About
Michael S. Oberlaender is a visionary, global industry leader who has built his…
Services
Articles by Michael S.
Activity
-
Sharpen YOUR saw ... in my new book, "PREMIER CISO - BOARD & C-SUITE: RAISING THE BAR FOR CYBERSECURITY" I describe the status quo of the…
Sharpen YOUR saw ... in my new book, "PREMIER CISO - BOARD & C-SUITE: RAISING THE BAR FOR CYBERSECURITY" I describe the status quo of the…
Shared by Michael S. Oberlaender - PREMIER CISO
Experience
Education
-
Ruprecht-Karls-Universität Heidelberg
-
Activities and Societies: Heidelberg is an Ivy League "Elite" university in Germany's excellence initiative. I studied and specialized in environmental physics, parallel- and vector computers.
Completely self-funded education by entertaining another job in parallel (see above: Treubau LLC)
-
-
Activities and Societies: hold lectures about informatics (computer science) for other (younger) pupils, elected as course speaker
Licenses & Certifications
-
Certified Data Privacy Practitioner (CDPP)
Institute of Information Security (IIS)
IssuedCredential ID CDPP02112096 -
CNSS-4016 International Training Standards for Risk Analyst
IA2 - Information Assurance Associates Inc.
Issued -
Advanced Certified Security Engineer (ACSE)
Integralis
Issued
Volunteer Experience
-
Interviewee as experienced (8x) CISO and SME on the materiality decision / reporting requirements by the SEC
The Wall Street Journal
- 1 month
Economic Empowerment
It's a great pleasure and honor to be again quoted in the The Wall Street Journal (WSJ) as experienced CISO and subject matter expert about the U.S. Securities and Exchange Commission (SEC)'s materiality handling and communication of last week - #CyberSecurity #InformationSecurity #InfoSec #CyberSec #Security #Regulation #Materiality #Board #BoD #BoardofDirectors #Communication #SpeakTruthToPower #Integrity #Transparency #Executive #Leadership #LeadershipByExample
Link to the…It's a great pleasure and honor to be again quoted in the The Wall Street Journal (WSJ) as experienced CISO and subject matter expert about the U.S. Securities and Exchange Commission (SEC)'s materiality handling and communication of last week - #CyberSecurity #InformationSecurity #InfoSec #CyberSec #Security #Regulation #Materiality #Board #BoD #BoardofDirectors #Communication #SpeakTruthToPower #Integrity #Transparency #Executive #Leadership #LeadershipByExample
Link to the interview:
https://www.wsj.com/articles/materiality-definition-seen-as-tough-task-in-new-sec-cyber-rules-314b4626 -
Interviewee as experienced CISO (8x) and industry leader on the SEC cybersecurity ruling
The Wall Street Journal
- 1 month
Economic Empowerment
I'm honored to be quoted by the The Wall Street Journal as experienced CISO and industry leader and cybersecurity expert about the Security Exchange Commission's decision about the new cybersecurity rules becoming effective as of December 2023. Here is the link to the article:
https://www.wsj.com/articles/cyber-experience-on-boards-still-seen-as-critical-in-new-sec-rules-937702bd -
8xCISO & Security Industry Leader / Public Speaker and Moderator of the CISO panel
Data Connectors Cybersecurity Community
- 1 month
Education
It was a great #honor and true #pleasure to #moderate this fantastic #Executive #CISO #panel at the Data Connectors Cybersecurity Community #Houston 2024 #conference! We had a lot of fun - it's visible throughout the shared images. Thanks to all our attendees, and thanks to Dawn Morrissey for organizing the conference, and thanks to my panelists Doug Jaworski Jon Garza, CISSP, MSM James Morrison, FBI Cyber (Ret), CISSP, MBA, Veteran for sharing their #insights and answering all my #questions…
It was a great #honor and true #pleasure to #moderate this fantastic #Executive #CISO #panel at the Data Connectors Cybersecurity Community #Houston 2024 #conference! We had a lot of fun - it's visible throughout the shared images. Thanks to all our attendees, and thanks to Dawn Morrissey for organizing the conference, and thanks to my panelists Doug Jaworski Jon Garza, CISSP, MSM James Morrison, FBI Cyber (Ret), CISSP, MBA, Veteran for sharing their #insights and answering all my #questions. We covered a lot - and I steered the ship (the German Physicist 😎 in me) to perform precisely and exactly on time. Thank y'all!
Thanks also for all coming by my booth to get signed #copies of my latest #books! Such a great fun #event! -
KEYNOTE speaker and Global Cybersecurity Industry Leader
ElevateIT: Technology Summits
- 1 month
Education
Served as KEYNOTE speaker and Global Cybersecurity Industry Leader
-
CISO Panelist (as former 8x CISO) and Global Cybersecurity Industry Leader
ElevateIT: Technology Summits
- 1 month
Education
You can watch the recorded session here: https://youtu.be/hkM-UBwUPp4
-
Industryleader / Cybersecurity Executive / 8x former CISO / Interviewee
CSO Online
- 1 month
Human Rights
It's a great honor to be quoted as 8x CISO, industry leader, and subject matter expert on cybersecurity by the great Evan Schuman for CSO Online. In this new article about the FCC settlement with T-Mobile on their triple data breaches we cover topics from regulators imposing minimal fines versus those in the EU, the minimum approach for cybersecurity in the US (just doing the basics like MFA and ZTNA, Asset inventories, etc.) and the failing security grade that leads to these hacks / data…
It's a great honor to be quoted as 8x CISO, industry leader, and subject matter expert on cybersecurity by the great Evan Schuman for CSO Online. In this new article about the FCC settlement with T-Mobile on their triple data breaches we cover topics from regulators imposing minimal fines versus those in the EU, the minimum approach for cybersecurity in the US (just doing the basics like MFA and ZTNA, Asset inventories, etc.) and the failing security grade that leads to these hacks / data breaches. My new book (PREMIER CISO - BOARD & C-SUITE: RAISING THE BAR FOR CYBERSECURITY) is also mentioned and referenced! It's an honor to have been quoted again.
