Read Frequently Asked Questions
Complimentary Webinar: The Evolving Role of the Chief Information Security Officer
This webinar will help you understand the evolving role of Chief Information Security Officers in the workplace. we will explore the history of the chief information security officer position, their increased voice in the board room, increased pressure from CEOs to address an ever changing technology landscape, the shift from a technology role to a strategic role, saying “yes” rather than “no,” the three types of security leaders of today, and the future of the CISOs in your organization as identified in the IBM 2012 study.
Why Should You Attend:
Every day, new streams of information flow into corporations, powering up-to-the-minute analysis and smarter decisions. Employees, customers and contractors are all connected as never before, across a multitude of technologies. This hyper-connected era is new ground for many organizations. These sprawling and overlapping networks pose daunting security challenges. The complexity is dizzying, the possible points of attack nearly limitless. CIOs and CISOs are grappling with growing frustrations—and questions.
"This data painted a profile of a new class of CISO leaders who are developing a strategic voice, and paving the way to a more proactive and integrated stance on information security," said David Jarvis, author of the report and senior consultant at the IBM Center for Applied Insights. "We see the path of the CISO is now maturing in a similar pattern to the CFO from the 1970s, the CIO from the 1980s – from a technical one to a strategic business enabler. This demonstrates how integral IT security has become to organizations."
This webinar will provide valuable assistance to all organizations on how the role of the Chief information Security Officer is changing and why it needs to enable organizational success in current and future technology initiatives.
Areas Covered in the Webinar:
The webinar will cover the following areas:
- History of the chief information security officer.
- Increased voice in the board room.
- Increased pressure from CEOs to address an ever changing technology landscape.
- Shift from a technology role to a strategic role.
- Ability to say “Yes” rather than “No”
- Three types of security leaders of today.
- The future of the CISOs in your organization.
Who will Benefit:
This topic applies to personnel in any organization that has or is looking for a Chief Information Security Officer in their organization. The employees who will benefit most include:
- Senior Management
- IT Security Managers
- IT Managers
- HR Managers
Thomas (T.J.) DeLaine, is an information security professional with 20 years of experience and is well versed in diverse regulatory touch points for defense, government and commercial organizations. His information security disciplines are in governance/compliance, program and project management, test development/management and identity management. T.J. is a Certified Information Systems Security Professional (CISSP) and Provisional Auditor, Information Security Management Systems Scheme (ISO 27001). He has held previous positions as a Communications Security Officer, IT Security Governance Analyst, Signals Warfare Officer, and Maintenance Logistical Support Division Officer. T.J. is a graduate of Chaminade University of Honolulu in Business Administration.
ComplianceOnline would process/provide refund only if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange. Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs."
For substitution, please email email@example.com or call +1-650-620-3937.
This training hasn't been reviewed yet.
BYOD and Information Security - Is this an Oxymoron? Information Security Awareness Training - Why It is Important?