CISO Panel 2: How CISOs can get Cyber Security Woven Into the Business Strategy

Logo
Presented by

Thom Langford, InfoSec veteran, and a panel of guest CISOs

About this talk

A Seat at the King's Table - CISO Panel, Part 2 of 2 Join us for Part 2 of our CISO panel as our guests continue the conversation around the maturation of the information security within today's organizations. This session's discussion is a continuation of the conversation in Part 1 of this CISO Panel. We will build off of the questions addressed during and after the Part 1, and dig into the research and analysis performed by Thom between the sessions. Our Panel members include: -Host: Thom Langford, InfoSec veteran and prior CISO at Publicis Groupe -Panelist: Jun Chen, Deputy CISO/SVP Cyber Security of Publicis Groupe -Panelist: Curt Dalton, Global Leader of Security & Privacy at Protiviti -Panelist: Guest CISO Part 1 of this series took place on September 30th - watch on demand here: https://www.brighttalk.com/webcast/18534/439844 During Part 2, we will welcome a new panel of CISO's to share their thoughts and experiences on the discussion topics and research. We look forward to you joining us at both! As a way to say thank you, those who attend both sessions will receive a free autographed copy of “The Psychology of Information Security” authored by one of our panelists, Leron Zinatullin. *Bonus* Between Part 1 and Part 2 of this event, our host Thom Langford will conduct research pertaining to this topic of discussion and produce a research paper to share with those who attend!*

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (36)
Subscribers (1907)
CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies available. Built upon close to a decade of machine learning, our advanced platform scans the entirety of the internet every 24 hours to uncover unknown assets and shadow IT, cloud services, connected devices, fraudulent domains and exposed credentials — the sources attackers use to access confidential data, launch phishing campaigns or initiate destructive ransomware attacks. CybelAngel's combination of machine learning and expert human analysis provides deep visibility into the most critical threats, long before they’re exploited.