Unlock access to Thinkers360 AI to fast-track your search for analysts and influencers.
This feature is available for Enterprise Lite and Enterprise Members Only.
You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join our Content Plan or become a contributor by posting your own personally-authored content into the system via Add Publication or Import Publication.
Dashboard
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Interested in getting your own thought leader profile? Get Started Today.
Lee Vorthman
Chief Security Officer at Oracle
Denver Metropolitan Area, United States
As an experienced C-Level executive (CSO, CISO, CTO) and board member I have a strong background in governance, finance, technology, risk management, human resource management, compliance and strategy for both large public companies and startups. I have a breadth of experience across multiple industries including Technology, Government & Defense, Education and Oil & Gas. I have successfully partnered with businesses to build and mature security programs that reduce overall risk, create trust and align with the organization's goals and values. I have also successfully created and executed plans to help public companies evaluate and capitalize on new market opportunities for technology and security. As a veteran and board member, I bring a unique perspective into the evolving security and technology landscape and have successfully advised multiple startups and non-profits to success.
I am currently the Chief Security Officer (CSO) for Oracle Advertising where I oversee the security strategy and operations for one of the world's largest digital marketing and advertising platforms. I lead a global team of security experts who are responsible for protecting the data, assets, and reputation of our clients and partners across the advertising ecosystem. I have previously been a Chief Information Security Officer and a Chief Technology Officer.
Thoughts and opinions are my own and not reflective of my employer.
Lee Vorthman
Points
Academic
0
Author
28
Influencer
26
Speaker
0
Entrepreneur
0
Total
54
Points based upon Thinkers360 patent-pending algorithm.
How CIOs, CTOs and the rest of the C-Suite Can Better Support CISOs
Import from wordpress feed
July 31, 2024
There are a variety of reporting structures for CISOs, such as reporting to the CTO, CIO, CFO or CEO. No matter who the CISO reports to, the CISO is still an integral part of the C-Suite. Yet despite this, CISOs don’t always receive full support from the rest of their C-Suite peers, which can caus
A CISO’s Analysis Of the CrowdStrike Global Outage
Import from wordpress feed
July 23, 2024
Overnight from July 18 to July 19, 2024, Windows systems running CrowdStrike ceased functioning and displayed the blue screen of death (BSOD). As people woke up on the morning of July 19th they discovered a wide reaching global outage of the consumer services they rely on for their daily lives, such
Tips For Managing Anxiety, Stress, Burnout and Mental Health
Import from wordpress feed
July 16, 2024
CISOs have been in the hot seat lately, particularly related to personal liability, increasing regulatory pressure and a shifting technological landscape. Compound these macro issues with the internal demands CISOs deal with such as incidents, budget cuts or political battles for relevancy and it is
How Should CISOs Think About Risk?
Import from wordpress feed
July 10, 2024
There are a lot of different ways for CISOs to think about and measure risk, which can be bucketed into two different categories. Qualitative measurement, which is a subjective measurement that follows an objective process or quantitative measurement, which is an objective measurement grounded in do
Should CISOs Be Technical?
Import from wordpress feed
July 02, 2024
Don’t want to read this? Watch a video short of the topic here. There are a lot of different paths to becoming a CISO and everyone’s journey is different, however two of the most common paths are coming up through the technical ranks or transitioning over from the compliance function. Co
Are Security Certifications Worth Renewing?
Import from wordpress feed
June 18, 2024
Almost weekly I see someone post a question on social media asking: “Is renewing my security certification worth it?” This is a valid question since security certifications are often expensive, time consuming and hard won. Maintaining your security certification may be required to land a
Navigating Hardware Supply Chain Security
Import from wordpress feed
June 04, 2024
Lately, I’ve been thinking a lot about hardware supply chain security and how the risks and controls differ from software supply chain security. As a CSO, one of your responsibilities is to ensure your supply chain is secure, yet the distributed nature of our global supply chain makes this a c
Accelerate Your CISO Career By Investing In Your Brand
Import from wordpress feed
May 28, 2024
When I was in the military there was a single consistent phrase that was repeated to us over and over again – reputation matters. Even though the military is a large organization, your specialization creates a small group and so how you perform and behave will stay with you throughout your car
Whats The Difference Between A CSO and CISO?
Import from wordpress feed
May 21, 2024
Like Arnold Schwarzenegger to Danny DeVito in the movie Twins, the Chief Security Officer (CSO) role is the big brother to the Chief Information Security Officer (CISO) role. What is the difference between these two roles and what skills does a CISO need to focus on if they aspire to become a CSO? I
When Evaluating A New CISO Role Don’t Forget The SEC 10-K And Other Governance Forms
Wordpress
May 14, 2024
Did you know there are publicly available documents that can provide a wealth of information about how a public company governs and prioritizes cybersecurity and risk? When preparing for a new CSO / CISO role it is important to research the company thoroughly and areas that have a wealth of information are SEC forms and board documents. CSO / CISO candidates should review these documents to get a sense of how the company views the security function and also identify red flags so you can discuss these topics during the interview.
Start Preparing For Your Next Role During Your Current Role
Wordpress
May 07, 2024
My latest article discusses how to set your career on a path for success by planning for your next role in your current role. In this article I discuss top tips such as how to gain experience, what credentials to get and how to be ready when your dream job opens up!
