The Business of Security

#45 - The CISO is Not the Hero of the Story with Jeff Wheatman

July 05, 2023 Josh Bruyning Season 2 Episode 44
The Business of Security
#45 - The CISO is Not the Hero of the Story with Jeff Wheatman
Show Notes

Dive deep with us into the fascinating world of storytelling as it intersects with cybersecurity. We're debunking common myths and shedding light on the transformative power of organizational archetypes. Jeff Weatman leads the discussion, challenging the stereotypical portrayal of the CISO as the central hero of cybersecurity.

In a captivating twist, Jeff Weatman proposes that the CISO, instead of being the typical hero, plays the role of the wise old sage, a vital yet supporting character. He intriguingly identifies the actual heroes as the CEO, CFO, Board Members, Customers, and Partners. Get ready to rethink cybersecurity dynamics and recognize the true champions of this digital battlefield.

A strategic thought leader with extensive expertise in security and cyber risk management, Jeffrey Wheatman is regarded as a foremost expert in guiding public sector clients and Fortune 500 companies in connection with their cybersecurity and risk management programs. Jeffrey’s history of working with clients to plan, grow, and transform their cyber risk management programs has been instrumental in ensuring organizations' continued viability and health as they define short- and long-term expansion plans. Under Jeffrey’s guidance, board and C-level leaders are fortified with the best practice solutions to realize exceptional performance outcomes.

In his current capacity as SVP, Cyber Risk Evangelist at Black Kite, Jeffrey has been tasked with raising awareness of the enterprise-wide risk impacts of third-party risk, both in the digital and traditional supply chain and supporting the strategic vision of the executive leadership team and investors.

Most recently, Jeffrey acted as a VP, Advisor with Gartner, the global strategic advisory firm, where he worked with clients to build and improve their security programs, assess risk, focus on reporting on program status, metrics, performance management, stakeholder engagement, executive communication, and bridging the connection between technology and security risk.