Submit Search
Upload
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Santarcangelo
•
0 likes
•
270 views
I
IT-oLogy
Follow
Helping organizational leaders to adapt the correct mindset of anticipating breach.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 18
Download now
Download to read offline
Recommended
The value imperative of exceptional leadership
The value imperative of exceptional leadership
Security Catalyst
Security Leadership Landscape
Security Leadership Landscape
Security Catalyst
Vlerick Prof. Öykü Isik
Vlerick Prof. Öykü Isik
Jill Neuhard
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
Scott Cressman
The Australian Cyber Security Growth Network Strategy and Goals
The Australian Cyber Security Growth Network Strategy and Goals
Australian Cyber Security Growth Network Ltd
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
NetworkCollaborators
Io t1
Io t1
Vivek Kumar Prasad
Nick Keen Data governance in the Environment Agency
Nick Keen Data governance in the Environment Agency
BCS Data Management Specialist Group
Recommended
The value imperative of exceptional leadership
The value imperative of exceptional leadership
Security Catalyst
Security Leadership Landscape
Security Leadership Landscape
Security Catalyst
Vlerick Prof. Öykü Isik
Vlerick Prof. Öykü Isik
Jill Neuhard
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
Scott Cressman
The Australian Cyber Security Growth Network Strategy and Goals
The Australian Cyber Security Growth Network Strategy and Goals
Australian Cyber Security Growth Network Ltd
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
NetworkCollaborators
Io t1
Io t1
Vivek Kumar Prasad
Nick Keen Data governance in the Environment Agency
Nick Keen Data governance in the Environment Agency
BCS Data Management Specialist Group
Untitled Presentation
Untitled Presentation
Jean-Christophe Rolland
Movie Analysis
Movie Analysis
Rebecca Martin
Laboratorio 5
Laboratorio 5
Irvin Xavier
Evaluare EB Big Bang
Evaluare EB Big Bang
aieseccraiova
Safety and quality
Safety and quality
Nermin Şirin
Illegal Search and Seizure of your Home
Illegal Search and Seizure of your Home
Derek Cassidy
NECH-CIEH’s Hand Sanitizer Grand Opening
NECH-CIEH’s Hand Sanitizer Grand Opening
NECH-CIEH
Haiti presentation2014.hastings
Haiti presentation2014.hastings
NECH-CIEH
Моя презентация"Солнечная система и планеты"
Моя презентация"Солнечная система и планеты"
ANTON_BORINES
HME Nursing Education Workshop Evaluation Analysis
HME Nursing Education Workshop Evaluation Analysis
NECH-CIEH
Chapter 7 Bankruptcy : A Debtor's Guide
Chapter 7 Bankruptcy : A Debtor's Guide
Derek Cassidy
Snapchat
Snapchat
Christopher Whinfrey
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
IT-oLogy
Build the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership success
Security Catalyst
Powerful Communication for Exceptional Security Leaders
Powerful Communication for Exceptional Security Leaders
Security Catalyst
ERM-Enterprise Risk Management
ERM-Enterprise Risk Management
Jorge Vaz Girão , CISA, PMP, PMDPro I, ERMCP
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Security Catalyst
Practical Guides to WSH Culture
Practical Guides to WSH Culture
Goh Chye Guan
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
Clay Melugin
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Security Weekly
Strategic Cybersecurity
Strategic Cybersecurity
ScottMadden, Inc.
