Michael S. Oberlaender - PREMIER CISO

Michael S. Oberlaender - PREMIER CISO

Greater Houston
17K followers 500+ connections

About

Michael S. Oberlaender is a visionary, global industry leader who has built his…

Services

Articles by Michael S.

Activity

Experience

  • Author - Michael S. Oberlaender Graphic
  • -

    Global

  • -

    United States

  • -

    Houston, Texas, United States

  • -

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Global

  • -

    Germany

Education

  • Heidelberg University Graphic

    Ruprecht-Karls-Universität Heidelberg

    -

    Activities and Societies: Heidelberg is an Ivy League "Elite" university in Germany's excellence initiative. I studied and specialized in environmental physics, parallel- and vector computers.

    Completely self-funded education by entertaining another job in parallel (see above: Treubau LLC)

  • -

    Activities and Societies: hold lectures about informatics (computer science) for other (younger) pupils, elected as course speaker

Licenses & Certifications

Volunteer Experience

  • The Wall Street Journal Graphic

    Interviewee as experienced (8x) CISO and SME on the materiality decision / reporting requirements by the SEC

    The Wall Street Journal

    - 1 month

    Economic Empowerment

    It's a great pleasure and honor to be again quoted in the The Wall Street Journal (WSJ) as experienced CISO and subject matter expert about the U.S. Securities and Exchange Commission (SEC)'s materiality handling and communication of last week - #CyberSecurity #InformationSecurity #InfoSec #CyberSec #Security #Regulation #Materiality #Board #BoD #BoardofDirectors #Communication #SpeakTruthToPower #Integrity #Transparency #Executive #Leadership #LeadershipByExample
    Link to the…

    It's a great pleasure and honor to be again quoted in the The Wall Street Journal (WSJ) as experienced CISO and subject matter expert about the U.S. Securities and Exchange Commission (SEC)'s materiality handling and communication of last week - #CyberSecurity #InformationSecurity #InfoSec #CyberSec #Security #Regulation #Materiality #Board #BoD #BoardofDirectors #Communication #SpeakTruthToPower #Integrity #Transparency #Executive #Leadership #LeadershipByExample
    Link to the interview:
    https://www.wsj.com/articles/materiality-definition-seen-as-tough-task-in-new-sec-cyber-rules-314b4626

  • The Wall Street Journal Graphic

    Interviewee as experienced CISO (8x) and industry leader on the SEC cybersecurity ruling

    The Wall Street Journal

    - 1 month

    Economic Empowerment

    I'm honored to be quoted by the The Wall Street Journal as experienced CISO and industry leader and cybersecurity expert about the Security Exchange Commission's decision about the new cybersecurity rules becoming effective as of December 2023. Here is the link to the article:
    https://www.wsj.com/articles/cyber-experience-on-boards-still-seen-as-critical-in-new-sec-rules-937702bd

  • Data Connectors Cybersecurity Community Graphic

    8xCISO & Security Industry Leader / Public Speaker and Moderator of the CISO panel

    Data Connectors Cybersecurity Community

    - 1 month

    Education

    It was a great #honor and true #pleasure to #moderate this fantastic #Executive #CISO #panel at the Data Connectors Cybersecurity Community #Houston 2024 #conference! We had a lot of fun - it's visible throughout the shared images. Thanks to all our attendees, and thanks to Dawn Morrissey for organizing the conference, and thanks to my panelists Doug Jaworski Jon Garza, CISSP, MSM James Morrison, FBI Cyber (Ret), CISSP, MBA, Veteran for sharing their #insights and answering all my #questions…

    It was a great #honor and true #pleasure to #moderate this fantastic #Executive #CISO #panel at the Data Connectors Cybersecurity Community #Houston 2024 #conference! We had a lot of fun - it's visible throughout the shared images. Thanks to all our attendees, and thanks to Dawn Morrissey for organizing the conference, and thanks to my panelists Doug Jaworski Jon Garza, CISSP, MSM James Morrison, FBI Cyber (Ret), CISSP, MBA, Veteran for sharing their #insights and answering all my #questions. We covered a lot - and I steered the ship (the German Physicist 😎 in me) to perform precisely and exactly on time. Thank y'all!
    Thanks also for all coming by my booth to get signed #copies of my latest #books! Such a great fun #event!

  • ElevateIT: Technology Summits Graphic

    KEYNOTE speaker and Global Cybersecurity Industry Leader

    ElevateIT: Technology Summits

    - 1 month

    Education

    Served as KEYNOTE speaker and Global Cybersecurity Industry Leader

  • ElevateIT: Technology Summits Graphic

    CISO Panelist (as former 8x CISO) and Global Cybersecurity Industry Leader

    ElevateIT: Technology Summits

    - 1 month

    Education

    You can watch the recorded session here: https://youtu.be/hkM-UBwUPp4

  • CSO Online Graphic

    Industryleader / Cybersecurity Executive / 8x former CISO / Interviewee

    CSO Online

    - 1 month

    Human Rights

    It's a great honor to be quoted as 8x CISO, industry leader, and subject matter expert on cybersecurity by the great Evan Schuman for CSO Online. In this new article about the FCC settlement with T-Mobile on their triple data breaches we cover topics from regulators imposing minimal fines versus those in the EU, the minimum approach for cybersecurity in the US (just doing the basics like MFA and ZTNA, Asset inventories, etc.) and the failing security grade that leads to these hacks / data…

    It's a great honor to be quoted as 8x CISO, industry leader, and subject matter expert on cybersecurity by the great Evan Schuman for CSO Online. In this new article about the FCC settlement with T-Mobile on their triple data breaches we cover topics from regulators imposing minimal fines versus those in the EU, the minimum approach for cybersecurity in the US (just doing the basics like MFA and ZTNA, Asset inventories, etc.) and the failing security grade that leads to these hacks / data breaches. My new book (PREMIER CISO - BOARD & C-SUITE: RAISING THE BAR FOR CYBERSECURITY) is also mentioned and referenced! It's an honor to have been quoted again.

