Emergency Incident ResponseReport a Confirmed or Potential Breach? Call   +1 770-870-6343
0 Results Found
              Back To Results

                Reporting to the Board: A Toolkit for CISOs

                Reporting to the Board: A Toolkit for CISOs
                Speaker: Gus Chernitsky: Sr. GRC Security Consultant, Security and Risk Consulting (SRC)
                Recorded :
                Duration: 60 mins @10:30am AEST

                Following a steady march of largescale breach crises at corporations and public entities over the past several years, business leaders and boards of directors have been put on notice that cybersecurity is a business risk and not an IT problem. Regulators and stakeholders have made their expectations clear: take action to proactively monitor and mitigate cybersecurity risk, or expect fines and legal intervention. In response to the heightened sense of urgency, boards of directors are seeking a more effective way to monitor the risks more closely, but they face significant challenges.

                However, according to the National Association of Corporate Directors 2015-16 Public Company Governance Survey, 1/3 of board members are dissatisfied with the quality of cybersecurity information provided by management. Board members need accurate and easy to understand information so that they can understand cyber-risk and make the right decisions around investment. In this webinar Senior Governance & Risk Security Consultant Gus Chernitsky will share his experience communicating with boards and executive leadership about how cybersecurity can be reported to the board in a manner that lends the appropriate attention for continued investment.

                By attending this webinar, you can expect to come away with:

                • List of topics that you should focus on to get board’s attention
                • Tips on how to prepare for your board presentation
                • Practical guide to choosing correct terminology when reporting
                • Some examples on what to include in your presentation

                Like what you're reading ?
                Get instant access by completing the form below


                Select Role:

                • Board of Directors
                • CEO / CFO / COO
                • CISO / CSO
                • CIO / CTO
                • IT / IS / Security VP/Director
                • IT / IS / Security Manager
                • IT / IS / Security Staff
                • IT / IS / Non-Security
                • Risk / Legal / Compliance / Finance
                • Sales / Marketing
                • Press / Industry Analyst
                • Student

                Select Country:

                • Select an item

                Select State:

                • Select an item

                Select Annual Revenue:

                • > 1000
                • 501 - 999
                • < 500

                Select Industry:

                • Banking
                • Business Services
                • Credit Union
                • Education
                • Finance
                • Government
                • Health Care (Non-Hospital)
                • Heavy Industry
                • Hospitality
                • Hospitals
                • Insurance
                • Legal
                • Manufacturing
                • Media
                • Membership Organizations
                • Retail
                • Technology
                • Telecom
                • Transportation
                • Utilities
                • Other

                Current Security Environment?:

                • Managing In-House
                • Managing Externally (3rd Party)
                • Blended Model (In-house and 3rd Party)
                • Not sure

                Select Next Security Initiative Timeframe:

                • 0-3 months
                • 3-6 months
                • 6-12 months
                • 12-24 months

                Select Our Greatest Security Challenge:

                • Securing The Cloud
                • Assessing security posture
                • Optimizing Security Operations
                • Protecting critical assets
                • Meeting & maintaining compliance
                • Preventing a data breach
                • Access to actionable security intelligence
                • Access to security expertise
                • Preparing & responding to an incident

                Interested in learning more

                Currently Looking for Assistance With (Select all that Apply)

                Select Best time to call:

                • Early morning (8-10am)
                • Late morning (10am-12pm)
                • Early afternoon (12-3pm)
                • Late afternoon (3-5pm)

                Secureworks News :

                Related Content