chat
expand_more

Cyber Savvy: Creating a Recipe for Data Defense With K-MAC’s CIO

Discover how CIO Roger Morris protects popular restaurant brands, including Taco Bell, Whataburger, 7 Brew, and more, from cyber threats.
April 30, 2024

Welcome to the third edition of Cyber Savvy, a blog series exploring the expert insights of cybersecurity professionals. For each installment, we engage with a diverse array of security leaders to glean new perspectives on the constantly evolving threat landscape. Through these interviews, we aim to delve into their unique career journeys, uncovering firsthand insights into the challenges they've faced and the victories they've achieved.

In this article, we chatted with Roger Morris, Chief Information Officer (CIO) of K-MAC Enterprises, Inc., to learn about his experience protecting popular restaurant brands, including Taco Bell, Whataburger, and 7 Brew. Here’s what he had to share.

What are your biggest security concerns/challenges as a CIO?

A: There are many concerns when it comes to security. While security companies are heavily involved in finding ways to stop the existing threats, our biggest challenge is determining what’s in place to stop the next “unknown’ type of threat.

What new challenges do you anticipate in the coming year?

A: Our organization just recently migrated from in-house servers to cloud-based services. Our team is trying to find our responsibilities in keeping our cloud data secure, and how much we need to depend on the service company to protect our data.

How is your team adapting to the evolving threat landscape?

A: Keeping a measure of our attacks helps us direct resources to the more critical areas.

What do you consider your most important success metric?

A: Preparedness and our ability to stay one step ahead of bad actors.

What are your three biggest goals for the coming year?

A: 1) Implementing a continued training method to educate our employees on security best practices, 2) Researching upcoming security measures, and 3) Keeping the right people in place for a secure environment.

What new trends in cybersecurity excite you right now?

A: AI seems to be the future of generating algorithms to help keep cybersecurity under control.

Are there any security leaders besides yourself that you look to for guidance?

A: I’m always tapping into the knowledge of the security team that we use for cloud services.

What advice do you have for other CIOs or aspiring CIOs?

A: Always keep yourself educated on the current and upcoming information for cyber security.

Want to learn more from Roger? You can connect with him here.

Coming Up Next

In our upcoming Cyber Savvy segment, we'll be conversing with yet another security expert to explore their perspectives on the constantly shifting threat environment. Whether you're a seasoned CISO, an aspiring security analyst, or simply curious about industry insights, this is an opportunity you won't want to overlook.

Want to be featured yourself? Contact us here and we’ll be in touch!

Cyber Savvy: Creating a Recipe for Data Defense With K-MAC’s CIO

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Product24
Discover how Abnormal transformed 2024 with groundbreaking AI innovations, enhanced cloud and email security solutions, and industry leadership, tackling evolving cyber threats while empowering organizations worldwide to stay secure.
Read More
B Top Reason to Attend Innovate 2025 Blog
Don’t miss your chance to hear from leading AI experts, Fortune 500 CISOs, threat intelligence leaders, and other exciting speakers at Abnormal Innovate.
Read More
B Weaponizing Google Translate for Phishing
Learn how attackers use Google Translate's URL redirection for phishing, exploiting Google’s trust to deceive users and bypass security.
Read More
B Proofpoint Customer Story Blog 9
Discover how Abnormal's AI reduced this Fortune 500 automotive retailer and transportation services provider's risk, detecting 5,699 attacks Proofpoint missed and saving 105 SOC hours monthly.
Read More
B Top10 Blogs
Discover the top cybersecurity insights from 2024 with Abnormal's most-read blogs. From AI-driven threats to evolving defense strategies, explore trends, challenges, and solutions that are shaping the future of cybersecurity.
Read More
B Proofpoint Customer Story Blog 8
A Fortune 500 transportation and logistics leader blocked more than 6,700 attacks missed by Proofpoint and reclaimed 350 SOC hours per month by adding Abnormal to its security stack.
Read More