The document discusses how boards should respond to cybersecurity risks. It argues that boards need to make cybersecurity a priority and share responsibility for setting the cybersecurity agenda. The CIO should play a key advisory role to the board on technology implications, and boards may benefit from appointing a technology expert to the board. If the CIO is not board-ready, companies should consider elevating the CIO role or creating a Chief Risk Officer role to address cybersecurity at the board level.
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
This white paper summarizes the results of a survey done by RSA, NYSE Governance Series, and Corporate Board Member, in association with Ernst & Young, with 200 audit committee members responding on a variety of issues regarding their cyber risk oversight program.
Digital has increased businesses’ cybersecurity risk – and yet few have elevated security to a senior leadership concern, according to our recent research. Here’s what businesses are thinking about cybersecurity, and a framework for strengthening their security strategies.
In January-February 2016, the EIU, surveyed 1,100 senior executives on data security practices within their firms. The survey’s primary objective was to analyse the differences, if any, between the C-suite and senior IT executives on data security.
The survey sample was recruited from companies with between $500 million and $10 billion in revenues, and is equally representative of the Americas, Asia-Pacific and European regions. The panel came from 20 industries, with no single industry accounting for more than 14% of the total.
This was a survey of senior executives. The C-suite segment, sometimes referred to herein as senior management or corporate leadership, consisted exclusively of C-suite executives (eg CEOs, CFO, COOs). The security segment, sometimes referred to herein as the security executives, consisted of the CIO and those who identified themselves as Chief Data Officers or Chief Information Security Officers (CISOs).
Each panel was asked an identical set of 20 questions, and the results have been reviewed for insight and commentary by a panel of independent experts.
Ensuring Cyber Security Resilience with a Skilled Workforce Zeshan Sattar
Cyber-attacks are increasing in frequency and effectiveness. The threat landscape, threat actors and tools employed are many and varied. But how have the threats evolved and what does the future evolution look like? CompTIA will describe the past, present and future evolution of Cyber Security threats and how organisations are trying to keep pace by building capability to defend against these threats. This presentation focuses on equipping your staff with the right skills to address these ever-changing challenges and what might the future shape of Cyber Teams look like.
http://tatainteractive.com/ - A comprehensive cyber security-training program in an organization needs to be multi-tiered and nuanced to be effective. Tata Interactive Systems cybersecurity training curriculum leverages games and simulations to improve the profile of your business. It is also ideal for students who are currently working full-time and are aspiring cybersecurity professionals. TIS can help you to learn more, please visit!
Learn how an integrated approach, strategic reach and measurement systems of Influencers point to a new kind of security organization and a new breed of leader. For more information on IBM Systems, visit http://ibm.co/RKEeMO.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
Protecting enterprise systems against cyber threats is a strategic priority, yet only 42% of executives are confident they could recover without impacting their business from a cyber event. Find out the hidden risks of shadow IT, cloud and cyber insurance.
The past few years have seen an explosion of cyber attacks, and with the 2015 OPM breaches underscoring the vulnerability of government data, agencies are racing to implement proactive, holistic cybersecurity measures. In order to measure changing federal perceptions and experiences regarding the present threat landscape, Government Business Council (GBC) and Dell conducted an in-depth research survey as a follow-up to a previous June 2014 GBC study.
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
This white paper summarizes the results of a survey done by RSA, NYSE Governance Series, and Corporate Board Member, in association with Ernst & Young, with 200 audit committee members responding on a variety of issues regarding their cyber risk oversight program.
Digital has increased businesses’ cybersecurity risk – and yet few have elevated security to a senior leadership concern, according to our recent research. Here’s what businesses are thinking about cybersecurity, and a framework for strengthening their security strategies.
In January-February 2016, the EIU, surveyed 1,100 senior executives on data security practices within their firms. The survey’s primary objective was to analyse the differences, if any, between the C-suite and senior IT executives on data security.
The survey sample was recruited from companies with between $500 million and $10 billion in revenues, and is equally representative of the Americas, Asia-Pacific and European regions. The panel came from 20 industries, with no single industry accounting for more than 14% of the total.
This was a survey of senior executives. The C-suite segment, sometimes referred to herein as senior management or corporate leadership, consisted exclusively of C-suite executives (eg CEOs, CFO, COOs). The security segment, sometimes referred to herein as the security executives, consisted of the CIO and those who identified themselves as Chief Data Officers or Chief Information Security Officers (CISOs).
Each panel was asked an identical set of 20 questions, and the results have been reviewed for insight and commentary by a panel of independent experts.
Ensuring Cyber Security Resilience with a Skilled Workforce Zeshan Sattar
Cyber-attacks are increasing in frequency and effectiveness. The threat landscape, threat actors and tools employed are many and varied. But how have the threats evolved and what does the future evolution look like? CompTIA will describe the past, present and future evolution of Cyber Security threats and how organisations are trying to keep pace by building capability to defend against these threats. This presentation focuses on equipping your staff with the right skills to address these ever-changing challenges and what might the future shape of Cyber Teams look like.
http://tatainteractive.com/ - A comprehensive cyber security-training program in an organization needs to be multi-tiered and nuanced to be effective. Tata Interactive Systems cybersecurity training curriculum leverages games and simulations to improve the profile of your business. It is also ideal for students who are currently working full-time and are aspiring cybersecurity professionals. TIS can help you to learn more, please visit!
Learn how an integrated approach, strategic reach and measurement systems of Influencers point to a new kind of security organization and a new breed of leader. For more information on IBM Systems, visit http://ibm.co/RKEeMO.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
Protecting enterprise systems against cyber threats is a strategic priority, yet only 42% of executives are confident they could recover without impacting their business from a cyber event. Find out the hidden risks of shadow IT, cloud and cyber insurance.
The past few years have seen an explosion of cyber attacks, and with the 2015 OPM breaches underscoring the vulnerability of government data, agencies are racing to implement proactive, holistic cybersecurity measures. In order to measure changing federal perceptions and experiences regarding the present threat landscape, Government Business Council (GBC) and Dell conducted an in-depth research survey as a follow-up to a previous June 2014 GBC study.
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
Top 10 Essentials for Building a Powerful Security DashboardTripwire
Security dashboards are a valuable tool that can help give an “at a glance” picture of the overall health of your ecosystem, demonstrating leadership, achievements and an effective way to measure progress towards your goals. See what industry experts recommend your dashboard must have.
Read more: http://tripwire.me/1LODVJq
A Power Point Presemtation of some favourite jokes with drawings and animated pics. ( Download for animation effects. ) Some LIFE Lessons can be learnt from reflecting on the jokes. Done by Bro. Oh Teik Bin, Lower Perak Buddhist Association, Teluk Intan, Malaysia.
100 images that can inspire you when you are brainstorming about new products or services. See also our new set with 100 extra images: http://www.slideshare.net/marcnewshoestoday/100-extra-images-for-visual-brainstorming
Read our cybersecurity predictions for 2017: http://researchcenter.paloaltonetworks.com/tag/2017-predictions/
These predictions are part of an ongoing blog series examining “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity in 2017.
A Power Point Presentation of some jokes for students. To motivate students in reading and learning English. Humor is good for health. Please download for oral reading of the jokes. Done by Bro. Oh Teik Bin, Lower Perak Buddhist association, Teluk Intan, Malaysia.
Words Matter: The Art of Getting People to Do What You WantKevin Lilly
Many ideas inspire action, but few allow for it. This talk will look at the world’s most inspiring & effective creative ideas to reveal the proven formula that gets people to act on your behalf.
100 extra images for visual brainstormingMarc Heleven
After the first successful set, another collection of 100 handpicked images for idea generation. Enjoy.
A small selection of our database of + 26.000 images related to future, innovation, brainstorming. see www.ideaDJ.com
"The Engaged Leader" at SXSW InteractiveCharlene Li
Presentation by Charlene Li at SXSW Interactive, Austin, TX on Saturday, March 14, 2015 (Pi Day)
Title: Creating A Digital Engagement Strategy for Leaders
Description: Digital and social technologies have revolutionized relationships – and leadership is not immune. Despite the pressure to engage, leaders remain on the sidelines, paralyzed by fear and the unknown. We’ll look at how leaders can use technology to listen, share, and engage with employees and customers, at scale. We’ll also discuss common objections and concerns of leaders – and how to address them.
