SlideShare a Scribd company logo
1 of 8
Download to read offline
CISOs and their teams operate against a backdrop of continuous change in the threat
landscape, information security technology, and business conditions. The mission to
protect critical assets across space and time is further complicated by a lack of direct
control over the people and processes that expose the organization to risk through day-
to-day operations.
In-depth research with hundreds of information security leaders revealed
a common thread among the top performers:
Technical skills, while essential, are not enough.
To deliver maximum impact, Information Security must
engage with the business and practice proactive
organizational engagement.
To drive insight and enable action
on these “soft skills,” IANS has
broken proactive organizational
engagement down into a set of
clearly defined, quantifiable
elements we call The 7 Factors
of CISO Impact.
Our CISO Impact framework provides a
structured, action-oriented approach that
allows you to baseline your performance
and measure progress down to the Factor
and sub-Factor levels as you work towards
b e t t e r p ro a c t i v e o rg a n i z a t i o n a l
engagement.
First step: take the Diagnostic.
The Diagnostic is an online self-
assessment that measures the current
state of your team’s organizational
engagement. Your personal report
provides you with insight into your team’s
strengths and weaknesses, and allows
you to compare the results to those of
your peers.
As you work to improve your skill sets in
each of the 7 Factors, your Diagnostic
results will reflect your progress.
Then, attend
a CISO Impact
Workshop.
The CISO Impact Workshop is a four-hour
deep dive into one of the 7 Factors of
CISO Impact.
IANS-proprietary worksheets will help you
break down your Factor-specific Diagnostic
results into concrete, step-by-step actions
for improvement.
You’ll experience a new way of thinking
about what you do, and walk away with
insights that will influence the way that you
execute your mission.
A CISO Impact Workshop is a collaborative
hands-on working session.
Wrap-Up
Review lessons
learned and
discuss of how
improvement
will drive
success.Introductions
Get to know your
fellow CISOs
Workshop Orientation
The IANS facilitator
describes the workshop
context, components and
flow for the day
Solo Work
Document your
team’s skills and
processes vs. the
workshop Factor.
Presentations &
Feedback
Present your
workbook
writings and
receive feedback
from your peers.
Research Overview
A discussion of the
research and structure of
the CISO Impact
framework
Diagnostic
An explanation of how
the CISO Impact self-
assessment tool works
What are the 7 Factors?
An overview of the individual
7 Factors of CISO Impact,
and a look at how they all
work together to drive
success.
Small Group
Discussion
Share ideas and
challenges with
your small group
Can you communicate the value of
information security in a compelling way?
To be effective, information security needs resources and
support from a range of stakeholders – but many security teams
aren’t prepared to state their case persuasively. Clear,
compelling communication is key to justifying budget requests
and paving the way towards working more collaboratively with
other business departments, but 62% of CISOs who completed
the CISO Impact Diagnostic are still in the early stages of
proactively engaging with key stakeholders to build a strong
value proposition. What steps can you take to move the needle?
At a recent Factor 6 Workshop, we posed the question:
Factor 6:
Communicate the Value
of Information Security
Participants discussed the challenges …
… and through that discussion, shared
thoughts on how to address the problem.
“Most of the organization
sees us the business
prevention team. They just
don’t get why we do what
we do. ”
“We’re organized in IT
so we don’t really have
the visibility into the
stakeholder challenges
and needs.”
“Our team is comfortable
answering questions and
providing options. Selling
our value is not a natural
thing for us to do.”
You’ll walk away with strategies for success
in real-world situations. For example,
you’ll learn how to:
•  Build a strong, business-oriented value proposition that
explains how information security helps your company grow
and win.
•  Engage deeply with key stakeholders – not just the ‘easy’
ones like Finance, Risk, Audit and Compliance but also the
business unit GMs – to understand what drives their business
decisions.
•  Work with the Marketing department to develop assets that
communicate your value proposition.

