TEC37 Security Series E10: Five Essential Steps to Improve Security Maturity
Event Overview
Join host Robb Boyd as he speaks with WWT's Jill Cochrane, Kris Carr, and Geoff Hancock, as they walk through different levels of cybersecurity maturity to give CISOs, CEOs and CIOs the confidence to improve their security postures wisely and maximize resources.
What to expect
- Five distinct maturity levels: Ad-hoc and initial, Established and current security, Defined and approved security, Actively managed security and Optimized and innovative security
- Example scenarios of each step
- Recommended strategies for each level of maturity
- Helpful tips for security leaders to mature security posture based on current level of maturity
Goals and Objectives
The purpose of this episode is to share insights WWT experts have on the industry landscape and give a step-by-step guide for CISOs to build alignment, reduce risk and deliver business value.
Who should attend?
Security Leaders: CISOs, CSOs, CIOs, Executive Directors, Managing Directors and Information Security personnel.
Presenters
World Wide Technology
Global Director Cybersecurity Engineering
World Wide Technology
VP & General Manager, Solution Security
World Wide Technology
Director, Global Security Consulting Services
Explainerds.net
Chief Nerd
Related content
Security Maturity Model