Leslie K. Lambert

Contributor

Want to Join?
Opinions expressed by ICN authors are their own.

Leslie K. Lambert, CISSP, CISM, CISA, CRISC, CIPP/US/G, former CISO for Juniper Networks and Sun Microsystems, has over 30 years of experience in information security, IT risk and compliance, security policies, standards and procedures, incident management, intrusion detection, security awareness and threat vulnerability assessments and mitigation. She received CSO Magazine’s 2010 Compass Award for security leadership and was named one of Computerworld’s Premier 100 IT Leaders in 2009. An Anita Borg Institute Ambassador since 2006, Leslie has mentored women across the world in technology. Leslie has also served on the board of the Bay Area CSO Council since 2005. Lambert holds an MBA in Finance and Marketing from Santa Clara University and an MA and BA in Experimental Psychology.

The opinions expressed in this blog are those of Leslie K. Lambert and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Securing connected medical devices: Will categorizing them as ICS help?

Staying secure as the IoT tsunami hits

Staying secure as the IoT tsunami hits

The ubiquitous adoption of devices in virtually every industry is creating a massive, global security gap. Data science can help reign in the risks.

The time for network behavior analytics has come

The time for network behavior analytics has come

Once considered the eminent domain of networking teams, network telemetry data is becoming a requirement to provide security analytics with a more complete view of enterprise threats.

Cross-channel fraud detection

Cross-channel fraud detection

How performing behavioral analysis across silos can help detect sophisticated attacks.

Model-driven security: using unconventional controls to stay ahead of threats

Model-driven security: using unconventional controls to stay ahead of threats

We need to get out of our own way in terms of how we think about and implement security, while enlisting analytics and data science as our allies.

6 steps for GDPR compliance

6 steps for GDPR compliance

GDPR law applies to all companies that collect and process data belonging to European Union (EU) citizens. You have every reason to fear it because failure to comply will be costly.

Big picture security

Big picture security

Context and risk aware access control promises to make our industry more likeable.

Using identity to protect the mobile perimeter

Using identity to protect the mobile perimeter

It’s the biggest threat surface and best enforcement point for enterprise security

Using risk for adaptive security

Using risk for adaptive security

How automated responses to risk-scored activity can reduce threats.

What can machine learning tell us?

What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats.

You can steal my identity, but not my behavior

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based...

Beyond risk scoring

Beyond risk scoring

Risk scoring is not an end in itself once it shows up color coded and normalized between 0 and 100 in a security operations center (SOC) dashboard. To provide real value it must be supplemented by a closed-loop response process that...

Load More