The constant and quick evolution of security threats makes cybersecurity planning increasingly difficult for CIOs...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
and IT leaders to manage effectively. It begs the question: What is cybersecurity in today's enterprise, exactly, and what is the CIO's role in ensuring it?
Tweet jam recaps from last month
Private vs. public cloud computing debate
Cut costs and avoid cloud sprawl
Craft a cloud exit strategy for success
Tweet jam participants lack cloud security confidence
Cybersecurity encompasses a wide variety of technologies, processes and practices designed to protect IT from attacks and unauthorized access -- so tell us what you know about it, and learn from your peers, too. Join SearchCIO Wednesday, Oct. 30, at 3 p.m. on Twitter, respond to question prompts from SearchCIO, engage with your fellow Twitter users, or simply watch the conversation unfold under the #CIOChat hashtag.
Questions will touch on many elements of cybersecurity: application security, information security, network security, end-user education, disaster recovery, business continuity and more. TechTarget Assistant Site Editor Emily McLaughlin will lead the event from the SearchCIO Twitter handle, @searchCIO, and will be joined by TechTarget editors, writers, contributors and guest expert Elliott Franklin. Franklin is president of the Information Systems Security Association's Alamo chapter, and an information security manager at Whataburger restaurants. Franklin has more than 15 years of experience as an IT professional implementing a broad range of initiatives and strategies to support and enhance business objectives.
Whether you're a Twitter newbie or a #CIOChat veteran, keep the following tips in mind when you engage in this tweet jam:
- Your first #CIOChat tweet should be introductory, including your name, title and organization.
- @searchCIO will ask a series of questions to followers between 3 p.m. and 3:30 p.m. Please preface with A1 (Answer 1), A2 or A3, then include "#CIOChat". Each question will follow the cybersecurity topic.
- Be advised that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question.
- This is an opportunity to network and connect with like-minded Twitter users. Retweet (RT) responses you agree with, and reply to those you don't.
Please direct questions, RSVPs or other concerns to Emily McLaughlin, firstname.lastname@example.org. See you on Twitter!
Dig Deeper on Enterprise Information Security Management