More Related Content

What's hot

Webinar: Vulnerability Management IT can fix it, but the business needs to ow...
Webinar: Vulnerability Management IT can fix it, but the business needs to ow...Webinar: Vulnerability Management IT can fix it, but the business needs to ow...
Webinar: Vulnerability Management IT can fix it, but the business needs to ow...Iceberg Networks Corporation
 
Case analysis
Case analysisCase analysis
Case analysisamol_nale
 
The Scientific Approach to Mitigating Operational Risk
The Scientific Approach to Mitigating Operational RiskThe Scientific Approach to Mitigating Operational Risk
The Scientific Approach to Mitigating Operational RiskNicolle Nelson
 
Elevating the Role of the CIO to Strategic Business Partner
Elevating the Role of the CIO to Strategic Business PartnerElevating the Role of the CIO to Strategic Business Partner
Elevating the Role of the CIO to Strategic Business PartnerChangepoint
 
Project center in coimbatore
Project center in coimbatoreProject center in coimbatore
Project center in coimbatorepcicblog
 
CIO Strategy Consulting Offerings APAC
CIO Strategy Consulting Offerings APACCIO Strategy Consulting Offerings APAC
CIO Strategy Consulting Offerings APACAlex Llorens
 
Major Hazard Installations
Major Hazard InstallationsMajor Hazard Installations
Major Hazard InstallationsAdvisian
 
Social Performance: Can we get it right?
Social Performance: Can we get it right?Social Performance: Can we get it right?
Social Performance: Can we get it right?Advisian
 
Data-centric Safety Critical Element Management
Data-centric Safety Critical Element ManagementData-centric Safety Critical Element Management
Data-centric Safety Critical Element ManagementAdvisian
 
Architecting the IT foundation
Architecting the IT foundationArchitecting the IT foundation
Architecting the IT foundationPravin Nadkarni
 
CONNECTING THE DOTS - EPPM Board Write Up Final
CONNECTING THE DOTS - EPPM Board Write Up FinalCONNECTING THE DOTS - EPPM Board Write Up Final
CONNECTING THE DOTS - EPPM Board Write Up FinalYasser Mahmud
 
Beyond Spreadsheets: How to Take Your Budgeting and Planning to the Next Level
Beyond Spreadsheets: How to Take Your Budgeting and Planning to the Next LevelBeyond Spreadsheets: How to Take Your Budgeting and Planning to the Next Level
Beyond Spreadsheets: How to Take Your Budgeting and Planning to the Next LevelProformative, Inc.
 
You've built it will they come-intranets2017
You've built it  will they come-intranets2017You've built it  will they come-intranets2017
You've built it will they come-intranets2017Sarah Blake
 
10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business Resilience10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business ResilienceMichael Bowers
 
Coffee Break Webinar: Aligning HR & Finance
Coffee Break Webinar: Aligning HR & FinanceCoffee Break Webinar: Aligning HR & Finance
Coffee Break Webinar: Aligning HR & FinanceDATIS
 
Using Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramUsing Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramSurfWatch Labs
 
Balancing risk with opportunity
Balancing risk with opportunityBalancing risk with opportunity
Balancing risk with opportunityGrant Thornton LLP
 

What's hot (20)

Webinar: Vulnerability Management IT can fix it, but the business needs to ow...
Webinar: Vulnerability Management IT can fix it, but the business needs to ow...Webinar: Vulnerability Management IT can fix it, but the business needs to ow...
Webinar: Vulnerability Management IT can fix it, but the business needs to ow...
 
Case analysis
Case analysisCase analysis
Case analysis
 
Stan bio
Stan bioStan bio
Stan bio
 
Stakeholder Engagement vs Stakeholder Management
Stakeholder Engagement vs Stakeholder ManagementStakeholder Engagement vs Stakeholder Management
Stakeholder Engagement vs Stakeholder Management
 
The Scientific Approach to Mitigating Operational Risk
The Scientific Approach to Mitigating Operational RiskThe Scientific Approach to Mitigating Operational Risk
The Scientific Approach to Mitigating Operational Risk
 
Elevating the Role of the CIO to Strategic Business Partner
Elevating the Role of the CIO to Strategic Business PartnerElevating the Role of the CIO to Strategic Business Partner
Elevating the Role of the CIO to Strategic Business Partner
 
Project center in coimbatore
Project center in coimbatoreProject center in coimbatore
Project center in coimbatore
 
CIO Strategy Consulting Offerings APAC
CIO Strategy Consulting Offerings APACCIO Strategy Consulting Offerings APAC
CIO Strategy Consulting Offerings APAC
 
Major Hazard Installations
Major Hazard InstallationsMajor Hazard Installations
Major Hazard Installations
 
Social Performance: Can we get it right?
Social Performance: Can we get it right?Social Performance: Can we get it right?
Social Performance: Can we get it right?
 
