Security Experts:

Connect with us

Hi, what are you looking for?


CISO Strategy

Dragos Hires Former PepsiCo Deputy CISO Steve Applegate

Industrial cybersecurity firm Dragos has hired Steve Applegate, former VP and Deputy CISO at PepsiCo, as Chief Information Security Officer (CISO).

Industrial cybersecurity firm Dragos has hired Steve Applegate, former VP and Deputy CISO at PepsiCo, as Chief Information Security Officer (CISO).

The cybersecurity veteran took to LinkedIn this week to share the news. “I’m very excited to announce that I’ve joined the Dragos team! I’ve been watching this exciting company for many years, as well as benefiting from their cybersecurity expertise and all their contributions to the industry,” he wrote. “And just this week I joined them in their mission to safeguard civilization.”

After serving in the U.S. Air Force for more than ten years as a computer scientist, Applegate moved to the private sector and has served in senior cybersecurity roles at industrial firms including Marathon Petroleum, Saudi Aramco and Boeing, and has served as a cyber threat and vulnerability program manager at North American Electric Reliability Corporation (NERC).

Dragos Logo

News of Applegate’s hire comes on the heels of a massive $110 million Series C funding round announced by Dragos in December 2020, which brought the total raised by the company to $158 million.

“Steve is a great addition to our team as he is mission driven, which aligns with our focus at Dragos,” Robert M. Lee, CEO and Co-Founder of Dragos, told SecurityWeek. “From his start in the Air Force to his time spent in Aviation, Electric, Oil and Gas, and Manufacturing companies serving in various security leadership roles, he’s consistently shown his passion and expertise on the topic of security and our industrial community. He will not only continue the work we’ve done on our internal security but also be customer facing to help us continue to partner with our community across the breadth of their OT/ICS cybersecurity journey.”

Dragos was founded in May 2016 by former members of the U.S. intelligence community who worked on identifying, analyzing and responding to ICS-focused cyberattacks coming from nation-state attackers.

Related: Learn More About Industrial Cybersecurity at SecurityWeek’s ICS Cyber Security Conference

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

CISO Conversations

U.S. Marine Corps and SAIC CISOs Discuss the Differences Between Government and Private Industry

CISO Conversations

In this edition of CISO Conversations, SecurityWeek talked to two vendor CISOs: Chris Morales, CISO at security and analytics firm Netenrich; and Laura Whitt-Winyard,...

CISO Conversations

SecurityWeek speaks to Steve Katz, widely known as the world’s first Chief Information Security Officer (CISO).

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

CISO Conversations

SecurityWeek examines the role of the virtual CISO in a conversation with Chris Bedel and Greg Schaffer.


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...