In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.Read more >
The widespread use of smartphones and tablets has changed the risk model for many organizations that now enable workers to access corporate information on the go.
View this dynamic webinar to learn how you can manage your mobile security risk by drawing on the expertise of the security industry leaders pictured above.
Topics of discussion include:
What are the biggest challenges that enterprises face today when it comes to mobile devices?
What are some of the current approaches enterprises are taking to secure mobile devices? What are the pros and cons?
How do you measure and report on mobile security risk?
What is CISO's role when it comes to risk management and how it has evolved?
How to make sure a CISO's work isn't dumped when they leave.
A CISO's departure can leave a company vulnerable and its security posture at risk. Having a plan to manage a CISO succession is critical to business continuity. In this webinar, outgoing Imperva CISO Shahar Ben-Hador and his successor Bo Kim provide key steps to successful succession planning, including:
* Building a transition timeline
* Evaluating which projects should be completed and which handed off
* Determining where to draw the line on investments
About the Speakers:
Shahar Ben-Hador, CISO, Imperva
As the CISO of Imperva (NASDAQ: IMPV) Shahar's team was responsible for Cyber Security and Compliance of the enterprise footprint and Cloud Operations activities for Imperva and Incapsula SaaS product lines.
Bo Kim, Sr. Dir. Information Security, Imperva
Bo’s team is responsible for developing and maintaining Imperva’s security posture. He is assuming responsibility from Shahar for cybersecurity and compliance.
Last year saw dramatic shifts in the cybersecurity landscape. The number of data breaches and cyber-attacks is skyrocketing. CISOs and security leaders are struggling to find and invest in the best approaches to combat cybercrime for their organizations.
Traditional application security testing methods just aren’t cutting it anymore, leaving so many organizations vulnerable. To get a better understanding on what is top of mind for cyber security leaders this year, we surveyed more than 250 CISOs, CIOs, CTOs and CIOs across different industries and regions.
Join our live CISO panel discussion which will outline this year’s top security goals and concerns:
1. Overcoming cybersecurity resource shortages
2. Managing increasingly complex tools and proving their ROI
3. Addressing perceived concerns in running a VDP or Bug Bounty Program
David Baker, CSO, Bugcrowd
Geoff Poer, CISO, Chronos
Martin Rues, CISO, Outreach.io
Maxime Rousseau, CSO, Personal Capital
Passwords alone won’t cut it in the days of sophisticated phishing, spoofed email and social engineering attacks. High-profile security breaches are making headlines weekly, and the number of incidents continues to rise. Multi-factor authentication (MFA) has become the go-to tactic to prevent malicious parties from accessing sensitive corporate data. While MFA provides undeniable value, conventional MFA solutions are difficult and time-consuming to implement with end-user usability implications.
Watch this informative on-demand webcast hosted by SC Magazine featuring OneLogin’s, CISO, Alvaro Hoyo as we uncover the current state of MFA and the tangible security value it provides, plus key elements of a successful MFA strategy.
Abstract & Takeaways:
•The CISO is a key board advisory and so - if not ‘a permanent seat at the table’ – then ‘an audible voice in the boardroom’ must be heard, loudly and clearly. Tips on how to facilitate this.
•The Board, CISO and Cybercriminal’s shared focus - Just forget the ‘noise’ about software, tools, infrastructure, CISO qualifications etc. – and focus on the ‘crown jewels’, i.e. the intellectual property that the Cybercriminal is out to steal from your firm. Work your way backwards from your intellectual property, to give yourself half a chance of thwarting the determined cybercriminal!
•The CISO has essentially become a key corporate reputation ambassador, over the past few years’; with each breach discovered – affecting the company’s brand, both tangibly and intangibly. Will cybercriminals become more emboldened by the GDPR notification requirements; simply to tarnish your firm’s reputation? Reflect on this!
•The Equifax breach has led to two officers being investigated for Insider Dealing, by the FBI. Was Equifax’s board and CISO aware of the regulatory requirements pertaining to their industry? Might the modern day CISO benefit from an awareness of the regulatory environment within which their firm operates, including beyond Cybersecurity and data protection regulations e.g. the UK Money Laundering Regulations 2017, Terrorist Financing, Insider Dealing regulations etc.?
In every organization, the executive who leads cyber-defense efforts is becoming a key player in their long-term survival. But what do we really know about CISOs and how they operate? Join F5’s own Principal Threat Research Evangelist, Ray Pompon, and CISO guest speakers Kip Boyle and Michael Hamilton for a lively discussion about the findings of the recent F5 commissioned report, The Evolving Role of CISOs and Their Importance to the Business.
