Sony appoints security head after hacks

Former US Government worker Philip R Reitinger is hired for the Sony CISO role.

Sony

Sony has appointed a chief information security officer (CISO) a position it promised to fill after the notorious hacks devastated the entertainment giant in April.

Philip R Reitinger has been handed the job and will take control of Sony's global data security and privacy business.

"As Sony Group's top information security executive, Reitinger will be responsible for assuring the security of Sony's information assets and services," the electronics firm said.

"He will oversee information security, privacy and internet safety across the company, coordinating closely with key headquarters groups and working in partnership with the information security community to bring the best ideas and approaches to Sony."

Reitinger has held a number of major roles in various US Government departments, including the Department of Homeland Security, the Department of Defence and the Department of Justice.

He also worked for Microsoft as director of the Redmond giant's Trustworthy Computing division.

The appointment comes over four months after the hacks on Sony, which saw information belonging to over 100 million people compromised.

Sony was forced into upping its security significantly following the criticism it faced after the hacks.

In addition to promising to employ a CISO, the PlayStation creator introduced extra data protection and encryption systems, alongside automated software monitoring and configuration management to help defend against new attacks.

All in all, the hacks have proven costly for Sony. It will be hoping the saga will be forgotten sooner rather than later.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022