SlideShare a Scribd company logo
#RSAC
SESSION ID:
Stan Dolberg Phil Gardner
IANS Research - The 7 Factors of
CISO Impact
CXO-W01
Co-Founder, Chief Executive Officer
IANS
@IANS_Security
Head of Research
IANS
@IANS_Security
#RSAC
“It is the mark of an educated
mind to be able to entertain a
thought without accepting it.”
Aristotle
#RSAC
Phil
Stan
#RSAC
Helping information security
and IT risk professionals make
smarter decisions since 2001
Institute for Applied Network Security
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
#RSAC
Focus
Strategic
Initiatives
Tactical
Activities
IntegrationWeak Embedded
60-65%
Foundational
25-30%
Transitional
5-10%
Executive
CISO
Impact
Quotient
(CIQ)
#RSAC
#RSAC
#RSAC
{ {&
#RSAC
{ {CISO Impact
#RSAC
The 7
Factors
of CISO
Impact
#RSAC
16
#RSAC
… safeguard
information
assets across
space and
time
THE PROMISE
… don’t
control
most of the
resources
THE ‘BUT’
… master
proactive
engagement
with the
business
THE ‘GOTTA’
#RSAC
Progress Starts with Assessment
Information Security
Organizational Engagement
CISO Impact
Technical Infrastructure
Information Security
Control Strength
Assessment Standards:
• ISO 27001
• NIST
• COBIT 5
• …
#RSAC
{ {CISO Impact
#RSAC
CISO
Impact
Diagnostic
Over 400 Completes in 200 days
75% Fortune 1000
1000 Completes EOY 2015
#RSAC
Defense / Military
Energy
Financial Services
Healthcare
Manufacturing
Public Sector / Non-Profit
Retail
Services
Technology
TelecomTransportation
FinanceServices
#RSAC
7%
31%
62%
Foundational
Executive
Transitional
CISO
Impact
Data
#RSAC
CISO
Impact
Quotient
(CIQ)
Focus
Strategic
Initiatives
Tactical
Activities
IntegrationWeak Embedded
(Representative Set of Data)
#RSAC
7%of CISO Impact diagnostics
that scored
Executive
Finance
Breaking down the
#RSAC
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Foundational
Transitional
Executive
#RSAC
32%of respondents are
in Financial Services...
...yet Financial Services comprises
52% of Executive CIQ
#RSAC
What’s Your
CISO Impact
Quotient
(CIQ)?
Focus
Strategic
Initiatives
Tactical
Activities
IntegrationWeak Embedded
#RSAC
What’s
Your
CIQ Goal?
Focus
Strategic
Initiatives
Tactical
Activities
IntegrationWeak Embedded
Factor 1: Gain Command of the Facts
 Acquire the data on information
assets to support a company-
specific risk profile
 Build a consensus with the
business on what matters and on
the impact of compromise
 Develop a robust planning tool
including company and industry
data to provide an outlook
#RSAC
Who has
Command
of the
Facts?
Defense/Military
Energy
Financial Services
Healthcare
Manufacturing
Public Sector NFP
Retail
Services
Technology
Telecommunications
Transportation
Factor 2: Get Business Leaders to Own Risk
 Educate / advocate for the mind-
shift that business owns InfoSec
risk
 Build key alliances with the
business to gain a foothold
 Run exercises, games, and
simulations to make it personal
 Develop strong stewardship policies
and follow-through tools
#RSAC
…walking the tightrope
Factor 3: Embed into Key Processes
 Embed safe coding practices into
software development processes
 Wire criteria into vendor due
diligence
 Build consultations into new
business initiatives
 Work your way to the front-end
of mergers and acquisitions
#RSAC
Technology
Manufacturing
Defense
Factor 4: Run Infosec Like a Business
 Develop financial discipline to
tie budgets to business impact
 Culture sophisticated resource
management skills
 Build strong project
management capabilities within
InfoSec
#RSAC
Factor 5: Technical and Business-Capable Team
 Change the game with
competency models that
balance technical, business,
and interpersonal skills
 Apply models & lay out career
paths to retain those who can
represent the CISO
 Invest in leadership and
management development for
the CISO and directs
#RSAC
Creative Strong Communicator
& Listener
Positive
Story teller
Collaboration Able to execute
Humor
Conflict resolution
Factor 6: Communicate the value
 Build a value proposition for
how InfoSec helps the company
grow and win
 Proactively and consistently
communicate that value
 Engage with stakeholders to
learn how to express the value
in terms with meaning to them
#RSAC
Factor 7: Organize for Success
 How stretched thin is InfoSec
between day to day ops and
strategy / policy / architecture?
 CISO and BISO reporting?
Technology?
 Dotted line reporting outside
tech?
 Mechanisms that put CISO and
team in direct contact with
leaders?
#RSAC
95% of Foundational
CISOs Report to
Technology
40% of Executive
CISOs Report
to Technology
#RSAC
{ {&
#RSAC
The 7
Factors
of CISO
Impact
#RSAC
What’s Your
CIQ Goal
(now)?
Focus
Strategic
Initiatives
Tactical
Activities
IntegrationWeak Embedded
Take the CISO Impact Diagnostic
 25 questions / 20 minutes
 Get instant feedback on how you measure up in your industry
 Register to get an in-depth report
Embark on your CISO Impact Journey
https://rsa.iansresearch.com/
https://rsa.iansresearch.com/
THANK YOU
Questions?
©2015 IANS All Rights Reserved

