Video Previewplay

Webinar: Design and Implement a Business-Centric Security Program

  • You need to build a security program that enables business services and secures the technology that makes them possible.
  • Building an effective, business-aligned security program requires that you coordinate many components, including technologies, processes, organizational structures, information flows, and behaviors.
  • The program must prioritize the right capabilities, and support its implementation with clear accountabilities, roles, and responsibilities.

Featured Speakers

Michel Hebert

Research Director, Security & Privacy
Read Bio

Kate Wood

Practice Lead, Security & Privacy
Read Bio

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019