On the surface, building an information security program may appear as is in its name, a single program. However, in reality, there are countless elements — sub-programs and adjacent programs, if you will — that comprise a comprehensive information security program.
In this conversation, we explore the overarching program, of course, including:
• Who owns the program • How to secure funding for the program • How to define and measure success • How to communicate progress, accomplishments, failures, and challenges • Common best practices for a program
But, we will also look at all (or, as many as we can) of the sub-programs or adjacent programs that support the main InfoSec program. Things like network security, DevSecOps, risk management, data protection, regulatory compliance, and incident response — just to name a few.
Join us for this conversation and bring your questions about how best to plan, prioritize, budget, staff, and implement a successful information security program.
It's time to explore reality.
____________________________
Guests Mari Galloway CEO and a founding board member for the Women's Society of Cyberjutsu (WSC) [@womenCyberjutsu] On LinkedIn | https://www.linkedin.com/in/themarigalloway/ On Twitter | https://twitter.com/marigalloway
James Leslie CIO at Cambridge Housing Authority [@CambHousing] On LinkedIn | https://www.linkedin.com/in/jameseleslie/ Cambridge Housing Authority | https://www.cambridge-housing.org
____________________________
This Episode’s Sponsors
HITRUST: 👉 https://itspm.ag/itsphitweb
CrowdSec: 👉 https://itspm.ag/crowdsec-b1vp
Blue Lava: 👉 https://itspm.ag/blue-lava-w2qs
BlackCloak 👉 https://itspm.ag/itspbcweb
AppViewX 👉 https://itspm.ag/appviewx-cbye
Checkmarx 👉 https://itspm.ag/checkmarx-i9o5
____________________________
Resources
Watch Live on YouTube: https://www.youtube.com/watch?v=mg6aeYIDNQw
Learn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsac-b8ef76
____________________________
For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2022-rsac-san-francisco-usa-cybersecurity-event-coverage
To see and hear more Redefining Security content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity
Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/podcast-series-sponsorships
Are you interested in telling your story in connection with RSA Conference by sponsoring our coverage? 👉 https://itspm.ag/rsac22sp
On the surface, building an information security program may appear as is in its name, a single program. However, in reality, there are countless elements — sub-programs and adjacent programs, if you will — that comprise a comprehensive information security program.
In this conversation, we explore the overarching program, of course, including:
• Who owns the program • How to secure funding for the program • How to define and measure success • How to communicate progress, accomplishments, failures, and challenges • Common best practices for a program
But, we will also look at all (or, as many as we can) of the sub-programs or adjacent programs that support the main InfoSec program. Things like network security, DevSecOps, risk management, data protection, regulatory compliance, and incident response — just to name a few.
Join us for this conversation and bring your questions about how best to plan, prioritize, budget, staff, and implement a successful information security program.
It's time to explore reality.
____________________________
Guests Mari Galloway CEO and a founding board member for the Women's Society of Cyberjutsu (WSC) [@womenCyberjutsu] On LinkedIn | https://www.linkedin.com/in/themarigalloway/ On Twitter | https://twitter.com/marigalloway
James Leslie CIO at Cambridge Housing Authority [@CambHousing] On LinkedIn | https://www.linkedin.com/in/jameseleslie/ Cambridge Housing Authority | https://www.cambridge-housing.org
____________________________
This Episode’s Sponsors
HITRUST: 👉 https://itspm.ag/itsphitweb
CrowdSec: 👉 https://itspm.ag/crowdsec-b1vp
Blue Lava: 👉 https://itspm.ag/blue-lava-w2qs
BlackCloak 👉 https://itspm.ag/itspbcweb
AppViewX 👉 https://itspm.ag/appviewx-cbye
Checkmarx 👉 https://itspm.ag/checkmarx-i9o5
____________________________
Resources
Watch Live on YouTube: https://www.youtube.com/watch?v=mg6aeYIDNQw
Learn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsac-b8ef76
____________________________
For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2022-rsac-san-francisco-usa-cybersecurity-event-coverage
To see and hear more Redefining Security content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity
Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://www.itspmagazine.com/podcast-series-sponsorships
Are you interested in telling your story in connection with RSA Conference by sponsoring our coverage? 👉 https://itspm.ag/rsac22sp
Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis
Dansk
Danmark