More Related Content

What's hot

The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
IBM Security
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
Vladimir Jirasek
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
sahrens1
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Global Business Events
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
William McBorrough
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
Carl Bradley Pate
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)
Ollie Whitehouse
 
Less tech more talk the future of the ciso role
Less tech more talk the future of the ciso roleLess tech more talk the future of the ciso role
Less tech more talk the future of the ciso role
Priyanka Aash
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
Tony Hauxwell
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
Priyanka Aash
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Intergen
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
guest08b1e6
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
Dayo Olujekun
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
TicTac Data Recovery
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
Marlabs
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
EC-Council
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
centralohioissa
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
Fidelis Cybersecurity
 
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
North Texas Chapter of the ISSA
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
ciso_insights
 

What's hot (20)

The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)Securing your supply chain & vicarious liability (cyber security)
Securing your supply chain & vicarious liability (cyber security)
 
Less tech more talk the future of the ciso role
Less tech more talk the future of the ciso roleLess tech more talk the future of the ciso role
Less tech more talk the future of the ciso role
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Information Security Intelligence
Information Security IntelligenceInformation Security Intelligence
Information Security Intelligence
 
Security Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government IndividualSecurity Proposal for High Profile/Government Individual
Security Proposal for High Profile/Government Individual
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss ProtectionGabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
Gabriel Gumbs - A Capability Maturity Model for Sustainable Data Loss Protection
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
NTXISSACSC2 - Texas CISO Council - Information Security Program Essential Gui...
 
Security Consulting Methodology
Security Consulting MethodologySecurity Consulting Methodology
Security Consulting Methodology
 

Viewers also liked

Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Global Business Events
 
Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIO
Global Business Events
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
Gary Hayslip CISSP, CISA, CRISC, CCSK
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
Gary Hayslip CISSP, CISA, CRISC, CCSK
 
#%! My CISO Says
#%! My CISO Says#%! My CISO Says
#%! My CISO Says
Argyle Executive Forum
 
Building security leaders ISSA Virtual CISO Series
Building security leaders   ISSA Virtual CISO SeriesBuilding security leaders   ISSA Virtual CISO Series
Building security leaders ISSA Virtual CISO Series
Aaron Carpenter
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)
Maurice Dawson
 

Viewers also liked (7)

Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
 
Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIO
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 
#%! My CISO Says
#%! My CISO Says#%! My CISO Says
#%! My CISO Says
 
