As cyberattacks grow and evolve, so too has the role of the chief information security officer. Fascinating discussion on key trends and challenges.
If you were writing a new job description for the Chief Information Security Officer of your company, what would you say? The job today goes well beyond simply maintaining a secure perimeter around corporate data. And the level of responsibility has moved from the confines of the datacenter all the way to the corporate board room.
In our next episode of Dark Reading radio, we’ll explore the challenges facing the modern CISO and the skills security leaders will need to conquer them -- today and into the future. Our guests are Jon Allen, the assistant vice president and CISO at Baylor University and Owanate Bestman, cyber security executive recruiter at Barclay Simpson.
Allen brings us the perspective of the CISO, starting with his initial IT security job at Baylor in 2003, which he grew from a one-person shop to a much larger, integrated security organization within the university system. Bestman will provide real-world advice about infosec staffing needs and trends from his work as an infosec headhunter advising CISOs, heads of security, and human resource departments. Among the topics we’ll explore:
How the CISO role has changed: what should be in a modern job description
The board room: do CISOs really have a seat at the table and what issues predominate the discussion.
Hiring and staff development: essential skill sets, both soft and technical
The technical toolbox: must know technologies versus ability to learn, think and innovate
Getting the word out: what users, business departments and execs don’t understand about security, and how to educate them.
I hope you'll join our show and offer your insights and opinions to the conversation. But if you missed the event, you can check out the broadcast and live chat from our Dark Reading Radio archives.
About the Author(s)
You May Also Like
Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024