🤖 Billy Spears 🦅

🤖 Billy Spears 🦅

Austin, Texas, United States
33K followers 500+ connections

About

Meet Billy Spears: Your Go-To Tech Maverick for Innovation and Growth

Ever…

Contributions

Activity

Join now to see all activity

Experience

  • Teradata Graphic

    Teradata

    San Diego, California, United States

  • -

  • -

  • -

    Santa Clara County, California, United States

  • -

    United States

  • -

Education

Volunteer Experience

  • Digital Directors Network Graphic

    Executive Member - Digital and Cybersecurity Leaders

    Digital Directors Network

    - Present 9 months

    As a member of the Digital and Cybersecurity Leaders within the Digital Directors Network (DDN), I am deeply committed to advancing the practice and profession of digital and cybersecurity governance. DDN serves as a curated learning network, providing a platform for IT and cybersecurity executives to enhance their skills and expertise in digital risk oversight, ultimately preparing them for roles in the corporate boardroom. One of the distinguishing features of DDN is our commitment to…

    As a member of the Digital and Cybersecurity Leaders within the Digital Directors Network (DDN), I am deeply committed to advancing the practice and profession of digital and cybersecurity governance. DDN serves as a curated learning network, providing a platform for IT and cybersecurity executives to enhance their skills and expertise in digital risk oversight, ultimately preparing them for roles in the corporate boardroom. One of the distinguishing features of DDN is our commitment to accessibility – there are no membership dues for Executive Membership. This ensures that executives who are passionate about developing their digital and cybersecurity risk oversight skills have the opportunity to join us without financial barriers.

    As a member of the Digital and Cybersecurity Leaders, I am excited to contribute to this vibrant community and collaborate with fellow executives to drive positive change in the area of digital and cybersecurity governance. Together, we will continue to elevate industry standards and shape the future of corporate cybersecurity practices.

  • Evanta, a Gartner Company Graphic

    Governing Body Co-Chair -- Houston CISO Community

    Evanta, a Gartner Company

    - Present 10 months

    Science and Technology

    Driven by an agenda created "by CISOs, for CISOs," this invitation-only gathering has been designed to minimize time commitments while maximizing the depth of a true peer-to-peer engagement in an intimate setting. Based on insights from the very individuals who are creating new risk, talent, and information security practices, establishing new investing benchmarks, and deploying strategies to drive growth, the conference features content from practicing CISOs and current industry thought…

    Driven by an agenda created "by CISOs, for CISOs," this invitation-only gathering has been designed to minimize time commitments while maximizing the depth of a true peer-to-peer engagement in an intimate setting. Based on insights from the very individuals who are creating new risk, talent, and information security practices, establishing new investing benchmarks, and deploying strategies to drive growth, the conference features content from practicing CISOs and current industry thought leaders.

  • National Technology Security Coalition Graphic

    Board of Directors

    National Technology Security Coalition

    - Present 1 year 2 months

    Science and Technology

    The NTSC is a non-profit, non-partisan trade association that serves as the preeminent advocacy voice for CISO’s. The NTSC Board of Directors embodies a broad cross section of enterprise companies with a vested interest in protecting the security of their customers and employees. Through dialogue, education, and government relations, they unite both public and private sector stakeholders around policies that improve national cybersecurity standards and awareness.

  • Gartner Graphic

    Peer Community Ambassador

    Gartner

    - Present 1 year 8 months

    Science and Technology

    A Gartner Peer Community Ambassador is an individual who is part of the Gartner Peer Insights program, which is a platform for professionals to share and access peer reviews and ratings of various technology products and services. The Gartner Peer Community Ambassadors are recognized and trusted members of the Gartner Peer Insights community who contribute actively by providing reviews, insights, and feedback on technology solutions they have used or are familiar with.

    These ambassadors…

    A Gartner Peer Community Ambassador is an individual who is part of the Gartner Peer Insights program, which is a platform for professionals to share and access peer reviews and ratings of various technology products and services. The Gartner Peer Community Ambassadors are recognized and trusted members of the Gartner Peer Insights community who contribute actively by providing reviews, insights, and feedback on technology solutions they have used or are familiar with.