-
Expert Interviewee as industry leading CISO and subject matter expert on security
CSO Online
- 1 month
Economic Empowerment
Honored and humbled to be quoted again in this master piece in CSO Online by Evan Schuman about the SEC legal actions and how CISOs and CSOs can prepare and defend themselves in light of these new risks of alleged liabilities. Thanks for sharing some of my advice with the C(I)SO community. This is a developing situation and will need to be tackled as such. There is no good way currently, so one has to play the cards one has been dealt. #InfoSec #CyberSecurity #Security #Leadership…
Honored and humbled to be quoted again in this master piece in CSO Online by Evan Schuman about the SEC legal actions and how CISOs and CSOs can prepare and defend themselves in light of these new risks of alleged liabilities. Thanks for sharing some of my advice with the C(I)SO community. This is a developing situation and will need to be tackled as such. There is no good way currently, so one has to play the cards one has been dealt. #InfoSec #CyberSecurity #Security #Leadership #ThoughtLeadership #LessonsLearned #CyberWar #CyberCrime #Lawsuits #CISO #CSO #CEO #CLO #CRO
-
Interviewee as CISO industry leader and subject matter expert
Computerworld
- 1 month
Science and Technology
I had the pleasure of being interviewed by Evan Schuman, for Computerworld, about an important issue that CISOs and CIOs face alike: overpromised and underdelivered vendor claims. Read it here:
"Forrester asks a forbidden question: Are vendors lying or do they believe their own hype?"
Link: https://www.computerworld.com/article/3707468/forrester-asks-a-forbidden-question-are-vendors-lying-or-do-they-believe-their-own-hype.html -
Interviewee as 8x CISO, board member and cybersecurity industry leader
Computerworld
- 1 month
Science and Technology
It was a great honor and pleasure being interviewed and quoted for this outstanding piece by Evan Schuman. This article summarizes the views from multiple CyberSecurity & InfoSec industry leaders and luminaries on the recent Microsoft Azure and O365 breach. Here is the direct link to the ComputerWorld article:
https://www.computerworld.com/article/3704132/has-microsoft-cut-security-corners-once-too-often.html -
Interviewee as CISO - Striking the balance between cybersecurity and operational efficiency
Help Net Security
- 1 month
Education
I had the pleasure to be interviewed and featured by HelpNetSecurity about the CISO role and how to strike the balance between cybersecurity and operational efficiency. The article provides key insights in the strategic and operational challenges a CISO will face and how to leverage tactical business opportunities to advance your long term security strategy. It further advises organizations how to build cybersecurity strategy from scratch and how to align their cybersecurity strategies with…
I had the pleasure to be interviewed and featured by HelpNetSecurity about the CISO role and how to strike the balance between cybersecurity and operational efficiency. The article provides key insights in the strategic and operational challenges a CISO will face and how to leverage tactical business opportunities to advance your long term security strategy. It further advises organizations how to build cybersecurity strategy from scratch and how to align their cybersecurity strategies with national and international cybersecurity frameworks and guidelines. And it refers to my newly published book "PREMIER CISO: BOARD & C_SUITE: RAISING THE BAR FOR CYBERSECURITY" so people can leverage that expert content as it will help them with these tasks and decisions in the future.
-
Expert Interviewee as industry leading global CISO and subject matter expert cybersecurity
7 Rules Cyber
- 1 month
Economic Empowerment
Dear C(I)SO and also greater InfoSec / Cybersecurity community,
I'd like to share this BRANDNEW podcast about the recent #SEC charges against the #CISO of #Solarwinds and what this means from the #CSO #CISO perspective and what the potential #ramifications and #impact this might have on the #Cybersecurity #Security #InfoSec #industry and #landscape. Chirag D Joshi and myself did this last Friday night (#Houston time) and hopefully this gives a good insight and guidance, and also leads the…Dear C(I)SO and also greater InfoSec / Cybersecurity community,
I'd like to share this BRANDNEW podcast about the recent #SEC charges against the #CISO of #Solarwinds and what this means from the #CSO #CISO perspective and what the potential #ramifications and #impact this might have on the #Cybersecurity #Security #InfoSec #industry and #landscape. Chirag D Joshi and myself did this last Friday night (#Houston time) and hopefully this gives a good insight and guidance, and also leads the Security Exchange Commission to adapt its recently changed new rules further as to include board cybersecurity expertise requirements, and, for the charges, to hold first and foremost those at the true top of the organization accountable.
#Leadership #ThoughtLeadership #LeadingbyExample #LeadingChange #SecurityIndustry #Legalcommunity #Legal #CEO #CRO #CLO #GC #CIO #CTO #CXO #CMO #CFO #compliance #riskmanagement #risk #riskandcompliance #riskreduction #riskculture #SecurityCulture #Culture
WATCH: https://www.youtube.com/watch?v=X2ZSkOY2xkE -
CISO Industry leader and cybersecurity expert panelist
National Motor Freight Traffic Association, Inc.
