Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

CISO Strategy

Google Cloud Hires First CISO

Google has snapped up Goldman Sachs cybersecurity veteran Phil Venables to manage security and risk for the important Google Cloud franchise.

Venables, a cybersecurity leader with a storied career in the financial services sector, will be Google Cloud’s first Chief Information Security Officer (CISO).

Google has snapped up Goldman Sachs cybersecurity veteran Phil Venables to manage security and risk for the important Google Cloud franchise.

Venables, a cybersecurity leader with a storied career in the financial services sector, will be Google Cloud’s first Chief Information Security Officer (CISO).

According to published reports, Venables will manage Google Cloud’s internal risk in addition to responsibles for securing cloud migrations and customer defenses.

The Venables hire comes on the heels of Google’s pick up of Jeanette Manfra, a former assistant director for cybersecurity at the Department of Homeland Security, who was heading up a new “Office of the CISO” at Google Cloud.

Venables brings instant credibility to the Google Cloud security program.  In addition to his Goldman Sache tenure, he has managed security at several major global banks, including Deutsche Bank, Barclays and Standard Chartered.

Related: Google Cloud Unveils New Service for Government Workloads

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

CISO Conversations

U.S. Marine Corps and SAIC CISOs Discuss the Differences Between Government and Private Industry

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Risk Management

A threat-based approach to security often focuses on a checklist to meet industry requirements but overlooked the key component of security: reducing risk.

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.