The Best Startup Investor Pitch Deck & How to Present to Angels & Venture Cap...J. Skyler Fernandes
Take the online video course on Udemy:
https://www.udemy.com/course/the-best-startup-investor-pitch-deck/?referralCode=A5ED0FBD65120A93A16E
3.5+hrs of video content, walking step by step each part of the pitch, with personal VC stories, examples, and advice.
The "Best" Startup Investor Pitch Deck is an aggregation of some of the best pitch decks and wisdom from some of the top angels, VCs, and entrepreneurs including my own person insight/experience. The slide deck includes a template for entrepreneurs to use to present to investors, with details on what should be addressed on each slide. There are also additional slides on how best to pitch to investors effectively, how to design and format slides, and what to do before the pitch.
The Next Great Challenge for CISOs
I am honored to be recognized! Cybersecurity is truly a team effort at a strategic level, either we all work together or the threats will tear us down piecemeal! Every person, no matter their role, can play an important part in making digital technology trustworthy and keeping the Internet secure, private, and safe.
Booz Allen's U.S. Commercial Leader and Executive Vice President, Bill Phelps, recently released his list of 10 Cyber Priorities for Boards of Directors. As we peer into how business, technology, regulatory, and cyber threat realities are evolving in the coming year, here is a reference guide for board members to use in validating their company's cybersecurity approach.
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
Conventional information security measures continue to fail our businesses in today’s rapidly changing world of cyber-risk. Adverse cyber-events manifest themselves as the usual suspects including data breaches, information theft, ransom- and malware, viruses, payment card fraud, DDOS attacks or physical loss – to name but a few.
Problem is, the tally of adverse events keeps mounting up. While headline adverse cyber incidents are now reported in the media with regularity, this represents the tip of the cyber-risk iceberg. Most known events are either unreported or hidden from public disclosure. Not helping, is the industry analysis suggesting that, on average, nearly half of all adverse cyber-risk events impacting organisations are self-inflicted and avoidable. No industry is untouched.
Delivered at the CIO Summit in Melbourne, Australia in November 2016, in this presentation, Rob offers valuable strategic insights into the problem and why it continues to be a problem.
He outlines some practical steps that will be helpful for CIOs and CISOs in reshaping their own organisation’s approach in building a more effective and resilient information security capability.
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
Business theft and fraud have morphed into significant new threats as companies battle well-funded, highly motivated digital adversaries. Cyber defense rules have clearly changed.
Executive leaders must recognize how exposed their organizations are today and take steps to establish a holistic, end-to-end security strategy capable of protecting their most valuable assets and business operations.
Wilton & Bain and Kaspersky Lab were delighted to host a lively, informative and convivial evening to discuss the challenges of Cybersecurity in today’s data age. We were joined by Paul Johnson CIO at Aldermore, one of the UK’s foremost challenger bank success stories, who provided an insight into the challenges faced by industry.
1. How often do you see non-sanctioned cloud services in use?
2. Are we protecting ourselves against insider threats?
3. Do we have a cyber security task force in place?
4. Is our BYOD policy secure?
5. Do you feel limited by your security budget or staff size?
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
Discover why accountants must prioritize cyber security in 2023 – essential insights to safeguard sensitive financial data and ensure business resilience.
10 Most Influential Leaders in Cybersecurity, 2022.pdfCIO Look Magazine
This edition features a handful of The 10 Most Influential Leaders in Cybersecurity, 2022 that are leading us into a digital future
Read More: https://ciolook.com/10-most-influential-leaders-in-cybersecurity-2022-vol-2-october2022/
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
This white paper summarizes the results of a survey done by RSA, NYSE Governance Series, and Corporate Board Member, in association with Ernst & Young, with 200 audit committee members responding on a variety of issues regarding their cyber risk oversight program.
