And Security For All
On this episode of And Security For All, guest host Jonathan Kimmitt has current Oklahoma CISO champion Chad Kliewer on to give you the champions insight into what a CISO really does. Describing what a CISO does can be difficult at best. The CISO showdown was a simple concept that turned into an industry phenomenon and became a mainstay at conferences in Oklahoma. Tune in to find out why Chad is the current champion. Special Guests: Jonathan Kimmitt and Chad Kliewer Jonathan Kimmitt - As a leader in Information Security across the academic sectors, I have developed an accomplished...
info_outline 2025 Cyber Trends: Expert Forecasts and Action StepsAnd Security For All
As we close out 2024, the cybersecurity landscape looms larger than ever. What cyber storms are brewing for 2025? Three cyber leaders from Akamai Technologies give us their predictions and what might happen—and counsel on what we can do about it. We’ll focus on the resurgence of DNS-based attacks, the evolution of DDoS tactics, emerging threats in the quantum and AI domains—and more. Today's Special Guests: ...
info_outline ENCORE: Shaping the Future of Cyber ResilienceAnd Security For All
On this episode of And Security For All, host Kim Hakim brings Connie Matthews on the show to discuss cyber resiliency. During their conversation they will cover building resilient teams, positive leadership, staying proactive, and learning from past mistakes.
info_outline ENCORE: Cyber-Consciousness: Navigating Risks with Awareness and ClarityAnd Security For All
On this episode of And Security For All, host Kim Hakim has Mark Sangster, VP and Chief of Strategy at Adlumin, on the show to discuss Cyber-Consciousness. During their discussion they will be covering how to align internal awareness with external risks to make thoughtful, context-driven business decisions. Mark Sangster is the author of No Safe Harbor: The Inside Truth About Cybercrime and How to Protect Your Business. He is an award-winning speaker at international conferences and prestigious stages including the Harvard Law School and RSA Conference. Mark has appeared on CNN News...
info_outline ENCORE: CISO’s with a Leadership MindsetAnd Security For All
On this episode of And Security For All, guest host Jonathan Kimmitt has Gordon Rudd on the show to cover how the CISO role has leadership at its core. The discussion will surround how CISOs can cultivate a leadership mindset to inspire teams, manage risks, and deliver strategic value. Gordon Rudd: Career Designer for CISOs, CIOs, & CTOs. Coaching technical people is my greatest passion. I founded Stone Creek Coaching to give back to the technical community I've been so fortunate to be a part of for 35 years. I help people discover their potential and become leaders in their...
info_outline ENCORE Strengthening Security Through Data Classification and GovernanceAnd Security For All
On this episode of And Security For All host Kim Hakim has Zach Lewis on the show to discuss data classification, governance, and AI.
info_outline Cyber-Consciousness: Navigating Risks with Awareness and ClarityAnd Security For All
On this episode of And Security For All, host Kim Hakim has Mark Sangster, VP and Chief of Strategy at Adlumin, on the show to discuss Cyber-Consciousness.
info_outline CISO’s with a Leadership MindsetAnd Security For All
On this episode of And Security For All, guest host Jonathan Kimmitt has Gordon Rudd on the show to cover how the CISO role has leadership at its core.
info_outline Strengthening Security Through Data Classification and GovernanceAnd Security For All
On this episode of And Security For All host Kim Hakim has Zach Lewis on the show to discuss data classification, governance, and AI.
info_outline Now is the Time to Understand Gen AI SecurityAnd Security For All
Join Akamai's Steve Winterfeld (Advisory CISO) and Sean Flynn (Director of Security Strategy) as they explore the security risks associated with Gen AI/LLM.
info_outlineOn this episode of And Security For All, guest host Jonathan Kimmitt has Gordon Rudd on the show to cover how the CISO role has leadership at its core. The discussion will surround how CISOs can cultivate a leadership mindset to inspire teams, manage risks, and deliver strategic value.
Gordon Rudd:
Career Designer for CISOs, CIOs, & CTOs. Coaching technical people is my greatest passion. I founded Stone Creek Coaching to give back to the technical community I've been so fortunate to be a part of for 35 years. I help people discover their potential and become leaders in their technical communities. I've turned 35 years of experience in technology, cybersecurity, and building high-performance teams into a program that will put your squarely in charge of your career.
After working in all areas of technology; programming, systems engineering, network engineering, project management, enterprise architecture, information security, vendor management, risk management, and process improvement, I have a unique perspective on career designs for techies. I'm a results-oriented technology coach and mentor and coach.
I founded the CISO Mentoring Project and remain an engaged mentor to many aspiring and active CISOs across the country. I have taught PDI (Professional Development Institute) courses for (ISC)2, helping cybersecurity leaders, create their Path to CISO and lead educational events, videos and content for (ISC)2 members. As a recognized expert, I am frequently sought after to speak at industry events on information security, GRC and enterprise risk management.
Jonathan Kimmitt:
As a leader in Information Security across the academic sectors, I have developed an accomplished career driving the strategy and management of business transformation, technical migrations, IT data security, disaster recovery and technology planning. I’ve found my success has been achieved by combining hands-on expertise in information security management and cybersecurity to ensure the optimal performance of critical, enterprise-scale environments.
I specialize in developing and implementing enterprise technology models, security architecture and best practices to maintain internal control; introducing security framework, tools and solutions to stimulate performance improvements; and aligning business requirements with information security processes. Recognized as a versatile leader, I excel at guiding cross-functional technology resources through critical projects, as well as influencing key stakeholders and decision makers on the adoption of new security framework and technical best practices to meet operational goals.
I believe that technology is the foundation for a successful business. I take pride in directly contributing to the success of an organization by supporting the development and management of security tools and solutions and am committed to expanding my skills and knowledge so that I can continue to meet corporate and customer goals.