- 1 month
Education
It was a great honor and pleasure to speak at the NMFTA cybersecurity conference on the topic of cyber and API security and share some expertise with the audience; the event was a great success and below are some links of the media / press cover stories listed, as well as the slide deck.
-
Public Speaker / CISO Panelist
ISACA
- 1 month
Economic Empowerment
I was speaking at the ISACA GHC annual general meeting (AGM) and cybersecurity conference on 10/06/2023 in the cybertrack:
https://web.cvent.com/event/4ef5071f-a3ca-4b6c-af3d-80823600f883/websitePage:645d57e4-75eb-4769-b2c0-f201a0bfc6ce -
Quoted as subject matter expert on cybersecurity
The Cyberexpress by Cyble
- 1 month
Education
See below / self explanatory.
-
Industry expert / quoted subject matter expert
The Cyberexpress
- 1 month
Economic Empowerment
I was asked and interviewed by The Cyberexpress publication to share some of my insights about cybersecurity and its standing in the industry for the security awareness month of October 2023.
Please read it here in this link: https://thecyberexpress.com/importance-of-ceo-cybersecurity/ -
Speaker, CISO panelist, multi-book author and global industry thought leader
Elevate-IT
- 1 month
Education
It was my great honor and pleasure to serve at the Houston Technology Summit 09/21/2023 in multiple capacities - as book author I did a signing event and as panelist I shared some of my expertise with the audience, for example on how to build, retain, and develop cyber security talent and how to develop and execute your security strategy, roadmap, and how to protect an organization from current and future threats (see more details on both…
It was my great honor and pleasure to serve at the Houston Technology Summit 09/21/2023 in multiple capacities - as book author I did a signing event and as panelist I shared some of my expertise with the audience, for example on how to build, retain, and develop cyber security talent and how to develop and execute your security strategy, roadmap, and how to protect an organization from current and future threats (see more details on both below).
https://eitevents.com/houston_events/ciso-book-signing/ - gives you more details.
https://eitevents.com/houston_events/ciso-roundtable-strategies-for-future-proofing-your-security-team/
Following Introductions, this CISO led panel will briefly discuss the challenges brought about involving the hybrid workforce due to the covid pandemic. Then Panelists will transition into the following current & future-looking topics:
The Importance of Adopting a Prevention First Approach
Strategies for Securing the Software Supply Chain (both internally and with focus on your customers & suppliers)
Simplifying Security Processes for Long-Term Sustainability
Disrupting Disinformation & Social Engineering Campaigns
Mitigating Risk from 3rd Party Vulnerabilities
Preparing for a Compromise of a Cloud Services Provider
Hiring and Retaining Top Talent
Adopting and combating AI/ChatGPT -
Interviewee as Global Security Industry Leader - Global Cyber Security Leadership
7 Rules Cyber
- 1 month
Education
I had the honor being interviewed by Girac D Joshi for his podcast Art of Cyber Security about security leadership (and how to become one); Global CISO learnings on strategy and tactics (as described in my books); some practical examples on team building and mentoring your teams; building and transforming the security culture of an organization or enterprise; risks and benefits of AI in security; and the current and evolving regulatory landscape for CISOs. You can watch the video here (link):…
I had the honor being interviewed by Girac D Joshi for his podcast Art of Cyber Security about security leadership (and how to become one); Global CISO learnings on strategy and tactics (as described in my books); some practical examples on team building and mentoring your teams; building and transforming the security culture of an organization or enterprise; risks and benefits of AI in security; and the current and evolving regulatory landscape for CISOs. You can watch the video here (link): https://youtu.be/F3ljNTgg9fY
-
Guest Speaker / Industry Leader / CISO / CSO / CIO / CTO
CIO Professional Network®
- 1 month
Education
Great pleasure and honor to speak and present to the CIO community at CIO Professional Network about the subject "Succeeding in InfoSec and CyberSecurity" - the session was well attended by CIOs and other tech leaders and really great interaction / both during the session and Q&A.
https://www.linkedin.com/posts/mymso_cios-infosec-cybersec-activity-7055238200449007616-iRYm/ -
CISO CIO CSO CTO panelist at ISACA's GHC Career Path Webinar 04/11/2023
ISACA
- 1 month
Education
It was my great pleasure serving as CISO panelist and #CSO #CISO #CIO #CTO #expert at yesterday's @ISACA #ISACA #GreaterHoustonChapter #GHC Tuesday #webinar to give #career #advice and #careerguidance from my 8 times #CISO #perspective. #CyberSecurity #Careerpaths. Slide deck is here: https://custom.cvent.com/A77CC2AEB9C44E4AA8FD5414658DC55B/files/d7faaec8401a4d8b9f4fcefca9b7b337.pdf
-
CISO Forum: How to Prepare your Organization for the Future Moderator: Michael Oberlaender, CISO & Board Member - ISACA Greater Houston Chapter
Texas Technology Summit
- 1 month
Education
It was a great pleasure and discussion when I chaired the CISO roundtable at the Texas Technology Summit - we had a great group of CISO participants from different industries, public sector, and other leaders to focus on the subject how to prepare the organizations for the future... chat bots, nation state threat actors, crime groups, how to influence the board and funding, how to create a security culture, and what steps to take to prepare the work force. Hint: it's not only awareness, but…
It was a great pleasure and discussion when I chaired the CISO roundtable at the Texas Technology Summit - we had a great group of CISO participants from different industries, public sector, and other leaders to focus on the subject how to prepare the organizations for the future... chat bots, nation state threat actors, crime groups, how to influence the board and funding, how to create a security culture, and what steps to take to prepare the work force. Hint: it's not only awareness, but also continued education, training, and more.
