{"id":152168,"date":"2025-09-12T19:39:08","date_gmt":"2025-09-12T19:39:08","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/152168\/"},"modified":"2025-09-12T19:39:08","modified_gmt":"2025-09-12T19:39:08","slug":"2025-cso-hall-of-fame-laura-deaner-on-ai-quantum-threats-and-cyber-leadership","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/152168\/","title":{"rendered":"2025 CSO Hall of Fame: Laura Deaner on AI, quantum threats, and cyber leadership"},"content":{"rendered":"<p>\u201cThis potential vulnerability requires companies to identify every system and application that uses cryptography, categorize data by sensitivity and longevity to decide what to prioritize, and audit existing vulnerabilities to pinpoint where traditional encryption could be bypassed.\u201d<\/p>\n<p><a\/>How has the CISO role changed during your career, and what do you see as the biggest cybersecurity challenges for the next generation of CISOs?<\/p>\n<p>Laura Deaner: \u201cWhen the CISO role first emerged, security was treated as an IT compliance checkbox. Over the years, high-profile breaches\u2014such as the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Code_Red_(computer_worm)\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Code Red incident at Microsoft<\/a>\u2014forced organizations to view security as a strategic, board-level priority. Today, CISOs work directly with executives and have a real influence on business decisions.<\/p>\n<p>\u201cFor the next generation of CISOs, it\u2019s not enough to keep up\u2014you have to lead transformation. The flood of information, amplified by social media and fast-moving threats, means CISOs must be continuous learners and adaptable leaders. Skills in AI, ML, and large language models aren\u2019t optional anymore; they\u2019re how security professionals will distinguish themselves. Each new technology brings risks but also opportunities, and those who prepare will be the ones who thrive.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"\u201cThis potential vulnerability requires companies to identify every system and application that uses cryptography, categorize data by sensitivity&hellip;\n","protected":false},"author":2,"featured_media":152169,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[182,181,507,74],"class_list":{"0":"post-152168","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/152168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=152168"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/152168\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/152169"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=152168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=152168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=152168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}