SlideShare a Scribd company logo
1 of 2
Download to read offline
Cybersecurity—Is your team ready for the challenge?
Frequent news of cyber attacks and data breaches continue to
dominate headlines on a daily basis, and no organization is immune
to attack regardless of its size, industry, or geography. There is
mounting evidence that the unrelenting onslaught by a wide array of
cyber criminals across the globe ranging from rogue hackers to nation
states is only becoming more intense, and the cyber criminals are
winning the battle. Given this environment combined with today’s
technology-dependent world, cyber or information security
executives are playing a critical role in protecting companies’ assets
and mitigating the costs associated with lost or stolen intellectual
property, damage or destruction of critical data or infrastructure,
disruptions to critical operations, and loss of confidence amongst
customers, investors, and employees.
Korn Ferry’s Cybersecurity practice brings together a team of advisors
who leverage their experience and expertise across information
technology, national security, and professional services to meet our
clients’ unique cyber and information security talent needs. Our
consultants understand the threats and vulnerabilities that face a
global economy increasingly interconnected and reliant on
information systems. We offer a full portfolio of talent solutions that
include recruiting top talent, such as a new Chief Information
Security Officer (CISO), or building a cybersecurity workforce or
advisory practice. We can also help the C-suite and Board of Directors
align their senior leadership, organization capabilities and culture to
help companies defend against emerging cyber threats.
Coverage and functional areas.
Sectors served:
 Consumer
 Industrial
 Financial Services
 Life Sciences
 Technology
 Professional
Services
 Government
Roles:
 Security Specialists/Analysts
 (Chief) Information Security Officer
 Security Sales / Pre Sales
 Security Architects
 Incident Response & Crisis Management
 Advisory & Consulting Services
Aging infrastructure is growing and leaves
organizations increasingly vulnerable to
compromise. Analysis discovered that 92
percent of online devices were running
software with known vulnerabilities. In
addition, 31 percent of the devices in the
field that were included in the analysis are
“end of sale” and 8 percent are “end of
life.”
In 2015, security executives showed lower
confidence in their security tools and
processes than they did in 2014. For
example, in 2015, 59 percent of
organizations said their security
infrastructure was “very up to date.” In
2014, 64 percent said the same. However,
their growing concerns about security are
motivating them to improve their
defenses.
A benchmark study shows that small and
midsize businesses (SMBs) use fewer
defenses than larger enterprises. For
example, 48 percent of SMBs said in 2015
that they used web security, compared to
59 percent in 2014. And 29 percent said
they used patching and configuration tools
in 2015, compared with 39 percent in
2014. Such weaknesses can place SMBs’
enterprise customers at risk, since
attackers may more easily breach SMB
networks.
In 2015, the median time to detection
(TTD) of known threats has barely
changed, the current industry estimate for
TTD is 100 to 200 days.
Source: Cisco 2016 Annual Security Report
Key trends & insights.
 Cybersecurity talent is crucial to safeguarding companies’ most
precious assets, including intellectual property, sensitive customer
information, financial data, and employee records.
 The C-Suite and Board of Directors are critical to ensuring that
information security and compliance are part of the company’s
culture.
 There is increasing demand and competition for Cybersecurity
talent including senior executives and thousands of network,
information and application security experts. Organizations need
to “treat” their security high potentials well
 Today’s CISOs need to understand the business and have an
enterprise-wide perspective on risk in order to address the cyber
threat and communicate effectively with the C-Suite and Board of
Directors.
 Reporting structures vary and are evolving. Heads of information
security frequently report to the CIO, but increasingly report to
the CFO, Chief Risk Officer, General Counsel, CEO, or a
combination.
 Learning agility and the ability to collaborate effectively are key
attributes required of individuals and organizations focused on
cybersecurity.
 Forward-looking companies are seeking trusted partners who can
advise them on mitigating cyber risk while optimizing their
business operations and financial performance.
Alex Weishaupt – Senior Consultant, Advanced Technology, Cyber Security
CASE STUDY
Client: Global Fortune defence products
company.
Situation: The Company was looking for
several Sales and Presales experts on
different levels with exceptional executive
communications skills, the ability to influence
at all levels of the organization, strong team
leadership and business acumen, and strong
ties into the government agency community
as well as into the industry. Given the
importance of information security to the
customer´s organizations and the high level of
demand for information security talent in the
market, the Company had a considerable
sense of urgency.
Solution: Korn Ferry’s Cybersecurity team
conducted comprehensive market research
focused on talent within large, complex well-
regarded multinational companies and SME
while also leveraging their prior Cyber
Security Sales search experience. Per the
Company’s request, Korn Ferry prioritized a
combination of technical skills, executive
presence and communications, strong
business acumen, credibility and sales
experience.
Consultant, Advanced Technology, Cyber Security & Defence
Alex Weishaupt delivers Projects as a Consultant within the
DACH Advanced Technology Practice since April 2014.
Prior he supported the Delivery Team as a Senior Research
Consultant within Korn/Ferry Futurestep in Frankfurt,
since June 2012, as he specialises in the Manufacturing, Advanced Technology and Life Science industries. He
focuses on both national and international projects, searching for specialists and filling high and middle
management positions in various disciplines.
Prior to joining Korn/Ferry Futurestep, Alex served for 15 years as an officer in the German Armed Forces´ Spec
Ops Division Signal Branch with personnel and mission responsibility. After his time in the military, in 2005, he
moved into the recruiting business and started at a medium-sized, multi-industry focused recruiting agency in
Cologne, where he had the opportunity to gain professional experience in the consulting sector. Later on, he
was recruited by an international operating agency with a focus on IT and Telecommunications where, as a
consultant, he executed projects within high and middle management and with specialists.
Alex studied International Management with a focus on HR and Corporate Management.
Frankfurt
Feuerbachstr. 26-32
60325 Frankfurt
Germany
Tel: +49 69/979 95 94-15
alex.weishaupt@futurestep.de