-
Author and Host / Industry Leader for the webinar "PCIP - Putting Certifications Into Perspective"
ISACA
- 1 month
Education
I thoroughly enjoyed authoring and presenting my new session "PCIP - Putting Certifications Into Perspective" at the ISACA Greater Houston Chapter webinar on 03/28/2023. More than 150 participants joined my talk and we had an interactive discussion as well as know-how and experience sharing to educate other people in the security, privacy, audit, risk, and compliance space. I explained how to prepare for a long term strategic career, which steps to take and what to focus on, including, but…
I thoroughly enjoyed authoring and presenting my new session "PCIP - Putting Certifications Into Perspective" at the ISACA Greater Houston Chapter webinar on 03/28/2023. More than 150 participants joined my talk and we had an interactive discussion as well as know-how and experience sharing to educate other people in the security, privacy, audit, risk, and compliance space. I explained how to prepare for a long term strategic career, which steps to take and what to focus on, including, but not limited to, certifications, trainings, new projects, and how to build trust and a great story. I walked through several of the leading training and certification bodies and compared them to each other, putting things into perspective.
-
Industry thought leader and interviewee on "What is SecDevOps - And do you need it in your organization?"
IT Companies Network
- 1 month
Education
It was a great pleasure and honor being interviewed as global industry leader and 8-times CISO CSO by Joseph Harisson on the SecDevOps blog about this very important topic for the security and software industry as a whole: a new paradigm to improve the SDLC by integrating InfoSec and CyberSecurity into the new SSDLC (Secure-SDLC) and addressing the problem by shiftleft to do it better, faster, and cheaper (!). You can read it here: https://itcompanies.net/blog/what-is-secdevops - enjoy!
-
Industry thought leader, CISO panelist, and book author
Data Connectors Cybersecurity Community
- 1 month
Education
It was a great pleasure and honor speaking and sharing some of my expertise at the CISO panel (Cyber Executive Roundtable) and also do a book signing of my latest book while at the Data Connectors Conference in Houston, January 26th, 2023: https://dataconnectors.com/speakers/michael-oberlaender/
-
Moderator CISO Panel
Houston Technology Summit
- 1 month
Education
As global industry leader in the cybersecurity space and longtime CISO it was my pleasure moderating the CISO panel with the subject "Creating a Culture of Organizational Resilience". Guiding the discussion on all aspects from culture change, BCP & DR, BIA, BPA, board communication, risk appetite / tolerance, cyberinsurance, governance, organizational change management, over lessons learned in IR, red team, blue team, purple team exercises, EDR, XDR, EPP, VPN, MFA, up to defense-in-depth…
As global industry leader in the cybersecurity space and longtime CISO it was my pleasure moderating the CISO panel with the subject "Creating a Culture of Organizational Resilience". Guiding the discussion on all aspects from culture change, BCP & DR, BIA, BPA, board communication, risk appetite / tolerance, cyberinsurance, governance, organizational change management, over lessons learned in IR, red team, blue team, purple team exercises, EDR, XDR, EPP, VPN, MFA, up to defense-in-depth, security/resiliency-by-design, and cloud adoption we covered a lot during that hour. The room was packed / overcrowded and I made sure everything was delivered precisely on time and focused on the topic (imagine, with 5 leading CISOs on a podium...). After the session I also did a book signing - we had a lot of fun together! Here is the video recording of the session: https://www.youtube.com/watch?v=8_VGldqR-Tg
-
Cyber Executive Roundtable Panelist
Data Connectors Cybersecurity Community
- 1 month
Education
It was an honor to serve as panelist on the Cyber Executive Roundtable at the Data Connectors CyberSecurity Conference in Houston on April 27th, 2022. Providing my subject matter expertise and thought leadership to serve the global cyber security community. Sharing some success stories and how to prevent the data breaches or to reduce their impact.
-
Video Interviewee by ISMG as CISO for LogMeIn during RSA Conference 2021
Information Security Media Group (ISMG)
- 1 month
Science and Technology
I had the pleasure to chat with Anna Delaney on authentication challenges and how to overcome them, sharing some insights on password handling, and what the future might entail.
