Business Continuity Management / Disaster Recovery , COVID-19 , Governance & Risk Management

Profiles in Leadership: Dave Snyder, Independence Blue Cross

Why CISOs Need to Be Both a Technologist and an Evangelist
Dave Snyder Chief Information Security Leader, Independence Blue Cross

Dave Snyder of Independence Blue Cross in Philadelphia has been in security leadership long enough to know: It's not about whether you have a technology foundation or lean more toward leadership. It's about having both, and about being a security evangelist, too.

See Also: Live Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry

In addition to his role at Independence Blue Cross, where he also is Director of Information Security and Risk Management, Snyder is a founding member of the CyberEdBoard Global Community.

In this video interview with Information Security Media Group, he discusses:

  • The CISO role and responsibilities;
  • The importance of being a security evangelist;
  • How to improve the CISO's upward visibility to management and the board.

As Chief Information Security Leader, Snyder acts as an evangelist for spreading information security tips, techniques, and strategy through-out the organization. He currently leads a mufti-disciplinary information security team that includes Security Operations, Governance, Risk Management, and Compliance. Beyond managing the information security organization, Snyder has shaped the Security Leadership Team to integrate information security practices in business and IT operations. He further chartered the Corporate Security and Privacy Council to increase corporate sponsorship and visibility bringing the information security program to the forefront of the Executive Operating Committee objectives.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.