Information Security Programs: Defining And Managing To Operational Success

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=mg6aeYIDNQw



Category:
Guide
Duration: 46:21
33 views
1


On the surface, building an information security program may appear as is in its name, a single program. However, in reality, there are countless elements — sub-programs and adjacent programs, if you will — that comprise a comprehensive information security program.

In this conversation, we explore the overarching program, of course, including:
- Who owns the program
- How to secure funding for the program
- How to define and measure success
- How to communicate progress, accomplishments, failures, and challenges
- Common best practices for a program

But, we will also look at all (or, as many as we can) of the sub-programs or adjacent programs that support the main InfoSec program. Things like network security, DevSecOps, risk management, data protection, regulatory compliance, and incident response — just to name a few.

Join us for this conversation and bring your questions about how best to plan, prioritize, budget, staff, and implement a successful information security program.

It's time to explore reality.

____________________________

Guests
Mari Galloway
CEO and a founding board member for the Women's Society of Cyberjutsu (WSC) [@womenCyberjutsu]
On LinkedIn | https://www.linkedin.com/in/themarigalloway/
On Twitter | https://twitter.com/marigalloway

James Leslie
CIO at Cambridge Housing Authority [@CambHousing]
On LinkedIn | https://www.linkedin.com/in/jameseleslie/
Cambridge Housing Authority | https://www.cambridge-housing.org

____________________________

This Episode’s Sponsors

HITRUST: 👉 https://itspm.ag/itsphitweb

CrowdSec: 👉 https://itspm.ag/crowdsec-b1vp

Blue Lava: 👉 https://itspm.ag/blue-lava-w2qs

BlackCloak 👉 https://itspm.ag/itspbcweb

AppViewX 👉 https://itspm.ag/appviewx-cbye

Checkmarx 👉 https://itspm.ag/checkmarx-i9o5

____________________________

Resources

Listen to the podcast: https://itsprad.io/redefining-cybersecurity-59

Learn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsac-b8ef76

____________________________

For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2022-rsac-san-francisco-usa-cybersecurity-event-coverage

To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity

Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships

Are you interested in telling your story in connection with RSA Conference by sponsoring our coverage?👉 https://itspm.ag/rsac22sp




Other Videos By ITSPmagazine


2022-06-10Live During RSA Conference 2022 | A Conversation With Angela Marafino
2022-06-10Live During RSA Conference 2022 | A Conversation With Charity Wright
2022-06-09Live During RSA Conference 2022 | A Conversation w/ Security Leaders, Rock Lambros & Russell Eubanks
2022-06-09Live During RSA Conference 2022 With Steve Luczynski At The Aerospace Village In The Sandbox
2022-06-09A Conversation w/ Jen Easterly | Securing Bridges With Alyssa Miller Live @RSAConference 2022 | Ep13
2022-06-09Live During RSA Conference 2022 | A Conversation With Rick McElroy
2022-06-09Live During RSA Conference 2022 | A Conversation With Chloé Messdaghi
2022-06-09Live During RSA Conference 2022 | A Conversation With BlackCloak’s Chris Pierson
2022-06-09Live During RSA Conference 2022 | A Conversation With AppViewX’s Selena Proctor And Alon Nachmany
2022-06-07Live During RSA Conference 2022 | A Conversation With HITRUST’s Michael Parisi
2022-06-07Information Security Programs: Defining And Managing To Operational Success
2022-06-03Skills Vs Personality | A Conversation With Sameer Ranjan
2022-06-02Make Others Great | A Conversation With Chief Information Security Office (CISO) David Cross
2022-06-02Lessons From Secret Service | A Conversation With Former Special Agent, John Toney
2022-06-02Building An Iconic Business | A Conversation With Entrepreneur And Author, Richard Thalheimer
2022-06-02Starting With Security | A Conversation With Author Of Designing Secure Software, Loren Kohnfelder
2022-06-02Researchers Are Your Friends | A Conversation With Jay Balan
2022-06-02Building Better Workplaces | A Conversation With Chloé Messdaghi
2022-06-02The Machines Won't Kill Us | A Conversation With Ria Cheruvu
2022-06-02Lead With Positive Effects | A Conversation With April Sabral
2022-06-02Build Allies | A Conversation With Shamane Tan