CSS2016D2S3: Where Cyber Security Strategy (Risk Management) and Practical Deployment Meet - IBM
Where Cybersecurity Strategy (Risk Management) and Practical deployment meet
Speaker: Pete Allor, Senior Security Strategist, IBM Security
Description: A Risk based Strategy is in great demand for all state agencies, but how do you formulate a risk approach that can realize a practical deployment? Are there practical examples of how to do this and can I use them to be effective in stopping the wide array of threats facing my organization? Where do you start and what tools and customized frameworks can help you to move beyond compliance to risk-based strategy that your management understands and supports? Learn how in the discussion of what others are doing and take it past just a strategy and risk approach to a practical reality. www.ibm.com/security and www.securityintelligence.com
Expected Outcome: Gain insight on how to build a risk-based security strategy and what tools and frameworks can be in building that plan. In addition learn from proven best practices and examples of other state clients approach
Intended Audience: CISO, CIO, ISO, Infrastructure Manager, Privacy and Compliance officers, Operations, Supervisors.
This video was filmed at the Sept 28 & 29, 2016 Cyber Security Symposium in Sacramento, CA
If you would like information on any future PSP Forums, please visit our event site at www.pspinfo.us
Contact Information:
Russ Hicks, President
Public Sector Partners, Inc.
russ.hicks@pspinfo.us
Видео CSS2016D2S3: Where Cyber Security Strategy (Risk Management) and Practical Deployment Meet - IBM канала Public Sector Partners, Inc
Speaker: Pete Allor, Senior Security Strategist, IBM Security
Description: A Risk based Strategy is in great demand for all state agencies, but how do you formulate a risk approach that can realize a practical deployment? Are there practical examples of how to do this and can I use them to be effective in stopping the wide array of threats facing my organization? Where do you start and what tools and customized frameworks can help you to move beyond compliance to risk-based strategy that your management understands and supports? Learn how in the discussion of what others are doing and take it past just a strategy and risk approach to a practical reality. www.ibm.com/security and www.securityintelligence.com
Expected Outcome: Gain insight on how to build a risk-based security strategy and what tools and frameworks can be in building that plan. In addition learn from proven best practices and examples of other state clients approach
Intended Audience: CISO, CIO, ISO, Infrastructure Manager, Privacy and Compliance officers, Operations, Supervisors.
This video was filmed at the Sept 28 & 29, 2016 Cyber Security Symposium in Sacramento, CA
If you would like information on any future PSP Forums, please visit our event site at www.pspinfo.us
Contact Information:
Russ Hicks, President
Public Sector Partners, Inc.
russ.hicks@pspinfo.us
Видео CSS2016D2S3: Where Cyber Security Strategy (Risk Management) and Practical Deployment Meet - IBM канала Public Sector Partners, Inc
Показать
Комментарии отсутствуют
Информация о видео
20 октября 2016 г. 22:14:03
00:44:20
Другие видео канала
Conducting a cybersecurity risk assessmentCyber Security Interview Questions And Answers | Cyber Security Interview Preparation | IntellipaatBest Practices for Building a Cybersecurity StrategyFundamentals of Strategic Management part 1OWASP Top 10 (Security Risks and Vulnerabilities)Quick Look: How to Explain Cybersecurity to the Board Using a Simple Metaphor: FIRE5 Tips for Cybersecurity Safety brought to you by Mayim BialikIT Security Career Risk Management FrameworkChief Information Security Officer Strategies 2021 (CXOTalk #670)How to Design a Security Organizational StructureWhat is the IBM Business Model?How to Plan for and Implement a Cybersecurity StrategyThe Basics of Risk Management with ISO 31000Achieving Cyber Essentials PlusWhat is Risk Management Framework NIST 800 37Cybersecurity & ISO 27001: Implementing a Secure Information Security Management System with DQS IncNetwork Security 101: Full Workshop10 Cyber Security Trends You Can't Ignore In 2021 | PurpleSecThe Fine Art of Creating a Transformational Cybersecurity StrategyCybersecurity Risk Management Simplified | Cybersecurity Tutorial | Cybersecurity Training | Edureka