Achieving a high-performing SOC - and being a successful cybersecurity leader

Presented by

Kev Eley, Client Director, LogRhythm and Dan Crossley, SE CISSP, LogRhythm

About this talk

As cyberattacks continue to make headlines worldwide, organisations that neglect the importance of fusing a pervasive security culture containing effective SecOps processes with skilled team players committed to do their very best are making a catastrophic error in judgement. A proliferation of security technologies alone – even if they are correctly configured – will never stop cyberattacks or protect an organisation from a possible data breach, unless the correct playbooks are implemented and consistently operated by a skilled, motivated team with full backing of the board of directors. Leading a cybersecurity team requires recruiting and retaining talent, developing the right strategy and fostering a culture of success. All while managing critical relationships with the board and other fickle stakeholders. In this webinar, Dan Crossley and Kevin Eley are joined by guest industry speakers Michael Brown and Andy Johnson as they discuss the key attributes of a successful cybersecurity leader. The discussion will include: •The importance of managing expectations with the board and implementing a robust infosec management system that must be measured •Whether a security operations maturity model can assist an organisation on their journey to building a culture of security that reduces risk •What – if any – lessons can the CISO learn from other walks of life
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (21)
Subscribers (8192)
Notice: LogRhythm APJ channel has moved! Please note that this channel will not be updated with new content from 31 December 2020. We invite you to our new and improved LogRhythm channel, which can be accessed here: At LogRhythm, we strive to provide our users and subscribers with the latest security tips & tricks available on-demand. Check out our latest talk: How to build an effective security program with limited resources: