Panel Profile: Just Eat CISO Kevin Fielder
We get face-to-face with one of the IT Pro Panellists
Welcome to the IT Pro Panel Profile, where we talk to the CIOs, experts and IT leaders that make up the IT Pro Panel, and discover their top tech, pet peeves and IT inspirations.
Food delivery apps may seem innocuous products, but they’re a potential gold mine for cyber criminals. Any group that breaches one of these services will gain access not just to users’ account details - a juicy target in its own right - but also to their payment information and physical address.
In the case of popular takeaway app Just Eat, Kevin Fielder is the man responsible for making sure that doesn’t happen. As CISO, it’s his job to protect the company, its users and its infrastructure from the various threats that seek to attack it.
CISO - Just Eat
Describe your role in 20 words or fewer.
I’m accountable for all things security at Just Eat, enabling and supporting my team and enabling secure business at pace.
What was your first computer?
I started out with the ZX spectrum 48, but I also had access to an original BBC Micro.
What do you like most about working in IT?
I like the fact that I’m always learning, but also really enjoy solving problems.
If you could magically get rid of one piece of technology forever, what would it be, and why?
That’s a hard one - most tech has pros and cons. I'd like mobiles to be way more limited and have screens that didn't let you read or watch while walking and get in everyone's way while crossing roads!
What future tech innovations are you most excited about?
When I'm drinking cocktails on the beach while my personal AI works really hard for me!
Who’s your biggest inspiration in the world of tech?
Early in my career while we were both working at Ocado, Jonathan Sartin inspired me to get into security and understand tech more deeply. He has mad skills.
If you're a senior IT decision-maker and you'd like to apply to be part of the IT Pro Panel, please email firstname.lastname@example.org.
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now