3rd Party Risk Management , Cybercrime , Fraud Management & Cybercrime

Profiles in Leadership: Mustapha Kebbeh

Mitigating Supply Chain Risk; Mentoring the Next Generation of Leaders
Mustapha Kebbeh, Chief Information Security Officer, Brinks Inc.

Ransomware and nation-state threats are daunting. But the threat that concerns Mustapha Kebbeh the most is supply chain risk. The Brinks CISO discusses how he has tackled this, as well as the challenges of tool complexity and peer collaboration.

See Also: Take Inventory of Your Medical Device Security Risks

In an interview with Information Security Media Group as part of the CyberEdBoard's ongoing Profiles in Leadership series, Kebbeh discusses:

  • The unique challenge of supply chain risk;
  • Strategies for teaming up with business-side peers;
  • The rewards of mentoring and having been mentored.

As CISO for a global enterprise, Kebbeh heads vision and strategy for all IT cybersecurity, enterprise risk management, and IT enterprise architecture affecting 75,000 employees around the world. His goal is to protect information data and technologies from actual and potential threats, both internal and external to the organization.

CyberEdBoard is ISMG's premier members-only community of senior-most executives and thought leaders in the fields of security, risk, privacy and IT. CyberEdBoard provides executives with a powerful, peer-driven collaborative ecosystem, private meetings and a library of resources to address complex challenges shared by thousands of CISOs and senior security leaders located in 65 different countries worldwide.

Join the Community - CyberEdBoard.io.

Apply for membership


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.