REGISTER Home Registration & Pricing Pricing Info Pre-Conference Training CPE Opportunities Justification Letters Events & Sessions Agenda Exclusive Events Keynotes Bookstore and Book Signing CSA Summit Ambassadors page Student Experience Mentoring Sessions 2019 Sessions Career Center & Career Fair Solutions Theater ISLA Americas Panoply Escape Room Hotel & Travel Hotel & Travel Information Exhibits & Sponsors Sponsors Become a Sponsor Connect About (ISC)2 Failure is Not an Option – Achieving Lasting Success as CISO Two-Day Training Course Description Today’s CISO is a hybrid; part technician; part manager, part leader and part visionary. This two-day interactive training session brought to you by the (ISC)2 Professional Development Institute will: • Explore the people, processes, and technology skills needed to be a successful, “world-class” CISO. • Provide the tools to help CISOs and aspiring CISOs do the job better, cheaper, and faster than the competition. • Introduce the measure, assess, plan (MAP) process for assessing the organization and the information security department’s operational readiness, skill sets, people, processes, and technology.• Address communicating with senior management and your board.• Take a hard look at what to do when things don’t go as planned. Course ObjectivesAfter completing this training, participants will be able to: 1. MAP (measure, asses, plan) themselvesa. Determine the skills they haveb. Define their own personal areas for improvement2. Develop a career road mapa. Assess career possibilitiesb. Assess career opportunities3. Assess an organizationa. Determine the organization's maturityb. Determine the organization's operational readiness4. Assess an information security department, the people in it, and the organization it serves. a. Develop organization-specific tools to accurately determine the capabilities and operational readiness of the departmentb. Create the people, processes, and technology road map for the information security department5. Plan the work and work the plana. Create strategic and tactical plans that work for their information security departmentb. Measure the information security departments progress toward the objectives/milestones detailed in the planc. Differentiate between processes, projects, programs, and realityd. Move from analysis paralysis to action6. Demonstrate why the programs, processes, and projects in place will keep the organization as secure as possible in the world we live in today. a. Move beyond guessing and get down to realityb. Parse the mountains of information coming in and create threat intelligence that is actionable Who Should Attend?If you are a CISO or aspiring to be a CISO this must-attend workshop is for you.Requisite Skills NoneInstructor Gordon Rudd, BBA Finance, MBA, CISSP Title: Authorized (ISC)² InstructorGordon Rudd is a Third-Party Risk Officer at Venminder. Gordon has more than 30 years of experience in the financial services industry in the areas of third-party risk management, technology, information security, enterprise risk management and GRC program development. Gordon works with the Venminder delivery team as a third-party risk management and cybersecurity subject matter expert in residence. Gordon joined Venminder from RCB Bank where he held the position of Vice President, Chief Information Security Officer. Gordon implemented and managed both their cybersecurity program and enterprise risk management program, which included managing internal and external audits and regulatory examinations, creating the vendor management office, and implementing a successful continuous process improvement program. As a results-oriented information security leader, Gordon has proven ability to energize an organization using innovative technical solutions and unique people, process, information, and technology solutions.Gordon founded the CISO Mentoring Project and is an engaged mentor to many aspiring and active CISOs across the country. Gordon is a regular presenter for (ISC)2, an international, nonprofit association for information security leaders, to create and lead educational events, videos, and content for their members. As a recognized expert, Gordon is frequently sought to speak at industry events on information security, GRC and enterprise risk. Gordon received his BBA in Finance from the University of Oklahoma and an MBA from West Texas A&M University. Outlook iCal Google Yahoo! MSN Already Registered?
Course Description
Today’s CISO is a hybrid; part technician; part manager, part leader and part visionary. This two-day interactive training session brought to you by the (ISC)2 Professional Development Institute will:
• Explore the people, processes, and technology skills needed to be a successful, “world-class” CISO. • Provide the tools to help CISOs and aspiring CISOs do the job better, cheaper, and faster than the competition. • Introduce the measure, assess, plan (MAP) process for assessing the organization and the information security department’s operational readiness, skill sets, people, processes, and technology.• Address communicating with senior management and your board.• Take a hard look at what to do when things don’t go as planned.
Course Objectives
After completing this training, participants will be able to:
1. MAP (measure, asses, plan) themselves
a. Determine the skills they haveb. Define their own personal areas for improvement
2. Develop a career road map
a. Assess career possibilitiesb. Assess career opportunities
3. Assess an organization
a. Determine the organization's maturityb. Determine the organization's operational readiness
4. Assess an information security department, the people in it, and the organization it serves.
a. Develop organization-specific tools to accurately determine the capabilities and operational readiness of the departmentb. Create the people, processes, and technology road map for the information security department
5. Plan the work and work the plan
a. Create strategic and tactical plans that work for their information security departmentb. Measure the information security departments progress toward the objectives/milestones detailed in the planc. Differentiate between processes, projects, programs, and realityd. Move from analysis paralysis to action
6. Demonstrate why the programs, processes, and projects in place will keep the organization as secure as possible in the world we live in today.
a. Move beyond guessing and get down to realityb. Parse the mountains of information coming in and create threat intelligence that is actionable
Who Should Attend?
If you are a CISO or aspiring to be a CISO this must-attend workshop is for you.
Requisite Skills
None
Instructor
Gordon Rudd, BBA Finance, MBA, CISSP
Title: Authorized (ISC)² Instructor
Gordon Rudd is a Third-Party Risk Officer at Venminder. Gordon has more than 30 years of experience in the financial services industry in the areas of third-party risk management, technology, information security, enterprise risk management and GRC program development. Gordon works with the Venminder delivery team as a third-party risk management and cybersecurity subject matter expert in residence. Gordon joined Venminder from RCB Bank where he held the position of Vice President, Chief Information Security Officer. Gordon implemented and managed both their cybersecurity program and enterprise risk management program, which included managing internal and external audits and regulatory examinations, creating the vendor management office, and implementing a successful continuous process improvement program. As a results-oriented information security leader, Gordon has proven ability to energize an organization using innovative technical solutions and unique people, process, information, and technology solutions.
Gordon founded the CISO Mentoring Project and is an engaged mentor to many aspiring and active CISOs across the country. Gordon is a regular presenter for (ISC)2, an international, nonprofit association for information security leaders, to create and lead educational events, videos, and content for their members.
As a recognized expert, Gordon is frequently sought to speak at industry events on information security, GRC and enterprise risk. Gordon received his BBA in Finance from the University of Oklahoma and an MBA from West Texas A&M University.