Back

EP 2 – Michael Piacente: What It Takes To Become a Successful Chief Information Security Officer

read

Chief Information Security Officers (CISOs) or heads of security have one of the most unique views of an organization and their technology stack. While it can be a daunting job there are many organizations with phenomenal leaders.

Where CISOs really shine is their ability to collaborate, partner and build with engineering, product, and business teams. For a quick visual of all that CISOs face from a functional level, there is a great CISO Mind Map that Rafeeq Rehman pulls together every year. This mind map really highlights the enormous pressure to ship, deliver, and sell security.

Michael Piacente is the co-founder and managing director of Hitch Partners and he has been helping the security community find great leaders for several years.

In today’s show, he shares his insights about the patterns that most successful CISOs have in common.

Topics discussed in this episode:

  • The attributes and skillsets of a great CISO.
  • What Hitch Partners does and Michael’s professional journey.
  • Suggestions for aspiring CISO that want to gain exposure and visibility.
  • The importance of partnering with the technical and non-technical part of the business.
  • Keys to retaining and engaging top talent.
  • Tips on how to structure the interview process.
  • Why building a personal brand is very important for the CISO career path.
  • What Hitch Partners CISO Survey is all about.

Listen to the full episode on Apple Podcasts or Spotify!

Rate this article

Recent articles

Solving the Challenges of Engaging with Developers

On a recent episode of the Future of Application Security podcast, Chad Girouard, AVP Application Security at LPL Financial, talked about some of the challenges to overcome...

Read more
What’s Caused the Need for Software Supply Chain Security

On a recent episode of the Future of Application Security podcast, Dave Ferguson, Director of Technical Product Management, Software Supply Chain Security at ReversingLabs, explained why the...

Read more

Ready to Scale Your Application Security Program?

Sign up for a personalized one-on-one walkthrough.

Request a demo

[email protected]

Request a demo