The Changing Role of the CISO: Balancing the Competing Requirements of IT, Security, Innovation & Compliance to Optimize Business Performance & Shareholder Value

  • Date 14th November 2018 (Wednesday)

The Changing Role of the CISO: Balancing the Competing Requirements of IT, Security, Innovation & Compliance to Optimize Business Performance & Shareholder Value

14 Nov 2018, 16:20 - 17:00

Keynote Stage
Language:
English
  • The evolving reporting structure: CIO, CRO, CDO, CFO or CEO, where does the CISO sit and should they become a BISO?
  • Speaking geek and business - employing technical and business management and leadership skills
  • When and how to address the board and function as part of the senior management team as business liaison and security evangelist
  • Quantifying what the CISO is accountable for, ensuring roles and responsibilities are clear

 

CLICK HERE TO ADD TO YOUR CALENDAR

Contributors

  • Martin Gomberg

    Moderator

    Author, CISO Redefined

    CISO Redefined

    Martin Gomberg, Cyberite founder and executive advisor is the author of CISO REDEFINED: Thoughts on Leadership, Business Protection and the Chief...

  • Bernadette Gleason

    Panellist

    VP BISO

    Citi

    Bernadette Gleason has worked in the financial services field for over 20 years and has held positions as an Information Security Officer, Senior...

  • Randle Henry

    Panellist

    Former CISO, Hewlett Packard

    Consultant, Tevora

    Randle A. Henry is the NYC based lead Security Consultant for Tevora. Randle is responsible for Tevora’s new NYC office portfolio focusing on the...

  • Derek Vadala

    Panellist

    Global Head of Cyber Risk Group

    Moody's

    Derek Vadala is the Global Head of Cyber Risk Group for Moody’s Corporation in New York with over 15 years of IT and security management experience....

  • Ben Harris

    Panellist

    VP of Policy/Compliance & CISO

    Rakuten Marketing

    Ben Harris is an experienced information security leader with a proven ability to build an innovative and effective information security program from...

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.