Life of: A CISO

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

As part of Infosecurity’s ‘Life of…’ series, this webinar will look at the role of the CISO.

Is the CISO a part of the board of directors, part of the IT team, part of the security team – or maybe a combination of all three? This webinar will examine the positioning of today’s CISO. 

In this session, speakers will consider the career path to becoming a CISO, discuss what the day job entails, advise on what certifications and qualifications you do (or do not) need and what the typical necessary skills are to hold down the job.

This roundtable webinar will bring together some leading CISOs to discuss these topics and to give a better understanding and insight into the life of a CISO. 

Key takeaways:

  • The common challenges a CISO faces: managing teams, hiring, dealing with the board, product acquisition
  • Who does the CISO report into? How are they hired and by who? 
  • Advice on how to become a CISO and tips for maximizing effectiveness in the role 


Photo of Vicki Gavin

Vicki Gavin

Head of Business Continuity & Information Security, The Economist Group

Photo of Chris Pogue

Chris Pogue

head of strategic alliances, Nuix

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Infosecurity Magazine here: Please see Infosecurity Magazine’s privacy policy for more information.