  • CSO Online Graphic

    Expert Interviewee as industry leading CISO and subject matter expert on security

    CSO Online

    - 1 month

    Economic Empowerment

    Honored and humbled to be quoted again in this master piece in CSO Online by Evan Schuman about the SEC legal actions and how CISOs and CSOs can prepare and defend themselves in light of these new risks of alleged liabilities. Thanks for sharing some of my advice with the C(I)SO community. This is a developing situation and will need to be tackled as such. There is no good way currently, so one has to play the cards one has been dealt. #InfoSec #CyberSecurity #Security #Leadership…

    Honored and humbled to be quoted again in this master piece in CSO Online by Evan Schuman about the SEC legal actions and how CISOs and CSOs can prepare and defend themselves in light of these new risks of alleged liabilities. Thanks for sharing some of my advice with the C(I)SO community. This is a developing situation and will need to be tackled as such. There is no good way currently, so one has to play the cards one has been dealt. #InfoSec #CyberSecurity #Security #Leadership #ThoughtLeadership #LessonsLearned #CyberWar #CyberCrime #Lawsuits #CISO #CSO #CEO #CLO #CRO

  • Computerworld Graphic

    Interviewee as CISO industry leader and subject matter expert

    Computerworld

    - 1 month

    Science and Technology

    I had the pleasure of being interviewed by Evan Schuman, for Computerworld, about an important issue that CISOs and CIOs face alike: overpromised and underdelivered vendor claims. Read it here:
    "Forrester asks a forbidden question: Are vendors lying or do they believe their own hype?"
    Link: https://www.computerworld.com/article/3707468/forrester-asks-a-forbidden-question-are-vendors-lying-or-do-they-believe-their-own-hype.html

  • Computerworld Graphic

    Interviewee as 8x CISO, board member and cybersecurity industry leader

    Computerworld

    - 1 month

    Science and Technology

    It was a great honor and pleasure being interviewed and quoted for this outstanding piece by Evan Schuman. This article summarizes the views from multiple CyberSecurity & InfoSec industry leaders and luminaries on the recent Microsoft Azure and O365 breach. Here is the direct link to the ComputerWorld article:
    https://www.computerworld.com/article/3704132/has-microsoft-cut-security-corners-once-too-often.html

  • Help Net Security Graphic

    Interviewee as CISO - Striking the balance between cybersecurity and operational efficiency

    Help Net Security

    - 1 month

    Education

    I had the pleasure to be interviewed and featured by HelpNetSecurity about the CISO role and how to strike the balance between cybersecurity and operational efficiency. The article provides key insights in the strategic and operational challenges a CISO will face and how to leverage tactical business opportunities to advance your long term security strategy. It further advises organizations how to build cybersecurity strategy from scratch and how to align their cybersecurity strategies with…

    I had the pleasure to be interviewed and featured by HelpNetSecurity about the CISO role and how to strike the balance between cybersecurity and operational efficiency. The article provides key insights in the strategic and operational challenges a CISO will face and how to leverage tactical business opportunities to advance your long term security strategy. It further advises organizations how to build cybersecurity strategy from scratch and how to align their cybersecurity strategies with national and international cybersecurity frameworks and guidelines. And it refers to my newly published book "PREMIER CISO: BOARD & C_SUITE: RAISING THE BAR FOR CYBERSECURITY" so people can leverage that expert content as it will help them with these tasks and decisions in the future.

  • 7 Rules Cyber Graphic

    Expert Interviewee as industry leading global CISO and subject matter expert cybersecurity

    7 Rules Cyber

    - 1 month

    Economic Empowerment

    Dear C(I)SO and also greater InfoSec / Cybersecurity community,
    I'd like to share this BRANDNEW podcast about the recent #SEC charges against the #CISO of #Solarwinds and what this means from the #CSO #CISO perspective and what the potential #ramifications and #impact this might have on the #Cybersecurity #Security #InfoSec #industry and #landscape. Chirag D Joshi and myself did this last Friday night (#Houston time) and hopefully this gives a good insight and guidance, and also leads the…

    Dear C(I)SO and also greater InfoSec / Cybersecurity community,
    I'd like to share this BRANDNEW podcast about the recent #SEC charges against the #CISO of #Solarwinds and what this means from the #CSO #CISO perspective and what the potential #ramifications and #impact this might have on the #Cybersecurity #Security #InfoSec #industry and #landscape. Chirag D Joshi and myself did this last Friday night (#Houston time) and hopefully this gives a good insight and guidance, and also leads the Security Exchange Commission to adapt its recently changed new rules further as to include board cybersecurity expertise requirements, and, for the charges, to hold first and foremost those at the true top of the organization accountable.
    #Leadership #ThoughtLeadership #LeadingbyExample #LeadingChange #SecurityIndustry #Legalcommunity #Legal #CEO #CRO #CLO #GC #CIO #CTO #CXO #CMO #CFO #compliance #riskmanagement #risk #riskandcompliance #riskreduction #riskculture #SecurityCulture #Culture
    WATCH: https://www.youtube.com/watch?v=X2ZSkOY2xkE

  • National Motor Freight Traffic Association, Inc. Graphic

    CISO Industry leader and cybersecurity expert panelist

    National Motor Freight Traffic Association, Inc.

    - 1 month

    Education

    It was a great honor and pleasure to speak at the NMFTA cybersecurity conference on the topic of cyber and API security and share some expertise with the audience; the event was a great success and below are some links of the media / press cover stories listed, as well as the slide deck.

