Managing an Agile Security Operations Program

Building and improving a security operations program is challenging at any company, and even more so when that program was previously only focused on compliance. When Ken Loisch, global director of information security and compliance at Conair Corporation, first started at Conair four years ago, he changed the way the organization viewed security. The program…

Read More

Building a Security Operations Program

We recently sat down with Adam Hirsch, senior vice president of information security at PVH Corp., to discuss how he built his security program. When he started at PVH Corp. seven years ago, there were no formal security operations or risk functions. He had a five person security administration team spread across the U.S. and…

Read More

Member and BoD Spotlight: Colin Anderson, Global CISO, Levi Strauss & Co.

Colin Anderson, global CISO at Levi Strauss & Co., has been with the Retail & Hospitality ISAC since the beginning in 2014, when he and a small group of retail and hospitality organizations came together to develop an intelligence sharing community. As the current RH-ISAC Board Chair, and an IT executive with more than 25…

Read More

Member Spotlight

Managing time to complete intelligence sharing is a huge priority for Peer Choice Winner Angeline Button. She manages to be a rock-solid resource for not only the intel sharing community, but as a strong female influence in cyber security. Angeline is the practice lead of Threat Hunting & Intelligence at Dillard’s. In her role, she…

Read More

From Physics to Cybersecurity: An Interview with RH-ISAC Board Member, Scott Howitt

We recently interviewed RH-ISAC Board Member, Scott Howitt about his involvement with the RH-ISAC and his thoughts for its future. After several retail breaches of 2014, he knew he wanted to be part of the solution to safeguard organizations and their customers. He sees opportunities to use new technologies to better secure organizations.   RH-ISAC:…

Read More