Most security breaches are caused by human error and poor security discipline. For instance, in April 2011, it was discovered that the personal and confidential data of 3.5 million teachers, state workers and retirees in the state of Texas was lying unprotected on the Internet closely for a year.
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
Cyberattacks are becoming more frequent and sophisticated, making a recovery from them increasingly difficult. Without preparation, a cyberattack can be devastating to your business, having severe operational, financial, legal and reputational implications.
The prevalence of cyber breaches also means cybersecurity is no longer solely an IT concern. Elevating your information security from functional to effective takes a robust set of elements, processes and people working together toward a common goal.
Our professionals have developed these articles and resources to help you protect your organization from these attacks.
For Corporate Boards, a Cyber Security Top 10David X Martin
Corporate boards of directors have a fiduciary duty to understand and oversee cyber security. For most effective oversight, boards should approach cyber security from a good management-practices perspective rather than a technical perspective.
2. the power of the new cio
Executive Summary
As businesses evolve, technology plays an increasingly significant role in the organisation. Boards not only
need to ask the right questions, but also take advantage of technology and use it as an opportunity for growth.
Cybersecurity needs to become an issue CEOs know about and not just read about in the Financial Times and
say ‘cybersecurity is managed by my IT department.’ Boards have a fundamentally equal role to play in planning
for attacks to the business and crucially, the financial, operational and reputational implications of such a security
breach. The CIO should play an important role as the strategic advisor around the technology implications at
board level and in return the CIO must grasp the broader business strategy and articulate risk from a business
perspective.
Introduction
In 2014, we witnessed a surge in the number of increasingly complex and sophisticated cyber-attacks across
all industries, in large corporates, SMEs and start-ups. The scale is staggering: last year in the UK alone, cyber
criminals compromised more than a billion data records in over 1500 breaches. The cost of rectifying these
breaches is escalating: last year the average cost-to-company of a data breach was £2.5m, up 15% from 2013.1
It is also critical to recognise the effect that these incidents have on consumers; many of those that bank and
shop online suffered the loss of their personal and financial data.
Cybersecurity has moved far beyond an issue that can simply be resolved by expensive outsourcing or more
investment in software or technology. Today’s cyber-attacks are complex, virtually undetectable, not constrained
spatially or temporally and are driven by individuals and organisations that are resilient, persistent and able to
innovate faster than their targets. The consequences can be devastating, often resulting in brand damage, loss
of revenue and substantial fines.
Faced with this reality, boards are under increasing pressure to address cyber risk as a fundamental priority
aligned to the wider business strategy. How should the cyber agenda, often regarded as complex and deeply
technical, become a whole-of-company responsibility driven at board level?
1
Deloitte (2014) Cyber Security: Empowering the CIO
“There are only two types of companies: those that have been hacked and those that will be.”
Robert Mueller, FBI Director
3. Cyber: The What, Why and How?
As businesses grow, technology is no longer seen as a support function, instead it is the life-blood of the
company; the new ‘mail room’ where the highly sensitive company assets are kept. Cybersecurity is the strategies,
processes and people that protect and respond to threats to these assets.
Cyber criminals take many forms, ranging from foreign intelligence services and industrial competitors to
individual hackers, ideological ‘hacktivist’ groups and terrorists. The motivations behind these attacks are varied:
financial gain, brand damage, and some crimes are simply committed for no other reason but that it is simply
possible. Other threats such as human error, often stemming from company employees themselves, are not
generally malicious but can be just as dangerous.
A computer virus is the most common form of attack. Access can be gained remotely; spread through a network
of computers, or proximately; by directly tampering with the technology in situ. Other common forms of attack
include denial of service; overloading an area of a system rendering it inaccessible; phishing; an email sent
to induce recipients to reveal their personal data, and backdoors; remotely securing access to a system and
installing or modifying existing programmes.
What does this all mean? We have established that these attacks come through the electronic or digital world
and the ultimate target at stake is available data. The fundamental issue here is who can gain access to this
data? The word ‘cyber’ is arguably a red herring; the issues facing companies are issues of data protection.
www.normanbroadbent.com
“It is clear that cyber-crime has a real and detrimental impact on the global economy. Over time,
cyber-crime has become a growth industry; the returns are great, and the risks are low.”