  • ISACA Graphic

    Public Speaker / CISO Panelist

    ISACA

    - 1 month

    Economic Empowerment

    I was speaking at the ISACA GHC annual general meeting (AGM) and cybersecurity conference on 10/06/2023 in the cybertrack:
    https://web.cvent.com/event/4ef5071f-a3ca-4b6c-af3d-80823600f883/websitePage:645d57e4-75eb-4769-b2c0-f201a0bfc6ce

  • Quoted as subject matter expert on cybersecurity

    The Cyberexpress by Cyble

    - 1 month

    Education

    See below / self explanatory.

  • Industry expert / quoted subject matter expert

    The Cyberexpress

    - 1 month

    Economic Empowerment

    I was asked and interviewed by The Cyberexpress publication to share some of my insights about cybersecurity and its standing in the industry for the security awareness month of October 2023.
    Please read it here in this link: https://thecyberexpress.com/importance-of-ceo-cybersecurity/

  • Elevate-IT Graphic

    Speaker, CISO panelist, multi-book author and global industry thought leader

    Elevate-IT

    - 1 month

    Education

    It was my great honor and pleasure to serve at the Houston Technology Summit 09/21/2023 in multiple capacities - as book author I did a signing event and as panelist I shared some of my expertise with the audience, for example on how to build, retain, and develop cyber security talent and how to develop and execute your security strategy, roadmap, and how to protect an organization from current and future threats (see more details on both…

    It was my great honor and pleasure to serve at the Houston Technology Summit 09/21/2023 in multiple capacities - as book author I did a signing event and as panelist I shared some of my expertise with the audience, for example on how to build, retain, and develop cyber security talent and how to develop and execute your security strategy, roadmap, and how to protect an organization from current and future threats (see more details on both below).
    https://eitevents.com/houston_events/ciso-book-signing/ - gives you more details.
    https://eitevents.com/houston_events/ciso-roundtable-strategies-for-future-proofing-your-security-team/
    Following Introductions, this CISO led panel will briefly discuss the challenges brought about involving the hybrid workforce due to the covid pandemic. Then Panelists will transition into the following current & future-looking topics:
    The Importance of Adopting a Prevention First Approach
    Strategies for Securing the Software Supply Chain (both internally and with focus on your customers & suppliers)
    Simplifying Security Processes for Long-Term Sustainability
    Disrupting Disinformation & Social Engineering Campaigns
    Mitigating Risk from 3rd Party Vulnerabilities
    Preparing for a Compromise of a Cloud Services Provider
    Hiring and Retaining Top Talent
    Adopting and combating AI/ChatGPT

  • 7 Rules Cyber Graphic

    Interviewee as Global Security Industry Leader - Global Cyber Security Leadership

    7 Rules Cyber

    - 1 month

    Education

    I had the honor being interviewed by Girac D Joshi for his podcast Art of Cyber Security about security leadership (and how to become one); Global CISO learnings on strategy and tactics (as described in my books); some practical examples on team building and mentoring your teams; building and transforming the security culture of an organization or enterprise; risks and benefits of AI in security; and the current and evolving regulatory landscape for CISOs. You can watch the video here (link):…

    I had the honor being interviewed by Girac D Joshi for his podcast Art of Cyber Security about security leadership (and how to become one); Global CISO learnings on strategy and tactics (as described in my books); some practical examples on team building and mentoring your teams; building and transforming the security culture of an organization or enterprise; risks and benefits of AI in security; and the current and evolving regulatory landscape for CISOs. You can watch the video here (link): https://youtu.be/F3ljNTgg9fY

  • CIO Professional Network® Graphic

    Guest Speaker / Industry Leader / CISO / CSO / CIO / CTO

    CIO Professional Network®

    - 1 month

    Education

    Great pleasure and honor to speak and present to the CIO community at CIO Professional Network about the subject "Succeeding in InfoSec and CyberSecurity" - the session was well attended by CIOs and other tech leaders and really great interaction / both during the session and Q&A.
    https://www.linkedin.com/posts/mymso_cios-infosec-cybersec-activity-7055238200449007616-iRYm/

  • ISACA Graphic

    CISO CIO CSO CTO panelist at ISACA's GHC Career Path Webinar 04/11/2023

    ISACA

    - 1 month

    Education

    It was my great pleasure serving as CISO panelist and #CSO #CISO #CIO #CTO #expert at yesterday's @ISACA #ISACA #GreaterHoustonChapter #GHC Tuesday #webinar to give #career #advice and #careerguidance from my 8 times #CISO #perspective. #CyberSecurity #Careerpaths. Slide deck is here: https://custom.cvent.com/A77CC2AEB9C44E4AA8FD5414658DC55B/files/d7faaec8401a4d8b9f4fcefca9b7b337.pdf

  • CISO Forum: How to Prepare your Organization for the Future Moderator: Michael Oberlaender, CISO & Board Member - ISACA Greater Houston Chapter

    Texas Technology Summit

    - 1 month

    Education

    It was a great pleasure and discussion when I chaired the CISO roundtable at the Texas Technology Summit - we had a great group of CISO participants from different industries, public sector, and other leaders to focus on the subject how to prepare the organizations for the future... chat bots, nation state threat actors, crime groups, how to influence the board and funding, how to create a security culture, and what steps to take to prepare the work force. Hint: it's not only awareness, but…

    It was a great pleasure and discussion when I chaired the CISO roundtable at the Texas Technology Summit - we had a great group of CISO participants from different industries, public sector, and other leaders to focus on the subject how to prepare the organizations for the future... chat bots, nation state threat actors, crime groups, how to influence the board and funding, how to create a security culture, and what steps to take to prepare the work force. Hint: it's not only awareness, but also continued education, training, and more.

