BEGIN:VCALENDAR PRODID:-//Microsoft Corporation//Outlook 16.0 MIMEDIR//EN VERSION:2.0 METHOD:PUBLISH X-MS-OLK-FORCEINSPECTOROPEN:TRUE BEGIN:VTIMEZONE TZID:AUS Eastern Standard Time BEGIN:STANDARD DTSTART:16010401T030000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4 TZOFFSETFROM:+1100 TZOFFSETTO:+1000 END:STANDARD BEGIN:DAYLIGHT DTSTART:16011007T020000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=10 TZOFFSETFROM:+1000 TZOFFSETTO:+1100 END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT CLASS:PUBLIC CREATED:20190228T084909Z DESCRIPTION:Special Guest: The Fine Art of Creating a Cybersecurity Strateg y to Drive Transformation\nJinan Budge \, Principal Analyst Serving Security & Risk Professionals\, Forreste r\n \nAs businesses become more digitized and interconnected\, the impact cyberattacks have on brand value\, customer trust\, and physical safety in creases\, yet many firms still underinvest in security\, considering it a low-level\, compliance-driven function. This session will transfer insigh ts and knowledge on how to transform their security capability into one th at is risk-aligned\, forward-thinking\, and business-enabling. In this se ssion\, we will also discuss how to: 1) create a strategic security progra m\, 2) document that strategy 3) present it to the board to get resources\ , and turn it into transformational outcomes that better protect your firm and its customer. \n DTEND;TZID="AUS Eastern Standard Time":20190305T105500 DTSTAMP:20190228T084909Z DTSTART;TZID="AUS Eastern Standard Time":20190305T101000 LAST-MODIFIED:20190228T084909Z LOCATION:https://www.cisco.com/c/m/en_au/ciscolive/security/index.html PRIORITY:5 SEQUENCE:0 SUMMARY;LANGUAGE=en-au:Special Guest: The Fine Art of Creating a Cybersecur ity Strategy to Drive Transformation TRANSP:OPAQUE UID:040000008200E00074C5B7101A82E00800000000D0EBD9FD8ECFD401000000000000000 010000000F0CA91D8F4AE434BA14773E4BE34CEB1 X-ALT-DESC;FMTTYPE=text/html:< /head>

Special Guest: The Fine Art of Creating a Cybersecurity Strategy to Drive Transformation

Jinan Budge\, Principal Analyst Serving Security &\; Risk Professionals\, Forrest er

 \;

As businesses become more digitized and interconn ected\, the impact cyberattacks have on brand value\, customer trust\, and physical safety increases\, yet many firms still underinvest in security\ , considering it a low-level\, compliance-driven function.  \;This ses sion will transfer insights and knowledge on how to transform their securi ty capability into one that is risk-aligned\, forward-thinking\, and busin ess-enabling. \; In this session\, we will also \;discuss how to: 1) create a strategic security program\, 2) document that strategy 3) pres ent it to the board to get resources\, and turn it into transformational o utcomes that better protect your firm and its customer. \;

X-MICROSOFT-CDO-BUSYSTATUS:BUSY X-MICROSOFT-CDO-IMPORTANCE:1 X-MICROSOFT-DISALLOW-COUNTER:FALSE X-MS-OLK-AUTOFILLLOCATION:FALSE X-MS-OLK-CONFTYPE:0 BEGIN:VALARM TRIGGER:-PT15M ACTION:DISPLAY DESCRIPTION:Reminder END:VALARM END:VEVENT END:VCALENDAR