    These ambassadors play a vital role in helping other professionals make informed decisions by sharing their real-world experiences and expertise. They contribute by writing reviews, participating in discussions, offering advice, and providing valuable insights on technology products and services. Their contributions help create a robust and reliable knowledge base that enables professionals to evaluate and select the most suitable solutions for their organizations.

    Gartner Peer Community Ambassadors are typically recognized for their active involvement, quality contributions, and willingness to share their experiences to benefit the broader community. Their expertise and engagement make them valuable resources for peers seeking unbiased information and recommendations.

  • Evanta, a Gartner Company Graphic

    Governing Body Member - Dallas CISO Community

    Evanta, a Gartner Company

    - Present 1 year 10 months

    Science and Technology

    Driven by an agenda created "by CISOs, for CISOs," this invitation-only gathering has been designed to minimize time commitments while maximizing the depth of a true peer-to-peer engagement in an intimate setting. Based on insights from the very individuals who are creating new risk, talent, and information security practices, establishing new investing benchmarks, and deploying strategies to drive growth, the conference features content from practicing CISOs and current industry thought…

    Driven by an agenda created "by CISOs, for CISOs," this invitation-only gathering has been designed to minimize time commitments while maximizing the depth of a true peer-to-peer engagement in an intimate setting. Based on insights from the very individuals who are creating new risk, talent, and information security practices, establishing new investing benchmarks, and deploying strategies to drive growth, the conference features content from practicing CISOs and current industry thought leaders.

  • Lacework Graphic

    Executive Customer Advisory Board Member

    Lacework

    - Present 2 years 9 months

    Science and Technology

  • A-LIGN Graphic

    A-SCEND Customer Advisory Board Member

    A-LIGN

    - Present 1 year 10 months

    Science and Technology

    I'm proud to serve as a member of A-SCEND's Customer Advisory Board (CAB), where I have the unique opportunity to provide my perspective and experience in order to help improve the platform and ensure it better serves its users.

    During my time on the board, I collaborate with other members and the A-SCEND product team to shape the product roadmap, gain early access to new features, and share feedback with peers. Our quarterly virtual sessions and in-person events provide an open forum to…

    I'm proud to serve as a member of A-SCEND's Customer Advisory Board (CAB), where I have the unique opportunity to provide my perspective and experience in order to help improve the platform and ensure it better serves its users.

    During my time on the board, I collaborate with other members and the A-SCEND product team to shape the product roadmap, gain early access to new features, and share feedback with peers. Our quarterly virtual sessions and in-person events provide an open forum to discuss ways in which the platform can better serve its users.

    I'm grateful to have had the chance to make a difference and influence future enhancements and features through my participation in the CAB.

  • CyberEdBoard Community  Graphic

    Executive Member

    CyberEdBoard Community

    - Present 4 years 4 months

    Science and Technology

    Community · Leadership · Collaboration · Intelligence

    CyberEdBoard is the premier member’s only community of executives and thought leaders in the fields of security and IT. Members have access to a robust platform of resources that promote peer-to-peer knowledge-sharing, executive-level education, and professional growth.

    This private global community is dedicated to networking, brand exposure and education in the topics of information security, cybersecurity and information…

    Community · Leadership · Collaboration · Intelligence

    CyberEdBoard is the premier member’s only community of executives and thought leaders in the fields of security and IT. Members have access to a robust platform of resources that promote peer-to-peer knowledge-sharing, executive-level education, and professional growth.

    This private global community is dedicated to networking, brand exposure and education in the topics of information security, cybersecurity and information technology.

  • InfraGard National Members Alliance Graphic

    Member

    InfraGard National Members Alliance

    - Present 4 years 6 months

    Science and Technology

    InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard's membership includes business executives, entrepreneurs, military and government officials, computer professionals…

    InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard's membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.

