Streamlining Your Cybersecurity Risk Process for Blindspot Elimination

Presented by

Alex Heid, Chief Research Officer, SecurityScorecard & Kelly Yang, Senior Risk Manager, Northwestern Mutual

About this talk

Streamlining Your Cybersecurity Risk Process for Blindspot Elimination, Scalability and Increased Digital Trust. As your organization continues to mature, your cybersecurity risk management process, and its scalability, takes on great importance. In this webinar, we will walk you through effective and measurable ways to prioritize your actions in order to scale your program, develop, and deliver effective internal communication, and instill a more risk-averse company culture. On Tuesday 30th June, at 14:00 BST / 09:00 ET, the ISF will be joined by Alexander Heid, Chief Research Officer at SecurityScorecard, and Kelly Yang, Senior Director of Risk Management at Northwestern Mutual, for a live webinar discussing “Streamlining Your Cybersecurity Risk Process for Blindspot Elimination, Scalability and Increased Digital Trust.” What you will learn during this webinar: •How to streamline your cybersecurity risk management process to scale •Effective tips on collaboration with other internal teams/players to eliminate blindspots and create a company culture which focuses on risk and uses it as a measurement of success •Ways to increase digital trust, both internally and externally

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (137)
Subscribers (21336)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user