Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.
That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.
Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:
*What is the Two-Year Trap and how to avoid it
*How to manage the long-term vs. short-term security view
*What do about trendy security attacks
Join us to learn how CISOs can extend their life expectancy with a long-term view.
Recent high profile security breaches, coupled with the damage to company brand, reputation and high financial penalties, means that cyber-security is now on the boardroom agenda. This is no longer just an IT issue, it is a corporate risk issue, impacting the role of the CISO, who is now expected to provide meaningful and actionable security intelligence to board members.
According to Forrester, CISO’s need to be able to be able to answer 4 key questions:
1. What are the new and emerging trends?
2. What is the plan and how to progress against it?
3. What is the comparison against peers?
4. What is the gap from the ideal and the consequences?
Forrester also cites that 62% of global businesses decision makers are concerned about their organizations information and security risk.*
Join Michael Sutton, CISO, Zscaler, Inc., for a compelling webcast that will address the evolving role of the CISO, including:
· The emerging trends in cyber-security CISO’s need to be aware of
· As a CISO, how best to address the 4 key questions
· The latest methods cyber-criminals use to infiltrate organizations
· Key qualities the next generation CISO needs to succeed at the board level and in today’s cyber-threat environment
*Forrester Report 2015: Security Leaders, Earn Your Seat At The Table
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The fourth webinar in the series will cover the topic of Leadership from an IS executive perspective. Technical expertise is a critical component of security leadership; however, the modern CISO must possess a myriad of fundamental business to run a successful program. This session will focus on non-technical areas in which the CISCO should be competent and communicate effectively: strategic planning, financial management, contracting, and vendor management.Read more >
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The third webinar in the series will cover the topic of Business Continuity Management from an executive perspective. This session focuses on the most important concerns related to business continuity management. CISO isn’t always the leader of an organization’s business resilience efforts, but the CISO offers significant influence to ensure an effective program that support business impact analysis, business continuity planning, and disaster recovery for an organization’s critical information assets.Read more >
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The second webinar in the series will cover the topic of Board Presentations from an IS executive perspective. This session focuses on reporting the right metrics to the right people. What metrics should the CISO collect? Where do these metrics exist? What are the best ways to present this information to the board of directors and other organizational leaders?Read more >
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The first webinar in the series will cover the topic of Asset Management from an executive perspective. This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage your asset information? What relationship do asset management and change management share?Read more >
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy.
They provide insight into the path they took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
Interviewer: Adrian Davis, Managing Director, (ISC)² EMEA
Interviewee: Jaya Baloo, CISO, KPN Telecom Netherlands
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and
maintaining an enterprise’s security vision and strategy in an interview format. They provide insight into the path they took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
Host Amber Williams sits down with Keith Rayle, Principal at World Wide Technology to discuss the issue of Privacy inside and outside the US. Also, a discussion with the CISO of Cengage, Robert Hotaling, talks about how to balance the business side of the CISO’s job with the technical side without creating animosity.Read more >
This week, the Global CISO Forum Podcast interviews Keith Rayle, Principal at World Wide Technology and Ron Baklarz, CISO of Amtrak.Read more >
A conversation with Joe Voje, looking back at what the effects of a disastrous 2014 will be for 2015 in information security management and an interview with Dan Lohrmann of Security Mentor chronicling his career, his advice for aspiring CISOs, and his opinion on what 2015 might look like for the world of information security.Read more >