Kevin Morrison is the Managing Director of Enterprise Information Security, & CISO at Alaska Air Group in Seattle, WA. Alaska Air Group has both Alaska Airlines and Horizon Airlines under its umbrella, and Kevin has been fortunate to serve in this role since May 2020. Kevin has held previous CISO roles at Coinstar, PulteGroup, and at Jones Day, which is one of the oldest and largest law firms in the world. His background spans nearly 22 years in IT, with over 16 of them in Information and Cybersecurity. Kevin’s passion for people and security has included building and leading teams focused on incident management, operations, DLP, mobility, forensics, compliance, policy, privacy, and business continuity in innovative and highly regulated environments across public and private industries.
Kevin has had the pleasure to present extensively within the Information Security community and has served on several advisory and governance boards, and in March 2015, was selected by his peers as the ISE® Southeast People’s Choice Award Winner. He holds a B.S. in IT from UMass Lowell, and an MBA from Pacific Lutheran University, while maintaining CISSP, CISM, and CISA certifications.
Cyber Strategy Retreat
“The Strategy of Influence in the Cybersecurity Program”
How do you show up? How do you model, mentor, communicate and collaborate to build trust? It’s no secret that the demands of a CISO are not for the faint of heart. Between carefully walking a tightrope of an ever-changing threat landscape and balancing the need to enable organizations to rapidly innovate and execute, a CISO must creatively influence stakeholders across the organization for the Cybersecurity program to succeed. Without such influence, the ability to build partnerships with your team, peers, customers, the Board of Directors, or key parts of the business can quickly become a lesson learned in what not to do.
In this Keynote presentation, Kevin Morrison, Managing Director of Enterprise Information Security, & CISO at Alaska Air Group will share stories, insights, and recommendations that attendees can take away for building a strategy of influence and improving their security program’s success.