The Future CISO: Securing the digital organisation of the future

Presented by

Paul Watts, ISF Distinguished Analyst

About this talk

Following a turbulent two years, former-CISO and Distinguished Analyst at the ISF Paul Watts, is considering key recommendations for CISOs to improve or maintain their (and their team's) prominence and relevance to their stakeholders. In this session, Paul reflects on where CISOs find themselves today, and what changes they should be looking at to ensure their role continues to add value to an increasingly technically competent digital enterprise. Paul Watts is a Distinguished Analyst of the ISF and joined in August 2021. He has worked in cyber security for over sixteen years as a security executive and CISO in several industry sectors including financial services, retail, critical national infrastructure, food and beverage, data analytics and market research. A certified information security professional holding credentials from both ISC² and ISACA, he has previously spoken and written on many security leadership topics including engaging with the board, building and sustaining robust enterprise security cultures, sustaining high-performing security teams and managing mental well-being in the cyber security industry. Paul is also a Chartered IT Professional and a member of the British Computer Society.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (136)
Subscribers (21026)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user