SlideShare a Scribd company logo
Connector Events
See the Big Picture
IANS Connector Events bring together small groups of
senior-level information security professionals from a
broad spectrum of industries and experiences for
facilitated deep-dive discussions of important challenges
and solutions in the information security space.
Your community is a resource: through intimate peer-to-
peer conversations around common issues, solutions, and
suggestions for improvement, you’ll gain insight into
varying perspectives and develop new ideas to accelerate
your problem-solving efforts.
How can you embed information security
into key business processes?
IANS’ research shows that 72% CISOs are still in the
very early stages of integrating information security
criteria into the day-to-day processes of their
organization. What steps can you take to weave
information security into the fabric of processes like
software development and vendor selection?
At a recent event, we posed the question:
“Currently security is an after thought -
it is not incorporated up front in the
business process. Security is perceived
as a road block in most instances, also
development teams seem to think
they have security expertise within
their group.” “We have an engagement
process but there are
other factors in the "way
we approve" initiatives
that sometimes leaves us
in the dark.”
Attendees discussed the challenges …
“… we have limited
Infosec personnel to
actively review for
risk.”
… and through that discussion, shared
thoughts on how to address the problem.
•  Communicate the tangible input that security can have
in high-level business decisions like M&As
•  Establish agreements with Finance and Legal that
compel assessment of new vendors before contracts are
signed
•  Learn how to win the agreement of key stakeholders -
like the VP of App Dev, for example - to weave
information security criteria and implement verification
steps like code testing into processes like the SDLC.
At a Connector
Event, you will:
•  Gain insight into the challenges and roadblocks
you and your peers share.
•  Learn about new and unique approaches to
common issues and topics
•  Take away problem-solving ideas that you can
apply in your own organization.

More Related Content

What's hot

Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary final
Andrew_Goss
 
March 2014 aceds portfolio c&g kroll webinar
March 2014 aceds portfolio c&g kroll webinarMarch 2014 aceds portfolio c&g kroll webinar
March 2014 aceds portfolio c&g kroll webinarDavid Kearney
 
Omzig
OmzigOmzig
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesTunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Enterprise Management Associates
 
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
centralohioissa
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
Dell EMC World
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
Lumension
 
The Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution UtilityThe Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution Utility
Jill Kirkpatrick
 
Vulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security ControlsVulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security Controls
Tripwire
 
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Intralinks
 
The Art & Science of Simple Security
The Art & Science of Simple SecurityThe Art & Science of Simple Security
The Art & Science of Simple Security
Ravila White
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
SurfWatch Labs
 
ISSE 2008 Information Security Status
ISSE 2008 Information Security StatusISSE 2008 Information Security Status
ISSE 2008 Information Security StatusAnas Tawileh
 
How International Startups Leverage Networks In Their Own Backyard Nasscom Fr...
How International Startups Leverage Networks In Their Own Backyard Nasscom Fr...How International Startups Leverage Networks In Their Own Backyard Nasscom Fr...
How International Startups Leverage Networks In Their Own Backyard Nasscom Fr...OMcareers Community
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
Kevin Duffey
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing itnewsafrica
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver Bullet
Gareth Niblett
 
Doing Information Management Right
Doing Information Management Right Doing Information Management Right
Doing Information Management Right
Lane Severson
 
FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS
Andrew_Goss
 

What's hot (20)

Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary final
 
March 2014 aceds portfolio c&g kroll webinar
March 2014 aceds portfolio c&g kroll webinarMarch 2014 aceds portfolio c&g kroll webinar
March 2014 aceds portfolio c&g kroll webinar
 
Omzig
OmzigOmzig
Omzig
 
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the TreesTunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
 
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution UtilityThe Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution Utility
 
Vulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security ControlsVulnerability Voodoo and the Convergence of Foundational Security Controls
Vulnerability Voodoo and the Convergence of Foundational Security Controls
 
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
 
The Art & Science of Simple Security
The Art & Science of Simple SecurityThe Art & Science of Simple Security
The Art & Science of Simple Security
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
ISSE 2008 Information Security Status
ISSE 2008 Information Security StatusISSE 2008 Information Security Status
ISSE 2008 Information Security Status
 
How International Startups Leverage Networks In Their Own Backyard Nasscom Fr...
How International Startups Leverage Networks In Their Own Backyard Nasscom Fr...How International Startups Leverage Networks In Their Own Backyard Nasscom Fr...
How International Startups Leverage Networks In Their Own Backyard Nasscom Fr...
 
Strategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a RoleStrategies for cyber resilience - Everyone has a Role
Strategies for cyber resilience - Everyone has a Role
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver Bullet
 
Doing Information Management Right
Doing Information Management Right Doing Information Management Right
Doing Information Management Right
 
FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS FINTECH, CYBERSECURITY AND BUSINESS READINESS
FINTECH, CYBERSECURITY AND BUSINESS READINESS
 

Viewers also liked

Historia de la computadora
Historia de la computadoraHistoria de la computadora
Historia de la computadora
karina julieth
 
Social Media & Marketing Certificate of Completion
Social Media & Marketing Certificate of CompletionSocial Media & Marketing Certificate of Completion
Social Media & Marketing Certificate of CompletionAthena Japhta
 
Vídeo presentació 1. ESGLÉSIA DE SANT LLORENÇ. VALÈNCIA
Vídeo presentació 1. ESGLÉSIA DE SANT LLORENÇ. VALÈNCIAVídeo presentació 1. ESGLÉSIA DE SANT LLORENÇ. VALÈNCIA
Vídeo presentació 1. ESGLÉSIA DE SANT LLORENÇ. VALÈNCIAJosep Blesa
 
Tenemos una deformidad muy popular
Tenemos una deformidad muy popularTenemos una deformidad muy popular
Tenemos una deformidad muy popularllamas159
 
Estuctura de word
Estuctura de wordEstuctura de word
Estuctura de word
karina julieth
 
Para comprender mejor el presente, antes que
Para comprender mejor el presente, antes quePara comprender mejor el presente, antes que
Para comprender mejor el presente, antes queolgatzab
 
File system is full - what do i do
File system is full - what do i doFile system is full - what do i do
File system is full - what do i do
Nizar Fanany
 
Insertar fecha y hora
Insertar fecha y horaInsertar fecha y hora
Insertar fecha y hora
karina julieth
 
Text2mindmap
Text2mindmapText2mindmap
Text2mindmap7lunes5
 
Caracteristicas de las tic
Caracteristicas de las ticCaracteristicas de las tic
Caracteristicas de las tic7lunes5
 
How IT will change my world
How IT will change my worldHow IT will change my world
How IT will change my worldCarmen Bravo
 
Existen distintos tipos de deformidades tanto en personas
Existen distintos tipos de deformidades tanto en personasExisten distintos tipos de deformidades tanto en personas
Existen distintos tipos de deformidades tanto en personasllamas159
 
Estado de entrega.Error de SAIA
Estado de entrega.Error de  SAIA Estado de entrega.Error de  SAIA
Estado de entrega.Error de SAIA
Liyeira de Tortolani
 
Bolsas De Plastico
Bolsas De Plastico
Bolsas De Plastico
Bolsas De Plastico
didacticxanadu968
 
Bolsera Murcia
Bolsera Murcia
Bolsera Murcia
Bolsera Murcia
didacticxanadu968
 
paras dissertation pdf
paras dissertation pdfparas dissertation pdf
paras dissertation pdfParas Yadav
 

Viewers also liked (19)

Tema 04
Tema 04Tema 04
Tema 04
 
Historia de la computadora
Historia de la computadoraHistoria de la computadora
Historia de la computadora
 
Social Media & Marketing Certificate of Completion
Social Media & Marketing Certificate of CompletionSocial Media & Marketing Certificate of Completion
Social Media & Marketing Certificate of Completion
 
Vídeo presentació 1. ESGLÉSIA DE SANT LLORENÇ. VALÈNCIA
Vídeo presentació 1. ESGLÉSIA DE SANT LLORENÇ. VALÈNCIAVídeo presentació 1. ESGLÉSIA DE SANT LLORENÇ. VALÈNCIA
Vídeo presentació 1. ESGLÉSIA DE SANT LLORENÇ. VALÈNCIA
 
Tenemos una deformidad muy popular
Tenemos una deformidad muy popularTenemos una deformidad muy popular
Tenemos una deformidad muy popular
 
Miguel grau
Miguel grauMiguel grau
Miguel grau
 
Estuctura de word
Estuctura de wordEstuctura de word
Estuctura de word
 
Para comprender mejor el presente, antes que
Para comprender mejor el presente, antes quePara comprender mejor el presente, antes que
Para comprender mejor el presente, antes que
 
File system is full - what do i do
File system is full - what do i doFile system is full - what do i do
File system is full - what do i do
 
Insertar fecha y hora
Insertar fecha y horaInsertar fecha y hora
Insertar fecha y hora
 
Text2mindmap
Text2mindmapText2mindmap
Text2mindmap
 
Caracteristicas de las tic
Caracteristicas de las ticCaracteristicas de las tic
Caracteristicas de las tic
 