Raj Samani, EMEA Chief Technology Officer, McAfee
There are four basic parts to a cyber-attack:
1. Reconnaissance: gathering information
2. Exploitation: identifying the weak areas that are open to manipulation
3. Access: gaining entry to a network or system
4. Goal: leveraging weaknesses to cause damage and disruption before covering tracks
4. Data is critical to any organisation, so the key question is: who holds responsibility for data within the organisation?
Data is often pushed down several layers from the board and seen as overly complex and technical. In many
organisations, it is the remit of the CIO; in others, the CISO or Chief Data Officer. In financial services organisations,
it generally is the responsibility of the Chief Risk Officer as part of the wider financial, operational and prudential
risks faced. In many cases, one could argue that the CRO has been elevated to the board of financial services
organisations in response to regulatory requirements. As a result, even though most CROs have strong business
strategy and risk heritage, many lack technological expertise.
In short, many organisations have no coherent strategy on data and it is often split depending on whether the
focus is on money, R&D, customer data or intellectual property. It is critical that issues surrounding data are
discussed at board level, particularly the CEO and CIO working with the board to protect company assets and
customer loyalty in the same way they protect other areas of the organisation. Data should be jointly evaluated
and a decision reached around what is most valuable and what should be prioritised. In addition, when data is
promoted to the board, it becomes a commercial driver and there is an opportunity for companies to be seen
as a trusted holder of that information and use it intuitively to improve customer experience.
the importance of data
“The new generation of millennials expect companies to know everything relevant about them;
they want a tailored buying experience.” Heather Jackson, Director, Actinista
5. www.normanbroadbent.com
cybersecurity and the ‘corporate
blind spot’
Many board directors are not fully aware of how technological changes are creating new and significant security
challenges for their businesses. It doesn’t help that many current board directors have spent most of their
careers in a pre-internet world.
As a result, the lack of a technology savvy CEO and Chairman is often a ‘corporate blind spot’ where cyber
security is concerned. Amongst CEOs and Chairmen in particular, there can be a feeling of ‘tech is below me,
I’m more strategy.’ Moreover, as a CEO, if you do not know how to leverage technology to effectively strategise
against cyber-attacks (and recover quickly following one), then a blind spot clearly exists.
Additionally, a CIO who generally sits below the board, or simply that lacks the capability or opportunity to
articulate how technology can be monetised is a further imperative to ensure cybersecurity becomes a whole-
of-business responsibility.
Deloitte argues that the CIO should be the lynchpin in the cybersecurity conversation: the visionary, the facilitator,
the conduit for information and the challenger of the business. But what happens when the CIO is either not up
to the job or does not have the right exposure within the organisation to drive this agenda?
“The challenge lies with the boards that are not technologically literate. Phrases such as:
‘I have my secretary print out my emails’and ‘I don’t know how to use my smartphone
properly’and ‘Facebook is for my kids’should never be heard.”
Al Lakhani, MD, Alvarez & Marsall
“If for the last 20 years as a CIO all you’ve been taught is to invent or deploy the next
technology for cutting cost, it can be very difficult to think strategically and
communicate in true business terms.”
EJ Hilbert, Kroll
“You would never dream of a CFO not coming to a board meeting. In addition, you would
never see a CFO passing up using external audit or teams of external advisors.
CFOs also wouldn’t be heard saying ‘Don’t worry; we’ve got a third party doing that.’
The same diligence has to be assigned to cybersecurity.”
Val Rahmani, Non-Executive Director, Aberdeen Asset Management
6. Cybersecurity needs to be addressed by a fundamental
change in the way a board communicates. CIOs need to
move closer to the business and learn to communicate
strategically around these issues. CEOs need to move
closer to technology and should consider building an
advisory board that includes the best strategist and
thought-leaders on this issue and, potentially, think
seriously about bringing a Non-Executive Director onto
the board who has technological expertise. In 2007,
Marks & Spencer brought in Martha Lane Fox, co-
founder of Lastminute.com and UK Digital Champion,
thus showing its commitment to driving its digital
agenda. This year, Val Rahmani joined the board of
Aberdeen Asset Management following a successful
career at IBM specialising in internet security and we
predict more companies will follow this lead.
bringing cybersecurity to the board
conclusion
• Boards must share the responsibility for setting the cybersecurity agenda.