  • Evanta, a Gartner Company Graphic

    Governing Body Co-Chair - Southern California CISO Community

    Evanta, a Gartner Company

    - 4 years 6 months

    Driven by an agenda created "by CISOs, for CISOs," this invitation-only gathering has been designed to minimize time commitments while maximizing the depth of a true peer-to-peer engagement in an intimate setting. Based on insights from the very individuals who are creating new risk, talent, and information security practices, establishing new investing benchmarks, and deploying strategies to drive growth, the conference features content from practicing CISOs and current industry thought…

    Driven by an agenda created "by CISOs, for CISOs," this invitation-only gathering has been designed to minimize time commitments while maximizing the depth of a true peer-to-peer engagement in an intimate setting. Based on insights from the very individuals who are creating new risk, talent, and information security practices, establishing new investing benchmarks, and deploying strategies to drive growth, the conference features content from practicing CISOs and current industry thought leaders.

  • UCP of Orange County Graphic

    Board of Directors - Member at Large

    UCP of Orange County

    - 3 months

    Children

    UCP's Board of Directors is comprised of individuals who want to make a difference in the lives of children with disabilities and their families by ensuring the mission of UCP-OC is fulfilled here in our community. The mission of UCP-OC is to help children with disabilities reach their full potential and improve the quality of life for their families.

    https://www.ucpoc.org/

  • National Technology Security Coalition Graphic

    Board of Directors

    National Technology Security Coalition

    - 1 year 5 months

    Science and Technology

    The NTSC is a non-profit, non-partisan trade association that serves as the preeminent advocacy voice for CISO’s. The NTSC Board of Directors embodies a broad cross section of enterprise companies with a vested interest in protecting the security of their customers and employees. Through dialogue, education, and government relations, they unite both public and private sector stakeholders around policies that improve national cybersecurity standards and awareness.

  • Venafi Graphic

    CSO Advisory Board Member

    Venafi

    - 2 years 6 months

  • Webster University Graphic

    Cyber Security Advisory Committee Member

    Webster University

    - 2 years 11 months

    Science and Technology

    This Committee ensures the Cyber-security program prepares students and professionals for demanding positions in public and private sectors overseeing, operating or protecting critical computer systems, information, networks, infrastructures and communications networks from cyber crime, cyber fraud and cyber espionage.

    Students will be well-versed to apply their knowledge and critical thinking related to domestic and international legal systems, private and public policies, and ethics…

    This Committee ensures the Cyber-security program prepares students and professionals for demanding positions in public and private sectors overseeing, operating or protecting critical computer systems, information, networks, infrastructures and communications networks from cyber crime, cyber fraud and cyber espionage.

    Students will be well-versed to apply their knowledge and critical thinking related to domestic and international legal systems, private and public policies, and ethics, as they apply cyber-security to information protection, terrorism, fraud, theft, intelligence/counterintelligence, digital forensics, preemptive and strategic force operation application situations.

  • MediaPRO: Cybersecurity & Privacy Education Graphic

    Privacy Advisory Council Member

    MediaPRO: Cybersecurity & Privacy Education

    - 1 year

  • OpenText Graphic

    Strategic Advisory Board Member

    OpenText

    - 1 year 1 month

    OpenText enables the digital world, creating a better way to work with information, on premises or in the cloud. This board helps shape future market strategies around cyber security, digital investigations and e-Discovery.

  • Gartner Graphic

    CISO Coalition Member

    Gartner

    - 1 year 1 month

    An expert network of security leaders creating and refining approaches to information risk management. Key benefits include pickup teams that collaborate on specific emerging threats, weekly help desk, daily security briefing and peer-led webinars.

  • American Heart Association Graphic

    Executive Leadership Team

    American Heart Association

    - 1 year 7 months

    Health

    The American Heart Association is the nation’s oldest and largest voluntary organization dedicated to fighting heart disease and stroke. We fund innovative research, fight for stronger public health policies, and provide critical tools and information to save and improve lives. Our nationwide organization includes 156 local offices and more than 3,000 employees. We moved our national headquarters from New York to Dallas in 1975 to be more centrally located. The American Stroke Association was…

    The American Heart Association is the nation’s oldest and largest voluntary organization dedicated to fighting heart disease and stroke. We fund innovative research, fight for stronger public health policies, and provide critical tools and information to save and improve lives. Our nationwide organization includes 156 local offices and more than 3,000 employees. We moved our national headquarters from New York to Dallas in 1975 to be more centrally located. The American Stroke Association was created as a division in 1997 to bring together the organization’s stroke-related activities.

