Exploit Disruptive Security Trends for 2015

Don’t become a security headline due to something you didn’t know existed.

Onsite Workshop

Failure to evaluate upcoming security trends for the coming year can result in:

  • Increased number of security breaches and frequently becoming the new security headline, which will cause financial and reputational damage.
  • Ad hoc, firefighting style management of information security in the face of new business demands.
  • Losing the faith of the board or management as a trusted security advisor capable of contributing to the overall organizational strategy.

Being a future-oriented security professional will result in:

  • Better preparation for the future, with strong security controls.
  • Lowering your potential risk of a data breach.
  • Becoming a trusted advisor to senior management and the board.

Module 1: What should I be aware of?

The Purpose

  • Make the case on why you should not only be looking forward, but also proactively planning for disruptive security trends.
  • Assess disruptive security trends’ relevance to your organization through stakeholder assessments.

Key Benefits Achieved

  • Identified specific project goals.
  • Determined trend relevance from educated stakeholders.

Activities: Outputs:
1.1 Present disruptive technology trend to business stakeholders.
  • Relevance of the technology trends to the business, as viewed by the business stakeholders.
1.2 Collect their input via a survey.
1.3 Present disruptive security trends (including technology trends, threats, and mitigation tactics) to all IT staff.
  • Relevance of all the security trends, as viewed by the IT and IT security staff.
1.4 Collect their input via a survey.

Module 2: What is relevant to me?

The Purpose

  • Assess current security maturity and capability levels.
  • Identify and prioritize actionable disruptive security opportunities based on trend relevance and company risk profile.
  • Determine security actions specific to each trend.

Key Benefits Achieved

  • Evaluated current security controls and determined future requirements.
  • Prioritized trend-specific actions.

Activities: Outputs:
2.1 Assess your risk profile.
  • Risk profile and security assessment of your organization’s controls.
2.2 Assess current security control capabilities and maturity levels.
  • Prioritization of the security trends, along with specific actions for your organization.
2.3 Prioritize trends, threats, and tactics to properly allocate your time and develop specific actions.

Module 3: How do I communicate this?

The Purpose

  •  Create an action-oriented communication plan to gain stakeholder buy-in.

Key Benefits Achieved

  • Customized communication plan.
  • Gained stakeholder buy-in.

Activities: Outputs:
3.1 Identify goals and objectives for your communication plan.
  • Identified goals and objectives.
3.2 Determine who your stakeholders are and what they need to know.
  • Identified stakeholders and the pertinent information to each audience group.
3.3 Evaluate your communication methods.
  • Set communication plan to raise awareness and gain buy in from your stakeholders.
3.4 Communicate the security issues with your stakeholders.

Workshop icon Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book a Workshop View Blueprint
GET HELP Contact Us
VL Methodology