chat
expand_more

Cyber Savvy: Creating a Recipe for Data Defense With K-MAC’s CIO

Discover how CIO Roger Morris protects popular restaurant brands, including Taco Bell, Whataburger, 7 Brew, and more, from cyber threats.
April 30, 2024

Welcome to the third edition of Cyber Savvy, a blog series exploring the expert insights of cybersecurity professionals. For each installment, we engage with a diverse array of security leaders to glean new perspectives on the constantly evolving threat landscape. Through these interviews, we aim to delve into their unique career journeys, uncovering firsthand insights into the challenges they've faced and the victories they've achieved.

In this article, we chatted with Roger Morris, Chief Information Officer (CIO) of K-MAC Enterprises, Inc., to learn about his experience protecting popular restaurant brands, including Taco Bell, Whataburger, and 7 Brew. Here’s what he had to share.

What are your biggest security concerns/challenges as a CIO?

A: There are many concerns when it comes to security. While security companies are heavily involved in finding ways to stop the existing threats, our biggest challenge is determining what’s in place to stop the next “unknown’ type of threat.

What new challenges do you anticipate in the coming year?

A: Our organization just recently migrated from in-house servers to cloud-based services. Our team is trying to find our responsibilities in keeping our cloud data secure, and how much we need to depend on the service company to protect our data.

How is your team adapting to the evolving threat landscape?

A: Keeping a measure of our attacks helps us direct resources to the more critical areas.

What do you consider your most important success metric?

A: Preparedness and our ability to stay one step ahead of bad actors.

What are your three biggest goals for the coming year?

A: 1) Implementing a continued training method to educate our employees on security best practices, 2) Researching upcoming security measures, and 3) Keeping the right people in place for a secure environment.

What new trends in cybersecurity excite you right now?

A: AI seems to be the future of generating algorithms to help keep cybersecurity under control.

Are there any security leaders besides yourself that you look to for guidance?

A: I’m always tapping into the knowledge of the security team that we use for cloud services.

What advice do you have for other CIOs or aspiring CIOs?

A: Always keep yourself educated on the current and upcoming information for cyber security.

Want to learn more from Roger? You can connect with him here.

Coming Up Next

In our upcoming Cyber Savvy segment, we'll be conversing with yet another security expert to explore their perspectives on the constantly shifting threat environment. Whether you're a seasoned CISO, an aspiring security analyst, or simply curious about industry insights, this is an opportunity you won't want to overlook.

Want to be featured yourself? Contact us here and we’ll be in touch!

Cyber Savvy: Creating a Recipe for Data Defense With K-MAC’s CIO

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

Blog Cover 1500x1500 Template v3 0 DO NOT EDIT OR DELETE copy pptx
The psychology of the modern work environment has become a roadmap for attackers—and a blind spot for traditional email security.
Read More
B VEC Employee Engagement Threat Report Blog 1
New research reveals that employees engage with 44% of read vendor email compromise attacks. See which industries and roles are most vulnerable to this threat.
Read More
B 1500x1500 MKT889c Forrester Wave
Abnormal AI received the highest scores possible in the Innovation and Roadmap criteria, the top score in the Strategy category, and above-average customer feedback.
Read More
B SEG 5 27 25
Traditional secure email gateways once defined email security. Today, they’re struggling to catch the final—and most dangerous—1% of attacks.
Read More
Cover pptx
Discover how Abnormal AI leverages AI tools like Cursor and Model Context Protocol (MCP) in production to accelerate development.
Read More
B Convergence
Explore key takeaways from Season 4 of Convergence, covering how malicious AI is reshaping cybercrime, why human behavior remains a core vulnerability, and what evolving AI policy means for defenders.
Read More