• The CIO should play an important role as the strategic advisor around the technology implications at board level -
and the reporting structure should reflect this.
• If there is a dedicated Chief Data Officer then companies should think seriously about where this role reports into.
• If the CIO is not board-ready, non-financial services companies should consider creating a Chief Risk Officer role,
developing their existing CIO or hiring a new CIO who is credible to the board.
• Chairmen and CEOs need to educate themselves on the key issues presented by cybersecurity and invest in external
expertise or a Non-Executive Director with the appropriate expertise to ensure the right questions are asked.
• Everyseniorstakeholderneedstobecommittedtotheagenda,asdoeseverypersonwithaccesstotheorganisation’s
facilities, including employees, clients, vendors and third parties.
• Employees as well as boards have to be educated in terms of business technology security and use: personal
security behaviour is often overlooked in favour of the macro picture.
• Cybersecurity is not finite and it is not covered by a one-size-fits-all solution; it needs to be treated as an ongoing
process with the appropriate measures continually evaluated and the results of these evaluations acted upon.
Many companies are unwilling to talk openly about cyber-attacks due to the fear of being stigmatised. This
complicates efforts to share best practice and increase cyber awareness at board level. Information between
competitors needs to be shared: in the US, the five largest film companies have scheduled monthly round-table
meetings to discuss the threats that they are facing in order to pool their intelligence. This approach is slowly
being taken up in the UK, but momentum needs to be gained.
7. acknowledgements
norman broadbent cio practice
British Private Equity Venture Capital Association (2015) Guide to cyber security
Deloitte (2014) Cyber Security: Empowering the CIO
Ernst Young (2014) How to use cybersecurity to generate business value
HM Government (2014) Cyber Security: balancing risk and reward with confidence
KPMG (2014) Cybersecurity: it’s not just about technology
Adam Turner
Managing Director, CIO TMT Practice
Adam Turner joined in January 2011 to lead the Private Equity, TMT and CIO Centres of
Excellence. His broad experience encompasses many different sectors - private equity,
professional services, business process outsourcing, telecommunications, media and across
the fin tech/high-tech sector. Functionally, Adam also has in-depth experience in the CIO
area, where he has helped both listed and private equity backed businesses.
Prior to joining Norman Broadbent he was the Head of the Private Equity and Technology,
MediaTelecommunicationsandCIOPracticesandaPartnerintheBoardPracticeatOdgers
Berndston. Adam moved into executive search in 1994 and joined Odgers in June 2004.
Before entering the search industry, Adam worked for Bell Canada and Vodafone. His original
search role was with another global search firm, Morgan Howard International, focused in the
technology, media and telecommunications sectors. During this time he built operations and
search practices globally and his final leaving position was as CEO. Adam has operated with
both a national and international remit. He has lived and worked across four continents having
successfully completed senior level searches in the UK, USA, Asia and EMEA.
Adam was born in Zambia and has geographic expertise working across the African continent.
Lydia Shepherd
Associate, CIO
Having graduated from Oxford University, Lydia worked as a sales-trader at Citigroup
before transitioning into executive search. Lydia then spent three years at a boutique
executive search firm delivering senior level technology, telecoms professional services
assignments globally before joining Norman Broadbent in 2012. Lydia is functionally
aligned to the CIO practice and has since delivered a number of Fortune 500 and FTSE
350 CIO assignments and a number of other senior level technology and digital roles
across a variety of sectors. Alongside executive search, Lydia is involved with Norman
Broadbent’s Diversity agenda and regularly represents the firm at conferences and
government events.
www.normanbroadbent.com
8. Norman Broadbent
12 St James’s Square | London | SW1Y 4LB | Tel: +44 (0) 20 7484 0000 | info@normanbroadbent.com
www.normanbroadbent.com