SlideShare a Scribd company logo
Connector Events
See the Big Picture
IANS Connector Events bring together small groups of
senior-level information security professionals from a
broad spectrum of industries and experiences for
facilitated deep-dive discussions of important challenges
and solutions in the information security space.
Your community is a resource: through intimate peer-to-
peer conversations around common issues, solutions, and
suggestions for improvement, you’ll gain insight into
varying perspectives and develop new ideas to accelerate
your problem-solving efforts.
Can you communicate the value of
information security in a compelling way?
To be effective, information security needs resources
and support from a range of stakeholders – but many
security teams aren’t prepared to state their case
persuasively. 62% of CISOs who completed the CISO
Impact Diagnostic are still in the early stages of
proactively engaging with key stakeholders to build a
strong value proposition. What steps can you take to
move the needle?
At a recent event, we posed the question:
“This is done by
the CIO and not
by the CISO.”
“Don't have an official
CISO/Security Officer
at present. Time is
spent on compliance,
audit and firefighting.”
Attendees discussed the challenges …
“…There were initial
communications with the
prior CISO, but more is
needed.”
… and through that discussion, shared
thoughts on how to address the problem.
•  Build a strong, business-oriented value proposition that
explains how information security helps your company
grow and win.
•  Engage deeply with key stakeholders – not just the
‘easy’ ones like Finance, Risk, Audit and Compliance but
also the business unit GMs – to understand what drives
their business decisions.
•  Work with the Marketing department to develop assets
that communicate your value proposition.
At a Connector
Event, you will:
•  Gain insight into the challenges and roadblocks
you and your peers share.
•  Learn about new and unique approaches to
common issues and topics
•  Take away problem-solving ideas that you can
apply in your own organization.

More Related Content

What's hot

What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6
IANS
 
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey
 
Liability the next show stopper
Liability the next show stopper Liability the next show stopper
Liability the next show stopper
ePSI Platform
 
Building the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBuilding the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for Success
Booz Allen Hamilton
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
Phil Agcaoili
 
"Customer Leadership"
"Customer Leadership""Customer Leadership"
"Customer Leadership"
Mick Yates
 
A New Model For Sustainable Service Management
A New Model For Sustainable Service ManagementA New Model For Sustainable Service Management
A New Model For Sustainable Service Management
Navvia
 
wireLawyer Deck 2014
wireLawyer Deck 2014wireLawyer Deck 2014
wireLawyer Deck 2014
wireLawyer
 
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
centralohioissa
 
Big Data, You and Them
Big Data, You and ThemBig Data, You and Them
Big Data, You and Them
Mick Yates
 
Leadership in the Big Data era
Leadership in the Big Data eraLeadership in the Big Data era
Leadership in the Big Data era
Mick Yates
 
Innovation Challenge Final
Innovation Challenge FinalInnovation Challenge Final
Innovation Challenge Final
Caitlin Cassidy
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 

What's hot (13)

What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6
 
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
 
Liability the next show stopper
Liability the next show stopper Liability the next show stopper
Liability the next show stopper
 
Building the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBuilding the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for Success
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
"Customer Leadership"
"Customer Leadership""Customer Leadership"
"Customer Leadership"
 
A New Model For Sustainable Service Management
A New Model For Sustainable Service ManagementA New Model For Sustainable Service Management
A New Model For Sustainable Service Management
 
wireLawyer Deck 2014
wireLawyer Deck 2014wireLawyer Deck 2014
wireLawyer Deck 2014
 
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
 
Big Data, You and Them
Big Data, You and ThemBig Data, You and Them
Big Data, You and Them
 
Leadership in the Big Data era
Leadership in the Big Data eraLeadership in the Big Data era
Leadership in the Big Data era
 
Innovation Challenge Final
Innovation Challenge FinalInnovation Challenge Final
Innovation Challenge Final
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 

Similar to What is an IANS Connector Event? - Factor 6

IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3
Andrew Sanders
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
IANS
 
IANS Connector Event Deck: Factor 4
IANS Connector Event Deck: Factor 4IANS Connector Event Deck: Factor 4
IANS Connector Event Deck: Factor 4
Andrew Sanders
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1
IANS
 
IANS Connector Event Deck: Factor 5
IANS Connector Event Deck: Factor 5IANS Connector Event Deck: Factor 5
IANS Connector Event Deck: Factor 5
Andrew Sanders
 
What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5
IANS
 
Developing an integrated technology for the enhancement of insurance penetration
Developing an integrated technology for the enhancement of insurance penetrationDeveloping an integrated technology for the enhancement of insurance penetration
Developing an integrated technology for the enhancement of insurance penetration
Samwel Kanda
 
5 barriers to creativity
5 barriers to creativity5 barriers to creativity
5 barriers to creativity
Niraj Singh
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
Rogers Communications
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
Chris Ross
 
