Posted on
in Presentations
Setup your new CISO role for success. Learn from the former CISO of Twitter and Mozilla. First, the importance of a restraining from action and embarking on a “listening tour,” the fallacy of CISO accountability for all data breaches, how to build your strategic security roadmap and gain executive support, and the core essences of team building in a negative unemployment security market.
Pre-Requisites: Attendees should have experience leading security divisions and programs and an understanding of challenges balancing technical, organization, and governance risks. Best suited for those with a desire to be a successful CISO.
Pre-Requisites: Attendees should have experience leading security divisions and programs and an understanding of challenges balancing technical, organization, and governance risks. Best suited for those with a desire to be a successful CISO.
Security Strategy & Architecture Protecting Data & the Supply Chain Ecosystem Hackers & Threats
threat management risk & vulnerability assessment practitioner perspectives governance risk & compliance data security
Topic
Security Strategy & Architecture
Protecting Data & the Supply Chain Ecosystem
Hackers & Threats
Subtopic
threat management
risk & vulnerability assessment
practitioner perspectives
governance risk & compliance
data security
Share With Your Community