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
More Related Content
Viewers also liked
Untitled Presentation
Untitled Presentation
Jean-Christophe Rolland
Movie Analysis
Movie Analysis
Rebecca Martin
Laboratorio 5
Laboratorio 5
Irvin Xavier
Evaluare EB Big Bang
Evaluare EB Big Bang
aieseccraiova
Safety and quality
Safety and quality
Nermin Şirin
Illegal Search and Seizure of your Home
Illegal Search and Seizure of your Home
Derek Cassidy
NECH-CIEH’s Hand Sanitizer Grand Opening
NECH-CIEH’s Hand Sanitizer Grand Opening
NECH-CIEH
Haiti presentation2014.hastings
Haiti presentation2014.hastings
NECH-CIEH
Моя презентация"Солнечная система и планеты"
Моя презентация"Солнечная система и планеты"
ANTON_BORINES
HME Nursing Education Workshop Evaluation Analysis
HME Nursing Education Workshop Evaluation Analysis
NECH-CIEH
Chapter 7 Bankruptcy : A Debtor's Guide
Chapter 7 Bankruptcy : A Debtor's Guide
Derek Cassidy
Snapchat
Snapchat
Christopher Whinfrey
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
IT-oLogy
Viewers also liked
(13)
Untitled Presentation
Untitled Presentation
Movie Analysis
Movie Analysis
Laboratorio 5
Laboratorio 5
Evaluare EB Big Bang
Evaluare EB Big Bang
Safety and quality
Safety and quality
Illegal Search and Seizure of your Home
Illegal Search and Seizure of your Home
NECH-CIEH’s Hand Sanitizer Grand Opening
NECH-CIEH’s Hand Sanitizer Grand Opening
Haiti presentation2014.hastings
Haiti presentation2014.hastings
Моя презентация"Солнечная система и планеты"
Моя презентация"Солнечная система и планеты"
HME Nursing Education Workshop Evaluation Analysis
HME Nursing Education Workshop Evaluation Analysis
Chapter 7 Bankruptcy : A Debtor's Guide
Chapter 7 Bankruptcy : A Debtor's Guide
Snapchat
Snapchat
Cybersecurity in South Carolina - Major General Les Eisner
Cybersecurity in South Carolina - Major General Les Eisner
Similar to How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Santarcangelo
Build the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership success
Security Catalyst
Powerful Communication for Exceptional Security Leaders
Powerful Communication for Exceptional Security Leaders
Security Catalyst
ERM-Enterprise Risk Management
ERM-Enterprise Risk Management
Jorge Vaz Girão , CISA, PMP, PMDPro I, ERMCP
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Security Catalyst
Practical Guides to WSH Culture
Practical Guides to WSH Culture
Goh Chye Guan
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
Clay Melugin
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Security Weekly
Strategic Cybersecurity
Strategic Cybersecurity
ScottMadden, Inc.
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
ValueMentor Consulting
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
Quick Heal Technologies Ltd.
How much should you reveal on social media
How much should you reveal on social media
Quick Heal Technologies Ltd.
Risky Business
Risky Business
Michael Scheidell
From push to pull - the role of assurance in delivering capital programme out...
From push to pull - the role of assurance in delivering capital programme out...
Association for Project Management
The role of assurance in delivering capital program outcomes_Neal Argent Erns...
The role of assurance in delivering capital program outcomes_Neal Argent Erns...
Association for Project Management
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
ForeScout Technologies
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
Forescout Technologies Inc
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
Leona Markham
The 10 Secret Codes of Security
The 10 Secret Codes of Security
Karina Elise
Similar to How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Santarcangelo
(20)
Build the right foundation to accelerate leadership success
Build the right foundation to accelerate leadership success
Powerful Communication for Exceptional Security Leaders
Powerful Communication for Exceptional Security Leaders
ERM-Enterprise Risk Management
ERM-Enterprise Risk Management
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Cracking the code: how security leaders earn respect (Handout Version) - Evan...
Practical Guides to WSH Culture
Practical Guides to WSH Culture
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Strategic Cybersecurity
Strategic Cybersecurity
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
How much should you reveal on social media
How much should you reveal on social media
Risky Business
Risky Business
From push to pull - the role of assurance in delivering capital programme out...
From push to pull - the role of assurance in delivering capital programme out...
The role of assurance in delivering capital program outcomes_Neal Argent Erns...