Like my articles? Follow me, subscribe to my newsletter or subscribe to my blog (link in bio).
If Data Is Our Most Valuable Asset, Why Aren’t We Treating It That Way?
blog.370security.com
April 23, 2024
Over the past two decades, data has become the most valuable asset for every business. However, recent ransomware attacks and data breaches show that businesses continue to fail to properly secure and govern this critical asset.
In my latest newsletter article, I explore how businesses have evolved into digital data hoarders and cover common data security assumptions that can lead to hidden risks. I conclude the article by making several recommendations for best practices to properly secure and govern your data, so data breaches and ransomware can become a non-event.
It's time to take action and properly secure your data. Check out the article for some valuable insights and recommendations.
Tags: Business Continuity, Cybersecurity, Digital Transformation
Security Considerations For M&A and Divestitures
blog.370security.com
April 16, 2024
Mergers, acquisitions, and divestitures are commonplace in the corporate world. However, have you considered the security implications and risks that come along with them? How involved should the security team be and what are some key risks to consider? In my latest newsletter article, I explore specific security considerations for M&A and divestitures. Check it out!
Tags: Business Strategy, Cybersecurity, Mergers and Acquisitions
Are We Peak CISO?
Import from wordpress feed
April 02, 2024
Let’s be honest…the CISO role is weird right now. It is going through a transformative phase and the industry is at an inflection point similar to what other C-Level roles (like the CFO) have gone through in the past. What makes the role weird? The CISO community and any company that has
Security Theater Is The Worst
370 Security Blog
March 26, 2024
We have all been there…we’ve had moments in our life where we have had to “comply” or “just do it” to meet a security requirement that doesn’t make sense. We see this throughout our lives when we travel, in our communities and in our every day jobs. While some people may think security theater has merit because it “checks a box” or provides a deterrent, in my opinion security theater does more harm than good and should be eradicated from security programs.
What’s The Relationship Between Security Governance and Organizational Maturity?
370 Security Blog
March 19, 2024
Organizational and security governance is touted as a key component of any successful security program. However, I’ve been thinking about governance lately and how it relates to the overall maturity of an organization. This has prompted some questions such as: what happens if you have too much governance? and What’s the relationship between security governance and organizational maturity?
Are Traditional IT Roles Still Relevant In Today’s Modern Security Org?
370 Security Blog
March 12, 2024
First, let’s talk about cloud service models most companies will consume because this is going to determine what roles you will need within your security organization. This post is also assuming you are not working at a hyper-scale cloud organization like AWS, Azure, Google Cloud or Oracle because those companies still deploy hardware as part of the services they consume internally and provide to their customers.
The Dichotomy Of Security
370 Security Blog
March 05, 2024
If you have ever read Extreme Ownership or The Dichotomy of Leadership by Jocko Willink, then you will be familiar with the concept of dichotomy and how opposing forces of a skill set can compliment each other. Mastering both sides can allow flexibility and increase the effectiveness of that skill set when dynamically applied to a given situation. This is true in the security space, where fundamental opposing forces need to be balanced in order to manage risk and achieve success. Let’s take a look at a few examples.
We Are Drowning In Patches (and what to do about it)
370 Security Blog
February 27, 2024
First, let’s talk about the patching landscape organizations need to deal with. This is largely spit into two different areas. The first area is operating system (OS) and service patches. These are patches that are released periodically for the operating systems used by the business to run applications or products. Common operating systems for production workloads will be either Windows or Linux and will have stability, security or new feature patches released periodically.
Are Phishing Campaigns Worth It?
Import from wordpress feed
February 22, 2024
Phishing campaigns are often touted as a complementary exercise to security training as a way to measure training effectiveness. The thought is, if your training is effective, users will be less likely to fall for and click on phishing emails, which will correlate to a decrease in the number of phis
Using Exceptions As A Discovery Tool
Import from wordpress feed
February 13, 2024
Security exceptions should be used sparingly and should be truly exceptional circumstances that are granted after the business accepts a risk. In mature security programs the security exceptions process is well defined and has clear criteria for what will and will not meet the exception criteria. In
Defining Your Security Front Door
Import from wordpress feed
February 06, 2024
A key skill for any security program is to partner with and enable the business to be successful. CISOs need to ensure their security teams are approachable, reasonable and most importantly balancing the needs of the business against potential security risks. While security teams exist to help prote
Are Security Certifications Worth Renewing?
LinkedIn
June 20, 2024
Along with the variety of certifications there are different ways to earn a certification. The least expensive and most time consuming is to purchase the course material, self study and then sit for the exam. The most expensive and least time consuming is to attend a boot camp and then test for the exam on the last day. If you are lucky your employer will pay for or reimburse the expense of the certification.
What's Better - Complete Coverage With Multiple Tools Or Partial Coverage With One Tool?
LinkedIn
May 02, 2024
The debate between complete coverage with multiple tools versus imperfect coverage with one tool regularly pops up in discussions between security professionals. What we are really talking about is attempting to choose between maximum functionality and simplicity. Having pursued both extremes over the course of my security career I offer this post to share my perspective on how CISOs can think about navigating this classic tradeoff
Join Thinkers360 for free! Are you a Reader/Writer, Thought Leader/Influencer (looking to increase your earnings), or an Enterprise User (looking to work with experts)?