  • ISACA Graphic

    Author and Host / Industry Leader for the webinar "PCIP - Putting Certifications Into Perspective"

    ISACA

    - 1 month

    Education

    I thoroughly enjoyed authoring and presenting my new session "PCIP - Putting Certifications Into Perspective" at the ISACA Greater Houston Chapter webinar on 03/28/2023. More than 150 participants joined my talk and we had an interactive discussion as well as know-how and experience sharing to educate other people in the security, privacy, audit, risk, and compliance space. I explained how to prepare for a long term strategic career, which steps to take and what to focus on, including, but…

    I thoroughly enjoyed authoring and presenting my new session "PCIP - Putting Certifications Into Perspective" at the ISACA Greater Houston Chapter webinar on 03/28/2023. More than 150 participants joined my talk and we had an interactive discussion as well as know-how and experience sharing to educate other people in the security, privacy, audit, risk, and compliance space. I explained how to prepare for a long term strategic career, which steps to take and what to focus on, including, but not limited to, certifications, trainings, new projects, and how to build trust and a great story. I walked through several of the leading training and certification bodies and compared them to each other, putting things into perspective.

  • IT Companies Network Graphic

    Industry thought leader and interviewee on "What is SecDevOps - And do you need it in your organization?"

    IT Companies Network

    - 1 month

    Education

    It was a great pleasure and honor being interviewed as global industry leader and 8-times CISO CSO by Joseph Harisson on the SecDevOps blog about this very important topic for the security and software industry as a whole: a new paradigm to improve the SDLC by integrating InfoSec and CyberSecurity into the new SSDLC (Secure-SDLC) and addressing the problem by shiftleft to do it better, faster, and cheaper (!). You can read it here: https://itcompanies.net/blog/what-is-secdevops - enjoy!

  • Data Connectors Cybersecurity Community Graphic

    Industry thought leader, CISO panelist, and book author

    Data Connectors Cybersecurity Community

    - 1 month

    Education

    It was a great pleasure and honor speaking and sharing some of my expertise at the CISO panel (Cyber Executive Roundtable) and also do a book signing of my latest book while at the Data Connectors Conference in Houston, January 26th, 2023: https://dataconnectors.com/speakers/michael-oberlaender/

  • Moderator CISO Panel

    Houston Technology Summit

    - 1 month

    Education

    As global industry leader in the cybersecurity space and longtime CISO it was my pleasure moderating the CISO panel with the subject "Creating a Culture of Organizational Resilience". Guiding the discussion on all aspects from culture change, BCP & DR, BIA, BPA, board communication, risk appetite / tolerance, cyberinsurance, governance, organizational change management, over lessons learned in IR, red team, blue team, purple team exercises, EDR, XDR, EPP, VPN, MFA, up to defense-in-depth…

    As global industry leader in the cybersecurity space and longtime CISO it was my pleasure moderating the CISO panel with the subject "Creating a Culture of Organizational Resilience". Guiding the discussion on all aspects from culture change, BCP & DR, BIA, BPA, board communication, risk appetite / tolerance, cyberinsurance, governance, organizational change management, over lessons learned in IR, red team, blue team, purple team exercises, EDR, XDR, EPP, VPN, MFA, up to defense-in-depth, security/resiliency-by-design, and cloud adoption we covered a lot during that hour. The room was packed / overcrowded and I made sure everything was delivered precisely on time and focused on the topic (imagine, with 5 leading CISOs on a podium...). After the session I also did a book signing - we had a lot of fun together! Here is the video recording of the session: https://www.youtube.com/watch?v=8_VGldqR-Tg

  • Data Connectors Cybersecurity Community Graphic

    Cyber Executive Roundtable Panelist

    Data Connectors Cybersecurity Community

    - 1 month

    Education

    It was an honor to serve as panelist on the Cyber Executive Roundtable at the Data Connectors CyberSecurity Conference in Houston on April 27th, 2022. Providing my subject matter expertise and thought leadership to serve the global cyber security community. Sharing some success stories and how to prevent the data breaches or to reduce their impact.

  • Information Security Media Group (ISMG) Graphic

    Video Interviewee by ISMG as CISO for LogMeIn during RSA Conference 2021

    Information Security Media Group (ISMG)

    - 1 month

    Science and Technology

    I had the pleasure to chat with Anna Delaney on authentication challenges and how to overcome them, sharing some insights on password handling, and what the future might entail.
    Here is the link to the interview:
    https://www.bankinfosecurity.com/authentication-methods-to-support-permanent-remote-workforce-a-16604

  • VoiceAmerica Graphic

    Radio Interviewee - Global CISO - Global Leader - Book Author - Industry Expert

    VoiceAmerica

    - 1 month

    Education

    Listen in to my radio interview on the VoiceAmerica network and TF7 Radio with host George Rettas about "What is the Current State of Cyber Security" and my newly published book - https://www.voiceamerica.com/episode/123636/task-force-7-ep135-monday-may-18th-2020

  • Security Magazine Graphic

    Interviewee by Editor-in-Chief as leading Industry CISO and Book Author

    Security Magazine

    - 2 months

    Education

    Security Magazine's Editor-in-Chief, Maggie Shein, has interviewed me and reviewed my book to share with her readers. It's covered in the "Security Talk" as first article, right where the actual content starts, under the heading: "Step-by-step strategy for the CISO". It went live on January 6, 2021. Link: "https://www.securitymagazine.com/articles/94308-step-by-step-strategy-for-the-ciso"

  • ISACA Greater Houston Chapter Graphic

    Speaker

    ISACA Greater Houston Chapter

    - 1 month

    Education

    https://bit.ly/3jBJ3Zr
    This session introduces and discusses some of the concepts of Michael’s new book and exemplary shares some details about the content... Focused topics will include:
    · Current trends and observations in data breaches (DBIR with trends);
    · International perspective – GDPR focus, explaining core concepts with a European view on privacy;
    · Data security and risk governance (ISMS, IS governance board, policy process);
    · Example of the core security processes…

    https://bit.ly/3jBJ3Zr
    This session introduces and discusses some of the concepts of Michael’s new book and exemplary shares some details about the content... Focused topics will include:
    · Current trends and observations in data breaches (DBIR with trends);
    · International perspective – GDPR focus, explaining core concepts with a European view on privacy;
    · Data security and risk governance (ISMS, IS governance board, policy process);
    · Example of the core security processes (incl. Strategy / Program development, Vulnerability Management, Threat intelligence, and Patching);
    · Q&A.