Data-centric Safety Critical Element Management
Data-centric Safety Critical Element ManagementData-centric Safety Critical Element Management
Data-centric Safety Critical Element Management
 
Architecting the IT foundation
Architecting the IT foundationArchitecting the IT foundation
Architecting the IT foundation
 
CONNECTING THE DOTS - EPPM Board Write Up Final
CONNECTING THE DOTS - EPPM Board Write Up FinalCONNECTING THE DOTS - EPPM Board Write Up Final
CONNECTING THE DOTS - EPPM Board Write Up Final
 
Beyond Spreadsheets: How to Take Your Budgeting and Planning to the Next Level
Beyond Spreadsheets: How to Take Your Budgeting and Planning to the Next LevelBeyond Spreadsheets: How to Take Your Budgeting and Planning to the Next Level
Beyond Spreadsheets: How to Take Your Budgeting and Planning to the Next Level
 
You've built it will they come-intranets2017
You've built it  will they come-intranets2017You've built it  will they come-intranets2017
You've built it will they come-intranets2017
 
10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business Resilience10 Questions Every Company Should Be Asking Itself About its Business Resilience
10 Questions Every Company Should Be Asking Itself About its Business Resilience
 
Creating a Behavioral Safety Process
Creating a Behavioral Safety ProcessCreating a Behavioral Safety Process
Creating a Behavioral Safety Process
 
Coffee Break Webinar: Aligning HR & Finance
Coffee Break Webinar: Aligning HR & FinanceCoffee Break Webinar: Aligning HR & Finance
Coffee Break Webinar: Aligning HR & Finance
 
Using Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence ProgramUsing Threat Information to Build Your Cyber Risk Intelligence Program
Using Threat Information to Build Your Cyber Risk Intelligence Program
 
Balancing risk with opportunity
Balancing risk with opportunityBalancing risk with opportunity
Balancing risk with opportunity
 

Viewers also liked

What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3IANS
 
Ranbaxy laboratories limited
Ranbaxy laboratories limitedRanbaxy laboratories limited
Ranbaxy laboratories limitedSagar Srivastava
 
Push over and over analysis technique
Push over  and over analysis techniquePush over  and over analysis technique
Push over and over analysis techniqueDr.youssef hamida
 
Aid to other organizations presentation
Aid to other organizations presentationAid to other organizations presentation
Aid to other organizations presentationMichael V. Hannigan
 
تقنيات وعمل الفيروسات
تقنيات وعمل الفيروساتتقنيات وعمل الفيروسات
تقنيات وعمل الفيروساتFaraj Meto
 
Horizon Capital_Ukraine Ground Floor Opportunity v11
Horizon Capital_Ukraine Ground Floor Opportunity v11Horizon Capital_Ukraine Ground Floor Opportunity v11
Horizon Capital_Ukraine Ground Floor Opportunity v11olexmat
 
Bao cao tong hop
Bao cao tong hopBao cao tong hop
Bao cao tong hopHắc Ảnh
 
Independent Study Paper
Independent Study PaperIndependent Study Paper
Independent Study PaperJade Dunstan
 
Infographic the average cost of renting an apartment in cities across canada
Infographic  the average cost of renting an apartment in cities across canadaInfographic  the average cost of renting an apartment in cities across canada
Infographic the average cost of renting an apartment in cities across canadatheredpinpr
 
writing credits9-14-09
writing credits9-14-09writing credits9-14-09
writing credits9-14-09Izola Bird
 
Presentasi kliklm baru
Presentasi kliklm baruPresentasi kliklm baru
Presentasi kliklm barurinaldiputra
 
The Postwar Era in Europe
The Postwar Era in EuropeThe Postwar Era in Europe
The Postwar Era in EuropeGrant Benson
 

Viewers also liked (20)

Becoming a Social Media Publisher : A Comprehensive Review of Social Media Ma...
Becoming a Social Media Publisher : A Comprehensive Review of Social Media Ma...Becoming a Social Media Publisher : A Comprehensive Review of Social Media Ma...
Becoming a Social Media Publisher : A Comprehensive Review of Social Media Ma...
 
What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3
 
Ranbaxy laboratories limited
Ranbaxy laboratories limitedRanbaxy laboratories limited
Ranbaxy laboratories limited
 
Global Dexterity - Dr. Andy Molinsky
Global Dexterity - Dr. Andy MolinskyGlobal Dexterity - Dr. Andy Molinsky
Global Dexterity - Dr. Andy Molinsky
 
Spot'it-16.8-22.8 -שבוע שלישי
Spot'it-16.8-22.8 -שבוע שלישיSpot'it-16.8-22.8 -שבוע שלישי
Spot'it-16.8-22.8 -שבוע שלישי
 
Push over and over analysis technique
Push over  and over analysis techniquePush over  and over analysis technique
Push over and over analysis technique
 
Aid to other organizations presentation
Aid to other organizations presentationAid to other organizations presentation
Aid to other organizations presentation
 
تقنيات وعمل الفيروسات
تقنيات وعمل الفيروساتتقنيات وعمل الفيروسات
تقنيات وعمل الفيروسات
 
Afrocolombia
AfrocolombiaAfrocolombia
Afrocolombia
 
Horizon Capital_Ukraine Ground Floor Opportunity v11
Horizon Capital_Ukraine Ground Floor Opportunity v11Horizon Capital_Ukraine Ground Floor Opportunity v11
Horizon Capital_Ukraine Ground Floor Opportunity v11
 
Varicam_article
Varicam_articleVaricam_article
Varicam_article
 
Sec7 las chp 29 10 characteristics
Sec7 las chp 29 10 characteristicsSec7 las chp 29 10 characteristics
Sec7 las chp 29 10 characteristics
 
Bao cao tong hop
Bao cao tong hopBao cao tong hop
Bao cao tong hop
 
Independent Study Paper
Independent Study PaperIndependent Study Paper
Independent Study Paper
 
cv (2)
cv (2)cv (2)
cv (2)
 
Infographic the average cost of renting an apartment in cities across canada
Infographic  the average cost of renting an apartment in cities across canadaInfographic  the average cost of renting an apartment in cities across canada
Infographic the average cost of renting an apartment in cities across canada
 
writing credits9-14-09
writing credits9-14-09writing credits9-14-09
writing credits9-14-09
 
Las introduction
Las introductionLas introduction
Las introduction
 
Presentasi kliklm baru
Presentasi kliklm baruPresentasi kliklm baru
Presentasi kliklm baru
 
The Postwar Era in Europe
The Postwar Era in EuropeThe Postwar Era in Europe
The Postwar Era in Europe
 

Similar to What is an IANS CISO Workshop? Factor 6

The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO ImpactIANS
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performanceAbhishek Sood
 
Organization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowOrganization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowMichelle Singh
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxinfosec train
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Laura Benitez
 
10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)Marie Peters
 
Week 1 Welcome to Business IT/Systems
Week 1 Welcome to Business IT/SystemsWeek 1 Welcome to Business IT/Systems
Week 1 Welcome to Business IT/SystemsJLuker
 
Analytics Driving Action - Building a Data-Driven HR Function
Analytics Driving Action - Building a Data-Driven HR FunctionAnalytics Driving Action - Building a Data-Driven HR Function
Analytics Driving Action - Building a Data-Driven HR FunctionJonathan Sidhu
 
Deploying a data centric approach to enterprise agility
Deploying a data centric approach to enterprise agilityDeploying a data centric approach to enterprise agility
Deploying a data centric approach to enterprise agilityComparative Agility
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdfinfosec train
 
Managing Interdependencies in Complex Organizations
Managing Interdependencies in Complex OrganizationsManaging Interdependencies in Complex Organizations
Managing Interdependencies in Complex OrganizationsNicolay Worren
 
Building a business case for expanding your AppSec Program
Building a business case for expanding your AppSec ProgramBuilding a business case for expanding your AppSec Program
Building a business case for expanding your AppSec ProgramNicolas Gohmert
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxjjvdneut
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxjjvdneut
 
Does your approach to Performance Management ‘Sing’ or ‘Sting’?
Does your approach to  Performance Management  ‘Sing’ or ‘Sting’?Does your approach to  Performance Management  ‘Sing’ or ‘Sting’?
Does your approach to Performance Management ‘Sing’ or ‘Sting’?Pivot Software
 
Roberts Golden *Selling Enterprise Social to the Suits* workshop
Roberts Golden *Selling Enterprise Social to the Suits* workshopRoberts Golden *Selling Enterprise Social to the Suits* workshop
Roberts Golden *Selling Enterprise Social to the Suits* workshopRoberts Golden Consulting, Inc.
 
Independent-Fall-2015-Edition
Independent-Fall-2015-EditionIndependent-Fall-2015-Edition
Independent-Fall-2015-EditionTodd C. Schultze
 
Bs project report_sec_b_gp5_finalv1.0
Bs project report_sec_b_gp5_finalv1.0Bs project report_sec_b_gp5_finalv1.0
Bs project report_sec_b_gp5_finalv1.0vvraviteja
 

Similar to What is an IANS CISO Workshop? Factor 6 (20)

The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Organization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowOrganization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The Workflow
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)10-things-you-ought-to-know-before-you-benchmark(1)
10-things-you-ought-to-know-before-you-benchmark(1)
 
Week 1 Welcome to Business IT/Systems
Week 1 Welcome to Business IT/SystemsWeek 1 Welcome to Business IT/Systems
Week 1 Welcome to Business IT/Systems
 
Meningkatkan peran audit internal fungsi peran digital
Meningkatkan peran audit internal fungsi peran digital Meningkatkan peran audit internal fungsi peran digital
Meningkatkan peran audit internal fungsi peran digital
 
Analytics Driving Action - Building a Data-Driven HR Function
Analytics Driving Action - Building a Data-Driven HR FunctionAnalytics Driving Action - Building a Data-Driven HR Function
Analytics Driving Action - Building a Data-Driven HR Function
 
Deploying a data centric approach to enterprise agility
Deploying a data centric approach to enterprise agilityDeploying a data centric approach to enterprise agility
Deploying a data centric approach to enterprise agility
 
The top 2 reasons why Knowledge Management Fails
The top 2 reasons why Knowledge Management FailsThe top 2 reasons why Knowledge Management Fails
The top 2 reasons why Knowledge Management Fails
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdf
 
Managing Interdependencies in Complex Organizations
Managing Interdependencies in Complex OrganizationsManaging Interdependencies in Complex Organizations
Managing Interdependencies in Complex Organizations
 
Building a business case for expanding your AppSec Program
Building a business case for expanding your AppSec ProgramBuilding a business case for expanding your AppSec Program
Building a business case for expanding your AppSec Program
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
Does your approach to Performance Management ‘Sing’ or ‘Sting’?
Does your approach to  Performance Management  ‘Sing’ or ‘Sting’?Does your approach to  Performance Management  ‘Sing’ or ‘Sting’?
Does your approach to Performance Management ‘Sing’ or ‘Sting’?
 
Roberts Golden *Selling Enterprise Social to the Suits* workshop
Roberts Golden *Selling Enterprise Social to the Suits* workshopRoberts Golden *Selling Enterprise Social to the Suits* workshop
Roberts Golden *Selling Enterprise Social to the Suits* workshop
 
Independent-Fall-2015-Edition
Independent-Fall-2015-EditionIndependent-Fall-2015-Edition
Independent-Fall-2015-Edition
 
Bs project report_sec_b_gp5_finalv1.0
Bs project report_sec_b_gp5_finalv1.0Bs project report_sec_b_gp5_finalv1.0
Bs project report_sec_b_gp5_finalv1.0
 

Recently uploaded

Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Giuseppe De Simone
 
From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentFrom Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentCIToolkit
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchRashtriya Kisan Manch
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionCIToolkit
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证jdkhjh
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)jennyeacort
 
The Final Activity in Project Management
The Final Activity in Project ManagementThe Final Activity in Project Management
The Final Activity in Project ManagementCIToolkit
 