More Related Content

What's hot

The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...Taiye Lambo
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenturejob Titri company
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016rsouthal2003
 
Understanding the black hat hacker eco system
Understanding the black hat hacker eco systemUnderstanding the black hat hacker eco system
Understanding the black hat hacker eco systemDavid Sweigert
 
Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Pinzhang Chen 陈品璋
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorAccenture Insurance
 
Capgemini Consulting Information Security Benchmarking 2017
Capgemini Consulting Information Security Benchmarking 2017Capgemini Consulting Information Security Benchmarking 2017
Capgemini Consulting Information Security Benchmarking 2017Capgemini
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009edcervantes
 
Managing Risk - The Board and Cyber Security
Managing Risk - The Board and Cyber SecurityManaging Risk - The Board and Cyber Security
Managing Risk - The Board and Cyber SecuritySophia Stefanatto
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities StudyIDG
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityJoan Weber
 
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEYFortuneCMO, LLC
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsBest of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsJeremiah Grossman
 

What's hot (20)

The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
Cost of Cybercrime 2017
Cost of Cybercrime 2017Cost of Cybercrime 2017
Cost of Cybercrime 2017
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
2017 cost of cyber crime study accenture
2017 cost of cyber crime study   accenture2017 cost of cyber crime study   accenture
2017 cost of cyber crime study accenture
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
 
Understanding the black hat hacker eco system
Understanding the black hat hacker eco systemUnderstanding the black hat hacker eco system
Understanding the black hat hacker eco system
 
2015 IA survey - Protiviti
2015 IA survey - Protiviti2015 IA survey - Protiviti
2015 IA survey - Protiviti
 
Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
 
Capgemini Consulting Information Security Benchmarking 2017
Capgemini Consulting Information Security Benchmarking 2017Capgemini Consulting Information Security Benchmarking 2017
Capgemini Consulting Information Security Benchmarking 2017
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009
 
Managing Risk - The Board and Cyber Security
Managing Risk - The Board and Cyber SecurityManaging Risk - The Board and Cyber Security
Managing Risk - The Board and Cyber Security
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis ResultsBest of Both Worlds: Correlating Static and Dynamic Analysis Results
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
 

Similar to Cybersecurity Marketing

Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Enterprise Management Associates
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersMighty Guides, Inc.
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxNakhoudah
 
The Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfThe Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfTHECIOWORLD
 
World's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdfWorld's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdfInsightsSuccess4
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015John Budriss
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015Scott Smith
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent ThreatsBooz Allen Hamilton
 
cyber-security-brochure
cyber-security-brochurecyber-security-brochure
cyber-security-brochureNick Serafimov
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_readingseadeloitte
 
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...ssuser2d55aa
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 

Similar to Cybersecurity Marketing (20)

Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
 
The Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdfThe Most Influential CISOs Of The Year 2024.pdf
The Most Influential CISOs Of The Year 2024.pdf
 
World's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdfWorld's Most Innovative Tech Companies 2023.pdf
World's Most Innovative Tech Companies 2023.pdf
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
cyber-security-brochure
cyber-security-brochurecyber-security-brochure
cyber-security-brochure
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_reading
 