  • Spotify Graphic

    Podcast guest "Avoiding a False Sense of Cybersecurity with Michael Oberlaender, CISO at LogMeIn, and Wayne Sadin, Board IT Advisor at Via Group Partners"

    Spotify

    - 1 month

    Education

    https://open.spotify.com/episode/2eliJZbNrQtfF9c72dyZzn?si=87d548cf18cd4cb3&nd=1

  • Privacy Please Podcast Graphic

    Security Industry Leader / Book Author / CISO - Privacy Podcast Interviewee

    Privacy Please Podcast

    - 1 month

    Education

    https://www.iheart.com/podcast/269-privacy-please-68515822/episode/ep-37-michael-oberlaender-72078285/
    In this podcast that is hosted by Cam and Gabe from the Privacy Please Podcast we talk about being at the security helm of an organization, what characteristics are important, what things to do and which treats to develop. We're also covering some things from my book such as the back story on GDPR and privacy laws in Europe, why these came up and what is important. Lots of fun and also…

    https://www.iheart.com/podcast/269-privacy-please-68515822/episode/ep-37-michael-oberlaender-72078285/
    In this podcast that is hosted by Cam and Gabe from the Privacy Please Podcast we talk about being at the security helm of an organization, what characteristics are important, what things to do and which treats to develop. We're also covering some things from my book such as the back story on GDPR and privacy laws in Europe, why these came up and what is important. Lots of fun and also sharing some insights what makes a great CISO and how to spend $100 wisely. Enjoy!

  • ComplianceOnline Graphic

    Interviewee as highly accomplished Global CISO

    ComplianceOnline

    - 1 month

    Economic Empowerment

    https://www.complianceonline.com/resources/interview-with-michael-oberlaender-practical-lessons-for-cisos.html
    ComplianceOnline has interviewed me about my career, some of my advice on how to follow in my foot steps, and what core security controls should be addressed by every CISO.

  • Security Magazine Graphic

    Contributing Author / interviewee

    Security Magazine

    - 1 month

    Science and Technology

    https://www.securitymagazine.com/articles/91653-the-changing-role-of-the-ciso

  • Advisory Board

    Elevate IT Houston Conference

    - Present 5 years

    Science and Technology

    Helping with selection of speakers, vendors, agenda etc.

  • ISACA Graphic

    CISO Panelist at the 5th Annual ISACA Houston Cybersecurity Conference - Session VI

    ISACA

    - Present 6 years 1 month

    Served on the panel about Privacy and Security as CISO and GDPR privacy expert. Explaining the impact and entanglement between GDPR and other regulations with security and how to solve common misconceptions.

  • T.E.N. Graphic

    Executive Panelist for the ISE Information Security Executive Deep Dive Panel

    T.E.N.

    - Present 6 years 8 months

    An industry cross section of ISE Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.
    Details: http://www.ten-inc.com/ise/central/schedule.asp -> Wednesday, May 16, 2018

  • T.E.N. Graphic

    CISO Panelist at T.E.N. & ISE Sales and Marketing Breakfast during RSA conference 2018

    T.E.N.

    - Present 6 years 9 months

    Economic Empowerment

    Served on a CISO panel to advise sales and marketing leaders how to approach (and later sell) to the C(I)SO - see photos: https://www.flickr.com/photos/iseprograms/41500329432/in/album-72157694008181751/

  • CSO / CISO panelist

    Texas Tech Summit 2018

    - Present 6 years 11 months

    Science and Technology

    CSO / CISO Expert Panelist on the subject of security, privacy, compliance, regulation (GDPR), and how we tie it all together in today's hyper connected world.
    http://texas.technologysummit.net/ - see session 3:00 pm - 4:00 pm (Main Stage)
    http://texas.technologysummit.net/Speaker/Michael_Oberlaender.html

  • Texas Technology Summit - Machaon Corporation Graphic

    2016-2024 Governing Body Member

    Texas Technology Summit - Machaon Corporation

    - 8 years

    Science and Technology

    Supporting the Texas Technology Summit again to foster innovation, security leadership and local business.

  • SecureWorld Expo Graphic

    2011-2024 Advisory Council

    SecureWorld Expo

    - 14 years

    Economic Empowerment

    Selected on the executive advisory council again for SecureWorldExpo:

    http://www.secureworldexpo.com/houston/advisory-board

  • Texas Technology Summit - Machaon Corporation Graphic

    CISO - Panelist

    Texas Technology Summit - Machaon Corporation

    - Present 8 years 11 months

    Science and Technology

    Panel Discussion: How Your IT Culture Affects Your Ability to Innovate

    02/09/2016

  • ISACA Graphic

    Privacy & Safe Harbour Panelist

    ISACA

    - Present 9 years 1 month

    Education

    Safe Harbor Down, but Not Out? What is Next?

    - Panel discussion at the ISACA Greater Houston chapter on 12/14/2015.

  • Texas Technology Summit - Machaon Corporation Graphic

    CISO Panelist

    Texas Technology Summit - Machaon Corporation

    - Present 9 years 11 months

    Education

    Panel discussion: Communicating Information Security to the Board and Executive Management

    02/11/2015

  • CIO Magazine Graphic

    CSO Panelist

    CIO Magazine

    - Present 10 years 2 months

    Education

    CSO panel during the CIO Perspectives event in Houston

  • Sutherland Asbill & Brennan LLP Graphic

    CISO Panelist

    Sutherland Asbill & Brennan LLP

    - Present 10 years 3 months

    Education

    Played key CISO role in “Managing A Cyber Attack" Sutherland Asbill & Brennan LLP panel.

  • ISSA South Texas Graphic

    CISO Panel Moderator

    ISSA South Texas

    - Present 10 years 4 months

    Education

    Moderated the CISO panel on the 09/11/2014

  • ISACA Graphic

    Speaker and Lecturer

    ISACA

    - Present 10 years 7 months

    Education

    Presented and lectured the ½-day seminar, 06/20/2014 in Houston, TX: "C(I)SO - And Now What".

  • SecureWorld Expo Graphic

    Speaker / InfraGard track and CISO Panelist

    SecureWorld Expo

    - Present 11 years 8 months

    Education

    Some parts of my recent book "C(I)SO – And Now What? How to Successfully Build Security by Design" --> How to Build Security in an Organization.

  • Speaker

    HouSecCon 4.0

    - Present 11 years 3 months

    Education

    How to Build Security in an Organization

  • SecureWorld Expo Graphic

    2011 / 2012 Houston Executive Steering Council

    SecureWorld Expo

    - 1 year

    Education

Publications

  • Striking the balance between cybersecurity and operational efficiency

    Help Net Security

    Help Net Security has interviewed me about cybersecurity strategy and balancing it with operational efficiency. This article was featured and published via Help Net Security.

    See publication
  • PREMIER CISO - BOARD & C-SUITE: RAISING THE BAR FOR CYBERSECURITY

    Michael S. Oberlaender

    Having worked in cybersecurity for three decades, the author focuses his third book on the crucial topic that any PREMIER CISO must succeed in – the company board, C-suite level conversations, and how to address the important subject of cybersecurity in an audience appropriate manner, while still bringing across the necessary core content. The book starts with an overview of the status quo of the industry and then leads into the conversations a new CISO should have; in preparing for the role…

    Having worked in cybersecurity for three decades, the author focuses his third book on the crucial topic that any PREMIER CISO must succeed in – the company board, C-suite level conversations, and how to address the important subject of cybersecurity in an audience appropriate manner, while still bringing across the necessary core content. The book starts with an overview of the status quo of the industry and then leads into the conversations a new CISO should have; in preparing for the role, in performing of the role, and after leaving the position. A short summary highlights the latest market research on compensation figures, before the author details the CISO success factors that prepare aspiring CISOs as best as possible.

    PREMIER CISO also educates the reader on the all-too-common misperceptions, misconceptions, and misguidance in the industry before it provides a streamlined approach to company board composition, leadership setup, and the CISO food chain. The core communication partners and relevant key topics are addressed step by step alongside the respective focus areas. Recent regulatory SEC changes are introduced and commented on, the concepts of SecDevOps and Enterprise architecture are pursued, and topics regarding the board and potential questions thereof are raised.

    This book serves as a sparring partner for the CISO to “discuss” with their inner voice the key decisions to make, before setting the standard for the rise of the CISO and transitioning into the latest topics of quantum security and artificial intelligence (AI) security. Written as a high-level navigator for all CISOs who like to sharpen their saw and for those aspiring to become that PREMIER CISO, a well-defined index and complete bibliography are provided to help the time-pressed CISO focus on the relevant topics.

    See publication
  • SEC SolarWinds Action and the Evolving Role of CISO

    Art of Cyber Security / Youtube

    I was again honored to be interviewed by Chirag Joshi in this podcast session on the SEC actions, this time about the ramifications and impact on the overall cybersecurity industry and CISO community in regards to the charges the Security and Exchange commission issued against the CISO of SolarWinds. This interview was taken remotely between Sydney, Australia (Chirag's location) and Houston, USA (Michael's location). We discuss items like the implications of the SEC Ruling on the global CISO…

    I was again honored to be interviewed by Chirag Joshi in this podcast session on the SEC actions, this time about the ramifications and impact on the overall cybersecurity industry and CISO community in regards to the charges the Security and Exchange commission issued against the CISO of SolarWinds. This interview was taken remotely between Sydney, Australia (Chirag's location) and Houston, USA (Michael's location). We discuss items like the implications of the SEC Ruling on the global CISO community; the evolution of the CISO role, the potential liabilities and where the real accountability lies in organizations; Cyber Security in Corporate Governance and Executive Responsibilities; the elements of a defensible cyber posture programs accounting for materiality; the increasing regulatory expectation and scrutiny for cyber security practices; and the role of CyberSecurity culture and also the need for action to protect the whole critical infrastructure.

    Other authors
    See publication
  • Succeeding in InfoSec and CyberSecurity

    Michael S. Oberlaender

    Sharing my knowledge, know-how, and expertise of three decades in cybersecurity and technology in a session for the CIO Professional Network on 04/21/2023. I've leveraged some content of my most recent book, as well as some other self-developed material, and it was received quite well by the CIO audience. Recording and slides will be available upon request.

    See publication
  • PCIP - Putting Certifications Into Perspective

    Michael S. Oberlaender - security industry leader, book author, publisher, and former 8 times C(I)SO.

    I have published my slides that I created and used for my seminar "PCIP - Putting Certifications Into Perspective" that I gave at the ISACA webinar on 03/28/23. Sharing from my 35 years of experiences, 25+ ys full time CyberSecurity with 8 times prior CISO and CSO roles across many different industry verticals. The slide deck is shared here for reference and the good cause of education, while I retain the full copyrights globally. The recording session link is available upon request (DM me).

