Charlotte Wylie, SVP and Deputy Chief Security Officer at Okta, leads Okta’s technical cybersecurity services. This includes overseeing Okta’s global engineering teams to enhance the company’s security postures and programs that support its over 19,000 customers.
Charlotte has an extensive background in the delivery of security transformation…
Security often gets a bad rap for slowing down productivity and hampering user experience (UX). At Okta, we know this couldn't be further from the truth. Today's CISOs are deeply committed to creating frictionless experiences for employees and customers, and we recently spoke with two of them to get their take on balancing these crucial business…
The pressure is on for CISOs to prove that security isn’t just a cost center, but a strategic driver of business growth and resilience. But justifying security investments to the board is an ongoing challenge, especially given the cost of managing risk and protecting organizational assets. It’s a delicate balancing act where CISOs must demonstrate…
While the term “Zero Trust” is ubiquitous enough to feel like a buzzword, adoption of the security framework is not as widespread as you might think.
The security industry has been discussing the reality of the shifting perimeter for nearly two decades, with origins back to the Jericho Forum, an international group working to define and promote…
The job of a CISO is a tough one. Adaptability is key in a field where change is the only real constant, as new laws, evolving regulations, and increasingly complex security threats challenge even the most seasoned executive.
While many of the regulations that CISOs deal with are industry specific, the approach to compliance (ensuring teams have…
As corporate employees are now regularly accessing their enterprise applications and data from mobile devices and cloud applications, the traditional idea of the enterprise network boundary is vanishing. Enterprises are grappling with the reality where the network perimeter is defined by the employee identity. Securing this “Identity Perimeter”…
Usable security. Does it exist?
That’s a question our CEO Todd McKinnon recently sat down to discuss with a16z’s Michael Copeland and Pindrop Security’s co-founder and CEO Vijay Balasubramaniyan. Whether it’s through an experience that’s almost invisible in a user’s workflow or the promise of simple security with an added authentication layer,…