Here is the link to the interview:
https://www.bankinfosecurity.com/authentication-methods-to-support-permanent-remote-workforce-a-16604 -
Radio Interviewee - Global CISO - Global Leader - Book Author - Industry Expert
VoiceAmerica
- 1 month
Education
Listen in to my radio interview on the VoiceAmerica network and TF7 Radio with host George Rettas about "What is the Current State of Cyber Security" and my newly published book - https://www.voiceamerica.com/episode/123636/task-force-7-ep135-monday-may-18th-2020
-
Interviewee by Editor-in-Chief as leading Industry CISO and Book Author
Security Magazine
- 2 months
Education
Security Magazine's Editor-in-Chief, Maggie Shein, has interviewed me and reviewed my book to share with her readers. It's covered in the "Security Talk" as first article, right where the actual content starts, under the heading: "Step-by-step strategy for the CISO". It went live on January 6, 2021. Link: "https://www.securitymagazine.com/articles/94308-step-by-step-strategy-for-the-ciso"
-
Speaker
ISACA Greater Houston Chapter
- 1 month
Education
https://bit.ly/3jBJ3Zr
This session introduces and discusses some of the concepts of Michael’s new book and exemplary shares some details about the content... Focused topics will include:
· Current trends and observations in data breaches (DBIR with trends);
· International perspective – GDPR focus, explaining core concepts with a European view on privacy;
· Data security and risk governance (ISMS, IS governance board, policy process);
· Example of the core security processes…https://bit.ly/3jBJ3Zr
This session introduces and discusses some of the concepts of Michael’s new book and exemplary shares some details about the content... Focused topics will include:
· Current trends and observations in data breaches (DBIR with trends);
· International perspective – GDPR focus, explaining core concepts with a European view on privacy;
· Data security and risk governance (ISMS, IS governance board, policy process);
· Example of the core security processes (incl. Strategy / Program development, Vulnerability Management, Threat intelligence, and Patching);
· Q&A. -
Podcast guest "Avoiding a False Sense of Cybersecurity with Michael Oberlaender, CISO at LogMeIn, and Wayne Sadin, Board IT Advisor at Via Group Partners"
Spotify
- 1 month
Education
https://open.spotify.com/episode/2eliJZbNrQtfF9c72dyZzn?si=87d548cf18cd4cb3&nd=1
-
Security Industry Leader / Book Author / CISO - Privacy Podcast Interviewee
Privacy Please Podcast
- 1 month
Education
https://www.iheart.com/podcast/269-privacy-please-68515822/episode/ep-37-michael-oberlaender-72078285/
In this podcast that is hosted by Cam and Gabe from the Privacy Please Podcast we talk about being at the security helm of an organization, what characteristics are important, what things to do and which treats to develop. We're also covering some things from my book such as the back story on GDPR and privacy laws in Europe, why these came up and what is important. Lots of fun and also…https://www.iheart.com/podcast/269-privacy-please-68515822/episode/ep-37-michael-oberlaender-72078285/
In this podcast that is hosted by Cam and Gabe from the Privacy Please Podcast we talk about being at the security helm of an organization, what characteristics are important, what things to do and which treats to develop. We're also covering some things from my book such as the back story on GDPR and privacy laws in Europe, why these came up and what is important. Lots of fun and also sharing some insights what makes a great CISO and how to spend $100 wisely. Enjoy! -
Interviewee as highly accomplished Global CISO
ComplianceOnline
- 1 month
Economic Empowerment
https://www.complianceonline.com/resources/interview-with-michael-oberlaender-practical-lessons-for-cisos.html
ComplianceOnline has interviewed me about my career, some of my advice on how to follow in my foot steps, and what core security controls should be addressed by every CISO. -
Contributing Author / interviewee
Security Magazine
- 1 month
Science and Technology
https://www.securitymagazine.com/articles/91653-the-changing-role-of-the-ciso
-
Advisory Board
Elevate IT Houston Conference
- Present 5 years
Science and Technology
Helping with selection of speakers, vendors, agenda etc.
-
CISO Panelist at the 5th Annual ISACA Houston Cybersecurity Conference - Session VI
ISACA
- Present 6 years 1 month
Served on the panel about Privacy and Security as CISO and GDPR privacy expert. Explaining the impact and entanglement between GDPR and other regulations with security and how to solve common misconceptions.
-
Executive Panelist for the ISE Information Security Executive Deep Dive Panel
T.E.N.
- Present 6 years 8 months
An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.
Details: http://www.ten-inc.com/ise/central/schedule.asp -> Wednesday, May 16, 2018 -
CISO Panelist at T.E.N. & ISE Sales and Marketing Breakfast during RSA conference 2018
T.E.N.
- Present 6 years 9 months
Economic Empowerment
Served on a CISO panel to advise sales and marketing leaders how to approach (and later sell) to the C(I)SO - see photos: https://www.flickr.com/photos/iseprograms/41500329432/in/album-72157694008181751/
-
CSO / CISO panelist
Texas Tech Summit 2018
- Present 6 years 11 months
Science and Technology
CSO / CISO Expert Panelist on the subject of security, privacy, compliance, regulation (GDPR), and how we tie it all together in today's hyper connected world.
http://texas.technologysummit.net/ - see session 3:00 pm - 4:00 pm (Main Stage)
http://texas.technologysummit.net/Speaker/Michael_Oberlaender.html -
2016-2024 Governing Body Member
Texas Technology Summit - Machaon Corporation
- 8 years
Science and Technology
Supporting the Texas Technology Summit again to foster innovation, security leadership and local business.
-
2011-2024 Advisory Council
SecureWorld Expo
- 14 years
Economic Empowerment
Selected on the executive advisory council again for SecureWorldExpo:
http://www.secureworldexpo.com/houston/advisory-board -
CISO - Panelist
Texas Technology Summit - Machaon Corporation
- Present 8 years 11 months
Science and Technology
Panel Discussion: How Your IT Culture Affects Your Ability to Innovate
02/09/2016 -
Privacy & Safe Harbour Panelist
ISACA
- Present 9 years 1 month
Education
Safe Harbor Down, but Not Out? What is Next?
- Panel discussion at the ISACA Greater Houston chapter on 12/14/2015. -
CISO Panelist
Texas Technology Summit - Machaon Corporation
- Present 9 years 11 months
Education
Panel discussion: Communicating Information Security to the Board and Executive Management
02/11/2015 -
CSO Panelist
CIO Magazine
- Present 10 years 2 months
Education
CSO panel during the CIO Perspectives event in Houston
-
CISO Panelist
Sutherland Asbill & Brennan LLP
- Present 10 years 3 months
Education
Played key CISO role in “Managing A Cyber Attack" Sutherland Asbill & Brennan LLP panel.
