SC Magazine 20/20: The better CSO

Share this article:
Top 10 Ways to Ensure Your Security Operation Center Fails
Top 10 Ways to Ensure Your Security Operation Center Fails

SC Magazine is pleased to introduce SC Magazine 20/20, a unique webcast series associated with its 20th Anniversary issue. The free webcast series features a member of the SC Magazine editorial team sitting down with various industry thought leaders to discuss the past, present and future of IT security.

The better CSO

Date: Wednesday, Jan. 13, 2010
Time: 2:00 p.m. ET/11:00 a.m. PT

Click here to listen to this webcast on demand for free.

What does it take to be a strong CSO with a voice, budget, support and resources - especially as cyberthreats continue to evolve and corporate budgets still are tight? What training is necessary and what professional traits will go a long way? With whom should the CSO make alliances and what departments will be integral to making information security work for the entire organization? What does it mean to "get it right" as a successful CSO? We find out.

Featured speakers
Illena Armstrong, editor in chief, SC Magazine
Hugh Njemanze, CTO and EVP of Research and Development, ArcSight

Sponsored by

Share this article:

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Make It Stop! Protecting Corporate Data Assets Against Breach

SCMagazine's 2014 Data Breach Survey shows companies are taking steps to raise security awareness and investing in IT security and risk management practices but given the number of breaches and other high profile cyber crimes that have occurred more recently, are they doing enough?

Compliance gets you on the road to security

Today there is a veritable alphabet soup of data security standards and laws governing how companies must operate. But, most agree, compliance is more of a first step to security rather than an assurance of security itself.

Battling savvy cyber thieves

The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data have enlisted surreptitious ways to achieve their ends.