Engaging Your Line of Business for Cybersecurity Initiatives

Logo
Presented by

Scott Bridgen, Head of OneTrust GRC; Sharon Smith, CISSP, Moderator

About this talk

Security cannot be done in a silo. The extent and nature of data shared across lines of business functions, both internally and externally, fuels instances of system and organizational vulnerabilities. GRC must transcend the traditional lines of defense, specifically risk managers and audit professionals. In this webinar, we’ll discuss roles and responsibilities of effective risk management practices. What can businesses do to better align key stakeholders? How can businesses incorporate Security by Design process and practices and where can technology support with structured data sets and automation? We’ll look at: · Aligning organizational goals, and department objectives to translate risk into business impacts.    · Automating GRC touchpoints into your line of business functions   · Integrating Audit to document and support continuous improvement initiatives
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (446)
Subscribers (139016)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.