-
CISO Panel Moderator
ISSA South Texas
- Present 10 years 4 months
Education
Moderated the CISO panel on the 09/11/2014
-
Speaker and Lecturer
ISACA
- Present 10 years 7 months
Education
Presented and lectured the ½-day seminar, 06/20/2014 in Houston, TX: "C(I)SO - And Now What".
-
Speaker / InfraGard track and CISO Panelist
SecureWorld Expo
- Present 11 years 8 months
Education
Some parts of my recent book "C(I)SO – And Now What? How to Successfully Build Security by Design" --> How to Build Security in an Organization.
-
Speaker
HouSecCon 4.0
- Present 11 years 3 months
Education
How to Build Security in an Organization
Publications
-
Striking the balance between cybersecurity and operational efficiency
Help Net Security
Help Net Security has interviewed me about cybersecurity strategy and balancing it with operational efficiency. This article was featured and published via Help Net Security.
-
PREMIER CISO - BOARD & C-SUITE: RAISING THE BAR FOR CYBERSECURITY
Michael S. Oberlaender
Having worked in cybersecurity for three decades, the author focuses his third book on the crucial topic that any PREMIER CISO must succeed in – the company board, C-suite level conversations, and how to address the important subject of cybersecurity in an audience appropriate manner, while still bringing across the necessary core content. The book starts with an overview of the status quo of the industry and then leads into the conversations a new CISO should have; in preparing for the role…
Having worked in cybersecurity for three decades, the author focuses his third book on the crucial topic that any PREMIER CISO must succeed in – the company board, C-suite level conversations, and how to address the important subject of cybersecurity in an audience appropriate manner, while still bringing across the necessary core content. The book starts with an overview of the status quo of the industry and then leads into the conversations a new CISO should have; in preparing for the role, in performing of the role, and after leaving the position. A short summary highlights the latest market research on compensation figures, before the author details the CISO success factors that prepare aspiring CISOs as best as possible.
PREMIER CISO also educates the reader on the all-too-common misperceptions, misconceptions, and misguidance in the industry before it provides a streamlined approach to company board composition, leadership setup, and the CISO food chain. The core communication partners and relevant key topics are addressed step by step alongside the respective focus areas. Recent regulatory SEC changes are introduced and commented on, the concepts of SecDevOps and Enterprise architecture are pursued, and topics regarding the board and potential questions thereof are raised.
This book serves as a sparring partner for the CISO to “discuss” with their inner voice the key decisions to make, before setting the standard for the rise of the CISO and transitioning into the latest topics of quantum security and artificial intelligence (AI) security. Written as a high-level navigator for all CISOs who like to sharpen their saw and for those aspiring to become that PREMIER CISO, a well-defined index and complete bibliography are provided to help the time-pressed CISO focus on the relevant topics. -
SEC SolarWinds Action and the Evolving Role of CISO
Art of Cyber Security / Youtube
I was again honored to be interviewed by Chirag Joshi in this podcast session on the SEC actions, this time about the ramifications and impact on the overall cybersecurity industry and CISO community in regards to the charges the Security and Exchange commission issued against the CISO of SolarWinds. This interview was taken remotely between Sydney, Australia (Chirag's location) and Houston, USA (Michael's location). We discuss items like the implications of the SEC Ruling on the global CISO…
I was again honored to be interviewed by Chirag Joshi in this podcast session on the SEC actions, this time about the ramifications and impact on the overall cybersecurity industry and CISO community in regards to the charges the Security and Exchange commission issued against the CISO of SolarWinds. This interview was taken remotely between Sydney, Australia (Chirag's location) and Houston, USA (Michael's location). We discuss items like the implications of the SEC Ruling on the global CISO community; the evolution of the CISO role, the potential liabilities and where the real accountability lies in organizations; Cyber Security in Corporate Governance and Executive Responsibilities; the elements of a defensible cyber posture programs accounting for materiality; the increasing regulatory expectation and scrutiny for cyber security practices; and the role of CyberSecurity culture and also the need for action to protect the whole critical infrastructure.
Other authorsSee publication -
Succeeding in InfoSec and CyberSecurity
Michael S. Oberlaender
Sharing my knowledge, know-how, and expertise of three decades in cybersecurity and technology in a session for the CIO Professional Network on 04/21/2023. I've leveraged some content of my most recent book, as well as some other self-developed material, and it was received quite well by the CIO audience. Recording and slides will be available upon request.
-
PCIP - Putting Certifications Into Perspective
Michael S. Oberlaender - security industry leader, book author, publisher, and former 8 times C(I)SO.
I have published my slides that I created and used for my seminar "PCIP - Putting Certifications Into Perspective" that I gave at the ISACA webinar on 03/28/23. Sharing from my 35 years of experiences, 25+ ys full time CyberSecurity with 8 times prior CISO and CSO roles across many different industry verticals. The slide deck is shared here for reference and the good cause of education, while I retain the full copyrights globally. The recording session link is available upon request (DM me).
