7 CISOs Championing Identity as the New Security Perimeter

Related

Helsinki’s CISOs to Watch in 2025

As cyber threats evolve and digital infrastructure becomes increasingly...

Critical Fortinet SSO Flaws Actively Exploited on FortiGate Devices

What happened Threat actors have started exploiting newly disclosed critical...

CISOs Shaping Financial Cybersecurity in Banking & FinTech

As financial services continue to evolve with digital banking,...

The CISOs Securing Critical Infrastructure in 2025

In an era where energy grids, transportation systems, water...

Share

More security teams treat identity as the real perimeter of the modern enterprise. Attackers target credentials, not firewalls. These CISOs lead the shift to identity-first security and show how strong authentication, lifecycle management, and continuous authorization can reduce risk across large and complex environments.

Bobby Ford, SVP and Global CISO, Hewlett Packard Enterprise

Ford focuses on identity lifecycle management and strict authentication for users, devices, and workloads. His work reinforces identity as the foundation of HPE’s global security strategy.

Tim Brown, CISO, SolarWinds

Brown strengthened SolarWinds’ identity controls after the breach. His team tightened privileged access, credential workflows, and access paths across engineering and production.

Jason Witty, CISO, USAA

Witty uses identity governance, privileged access management, and continuous authentication to protect a high-risk financial environment. His work reduces fraud exposure and improves customer trust.

Jim Routh, Former CISO

Routh has programs at Saviynt that helped shape how enterprises treat identity as the primary perimeter.

Michael Erickson, CISO, Baptist Health System KY & IN

Erickson focuses on identity governance at scale in healthcare. His team centralizes IAM, automates access reviews, and builds stronger protections around sensitive patient data.

Darren Death, CISO, ASRC Federal

Death is a strong voice for identity-centric security and zero trust. He focuses on IAM, device identity, and continuous authorization across federal environments.

J Wolfgang Goerlich, Advisory CISO, CISCO, IANS

Goerlich helps security leaders move from network-centric thinking to identity-first strategies. He advises enterprises on building programs that treat identity as the perimeter