Skip to main content

Contact

Get in Touch
Questions, collaborations, speaking inquiries, or just want to connect — I’d love to hear from you.

Whether you’re a fellow security leader, an aspiring CISO, or someone who found value in something I’ve written here at InfoSec Made Easy — I’m always open to a conversation. The best way to reach me is by email. I read every message and do my best to respond promptly.

Email
contactme@infosecmadeeasy.com
I typically respond within 1–2 business days.
What I’m Happy to Discuss
Content & Blog Topics — Have a topic you’d like me to cover? A question about something I’ve written? I welcome feedback and suggestions from the community.
Speaking & Collaboration — Interested in having me speak at your event, contribute to a panel, or collaborate on a project? Reach out with the details and I’ll get back to you.
Recruiting & Professional Inquiries — Executive and CISO-level inquiries are welcome. Please include relevant details about the opportunity in your initial message.
General Networking — If you’re a security professional or aspiring CISO who just wants to connect and exchange ideas, don’t hesitate to reach out.
Connect on LinkedIn

You can also connect with me directly on LinkedIn, where I occasionally share insights and engage with the broader security leadership community.

Brian Weidner  |  CISO, A. O. Smith Corporation  |  infosecmadeeasy.com

Popular posts from this blog

CISO Brief: February 11, 2026 – Critical Vulnerabilities, Nation-State Threats, and Ransomware Developments

Staying ahead of emerging threats is essential for enterprise resilience. This week brings a mix of critical vulnerabilities, advanced ransomware, and sophisticated nation-state activity. CISOs should prioritize patching, review detection capabilities, and prepare executive responses to evolving risks. Below are the top items requiring immediate attention, notable developments, and a concise action checklist. Top Items CISOs Should Care About (Priority) Microsoft Patches 59 Vulnerabilities Including Six Actively Exploited Zero-Days What happened: Microsoft released patches for 59 vulnerabilities, including six zero-days currently being exploited in the wild. Why it matters: Unpatched systems are at high risk of compromise and regulatory scrutiny. What to verify internally: All Microsoft systems are patched promptly, especially endpoints and servers. Vulnerability management processes are up to date and effective. Critical assets are prioritiz...

Generative AI Governance: Using the NIST Framework to Build Trust, Reduce Risk, and Lead Secure AI Adoption

Generative AI has moved faster than nearly any technology security leaders have dealt with. Tools that can generate text, code, images, and data insights are now embedded into productivity platforms, security tooling, development workflows, and business operations—often before security teams are formally involved. For CISOs, this creates a familiar but amplified challenge: innovation is happening faster than governance, and unmanaged generative AI introduces material risk across confidentiality, integrity, availability, compliance, and trust. For aspiring information security professionals, AI governance represents a growing and valuable discipline where strategic thinking matters just as much as technical depth. The good news? We don’t need to invent governance from scratch. NIST’s AI Risk Management Framework (AI RMF) provides a practical, flexible structure that security leaders can use today to govern generative AI responsibly and defensibly. Why Generative AI Governance Matt...