    See publication
  • GLOBAL CISO - STRATEGY, TACTICS, & LEADERSHIP: How to Succeed in InfoSec and CyberSecurity

    Michael S. Oberlaender - ISBN: 979-8604917756

    This book is written by a C(I)SO for C(I)SOs – and also addresses CEOs, CROs, CLOs, CIOs, CTOs, Security Managers, Privacy Leaders, Lawyers, and even Marketing and Sales executives. It is written by a seven-time career CISO for other visionaries, leaders, strategists, architects, compliance and audit experts, those politically interested, as well as, revolutionaries, and students of IS, IT, and STEM subjects that want to step up their game in InfoSec and Cybersecurity. The book connects the…

    This book is written by a C(I)SO for C(I)SOs – and also addresses CEOs, CROs, CLOs, CIOs, CTOs, Security Managers, Privacy Leaders, Lawyers, and even Marketing and Sales executives. It is written by a seven-time career CISO for other visionaries, leaders, strategists, architects, compliance and audit experts, those politically interested, as well as, revolutionaries, and students of IS, IT, and STEM subjects that want to step up their game in InfoSec and Cybersecurity. The book connects the dots about past data breaches and their misconceptions; provides an international perspective on privacy laws like GDPR and several others, about threat actors and threat vectors; introduces strategy and tactics for securing your organization; presents a first glimpse on leadership; explains security program planning and backup plans; examines team building; conceptualizes the governance board; explores budgets; cooperates with the PMO; divulges into tactics; further elaborates on leadership; establishes the reporting structure; illustrates risk assessments; elucidates security processes, principals, and architectural designs; enumerates security metrics; skims compliance; demonstrates attack surface reduction; explicates security intelligence; conceptualizes S-SDLC (SecDevOps); depicts security management; epitomizes global leadership; illustrates the cloud’s weaknesses; and finishes with an outlook on IoT. If you are in need of strong, proven, battle-tested security advice for a progressing security career, if you’re looking for the security wisdom of a global, experienced leader to make smart decisions, if you are an architect and want to know how to securely architect and design using guiding principles, design patterns, and controls, or even if you work in sales and want to understand how (not) to sell to the CISO – this is your almanac – and you will read and reference it many times. Michael S. Oberlaender is one of the best globally renowned security leaders. 9798604917756

    See publication
  • Mastering Black Hat, DEF CON and Las Vegas over 10 Days (and Nights)

    The State of Security

    This is a summary of my recent BlackHat 20, DEFCON 25, and overall Las Vegas experience and gives insight into the issues the security industry is facing. Hopefully the conference organizers will take that advice to heart and change location as well as some setup for the future. Overall, the conferences and sessions were a blast and this is a great opportunity to share experience and exchange on any security related subject with peers and new comers.

    See publication
  • A C(I)SO View on RSA 2017: “China Is Hiring in the US”

    Tripwire's The State of Security

    This article describes the most recent RSA conference with the eyes of the C(I)SO and points out some interesting observations about vendors, point products, the failing of the security industry overall, China's hiring efforts, and some personal impressions of the author, veteran in the IT and security realm for decades and himself a C(I)SO.

    See publication
  • Privacy and Humanity Elements for the IoT / IoE

    Tripwire's THE STATE OF SECURITY blog

    This article closes the above "think tank" blog series about the IoT (Internet of Things) / IoE security requirements: Privacy, Non-Leverage Principle / No Dual-Use, Testing, Defaults and Human Override - and they should all become mandatory - including the ones that were mentioned in the other two articles before. If these requirements will be included in IoT / IoE designs from the beginning, we will have a much safer and human technology world.

    See publication
  • Mandatory Security Design Considerations for the IoT / IoE

    Tripwire's THE STATE OF SECURITY blog

    This article continues the above "think tank" blog about the IoT (Internet of Things) / IoE security requirements - and they should all become mandatory: Secure System | Software Development Life Cycle, Access, Authentication, Authorization, Accounting, and Non-Repudiation all in addition to the above and the ones to follow soon in the next article (soon below).

    See publication
  • IoT / IoE: If It Has an IP Address, It Can Be Hacked

    Tripwire's THE STATE OF SECURITY blog

    This article introduces some think tank approach to the next big wave of risk to come (y)our way: the IoT (Internet of Things) or also called IoE (Internet of Everything). I describe and adapt a couple of already known infosec concept and add several new ones (in this and the following articles in this series - stay tuned!). Speaking it out loud now instead of waiting for the same mistakes to happen as we have seen over the past decades.

    See publication
  • Why Info-Security Hinges on Physical Security

    Security Magazine

    In this article I offer practical advice how to address (physical) security and integrate it with the other pieces like InfoSec, people, process etc. - we have to change the way we do things: Security has to become a design-goal. This article was published with the Security Magazine online and also via their eNewsletter.

    See publication
  • Why physical security (and InfoSec!) still matter

    CSO Online

    In this day and age where everything is connected, it's easy to forget that protecting devices themselves is just as important as InfoSec. This article focuses on the important combination of both physical and logical (infosec) security. I describe a couple of observations and situations I've been in and give advice to make security a design-goal for everything that is build, developed, engineered, or designed.

    See publication
  • Why Physical Security Still Matters (And Infosec, Too!)

    Tripwire's The State Of Security

    You'll realize at some point in your life as security pro that there is always the "other" side of controls you haven't thought about. This article focuses on the important combination of both physical and logical (infosec) security. I describe a couple of observations and situations I've been in and give advice to make security a design-goal for everything that is build, developed, engineered, or designed.

    See publication
  • Challenging the Current State of Security

    Tripwire's THE STATE OF SECURITY blog

    In this article I describe a couple of pain points the security industry is facing to set the ground that we need to change the current approach, and then explain a proven way how to solve the problems strategically and to overcome the current global information security crisis.

    See publication
  • Security should no longer be 'cementing' the status quo

    CSO online

    In this new article I describe how to re-think our security approaches and to challenge the status quo. It is important to get the big picture view to see the common misconceptions and often times ill-designed security solutions (bolted on) instead of common-sense and practical improvements that are well-thought through and build for persistence. I also cover the important privacy aspects and why things are broken currently.

    See publication
  • Safety first, business second, security none?