Building security leaders ISSA Virtual CISO Series
Building security leaders   ISSA Virtual CISO SeriesBuilding security leaders   ISSA Virtual CISO Series
Building security leaders ISSA Virtual CISO Series
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)
 

Similar to The 7 Factors of CISO Impact at RSA 2015

The five secrets of high performing cisos
The five secrets of high performing cisosThe five secrets of high performing cisos
The five secrets of high performing cisos
Priyanka Aash
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
Priyanka Aash
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
simplyme12345
 
Measuring security culture is different from counting employees
Measuring security culture is different from counting employeesMeasuring security culture is different from counting employees
Measuring security culture is different from counting employees
Kai Roer
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
IANS
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
Andrew Sanders
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
SPLICE Software
 
Ten Tenets of CISO Success
Ten Tenets of CISO SuccessTen Tenets of CISO Success
Ten Tenets of CISO Success
Frank Kim
 
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
SeniorStoryteller
 
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security Dollars
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security DollarsHacking the CEO: Ninja Mind Tricks and Other Ruses to get Security Dollars
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security Dollars
Denim Group
 
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!
CA Technologies
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
tlinde
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
Elasticsearch
 
RWDG Slides: Build an Effective Data Governance Framework
RWDG Slides: Build an Effective Data Governance FrameworkRWDG Slides: Build an Effective Data Governance Framework
RWDG Slides: Build an Effective Data Governance Framework
DATAVERSITY
 
Top 10 SOAR companies from 2022 December2022.pdf
Top 10 SOAR companies from 2022 December2022.pdfTop 10 SOAR companies from 2022 December2022.pdf
Top 10 SOAR companies from 2022 December2022.pdf
InsightsSuccess4
 
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
Don't Get Left In The Dust How To Evolve From Ciso To CiroDon't Get Left In The Dust How To Evolve From Ciso To Ciro
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
Priyanka Aash
 
Threat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty TrainingThreat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty Training
Priyanka Aash
 
The Secrets to Increasing Value of IT to the Enterprise with Jose Ignacio Zor...
The Secrets to Increasing Value of IT to the Enterprise with Jose Ignacio Zor...The Secrets to Increasing Value of IT to the Enterprise with Jose Ignacio Zor...
The Secrets to Increasing Value of IT to the Enterprise with Jose Ignacio Zor...
David Loia
 
Business Intelligence Productionization
Business Intelligence ProductionizationBusiness Intelligence Productionization
Business Intelligence Productionization
David Moore
 

Similar to The 7 Factors of CISO Impact at RSA 2015 (20)

The five secrets of high performing cisos
The five secrets of high performing cisosThe five secrets of high performing cisos
The five secrets of high performing cisos
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
Measuring security culture is different from counting employees
Measuring security culture is different from counting employeesMeasuring security culture is different from counting employees
Measuring security culture is different from counting employees
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
 
The 7 Factors of CISO Impact
The 7 Factors of CISO ImpactThe 7 Factors of CISO Impact
The 7 Factors of CISO Impact
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Ten Tenets of CISO Success
Ten Tenets of CISO SuccessTen Tenets of CISO Success
Ten Tenets of CISO Success
 
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
Culture Hacker: How to Herd CATTs and Inspire Rebels to Change the World! - S...
 
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security Dollars
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security DollarsHacking the CEO: Ninja Mind Tricks and Other Ruses to get Security Dollars
Hacking the CEO: Ninja Mind Tricks and Other Ruses to get Security Dollars
 
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
 
RWDG Slides: Build an Effective Data Governance Framework
RWDG Slides: Build an Effective Data Governance FrameworkRWDG Slides: Build an Effective Data Governance Framework
RWDG Slides: Build an Effective Data Governance Framework
 
Top 10 SOAR companies from 2022 December2022.pdf
Top 10 SOAR companies from 2022 December2022.pdfTop 10 SOAR companies from 2022 December2022.pdf
Top 10 SOAR companies from 2022 December2022.pdf
 
