Eoin Keary's avatarPerson

Eoin Keary

CEOEdgescan Inc

Dublin, Ireland

About

Executive with over 20 years cyber and software security experience. Ex Global Board member of Owasp.

Published content

What Execs Need to Know Now to Avoid Data Protection Penalties

expert panel

Data protection rules are tightening faster than most executive teams can update their playbooks. California has approved new regulations requiring risk assessments and cybersecurity audits for many businesses, and the SEC has rolled out new cybersecurity disclosure requirements that raise the stakes for boards and C-suites. Globally, companies face tightening scrutiny, and the penalties for missteps can be steep: GDPR violation fines exceeded €3 billion in the first half of 2025 alone. For business leaders already juggling digital transformation, AI adoption and sprawling data ecosystems, managing incoming (and ongoing) waves of cybersecurity rules and regulations can feel overwhelming. But the real danger isn’t just the number or complexity of new rules—it’s the blind spots leaders don’t realize they have. From siloed security and shadow IT to hidden vendor vulnerabilities, many organizations have all the warning signs of an incoming compliance headache. As experts in enterprise cybersecurity strategies and regulatory compliance, the members of the Senior Executive Cybersecurity Think Tank know where leaders most often overlook risk—and why regulators tend to focus on those areas after a breach. Below, three of them share what executives should prioritize now to stay compliant and resilient and avoid costly surprises down the line.

How to Evaluate Third-Party Vendors: Key Security Questions for Executives

expert panel

Third-party technology tools promise efficiency, scale and all the digital bells and whistles execs need to keep productivity humming and power growth—but not all tools are created equal. Cloud platforms, SaaS productivity suites, niche workflow apps and industry-specific managed services can all introduce unseen risk when they plug into core systems. However, in many companies, third-party risk management continues to fly under the radar—even though 30% of enterprise data breaches involve a third party. From misaligned encryption standards and unclear data flows to vendors that treat compliance like a box-checking exercise, there are significant risks that can come with working with third-party vendors and SaaS tools. As experts in enterprise cybersecurity strategies, data breach prevention, risk management and regulatory compliance, the members of the Senior Executive Cybersecurity Think Tank know that to operate on trust when working with tech vendors is to court disaster. Below, three of them share the details to dig into before entering into a partnership with a third-party vendor or software provider.

Future-Proofing Cyber Teams in an Era of Escalating Risk

article

Demands on cybersecurity teams are growing faster than ever before. Members of the Senior Executive Cybersecurity Think Tank share how they’re transforming team culture, training strategies and internal collaboration to address both escalating attacks and shifting regulatory demands.

Navigating Evolving Global Privacy Laws: Advice From Cyber Experts

article

From SEC incident disclosure rules to evolving data privacy laws, cybersecurity leaders facing increasing scrutiny must rethink how compliance fits into daily operations. Members of the Cybersecurity Think Tank share practical frameworks and mindset shifts for staying ahead.

Man vs. Machine: How AI Can Strengthen Cybersecurity Efforts

article

From real-time anomaly detection to vulnerability prioritization at scale, AI is transforming cybersecurity operations. But Senior Executive Cybersecurity Think Tank members say human oversight is more important than ever. Here’s how they’re integrating machine learning into their cybersecurity efforts—and where they draw the line.

Company details

Edgescan Inc

Company bio

Continuous penetration testing and exposure management. Attack surface management

Industry

Computer & Network Security

Area of focus

Cyber Security
Artificial Intelligence
Cloud Computing

Company size

51 - 200