CIO | CISO
Senior IT executives need all the help they can get, now more than ever.
Through truly innovative workshops, The Cyber Education Foundation brings those connections to life. This is about learning the greatest lessons; those that are missed in standard tabletop exercises.
How does this benefit IT leadership?
You already lead cross-functional tabletop exercises, which is great. And no doubt the participants all find it to be an enjoyable and worthwhile use of their time.
But…so have all large companies who have suffered a big data breach. And with each, there are major failures that, right or wrong, often get attributed back to the IT executive leadership. CIOs and CISOs can quickly get sidelined, which is usually a sign of more permanent changes to come.
By bringing IT into full focus, we seek to help you change that equation.
When the word comes in that there’s likely been a major security incident, we need to see IT active in all phases. Sure, much of the communication will very likely get labeled as attorney/client privilege, but there’s really so much more that needs to be communicated.
And this is the conflict that needs to be resolved before a breach. Because while IT and Legal groups are in the range of risk averse to risk paranoid, Marketing is going to need to produce something other than dry, rote press releases. And they need IT executives that have the moxy to really drive that home.
Marketing / PR
IT executives must now learn and appreciate the skills and tools that marketing and public relations teams increasingly live and die by.
Tools such as Meltwater, Brandwatch, and Brand24 (to name a few) not only scour social media, legacy media/news, and blogs, but then go on to measure sentiment. Taking that to the next step is understanding how this sentiment impacts your cybersecurity program before, during, and after a breach.
Not to fear, we will show you what this all means to you, personally, as well as the business.
A breach can have a sudden and sustained impact on the morale and productivity of the entire IT team. And this is a team that is seemingly never fully staffed, even during the best of times, right?
Adding to this is that time is our greatest resource. We can always buy more security products, but we can never recover that lost time. So whether it’s through losing people or just simple disengagement, we need to be sure that a breach is a call to action, rather than more lost opportunity. This is why we want you to bring your best HR executives along for the win.
If you can’t make it to one of our events at this time, you’ll want to subscribe to our Academy for ongoing insight from top business leaders.
What you will find with our events is that our sponsors are every bit as special and hand-picked as our attendees. This brings with it a level of professional trust and respect that is almost unheard of, as everyone understands that these are the relationships that can potentially have a truly great impact on your cybersecurity brand/reputation. And it's exactly why we have these sponsors in the room and at the table, rather than sequestered in a vendor hall.
Specifically, as it relates to you, our attendees:
- You will be provided with a simplified e-booklet that clearly articulates the value that each sponsor could potentially bring to your organization. With this we include the direct contact information for each sponsor, so that you, or one of your staff, can quickly and directly get to the right resource the moment you are back in the office and ready to engage.
- Sponsors are not given the personally identifiable information of any of the attendees. Rather, depending on their level of sponsorship, they are provided a list that merely has the company names and titles. The reason for this is simple: sponsors deserve to have a high level view of who they may encounter and you, as a top executive, don't have the time to have a dozen or so follow-up calls. And really, your gatekeepers would likely block access anyway.
What we do encourage and actively promote all the way through is for you to get to know these incredible sponsors, who, in nearly every case, are not merely sending in their sales teams to take the lead, but rather their chief executives and/or their own hand-picked direct delegates. They know how special this group and opportunity is. And of course we want to see them, like you, coming back time and time again.
Finally, each participant is given a simplified card that contains your unique identifier, a list of the sponsors, and a checkbox for those you would like to get in contact with. This includes a space to name someone on your team who should be reached instead of you. We collect those at the end of the day, then do all the work to ensure that the right contact information goes where it should. And most importantly, that everyone is happy and connected in the best way possible.