The role of assurance in delivering capital program outcomes_Neal Argent Erns...
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
FTSE350 Cyber Governance - An insight into the issues of today and tomorrow
The 10 Secret Codes of Security
The 10 Secret Codes of Security
More from IT-oLogy
Low Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De Block
IT-oLogy
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael Kaiser
IT-oLogy
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
IT-oLogy
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
IT-oLogy
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett Coco
IT-oLogy
Open Security - Chad Cravens
Open Security - Chad Cravens
IT-oLogy
Live Exploit - Chad Cravens
Live Exploit - Chad Cravens
IT-oLogy
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce Jenkins
IT-oLogy
In the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim Salter
IT-oLogy
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
IT-oLogy
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy
More from IT-oLogy
(19)
Low Cost Tools for Security Challenges - Timothy De Block
Low Cost Tools for Security Challenges - Timothy De Block
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
Keep Your Family Safe Online - Michael Kaiser
ID Theft: What You Need to Know - Juliana Harris
ID Theft: What You Need to Know - Juliana Harris
Cyber Breach: A Legal Perspective - Jarrett Coco
Cyber Breach: A Legal Perspective - Jarrett Coco
Open Security - Chad Cravens
Open Security - Chad Cravens
Live Exploit - Chad Cravens
Live Exploit - Chad Cravens
Software Security Assurance - Bruce Jenkins
Software Security Assurance - Bruce Jenkins
In the Wake of Ashley Madison - Jim Salter
In the Wake of Ashley Madison - Jim Salter
Passwords in the Internet Age - Jim Salter
Passwords in the Internet Age - Jim Salter
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC L...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in Rock...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC M...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: Regional Impact and Issues in SC U...
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
IT-oLogy Summit on Information Technology: KEYNOTE: Matt Gardner
Recently uploaded
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
jimielynbastida
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
The Digital Insurer
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
null - The Open Security Community
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
Recently uploaded
(20)
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
How Smart Leaders Anticipate Breach to Protect Their Companies - Michael Santarcangelo
1.
@catalyst How smart leaders anticipate
breach to protect their companies Michael Santarcangelo Founder, Security Catalyst Contributing Editor, CSO Online © 2015 Security Catalyst 1
2.
A leadership conversation about
a different way to think about security breach © 2015 Security Catalyst 2
3.
Can we prevent security
breaches? © 2015 Security Catalyst 3
4.
Do we need
to prevent security breaches? © 2015 Security Catalyst 4
5.
A breach is only
a symptom © 2015 Security Catalyst 5
6.
“The problem is
that people have been unintentionally—but systematically— disconnected from the consequences of their decisions. As a direct result, they do not take responsibility and are not held accountable. Treating a breach as the problem only makes this worse." © 2015 Security Catalyst 6
7.
Ending the bias
for breach prevention © 2015 Security Catalyst 7
8.
Leadership mindset drives success ©
2015 Security Catalyst 8
9.
Anticipate breach © 2015
Security Catalyst 9
10.
What happens if
we get breached? © 2015 Security Catalyst 10
11.
3 questions to start
the conversation © 2015 Security Catalyst 11
12.
How fast can
we detect something wrong? © 2015 Security Catalyst 12
13.
How well do
we respond? © 2015 Security Catalyst 13
14.
How is our
prevention actually working? © 2015 Security Catalyst 14
15.
These questions start conversations ©
2015 Security Catalyst 15
16.
Security is not
a sprint © 2015 Security Catalyst 16
17.
A successful journey requires
the right mindset Anticipate Breach © 2015 Security Catalyst 17
18.
© 2015 Security
Catalyst 18 Meet Michael Santarcange The catalyst to develop the exceptional leaders and powerful communicators needed for better security Let’s Connect michael@securitycatalyst.com @catalyst securitycatalyst.com linkedin.com/in/securitycatalyst csoonline.com/author/Michael-Santarcangelo/
Download now