Eoin Keary
CEOEdgescan Inc
About
Executive with over 20 years cyber and software security experience. Ex Global Board member of Owasp.
Eoin Keary
Published content

expert panel
Data protection rules are tightening faster than most executive teams can update their playbooks. California has approved new regulations requiring risk assessments and cybersecurity audits for many businesses, and the SEC has rolled out new cybersecurity disclosure requirements that raise the stakes for boards and C-suites. Globally, companies face tightening scrutiny, and the penalties for missteps can be steep: GDPR violation fines exceeded €3 billion in the first half of 2025 alone. For business leaders already juggling digital transformation, AI adoption and sprawling data ecosystems, managing incoming (and ongoing) waves of cybersecurity rules and regulations can feel overwhelming. But the real danger isn’t just the number or complexity of new rules—it’s the blind spots leaders don’t realize they have. From siloed security and shadow IT to hidden vendor vulnerabilities, many organizations have all the warning signs of an incoming compliance headache. As experts in enterprise cybersecurity strategies and regulatory compliance, the members of the Senior Executive Cybersecurity Think Tank know where leaders most often overlook risk—and why regulators tend to focus on those areas after a breach. Below, three of them share what executives should prioritize now to stay compliant and resilient and avoid costly surprises down the line.

expert panel
Third-party technology tools promise efficiency, scale and all the digital bells and whistles execs need to keep productivity humming and power growth—but not all tools are created equal. Cloud platforms, SaaS productivity suites, niche workflow apps and industry-specific managed services can all introduce unseen risk when they plug into core systems. However, in many companies, third-party risk management continues to fly under the radar—even though 30% of enterprise data breaches involve a third party. From misaligned encryption standards and unclear data flows to vendors that treat compliance like a box-checking exercise, there are significant risks that can come with working with third-party vendors and SaaS tools. As experts in enterprise cybersecurity strategies, data breach prevention, risk management and regulatory compliance, the members of the Senior Executive Cybersecurity Think Tank know that to operate on trust when working with tech vendors is to court disaster. Below, three of them share the details to dig into before entering into a partnership with a third-party vendor or software provider.

article
Demands on cybersecurity teams are growing faster than ever before. Members of the Senior Executive Cybersecurity Think Tank share how they’re transforming team culture, training strategies and internal collaboration to address both escalating attacks and shifting regulatory demands.

article
From SEC incident disclosure rules to evolving data privacy laws, cybersecurity leaders facing increasing scrutiny must rethink how compliance fits into daily operations. Members of the Cybersecurity Think Tank share practical frameworks and mindset shifts for staying ahead.

article
From real-time anomaly detection to vulnerability prioritization at scale, AI is transforming cybersecurity operations. But Senior Executive Cybersecurity Think Tank members say human oversight is more important than ever. Here’s how they’re integrating machine learning into their cybersecurity efforts—and where they draw the line.
Company details
Edgescan Inc
Company bio
Continuous penetration testing and exposure management. Attack surface management