    What We Do:
    Build Healthier lives where you live and work - in the community, health care, education and research.

    How Can YOU help?
    Touch hearts - save lives. Here's the chance to make a real difference!

    Let me know if you would like to participate in one of our local events:
    - Heart Walk
    - Go Red for Women Luncheon
    - Heart Ball

  • IAPP - International Association of Privacy Professionals Graphic

    Advisory Board Member - The Privacy Advisor

    IAPP - International Association of Privacy Professionals

    - 3 years

    The role of this advisory board was to help guide the IAPP’s coverage of privacy and security issues. This critical role ensures content is useful and fresh. This advisory board convenes every other month by teleconference, where members suggest timely, relevant content based on their work in the field of privacy. Besides meaningful participation in the monthly conference call, members are expected to provide articles for publication and may also be asked to help recruit potential authors.

Publications

  • Cloud and AI: Building a Relationship between Two Technology Giants

    BrightTalk Originals by TechTarget

    Cloud computing and artificial intelligence are two sectors that are experiencing explosive growth – and that’s not going to change any time soon. The cloud computing market is projected to double from its current size to $947 billion by 2026, while the AI market is slated to grow more than 5 times to $309 billion in the same period. Organizations know they need to capitalize on these technologies, but figuring out how to do so and how to utilize them in tandem is the question of the moment…

    Cloud computing and artificial intelligence are two sectors that are experiencing explosive growth – and that’s not going to change any time soon. The cloud computing market is projected to double from its current size to $947 billion by 2026, while the AI market is slated to grow more than 5 times to $309 billion in the same period. Organizations know they need to capitalize on these technologies, but figuring out how to do so and how to utilize them in tandem is the question of the moment. Succeed and the possibilities are endless.

    Join us as we explore how enterprise leaders are striving to understand how the rapidly expanding field of AI can build a relationship with cloud that spurs even greater innovation

    During the panel, we’ll discuss:

    — The Applications of AI in Cloud Computing
    — Advantages of Deploying AI in Cloud Environments
    — The Transformative Nature of Cloud and AI together
    — Security Guardrails and Considerations

    Other authors
    See publication
  • Teradata Possible 2023

    Silicon Angle Media

    TheCUBE delivers live coverage from the industry’s top events, featuring exclusive interviews with thought leaders, analysts and practitioners.

    See publication
  • Building an Effective Incident Response Team in a Fast Paced World

    BrightTALK by TechTarget

    Presented by
    Dr. Rebecca Wynn, Click Solutions Group | Billy Spears, Teradata

    About this talk
    As risk continues to evolve and shift, your security teams must adapt also - and when it comes to incident response, speed is key. When hackers outnumber FBI cyber staff 50 to one, staying on top of your security is essential.

    Join Dr. Rebecca Wynn and this month’s special guest, as they get into the weeds of incident response, from key trends to implementation.

    Join us to…

    Presented by
    Dr. Rebecca Wynn, Click Solutions Group | Billy Spears, Teradata

    About this talk
    As risk continues to evolve and shift, your security teams must adapt also - and when it comes to incident response, speed is key. When hackers outnumber FBI cyber staff 50 to one, staying on top of your security is essential.

    Join Dr. Rebecca Wynn and this month’s special guest, as they get into the weeds of incident response, from key trends to implementation.

    Join us to discuss:
    - Incident response for the modern enterprise
    - Training your employees for effective incident response
    - Augmenting with 3rd party support
    - Incident response playbooks - how to build one, and why they’re valuable
    - And much more!

