Unlock access to Thinkers360 AI to fast-track your search for analysts and influencers.
This feature is available for Enterprise Lite and Enterprise Members Only.
You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join ourContent Planor become a contributor by posting your own personally-authored content into the system viaAdd PublicationorImport Publication.
Dashboard
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Personal Branding Course
LinkedIn
February 23, 2023
You are the most powerful marketing tool at your disposal. If you are starting a business, establishing your thought leadership, or trying to get ahead in your career, it's a great time to start investing in the brand of you.
Habits of Executive Leadership
LinkedIn
February 22, 2023
There are thousands of books and entire workshops on the high-level strategies of executive leadership. But what about the daily minutiae of leadership? How do you, as an executive leader, balance everything on your shoulders and still stay sane? How do you achieve a balance between quality of life and leading your organization to success? In this course, Aaron Marshall offers 20 manageable and beneficial habits you can build into your life to help you flourish as an executive leader. As the chief operating officer of the Santa Barbara Zoo, Aaron has a long history of managing executive leadership with thoughtfulness and intention. He teaches you habits to keep you grounded and habits to help you stay disciplined, habits for handling your relationships, and habits to become a more discerning thinker. And best of all, these habits can easily be integrated into your life, starting today.
Threat Hunting Essential
LinkedIn
February 19, 2023
Explore the key differences between proactive and reactive cybersecurity strategies as you learn to articulate the value of creating your own threat hunting program. Upon completing this course, you’ll be prepared to leverage some of the most important threat hunting methodologies and frameworks, including anomaly-based hunting, statistical modeling, hypothesis-driven hunting, the threat hunting lifecycle, MITRE ATT&CK, and Cyber Kill Chain.
Misconception of Cybersecurity Program
LinkedIn
February 19, 2023
Cybersecurity is one of the most important—and least talked-about—business issues today. But how can you prepare your organization against the threat of a devastating attack? Join instructor and cybersecurity expert Matthew Rosenquist as he identifies the five biggest mistakes made by cybersecurity organizations, regardless of their size or stature.
Explore the power of learning from others’ mistakes to improve your ability to manage digital risk. Find out what happens with inexperienced leadership, deprioritized strategic thinking, failing to optimize for threats, insufficient organizational teamwork, and failing to maximize value. Matt brings a wealth of cybersecurity knowledge gleaned from over three decades of industry experience, showing you how to manage risk more effectively so you can avoid costly blunders.
Cybersecurity for Startups
LinkedIn
February 19, 2023
The startup world is fun and exciting, but startups are often more vulnerable to cybersecurity attacks than other enterprises. Startups move quickly as they juggle multiple competing priorities, and while cybersecurity should be one of those priorities, many startup founders have no idea where to even start. In this course, Jerod Brennen shares lessons he’s learned from experience in both the enterprise world and the startup world, helping founders and their executive leadership teams better understand how to build an effective cybersecurity program for their startup. Jerod also details the expectations that investors and board members are likely to have, and provides practical advice for anyone in a startup who’s concerned with cybersecurity to get from where they are today to where they want to be, even if they have little to no knowledge of cybersecurity.
Building the Next Generation of Cybersecurity Professionals
LinkedIn
February 18, 2023
Topics include: Discovering hidden potential, dispelling common myths in cybersecurity job applicants, writing foolproof cybersecurity job descriptions, rethinking technical interviews, dealing with unconscious bias, and onboarding new hires for future success. She advises on how to find, hire, and retain first-class cybersecurity talent in a highly competitive market.
Cloud Security Considerations for General Industry
LinkedIn
February 18, 2023
provides regional breakdowns, exploring security requirements for each area. The course concludes with a review of key threats and some real-world case studies that show how different security controls can be used to defend enterprises from similar attacks.
Major security incident making headlines. Each incident provides an opportunity to learn from another company's misfortune. In this series, you can explore high-profile cybersecurity breaches, discovering the inside story of what happened and lessons that you can draw from each breach. Instructor Mike Chapple breaks down incidents at major companies like Equifax and Target, and explains what you can do to protect your organization against similar attacks. He connects concepts you may have only studied to real-world incidents and shows how cybersecurity has evolved in response to these new kinds of threats.
Implementing a Privacy, Risk and Assurance Program
LinkedIn
February 17, 2023
This introductory privacy course enables you to implement and operationalize a modern, flexible, practical privacy program. This program will account for the challenges in data privacy, how your business is impacted by it, and the expectations of regulators, industry stakeholders, and your consumers.
Soft Skills for Information Security Professionals
LinkedIn
February 17, 2023
Information security isn’t all ones and zeros. While the people, processes, and technology we rely on to protect our data is critically important, so are the communication skills to help the rest of the organization understand the value and the necessity of those controls. This course was designed to help information security professionals better understand the perspective of the business, as well as learn how to communicate security concepts and proposals in terms that will resonate with all audiences.
