TECH BUYER Dec 2019 - IDC Perspective - Doc # EUR145679319
European CISO Summit 2019: Risky Business — Understanding Digital Risk to Ensure Digital Trust
By: Dominic TrottResearch Director, European Security & Privacy, Mark ChildResearch Manager, European Security, Romain FouchereauManager, Security Appliance Program, European Systems and Infrastructure Solutions, Ralf HelkenbergResearch Manager, European Privacy and Data Security, Kevin RestivoResearch Manager, European Enterprise Mobility, Konstantin RychkovResearch Manager, Security Software, Western Europe, Claudio StahnkeSenior Research Analyst, European Security Services
This IDC Perspective examines IDC's third European CISO Summit, held in November 2019. It saw IDC's CISO community gather for an intensive two-day program, with three clear aims: to explore how security teams can demonstrate business value through risk management, to understand how security teams can focus this risk-centric approach to support their enterprise's strategic ambitions, and to understand the attributes that CISOs of the future will require to thrive, not just survive, as a business leader.
"The job description of a CISO is already complicated, but the growing expectations on the security team mean that CISOs require a growing set of attributes to be successful," said Dominic Trott, research director for IDC European Security and Privacy. "While traditional capabilities such as technical know-how remain non-negotiable, the need to demonstrate impact means that skills such as financial acumen and risk management are becoming intrinsic elements of the package of attributes that CISOs must develop. Most importantly, they must become expert communicators, able to present the right data in the right language at the right time to build relationships with a growing range of internal and external stakeholders."
Cognitive/artificial intelligence, Digital transformation, Governance, risk and compliance infrastructure, Information protection and control, Public cloud services, Security management, Technology buyer
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.