Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

11:30 AM
Dark Reading
Dark Reading
Products and Releases

SANS to Debut CISO Hot Topic Series at Scottsdale 2016 Cybersecurity Training Event

Will Share How to Effectively Communicate to and Influence CEOs and Boards of Directors.

Bethesda, MD – December 9, 2015 – SANS Institute, the global leader in information security training, today announced the CISO Hot Topic Series which will debut at the SANS Scottsdale 2016 training event taking place February 8 -  13, 2016. To kick off this continuing series of CISO Hot Topic sessions, SANS will present a half-day session offering real world advice and What Works examples. The goal of this session is teach CISOs how to take advantage of opportunities to interact with top management in ways that lead to increases in the effectiveness of their organization’s security program.

“When a CISO gets the opportunity to brief the Board of Directors, it all too often turns into a 'What happens when the dog actually does catch the car' scenario," said John Pescatore, SANS Director of Emerging Security Trends. “CISOs need to understand what is important to Boards and how to get strategic points across to leverage time with the Board into meaningful increases in security. The CISO Hot Topic Series was developed to help answer these types of question.”

This debut session, How to Effectively Communicate to and Influence CEOs and Boards of Directors, will be presented by SANS’ Founder and Research Director, Alan Paller alongside SANS’ Director of Emerging Security Trends, John Pescatore. This CISO Hot Topic session will be held on February 9th in conjunction with SANS Scottsdale.

The SANS Scottsdale training event brings together world-class security experts who will share their knowledge and techniques for addressing today’s most complex cybersecurity issues. Included among the hands-on, immersion courses offered at SANS Scottsdale are SEC560: Network Penetration Testing and Ethical Hacking, SEC501: Advanced Security Essentials - Enterprise Defender, and MGT514: IT Security Strategic Planning, Policy and Leadership and more.

For a complete list of courses and instructors, or to register for SANS Scottsdale 2016, please visit: www.sans.org/u/aTV

About SANS Institute

The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted and, by far, the largest provider of cyber security training and certification to professionals at governments and commercial institutions world-wide. Renowned SANS instructors teach over 50 different courses at more than 200 live cyber security training events as well as online. GIAC, an affiliate of the SANS Institute, validates employee qualifications via 27 hands-on, technical certifications in information security. The SANS Technology Institute, a regionally accredited independent subsidiary, offers master's degrees in cyber security. SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; it also operates the Internet's early warning system--the Internet Storm Center. At the heart of SANS are the many security practitioners, representing varied global organizations from corporations to universities, working together to help the entire information security community. (www.SANS.org)


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-21
Magento-lts is a long-term support alternative to Magento Community Edition (CE). A vulnerability in magento-lts versions before 19.4.13 and 20.0.9 potentially allows an administrator unauthorized access to restricted resources. This is a backport of CVE-2021-21024. The vulnerability is patched in v...
PUBLISHED: 2021-04-21
Magento-lts is a long-term support alternative to Magento Community Edition (CE). In magento-lts versions 19.4.12 and prior and 20.0.8 and prior, there is a vulnerability caused by the unsecured deserialization of an object. A patch in versions 19.4.13 and 20.0.9 was back ported from Zend Framework ...
PUBLISHED: 2021-04-21
Wikimedia Quarry analytics-quarry-web before 2020-12-15 allows Reflected XSS because app.py does not explicitly set the application/json content type.
PUBLISHED: 2021-04-21
The ABUS Secvest wireless alarm system FUAA50000 (v3.01.17) fails to properly authenticate some requests to its built-in HTTPS interface. Someone can use this vulnerability to obtain sensitive information from the system, such as usernames and passwords. This information can then be used to reconfig...
PUBLISHED: 2021-04-21
Authelia is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. In versions 4.27.4 and earlier, utilizing a HTTP query parameter an attacker is able to redirect users from the web application to any...