Mary K. Pratt

Contributing writer

Mary K. Pratt is a freelance writer based in Massachusetts.

How Adobe reduced compliance fatigue

How Adobe reduced compliance fatigue

With compliance putting undo strain on product teams, Adobe SVP and CSO Mark Adams and team built an automation platform. The effort paid off in scale, speed, and reduced risk and earned the software provider a CSO50 award for...

Reddit’s Allison Miller builds trust through transparency

Reddit’s Allison Miller builds trust through transparency

Miller joined the social media company in February 2021, assuming a range of responsibilities, from security and privacy to trust and safety, that reflect broadening of the CISO position itself—a role she summarizes as “keeping...

Kraft Heinz dishes up security transformation

Kraft Heinz dishes up security transformation

For CISO Ricardo Lafosse, security modernization is the first order of business.

Northwestern Mutual’s Laura Deaner: Resist the urge to solve stuff fast

Northwestern Mutual’s Laura Deaner: Resist the urge to solve stuff fast

Technologists want to “solve stuff really fast,” says Northwestern Mutual CISO Laura Deaner. But to cement their roles as business leaders, CISOs must take the time to understand the business and build a security strategy that solves...

FSU’s university-wide resiliency program focuses on doing the basics better

FSU’s university-wide resiliency program focuses on doing the basics better

An audit showing inadequate disaster recovery plans in many of the university’s 307 administrative units was the stick CISO Bill Hunkapiller needed to advance a centralized, streamlined resiliency program.

Seven strategies for building a great security team

Seven strategies for building a great security team

The dangers of a dysfunctional security team are easy to imagine, ranging from difficulty attracting and retaining talent to putting your organization at risk. These seven steps can make a world of difference.

The new math of cybersecurity value

The new math of cybersecurity value

An increasing number of CISOs are devising a new set of metrics to show how they’re impacting risk at their organizations.

8 pitfalls that undermine security program success

8 pitfalls that undermine security program success

Don’t let these easy-to-overlook mistakes trip up your security strategy.

CISOs’ 15 top strategic priorities for 2021

CISOs’ 15 top strategic priorities for 2021

Mitigating third-party risk, baking security into the development process, defending against ransomware attacks, keeping pace with digital transformation efforts—these are just a few things that are top-of-mind for CISOs today.

CISO job satisfaction: Finding meaning in the mission

CISO job satisfaction: Finding meaning in the mission

The top security job is highly stressful and sometimes thankless, but it can also provide great satisfaction—especially for mission-driven CISOs.

How long-term hybrid work is changing security strategies

How long-term hybrid work is changing security strategies

CISOs across industries are revisiting the stopgap security tools and the temporary policies they enacted to quickly enable remote work to replace them with stronger permanent solutions. But the old rules no longer apply.

6 resume mistakes CISOs still make

6 resume mistakes CISOs still make

The top security job has evolved from a technology-focused role into an executive position. Does your resume reflect that shift?

10 things to do now to reduce the cost of your next data breach

10 things to do now to reduce the cost of your next data breach

Taking these steps will save money, time, and reputation when that next breach hits.

Ransomware response: What CISOs really want from the federal government

Ransomware response: What CISOs really want from the federal government

What should the federal government's role and responsibility be regarding ransomware? Security leaders weigh in.

What CISOs really want from security vendors

What CISOs really want from security vendors

Less risk? Better security? Value for dollars spent? Check, check, and check. But of all the things CISOs want from security vendors, trusted partnership tops the list. Here's how leading CISOs find and foster those relationships.

How to write a cyberthreat report executives can really use

How to write a cyberthreat report executives can really use

As savvy CISOs know, a well-crafted and well-timed cyberthreat report can help executives grasp what’s happening in the world of cybersecurity—and it just might replace those late-night phonecalls.

Attracted to disaster: Secrets of crisis CISOs

Attracted to disaster: Secrets of crisis CISOs

In the aftermath of a security incident, new CISOs are often appointed to take over and lead through the chaos. Here are the skills and traits experts say these crisis CISOs need—and how to prepare yourself to rise to the occasion.

How the Lift mentoring program gives women in cybersecurity a leg up

How the Lift mentoring program gives women in cybersecurity a leg up

The Executive Women's Forum's Lift program connects mentees working in information security, risk management, and privacy with mentors who can help them blaze their own trails. For individuals in the program, the career impact can be...

8 new roles today’s security team needs

8 new roles today’s security team needs

Demand for cybersecurity professionals remains sky-high. Make sure you're hiring for the right roles.

Undervalued and ineffective: Why security training programs still fall short

Undervalued and ineffective: Why security training programs still fall short

Research reveals a glaring disconnect between the need for security training and its perceived value. But organizations that have made their awareness programs a strategic priority and adopted more modern approaches are finding...

Load More