#CIOChat

What is cybersecurity in today's enterprise and what's the CIO's role?

Emily McLaughlin, Associate Site Editor

The constant and quick evolution of security threats makes cybersecurity planning increasingly difficult for CIOs and IT leaders to manage effectively. It begs the question: What is cybersecurity in today's enterprise, exactly, and

    Requires Free Membership to View

what is the CIO's role in ensuring it?

Tweet jam recaps from last month

Private vs. public cloud computing debate

Cut costs and avoid cloud sprawl

Craft a cloud exit strategy for success

Tweet jam participants lack cloud security confidence

Cybersecurity encompasses a wide variety of technologies, processes and practices designed to protect IT from attacks and unauthorized access -- so tell us what you know about it, and learn from your peers, too. Join SearchCIO Wednesday, Oct. 30, at 3 p.m. on Twitter, respond to question prompts from SearchCIO, engage with your fellow Twitter users, or simply watch the conversation unfold under the #CIOChat hashtag.

Questions will touch on many elements of cybersecurity: application security, information security, network security, end-user education, disaster recovery, business continuity and more. TechTarget Assistant Site Editor Emily McLaughlin will lead the event from the SearchCIO Twitter handle, @searchCIO, and will be joined by TechTarget editors, writers, contributors and guest expert Elliott Franklin. Franklin is president of the Information Systems Security Association's Alamo chapter, and an information security manager at Whataburger restaurants. Franklin has more than 15 years of experience as an IT professional implementing a broad range of initiatives and strategies to support and enhance business objectives.

Specifics:

Date: Wednesday, Oct. 30, 2013
Time:
 3 p.m. EDT
Host:
 @searchCIO
Hashtag:
 Use and follow #CIOChat (additional hashtags include #cybersecurity, #DR, #BC)

Whether you're a Twitter newbie or a #CIOChat veteran, keep the following tips in mind when you engage in this tweet jam:

  • Your first #CIOChat tweet should be introductory, including your name, title and organization.
  • @searchCIO will ask a series of questions to followers between 3 p.m. and 3:30 p.m. Please preface with A1 (Answer 1), A2 or A3, then include "#CIOChat". Each question will follow the cybersecurity topic.
  • Be advised that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question.
  • This is an opportunity to network and connect with like-minded Twitter users. Retweet (RT) responses you agree with, and reply to those you don't.

Please direct questions, RSVPs or other concerns to Emily McLaughlin, emclaughlin@techtarget.com. See you on Twitter!


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: