Cybersecurity Studio Learnings
From increasing efficiency and productivity to unlocking new revenue streams, becoming more digital and connected is essential for companies to remain competitive in the modern business landscape.
But digital transformations are creating a drastically larger and different attack surface for cyber criminals and bad actors to exploit.
Cybersecurity can no longer simply be an IT capability, it must be part of the DNA of the business.
The Cybersecurity Studio is helping teams navigate and accelerate this work by focusing on four critical stakeholder groups. Click on each to find out more.
Executives & The Board
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Duis at tellus at urna condimentum mattis. Dapibus ultrices in iaculis nunc sed augue lacus viverra. Amet consectetur adipiscing elit duis tristique sollicitudin nibh sit amet. Morbi tincidunt augue interdum velit euismod in pellentesque massa. Pretium lectus quam id leo in. Gravida quis blandit turpis cursus. Consequat id porta nibh venenatis. Urna nunc id cursus metus. Arcu cursus vitae congue mauris rhoncus aenean.
Sample Content
Lab Series: Cybersecurity Crisis Management
Preparing the C-Suite for a Cyber Crisis
When a major cybersecurity attack hits an organization, it’s an ‘all hands on deck’ situation with potential impact to all aspects of the business. Executives may be called upon to make difficult decisions such as whether to engage with the attacker and how to prioritize recovery activities. How an organization communicates with its employees, customers, and regulators can make or break its reputation.
Read the Report to find out what your peers are doing
Upcoming Sessions
X.XX Lab | Business Continuity Planning and Disaster Recovery
X.XX Workshop | Creating Your Own Cybersecurity Tabletops
5.16 Roundtable | The Psychology of Crisis Management
Register to join your peers to share experiences and expertise
Related Information
Video highlights from a Roundtable with Stevan Bernard on The Sony Cyber Attack – A Crisis Response View
Lab Series: C-Suite Topics
Preparing for Incident Reporting Regulations
The Board and CISO relationship is entering a new phase. Public companies will soon be facing a patchwork of cyber incident reporting requirements that are reminiscent of the complex data protection regulations. The SEC cybersecurity rule will also usher in an unprecedented level of reporting on public companies’ cybersecurity policies, strategies and governance.
Read the Report to find out what your peers are doing
Business Operations
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Duis at tellus at urna condimentum mattis. Dapibus ultrices in iaculis nunc sed augue lacus viverra. Amet consectetur adipiscing elit duis tristique sollicitudin nibh sit amet. Morbi tincidunt augue interdum velit euismod in pellentesque massa. Pretium lectus quam id leo in. Gravida quis blandit turpis cursus. Consequat id porta nibh venenatis. Urna nunc id cursus metus. Arcu cursus vitae congue mauris rhoncus aenean.
Sample Content
Lab Series: Cybersecurity in Manufacturing
Program Scoping and Funding
Manufacturers increasingly rely on data, information, and technologies to run their operations. Over the last few years we have seen a significant rise in these assets being targeted by cyber attacks. The result has been impacts to individuals’ health and safety, disrupted supply chains and financial and reputational damage to individual businesses.
Read the Report to find out what your peers are doing
Approaches to Manufacturing Network Segmentation
No two manufacturing networks are the same. In order to remain competitive in an evolving global market, manufacturers are pushing significant innovations in their products, manufacturing processes, and equipment. This rapid rate of change has resulted in manufacturing floors that are markedly different from those of just 5 to 10 years ago.
Read the Report to find out what your peers are doing
Upcoming Sessions
4.04 Lab | Managing OT Vulnerabilities
X.XX Lab | Business Continuity Planning and Disaster Recovery
X.XX Lab | Smart/Future Manufacturing Cybersecurity
Register to join your peers to share experiences and expertise
Related Information
Case Study: Armis Architecture Design
Case Study: Making the Manufacturing Security Capital Investment Business Case
Case Study: Using Tabletops to Understand Business Continuity and Resiliency Needs
Lab Series: Vulnerability Management for Today’s Threats
Beyond CVSS for Vulnerability Management
Companies Need to Radically Prioritize Their Vulnerabilities. The number of IT vulnerabilities has risen by 411% since 2005, when CVSS scoring was first introduced. Legacy vulnerability management practices no longer work.
Read the Report to find out what your peers are doing
Upcoming Sessions
3.08 Lab | Approaches to Attack Surface Management
4.04 Lab | Managing OT Vulnerabilities
X.XX Lab | Radical Vulnerability Prioritization
Register to join your peers to share experiences and expertise
Third Party & Supply Chain Relationships
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Duis at tellus at urna condimentum mattis. Dapibus ultrices in iaculis nunc sed augue lacus viverra. Amet consectetur adipiscing elit duis tristique sollicitudin nibh sit amet. Morbi tincidunt augue interdum velit euismod in pellentesque massa. Pretium lectus quam id leo in. Gravida quis blandit turpis cursus. Consequat id porta nibh venenatis. Urna nunc id cursus metus. Arcu cursus vitae congue mauris rhoncus aenean.
Sample Content
Lab Series: Evolving 3rd Party & Supply Chain Relationships
The Incident Response Role in 3rd Party Compromise
Commodo quis imperdiet massa tincidunt nunc pulvinar sapien et. Pellentesque habitant morbi tristique senectus. Sed adipiscing diam donec adipiscing tristique risus. Sed ullamcorper morbi tincidunt ornare massa eget egestas purus viverra. Et egestas quis ipsum suspendisse ultrices gravida dictum. Diam donec adipiscing tristique risus nec feugiat. Et netus et malesuada fames.
Read the Report to find out what your peers are doing
Upcoming Sessions
4.14 Lab | Defining Supply Chain and Third-Party Risks
Register to join your peers to share experiences and expertise
The Cybersecurity Workforce
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Duis at tellus at urna condimentum mattis. Dapibus ultrices in iaculis nunc sed augue lacus viverra. Amet consectetur adipiscing elit duis tristique sollicitudin nibh sit amet. Morbi tincidunt augue interdum velit euismod in pellentesque massa. Pretium lectus quam id leo in. Gravida quis blandit turpis cursus. Consequat id porta nibh venenatis. Urna nunc id cursus metus. Arcu cursus vitae congue mauris rhoncus aenean.
Sample Content
Lab Series: The Evolving Cybersecurity Workforce
The Cybersecurity Workforce Challenges & Opportunities
Hiring alone won’t solve cybersecurity workforce challenges. Business strategies driven by digital transformation are exacerbating the cybersecurity hiring and retention challenges, and ushering in new organizational models..
Read the Report to find out what your peers are doing
Upcoming Sessions
X.XX Lab | Cloud Shared Responsibility Models
X.XX Lab | Embedded Cybersecurity Resourcing Models
X.XX Lab | Cybersecurity Awareness for Today’s Threats
X.XX Roundtable | An Executive View of the CISO
Register to join your peers to share experiences and expertise
Related Information
Case Study: An Early Career Development Program
Case Study: Off Cycle Pay Increases to Retain Early Career Talent
Case Study: Contract-to-Hire Strategies
Case Study: Automation and self-service solutions to support ‘shift left’

Trust
Our Promise to You
We understand that it is a privilege for us to learn from you through what you candidly share with your peers—and through that we hope to shape a different future for cybersecurity practitioners.
In order to support that openness, we make these promises
We believe your personal information and insights belong to you
We will always get explicit permission to share anything you say in The Studio
We protect the information we collect
Learn More About The Cybersecurity Studio

A product of chi studios
© 2022
Contact
(650) 308-4136
Palo Alto, CA
Chicago, IL
Atlanta, GA