How to Win Cybersecurity Budget and Buy-in from the C-Suite to Mitigate Increased Level of Threat

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Protecting your company’s crown jewels is a cliché, but it’s a cliché that has become even more important in the wake of a pandemic that has forced the world to work remotely. Cyber-threats have increased and C-Suites have taken notice, but converting that awareness into budget investment, commitment and a fundamental change in their practices to minimise cyber threats is another matter.

A top down approach is essential to a successful cybersecurity strategy – starting by protecting the company’s most sensitive information and most important assets, often held by board members and the c-suite. But to do this, you need your board members to understand the new threat landscape in a working-from-home environment, the importance of managing risk, and how to improve your organisations cybersecurity posture.

In this webinar, you will:

  • Learn how to navigate the increased level of threat your c-suite and board members face in the virtual WFH world
  • Learn how to get the attention of your C-suite and foster a top-down approach
  • Understand Cyber Risk Scorecards and how to use them
  • Get advice on how to win buy-in and budget from the C-suite and Board

>> Log in or complete this short form to register >>

Speakers

James Coker

Reporter, Infosecurity Magazine

Henry Jiang

CISO, Diligent

    Ed Tucker

    CISO, co founder of Email Auth, Byte and Human Firewall

    Lisa Ventura

    Founder, Cyber Security Unity

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Diligent's privacy policy here: https://diligent.com/privacy-policy. Please see Infosecurity Magazine’s privacy policy for additional information.