SANS Cybersecurity Leadership Summit 2022
Speaker: Mark Dunkerley
Many companies may not have a centralized cybersecurity team presence, or they are in their infancy of building a Cybersecurity Program. I have had the opportunity to build and continue to mature a Cybersecurity program from ground up with a new independent Business division created in our company in 2017. Functions that I had the opportunity to develop and enhance include vulnerability management, vendor risk management, identity and access management, security operations, security awareness and training, proactive services, architecture & engineering, regulatory and compliance, governance, risk management, and more. The attendees can expect to get better insight into what is involved in building and maturing each of these functions along with ensuring your cybersecurity program doesn't have any gaps.
View upcoming Summits: sans.org/u/DuS
Download the presentation slides (SANS account required) at sans.org/u/1iaE
- Building a Cybersecurity Program From the Ground Up ( Download)
- Building a Cybersecurity Awareness Program from the Ground Up ( Download)
- How to Build a Cybersecurity Awareness Program from the Ground Up ( Download)
- Building a Cybersecurity Program to meet Compliance, Revenue Growth & Budgets #CISOlife ( Download)
- Building A Security Program From The Ground Up by Jamie MacDonald ( Download)
- How to Build a Cybersecurity Program ( Download)
- A 90-Day Plan to Get Your Cybersecurity Program Started ( Download)
- Building a Cybersecurity Program: Howto ( Download)
- Cybersecurity Career Roadmap EXPOSED for Beginners and Pros ( Download)
- 10 Steps to Build a Successful Cybersecurity Strategy ( Download)
- Building a Cybersecurity Program with the NIST Cybersecurity Framework ( Download)
- How to Build A Great Cybersecurity Program within a Budget ( Download)
- How I Would Learn Cyber Security if I Could Start Over in 2024 (Beginner Roadmap) ( Download)
- How to BUILD a Cybersecurity TEAM! ( Download)
- 8 Mistakes to Avoid When Building a Successful Cybersecurity Program ( Download)