SlideShare a Scribd company logo
Connector Events
See the Big Picture
IANS Connector Events bring together small groups of
senior-level information security professionals from a
broad spectrum of industries and experiences for
facilitated deep-dive discussions of important challenges
and solutions in the information security space.
Your community is a resource: through intimate peer-to-
peer conversations around common issues, solutions,
and suggestions for improvement, youโ€™ll gain insight into
varying perspectives and develop new ideas to accelerate
your problem-solving efforts.
How can you embed information security
risk assessment into key processes?
IANSโ€™ research shows that CISOs and their teams
typically donโ€™t have a large role in enterprise risk
decisions โ€“ and when information security isnโ€™t involved
in decisions early on, the team is often forced to work
much harder, but may achieve much less. How can you
ensure that security is asked for input when your
company deploys new software, commits to new
vendors, launches new product initiatives, and
considers mergers and acquisitions?
At a recent event, we posed the question:
โ€œCurrently security is an after
thought - it is not incorporated up
front in the business process.
Security is perceived as a road
block in most instances, also
development teams seem to think
they have security expertise within
their group.โ€
โ€œWe have an engagement
process but there are
other factors in the "way
we approve" initiatives that
sometimes leaves us in
the dark.โ€
Attendees discussed the challenges โ€ฆ
โ€œโ€ฆ we have limited
Infosec personnel to
actively review for
risk.โ€
โ€ฆ and through that discussion, shared
thoughts on how to address the problem.
โ€ข Work with executive leaders to gain support for
requiring risk evaluations for key projects.
โ€ข Establish agreements with Finance and Legal that
compel assessment of new vendors before contracts
โ€ข If development is done in-house, institute app-level
penetration testing, training for developers, and
secure coding guidelines.
At at Connector
Event, you will:
โ€ข Gain insight into the challenges and roadblocks
you and your peers share.
โ€ข Learn about new and unique approaches to
common issues and topics
โ€ข Take away problem-solving ideas that you can
apply in your own organization.

More Related Content

PDF
What is an IANS Connector Event? - Factor 3
ย 
PDF
What is an IANS Connector Event?
PDF
IANS Connector Event Deck: Factor 2
PDF
What is an IANS Connector Event? - Factor 6
ย 
PDF
IANS Connector Event Deck: Factor 5
PDF
What is an IANS Connector Event? - Factor 5
ย 
PPTX
Helen Patton - Cross-Industry Collaboration
PPTX
Bill Lisse - Communicating Security Across the C-Suite
What is an IANS Connector Event? - Factor 3
ย 
What is an IANS Connector Event?
IANS Connector Event Deck: Factor 2
What is an IANS Connector Event? - Factor 6
ย 
IANS Connector Event Deck: Factor 5
What is an IANS Connector Event? - Factor 5
ย 
Helen Patton - Cross-Industry Collaboration
Bill Lisse - Communicating Security Across the C-Suite

What's hot (20)

PPTX
Tre Smith - From Decision to Implementation: Who's On First?
PPTX
Keith Fricke - CISO for an Hour
PPTX
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
PDF
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
PPT
How International Startups Leverage Networks In Their Own Backyard Nasscom Fr...
PPTX
March 2014 aceds portfolio c&g kroll webinar
PPSX
Gescompanies 11
PDF
Iid infoshare exec_summary final
PDF
Big data security in the cloud: Buzzword Bingo!
PPT
How to Connect Your Server Room to the Board Room โ€“ Before a Data Breach Occurs
PPT
The Art & Science of Simple Security
PPTX
The Data-Driven Transformation of the Distribution Utility
PDF
Elastic's recommendation on keeping services up and running with real-time vi...
PDF
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
PPTX
TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Sum...
ย 
PDF
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
PPT
Liability the next show stopper
PDF
Nailing Jello To The Wall
PPT
Strategies for cyber resilience - Everyone has a Role
PPTX
Corporate Governance And Cloud Computing
Tre Smith - From Decision to Implementation: Who's On First?
Keith Fricke - CISO for an Hour
Chris Clymer & Jack Nichelson - How to Secure Things & Influence People: 10 C...
Tunnel Vision Is Hurting Your Security: Time to See the Forest for the Trees
How International Startups Leverage Networks In Their Own Backyard Nasscom Fr...
March 2014 aceds portfolio c&g kroll webinar
Gescompanies 11
Iid infoshare exec_summary final
Big data security in the cloud: Buzzword Bingo!
How to Connect Your Server Room to the Board Room โ€“ Before a Data Breach Occurs
The Art & Science of Simple Security
The Data-Driven Transformation of the Distribution Utility
Elastic's recommendation on keeping services up and running with real-time vi...
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
TEC/W. Capra Cyber Security and Risk Management Roundtable - January 2016 Sum...
ย 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
Liability the next show stopper
Nailing Jello To The Wall
Strategies for cyber resilience - Everyone has a Role
Corporate Governance And Cloud Computing
Ad

Viewers also liked (7)