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
Don't Get Left In The Dust How To Evolve From Ciso To CiroDon't Get Left In The Dust How To Evolve From Ciso To Ciro
Don't Get Left In The Dust How To Evolve From Ciso To Ciro
 
Threat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty TrainingThreat Intelligence Is Like Three Day Potty Training
Threat Intelligence Is Like Three Day Potty Training
 
The Secrets to Increasing Value of IT to the Enterprise with Jose Ignacio Zor...
The Secrets to Increasing Value of IT to the Enterprise with Jose Ignacio Zor...The Secrets to Increasing Value of IT to the Enterprise with Jose Ignacio Zor...
The Secrets to Increasing Value of IT to the Enterprise with Jose Ignacio Zor...
 
Business Intelligence Productionization
Business Intelligence ProductionizationBusiness Intelligence Productionization
Business Intelligence Productionization
 

More from IANS

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
IANS
 
What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6
IANS
 
What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2
IANS
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
IANS
 
What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3
IANS
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?
IANS
 
What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6
IANS
 
What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5
IANS
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
IANS
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1
IANS
 

More from IANS (10)

Application Security - Making It Work
Application Security - Making It WorkApplication Security - Making It Work
Application Security - Making It Work
 
What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6What is an IANS CISO Workshop? Factor 6
What is an IANS CISO Workshop? Factor 6
 
What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2
 
What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1What is an IANS CISO Workshop? Factor 1
What is an IANS CISO Workshop? Factor 1
 
What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3
 
What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?What is an IANS CISO Impact Roundtable?
What is an IANS CISO Impact Roundtable?
 
What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6
 
What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5What is an IANS Connector Event? - Factor 5
What is an IANS Connector Event? - Factor 5
 
What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3What is an IANS Connector Event? - Factor 3
What is an IANS Connector Event? - Factor 3
 
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 1
 

Recently uploaded

Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
Alexey Krivitsky
 
Resource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdfResource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdf
FeteneA
 
Employment Practices Regulation and Multinational Corporations
Employment PracticesRegulation and Multinational CorporationsEmployment PracticesRegulation and Multinational Corporations
Employment Practices Regulation and Multinational Corporations
RoopaTemkar
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Dr. Nazrul Islam
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
stuwilson.co.uk
 
Credit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentationCredit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentation
bernanbumatay1
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
8p28uk6g
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
spandane
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
dsnow9802
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
Dr. Christine Ngari ,Ph.D (HRM)
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
Anjana Josie
 
Credit Management training seminar power point presentation
Credit Management training seminar power point presentationCredit Management training seminar power point presentation
Credit Management training seminar power point presentation
bernanbumatay1
 
Strategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptxStrategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptx
KarthikRaghu8
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
Alberto Brandolini
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
Ahmed AbdelMoneim
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
Ram V Chary
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 
Risk-Management-presentation for cooperatives
Risk-Management-presentation for cooperativesRisk-Management-presentation for cooperatives
Risk-Management-presentation for cooperatives
bernanbumatay1
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
Bill641377
 

Recently uploaded (20)

Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
 
Resource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdfResource-mobilization-guide-for-community-based-organizations1.pdf
Resource-mobilization-guide-for-community-based-organizations1.pdf
 
Employment Practices Regulation and Multinational Corporations
Employment PracticesRegulation and Multinational CorporationsEmployment PracticesRegulation and Multinational Corporations
Employment Practices Regulation and Multinational Corporations
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
 
Credit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentationCredit-Management seminar for cooperative power point presentation
Credit-Management seminar for cooperative power point presentation
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
 
Credit Management training seminar power point presentation
Credit Management training seminar power point presentationCredit Management training seminar power point presentation
Credit Management training seminar power point presentation
 
Strategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptxStrategy for E-Types - Strategy Formulation.pptx
Strategy for E-Types - Strategy Formulation.pptx
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 
Risk-Management-presentation for cooperatives
Risk-Management-presentation for cooperativesRisk-Management-presentation for cooperatives
Risk-Management-presentation for cooperatives
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
 

The 7 Factors of CISO Impact at RSA 2015