Steve is a visionary cybersecurity executive with over 20 years of experience in the industry. In this role as Chief Product Officer and CISO, Steve leads global sales, technology, product direction, and go-to-market strategy for XYPRO’s cutting-edge cybersecurity solutions that fortify the digital backbone of economies worldwide.
Based on his unique leadership, strategic vision, deep cybersecurity experience and penchant for relationship building with customers and partners, Steve has helped transform XYPRO into a top tier cybersecurity provider evidenced by record growth and accelerated adoption of XYPRO’s threat detection and compliance solutions across diverse sectors.
As a passionate advocate for cybersecurity, Steve is dedicated to demystifying the complexities of the industry, sharing invaluable insights and experiences across global stages as a sought-after speaker at events and conferences.
His contributions extend beyond the podium; as a former member of the ISSA CISO Advisory Council, the X9 Security Standards Committee, the Forbes Tech Council, and a patent holder, he has influenced pivotal cybersecurity standards and innovations.
The digital landscape is changing faster than many organizations can keep up with. Data breaches, sophisticated ransomware attacks, and critical... Read more.
As organizations continue to face increasingly sophisticated cyber threats, the traditional perimeter-based security model has proven inadequate. ZERO Trust arc... Read more.
The Ransomware Menace
Ransomware is a concern across all industries. High-profile attacks make headlines and cause substantial disruptions. The reason these ... Read more.
PCI DSS (Payment Card Industry Data Security Standard) compliance is a set of security standards with which organizations who handle payment card data must comp... Read more.
ZERO Trust is a straightforward concept - trust nothing, verify everything. Successful implementation can be difficult though, because retrofitting legacy syste... Read more.
As we enter 2023, the cybersecurity threat landscape evolves and expands. From the rise of IoT cloud-based attacks to an increased focus on edge computing and I... Read more.
In most mission critical environments, SAP HANA is the lifeblood of an organization. SAP HANA (High-performance ANalytic Appliance) is a highly performant, high... Read more.
The probability that an organization will experience a breach in the next 24 months is high and the current time to identify and contain a breach is still 280 d... Read more.
Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy. A little over a year after it was published, the council rel... Read more.
Well, we made it. 2021 is finally in the books. The gift of LOG4J and the onslaught of vendor emails made for an eventful end to 2021. Take a minute (and I only... Read more.
Have we become numb to the news of security breaches? Unfortunately, the attacks on our businesses, personal lives and even global infrastructure are not slowin... Read more.
The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use o... Read more.
CashApp, Zelle, Venmo, ApplePay, Square - the payments industry is growing and expanding into areas we hadn’t imagined. Everyone relied on it before the pande... Read more.
A recent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of t... Read more.
Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy. A little over a year after it was published, the council relea... Read more.