7 CISOs Championing Identity as the New Security Perimeter

Related

Female Cybersecurity Leaders to Watch in Nevada

Nevada’s cybersecurity leadership bench reflects the state’s distinctive mix...

Female Cybersecurity Leaders to Watch in Louisiana

Louisiana’s cybersecurity leadership bench reflects a mix of banking,...

Female Cybersecurity Leaders to Watch in South Carolina

South Carolina’s cybersecurity leadership bench reflects a mix of...

Female Cybersecurity Leaders to Watch in Oregon

Oregon’s cybersecurity leadership bench reflects a mix of enterprise...

Female Cybersecurity Leaders to Watch in Missouri

Missouri’s cybersecurity leadership bench reflects a mix of higher...

Share

More security teams treat identity as the real perimeter of the modern enterprise. Attackers target credentials, not firewalls. These CISOs lead the shift to identity-first security and show how strong authentication, lifecycle management, and continuous authorization can reduce risk across large and complex environments.

Bobby Ford, SVP and Global CISO, Hewlett Packard Enterprise

Ford focuses on identity lifecycle management and strict authentication for users, devices, and workloads. His work reinforces identity as the foundation of HPE’s global security strategy.

Tim Brown, CISO, SolarWinds

Brown strengthened SolarWinds’ identity controls after the breach. His team tightened privileged access, credential workflows, and access paths across engineering and production.

Jason Witty, CISO, USAA

Witty uses identity governance, privileged access management, and continuous authentication to protect a high-risk financial environment. His work reduces fraud exposure and improves customer trust.

Jim Routh, Former CISO

Routh has programs at Saviynt that helped shape how enterprises treat identity as the primary perimeter.

Michael Erickson, CISO, Baptist Health System KY & IN

Erickson focuses on identity governance at scale in healthcare. His team centralizes IAM, automates access reviews, and builds stronger protections around sensitive patient data.

Darren Death, CISO, ASRC Federal

Death is a strong voice for identity-centric security and zero trust. He focuses on IAM, device identity, and continuous authorization across federal environments.

J Wolfgang Goerlich, Advisory CISO, CISCO, IANS

Goerlich helps security leaders move from network-centric thinking to identity-first strategies. He advises enterprises on building programs that treat identity as the perimeter