Independent peer-to-peer guidance from industry-leading CISOs.


The CISO View report series is developed in conjunction with the independent research firm Robinson Insight and brings together leading CISOs for peer-to-peer information sharing to help security teams build effective cybersecurity programs.


Newly Available

Robotic Process Automation (RPA) is a fast route to increased efficiency, productivity and quality. From a cyber security perspective, RPA also brings a new and attractive attack surface with the proliferation of privileged access as a prime concern.

This CISO View research report examines issues such as: What techniques might an attacker use to exploit privileged access in RPA systems? What are the most significant risks? What controls are the most useful and feasible? What are the key success factors in working with business stakeholders?



Securing Devops and Cloud Environments

The rewards of rapid software development and automated IT operations are clear – faster time-to-market and reduced costs. But, what about the risks? How do you successfully secure DevOps and cloud environments?

This CISO View research report drew from the experiences of CISOs from the Global 1000, as well as security professionals and technical experts who have adapted and secured DevOps environments.


A 30-Day Sprint to Protect Privileged Credentials

How do you avoid a data breach? Ultimately, you need to know what techniques attackers use and what security controls can stop them. This CISO View research report provides an inside look at the lessons learned from several high-profile data breaches, as well as recommendations and a 30 day sprint framework to guide rapid implementation of key controls.


The CISO View on Improving Privileged Access Controls

This report provides practical guidance for CISOs to improve privileged access controls based on the first-hand knowledge of leading organizations. The guidance includes recommendations for establishing the balance between enabling and restricting high-levels of access to information assets.


The CISO's Take on Protecting Privileged Access in Robotic Process Automation

Gain practical guidance on how to secure Robotic Process Automation environments based on insights from Global 1000 CISOs and other experts who contributed to the latest CISO View.

Speaker: Laura Robinson, Principal Analyst – Robinson Insight
Date: Tuesday, March 17, 2020, 1pm EST


Today, organizations face increasingly sophisticated and challenging cyber threats. At CyberArk, we believe that sharing insights and guidance across the CISO community will help strengthen security strategies and lead to better-protected organizations.

CyberArk has commissioned an independent research firm, Robinson Insight, to develop The CISO View which explores topics related to improving privileged access controls. The initiative brings together CISOs from leading organizations across the globe to share their insights into critical issues facing security leaders with the goal of establishing valuable peer-to-peer guidance and dialog. Contributors to current and past reports, and members of The CISO View Research Panel include the following individuals.

Tim Bengson

Vice President, Global Chief Information Security Officer, Kellogg Company

Dawn Cappelli

Vice President & Chief Information Security Officer, Rockwell Automation

Melissa Carvalho

Vice President, Enterprise and Customer Identity and Access Management, RBC

Dave Estlick

Chief Information Security Officer, Starbucks

Khadir Fayaz

Vice President, Global Security Strategy, Engineering & Architecture, Pearson

Peter Fizelle

Chief Information Security Officer, Asian Development Bank (ADB)

Mike Gordon

Vice President and Chief Information Security Officer, Lockheed Martin

Omar Khawaja

Vice President and Chief Information Security Officer, Highmark Health

Kathy Orner

Chief Risk Officer, CWT

Olivier Perrault

Chief Information Security Officer, Orange Business Services

Thomas Tschersich

Senior Vice President, Internal Security & Cyber Defense, T-Systems International

Daniel Tse

Head, Cyber Security, Information & Technology Risk (CSITR), GIC Private Limited

Contributors to Prior Reports Include the Following Individuals

Rob Bening

Chief Information Security Officer Emeritus, ING Bank

David Bruyea

Senior Vice President & Chief Information Security Officer, CIBC

Jim Connelly

Vice President & Chief Information Security Officer, Lockheed Martin

John Gelinne

Managing Director, Advisory Cyber Risk Services, Deloitte & Touche

Fred Gibbins

Senior Vice President & Chief Information Security Officer, American Express Company

Charles Gillman

Chief Security Officer, NTT Communications - Cloud Infrastructure Services

Steve Glynn

Global Head of Information Security, ANZ

Mark Grant

PhD, CIPP Chief Information Security Officer, CSX Corporation

Gary Harbison

Chief Information Security Officer, Monsanto Company

Jim Motes

Vice President & Chief Information Security Officer, Rockwell Automation

Kathy Orner

Vice President & Chief Information Security Officer, Carlson Wagonlit Travel

JD Rogers

Chief Information Security Officer, American Financial Group

John Schramm

CISA, CISSP, VP Global Information Risk Management & CIRO, Manulife

Chun Meng Tee

Vice President and Head of Information Security, Singapore Exchange

Munawar Valiji

Head of Information Security, News UK

Mike Wilson

Vice President & Chief Information Security Officer, McKesson

*Represents role at time of contribution.


What questions are most pressing for you about securing privileged access for human and non-human users across digital transformation initiatives now and in the future?

We invite CISOs and other senior security professionals to suggest topics for upcoming research and nominate CISOs to share their insights for upcoming reports and CISO roundtables. Please reach out to the CISO View research team at [email protected].


To download the latest CISO View report, complete the form.