    Cisco Security Blog

    This blog post focuses on the context of security vs safety vs business and addresses important steps to take when securing SCADA and related areas in PCN or industrial networks.

    See publication
  • Beyond Products and Services: Conversations that Should Have Already Happened

    Tripwire's blog "THE STATE OF SECURITY"

    Guest blog entry as subject matter expert. - This article talks about the predominant issue that C(I)SO's today are facing dealing with sales folks from vendors, and shows proven approaches how to do this right - and it also covers a couple of thought leader ideas what the latest NSA revelations will probably make necessary that customers should ask their vendors. Enjoy and feedback welcome as always!

    See publication
  • Why the Security Stack Has Ten Layers, Not Seven

    Tripwire's blog "THE STATE OF SECURITY"

    Guest blog entry as subject matter expert.

    See publication
  • How to secure a company's Chinese development, part two

    CSO Online - Security Leadership series - In Depth

    In the second part of this two-part series, we examine risk counter measures for an organization planning on doing part of its software development in China

    See publication
  • How to secure a company's Chinese development center?

    (IN)SECURE magazine - Issue #39

    Suppose you have a company - let’s call it WorldSoft - that is planning to do a big
    part of its software development in China. A fairly new and growing economy, access
    to inexpensive but highly educated development resources from local
    universities, one of the most important future Asian markets and similar
    motivations might be the reasons for that. Given the multiple and complex challenges,
    how would it be possible to secure that from a corporate perspective? This articles…

    Suppose you have a company - let’s call it WorldSoft - that is planning to do a big
    part of its software development in China. A fairly new and growing economy, access
    to inexpensive but highly educated development resources from local
    universities, one of the most important future Asian markets and similar
    motivations might be the reasons for that. Given the multiple and complex challenges,
    how would it be possible to secure that from a corporate perspective? This articles gives the answer to this question - in a very concise and strategic fashion. Enjoy!

    See publication
  • How to secure a company's Chinese development, part one

    CSO Online - Security Leadership series - In Depth

    In this two-part series, we examine the threats and necessary counter-measures for a company that's planning to develop software in China

    See publication
  • Build Your Security Program with Strong Architecture

    Information Security Magazine, Vol. 50, No. 9, pages 117-118

    This article addresses the important aspect of security architecture and how it integrates with the various other facets like policy, people, and process.

    See publication
  • Book excerpt: 'C(I)SO: And Now What?'

    CSO Online magazine

    This article is talking about the important piece of security strategy development and what kind of logical sequence and overall arrangements have to be addressed to make the security strategy a success. It also explains the 10 layers of the "security stack" and that one must address each layer accordingly (defense in depth) - including people, process, technology, and money. It is an excerpt of one of the chapters of my new book (see above).

    See publication
  • Security needs to be handled at the top

    (IN)SECURE Magazine

    This article focuses on the security policy subject and how to split the typically complex structure of documents into a working and consistent 3-tier pyramid of policy, standards, and procedures. It's an excerpt of one chapter of my newly published book (see above) and shall help to educate the C-level about the typical errors and omissions.

    See publication
  • C(I)SO - And Now What?

    Michael S. Oberlaender

    Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and look for guidance, or you are considering yourself an expert and just wish to verify that you haven't forgotten anything - this book will help you to tackle the subject right - by building "security by design". The content covers your initial phases in the job such as setting expectations, base lining, gap analysis, capabilities building, and org…

    Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and look for guidance, or you are considering yourself an expert and just wish to verify that you haven't forgotten anything - this book will help you to tackle the subject right - by building "security by design". The content covers your initial phases in the job such as setting expectations, base lining, gap analysis, capabilities building, and org chart variances. It then leads you to define security architecture, addressing a secure development process, application security and also security policy levels. Further items such as awareness programs, asset management, teaming up with audit, risk management, and finally the strategy development are covered. Then we dive into ROIs, trust relationships, KPIs, incident response, forensics, before we run into crises management by looking at some specific examples of personal experience of the author - himself a C(I)SO for many years.
    The book is ending by providing advice how to deal with other executive management, and what kind of education, certifications, and networking you need to focus on. If you consistently apply the content and advice provided in this book, you should be all set to succeed in your role as C(I)SO.

    ISBN-13: 978-1480237414

    See publication
  • A New Approach to Data Centric Security

    InfoSec Island

    A full deep dive into the data classification subject. This is another online copy of the original article published with (In)Secure magazine (see below).

    See publication
  • Data classification: A new approach to data centric security

    (In)Secure Magazine

    This is the published article about the data classification and the newly introduced "Oberlaender Cube (C3)".

    See publication
  • The Magic Triangle of IT Security

    CSO Online

    Explains the paradoxon in the security realm between the opposite parameters of cost reductions, increased functionality and improved security. Provides insight into the CIA triad and the importance of weighing those parameters.

    See publication

Honors & Awards

  • Distinguished Member Of the 2013 InfraGard Members Alliance

    Federal Bureau of Investigation (FBI)

Languages

  • Spanish

    Elementary proficiency

  • French

    Limited working proficiency

  • German

    Native or bilingual proficiency

  • English

    Native or bilingual proficiency

  • Business Language

    Native or bilingual proficiency

  • Security expert talk

    Native or bilingual proficiency

  • Risk Management language

    Native or bilingual proficiency

Organizations

  • SANS Institute

    Active member in good standing

    - Present
  • (ISC)²

    Active member in good standing

  • InfraGard / FBI

    Active and contributing member

    Michael presented during the InfraGard track at the SecureWorld Expo in May 2013

  • ISACA

    Active and contributing member

    Michael presented a full ½ day seminar about his book content in June 2014.

  • ISSA

    Active and contributing member

    Michael moderated the ISSA CISO panel on 09/11/2014.

Recommendations received

View Michael S.’s full profile

  • See who you know in common
  • Get introduced
  • Contact Michael S. directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses