0 Results Found
            Back To Results
              Webcasts

              Reporting to the Board: A Toolkit for CISOs

              Reporting to the Board: A Toolkit for CISOs
              Speaker: Gus Chernitsky: Sr. GRC Security Consultant, Security and Risk Consulting (SRC)
              Recorded :
              Duration: 60 mins @10:30am AEST

              Following a steady march of largescale breach crises at corporations and public entities over the past several years, business leaders and boards of directors have been put on notice that cybersecurity is a business risk and not an IT problem. Regulators and stakeholders have made their expectations clear: take action to proactively monitor and mitigate cybersecurity risk, or expect fines and legal intervention. In response to the heightened sense of urgency, boards of directors are seeking a more effective way to monitor the risks more closely, but they face significant challenges.

              However, according to the National Association of Corporate Directors 2015-16 Public Company Governance Survey, 1/3 of board members are dissatisfied with the quality of cybersecurity information provided by management. Board members need accurate and easy to understand information so that they can understand cyber-risk and make the right decisions around investment. In this webinar Senior Governance & Risk Security Consultant Gus Chernitsky will share his experience communicating with boards and executive leadership about how cybersecurity can be reported to the board in a manner that lends the appropriate attention for continued investment.

              By attending this webinar, you can expect to come away with:

              • List of topics that you should focus on to get board’s attention
              • Tips on how to prepare for your board presentation
              • Practical guide to choosing correct terminology when reporting
              • Some examples on what to include in your presentation

              Like what you're reading ?
              Get instant access by completing the form below

              Select Role:

              • Board of Directors
              • CEO / CFO / COO
              • CISO / CSO
              • CIO / CTO
              • IT / IS / Security VP/Director
              • IT / IS / Security Manager
              • IT / IS / Security Staff
              • IT / IS / Non-Security
              • Risk / Legal / Compliance / Finance
              • Sales / Marketing
              • Press / Industry Analyst
              • Student

              Select Country:

              • Select an item

              Select State:

              • Select an item

              Select Annual Revenue:

              • > 1000
              • 501 - 999
              • < 500

              Select Industry:

              • Banking
              • Business Services
              • Credit Union
              • Education
              • Finance
              • Government
              • Health Care (Non-Hospital)
              • Heavy Industry
              • Hospitality
              • Hospitals
              • Insurance
              • Legal
              • Manufacturing
              • Media
              • Membership Organizations
              • Retail
              • Technology
              • Telecom
              • Transportation
              • Utilities
              • Other

              Current Security Environment?:

              • Managing In-House
              • Managing Externally (3rd Party)
              • Blended Model (In-house and 3rd Party)
              • Not sure

              Select Next Security Initiative Timeframe:

              • 0-3 months
              • 3-6 months
              • 6-12 months
              • 12-24 months

              Select Our Greatest Security Challenge:

              • Securing The Cloud
              • Assessing security posture
              • Optimizing Security Operations
              • Protecting critical assets
              • Meeting & maintaining compliance
              • Preventing a data breach
              • Access to actionable security intelligence
              • Access to security expertise
              • Preparing & responding to an incident

              Interested in learning more

              Currently Looking for Assistance With (Select all that Apply)

              Select Best time to call:

              • Early morning (8-10am)
              • Late morning (10am-12pm)
              • Early afternoon (12-3pm)
              • Late afternoon (3-5pm)

              Secureworks News :

              Related Content