Various enterprises operating in a multitude of industries enact varying approaches to build their Cybersecurity teams and capabilities. Two popular program-building strategies are:
1) Aligning with an Information Security Management System (ISMS) and the associated compliance requirements
2) Building and maturing a Cybersecurity function based on specific threats faced by the enterprise.
In this session, our esteemed panelists will discuss strategies to identify and take advantage of the program best suited to you and your organization. How can security leaders draw the line between a compliance framework and a risk management framework? Can the two be balanced?
Chairman & Founder
Sr. Director, Chief Information Security Officer
Information Security Director
Arizona Public Service
Cyber Security Strategy
Deputy Chief Security Officer