Javed Ikbal - "Aligning Executive Perspectives to Strengthen Corporate Data Security"
Javed Ikbal, CISO and Vice President of Information Security & Risk Management at Bright Horizons, discusses approaches to secure enterprise networks by aligning executive perspectives. He explains framing security in terms of revenue, reputation, and regulatory metrics to gain leadership support. Javed outlines threat modeling, data prioritization, and wireless-first strategies for resilient network architecture.
WOW-24-7
Contact Centers
EPISODE: Javed Ikbal CISO and Vice President of Information Security & Risk Management @ Bright Horizons Aligning Executive Perspectives to Strengthen Corporate Data Security Episode 12
What’s Inside [2:15] Introduction to Javed Ikbal [28:13] Full Podcast Episode [3:06] Highlights Episode [5:26] Protecting Organizations by Segregating and Keeping Necessary Data [2:26] Managing Access Proliferation Without Sacrificing Privacy and Security [5:12] Importance and Impact of Wireless First Trend to Corporate Security [2:40] Reframing CISO's Role in Business Terms for Executive Alignment [4:46] Protecting Business Networks Through Strategic Failure Mode Analysis [0:59] Detect, Mitigate, Prevent Data Exfiltration Through Breach Preparation [0:58] Short - Protecting Organizations by Segregating and Keeping Necessary Data [0:59] Short - Reframing CISO's Role in Business Terms for Executive Alignment
EPISODE: A Podcast with Javed Ikbal Javed Ikbal, CISO and Vice President of Information Security & Risk Management at Bright Horizons, discusses approaches to secure enterprise networks by aligning executive perspectives. He explains framing security in terms of revenue, reputation, and regulatory metrics to gain leadership support. Javed outlines threat modeling, data prioritization, and wireless-first strategies for resilient network architecture.
Full Episode “Frame your security program in terms of revenue, reputation, and regulation to resonate with executive leadership.”
5 (3:06) Episode Highlights
(5:26) Protecting Organizations by Segregating and Keeping Necessary Data “If we keep unnecessary data, we amplify the impact of a potential breach, making every lost record a liability.”
(2:26) Managing Access Proliferation Without Sacrificing Privacy and Security “This proliferation will continue, and the only thing that could stop it is regulations, which isn’t coming. Privacy and security teams must reeducate stakeholders on the principle of least privilege: don’t keep unnecessary data just because it’s available.”
8 (5:12) Importance and Impact of Wireless First Trend to Corporate Security “If corporations stop cabling their offices with CAT6 or CAT7 Ethernet cables, they can save a lot of money, provided they have sufficient wireless infrastructure to serve everyone.”
(2:40) Reframing CISO's Role in Business Terms for Executive Alignment "CISOs must translate security programs into the metrics that matter to executives: revenue, reputation, regulation.”
(4:46) Protecting Business Networks Through Strategic Failure Mode Analysis “You look at things that can break and how they break and, where possible, you put in countermeasures.”
11 (0:59) Detect, Mitigate, Prevent Data Exfiltration Through Breach Preparation “Assume the breach will happen and build your program to address it. How quickly can you detect and mitigate it? How do you prevent data from leaving your environment? If you answer those, you can back calculate, going reverse and design your security program based on that.”
YOUTUBE SHORT: “If we keep unnecessary data, we amplify the impact of a potential breach, making every lost record a liability.” - Javed Ikbal

13 YOUTUBE SHORT: “CISOs must translate security programs into the metrics that matter to executives: revenue, reputation, regulation. - Javed Ikbal

14 Watch our podcast on your favorite platform
