filmov
tv
WHY don't they CARE? #cybersecurity #infosec #CISO #CIO #SecArch

Показать описание
I hear a lot of people in security complain a LOT that nobody listens or takes them seriously. It's like simply because we're in security...
...and SOMEBODY says "security" is important...
...that this situation somehow obligates people to listen to you.
Think again.
Because if you REALLY want to know why nobody cares about security, then here's your answer—courtesy of the giant chair on the beach in Maceió.
If you'd like to start putting this kind of thinking into action, then use the links below as a place to start.
If you liked this video, please hit the Like button, hit subscribe so you don't miss any new content, and feel free to share it with other people you believe need to hear this message.
I'm out to change our industry, but I can't do it alone. Are you willing to help me?
ABOUT THE PROGRAM
The Security Architecture Accelerator™ is a self-paced program consisting of video lessons to help build the critical skills required to transition from infrastructure architect to being able to build a true enterprise security architecture. This program doesn’t try to complete this journey all at once, however. It simply lays the groundwork with practical examples and instruction to start you on the journey.
At the end of this program, you will:
* Understand the roles of the security architect and how they fit into the overall structure of your security program beyond managing the infrastructure
* Articulate how security architecture forms the basis of the effective security program and describe how enterprise security architecture differs from the common practice of security architecture in most organizations today
* Create abstract, conceptual models of the way value is delivered in your organization to achieve specific objectives the business cares about and identify the appropriate mitigation strategies to ensure its success
* Build and maintain your enterprise security architecture using lightweight documentation created by an agile and iterative approach
* Communicate effectively with your security customers in their language to give them the level of confidence they require that they’ll get what they want
* Effectively support secure project delivery by building the right models at the right time to ensure security requirements are identified and implemented
* Measure the value of your security architecture in business terms to demonstrate to your security customers how security helps them achieve their goals and objectives
The full program outline includes:
PART 1: Understanding Security Architecture
Lesson 0: Introduction
Lesson 1: Clarifying the Role of "Security Architecture"
Lesson 2: Getting Clear about Security Architecture
Lesson 3: Connecting Architecture to the Organization
Lesson 4: Getting from Implementation to Architecture
Lesson 5: True Security
Lesson 6: Understanding Risk
Lesson 7: Designing for Resilience
PART 2: Building Security Architecture
Lesson 8: Identifying Your Architecture Customers
Lesson 9: Creating Your Security Strategy
Lesson 10: Creating Your Enterprise Security Architecture
Lesson 11: Creating Your Security Capabilities
Lesson 12: Supporting Project Delivery
Lesson 13: Demonstrating the Value of Security
Lesson 14: Strategies for Security Architecture Success
Lesson 15: Next Steps
...and SOMEBODY says "security" is important...
...that this situation somehow obligates people to listen to you.
Think again.
Because if you REALLY want to know why nobody cares about security, then here's your answer—courtesy of the giant chair on the beach in Maceió.
If you'd like to start putting this kind of thinking into action, then use the links below as a place to start.
If you liked this video, please hit the Like button, hit subscribe so you don't miss any new content, and feel free to share it with other people you believe need to hear this message.
I'm out to change our industry, but I can't do it alone. Are you willing to help me?
ABOUT THE PROGRAM
The Security Architecture Accelerator™ is a self-paced program consisting of video lessons to help build the critical skills required to transition from infrastructure architect to being able to build a true enterprise security architecture. This program doesn’t try to complete this journey all at once, however. It simply lays the groundwork with practical examples and instruction to start you on the journey.
At the end of this program, you will:
* Understand the roles of the security architect and how they fit into the overall structure of your security program beyond managing the infrastructure
* Articulate how security architecture forms the basis of the effective security program and describe how enterprise security architecture differs from the common practice of security architecture in most organizations today
* Create abstract, conceptual models of the way value is delivered in your organization to achieve specific objectives the business cares about and identify the appropriate mitigation strategies to ensure its success
* Build and maintain your enterprise security architecture using lightweight documentation created by an agile and iterative approach
* Communicate effectively with your security customers in their language to give them the level of confidence they require that they’ll get what they want
* Effectively support secure project delivery by building the right models at the right time to ensure security requirements are identified and implemented
* Measure the value of your security architecture in business terms to demonstrate to your security customers how security helps them achieve their goals and objectives
The full program outline includes:
PART 1: Understanding Security Architecture
Lesson 0: Introduction
Lesson 1: Clarifying the Role of "Security Architecture"
Lesson 2: Getting Clear about Security Architecture
Lesson 3: Connecting Architecture to the Organization
Lesson 4: Getting from Implementation to Architecture
Lesson 5: True Security
Lesson 6: Understanding Risk
Lesson 7: Designing for Resilience
PART 2: Building Security Architecture
Lesson 8: Identifying Your Architecture Customers
Lesson 9: Creating Your Security Strategy
Lesson 10: Creating Your Enterprise Security Architecture
Lesson 11: Creating Your Security Capabilities
Lesson 12: Supporting Project Delivery
Lesson 13: Demonstrating the Value of Security
Lesson 14: Strategies for Security Architecture Success
Lesson 15: Next Steps