Education Level: Advanced
3211 - CISO Skill Set: The Tools and Techniques You Need to Succeed (Workshop)
Tuesday, September 26
1:45 PM - 4:00 PM
The purpose of this session is stretching the average life expectancy of the CISO beyond 2.1 years. Today’s CISO is a hybrid: part technician; part manager; part leader; and part visionary. This session will focus on the concrete skills those who believe they are CISO material will need to master. If you are a CISO, this session will give you tools to help you do your job better/cheaper/faster than the competition.
We’ll focus on: assessing the information security department’s operational readiness; skill sets; people, processes and technology; and communicating with upper management and your board. We’ll also take a hard look at what to do when things don’t go as planned.
Join us and learn to thrive, not just survive, as a CISO.
NOTE: In-conference workshops this year have limited seating and require preregistration. If you would like to attend a certain workshop, please register for it during your registration process. Attendees will be checked in at the door, and walk-ups may not be granted access if we reach room capacity.
- Assess an information security department, the people in it and the organization it serves. Develop organization specific tools to accurately determine the capabilities and operational readiness of the department. Develop organization specific tools to accurately determine the capabilities and operational readiness of the department.
- Plan the work and work the plan. Create strategic and tactical plans that work for their information security department; measure the information security departments progress toward the objectives/milestones detailed in the plan; differentiate between processes, projects, programs and reality; and move from analysis paralysis to action. Create the people, processes and technology roadmap for the information security department.
- Demonstrate why the programs, processes and projects in place will keep the organization as secure as possible in the world we live in today. Move beyond guessing and get down to reality; parse the mountains of information coming in and create threat intelligence that is actionable