A Veteran CISO’s Perspective: 20 Years of Cyberthreat Evolution

You are here:
Date: May 19, 2026
Time: 6:30 AM PDT | 9:30 AM EDT | 7:00 PM IST

Topic: A Veteran CISO’s Perspective: 20 Years of Cyberthreat Evolution

Register Now

Abstract:

Over the past two decades, the cybersecurity landscape has transformed dramatically, from opportunistic viruses and basic phishing attempts to highly organized ransomware groups, nation-state campaigns, supply-chain compromises, and AI-driven attacks. This webinar offers a veteran CISO’s perspective on how cyberthreats, defense strategies, and the role of security leadership have evolved in response to these changes. Drawing from real-world experience managing incidents, building security programs, and advising executive leadership, the session highlights how security priorities have shifted from perimeter defense to resilience, risk management, and business alignment. It also explores how modern CISOs balance emerging technologies such as cloud, AI, and IoT with growing regulatory pressures and increasingly sophisticated adversaries. Attendees will learn key lessons from two decades of cyber defense, along with practical strategies to strengthen their organizations security postures and predictions for how threats may evolve in the coming years.

Key Takeaways: 

  1. How cyberthreats have evolved over the decades
  2. Key lessons from major security incidents 
  3. The evolution of the CISO role from technical security operator to business risk advisor 
  4. Modern security leadership priorities
  5. How to prepare for future AI-driven threats and critical infrastructure risks

Speaker:

 Bob Fabien Zinga, Information Warfare Commander, U.S. Navy

Bio:  Bob is the former Chief Information Security Officer (CISO) at Santa Clara University and an Information Warfare Commander (CEO/GM level) in the U.S. Navy Reserve. He is recognized for his knowledge, vision, leadership, and collaborative style in effectively approaching a constantly evolving and complex area of information security and risk management. He demonstrates the ability to establish positive internal and external C-level and boardroom relationships to effect significant change and drive a cybersecurity risk management strategy forward while enabling organizational growth.

 

Share this Article

Facebook
Twitter
LinkedIn
WhatsApp
Pinterest

You may also like

Train with EC-Council

  • By clicking the Submit button, I give my consent to the processing of my personal data, including for promotional purposes, as provided in the Privacy Policy, and agree to the Terms.

Cyber Talks
Recent Posts