-
GLOBAL CISO - STRATEGY, TACTICS, & LEADERSHIP: How to Succeed in InfoSec and CyberSecurity
Michael S. Oberlaender - ISBN: 979-8604917756
This book is written by a C(I)SO for C(I)SOs – and also addresses CEOs, CROs, CLOs, CIOs, CTOs, Security Managers, Privacy Leaders, Lawyers, and even Marketing and Sales executives. It is written by a seven-time career CISO for other visionaries, leaders, strategists, architects, compliance and audit experts, those politically interested, as well as, revolutionaries, and students of IS, IT, and STEM subjects that want to step up their game in InfoSec and Cybersecurity. The book connects the…
This book is written by a C(I)SO for C(I)SOs – and also addresses CEOs, CROs, CLOs, CIOs, CTOs, Security Managers, Privacy Leaders, Lawyers, and even Marketing and Sales executives. It is written by a seven-time career CISO for other visionaries, leaders, strategists, architects, compliance and audit experts, those politically interested, as well as, revolutionaries, and students of IS, IT, and STEM subjects that want to step up their game in InfoSec and Cybersecurity. The book connects the dots about past data breaches and their misconceptions; provides an international perspective on privacy laws like GDPR and several others, about threat actors and threat vectors; introduces strategy and tactics for securing your organization; presents a first glimpse on leadership; explains security program planning and backup plans; examines team building; conceptualizes the governance board; explores budgets; cooperates with the PMO; divulges into tactics; further elaborates on leadership; establishes the reporting structure; illustrates risk assessments; elucidates security processes, principals, and architectural designs; enumerates security metrics; skims compliance; demonstrates attack surface reduction; explicates security intelligence; conceptualizes S-SDLC (SecDevOps); depicts security management; epitomizes global leadership; illustrates the cloud’s weaknesses; and finishes with an outlook on IoT. If you are in need of strong, proven, battle-tested security advice for a progressing security career, if you’re looking for the security wisdom of a global, experienced leader to make smart decisions, if you are an architect and want to know how to securely architect and design using guiding principles, design patterns, and controls, or even if you work in sales and want to understand how (not) to sell to the CISO – this is your almanac – and you will read and reference it many times. Michael S. Oberlaender is one of the best globally renowned security leaders. 9798604917756
-
Mastering Black Hat, DEF CON and Las Vegas over 10 Days (and Nights)
The State of Security
This is a summary of my recent BlackHat 20, DEFCON 25, and overall Las Vegas experience and gives insight into the issues the security industry is facing. Hopefully the conference organizers will take that advice to heart and change location as well as some setup for the future. Overall, the conferences and sessions were a blast and this is a great opportunity to share experience and exchange on any security related subject with peers and new comers.
-
A C(I)SO View on RSA 2017: “China Is Hiring in the US”
Tripwire's The State of Security
This article describes the most recent RSA conference with the eyes of the C(I)SO and points out some interesting observations about vendors, point products, the failing of the security industry overall, China's hiring efforts, and some personal impressions of the author, veteran in the IT and security realm for decades and himself a C(I)SO.
-
Privacy and Humanity Elements for the IoT / IoE
Tripwire's THE STATE OF SECURITY blog
This article closes the above "think tank" blog series about the IoT (Internet of Things) / IoE security requirements: Privacy, Non-Leverage Principle / No Dual-Use, Testing, Defaults and Human Override - and they should all become mandatory - including the ones that were mentioned in the other two articles before. If these requirements will be included in IoT / IoE designs from the beginning, we will have a much safer and human technology world.
-
Mandatory Security Design Considerations for the IoT / IoE
Tripwire's THE STATE OF SECURITY blog
This article continues the above "think tank" blog about the IoT (Internet of Things) / IoE security requirements - and they should all become mandatory: Secure System | Software Development Life Cycle, Access, Authentication, Authorization, Accounting, and Non-Repudiation all in addition to the above and the ones to follow soon in the next article (soon below).
-
IoT / IoE: If It Has an IP Address, It Can Be Hacked
Tripwire's THE STATE OF SECURITY blog
This article introduces some think tank approach to the next big wave of risk to come (y)our way: the IoT (Internet of Things) or also called IoE (Internet of Everything). I describe and adapt a couple of already known infosec concept and add several new ones (in this and the following articles in this series - stay tuned!). Speaking it out loud now instead of waiting for the same mistakes to happen as we have seen over the past decades.
-
Why Info-Security Hinges on Physical Security
Security Magazine
In this article I offer practical advice how to address (physical) security and integrate it with the other pieces like InfoSec, people, process etc. - we have to change the way we do things: Security has to become a design-goal. This article was published with the Security Magazine online and also via their eNewsletter.
-
Why physical security (and InfoSec!) still matter
CSO Online
In this day and age where everything is connected, it's easy to forget that protecting devices themselves is just as important as InfoSec. This article focuses on the important combination of both physical and logical (infosec) security. I describe a couple of observations and situations I've been in and give advice to make security a design-goal for everything that is build, developed, engineered, or designed.
-
Why Physical Security Still Matters (And Infosec, Too!)
Tripwire's The State Of Security
You'll realize at some point in your life as security pro that there is always the "other" side of controls you haven't thought about. This article focuses on the important combination of both physical and logical (infosec) security. I describe a couple of observations and situations I've been in and give advice to make security a design-goal for everything that is build, developed, engineered, or designed.
-
Challenging the Current State of Security
Tripwire's THE STATE OF SECURITY blog
In this article I describe a couple of pain points the security industry is facing to set the ground that we need to change the current approach, and then explain a proven way how to solve the problems strategically and to overcome the current global information security crisis.
-
Security should no longer be 'cementing' the status quo
CSO online
In this new article I describe how to re-think our security approaches and to challenge the status quo. It is important to get the big picture view to see the common misconceptions and often times ill-designed security solutions (bolted on) instead of common-sense and practical improvements that are well-thought through and build for persistence. I also cover the important privacy aspects and why things are broken currently.
-
Safety first, business second, security none?
Cisco Security Blog
This blog post focuses on the context of security vs safety vs business and addresses important steps to take when securing SCADA and related areas in PCN or industrial networks.
