How to Win Cybersecurity Budget and Buy-in from the C-Suite to Mitigate Increased Level of Threat

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Protecting your company’s crown jewels is a cliché, but it’s a cliché that has become even more important in the wake of a pandemic that has forced the world to work remotely. Cyber-threats have increased and C-Suites have taken notice, but converting that awareness into budget investment, commitment and a fundamental change in their practices to minimise cyber threats is another matter.

A top down approach is essential to a successful cybersecurity strategy – starting by protecting the company’s most sensitive information and most important assets, often held by board members and the c-suite. But to do this, you need your board members to understand the new threat landscape in a working-from-home environment, the importance of managing risk, and how to improve your organisations cybersecurity posture.

In this webinar, you will:

  • Learn how to navigate the increased level of threat your c-suite and board members face in the virtual WFH world
  • Learn how to get the attention of your C-suite and foster a top-down approach
  • Understand Cyber Risk Scorecards and how to use them
  • Get advice on how to win buy-in and budget from the C-suite and Board

>> Log in or complete this short form to register >>


Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Henry Jiang

Henry Jiang

CISO, Diligent

Photo of Lisa Ventura

Lisa Ventura

Founder, Cyber Security Unity

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Diligent here: Please see Infosecurity Magazine’s privacy policy for more information.