More security teams treat identity as the real perimeter of the modern enterprise. Attackers target credentials, not firewalls. These CISOs lead the shift to identity-first security and show how strong authentication, lifecycle management, and continuous authorization can reduce risk across large and complex environments.
Bobby Ford, SVP and Global CISO, Hewlett Packard Enterprise
Ford focuses on identity lifecycle management and strict authentication for users, devices, and workloads. His work reinforces identity as the foundation of HPE’s global security strategy.
Tim Brown, CISO, SolarWinds
Brown strengthened SolarWinds’ identity controls after the breach. His team tightened privileged access, credential workflows, and access paths across engineering and production.
Jason Witty, CISO, USAA
Witty uses identity governance, privileged access management, and continuous authentication to protect a high-risk financial environment. His work reduces fraud exposure and improves customer trust.
Jim Routh, Former CISO
Routh has programs at Saviynt that helped shape how enterprises treat identity as the primary perimeter.
Michael Erickson, CISO, Baptist Health System KY & IN
Erickson focuses on identity governance at scale in healthcare. His team centralizes IAM, automates access reviews, and builds stronger protections around sensitive patient data.
Darren Death, CISO, ASRC Federal
Death is a strong voice for identity-centric security and zero trust. He focuses on IAM, device identity, and continuous authorization across federal environments.
J Wolfgang Goerlich, Advisory CISO, CISCO, IANS
Goerlich helps security leaders move from network-centric thinking to identity-first strategies. He advises enterprises on building programs that treat identity as the perimeter
