Building a Risk-Driven Information Security Management Program

Building a Risk-Driven Information Security Management Program

An ever-changing threat landscape, intellectual property theft, critical data loss, malware issues the list goes on and on. There are so many repeat security deficiencies and world events like hactivism and cyberwarefare prevalent today that compromise the security and integrity of your business. How can you ensure that your data is protected? How do you decide which controls are relevant to your business and how do you manage those security controls? Where do you start?

In this complimentary technical webinar, you will learn:

  • The process and components of a proactive security program
  • Identifying, analyzing and developing a risk mitigation plan
  • Building the Information Security Management Program
  • Choosing the best security standard
  • Monitoring the Information Security Management Program
  • The top tips for SMBs

Who Will Benefit: 
IT, IT Security, Marketing, and Operations professionals in small to medium size organizations looking to build an information security management program.

Featuring Mark Azzolina
Cybersecurity CISSP
Practice Director, Six Dimensions

Mark Azzolina - Cybersecurity Practice Director

Mark has over 32 years of experience in IT operations management, information security management, security sales and sales management. Mark has held various leadership roles including information systems officer for the US Air Force with assignments at the Pentagon and HQ Space Command and Unisys Defense Systems as well as services sales leader for IBM. Mark has published numerous security articles and white papers and is a Certified Information Systems Security Professional (CISSP) and Information System Security Management Professional (ISSMP).



Building a Risk-Driven Information Security Management Program