Executive Decision Making
LinkedIn
February 16, 2023
Making executive decisions requires making tough choices. The decision to lay people off, halt major projects, or to take your company global all come with a significant amount of risk—both business risk and professional risk. In this course, executive coach Mike Figliuolo explains the difference between executive decision making and day-to-day decision making and shows how to equip yourself so you can make high-quality decisions with far-reaching positive impact.
Building a Cybersecurity Awareness Program
LinkedIn
February 15, 2023
By implementing a security awareness program, you can turn people into assets—not fragile targets. A truly robust and mature security program makes educating employees a top priority in a company's overall multilayered approach. In this course, Lauren Zink shows how to develop and implement a successful, ongoing security awareness program that's so much more than just one phishing simulation or an annual required training. True security awareness necessitates year-round, relevant, and tailored training and communications that create an overall cultural shift you can measure. Through this course, discover how to sketch out your program plan, create a budget, leverage creative approaches for keeping your employees engaged, and assess the effectiveness of your program.
Master Cybersecurity Management
LinkedIn
February 15, 2023
A successful cybersecurity program requires thinking big, building a team, and implementing a program that creates business value and protects your organization’s digital assets. This learning path shows you critical success factors and how to allocate your limited budget to the greatest effect.
Crisis Communication Planning
LinkedIn
February 15, 2023
Cyberattacks are a huge problem, but you can prepare your organization with a multi-faceted communications program to inform and reassure your stakeholders. In this short course, David Oates covers what to do and how to do it. David points out that planning for a ransomware or other cybersecurity attack is just as important as preparing your financial budgets. He explains the impact of cyberattacks and goes over how to communicate effectively to employees, customers, partners, investors, donors, and the general public if you are the subject of a ransomware or other cyberattack. He goes over what to say, to whom, and at what stage of the cyberattack crisis to say it. Plus, David dives into the best ways to evaluate a crisis and continue to train in better communication. Preparing for a crisis communications event like a cyberattack is not only possible, but also crucial to any organization.
The Cybersecurity Threat Landscape
LinkedIn
February 14, 2023
As tech systems continue to grow in complexity, cybersecurity threats are becoming increasingly more effective and damaging. News headlines regularly announce enormous data breaches and sophisticated hacks. How are these attackers getting in, and what actions can you take to protect against them? In this course, Marc Menninger describes some of the most common cybersecurity threats, including phishing and ransomware, deepfakes, unmanaged Internet of Things (IoT) devices, business email compromise, and more. He then teaches the best countermeasures for reducing or eliminating the impact of these threats.
Implementing an Information Security Program
LinkedIn
February 14, 2023
Building and operating an information security program at your organization can be challenging. The scope can be vast and complex. Thinking of all the ways an organization can fail and coming up with actionable measures you can take to prevent issues, mitigate risk, or recover from events is a large undertaking. In this course, Kip Boyle, president of Cyber Risk Opportunities, guides you through the entire process of creating an information security program, rolling it out to your organization, and maintaining it for continuous risk management.
In most areas of business, specifics matter. This is especially true in the area of cybersecurity. If you’re a cybersecurity professional, you’ll have a very short career if the best answer you can come up with to security questions is “I think everything is pretty secure.” You need metrics and hard data to effectively communicate the value of your security programs and activities. In this course, Caroline Wong gives you a tried-and-true approach for customizing metrics that you can use to communicate the objectives and progress of your team’s cybersecurity initiatives. Caroline starts with an overview of the value of metrics, then covers the different ways you communicate cybersecurity topics to different groups like executives, business leaders, and engineers. She also covers risk management objectives, and finishes the course by going over examples of a number of important cybersecurity metrics.
Cybersecurity Outsourcing Management
LinkedIn
February 14, 2023
Outsourcing your cybersecurity program can provide major benefits but can also present distinct challenges. Join instructor Kip Boyle for a practical course that provides you with an overview of cybersecurity outsourcing including identifying tasks best suited for outsourcing, selecting vendors, and managing vendors. Kip explains how to get the best value and outcome over time by sharing valuable insights and practical steps for business professionals with or without cybersecurity experience.
Building Cybersecurity Talent Pipeline
LinkedIn
February 14, 2023
Cyberattacks are becoming more frequent, infrastructures are becoming more complex, and hiring and retaining cybersecurity resources is becoming increasingly difficult. But what can you do about it? Cybersecurity executive and educator Tia Hopkins explains the challenges and evaluates the data behind the perceived cybersecurity skills gap. She shows you how to structure your security program to widen and diversify your talent pool. Tia covers why retention is critical, then dives into how you can set yourself up for success by defining roles and responsibilities, putting in the work, and enacting the best recruiting approach for your organization. Tia describes ways to maintain your pipeline, use career progression as a program strategy, and define clear career progression requirements and growth plans. Plus, she goes into useful tips on boosting your corporate brand and incorporating the ROI of building a successful internal pipeline into overall program effectiveness.
