logo
episode-header-image
Nov 4
29m 54s

Guardians of Trust: The CISO’s Strategic...

Dr. Dave Chatterjee
About this episode

In this episode, Dr. Dave Chatterjee sits down with Pam Lindemoen, Chief Security Officer and Vice President of Strategy at the Retail & Hospitality Information Sharing and Analysis Center (RH-ISAC), to explore the CISO’s evolving role in global nonprofit organizations. Moving beyond traditional corporate metrics of cost and compliance, Lindemoen reveals how cybersecurity leadership in the nonprofit sector is ultimately about preserving trust, protecting donor data, and sustaining mission-driven operations. Drawing on three decades of experience across healthcare, finance, and retail, Lindemoen shares how RH-ISAC has become a collaborative force multiplier, enabling member companies to detect, respond, and adapt collectively to cyber threats. Through the Commitment–Preparedness–Discipline (CPD) framework, Dr. Chatterjee and Lindemoen illustrate how leadership, empathy, and shared intelligence drive resilience across the nonprofit ecosystem.

Time Stamps

• 00:49 — Dave introduces the topic and Pam Lindemoen’s professional journey.

• 02:49 — Career reflections: from IT foundations to cybersecurity leadership.

• 04:23 — Inside RH-ISAC: a trusted model for cross-industry collaboration.

• 07:06 — Navigating dual responsibilities—defending RH-ISAC and empowering members.

• 09:09 — Governance, trust, and relationship management in a global community.

• 12:27 — RH-ISAC’s differentiation and member-driven value.

• 14:00 — Leadership through listening and connection.

• 20:50 — Advice for CISOs exploring nonprofit leadership paths.

• 24:26 — Real-world example: supply chain attack mitigation through shared intelligence.

• 27:55 — Final reflections on collective trust, collaboration, and resilience.

To access and download the entire podcast summary with discussion highlights - https://www.dchatte.com/episode-94-guardians-of-trust-the-cisos-strategic-role-in-global-non-profits/



Connect with Host Dr. Dave Chatterjee

LinkedIn: https://www.linkedin.com/in/dchatte/

Website: https://dchatte.com/

Books Published

The DeepFake Conspiracy

Cybersecurity Readiness: A Holistic and High-Performance Approach

Articles Published

Ramasastry, C. and Chatterjee, D. (2025). Trusona: Recruiting For The Hacker Mindset, Ivey Publishing, Oct 3, 2025.

Chatterjee, D. and Leslie, A. (2024). “Ignorance is not bliss: A human-centered whole-of-enterprise approach to cybersecurity preparedness,” Business Horizons, Accepted on Oct 29, 2024.

Isik, O., Chatterjee, D., and Lourenco, D.A. (2024). “Getting Cybersecurity Right,” California Management Review — Insights, Accepted for Publication, July 8, 2024. 

Up next
Nov 19
Episode 95 -- Defending Digital Trust – Battling the Deepfake Surge with AI-Powered Detection
<p>In this episode, <a href="https://www.linkedin.com/in/dchatte/" rel="noopener noreferrer" target="_blank">Dave Chatterjee, Ph.D. </a>sits down with <a href="https://www.linkedin.com/in/sandwedg/" rel="noopener noreferrer" target="_blank">Sandy Kronenberg, Founder and CEO of Ne ... Show More
43m 56s
Oct 19
Episode 93 -- The New Browser Wars: Why the Enterprise Browser Has Become Cybersecurity’s Next Battleground
In this episode, Dr. Dave Chatterjee speaks with Anupam Upadhyay, Senior Vice President, Product Management, Palo Alto Networks, a seasoned product and cybersecurity leader, to unpack the “new browser wars” and why enterprise browsers are fast becoming a core battleground in the ... Show More
34m 3s
Oct 8
The AI Augmented SOC: Balancing Technology, Talent, and Trust
In this episode, Dr. Dave Chatterjee speaks with Will Ledesma, Director of MDR Cybersecurity Operations at Adlumin, a veteran SOC leader and cyber defender with over two decades of experience in enterprise security and the U.S. Air Force Reserves. Ledesma shares his journey from ... Show More
40m 8s
Recommended Episodes
May 2022
Preventing Digital Fraud & Scams
Lou Manousos, an acknowledged expert in internet security and VP of Product in Microsoft Security, joins Ann Johnson on this week's episode of Afternoon Cyber Tea. Lou has been developing enterprise protection technology for more than 15 years and is currently the CEO of Risk IQ. ... Show More
26m 29s
Aug 2024
“Security is an Illusion” Ethical Hacker Exposes Child Predators & Tools To Protect Against Hackers | PBD Podcast | Ep. 460
<p>Patrick Bet-David sits down with Ryan Montgomery, a renowned ethical hacker known for his expertise in cybersecurity and passion for child safety. Montgomery, who has been at the forefront of exposing online predators, shares insights into his journey as a hacker, his motivati ... Show More
2h 4m
Jan 2025
Disrupting Cracked Cobalt Strike [The Microsoft Threat Intelligence Podcast]
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The Microsoft Threat Intelligence Podcast by Microsoft Threat Intelligence. See you in 2025! On this week's episode of The Microsoft Threat Intelligence Podcast, we discuss th ... Show More
38m 40s
Oct 2024
No more “cyber Snorlax” naps.
Microsoft describes a macOS vulnerability. A trio of healthcare organizations reveal data breaches affecting nearly three quarters a million patients. Group-IB infiltrates a ransomware as a service operation. Instagram rolls out new measures to combat sextortion schemes. Updates ... Show More
29m 27s
Sep 2
Blizzard warning: Amazon freezes midnight hack.
Researchers disrupt a cyber campaign by Russia’s Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claim ... Show More
32m 11s
Aug 2024
Almost letting hackers rule the web.
A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart car ... Show More
26m 7s
Jun 2025
Jedai tricks, human risks.
An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers. Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases ... Show More
27m 59s
Dec 2024
When AI goes offline.
ChatGPT and Meta face widespread outages. Trump advisors explore splitting NSA and CyberCom leadership roles. A critical vulnerability in Apache Struts 2 has been disclosed. “AuthQuake” allowed attackers to bypass Microsoft MFA protections. Researchers identify Nova, a sophistica ... Show More
27m 10s