Completed
A Good Security Strategy Transforms..
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Fine Art of Creating a Transformational Cybersecurity Strategy
Automatically move to the next video in the Classroom when playback concludes
- 1 RSAConference 2019
- 2 An Intensifying Storm
- 3 A Good Security Strategy Transforms..
- 4 And A Bad Strategy..
- 5 What Makes Or Breaks A Strategy
- 6 Decide On The Strategy Path You Want To Take
- 7 Each Path Has Pros And Cons
- 8 Choose Your Strategy Path Wisely Depending on...
- 9 Socialize
- 10 Gather Data From Key Stakeholders
- 11 Perspectives From The Boardroom
- 12 Strategize
- 13 Mission Statement
- 14 Mission Example 2
- 15 Prioritize
- 16 Prioritization Takes Effort And It Depends On Your Path
- 17 How Much Does It All Matter?
- 18 Security Performance Snapshot
- 19 Write
- 20 Document Your Strategy
- 21 Summarize
- 22 Create A Focus Sheet for Executives - Example
- 23 Succeed
- 24 Principles of A Successful Transformation
- 25 Apply What You Have Learned Today