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 

Cybersecurity Marketing

  • 1. Cybersecurity—Is your team ready for the challenge? Frequent news of cyber attacks and data breaches continue to dominate headlines on a daily basis, and no organization is immune to attack regardless of its size, industry, or geography. There is mounting evidence that the unrelenting onslaught by a wide array of cyber criminals across the globe ranging from rogue hackers to nation states is only becoming more intense, and the cyber criminals are winning the battle. Given this environment combined with today’s technology-dependent world, cyber or information security executives are playing a critical role in protecting companies’ assets and mitigating the costs associated with lost or stolen intellectual property, damage or destruction of critical data or infrastructure, disruptions to critical operations, and loss of confidence amongst customers, investors, and employees. Korn Ferry’s Cybersecurity practice brings together a team of advisors who leverage their experience and expertise across information technology, national security, and professional services to meet our clients’ unique cyber and information security talent needs. Our consultants understand the threats and vulnerabilities that face a global economy increasingly interconnected and reliant on information systems. We offer a full portfolio of talent solutions that include recruiting top talent, such as a new Chief Information Security Officer (CISO), or building a cybersecurity workforce or advisory practice. We can also help the C-suite and Board of Directors align their senior leadership, organization capabilities and culture to help companies defend against emerging cyber threats. Coverage and functional areas. Sectors served:  Consumer  Industrial  Financial Services  Life Sciences  Technology  Professional Services  Government Roles:  Security Specialists/Analysts  (Chief) Information Security Officer  Security Sales / Pre Sales  Security Architects  Incident Response & Crisis Management  Advisory & Consulting Services Aging infrastructure is growing and leaves organizations increasingly vulnerable to compromise. Analysis discovered that 92 percent of online devices were running software with known vulnerabilities. In addition, 31 percent of the devices in the field that were included in the analysis are “end of sale” and 8 percent are “end of life.” In 2015, security executives showed lower confidence in their security tools and processes than they did in 2014. For example, in 2015, 59 percent of organizations said their security infrastructure was “very up to date.” In 2014, 64 percent said the same. However, their growing concerns about security are motivating them to improve their defenses. A benchmark study shows that small and midsize businesses (SMBs) use fewer defenses than larger enterprises. For example, 48 percent of SMBs said in 2015 that they used web security, compared to 59 percent in 2014. And 29 percent said they used patching and configuration tools in 2015, compared with 39 percent in 2014. Such weaknesses can place SMBs’ enterprise customers at risk, since attackers may more easily breach SMB networks. In 2015, the median time to detection (TTD) of known threats has barely changed, the current industry estimate for TTD is 100 to 200 days. Source: Cisco 2016 Annual Security Report
  • 2. Key trends & insights.  Cybersecurity talent is crucial to safeguarding companies’ most precious assets, including intellectual property, sensitive customer information, financial data, and employee records.  The C-Suite and Board of Directors are critical to ensuring that information security and compliance are part of the company’s culture.  There is increasing demand and competition for Cybersecurity talent including senior executives and thousands of network, information and application security experts. Organizations need to “treat” their security high potentials well  Today’s CISOs need to understand the business and have an enterprise-wide perspective on risk in order to address the cyber threat and communicate effectively with the C-Suite and Board of Directors.  Reporting structures vary and are evolving. Heads of information security frequently report to the CIO, but increasingly report to the CFO, Chief Risk Officer, General Counsel, CEO, or a combination.  Learning agility and the ability to collaborate effectively are key attributes required of individuals and organizations focused on cybersecurity.  Forward-looking companies are seeking trusted partners who can advise them on mitigating cyber risk while optimizing their business operations and financial performance. Alex Weishaupt – Senior Consultant, Advanced Technology, Cyber Security CASE STUDY Client: Global Fortune defence products company. Situation: The Company was looking for several Sales and Presales experts on different levels with exceptional executive communications skills, the ability to influence at all levels of the organization, strong team leadership and business acumen, and strong ties into the government agency community as well as into the industry. Given the importance of information security to the customer´s organizations and the high level of demand for information security talent in the market, the Company had a considerable sense of urgency. Solution: Korn Ferry’s Cybersecurity team conducted comprehensive market research focused on talent within large, complex well- regarded multinational companies and SME while also leveraging their prior Cyber Security Sales search experience. Per the Company’s request, Korn Ferry prioritized a combination of technical skills, executive presence and communications, strong business acumen, credibility and sales experience. Consultant, Advanced Technology, Cyber Security & Defence Alex Weishaupt delivers Projects as a Consultant within the DACH Advanced Technology Practice since April 2014. Prior he supported the Delivery Team as a Senior Research Consultant within Korn/Ferry Futurestep in Frankfurt, since June 2012, as he specialises in the Manufacturing, Advanced Technology and Life Science industries. He focuses on both national and international projects, searching for specialists and filling high and middle management positions in various disciplines. Prior to joining Korn/Ferry Futurestep, Alex served for 15 years as an officer in the German Armed Forces´ Spec Ops Division Signal Branch with personnel and mission responsibility. After his time in the military, in 2005, he moved into the recruiting business and started at a medium-sized, multi-industry focused recruiting agency in Cologne, where he had the opportunity to gain professional experience in the consulting sector. Later on, he was recruited by an international operating agency with a focus on IT and Telecommunications where, as a consultant, he executed projects within high and middle management and with specialists. Alex studied International Management with a focus on HR and Corporate Management. Frankfurt Feuerbachstr. 26-32 60325 Frankfurt Germany Tel: +49 69/979 95 94-15 alex.weishaupt@futurestep.de