Loading Events

Cyber Leaders Unite Presents: A CISO Developed Practical Guide to the Boardroom

June 23, 2022 @ 2:00 pm - 3:00 pm EDT

This briefing is based on the discussion of experiences and practices of a cross-sector task force of CISOs. Practical guidance is provided to CISOs who are new to their roles or their companies. Guidance centers on answers to questions relating to the following topics:

(1) boardroom responsibilities and authority; (2) what board members want to know about the company’s security posture; (3) how board members are evaluating CISOs; (4) how to approach your first board meeting at the company; (5) what CISOs should present; (6) what questions may be asked; (7) how to address security disconnects between senior management and the Board; (8) how to convey bad news; (9) strategies for a successful meeting; (10) how to use the Board meeting to your advantage; and (11) the impact of new regulations on reporting requirements (e.g., SEC).

Sections of the following task force deliverables that will be share during the briefing are:
• A CISO’s Quick Guide to Success in the Boardroom
• Cybersecurity Collaborative Board Presentation Template

Sydney Klein, Chief Information Security and Data Officer, Bristol-Myers Squibbb
Sydney is a cybersecurity leader with over 25 years of experience in the field. She currently serves as CISO and Data Officer at Bristol Myers Squibb. Before that she served as VP, Inofrmation Security Officer at Capital One

Roland Cloutier, Global CISO, TikTok
Global Executive Security, Risk, and Privacy Leader, Strategic Security Visionary, Author, and Board Member. Focused in Critical Infrastructure Cyber and Kinetic Defensive Operations. Expertise in the management of strategic converged security programs and services and the development of global business operations protection programs.

Renee Guttmann, Former CISO, VC Advisor
Renee Guttmann is the former Chief Information Security Officer of Campbell Soup Company, where she was responsible for enhancing and maintaining the information security program to ensure that information assets and associated technology, applications, systems, infrastructure and processes were adequately protected.

Benjamin Corll, VP of Cybersecurity, Coats
Benjamin has been in IT since 1994 when he began his career managing token-ring networks for the US Marine Corps. After shifting to the corporate world in the late 90’s, Mr. Corll has had a constant progression of roles.

Who Can Attend:
Open to anyone.

Target Audience:
Cybersecurity professionals in leadership positions or those looking to enter leadership roles.