From Villain to Hero: How Security Can Maximize Value from your IT Investments

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Can IT security inform and align with the innovation, capitalization and diffusion of your business’s new technology, processes and consequent regulatory requirements? Can it be done in a way that demonstrates to management that IT security is a business enabler, rather than inhibitor?

Digital change and innovation has to be forward looking, efficient and able to align with your business’s strategic objectives in order to benefit operations and distribution channels. However, IT security is commonly viewed as a burdensome necessity that holds technological change back – the enterprise villain.

This webinar will show security professionals that when integrated at the outset of a change program in the form of integrated Governance, Risk and Compliance, IT security can inform and align with effective, long-term change by embedding effective communication channels and governance structures, managing risks, protecting digital assets, proving actionable analytics and ensuring up-to-date and simplified compliance.

Attendees for this webinar will learn:

  • How to put cybersecurity on the corporate risk register
  • How to close gaps in understating of the risks-rewards balance
  • How to promote security as an business agility tool



Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

James Gay

CISO, TNT Express

    Peter Gibbons

    Peter Gibbons Head of Information Security, Network Rail

      Phillip Mason

      Commercial Director, Information Risk Management (IRM) PLC

        Conor McGoveran

        Chief Information Officer, Information Risk Management (IRM) PLC

        Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.