As a security professional, you are expected to manage emerging risks and their impact on your organization with limited resources and a lack of process maturity because of it. You know there are many activities you can invest in to help mature your organization’s security function but knowing which ones and when is a challenge in itself.
Join this webinar to learn how a 5-Stage Security Maturity Model can guide you in growing your organization’s security function, built upon best practices and lessons learned from security experts in hundreds of leading enterprises across all industries.
Attendees will learn how to:
- Identify where your organization currently fits along the security maturity model
- Apply the model to determine where and when to invest in additional activities to grow your security function
- Gain best practices from industry leaders on how to manage emerging risks at each stage of the maturity model
CPE credits for ASIS-sponsored webinars will be updated in your user profile within 48 hours of completion. Self-reporting of CPE credits is not required.
Jeff Sieben, CPP, CISSP
Jeff leads the IT Security Council (ITSC) of ASIS, which is made up of members passionate about IT, Security, and Cybersecurity Management. During the day he works in the security industry, and he is focused on solving security industry problems with software. He has consulted to over 250 companies ranging from one-person security teams, to global security teams--guards to CSOs/CISOs--with some of the world's largest organizations. He is currently focused on helping retired law enforcement and retired military members mature in their knowledge of Risk Management in business.
Director, Customer Success
In his 3 years of working at Resolver, Darren has worked directly with Corporate Security leaders around the world to help build out efficient and effective security programs at industry-leading organizations. He is passionate about taking security teams to the next level of maturity by leveraging technology to get the most out of their data and make informed decisions to protect their organization.