IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

IT Pro Live: Influencing to win

Greg van der Gaast explains why CISOs need to get better at taking charge

One of the largest challenges security leaders face is not technology, process, or budget. It’s actually a lack of influence and authority. It’s something often lamented by security professionals, but rarely do we actually do anything about it. In this presentation we will look at ways to engage and build relationships with management, stakeholders, and end-users alike in order to gain the traction we need to deliver effective assurance no matter the situation or goal. It comes down to one simple thing: Becoming someone worth listening to.

Greg van der Gaast

Head of cyber security, University of Salford

Starting as one of the most notorious hackers of the 1990’s having been involved in the largest mass hack of the time and setting off an international incident after hacking into a nuclear weapons facility, Greg has over two decades of technical, management, and leadership experience in Information Security.

He is currently the Head of Information Security at the University of Salford, a freelance security strategy advisor, guest lecturer, mentor, trainer and creator of the UoS Information Security Leadership course. He is also the author of the InfoSec Leadership Series; Rethinking InfoSec, Influencing InfoSec, and Structuring InfoSec.

Recommended

What is phishing?
phishing

What is phishing?

29 Apr 2022
Enabling the future of work with embedded real-time communication
Whitepaper

Enabling the future of work with embedded real-time communication

26 Apr 2022
LTE vs 5G: What's the difference?
Network & Internet

LTE vs 5G: What's the difference?

22 Apr 2022
What is 5G and how far are we from rollout?
Mobile

What is 5G and how far are we from rollout?

25 Mar 2022

Most Popular

FCC commissioner urges Apple and Google to remove TikTok from app stores
data protection

FCC commissioner urges Apple and Google to remove TikTok from app stores

29 Jun 2022
LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Former Uber security chief to face fraud charges over hack coverup
data breaches

Former Uber security chief to face fraud charges over hack coverup

29 Jun 2022
Open source giant Red Hat joins HPE GreenLake ecosystem
automation

Open source giant Red Hat joins HPE GreenLake ecosystem

28 Jun 2022