Establishing a Cybersecurity Program Office
Most cybersecurity programs have a number of required and desired initiatives as well as a backlog of maintenance projects. Identifying and achieving a target state is challenging – especially coupled with inefficient investment and scarce resources. In this webinar, we will discuss how to:
- Assess and define current capabilities, effectiveness and maturity to create a desired end-state and achieve your cybersecurity goals
- Identify the impacts of the security talent gap on your security functions
- Promote a security-first culture of continuous improvement and establish a long-term sustainability model
J. C. (Cal) Slemp III. Cal is a Managing Director responsible for both Protiviti’s global delivery and development of service offerings related to information security and privacy programs. This specifically includes directing our work in program governance and control assessments, improvement strategies and deployment architecture and communicating security status and goals effectively to operational and Board audiences. Cal has over 30 years of experience working with clients of all sizes in a wide variety of industries providing a broad array of information security and risk management services. His expertise includes developing and evaluating comprehensive information security strategies and programs, data privacy and compliance program design and assessments, incident response planning and execution, and security architecture services.
Andrew Retrum is a Managing Director and business-oriented leader within Protiviti’s Technology Consulting Practice. He is part of Protiviti’s Global Cybersecurity Leadership team and the National Financial Services Security & Privacy Practice Lead . Andrew’s professional aspiration is to lead their talented practice in delivering true value by helping our clients better understand, communicate, and manage the evolving Cyber Threat landscape. Andrew has given lectures at numerous universities on the topics of IT Governance, Security, and Privacy.