3 CISOs Protecting Frontline and Distributed Workers

Related

The CISOs Every Security Vendor Wants Feedback From

Security vendors don’t build meaningful products by guessing. They...

5 Leading CISOs and Cybersecurity Heads in Beijing

Beijing is one of Asia’s largest hubs for cybersecurity...

7 CISOs to Watch in Buenos Aires, Argentina

Buenos Aires is a major hub for cybersecurity leadership...

Share

Cybersecurity for frontline workers covers healthcare staff, retail teams, field technicians, plant operators, and employees who work outside a traditional office environment. These CISOs design security programs that protect identity, devices, and access across highly distributed and operationally critical settings.

Marene Allison

Former Chief Information Security Officer, Johnson & Johnson
LinkedIn: https://www.linkedin.com/in/marene-allison-9508611

As former CISO at Johnson & Johnson, Marene Allison led security for a global workforce that included healthcare professionals and manufacturing staff. Her work focused on identity security, zero trust access, and protecting frontline users operating in regulated and high-risk environments.

Mike Mellor

CISSP, CCSP, KPFF Consulting Engineers
LinkedIn: https://www.linkedin.com/in/michael-mellor-cissp-ccsp-4a617340/

At Experian, Mike Mellor has prioritized secure access for customer-facing and support teams handling sensitive financial data. His approach reduces phishing and credential risk for frontline and hybrid employees who rely on constant system access.

Paul Suarez

VP & Chief Information Security Officer, Casey’s General Stores
LinkedIn: https://www.linkedin.com/in/paul-suarez-cissp/

Paul Suarez oversees cybersecurity for thousands of retail locations and frontline store workers. His focus includes securing point-of-sale systems, store networks, and employee access while maintaining uptime across a large physical footprint.

Frontline workers often rely on shared devices, mobile systems, and operational platforms that fall outside traditional office security models. These CISOs demonstrate how strong identity controls, endpoint protection, and practical security design can protect workers without slowing operations.