Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

How to Present Cyber Security Risk to Senior Leadership | SANS Webcast

Автор: SANS Institute

Загружено: 2020-07-27

Просмотров: 94688

Описание:

In an age when data breaches are a daily occurrence, senior leadership teams and boards of directors want assurances that their cyber security programs are doing what is required to defend their organization. But at the same time security teams are struggling to quantify risk or find effective strategies for presenting risk to leadership in a way that clearly communicates the reality of the risk an organization is accepting. Even security professionals are struggling to agree how to define or measure risk effectively.

In this presentation, James Tarala will share lessons learned from research into risk management and his experiences communicating about risk to boards of directors and C-Suite leadership teams. He will present specific strategies to consider when measuring risk, communicating risk, and helping security teams realistically setting expectations with business stakeholders. While this topic traditionally has been a nebulous, vague conversation, in this presentation, listeners will learn actionable steps to communicating risk in more effective ways.

Speaker Bio

James Tarala is a principal consultant with Enclave Security based out of Venice, Florida, and a SANS Senior Instructor. As a consultant, he has spent the past several years designing large enterprise security and infrastructure architectures, helping organizations to perform security assessments, and communicating enterprise risk to senior leadership teams. He is the author and an instructor for SEC566: Implementing and Auditing the Critical Security Controls, SEC440: Critical Security Controls: Planning, Implementing, and Auditing, and a co-author and instructor for MGT415: A Practical Introduction to Cyber Security Risk Management.
Read James’s full bio at https://www.sans.org/profiles/james-t...

About SANS

SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.

How to Present Cyber Security Risk to Senior Leadership | SANS Webcast

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#6499 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "MqOsxxASdlI" ["related_video_title"]=> string(34) "Top Five Trends in CISO Leadership" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(14) "SANS Institute" } [1]=> object(stdClass)#6472 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "gIsLP_Dtv7M" ["related_video_title"]=> string(91) "Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019" ["posted_time"]=> string(19) "5 лет назад" ["channelName"]=> string(14) "SANS Institute" } [2]=> object(stdClass)#6497 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "3xUC5xhLshw" ["related_video_title"]=> string(56) "Cyber Risk Management: Essentials for the Practical CISO" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(14) "SANS Institute" } [3]=> object(stdClass)#6504 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "5sFOdpMLXQg" ["related_video_title"]=> string(38) "SANS Webcast - Zero Trust Architecture" ["posted_time"]=> string(19) "6 лет назад" ["channelName"]=> string(14) "SANS Institute" } [4]=> object(stdClass)#6483 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "jq_LZ1RFPfU" ["related_video_title"]=> string(72) "Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(14) "IBM Technology" } [5]=> object(stdClass)#6501 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "blWdjRUPP6E" ["related_video_title"]=> string(72) "Разведчик о том, как использовать людей" ["posted_time"]=> string(25) "2 недели назад" ["channelName"]=> string(18) "Коллектив" } [6]=> object(stdClass)#6496 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "bjrnU6FLx7U" ["related_video_title"]=> string(158) "Михаил Крутихин: затяжная война, цены на нефть и может ли Иран получить ядерное оружие?" ["posted_time"]=> string(23) "5 часов назад" ["channelName"]=> string(24) "BILD на русском" } [7]=> object(stdClass)#6506 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "2N5SNKloEv0" ["related_video_title"]=> string(82) "The 20 Critical Security Controls: From Framework to Operational to Implementation" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> string(14) "SANS Institute" } [8]=> object(stdClass)#6482 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "nec3aZM8aUY" ["related_video_title"]=> string(83) "Deep House Mix 2024 | Deep House, Vocal House, Nu Disco, Chillout Mix by Diamond #3" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(7) "Diamond" } [9]=> object(stdClass)#6500 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "Ejui6AxVzqg" ["related_video_title"]=> string(96) "Cybersecurity Interview Questions And Answers | Cybersecurity Interview Prep | Invensis Learning" ["posted_time"]=> string(21) "3 года назад" ["channelName"]=> string(17) "Invensis Learning" } }
Top Five Trends in CISO Leadership

Top Five Trends in CISO Leadership

Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019

Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019

Cyber Risk Management: Essentials for the Practical CISO

Cyber Risk Management: Essentials for the Practical CISO

SANS Webcast - Zero Trust Architecture

SANS Webcast - Zero Trust Architecture

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Разведчик о том, как использовать людей

Разведчик о том, как использовать людей

Михаил Крутихин: затяжная война, цены на нефть и может ли Иран получить ядерное оружие?

Михаил Крутихин: затяжная война, цены на нефть и может ли Иран получить ядерное оружие?

The 20 Critical Security Controls: From Framework to Operational to Implementation

The 20 Critical Security Controls: From Framework to Operational to Implementation

Deep House Mix 2024 | Deep House, Vocal House, Nu Disco, Chillout Mix by Diamond #3

Deep House Mix 2024 | Deep House, Vocal House, Nu Disco, Chillout Mix by Diamond #3

Cybersecurity Interview Questions And Answers | Cybersecurity Interview Prep | Invensis Learning

Cybersecurity Interview Questions And Answers | Cybersecurity Interview Prep | Invensis Learning

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]