From Governance to Implementation to Results
What cyber security measures should today’s CISOs be taking that are actually helpful in stopping hackers? What strategic areas are worth focusing on and spending money on? And… what’s not working? What programs have CISOs implemented that aren’t returning a good value?
In this webinar, we’ll discuss the building blocks of great security programs from governance, automation, implementation models, and more. We won’t be talking about products and technology solutions you should buy. We’ll be offering practical advice about what you need to focus on to protect your systems.
Key Takeaways
- Building blocks of a great security program
- What’s working to identify and counter hacking
- What are leading organizations doing within programmatic testing
- How to build a strong team and governance within your team
- Core areas that every security organization should be focusing on
Watch Now!
Bob Bigman
Cyber Security Consultant / 2BSecure
Robert Bigman is recognized as a pioneer in the field of classified information protection, as he developed technical measures and procedures to manage the nation’s most sensitive secrets. Bigman is an information security trailblazer and participated in developing security measures for government computers well before the commercial industry found the Internet. During his 30 years at the CIA, he worked on various cyber security assignments on policy, cryptography, and technology operations support, and was the agency CISO for the last 15 years.
Now an independent consultant, Bigman works with the U.S. Government, foreign governments, and Fortune 50 companies, helping them both build productive cyber security programs and successfully resist attacks from the most sophisticated hackers.
Dan Raywood
Deputy Editor / Infosecurity Magazine
Dan Raywood is the deputy editor of Infosecurity Magazine. He has written about IT security since 2008, and is a former Analyst in the Information Security Practice at 451 Research. He has spoken at shows including 44CON, SecuriTay, SteelCon, Irisscon, and Infosecurity Europe, as well as writing for a number of vendor blogs and presenting on webcasts.