Security Governance is Legal Resilience. Recent headlines and convictions of high-ranking security leaders for their roles in responding to a cyberattack isn't new, and it isn't over. Recent developments related to cybersecurity disclosures and compliance are redefining what true security governance looks like for companies, as well as for security leaders. Security governance has long been static and confined. With this shift to more real-time measurements and increased compliance cadences, the CISO role, and the risk it assumes, is also evolving. These new challenges require new ways to do security governance. From unifying forensics to reducing the time to validate, measure, and triage, security strategies will lean heavily on well operationalized security tools and processes. 

In this webcast, attendees will walk away understanding:

•  How security leaders can improve security governance for incident response

•  Practical ways to navigate achieving internal alignment while minimizing potential conflicts

•  Examples and characteristics of good security incident response, disclosure, and communication

•  How security process mining aligns security governance to help limit liability 

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
speaker photo
John Morello
CTO & Co-Founder, Gutsy

John holds multiple cybersecurity patents and is an author of NIST SP 800-190, the Container Security Guide. He was the CTO of Twistlock which was bought by Palo Alto Networks. Prior to that, he was the CISO of an S&P 500 global chemical company, spent 14 years at Microsoft where he worked on security technologies in Windows and Azure and consulted on security projects across the DoD, intelligence community, and at the White House.

John graduated summa cum laude from LSU and lives in Baton Rouge with his wife and two sons. A lifelong outdoorsman and NAUI Master Diver and Rescue Diver, he's the former board chair of the Coalition to Restore Coastal Louisiana and current board member of the Coastal Conservation Association.

speaker photo
Richard Halm
Senior Attorney, Clark Hill Law
Richard “Rick” Halm guides clients in preparing for, responding to, recovering, and learning from cybersecurity and privacy incidents. With a passionate information security background, he also advises businesses on the benefits, risks, and necessary governance structures of new technologies such as Artificial Intelligence. He leverages his breadth of cybersecurity knowledge to negotiate contractual provisions related to cybersecurity and advise clients during regulatory investigations.
speaker photo
Tom Bechtold
Digital Events Director, SecureWorld
Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.