How IT will change my world
How IT will change my worldHow IT will change my world
How IT will change my world
 
Existen distintos tipos de deformidades tanto en personas
Existen distintos tipos de deformidades tanto en personasExisten distintos tipos de deformidades tanto en personas
Existen distintos tipos de deformidades tanto en personas
 
Estado de entrega.Error de SAIA
Estado de entrega.Error de  SAIA Estado de entrega.Error de  SAIA
Estado de entrega.Error de SAIA
 
Bolsas De Plastico
Bolsas De Plastico
Bolsas De Plastico
Bolsas De Plastico
 
Bolsera Murcia
Bolsera Murcia
Bolsera Murcia
Bolsera Murcia
 
paras dissertation pdf
paras dissertation pdfparas dissertation pdf
paras dissertation pdf
 
Insertar hipervinculos
Insertar hipervinculosInsertar hipervinculos
Insertar hipervinculos
 

Similar to What is an IANS Connector Event? - Factor 3

What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6
IANS
 
IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6
Andrew Sanders
 
IANS Connector Event Deck: Factor 5
IANS Connector Event Deck: Factor 5IANS Connector Event Deck: Factor 5
IANS Connector Event Deck: Factor 5
Andrew Sanders
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1
IANS
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
RapidValue
 
Information Security
Information SecurityInformation Security
Information Security
divyeshkharade
 
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Mighty Guides, Inc.
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
simplyme12345
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
Priyanka Aash
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
UBM_Design_Central
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
EMC
 
Finding the right legal process management tools
Finding the right legal process management toolsFinding the right legal process management tools
Finding the right legal process management toolssarahbrown1
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
UBM_Design_Central
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
accenture
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
evonnehoggarth79783
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
Vincent Toms
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
Rogers Communications
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 

Similar to What is an IANS Connector Event? - Factor 3 (20)

What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6
 
IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6
 
IANS Connector Event Deck: Factor 5
IANS Connector Event Deck: Factor 5IANS Connector Event Deck: Factor 5
IANS Connector Event Deck: Factor 5
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
Information Security
Information SecurityInformation Security
Information Security
 
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
 
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec StakeholdersIvanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
Ivanti Webinar - How to Win Budget and Influence Non-InfoSec Stakeholders
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected WorldRSA Security Brief : Taking Charge of Security in a Hyperconnected World
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
 
Finding the right legal process management tools
Finding the right legal process management toolsFinding the right legal process management tools
Finding the right legal process management tools
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 

More from IANS

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
IANS
 
What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6
IANS
 
What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2
IANS
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
IANS
 
What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3
IANS
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?
IANS
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
IANS
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO ImpactIANS
 

More from IANS (8)

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
 
What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6
 
What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
 
What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
 

Recently uploaded

Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
Amir H. Fassihi
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
akaash13
 
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
CIOWomenMagazine
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
Tata Consultancy Services
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
William (Bill) H. Bender, FCSI
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
juniourjohnstone
 

Recently uploaded (10)

Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
 
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
 

What is an IANS Connector Event? - Factor 3

  • 2. See the Big Picture IANS Connector Events bring together small groups of senior-level information security professionals from a broad spectrum of industries and experiences for facilitated deep-dive discussions of important challenges and solutions in the information security space. Your community is a resource: through intimate peer-to- peer conversations around common issues, solutions, and suggestions for improvement, you’ll gain insight into varying perspectives and develop new ideas to accelerate your problem-solving efforts.
  • 3. How can you embed information security into key business processes? IANS’ research shows that 72% CISOs are still in the very early stages of integrating information security criteria into the day-to-day processes of their organization. What steps can you take to weave information security into the fabric of processes like software development and vendor selection? At a recent event, we posed the question:
  • 4. “Currently security is an after thought - it is not incorporated up front in the business process. Security is perceived as a road block in most instances, also development teams seem to think they have security expertise within their group.” “We have an engagement process but there are other factors in the "way we approve" initiatives that sometimes leaves us in the dark.” Attendees discussed the challenges … “… we have limited Infosec personnel to actively review for risk.”
  • 5. … and through that discussion, shared thoughts on how to address the problem. •  Communicate the tangible input that security can have in high-level business decisions like M&As •  Establish agreements with Finance and Legal that compel assessment of new vendors before contracts are signed •  Learn how to win the agreement of key stakeholders - like the VP of App Dev, for example - to weave information security criteria and implement verification steps like code testing into processes like the SDLC.
  • 6. At a Connector Event, you will: •  Gain insight into the challenges and roadblocks you and your peers share. •  Learn about new and unique approaches to common issues and topics •  Take away problem-solving ideas that you can apply in your own organization.