    Other authors
    See publication
  • The Modern CISO Network: Board Book

    Lacework

    Did you know only 10% of boards have a qualified #cybersecurity expert? In an era of ever-evolving security threats and regulations, it's crucial for businesses to fortify their defense strategies! I’m super excited to share that I am featured in the inaugural edition of 'The Modern CISO Network: Board Book' This directory is a treasure trove of seasoned cybersecurity leaders who stand ready to impart expertise and strategic guidance to corporate boards. Explore the book, and on page 90 you’ll…

    Did you know only 10% of boards have a qualified #cybersecurity expert? In an era of ever-evolving security threats and regulations, it's crucial for businesses to fortify their defense strategies! I’m super excited to share that I am featured in the inaugural edition of 'The Modern CISO Network: Board Book' This directory is a treasure trove of seasoned cybersecurity leaders who stand ready to impart expertise and strategic guidance to corporate boards. Explore the book, and on page 90 you’ll find my profile among a host of accomplished professionals. Let's collaborate to safeguard the digital landscape!

    See publication
  • Building trust in business for sustainable growth: A conversation with Billy Spears, CISO at Teradata

    Caspian Studios / Lacework

    In the fast-paced world of business, trust is the secret ingredient that fuels sustainable growth. But how do businesses cultivate trust in an increasingly digital and complex landscape?

    Join us for an engaging conversation with Billy Spears, CISO at Teradata, as we unravel the importance of trust and how to use security to drive businesses forward.

    Listen to the Code to Cloud podcast to hear Billy’s answers to these questions (and much more):

    Why has phishing become more…

    In the fast-paced world of business, trust is the secret ingredient that fuels sustainable growth. But how do businesses cultivate trust in an increasingly digital and complex landscape?

    Join us for an engaging conversation with Billy Spears, CISO at Teradata, as we unravel the importance of trust and how to use security to drive businesses forward.

    Listen to the Code to Cloud podcast to hear Billy’s answers to these questions (and much more):

    Why has phishing become more prevalent than ever?
    What threat does generative AI propose to security?
    What’s the secret to fostering trust in business relationships?
    When is something “secure enough”?
    How can you better give and accept criticism as a security leader?

    See publication
  • The Importance of Trust in Cybersecurity | Building Effective Teams and Communication | A Crucial Conversation With Billy Spears

    ITSPmagazine

    By establishing trust, organizations can develop more efficient security programs and improve risk management outcomes. In this post, Billy Spears, CISO for Teradata, presents critical elements for building trust, such as adopting a results-oriented approach, clarifying intent, and actively listening to others. The crucial role of trust in the cybersecurity industry is also explored as Billy emphasizes its significance in cultivating effective communication, collaboration, and innovation within…

    By establishing trust, organizations can develop more efficient security programs and improve risk management outcomes. In this post, Billy Spears, CISO for Teradata, presents critical elements for building trust, such as adopting a results-oriented approach, clarifying intent, and actively listening to others. The crucial role of trust in the cybersecurity industry is also explored as Billy emphasizes its significance in cultivating effective communication, collaboration, and innovation within teams and organizations. Billy stresses the importance of balancing trust in human relationships with the implementation of zero-trust security solutions, paving the way for a more collaborative and productive environment in the cybersecurity landscape.

    Other authors
    See publication
  • Burnout in Cybersecurity – Can It Be Prevented?

    SecurityWeek.com

    Served as a contributing source providing CISO insights relating to this topic.

    Other authors
    See publication
  • CISO Profiles: Billy Spears, CISO, Alteryx

    K logix

    Feats of Strength is a business-focused information security magazine created by K logix. This publication provides a platform for a diverse set of industry leaders to share their success and challenges. By connecting people with thought leadership content, they examine different ways to build a confident security program.

    Other authors
    See publication
  • September 2021 Feats of Strength Magazine: CISO Responsibilities

    K logix

    Feats of Strength is a business-focused cybersecurity magazine created by K logix. In this quarterly publication, we interview CISOs and other security leaders and provide a platform for a diverse set of industry leaders to share their success and challenges. By connecting people with thought leadership content, we examine different ways to build a confident security program

    In this issue, CISO Responsibilities is the theme of this issue of Feats of Strength magazine, a topic that…

    Feats of Strength is a business-focused cybersecurity magazine created by K logix. In this quarterly publication, we interview CISOs and other security leaders and provide a platform for a diverse set of industry leaders to share their success and challenges. By connecting people with thought leadership content, we examine different ways to build a confident security program

    In this issue, CISO Responsibilities is the theme of this issue of Feats of Strength magazine, a topic that continually comes up when speaking with customers and the security community. Customers often ask – how are my peers structuring their programs? How should I organize my team? What should my focus areas be? How do I address the risks associated with business transformation? What resources are needed for each of my
    program areas?