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsDigital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsHannah Smith
 
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...CIToolkit
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsCIToolkit
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsCIToolkit
 
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramCIToolkit
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 
Shaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingShaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingGiuseppe De Simone
 

Recently uploaded (16)

Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
 
From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentFrom Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem Resolution
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
 
The Final Activity in Project Management
The Final Activity in Project ManagementThe Final Activity in Project Management
The Final Activity in Project Management
 
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsDigital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
 
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield Metrics
 
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 
Shaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingShaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful Thinking
 

What is an IANS CISO Workshop? Factor 6

  • 1. CISOs and their teams operate against a backdrop of continuous change in the threat landscape, information security technology, and business conditions. The mission to protect critical assets across space and time is further complicated by a lack of direct control over the people and processes that expose the organization to risk through day- to-day operations. In-depth research with hundreds of information security leaders revealed a common thread among the top performers: Technical skills, while essential, are not enough. To deliver maximum impact, Information Security must engage with the business and practice proactive organizational engagement.
  • 2. To drive insight and enable action on these “soft skills,” IANS has broken proactive organizational engagement down into a set of clearly defined, quantifiable elements we call The 7 Factors of CISO Impact. Our CISO Impact framework provides a structured, action-oriented approach that allows you to baseline your performance and measure progress down to the Factor and sub-Factor levels as you work towards b e t t e r p ro a c t i v e o rg a n i z a t i o n a l engagement.
  • 3. First step: take the Diagnostic. The Diagnostic is an online self- assessment that measures the current state of your team’s organizational engagement. Your personal report provides you with insight into your team’s strengths and weaknesses, and allows you to compare the results to those of your peers. As you work to improve your skill sets in each of the 7 Factors, your Diagnostic results will reflect your progress.
  • 4. Then, attend a CISO Impact Workshop. The CISO Impact Workshop is a four-hour deep dive into one of the 7 Factors of CISO Impact. IANS-proprietary worksheets will help you break down your Factor-specific Diagnostic results into concrete, step-by-step actions for improvement. You’ll experience a new way of thinking about what you do, and walk away with insights that will influence the way that you execute your mission.
  • 5. A CISO Impact Workshop is a collaborative hands-on working session. Wrap-Up Review lessons learned and discuss of how improvement will drive success.Introductions Get to know your fellow CISOs Workshop Orientation The IANS facilitator describes the workshop context, components and flow for the day Solo Work Document your team’s skills and processes vs. the workshop Factor. Presentations & Feedback Present your workbook writings and receive feedback from your peers. Research Overview A discussion of the research and structure of the CISO Impact framework Diagnostic An explanation of how the CISO Impact self- assessment tool works What are the 7 Factors? An overview of the individual 7 Factors of CISO Impact, and a look at how they all work together to drive success. Small Group Discussion Share ideas and challenges with your small group
  • 6. Can you communicate the value of information security in a compelling way? To be effective, information security needs resources and support from a range of stakeholders – but many security teams aren’t prepared to state their case persuasively. Clear, compelling communication is key to justifying budget requests and paving the way towards working more collaboratively with other business departments, but 62% of CISOs who completed the CISO Impact Diagnostic are still in the early stages of proactively engaging with key stakeholders to build a strong value proposition. What steps can you take to move the needle? At a recent Factor 6 Workshop, we posed the question: Factor 6: Communicate the Value of Information Security
  • 7. Participants discussed the challenges … … and through that discussion, shared thoughts on how to address the problem. “Most of the organization sees us the business prevention team. They just don’t get why we do what we do. ” “We’re organized in IT so we don’t really have the visibility into the stakeholder challenges and needs.” “Our team is comfortable answering questions and providing options. Selling our value is not a natural thing for us to do.”
  • 8. You’ll walk away with strategies for success in real-world situations. For example, you’ll learn how to: •  Build a strong, business-oriented value proposition that explains how information security helps your company grow and win. •  Engage deeply with key stakeholders – not just the ‘easy’ ones like Finance, Risk, Audit and Compliance but also the business unit GMs – to understand what drives their business decisions. •  Work with the Marketing department to develop assets that communicate your value proposition.