article / Jan 18, 2017 Welcome to CISO to CISO by Mike Convertino SHARE Hi. I’m Mike Convertino, CISO of F5 Networks, and I want to welcome you to an experiment we’re conducting here at F5. We’ve laid the foundation of this CISO to CISO portal on an idea that has traditionally been somewhat controversial in the security community: openness. As you may or may not know, I spent many years developing cyberwarfare programs for the military before heading up Microsoft’s Global Network Security team and taking on the role of CISO at CrowdStrike. My experience has taught me that no organization is completely secure. We all can—and must—do better. In this new threat landscape, securing your applications is the key to securing your data and protecting your business. No system is perfect. Companies will get compromised. The measure of your organization is how you respond. We built this forum so that members of the CISO community can discuss current security issues, share best practices, and crowdsource information security. We’ll talk about positioning your business to take advantage of the ongoing digital transformation, how to stay ahead of the multitude of threats and attackers, and the evolving role of the CISO in the constantly changing security landscape. I could go on, but this portal isn’t about F5 or me personally; it’s about all of us, as fellow members of the CISO community. This thing comes to life when you, through guest blogs, interviews, podcasts, or other means, are willing to share your ideas, opinions, best practices, cautionary tales, and success stories with confidence and trust. That’s what I’m hoping we can build here: a forum that brings to light the issues that affect us the most. It’s not about products. It’s about ideas and sharing them. Join me as we walk through this landscape of evolving threats, dedicated adversaries, and ongoing opportunities to innovate. Together, we’ll all be more secure. SHARE MODIFIED: Jul 06, 2017 Tags: cisotociso stay up to date Get the latest application threat intelligence from F5 Labs. There was an error signing up. Thank you, your email address has been signed up. submit Follow us on social media. Related Stories blog / Oct 04, 2016 Bug Bounty Programs Only Half the Battle blog / Jan 23, 2017 The Humanization of the Security Leader: What CISOs Need to Be Successful blog / Jan 18, 2017 Application Threat Intelligence: What Do CISOs Need?