Cybersecurity Studio Learnings

From increasing efficiency and productivity to unlocking new revenue streams, becoming more digital and connected is essential for companies to remain competitive in the modern business landscape.

But digital transformations are creating a drastically larger and different attack surface for cyber criminals and bad actors to exploit.

Cybersecurity can no longer simply be an IT capability, it must be part of the DNA of the business.

The Cybersecurity Studio is helping teams navigate and accelerate this work by focusing on four critical stakeholder groups. Click on each to find out more.

Executives & The Board

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Duis at tellus at urna condimentum mattis. Dapibus ultrices in iaculis nunc sed augue lacus viverra. Amet consectetur adipiscing elit duis tristique sollicitudin nibh sit amet. Morbi tincidunt augue interdum velit euismod in pellentesque massa. Pretium lectus quam id leo in. Gravida quis blandit turpis cursus. Consequat id porta nibh venenatis. Urna nunc id cursus metus. Arcu cursus vitae congue mauris rhoncus aenean.

Sample Content

Lab Series: Cybersecurity Crisis Management

Preparing the C-Suite for a Cyber Crisis
When a major cybersecurity attack hits an organization, it’s an ‘all hands on deck’ situation with potential impact to all aspects of the business. Executives may be called upon to make difficult decisions such as whether to engage with the attacker and how to prioritize recovery activities. How an organization communicates with its employees, customers, and regulators can make or break its reputation.

Read the Report to find out what your peers are doing

Upcoming Sessions
X.XX Lab | Business Continuity Planning and Disaster Recovery
X.XX Workshop | Creating Your Own Cybersecurity Tabletops
5.16  Roundtable | The Psychology of Crisis Management

Register to join your peers to share experiences and expertise

Related Information
Video highlights from a Roundtable with Stevan Bernard on The Sony Cyber Attack – A Crisis Response View

Lab Series: C-Suite Topics

Preparing for Incident Reporting Regulations
The Board and CISO relationship is entering a new phase. Public companies will soon be facing a patchwork of cyber incident reporting requirements that are reminiscent of the complex data protection regulations. The SEC cybersecurity rule will also usher in an unprecedented level of reporting on public companies’ cybersecurity policies, strategies and governance.

Read the Report to find out what your peers are doing

Business Operations

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Duis at tellus at urna condimentum mattis. Dapibus ultrices in iaculis nunc sed augue lacus viverra. Amet consectetur adipiscing elit duis tristique sollicitudin nibh sit amet. Morbi tincidunt augue interdum velit euismod in pellentesque massa. Pretium lectus quam id leo in. Gravida quis blandit turpis cursus. Consequat id porta nibh venenatis. Urna nunc id cursus metus. Arcu cursus vitae congue mauris rhoncus aenean.

Sample Content

Lab Series: Cybersecurity in Manufacturing

Program Scoping and Funding
Manufacturers increasingly rely on data, information, and technologies to run their operations. Over the last few years we have seen a significant rise in these assets being targeted by cyber attacks. The result has been impacts to individuals’ health and safety, disrupted supply chains and financial and reputational damage to individual businesses.

Read the Report to find out what your peers are doing

Approaches to Manufacturing Network Segmentation
No two manufacturing networks are the same. In order to remain competitive in an evolving global market, manufacturers are pushing significant innovations in their products, manufacturing processes, and equipment. This rapid rate of change has resulted in manufacturing floors that are markedly different from those of just 5 to 10 years ago.

Read the Report to find out what your peers are doing

Upcoming Sessions
4.04 Lab | Managing OT Vulnerabilities
X.XX Lab | Business Continuity Planning and Disaster Recovery
X.XX Lab | Smart/Future Manufacturing Cybersecurity

Register to join your peers to share experiences and expertise

Related Information
Case Study: Armis Architecture Design
Case Study: Making the Manufacturing Security Capital Investment Business Case
Case Study: Using Tabletops to Understand Business Continuity and Resiliency Needs

Lab Series: Vulnerability Management for Today’s Threats

Beyond CVSS for Vulnerability Management
Companies Need to Radically Prioritize Their Vulnerabilities. The number of IT vulnerabilities has risen by 411% since 2005, when CVSS scoring was first introduced. Legacy vulnerability management practices no longer work.

Read the Report to find out what your peers are doing

Upcoming Sessions
3.08 Lab | Approaches to Attack Surface Management
4.04 Lab | Managing OT Vulnerabilities
X.XX Lab | Radical Vulnerability Prioritization

Register to join your peers to share experiences and expertise

Third Party & Supply Chain Relationships

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Duis at tellus at urna condimentum mattis. Dapibus ultrices in iaculis nunc sed augue lacus viverra. Amet consectetur adipiscing elit duis tristique sollicitudin nibh sit amet. Morbi tincidunt augue interdum velit euismod in pellentesque massa. Pretium lectus quam id leo in. Gravida quis blandit turpis cursus. Consequat id porta nibh venenatis. Urna nunc id cursus metus. Arcu cursus vitae congue mauris rhoncus aenean.

Sample Content

Lab Series: Evolving 3rd Party & Supply Chain Relationships

The Incident Response Role in 3rd Party Compromise
Commodo quis imperdiet massa tincidunt nunc pulvinar sapien et. Pellentesque habitant morbi tristique senectus. Sed adipiscing diam donec adipiscing tristique risus. Sed ullamcorper morbi tincidunt ornare massa eget egestas purus viverra. Et egestas quis ipsum suspendisse ultrices gravida dictum. Diam donec adipiscing tristique risus nec feugiat. Et netus et malesuada fames.

Read the Report to find out what your peers are doing

Upcoming Sessions
4.14 Lab | Defining Supply Chain and Third-Party Risks

Register to join your peers to share experiences and expertise

The Cybersecurity Workforce

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Duis at tellus at urna condimentum mattis. Dapibus ultrices in iaculis nunc sed augue lacus viverra. Amet consectetur adipiscing elit duis tristique sollicitudin nibh sit amet. Morbi tincidunt augue interdum velit euismod in pellentesque massa. Pretium lectus quam id leo in. Gravida quis blandit turpis cursus. Consequat id porta nibh venenatis. Urna nunc id cursus metus. Arcu cursus vitae congue mauris rhoncus aenean.

Sample Content

Lab Series: The Evolving Cybersecurity Workforce

The Cybersecurity Workforce Challenges & Opportunities
Hiring alone won’t solve cybersecurity workforce challenges. Business strategies driven by digital transformation are exacerbating the cybersecurity hiring and retention challenges, and ushering in new organizational models..

Read the Report to find out what your peers are doing

Upcoming Sessions
X.XX Lab | Cloud Shared Responsibility Models
X.XX Lab | Embedded Cybersecurity Resourcing Models
X.XX Lab | Cybersecurity Awareness for Today’s Threats
X.XX Roundtable | An Executive View of the CISO

Register to join your peers to share experiences and expertise

Related Information
Case Study: An Early Career Development Program
Case Study: Off Cycle Pay Increases to Retain Early Career Talent
Case Study: Contract-to-Hire Strategies
Case Study: Automation and self-service solutions to support ‘shift left’

Trust

Our Promise to You

We understand that it is a privilege for us to learn from you through what you candidly share with your peers—and through that we hope to shape a different future for cybersecurity practitioners.

In order to support that openness, we make these promises

N

We believe your personal information and insights belong to you

N

We will always get explicit permission to share anything you say in The Studio

N

We protect the information we collect

Learn More About The Cybersecurity Studio

A product of chi studios
© 2022

Contact

(650) 308-4136

Palo Alto, CA
Chicago, IL
Atlanta, GA