SlideShare a Scribd company logo
Connector Events
See the Big Picture
IANS Connector Events bring together small groups of
senior-level information security professionals from a
broad spectrum of industries and experiences for
facilitated deep-dive discussions of important challenges
and solutions in the information security space.
Your community is a resource: through intimate peer-to-
peer conversations around common issues, solutions,
and suggestions for improvement, you’ll gain insight into
varying perspectives and develop new ideas to accelerate
your problem-solving efforts.
Most business leaders view information
security risk as separate from business
risk. Why? And how can we change this?
IANS’ research into CISO Impact shows that business
leaders often view information security risk as separate
from other classes of risk they manage. As a result,
security teams are chronically under-resourced and
under-appreciated. How can we shift the way that
business leaders think and operate?
At a recent event, we posed the question:
“There is still a slight
disconnect between the
P&L owners recognizing
their risks and being able
to afford the smart and
necessary remediations.”
“…systematic
meetings do not
take place.”
Attendees discussed the challenges …
“Current executive
team… does not fully
understand the
importance of managing
business risk as it relates
to security threats”
… and through that discussion, shared
thoughts on how to address the problem.
• Work with C-Level Executives to tie business
leaders’ compensation to ameliorating security risks.
• Create competition among business leaders by
implementing and publishing ‘wall of shame’ metrics
for information security compliance.
• Establish formal information security training,
mandatory for all business leaders and their reports,
with completion tracked and visible to leadership.
At at Connector
Event, you will:
• Gain insight into the challenges and roadblocks
you and your peers share.
• Learn about new and unique approaches to
common issues and topics
• Take away problem-solving ideas that you can
apply in your own organization.

More Related Content

PDF
What is an IANS Connector Event?
PDF
What is an IANS Connector Event? - Factor 3
PDF
IANS Connector Event Deck: Factor 3
PDF
IANS Connector Event Deck: Factor 6
PDF
Where We Are Today – The Current Landscape of Identity Management
PDF
ملتقى 2016 - اليوم الثاني: Systematic Design: Design Thinking Meets System Th...
PPTX
3 Executive Strategies to Reduce Your IT Risk
PDF
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
 
What is an IANS Connector Event?
What is an IANS Connector Event? - Factor 3
IANS Connector Event Deck: Factor 3
IANS Connector Event Deck: Factor 6
Where We Are Today – The Current Landscape of Identity Management
ملتقى 2016 - اليوم الثاني: Systematic Design: Design Thinking Meets System Th...
3 Executive Strategies to Reduce Your IT Risk
RSA Security Brief : Taking Charge of Security in a Hyperconnected World
 

What's hot (20)

PDF
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
PPTX
Are SMBS prepared to mitigate cybersecurity risks?
PDF
White paper cyber risk appetite defining and understanding risk in the moder...
PDF
Risksense: 7 Experts on Threat and Vulnerability Management
PPT
The Perspective of Today's Information Security Leader
PDF
Cybersecurity Goverence for Boards of Directors
PDF
Building Cyber Resilience in the Digital Economy
PPTX
Enterprise Social Governance: Who Owns What and Why
PDF
Iid infoshare exec_summary final
PPT
The Art & Science of Simple Security
PDF
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
PDF
CISO_Paper_Oct27_2015
PPTX
Information architecture for men in kilts slideshare
PPTX
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
PPT
ISSE 2008 Information Security Status
PPT
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
PDF
CISO_Paper_Oct27_2015
PPT
Core Bts Slides 2
PDF
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
PPTX
Risk monitoring and response
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
Are SMBS prepared to mitigate cybersecurity risks?
White paper cyber risk appetite defining and understanding risk in the moder...
Risksense: 7 Experts on Threat and Vulnerability Management
The Perspective of Today's Information Security Leader
Cybersecurity Goverence for Boards of Directors
Building Cyber Resilience in the Digital Economy
Enterprise Social Governance: Who Owns What and Why
Iid infoshare exec_summary final
The Art & Science of Simple Security
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
CISO_Paper_Oct27_2015
Information architecture for men in kilts slideshare
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
ISSE 2008 Information Security Status
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
CISO_Paper_Oct27_2015
Core Bts Slides 2
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
Risk monitoring and response
Ad

Viewers also liked (6)

PDF
IANS 2015 RSA Presentation
PPTX
Packets, routers and ip addresses
PDF
CHPROTFOLIO comp NEW
PDF
IANS Connector Event Deck: Factor 4
PDF
The 7 Factors of CISO Impact
PPTX
Bearing
IANS 2015 RSA Presentation
Packets, routers and ip addresses
CHPROTFOLIO comp NEW
IANS Connector Event Deck: Factor 4
The 7 Factors of CISO Impact
Bearing
Ad

