Todd Bell

Contributor

Opinions expressed by ICN authors are their own.

Todd Bell has become an international expert and leading speaker on preventing security breaches for new start-ups to Global Fortune 500 companies. As a CIO & CISO, Todd has made a global impact for safeguarding millions of consumers information around the globe by building new cyber programs to maturing existing programs.

Todd is also the architect & inventor of the Bell Security Enterprise Security Architecture method that streamlines cybersecurity controls as a virtual overlay onto an existing flat network architecture without having to move any existing systems, saving thousands of dollars and accelerates data protection with a low cybersecurity budget. The method is based on zero-trust model and adapted to co-exist with malware in an untrusted internal corporate network.

Todd is also the creator of "What Is Your Risk Number" to properly assign cybersecurity risk ratings that vary within an enterprise to have the balance of business needs and having proper cybersecurity controls.

The opinions expressed in this blog are those of Todd Bell and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

The economics and impact of bad CISO leadership

A CISO’s guide to avoiding certain CISO jobs

A CISO’s guide to avoiding certain CISO jobs

Some Chief Information Security Officer (CISO) jobs are unwanted security executive positions that might not be good for your career. If you are looking for a new CISO position, you may want to know what type of CISO position a...

The economics of back doors

The debate between Apple and the FBI has become a major national public issue. The key component missing from this debate is the economic impact to US corporations and the US economy.

What is your risk number?

What is your risk number?

Your risk number is based on what your C-Suite & BOD's have decided what the risk appetite will be for the enterprise and even down to the department level.

What cyber trends to expect in 2016

What cyber trends to expect in 2016

2015 was another tumultuous year of more cybersecurity attacks and no different from 2014 or even 2013. Here is what to expect in 2016.

7 tips to becoming a successful CISO

Todd Bell looks back at his years in the security industry and offers up these seven tactics that will help you stay atop the field.

Why cybersecurity needs women

Why cybersecurity needs women

Business problems can be solved with greater efficiency and deliver a better solution when women play a critical role. When collective thinking is enabled across a diverse team, a variety of options are viewed that can deliver an...

How to not get fired as CISO

How to not get fired as CISO

A number of new CISOs are being let go after one year on the job.

What it takes to be a successful CISO

What it takes to be a successful CISO

Many new CISOs are being shown the door within the first year of being a CISO. This series shares experience from industry experts that have gone through the political challenges and have emerged as proven CISOs with over three years...

How to be a successful CISO without a 'real' cybersecurity budget

How to be a successful CISO without a 'real' cybersecurity budget

Many CISOs are becoming the first CISO for their company, but no formal budget exists.

When to throttle yourself as a new CISO

Surviving the C-Suite as a CISO

Load More