As more and more organizations appoint CISOs and increase investments in IT security, there is a reasonable expectation that threats will be addressed—but how can the success of a security program be measured? And how can security programs be improved? In this information packed session we will share peer benchmark data and tell how veteran CISOs and IT leaders use benchmarking to improve their security programs, demonstrate business value and build executive support for new programs or under-funded initiatives. Many correlations between company demographics and security posture will be provided to help participants compare their business processes and performance metrics to industry norms. In addition, we will examine which factors enhance the effectiveness of security programs and highlight commonalities between companies with above average security grades.
- Know how your IT security program compares against industry norms
- Get benchmark data to build executive support for security
- Learn how other CISOs enhance the effectiveness of security programs
About Sara Gates
Sara Gates is a respected leader in the information security world and well known for her expertise in helping companies move from early to mainstream markets. Sara was previously Vice-President of Identity Management at Sun Microsystems where she helped Sun achieve market leadership in the fast-growing identity management market. Sara came to Sun through the acquisition of Waveset Technologies, where she was responsible for driving product direction and strategy. The idea for Wisegate, where she currently serves as Founder and CEO, had been dawning on her for years and was launched in 2010. Using a crowdsourcing model and advanced algorithms, Wisegate gives senior IT professionals trusted, timely, relevant and affordable access to the most authentic intelligence about their industry: their peers. Because of their positions and levels of responsibility, Wisegate members are often on the forefront of addressing new issues and challenges related to the use of information technology.