWe use AI as a lens for innovation,â Yash says. âBut itâs not the end goal, itâs a tool that helps us serve people better.âBuilding and Empowering Global TeamsYash leads with a philosophy rooted in trust, empowerment, and shared accountability. âMy job is to create the conditions for my team to succeed,â he says. âThat means removing barriers, setting clear goals, and giving people ownership.âHe manages a diverse, global team of technologists, engineers, and data specialists. âWhen youâre leading across geographies and time zones, communication becomes everything,â he says. âYou canât rely on hallway conversations. You have to be intentional about how you share information, set expectations, and build connection.âHe believes that culture starts with empathy. âEvery person on the team has different motivations,â he says. âSome want to innovate, some want stability, some want to grow into leadership. My role is to help them find that path and make sure they know their work matters.âOne of Yashâs favorite leadership practices is storytelling. âData tells you whatâs happening,â he says. âStories tell you why it matters. When I talk to my team or the board, I use both. People remember stories, they remember how they felt about the work.âThat approach has earned him the respect of both technical and business leaders. âYou can be the smartest engineer in the room,â he says. âBut if you canât communicate why it matters to the customer, youâre missing the point.âAdapting for the FutureLike many technology leaders, Yash sees the future of work and leadership evolving rapidly. âThe technology will always change,â he says. âWhat doesnât change is the need for adaptability and curiosity.âHe encourages his team to embrace experimentation. âItâs okay to fail,â he says. âIf we fail, we do it fast, learn from it, and move forward. The only true mistake is staying still.âAutomation and intelligence are key priorities for the years ahead. âWeâre building a foundation that scales,â Yash says. âThat means designing systems that can adapt to new technologies, new regulations, and new customer expectations.âHe also sees leadership itself changing. âThe next generation of leaders will be those who can connect technology, empathy, and business strategy,â he says. âA future-proof leader is someone who can navigate uncertainty without losing sight of the mission.âStaying Connected and Continuous GrowthYash is deeply involved in the broader technology and wellness community. He participates in innovation panels, leadership roundtables, and cross-industry collaborations. âItâs important to share what weâre learning,â he says. âWellness technology is still young. We all benefit when we share insights and best practices.âContinuous learning remains central to his leadership. âI make time to read, listen to podcasts, and learn from my peers,â he says. âYou canât lead in technology if you stop learning. The moment you think youâve figured it out, youâre already behind.âHe encourages his teams to do the same. âWe have to model the curiosity we expect,â he says. âIf Iâm learning something new every day, my team sees that and follows suit.âAt Therabody, Yashâs leadership is defined by balance with innovation and integrity, data and empathy, technology and humanity. âWeâre using technology to improve peopleâs lives,â he says. âThatâs what keeps me excited. Technology is only powerful when it helps people feel better, move better, and live better.â
- Profile: Sean Dobson, CISO & CTO, Wafraby khaug@klogixcorp.com (Katie Haug) on December 8, 2025 at 5:50 pm
Â
- Profile: Rose Lally, CISO, Altisourceby khaug@klogixcorp.com (Katie Haug) on December 8, 2025 at 5:47 pm
Rose Lallyâs career began long before cybersecurity was a defined discipline. Her first job out of college was at IDX, where she worked as a programmer and was introduced to a tool called Security Plus. âIt was the first inkling of anything related to cybersecurity,â she says. âWe would probably equate it today to more of an identity and access management tool, but thatâs where I started getting into the concept of people having role-based access or layered security on personal data.â












