How to be a Security Evangelist, Now and in the Future

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The role of a security evangelist may be among the most appealing in cybersecurity: you get the security of working for a vendor, you deal with the press, customers and are invited to speak at conferences and are not as accountable as a CEO. However, is the job really as rosy as it seems, and what sort of person has the attributes to fill such a role?

In this webinar we will look at the role of a security evangelist; hearing from those doing the job and get an understanding of what sort of experience and qualifications are required to become such a valued person both within a company and to the wider cybersecurity industry.

Key takeaways:

  • What are the daily duties in the life of a security evangelist?
  • Is there a job description for the role?
  • Are vendors now looking for this type of ‘all-rounder’?
  • What experience would a vendor typically require to appoint an evangelist?

Speakers

Mark Crosbie

Global Head of Trust and Privacy, Dropbox

Ryan Hausknecht

Security Consultant and Analyst

Wendy Nather

Head of Advisory CISOs, Cisco

Gregory Parfitt

Application Security Specialist

Brought to You by

Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.