Similar to IANS Connector Event Deck: Factor 2 (20)

PDF
What is an IANS Connector Event? - Factor 1
PDF
What is an IANS Connector Event? - Factor 6
PDF
IANS Connector Event Deck: Factor 5
PDF
What is an IANS Connector Event? - Factor 5
PDF
2015 IANS Decision Support Overview (1)
DOCX
Chapter 1The International Information Systems Security Certifi.docx
PDF
Transforming Information Security: Designing a State-of-the-Art Extended Team
 
PDF
A to Z of Information Security Management
PDF
India security conclave brochure 2016
PDF
SBIC Report : Transforming Information Security: Future-Proofing Processes
 
PDF
A Major Revision of the CISRCP Program
PPTX
The Gathering Storm
PPTX
D1 security and risk management v1.62
PPTX
Information System Audit and Control
PPTX
Keynote @ ECMECC School Security Summit
PDF
Connection can help keep your business secure!
PPTX
Current enterprise information security measures continue to fail us. Why is ...
PDF
The meaning of security in the 21st century
PPTX
Dancyrityshy 1foundatioieh
PPTX
ISMS End-User Training Presentation.pptx
What is an IANS Connector Event? - Factor 1
What is an IANS Connector Event? - Factor 6
IANS Connector Event Deck: Factor 5
What is an IANS Connector Event? - Factor 5
2015 IANS Decision Support Overview (1)
Chapter 1The International Information Systems Security Certifi.docx
Transforming Information Security: Designing a State-of-the-Art Extended Team
 
A to Z of Information Security Management
India security conclave brochure 2016
SBIC Report : Transforming Information Security: Future-Proofing Processes
 
A Major Revision of the CISRCP Program
The Gathering Storm
D1 security and risk management v1.62
Information System Audit and Control
Keynote @ ECMECC School Security Summit
Connection can help keep your business secure!
Current enterprise information security measures continue to fail us. Why is ...
The meaning of security in the 21st century
Dancyrityshy 1foundatioieh
ISMS End-User Training Presentation.pptx

Recently uploaded (20)

PPTX
innovation process that make everything different.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
artificial intelligence overview of it and more
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPT
tcp ip networks nd ip layering assotred slides
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PPTX
E -tech empowerment technologies PowerPoint
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
innovation process that make everything different.pptx
presentation_pfe-universite-molay-seltan.pptx
artificial intelligence overview of it and more
Sims 4 Historia para lo sims 4 para jugar
Power Point - Lesson 3_2.pptx grad school presentation
Tenda Login Guide: Access Your Router in 5 Easy Steps
The New Creative Director: How AI Tools for Social Media Content Creation Are...
tcp ip networks nd ip layering assotred slides
522797556-Unit-2-Temperature-measurement-1-1.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
introduction about ICD -10 & ICD-11 ppt.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Paper PDF World Game (s) Great Redesign.pdf
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
E -tech empowerment technologies PowerPoint
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Cloud-Scale Log Monitoring _ Datadog.pdf
international classification of diseases ICD-10 review PPT.pptx
PptxGenJS_Demo_Chart_20250317130215833.pptx

IANS Connector Event Deck: Factor 2

  • 2. See the Big Picture IANS Connector Events bring together small groups of senior-level information security professionals from a broad spectrum of industries and experiences for facilitated deep-dive discussions of important challenges and solutions in the information security space. Your community is a resource: through intimate peer-to- peer conversations around common issues, solutions, and suggestions for improvement, you’ll gain insight into varying perspectives and develop new ideas to accelerate your problem-solving efforts.
  • 3. Most business leaders view information security risk as separate from business risk. Why? And how can we change this? IANS’ research into CISO Impact shows that business leaders often view information security risk as separate from other classes of risk they manage. As a result, security teams are chronically under-resourced and under-appreciated. How can we shift the way that business leaders think and operate? At a recent event, we posed the question:
  • 4. “There is still a slight disconnect between the P&L owners recognizing their risks and being able to afford the smart and necessary remediations.” “…systematic meetings do not take place.” Attendees discussed the challenges … “Current executive team… does not fully understand the importance of managing business risk as it relates to security threats”
  • 5. … and through that discussion, shared thoughts on how to address the problem. • Work with C-Level Executives to tie business leaders’ compensation to ameliorating security risks. • Create competition among business leaders by implementing and publishing ‘wall of shame’ metrics for information security compliance. • Establish formal information security training, mandatory for all business leaders and their reports, with completion tracked and visible to leadership.
  • 6. At at Connector Event, you will: • Gain insight into the challenges and roadblocks you and your peers share. • Learn about new and unique approaches to common issues and topics • Take away problem-solving ideas that you can apply in your own organization.