Illuminate 2017
Illuminate 2017Illuminate 2017
Illuminate 2017
Stanford University
 
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Mighty Guides, Inc.
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
Vincent Toms
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
Laura Benitez
 
Takeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber AttackTakeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber Attack
Boston Consulting Group
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology
 
Fortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipFortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused Leadership
Mighty Guides, Inc.
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
SurfWatch Labs
 
IBM Collective intelligence
IBM Collective intelligenceIBM Collective intelligence
IBM Collective intelligence
Wirehead Technology
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
Scott Smith
 

Similar to What is an IANS Connector Event? - Factor 6 (20)

IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 3
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
 
IANS Connector Event Deck: Factor 4
IANS Connector Event Deck: Factor 4IANS Connector Event Deck: Factor 4
IANS Connector Event Deck: Factor 4
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1
 
IANS Connector Event Deck: Factor 5
IANS Connector Event Deck: Factor 5IANS Connector Event Deck: Factor 5
IANS Connector Event Deck: Factor 5
 
What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5
 
Developing an integrated technology for the enhancement of insurance penetration
Developing an integrated technology for the enhancement of insurance penetrationDeveloping an integrated technology for the enhancement of insurance penetration
Developing an integrated technology for the enhancement of insurance penetration
 
5 barriers to creativity
5 barriers to creativity5 barriers to creativity
5 barriers to creativity
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
 
Illuminate 2017
Illuminate 2017Illuminate 2017
Illuminate 2017
 
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
Takeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber AttackTakeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber Attack
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Fortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused LeadershipFortinet: The New CISO – From Technology to Business Focused Leadership
Fortinet: The New CISO – From Technology to Business Focused Leadership
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
IBM Collective intelligence
IBM Collective intelligenceIBM Collective intelligence
IBM Collective intelligence
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 

More from IANS

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
IANS
 
What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2
IANS
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
IANS
 
What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3
IANS
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?
IANS
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
IANS
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
IANS
 

More from IANS (7)

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
 
What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
 
What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
 

Recently uploaded

12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
Pierre E. NEIS
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
Rob Healy
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
stuwilson.co.uk
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
tdt5v4b
 
Make it or Break it - Insights for achieving Product-market fit .pdf
Make it or Break it - Insights for achieving Product-market fit .pdfMake it or Break it - Insights for achieving Product-market fit .pdf
Make it or Break it - Insights for achieving Product-market fit .pdf
Resonate Digital
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
Anjana Josie
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
Ram V Chary
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
Matthew Sinclair
 
Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
Pinta Partners
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
dsnow9802
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
Alexey Krivitsky
 
Resource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdfResource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdf
FeteneA
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
8p28uk6g
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
strikingabalance
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
tdt5v4b
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
GanpatiKumarChoudhar
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
Credit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentationCredit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentation
bernanbumatay1
 

Recently uploaded (20)

12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
 
Make it or Break it - Insights for achieving Product-market fit .pdf
Make it or Break it - Insights for achieving Product-market fit .pdfMake it or Break it - Insights for achieving Product-market fit .pdf
Make it or Break it - Insights for achieving Product-market fit .pdf
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
 
Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
 
Resource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdfResource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdf
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
Credit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentationCredit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentation
 

What is an IANS Connector Event? - Factor 6

  • 2. See the Big Picture IANS Connector Events bring together small groups of senior-level information security professionals from a broad spectrum of industries and experiences for facilitated deep-dive discussions of important challenges and solutions in the information security space. Your community is a resource: through intimate peer-to- peer conversations around common issues, solutions, and suggestions for improvement, you’ll gain insight into varying perspectives and develop new ideas to accelerate your problem-solving efforts.
  • 3. Can you communicate the value of information security in a compelling way? To be effective, information security needs resources and support from a range of stakeholders – but many security teams aren’t prepared to state their case persuasively. 62% of CISOs who completed the CISO Impact Diagnostic are still in the early stages of proactively engaging with key stakeholders to build a strong value proposition. What steps can you take to move the needle? At a recent event, we posed the question:
  • 4. “This is done by the CIO and not by the CISO.” “Don't have an official CISO/Security Officer at present. Time is spent on compliance, audit and firefighting.” Attendees discussed the challenges … “…There were initial communications with the prior CISO, but more is needed.”
  • 5. … and through that discussion, shared thoughts on how to address the problem. •  Build a strong, business-oriented value proposition that explains how information security helps your company grow and win. •  Engage deeply with key stakeholders – not just the ‘easy’ ones like Finance, Risk, Audit and Compliance but also the business unit GMs – to understand what drives their business decisions. •  Work with the Marketing department to develop assets that communicate your value proposition.
  • 6. At a Connector Event, you will: •  Gain insight into the challenges and roadblocks you and your peers share. •  Learn about new and unique approaches to common issues and topics •  Take away problem-solving ideas that you can apply in your own organization.