PPTX
Packets, routers and ip addresses
PDF
CHPROTFOLIO comp NEW
PDF
IANS Connector Event Deck: Factor 4
PDF
IANS Connector Event Deck: Factor 6
PDF
IANS 2015 RSA Presentation
PDF
The 7 Factors of CISO Impact
PPTX
Bearing
ย 
Packets, routers and ip addresses
CHPROTFOLIO comp NEW
IANS Connector Event Deck: Factor 4
IANS Connector Event Deck: Factor 6
IANS 2015 RSA Presentation
The 7 Factors of CISO Impact
Bearing
ย 
Ad

Similar to IANS Connector Event Deck: Factor 3 (20)

PDF
What is an IANS Connector Event? - Factor 1
ย 
PPSX
Meraj Ahmad - Information security in a borderless world
PPTX
5 Ways to Reduce 3rd Party Developer Risk
PDF
Improving Cyber Security Literacy in Boards & Executives
PPTX
Automation of Information (Cyber) Security by Joe Hessmiller
PPTX
Reduce Third Party Developer Risks
PDF
New technologies - Amer Haza'a
PPT
Does IT Security Matter?
PDF
SBIC Report : Transforming Information Security: Future-Proofing Processes
ย 
PDF
Top 10 IT Security Issues 2011
PPTX
Automation of Information (Cyber) Security
PPTX
Comprehensive risk management for a cyber secure organization
PDF
Security Program Guidance and Establishing a Culture of Security
PDF
Infosec russia cnemeth_v1.2.ppt
PDF
Fdic ffiec cyber_security_assessments
PPTX
People are the biggest risk
ODP
CISSP Week 9
PDF
Connection can help keep your business secure!
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
What is an IANS Connector Event? - Factor 1
ย 
Meraj Ahmad - Information security in a borderless world
5 Ways to Reduce 3rd Party Developer Risk
Improving Cyber Security Literacy in Boards & Executives
Automation of Information (Cyber) Security by Joe Hessmiller
Reduce Third Party Developer Risks
New technologies - Amer Haza'a
Does IT Security Matter?
SBIC Report : Transforming Information Security: Future-Proofing Processes
ย 
Top 10 IT Security Issues 2011
Automation of Information (Cyber) Security
Comprehensive risk management for a cyber secure organization
Security Program Guidance and Establishing a Culture of Security
Infosec russia cnemeth_v1.2.ppt
Fdic ffiec cyber_security_assessments
People are the biggest risk
CISSP Week 9
Connection can help keep your business secure!
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx

Recently uploaded (20)

PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
ย 
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
E -tech empowerment technologies PowerPoint
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
DOCX
Unit-3 cyber security network security of internet system
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
ย 
PPTX
Introduction to Information and Communication Technology
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
An introduction to the IFRS (ISSB) Stndards.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
SAP Ariba Sourcing PPT for learning material
RPKI Status Update, presented by Makito Lay at IDNOG 10
ย 
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
E -tech empowerment technologies PowerPoint
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Module 1 - Cyber Law and Ethics 101.pptx
Unit-3 cyber security network security of internet system
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
international classification of diseases ICD-10 review PPT.pptx
The Internet -By the Numbers, Sri Lanka Edition
ย 
Introduction to Information and Communication Technology
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
Paper PDF World Game (s) Great Redesign.pdf
Introuction about ICD -10 and ICD-11 PPT.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 

IANS Connector Event Deck: Factor 3

  • 2. See the Big Picture IANS Connector Events bring together small groups of senior-level information security professionals from a broad spectrum of industries and experiences for facilitated deep-dive discussions of important challenges and solutions in the information security space. Your community is a resource: through intimate peer-to- peer conversations around common issues, solutions, and suggestions for improvement, youโ€™ll gain insight into varying perspectives and develop new ideas to accelerate your problem-solving efforts.
  • 3. How can you embed information security risk assessment into key processes? IANSโ€™ research shows that CISOs and their teams typically donโ€™t have a large role in enterprise risk decisions โ€“ and when information security isnโ€™t involved in decisions early on, the team is often forced to work much harder, but may achieve much less. How can you ensure that security is asked for input when your company deploys new software, commits to new vendors, launches new product initiatives, and considers mergers and acquisitions? At a recent event, we posed the question:
  • 4. โ€œCurrently security is an after thought - it is not incorporated up front in the business process. Security is perceived as a road block in most instances, also development teams seem to think they have security expertise within their group.โ€ โ€œWe have an engagement process but there are other factors in the "way we approve" initiatives that sometimes leaves us in the dark.โ€ Attendees discussed the challenges โ€ฆ โ€œโ€ฆ we have limited Infosec personnel to actively review for risk.โ€
  • 5. โ€ฆ and through that discussion, shared thoughts on how to address the problem. โ€ข Work with executive leaders to gain support for requiring risk evaluations for key projects. โ€ข Establish agreements with Finance and Legal that compel assessment of new vendors before contracts โ€ข If development is done in-house, institute app-level penetration testing, training for developers, and secure coding guidelines.
  • 6. At at Connector Event, you will: โ€ข Gain insight into the challenges and roadblocks you and your peers share. โ€ข Learn about new and unique approaches to common issues and topics โ€ข Take away problem-solving ideas that you can apply in your own organization.