CIO Influence
CIO Influence News Security

Contrast Security Executives to Help Defend Cyberspace as Active Participants of a Leading Tech Group the Company Co-Founded

Contrast Security Executives to Help Defend Cyberspace as Active Participants of a Leading Tech Group the Company Co-Founded

Contrast Security (Contrast), the code security platform built for developers and trusted by security, announced its continued commitment to protecting customers, and the global application economy, by expanding its executive leadership within the Cybersecurity Tech Accord, a global coalition of more than 150 signatories committed to advancing trust and security in cyberspace.

Contrast’s Senior Vice President of Cyber Strategy Tom Kellermann, Chief Information Security Officer David Lindner and Senior Vice President of Corporate Development and Strategic Alliances Ben Goodman will partner with global technology companies within the Accord on initiatives that improve the security, stability and resilience of cyberspace and further create dialogue, discovery and decisive action. As a founding member, and signatory of the Accord, Contrast executives Kellermann, Lindner and Goodman will provide their unique expertise and guidance that will enable enterprises to defend against malicious threats.

CIO INFLUENCE: RangeForce Adds MITRE D3fend and ATT&CK Frameworks to Cyber Defense Readiness Platform

“Geopolitical tension in cyberspace continues to ramp up, along with increasing systemic cyberattacks against Western critical infrastructure. That is why it is critical for experts – from some of the largest corporations in the world – to come together to develop strategies of collective defense against cybercriminal activity. We must ensure organizations are equipped to protect their customers’ communities,” said Tom Kellermann, Senior Vice President of Cyber Strategy at Contrast Security. “My colleagues and I are honored to join the Cybersecurity Tech Accord to advance this cause. We look forward to providing our knowledge and resources.”

Contrast has delivered initial contributions to the Accord’s Zero Trust and CISO blog series. Kellermann provided a piece titled, “The Devil is in your Code: Zero trust in response to inevitable threats,” which explains how cyber criminals use island-hopping techniques to gain access to software code as a part of Zero Trust series. Lindner also authored a piece on the government’s moves to mandate transparency in an effort to stop cyberattacks titled, “Time to let the sun shine on your security’s dirty laundry: transparency is going to be regulated sooner than you think.”

CIO INFLUENCE: Orca Security Solidifies Innovation Leadership with Patent Grant for Pioneering SideScanning Technology

“We’re excited to have Kellermann, Lindner and Goodman represent Contrast. Their influence in the industry is unmatched. We’re looking forward to their invaluable support as we work together to enhance the security of the software that we all rely on and improve cyber resiliency. The continued success and growth of our initiative relies on cooperation with responsible and engaged corporations like Contrast Security, who believe in our mission,” said Edoardo Ravaioli, Secretariat at the Cybersecurity Tech Accord.

Through a shared commitment, and collective action, signatories within the Accord aim to:

  • Provide their customers, users and the developer ecosystem with information and tools that enable them to understand current and future threats and better protect themselves.
  • Protect their customers and users everywhere by designing, developing and delivering products and services that prioritize security, privacy, integrity and reliability, and in turn reduce the likelihood, frequency, exploitability and severity of vulnerabilities.
  • Work with each other and likeminded groups to enhance cybersecurity best practices, such as improving technical collaboration, coordinated vulnerability disclosure and threat sharing, as well as ensuring flexible responses for the wider global technology ecosystem.
  • Oppose efforts to attack citizens and enterprises by protecting against exploitation of technology products and services during their development, design, distribution and use.

CIO INFLUENCE: Snow Software Launches New Capabilities to Help ITAM Teams Get Control of Costs in the Cloud

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Iridia Raises $6 Million in Follow-on Equity Funding for Development of Industry’s First DNA-based Memory Chips

CIO Influence News Desk

Atos Reinforces Its Leading Position in the Edge and Computer Vision Market Through the Acquisition of Ipsotek

CIO Influence News Desk

OpsHub Launches Insights: Quality Gap Intelligence Tool for DevOps

Cision PRWeb