IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Twitter hires new cyber chief after devastating breach

After a major security breach in July, Twitter has made moves to improve its cyber security

Blue Twitter banner

Twitter’s platform lead Nick Tornow tweeted out the news that the social media company has hired Rinki Sethi to be its new chief information security officer (CISO).

Tornow’s tweet read, “Today, I’m thrilled to welcome @rinkisethi as the new CISO of @twitter. An inspiring and experienced leader, Rinki comes to us via Rubrik, IBM, and Palo Alto Networks. At Twitter, she will lead our growing InfoSec team, protecting our customers and our company to earn trust.”

In mid-July, a 17-year-old Florida boy hacked Twitter and hijacked a number of high-profile accounts, including Barack Obama, Elon Musk and Bill Gates. He then used those accounts to post a Bitcoin scam. The hack exposed some serious issues in Twitter’s security, prompting the company to announce it would ramp up security on high-profile accounts

Mike Convertino, Twitter’s former security chief, left the company in December 2019, and the role has remained vacant since.

As CISO, Sethi will lead the company’s information security policies and practices. As Tornow stated, Sethi has worked with Rubrik, IBM and Palo Alto Networks. She also helps out as an advisor for many startup companies, including Authomize and LevelOps. 

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

Best free malware removal tools 2022
Security

Best free malware removal tools 2022

22 Jun 2022
A guide to cyber security certification and training
Careers & training

A guide to cyber security certification and training

16 Jun 2022
What is shoulder surfing?
social engineering

What is shoulder surfing?

10 Jun 2022
CIAM buyer’s guide
Whitepaper

CIAM buyer’s guide

6 Jun 2022

Most Popular

Actively exploited server backdoor remains undetected in most organisations' networks
cyber attacks

Actively exploited server backdoor remains undetected in most organisations' networks

1 Jul 2022
Macmillan Publishers hit by apparent cyber attack as systems are forced offline
Security

Macmillan Publishers hit by apparent cyber attack as systems are forced offline

30 Jun 2022
Former Uber security chief to face fraud charges over hack coverup
data breaches

Former Uber security chief to face fraud charges over hack coverup

29 Jun 2022