What You'll Learn
- How much experience, education and business/technical background most CISOs have
- Who the CISO is reporting to and how the structure can affect security practices
- How security initiatives are rolled out across organizations
Join Gigamon CISO, Simon Gibson, to see how to take a methodical approach to threat detection. This discussion will dive into the causes and effects of 2017’s biggest breaches – and what you can do to prepare for 2018. Discover how to create a unified view to systematically track risk and establish a baseline of acceptable risk.
Attendees will learn:
• Why more security tools are not necessarily better.
• How to maintain confidentiality, integrity and availability of data.
• How to track and manage acceptable amounts of risk over time.
• How new projects and shadow IT introduce incremental risk.
• How to implement intelligent automated models to build customized defenses.
• Why comprehensive network visibility -- on-premises and in the cloud -- is critical.
If you want to learn why prescriptive approaches to threat detection won’t work and how to make better use of your existing tools to improve security without sacrificing performance, you won’t want to miss this webinar.
Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.
That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.
Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:
*What is the Two-Year Trap and how to avoid it
*How to manage the long-term vs. short-term security view
*What do about trendy security attacks
Join us to learn how CISOs can extend their life expectancy with a long-term view.
‘Security is considered throughout the development life cycle,’ says Network Rail’s CISO, Paul Watts.
Join EM360° as we sit down with Paul and discuss the discipline of security, ways to drive modern day technology into Network Rail’s infrastructure and how to be agile without compromising security.
Recent high profile security breaches, coupled with the damage to company brand, reputation and high financial penalties, means that cyber-security is now on the boardroom agenda. This is no longer just an IT issue, it is a corporate risk issue, impacting the role of the CISO, who is now expected to provide meaningful and actionable security intelligence to board members.
According to Forrester, CISO’s need to be able to be able to answer 4 key questions:
1. What are the new and emerging trends?
2. What is the plan and how to progress against it?
3. What is the comparison against peers?
4. What is the gap from the ideal and the consequences?
Forrester also cites that 62% of global businesses decision makers are concerned about their organizations information and security risk.*
Join Michael Sutton, CISO, Zscaler, Inc., for a compelling webcast that will address the evolving role of the CISO, including:
· The emerging trends in cyber-security CISO’s need to be aware of
· As a CISO, how best to address the 4 key questions
· The latest methods cyber-criminals use to infiltrate organizations
· Key qualities the next generation CISO needs to succeed at the board level and in today’s cyber-threat environment
*Forrester Report 2015: Security Leaders, Earn Your Seat At The Table
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The fourth webinar in the series will cover the topic of Leadership from an IS executive perspective. Technical expertise is a critical component of security leadership; however, the modern CISO must possess a myriad of fundamental business to run a successful program. This session will focus on non-technical areas in which the CISCO should be competent and communicate effectively: strategic planning, financial management, contracting, and vendor management.Read more >
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The third webinar in the series will cover the topic of Business Continuity Management from an executive perspective. This session focuses on the most important concerns related to business continuity management. CISO isn’t always the leader of an organization’s business resilience efforts, but the CISO offers significant influence to ensure an effective program that support business impact analysis, business continuity planning, and disaster recovery for an organization’s critical information assets.Read more >
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The second webinar in the series will cover the topic of Board Presentations from an IS executive perspective. This session focuses on reporting the right metrics to the right people. What metrics should the CISO collect? Where do these metrics exist? What are the best ways to present this information to the board of directors and other organizational leaders?Read more >
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The first webinar in the series will cover the topic of Asset Management from an executive perspective. This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage your asset information? What relationship do asset management and change management share?Read more >
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy.
They provide insight into the path they took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
Interviewer: Adrian Davis, Managing Director, (ISC)² EMEA
Interviewee: Jaya Baloo, CISO, KPN Telecom Netherlands
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and
maintaining an enterprise’s security vision and strategy in an interview format. They provide insight into the path they took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
Host Amber Williams sits down with Keith Rayle, Principal at World Wide Technology to discuss the issue of Privacy inside and outside the US. Also, a discussion with the CISO of Cengage, Robert Hotaling, talks about how to balance the business side of the CISO’s job with the technical side without creating animosity.Read more >
Join Tom Bain, VP of Marketing at Morphisec, as he has a candid discussion with Adrian Asher, CISO of the London Stock Exchange Group, on industry trends, challenges, and recommendations for moving forward.Read more >