What is cybersecurity in today's enterprise and what's the CIO's role?

What does cybersecurity mean in the modern enterprise? In a SearchCIO Twitter discussion on Oct. 30, discuss the CIO's role in cybersecurity planning.

The constant and quick evolution of security threats makes cybersecurity planning increasingly difficult for CIOs and IT leaders to manage effectively. It begs the question: What is cybersecurity in today's enterprise, exactly, and what is the CIO's role in ensuring it?

Tweet jam recaps from last month

Private vs. public cloud computing debate

Cut costs and avoid cloud sprawl

Craft a cloud exit strategy for success

Tweet jam participants lack cloud security confidence

Cybersecurity encompasses a wide variety of technologies, processes and practices designed to protect IT from attacks and unauthorized access -- so tell us what you know about it, and learn from your peers, too. Join SearchCIO Wednesday, Oct. 30, at 3 p.m. on Twitter, respond to question prompts from SearchCIO, engage with your fellow Twitter users, or simply watch the conversation unfold under the #CIOChat hashtag.

Questions will touch on many elements of cybersecurity: application security, information security, network security, end-user education, disaster recovery, business continuity and more. TechTarget Assistant Site Editor Emily McLaughlin will lead the event from the SearchCIO Twitter handle, @searchCIO, and will be joined by TechTarget editors, writers, contributors and guest expert Elliott Franklin. Franklin is president of the Information Systems Security Association's Alamo chapter, and an information security manager at Whataburger restaurants. Franklin has more than 15 years of experience as an IT professional implementing a broad range of initiatives and strategies to support and enhance business objectives.

Specifics:

Date: Wednesday, Oct. 30, 2013
Time:
 3 p.m. EDT
Host:
 @searchCIO
Hashtag:
 Use and follow #CIOChat (additional hashtags include #cybersecurity, #DR, #BC)

Whether you're a Twitter newbie or a #CIOChat veteran, keep the following tips in mind when you engage in this tweet jam:

  • Your first #CIOChat tweet should be introductory, including your name, title and organization.
  • @searchCIO will ask a series of questions to followers between 3 p.m. and 3:30 p.m. Please preface with A1 (Answer 1), A2 or A3, then include "#CIOChat". Each question will follow the cybersecurity topic.
  • Be advised that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question.
  • This is an opportunity to network and connect with like-minded Twitter users. Retweet (RT) responses you agree with, and reply to those you don't.

Please direct questions, RSVPs or other concerns to Emily McLaughlin, emclaughlin@techtarget.com. See you on Twitter!

Dig deeper on Enterprise information security management

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close