Security and Privacy Drive Competitive Advantages

• Security and Privacy Drive Competitive Advantages, Says Ping Identity CISO Advisory Council


• CISOs (Chief Information  Security Officers) Share Best Practices for Securing Customer Identity Data and Implementing Effective Insider Threat Programs

Ping Identity, a pioneer in Intelligent Identity, today announced two new white papers from its CISO Advisory Council on securing customer data and combating insider threats. 

The Ping Identity CISO Advisory Council is made up of security experts from a range of markets spanning healthcare, banking, travel and leisure, energy, technology, consulting and education. These CISOs illuminate the current challenges and opportunities impacting today’s security leaders. Members of the 2019 council represent organizations including Allegiant Air, American Red Cross, BlueCross BlueShield Tennessee, Carlson Wagonlit Travel, City National Bank, Gates Corporation, GCI, PowerSchool Group LLC, TechnipFMC, Vertafore and Vista Consulting Group. 

This year, the Council addressed some of the industry’s most pressing challenges, including managing insider threats and securing customer data. It’s clear that few enterprises are immune to these issues. According to a report from Crowd Research Partners, 90% of organizations feel vulnerable to insider attacks, while a separate PwC report cites 32% of consumers will leave a brand they love after just one bad experience. In Ping Identity’s newly-published white papers, the CISO Advisory Council shares actionable advice for how enterprises can maneuver these complex challenges. 

“The CISO Advisory Council provides a unique perspective into the obstacles facing today’s security leaders and the steps they’re taking to address them,” said Robb Reck, chief information security officer, Ping Identity. “These papers provide the blueprints for other enterprises to solve these critical problems within their own organizations, while the guidance from the leaders who make up our Council helps drive the evolution of our products and services.” 

• Read findings in the papers titled :  “Securing Customer Identity Data,” and “Building an Effective Insider Threat Program