    Other authors
    See publication
  • CISO2CISO: On the Wrong Side of Disruption - Roundtable

    TechCrunch Disrupt 2021

    Disruption isn’t always a good thing. Often, we fear it. We resist prioritizing even necessary change out of fear that the disruption it may bring will be more detrimental than beneficial. Are we wrong? Are we right? Cyvatar Co-Founder and ex-global CISO Craig Goodwin and Alteryx CISO Billy Spears debate both possibilities as they look at the ways we prioritize risk and disruption at work. Presented by Cyvatar

    Other authors
    See publication
  • US companies plot return to office, raising questions on hybrid security

    Cybersecurity Dive

    Remote workers are migrating to the corporate workspace, opening up a set of security challenges for CISOs.

    Article Written by David Jones (https://www.cybersecuritydive.com/editors/djones/). I was a contributor to David's story.

    See publication
  • 1st Global Cybersecurity Observatory-US

    Cybersecurity Observatory

    My feature, on cybersecurity leadership, is on Pages 78-82.

    The purpose of the 1st Global Cybersecurity Observatory is to collaborate to build a safer society and to help solve important problems leveraging cybersecurity innovation. Find out more by visiting https://cyberstartupobservatory.com

    Other authors
    See publication
  • 8 Experts on Protecting Machine Identities

    The Mighty Guides (www.mightyguides.com) / Venafi (www.venafi.com)

    How to deliver the visibility, intelligence, and automation to protect machine identities of all types.

    Mighty Guides make you stronger. These authoritative and diverse guides provide a full view of a topic. They help you explore, compare, and contrast a variety of viewpoints so that you can determine what will work best for you. Reading a Mighty Guide is kind of like having your own team of experts. Each heartfelt and sincere piece of advice in this guide sits right next to the…

    How to deliver the visibility, intelligence, and automation to protect machine identities of all types.

    Mighty Guides make you stronger. These authoritative and diverse guides provide a full view of a topic. They help you explore, compare, and contrast a variety of viewpoints so that you can determine what will work best for you. Reading a Mighty Guide is kind of like having your own team of experts. Each heartfelt and sincere piece of advice in this guide sits right next to the contributor’s name, biography, and links so that you can learn more about their work. This background information gives you the proper context for each expert’s independent perspective. Credible advice from top experts helps you make strong decisions. Strong decisions make you mighty.

    Other authors
    See publication
  • Modern Lending Podcast - Stop the Bad Actors

    Modern Lending Podcast / loanDepot

    Alec has on former loanDepot Chief Informations Security Officer, Billy Spears, to make a pivot to the other side of the web that we normally do not see. A pivot to the person and his team that keeps us safe from cyber attacks and the bad actors out there that want to hurt our customers and our business.

    Other authors
    See publication
  • CISOs weigh-in on budgets, wish lists, and security as a business priority

    Balbix / Written by Ruchika Mishra

    Posted to the Balbix Blog and Written by: Ruchika Mishra, Director of Product Marketing at Balbix

    Today’s CISOs know that they have a critically important job to do. Demands range from being an enforcer of cybersecurity policy to being an enabler of the business by keeping the organization’s data, infrastructure, and people safe. In worse case scenarios, the well-being of the entire enterprise is at stake. In short, being a CISO is definitely not for the faint of heart.

    Balbix…

    Posted to the Balbix Blog and Written by: Ruchika Mishra, Director of Product Marketing at Balbix

    Today’s CISOs know that they have a critically important job to do. Demands range from being an enforcer of cybersecurity policy to being an enabler of the business by keeping the organization’s data, infrastructure, and people safe. In worse case scenarios, the well-being of the entire enterprise is at stake. In short, being a CISO is definitely not for the faint of heart.

