Securing the C-Suite: Cybersecurity Perspectives from the Boardroom

securityintelligence

Cybersecurity incidents have significant impact beyond the IT organization, representing a significant risk to ongoing business continuity and reputation, and requiring heightened engagement across the entire executive team. Common wisdom is that security leaders need to speak in ways the business will understand, but what does that really mean? And how does the business side of an organization view security? To answer these questions, IBM conducted a survey of over 700 C-Suite executives – excluding the CISO – from 28 countries, across 18 industries – to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, Human Resource executives, Chief Compliance Officers and Legal Counsel.
Watch Now

Spotlight

????????? ???????????????????????????????????????????????????????????????????????????????????????????????? ??????????????????????????? ???? eBook ????????????????????????????????????????????? ?????????? IT ?????????????????????????????????? ????????????????????????????? ????????????????????????????????????????? e-Book ??????????


OTHER ON-DEMAND WEBINARS

Tenable 2016 Cybersecurity Assurance Report Card: Key Insights and Takeaways - APAC

Tenable Network Security

This webinar will offer insights that address questions such as: How do you know if you’re accurately measuring the effectiveness of your security investments? Do you have the data and tools you need to accurately convey security risks to your company’s executive team and board of directors? How well do your company’s executives and board truly understand the cyber security risks your company is facing? How optimistic should you really be about your organization’s ability to defend itself against cyberattacks? How do your challenges compare with those of your peers?

Orchestrate Your Security Defenses with Threat Intelligence

Security Intelligence

Although the majority of organizations subscribe to threat intelligence feeds to enhance their security decision making, it’s difficult to take full advantage of true insights due to the overwhelming amounts of information available. Even with an integrated security operations portfolio to identify and respond to threats, many companies don’t take full advantage of the benefits of external context that threat intelligence brings to identify true indicators of compromise. By taking advantage of both machine- and human-generated indicators within a collaborative threat intelligence platform, security analysts can streamline investigations and speed the time to action.

Automating Advanced Security in the Software Defined Data Center

"Delivering security without compromising performance and efficiency. Business demands are constantly changing and you need to be able to respond quickly, without compromising agility, efficiency and control. Software-Defined Data Center architecture helps enterprises achieve distinct IT outcomes for greater security, availability and faster service delivery. In this webinar, you will hear how the VMware NSX network virtualization platform and Trend Micro Deep Security work together to enable scalable, high performance security and you will learn how to…. • Simplify orchestration and automation of security controls • Enforce microsegmentation and unit level security • Manage network and system based security controls • Correlate system and security events through a single view"

WALSH COLLEGE ADDING CYBERSECURITY CONCENTRATION, SETS

TROY — Walsh College will offer a new cybersecurity concentration in its Master of Science in Information Technology degree program in January 2016 to meet the increased demand for advanced education in this growing IT specialization.Separately, a free webinar titled “Next Generation Cyber Warriors – Cyber 4.0” is scheduled from 12:30 p.m. to 1:30 p.m., Wednesday, Jan. 20.Cybersecurity Concentration: A new cybersecurity concentration has been added to the graduate MSIT program. This program is unique as it maps to several external standards. The standards include Department of Defense directive 8570, the National Security Agency Center of Academic Excellence course requirements, and the Department of Homeland Security NICE Framework, which make the program a first in the southeast Michigan educational market. Cybersecurity courses include Fundamentals of Cybersecurity; Security Program Management; Business Continuity; Resiliency and Crisis Management; Threats, Vulnerabilities, Controls, and Countermeasures; Intelligence Analysis Tools and Techniques; Social, Political, and Cultural Impacts of Cybersecurity; and Current Issues in Cybersecurity.

Spotlight

????????? ???????????????????????????????????????????????????????????????????????????????????????????????? ??????????????????????????? ???? eBook ????????????????????????????????????????????? ?????????? IT ?????????????????????????????????? ????????????????????????????? ????????????????????????????????????????? e-Book ??????????

resources