Hi [[ session.user.profile.firstName ]]

The CISO Job - Getting It, and Keeping It

A Politics of Information Security Webcast

Over the last decade, the Chief Information Security Officer (CISO) has emerged as the job in IT risk management. But for many, it's a high-risk career move. Average tenures in the role remain mired at just a few years. But success is poss
A Politics of Information Security Webcast

Over the last decade, the Chief Information Security Officer (CISO) has emerged as the job in IT risk management. But for many, it's a high-risk career move. Average tenures in the role remain mired at just a few years. But success is possible — join our expert panel to learn how you can get, and keep, the CISO job.

You'll learn:

How to Get the CISO Job:
- Who gets to the top of the shortlist
- Whether certifications play a role
- How experience in other parts of the organization can help your bid

And Then, How to Keep It:
- How to deal with senior management
- Establishing governance frameworks to guide your activities
- Advice on balancing tactical vs. strategic efforts
- Positioning yourself as an enabler, not a blocker
- Staying ahead by meeting all important audit and regulatory requirements


Featured Speakers:
- Craig Shumard, Principal, Shumard and Associates, LLC, retired CISO, Cigna
- Marcus Ranum, CSO, Tenable Network Security
- Todd Bearman, CISO, Towers Watson
Recorded May 31 2012
63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Featuring Craig Shumard, Marcus Ranum, and Todd Bearman
Presentation preview: The CISO Job - Getting It, and Keeping It
Recommended for you:
  • Date
  • Rating
  • Views
  • How U.S. hospitals Enhance Patient Care with PCoIP & Imprivata technology How U.S. hospitals Enhance Patient Care with PCoIP & Imprivata technology Chris Smith, Imprivata & Patrick Mauro, Teradici Live 60 mins
    Today, hospitals and healthcare organizations are under increasing pressure to revamp the way doctors and clinicians work and the how patients are treated ̶ IT based solutions across medical units work to make patient treatment and medical professional work more efficient and effective.

    Join us for an informative session and hear how leading hospitals have reduced IT costs and increased clinical staff productivity.

    This webinar will share how three medical facilities in the U.S. have successfully:
    •Streamlined clinical workflows with “no click access”
    •Ensured the protection of patient information and compliance requirements with “tap in and out” user authentication and highly secure PCoIP® Zero Clients
    •Increased staff and doctor satisfaction with a consistent user experience that follows them no matter where they need to work
    •Reduced operational costs by deploying PCoIP Zero Clients, PCoIP Management Console Enterprise Edition and Imprivata OneSign® Single Sign On (SSO)
  • 2016 Healthcare Internet Security Threat Report Highlights 2016 Healthcare Internet Security Threat Report Highlights Paul Wood, Cyber Security Intelligence Manager, Symantec and David Finn, Health IT Officer, Symantec Live 60 mins
    It’s bad news I’m afraid. Healthcare topped the tables for data breaches in 2015, and the trend seems to continue into 2016. Attend this much-anticipated webcast for an analysis on the cyber threats targeting healthcare organizations from the newly released Symantec Healthcare Internet Security Threat Report.

    Get the latest research on cyber threats including:

    • Why zero-day vulnerabilities are becoming commodities
    • How ransomware is expanding to new targets such as smartphones, Mac and Linux systems
    • The evolution of cybercriminals as they establish professional businesses in order to increase the efficiency of their attacks

    Register now for the latest analysis of global cyber threats and specific steps healthcare organizations can take to improve their security posture in 2016.
  • Ransomware: Dark Money and Emerging Threats Ransomware: Dark Money and Emerging Threats Michael Aguilar, Business Product Technical Lead, ESET North America Live 60 mins
    You’ve seen the headlines on ransomware, developed by cybercriminals to encrypt and hold computers or data hostage. Now, join this webcast for an in-depth look.
    Join an ESET business product technical lead to learn:
    •How ransomware has evolved and spread
    •Why mobile phones and Apple OS X are increasingly vulnerable
    •Best practices for avoiding and dealing with ransomware
    •Why to implement backup and recovery solutions now
  • Protect Against New Threats to Safely Enable SaaS Protect Against New Threats to Safely Enable SaaS Anuj Sawani, Product Marketing Manager, Ryan Olson, Director, Intelligence Live 60 mins
    The usage of SaaS applications continues to grow rapidly whether they are enabled by IT or your end users. SaaS-based application usage has grown 46 percent over the past three years as shown in the latest Application Usage and Threat Report from Palo Alto Networks. The attackers are now adapting to leverage these applications as a point of insertion and a medium for malware to proliferate.

    Join us for this live webinar where you will hear from Unit 42, the Palo Alto Networks threat research team, on how malware is using SaaS applications. You will also learn how to:
    • Protect against the new insertion and distribution points for malware
    • Gain visibility and granular, context-based control of SaaS applications.
    • Secure corporate data from malicious and inadvertent data exposure 
     
  • Understanding PCI DSS 3.2: Minor Updates, Major Changes Understanding PCI DSS 3.2: Minor Updates, Major Changes J. Andrew Brinkhorst, CISM, Director of Product Management at Trustwave, and Dixie Fisher, Product Marketing Manager Recorded: May 25 2016 60 mins
    Payment Card Industry Data Security Standard (PCI DSS) 3.2 has now been announced - organizations who must comply need to understand the implications. Join us to learn more about the drivers for the early release of the mandate and how you can best prepare your organization.

    Attend this webinar for helpful insights about:

    -The scope of the new PCI DSS 3.2
    -What the updates mean for your business?
    -Why you would want to make these changes even if they weren’t mandated?
    -What may be on the horizon?
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.
  • Digital Content & The Legality of Web Scraping Digital Content & The Legality of Web Scraping Jonathan Bailey, Rami Essaid, Katie Sunstrom, Orion Cassetto Recorded: May 25 2016 52 mins
    Web scraping - the process of using bots to systematically lift content from a website - is either loved or hated. Startups love it because it’s a cheap and powerful way to gather data without the need for partnerships. Large companies use web scraping to gain competitive intelligence, but try to block others from doing the same. However, new legislation and high profile court cases have called into question the legality of web scraping.

    In this lively conversation, diverse panelists will discuss the origin of web scraping, the changing legal landscape, and the legal and technical best practices for protecting your website content.
  • Security, Privacy and Risk in a Mobile World Security, Privacy and Risk in a Mobile World Sushila Nair, Managing Director, Cybernetics, CISA, CISSP, CISM, CRISC Recorded: May 25 2016 39 mins
    The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.

    This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
  • Security, Privacy and Risk in a Mobile World Security, Privacy and Risk in a Mobile World Sushila Nair, Managing Director, Cybernetics, CISA, CISSP, CISM, CRISC Recorded: May 25 2016 39 mins
    The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.

    This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The CISO Job - Getting It, and Keeping It
  • Live at: May 31 2012 6:00 pm
  • Presented by: Featuring Craig Shumard, Marcus Ranum, and Todd Bearman
  • From:
Your email has been sent.
or close
You must be logged in to email this