    Balbix recently published the infographic “Today’s CISO,” combining data points from a number of surveys and credible industry sources to highlight some very interesting findings and insights. We were hoping this would spark a healthy debate among security professionals who struggle with these kinds of issues on a daily basis, and that’s exactly what it’s done. Thanks to Billy Spears, EVP, CISO at LoanDepot, who started the ball rolling by reposting on LinkedIn, over 30 people have already weighed in. Here’s a sampling of what people are saying as they read the infographic and reflect on its relevance to their own situations.

    See publication
  • CISO Podcast: Security Vendor Relationship Series

    Podcast Services: iTunes, Spotify, Google Play, Stitcher, TuneIn

    On this week’s episode of CISO/Security Vendor Relationship Series/Podcast, Mike Johnson and David Spark invited Billy Spears, CISO, loanDepot to discuss:

    - Are CISOs aware how the security of their product is sold?
    - Should CISOs be offered a golden bullet clause?
    - What should a CISO do if they had to take over IT?

    Other authors
    See publication
  • Cybersecurity Challenges to Enhance Web Security for Enterprises

    Enterprise Security Magazine / Valley Media Inc.

    My article is on Page 8

    Enterprise Security is a print magazine which provides CIOs and CISOs viewpoints on the latest cyber threats and security trends. This magazine follows a unique learn-from-peer approach where chief security officers and decision makers share their innovative solutions along with their industry expertise and wisdom. This expertise can influence the security ecosystem as the magazine provides information on the innovative serves that have been developed by the…

    My article is on Page 8

    Enterprise Security is a print magazine which provides CIOs and CISOs viewpoints on the latest cyber threats and security trends. This magazine follows a unique learn-from-peer approach where chief security officers and decision makers share their innovative solutions along with their industry expertise and wisdom. This expertise can influence the security ecosystem as the magazine provides information on the innovative serves that have been developed by the stat-ups and established organizations.

    See publication
  • Profiles in Confidence: Billy Spears CISO

    Feats of Strength Magazine / K logix

    Article written by Katie Haug; I was one of a few featured CISO's

    Feats of Strength is a business-focused information security magazine created by K logix. This publication provides a platform for a diverse set of industry leaders to share their success and challenges. By connecting people with thought leadership content, they examine different ways to build a confident security program.

    Other authors
    See publication
  • Not every insider threat is malicious, but all are dangerous

    SC Magazine / SC Media

    Article written and published by Jesse Staniforth. I am not the Author of this article. I served as one of the featured 'Insider Threats' experts interviewed by Jesse Staniforth.

    Other authors
    See publication
  • Hacking Requires Exceptional Skills: Can IT Security Pros Keep Up?

    Venafi

    Debating the status quo, challenging the norms of technical certifications, industry affiliations and degree programs while attempting to communicate opposing perspectives.

    See publication
  • 29 Highly Influencial CISO's eBook

    Peerlyst

    I am not the author of this eBook. Basheer Ahmed Khan is the author. I was one of the twenty-nine CISO's featured. Thank you Peerlyst and Basheer for this great honor.

    From putting together a complex Risk Management Program to handling an unexpected huge security
    threat, the job of a CISO (Chief Information Security Officer) is getting more and more complicated with the rapid expansion of the threat landscape. The toughest part a CISO faces is to convince the C-suite executives…

    I am not the author of this eBook. Basheer Ahmed Khan is the author. I was one of the twenty-nine CISO's featured. Thank you Peerlyst and Basheer for this great honor.

    From putting together a complex Risk Management Program to handling an unexpected huge security
    threat, the job of a CISO (Chief Information Security Officer) is getting more and more complicated with the rapid expansion of the threat landscape. The toughest part a CISO faces is to convince the C-suite executives about the cybersecurity threats an organization faces and to extract the budgets he needs for overall Cyber Security. The role of a CISO is becoming more and more important at the C-suite level. Apart from their technical expertise a CISO must also possess operational and leadership skills. The role of a CISO has become very very critical for any organisation irrespective of the industry and the size. Infact the role of a CISO has become so critical that even smaller organizations who cannot afford to have an in-house CISO are outsourcing it to a Virtual CISO (VCISO).

