SC Magazine 20/20: The better CSO

Share this article:
Top 10 Ways to Ensure Your Security Operation Center Fails
Top 10 Ways to Ensure Your Security Operation Center Fails

SC Magazine is pleased to introduce SC Magazine 20/20, a unique webcast series associated with its 20th Anniversary issue. The free webcast series features a member of the SC Magazine editorial team sitting down with various industry thought leaders to discuss the past, present and future of IT security.

The better CSO

Date: Wednesday, Jan. 13, 2010
Time: 2:00 p.m. ET/11:00 a.m. PT

Click here to listen to this webcast on demand for free.

What does it take to be a strong CSO with a voice, budget, support and resources - especially as cyberthreats continue to evolve and corporate budgets still are tight? What training is necessary and what professional traits will go a long way? With whom should the CSO make alliances and what departments will be integral to making information security work for the entire organization? What does it mean to "get it right" as a successful CSO? We find out.

Featured speakers
Illena Armstrong, editor in chief, SC Magazine
Hugh Njemanze, CTO and EVP of Research and Development, ArcSight

Sponsored by




Share this article:
close

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Wanted: Buy-in from the board

As massive breaches occur with more frequency, consumers have become increasingly anxious about just how large retail, financial and other companies with which they're dealing are protecting their personal information.

Unlocking the conundrum of advanced evasion techniques (AETs)

As various industry organizations, such as the Community Emergency Response Team (CERT) in Finland, work with numerous IT security vendors and other experts to figure out the countless vulnerabilities that can allow advanced evasion techniques (AETs) to sneak through networks, organizations plagued by AETs are ...

Make It Stop! Protecting Corporate Data Assets Against Breach

SCMagazine's 2014 Data Breach Survey shows companies are taking steps to raise security awareness and investing in IT security and risk management practices but given the number of breaches and other high profile cyber crimes that have occurred more recently, are they doing enough?