CISO Trainings , Governance , Training & Security Leadership

A CISO's Role at a Security Company

F5's Mike Convertino on Providing Product Development Insights
Mike Convertino, CISO, F5 Networks

What's it like to be the CISO of a security company? Mike Convertino of F5 Networks says if a CISO uses the company's products, he or she can provide valuable feedback for product development.

See Also: 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys

In this video interview at RSA Conference 2018, Convertino also discusses:

  • How DevSecOps informs product development at F5;
  • Using newer technologies and the skill sets changes needed;
  • Evolving approaches to security challenges.

As CISO and vice president of information security at F5, Convertino secures the company's networks and systems, influences security product direction and represents F5 to the security community. He has over 28 years of experience leading large IT operations and security organizations. Previously, he was CISO and vice president for information security at Crowdstrike and Microsoft's senior director of network security. He's a retired Air Force colonel who was last assigned as commander of the 318th Information Operations Group responsible for the creation and operational employment of global Air Force information operations capabilities.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.