InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Streamlining Your Cybersecurity Risk Process for Blindspot Elimination

Presented by

Alex Heid, Chief Research Officer, SecurityScorecard & Kelly Yang, Senior Risk Manager, Northwestern Mutual

About this talk

Streamlining Your Cybersecurity Risk Process for Blindspot Elimination, Scalability and Increased Digital Trust. As your organization continues to mature, your cybersecurity risk management process, and its scalability, takes on great importance. In this webinar, we will walk you through effective and measurable ways to prioritize your actions in order to scale your program, develop, and deliver effective internal communication, and instill a more risk-averse company culture. On Tuesday 30th June, at 14:00 BST / 09:00 ET, the ISF will be joined by Alexander Heid, Chief Research Officer at SecurityScorecard, and Kelly Yang, Senior Director of Risk Management at Northwestern Mutual, for a live webinar discussing “Streamlining Your Cybersecurity Risk Process for Blindspot Elimination, Scalability and Increased Digital Trust.” What you will learn during this webinar: •How to streamline your cybersecurity risk management process to scale •Effective tips on collaboration with other internal teams/players to eliminate blindspots and create a company culture which focuses on risk and uses it as a measurement of success •Ways to increase digital trust, both internally and externally
Information Security Forum

Information Security Forum

31250 subscribers172 talks
Tackling cyber challenges with confidence
A thought-provoking webinar programme developed from over three decades of collaborating with our Members across global business, government bodies, legislators and cyber security experts.
Related topics