Implementing the NIST Privacy Framework
LinkedIn
February 13, 2023
Explore the fundamentals of the NIST Privacy Framework and how your organization can use it to categorize and effectively oversee its in-house privacy protocols. Discover the benefits of implementing the NIST Framework as a safeguard in your security management lifecycle. Learn strategies of identifying, managing, and mitigating privacy risks, as Ronald teaches you how to assess your own specific needs and outcomes, highlighting real-world examples and best practices along the way.
Cybersecurity Careers: Getting Started as a BISO
LinkedIn
February 13, 2023
Explore common business challenges and how BISOs can help resolve, or even prevent, them. Nicole shares lessons from her own experience about what it takes to align the priorities and operations of information security and business leadership across different domains and functions. By the end of this course, you’ll know more about how the BISO helps protect sensitive information about consumers and company secrets, improves the maturity of technology ecosystems, and creates new space for innovation.
GDPR Compliance: Essential Training
LinkedIn
February 13, 2023
The General Data Protection Regulation (GDPR) is a privacy-related regulation in the EU that became active and enforceable in May of 2018. GDPR requires US companies doing business in the EU to protect citizen privacy, and companies who do not comply face heavy fines. In this course, instructor Mandy Huth outlines who needs to comply with GDPR, what they need to do, and how they need to do it. She details the scope of GDPR, the definition of a personal data breach, the rights of data subjects, incident response requirements under GDPR, and more. The previous version of this course was released prior to the GDPR going into effect, so Mandy wraps up the course with some real-word examples that highlight some key points about GDPR, including the UK’s post-Brexit version of GDPR.
CorpSecurity International Membership connects corporate security professionals with the best-in-class security resources, certifications, and networking with global security professionals to succeed in their careers.
CSO30 ASEAN Top30 Cybersecurity
CSOonline
December 08, 2022
Honestly appreciated getting this award winner of CSO30 ASEAN which recognizes the Top 30 Senior Cybersecurity Executives. That's my great honour to be recognized as one among cybersecurity leaders across the industry in Southeast Asia and Hong Kong. It is a great transition to be privileged toward.
Was a great experience to be a panelist among experts from the US Department of Justice, Facebook, and Deloitte discussed "Cybercrime 2020: Threats, Risks, and Protecting Your Business".
Who should the CISO report to?
LinkedIn
February 05, 2023
CIO: Because CIOs and CISOs often have competing goals, prioritizes expedient IT service delivery over cybersecurity.
CFO: Incorrectly positions cybersecurity as a cost center with little strategic value.
CRO: Accurately frames cyber-risk as a subset of enterprise risk that has companywide implications.
COO: Correctly treats security as a baseline operational requirement that affects the entire enterprise.
CEO & BoD: Demonstrates a commitment to cybersecurity as tactically, operationally and strategically critical.
The report line management may apply at the appropriate level of corporate governance and especially the culture and context of the organization. It's not one size fits all, but it may fit the most.
Proactive vs Reactive cybersecurity strategy, which strategy is the most important? Why not both?
Thinkers360
February 21, 2023
Proactive vs Reactive cybersecurity strategy, which strategy is the most important? Why not both?
What does a Proactive approach look like?
Proactive cybersecurity activities focus on closing gaps and weaknesses in an environment before attackers exploit them.
Such as: • Threat hunting and Threat Intelligence • Cyber Risk Assessments • Data Classification • Managed Security Service Providers (MSSP) • Penetration testing or red teaming • Vulnerability scanning • BCP • Security awareness training
What does the Reactive approach look like?
Reactive cybersecurity activities focus on responding to security incidents after they happen.
Such as: • Disaster recovery process • Antivirus or endpoint detection and response (EDR) • Intrusion detection systems (IDS) • Email security gateways • Firewalls • Forensice and investigate process • Incident response team
Absolutely that's not one-size-fits-all; diversified approaches of both Proactive and reactive have come into play with different meanings, purposes, and processes and are applicable based upon the business context requirements and where risk is associated and understand security controls deliver possible outcomes of the business and effectively managed and mitigated the risk.
As a CISO, what is the keys requirements of security strategic initiative/project originated?
Thinkers360
February 12, 2023
5 keys principal consideration for a strategic security initiative/project that security leaders or security professionals should define into security strategic planning from these requirements:
1) Business risk context and business requirements that are constantly changing to adapt and growth in the market space of competitive advantage 2) Threat landscape environment and geopolitics and international security changing associated with business context 3) Risk assessment of business process area to identify control gaps and manage and mitigate the business risk. 4) Regulatory, legal and compliance requirements to mandate the security project plan 5) Business partners, customers, and stakeholder requirement is being considered to initial the security requirement and plan.
Join Thinkers360 for free! Are you a Reader/Writer, Thought Leader/Influencer (looking to increase your earnings), or an Enterprise User (looking to work with experts)?