2/22/2024 0 Comments Webroot torrent![]() It’s critical to have a strategic roadmap of projects, backed by a risk scorecard that annotates our current state risk baseline.I want to use this data to put together a slide deck that outlining the projects we will work on over the next 36 months, split into two phases. He provided me with some spider graphs, which we used to annotate a security risk scorecard. It’s my responsibility as the senior security executive for Webroot to be familiar with innovative technologies and to look at new possibilities that will provide strategic value to my company.ġ3:41 – Reviewing notes from the meeting with my CISO mentor. It probably goes without saying that as a CISO, I find new technologies fascinating, and I continuously look to improve the security suite I have built for my organization.I’ve followed this start-up for several years, and now that they have funding I want to see what changes they’re making to their platform. They’ve developed technology for a scenario-based testing platform that evaluates and establishes a risk baseline for an organization. I will never know everything, and I can’t expect my team members to be active in the cybersecurity community and grow their professional skills if I don’t do the same.ġ1:54 – I’m meeting with a local cybersecurity start-up for lunch. As a CISO, you must continually challenge yourself to learn about innovative technologies, new cybersecurity skills, or new management skills.As the role of cybersecurity has matured, much of we do is now woven throughout the business, and I believe it’s critical that my team develops the skills it needs to relate to non-technical stakeholders.ġ0:31 – As I put together a 3-year strategic roadmap to help my organization achieve its goals (ISO 27001 and GDPR certification), I seek out another point of view from my CISO mentor. As a CISO, it’s important that I mentor my team and spend time one-on-one with its leaders.I work in a satellite office in San Diego, but I’ll be at headquarters in Colorado in a couple weeks, and I want to plan some team meetings. I want them to have some context about what we will be working on, what security controls we need to mature and I want each of my team members to volunteer to help manage a project with the project manager.Ġ9:46 – Time for a quick meeting with my Deputy. ![]() We’re currently transitioning from one fiscal year to the next, so I want to review with my team what we have budgeted and go over projects that have been funded.I learn that we need to triage an issue with Webroot’s SEIM vendor that prevents Webroot employees from accessing certain URLs.I need to speak with the team about tuning our email gateway to stop flagging certain types of email attachments.Ġ7:27 – After making it to the office, I grab another cup of coffee as I walk to my office to check email and read cybersecurity news articles I’ve flagged.Ġ8:10 – After I finish reading email, I prepare for a meeting with my team at 08:30. As I wait for my coffee, I’m already thinking about my meetings and reading through emails. ![]() I need my venti Pike and a hot morning bun to help me wake-up for the day. Then I check my calendar… it’s going to be a busy day.Ġ6:42 – I pull into Starbucks. As I rise, I check my phone for new emails. Traffic is pretty heavy driving into work, so I have to leave early. Hit the ground runningĠ5:46 – Time to get up. So for anyone who may be curious, here’s what a day in the life of a CISO looks like. A CISO has to be the strategic partner his or her company needs to manage risk. And what better way to demonstrate the many skills the position requires – from the technical to the managerial – than journaling a day’s work. ![]() Over the last couple of years, I’ve written and spoken regularly about the changing roles of the Chief Information Security Officer (CISO).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |