Episode 6 -Securing Your Crown Jewels: Best Practices for Incident Response, Vulnerability Management, IAM Governance, Disaster Recovery, and Cybersecurity Controls

Episode 6 -Securing Your Crown Jewels: Best Practices for Incident Response, Vulnerability Management, IAM Governance, Disaster Recovery, and Cybersecurity Controls
Event Details
May 23, 2023 11:00 AM - 12:00 PM EST
Event Summary

CyberEdBoard CISO Series

From Ignition to Transformation: A CISO's Guide to Starting Strong and Staying Ahead

The CyberEdBoard CISO Series is a comprehensive 6-part program crafted by some of the leading CISOs in the industry. Whether you are transitioning to a new organization or established in your role, this series offers a unique opportunity to learn from the experts in the field. With a focus on the strategic side of security, the series provides valuable insights to help CISOs effectively balance the needs of the business with the necessary security measures. 

Each episode focuses on a crucial aspect of the CISO role. Our guests are seasoned security experts who share their insights and experiences on topics such as off-boarding and on-boarding, communication and stakeholder relations, governance, building a top-performing cybersecurity team, risk communication and budget management, operationalizing a security program, and securing critical assets. 

This series offers a valuable resource for continuing your professional development and staying ahead of the game. Don't miss out on this opportunity to hear from the best in the industry and take your CISO role to the next level.

Episode 6 -Securing Your Crown Jewels: Best Practices for Incident Response, Vulnerability Management, IAM Governance, Disaster Recovery, and Cybersecurity Controls

In this comprehensive session, we will examine how organizations can ensure the protection of their most valuable assets and safeguard their data in the face of potential threats. From incident response to vulnerability management, identity and access management governance to disaster recovery, we will delve into the crucial aspects of cybersecurity. We will also explore:

·       The criticality of identifying the crown jewels and assess strategies for protecting them.

·       The importance of incorporating security controls throughout the software development life cycle (SSDLC) and best practices for integrating security into the development process.

·       The differences between cloud and on premise security controls, and best practices for securing data in both environments.

 

Members can register in the platform here: https://members.cyberedboard.io/networks/events/36783

A Private Network of Cybersecurity's Most

Influential and Powerful Leaders

Allianz
Amazon
American Express
Barclays
BNP Paribas
Capital One
Citi
Coca Cola
Colgate Palmolive
Cummins
Cushman and Wakefield
Defense Logistics Agency
Equifax
Ericsson
Five Below
GE Healthcare
GlaxoSmithKline
HSBC
Humana
JPMorgan Chase
Little Caesars Pizza
Loreal
Mastercard
Moodys
Morgan Stanley
Motorola Mobility
MUFG
NATO
PayPal
Salesforce
Societe General
Standard Chartered Bank
Wells Fargo