    Peerlyst identified and listed 29 awesome Chief Information Security Officers who have all the above
    mentioned qualities. These experts are the reason behind the impeccable CyberSecurity their
    organizations have. They have arranged them in an alphabetical order.

    Other authors
    See publication

Honors & Awards

  • 2023 C100 Award

    CISOs Connect

    The Top 100 CISOs were selected by a panel of Esteemed CISO Judges and over 700 deserving CISO candidates. This honor reflects the complete body of work as a CISO for their organization and what they have given back to the cybersecurity community at large.

    Consideration includes a wide range of skills including business leadership, strategic influence, strategic foresight, managerial skills, communication ability, and readiness for the unexpected. These top CISOs also understand the…

    The Top 100 CISOs were selected by a panel of Esteemed CISO Judges and over 700 deserving CISO candidates. This honor reflects the complete body of work as a CISO for their organization and what they have given back to the cybersecurity community at large.

    Consideration includes a wide range of skills including business leadership, strategic influence, strategic foresight, managerial skills, communication ability, and readiness for the unexpected. These top CISOs also understand the importance of preparing a successor generation by sharing expertise and the benefit of experience, and participating actively in the CISOs community.

  • 2021 Top 100 CISO Recognition

    CISOs Connect

    The Top 100 CISOs were selected by a panel of Esteemed CISO Judges. This honor reflects the body of work as a CISO for their organization and what they have given back to the cybersecurity community at large.

  • 2019 Innovator of the Year - Nominee

    Orange County Business Journal

    Recognized as an Orange County, California innovator who is creating game-changing ideas, processes, products, services and business models.

  • Chief Information Security Officer of the Year - Finalist

    Cyber Rescue Alliance

  • 2018 ISE North American Executive of the Year - Finalist

    T.E.N. and Information Security Executive (ISE)

    The awards recognize the information security executives and their teams who demonstrate outstanding leadership in risk management, data asset protection, regulatory compliance, privacy, and network security.

    Demonstrated outstanding leadership and exemplary achievement in the areas of information security, risk management, data asset protection, regulatory compliance, privacy and network security. They have proven their ability to develop innovative security strategies and solutions to…

    The awards recognize the information security executives and their teams who demonstrate outstanding leadership in risk management, data asset protection, regulatory compliance, privacy, and network security.

    Demonstrated outstanding leadership and exemplary achievement in the areas of information security, risk management, data asset protection, regulatory compliance, privacy and network security. They have proven their ability to develop innovative security strategies and solutions to meet business challenges in their organizations and the industry.

  • 2018 Innovator of the Year - Nominee

    Orange County Business Journal

    Recognized as an Orange County, California innovator who is creating game-changing ideas, processes, products, services and business models.

  • 2018 Global CISO Breakaway Influence Leader

    Evanta- A Gartner Company

    Influence Category Winner-- For an outsized effect on the organization, community and/or profession.

    The Breakaway Leadership Awards honor global CISOs who drive exceptional impact, innovation and influence. This is one of the most coveted, anticipated and influential CISO leadership award programs of the year, made even more special because winners are selected by their peers.

    https://www.evanta.com/ciso/summits/global#page/23759

  • 2014 National Law Journal’s inaugural list of 50 Governance Risk & Compliance Trailblazers & Pioneers

    National Law Journal

Organizations

  • ISACA

    -

    - Present
  • Open Compliance and Ethics Group (OCEG)

    -

    - Present
  • International Association of Privacy Professionals (IAPP)

    Past: Advisory Board Member (The Privacy Advisor)

    - Present
  • Evanta, A Gartner Company

    CISO Governing Body Co-Chair - Southern California Chapter

    -
  • Center for Information Policy Leadership (CIPL)

    Past: Corporate Member

    -

More activity by 🤖 Billy

View 🤖 Billy’s full profile

  • See who you know in common
  • Get introduced
  • Contact 🤖 Billy directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named 🤖 Billy Spears 🦅 in United States