-
Beyond Products and Services: Conversations that Should Have Already Happened
Tripwire's blog "THE STATE OF SECURITY"
Guest blog entry as subject matter expert. - This article talks about the predominant issue that C(I)SO's today are facing dealing with sales folks from vendors, and shows proven approaches how to do this right - and it also covers a couple of thought leader ideas what the latest NSA revelations will probably make necessary that customers should ask their vendors. Enjoy and feedback welcome as always!
-
Why the Security Stack Has Ten Layers, Not Seven
Tripwire's blog "THE STATE OF SECURITY"
Guest blog entry as subject matter expert.
-
How to secure a company's Chinese development, part two
CSO Online - Security Leadership series - In Depth
In the second part of this two-part series, we examine risk counter measures for an organization planning on doing part of its software development in China
-
How to secure a company's Chinese development center?
(IN)SECURE magazine - Issue #39
Suppose you have a company - let’s call it WorldSoft - that is planning to do a big
part of its software development in China. A fairly new and growing economy, access
to inexpensive but highly educated development resources from local
universities, one of the most important future Asian markets and similar
motivations might be the reasons for that. Given the multiple and complex challenges,
how would it be possible to secure that from a corporate perspective? This articles…Suppose you have a company - let’s call it WorldSoft - that is planning to do a big
part of its software development in China. A fairly new and growing economy, access
to inexpensive but highly educated development resources from local
universities, one of the most important future Asian markets and similar
motivations might be the reasons for that. Given the multiple and complex challenges,
how would it be possible to secure that from a corporate perspective? This articles gives the answer to this question - in a very concise and strategic fashion. Enjoy! -
How to secure a company's Chinese development, part one
CSO Online - Security Leadership series - In Depth
In this two-part series, we examine the threats and necessary counter-measures for a company that's planning to develop software in China
-
Build Your Security Program with Strong Architecture
Information Security Magazine, Vol. 50, No. 9, pages 117-118
This article addresses the important aspect of security architecture and how it integrates with the various other facets like policy, people, and process.
-
Book excerpt: 'C(I)SO: And Now What?'
CSO Online magazine
This article is talking about the important piece of security strategy development and what kind of logical sequence and overall arrangements have to be addressed to make the security strategy a success. It also explains the 10 layers of the "security stack" and that one must address each layer accordingly (defense in depth) - including people, process, technology, and money. It is an excerpt of one of the chapters of my new book (see above).
-
Security needs to be handled at the top
(IN)SECURE Magazine
This article focuses on the security policy subject and how to split the typically complex structure of documents into a working and consistent 3-tier pyramid of policy, standards, and procedures. It's an excerpt of one chapter of my newly published book (see above) and shall help to educate the C-level about the typical errors and omissions.
-
C(I)SO - And Now What?
Michael S. Oberlaender
Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and look for guidance, or you are considering yourself an expert and just wish to verify that you haven't forgotten anything - this book will help you to tackle the subject right - by building "security by design". The content covers your initial phases in the job such as setting expectations, base lining, gap analysis, capabilities building, and org…
Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and look for guidance, or you are considering yourself an expert and just wish to verify that you haven't forgotten anything - this book will help you to tackle the subject right - by building "security by design". The content covers your initial phases in the job such as setting expectations, base lining, gap analysis, capabilities building, and org chart variances. It then leads you to define security architecture, addressing a secure development process, application security and also security policy levels. Further items such as awareness programs, asset management, teaming up with audit, risk management, and finally the strategy development are covered. Then we dive into ROIs, trust relationships, KPIs, incident response, forensics, before we run into crises management by looking at some specific examples of personal experience of the author - himself a C(I)SO for many years.
The book is ending by providing advice how to deal with other executive management, and what kind of education, certifications, and networking you need to focus on. If you consistently apply the content and advice provided in this book, you should be all set to succeed in your role as C(I)SO.
ISBN-13: 978-1480237414 -
A New Approach to Data Centric Security
InfoSec Island
A full deep dive into the data classification subject. This is another online copy of the original article published with (In)Secure magazine (see below).
-
Data classification: A new approach to data centric security
(In)Secure Magazine
This is the published article about the data classification and the newly introduced "Oberlaender Cube (C3)".
-
The Magic Triangle of IT Security
CSO Online
Explains the paradoxon in the security realm between the opposite parameters of cost reductions, increased functionality and improved security. Provides insight into the CIA triad and the importance of weighing those parameters.
Honors & Awards
-
Distinguished Member Of the 2013 InfraGard Members Alliance
Federal Bureau of Investigation (FBI)
Languages
-
Spanish
Elementary proficiency
-
French
Limited working proficiency
-
German
Native or bilingual proficiency
-
English
Native or bilingual proficiency
-
Business Language
Native or bilingual proficiency
-
Security expert talk
Native or bilingual proficiency
-
Risk Management language
Native or bilingual proficiency
Organizations
-
SANS Institute
Active member in good standing
- Present -
(ISC)²
Active member in good standing
-
InfraGard / FBI
Active and contributing member
Michael presented during the InfraGard track at the SecureWorld Expo in May 2013
-
ISACA
Active and contributing member
Michael presented a full ½ day seminar about his book content in June 2014.
-
ISSA
Active and contributing member
Michael moderated the ISSA CISO panel on 09/11/2014.
Recommendations received
-
LinkedIn User
143 people have recommended Michael S.
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreAdd new skills with these courses
-
29m
OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures
-
5h 25m
Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
-
3h 40m
Certified Information Security Manager (CISM) Cert Prep (2022): 2 Information Security Risk Management