Various enterprises operating in a multitude of industries enact varying approaches to build their Cybersecurity teams and capabilities. Two popular program-building strategies are:
1) Aligning with an Information Security Management System (ISMS) and the associated compliance requirements
2) Building and maturing a Cybersecurity function based on specific threats faced by the enterprise.
In this session, our esteemed panelists will discuss strategies to identify and take advantage of the program best suited to you and your organization. How can security leaders draw the line between a compliance framework and a risk management framework? Can the two be balanced?
Robert Rodriguez
Chairman & Founder
SINET
Patricia Ryan
Sr. Director, Chief Information Security Officer
QuidelOrtho
Jamie Rossato
Information Security Director
Lion Corporation
David Boynton
Director, Cybersecurity
Arizona Public Service
Mike Nelson
Director
Cyber Security Strategy
CyberCX
Paul Montrose
Sr. Director
Deputy Chief Security Officer
Acxiom