Strategic Leadership for Managing Evolving Cybersecurity Risks

It was my honor and true pleasure to present one of the keynotes at the 2014 NSF Cybersecurity Summit for Large Facilities and Cyberinfrastructure.  Sponsored by the Center for Trustworthy Scientific Cyberinfrastructure (CTSC) and supported by the National Science Foundation (NSF), attendees included senior technical, cybersecurity staff, NSF program managers, and management of large scientific compute facilities.  An absolutely great audience.  Lively, vocal, provocative, inquisitive, and passionate about protecting their environments.  It makes me feel good such people are responsible for securing key computing infrastructures around the world.

Cybersecurity is difficult.  It is a serious endeavor which strives to find a balance in managing the security of computing capabilities to protect the technology which connects and enriches the lives of everyone.  Characteristics of cyber risk have matured and expanded on the successes of technology innovation, integration, and adoption.  It is no longer a game of tactics, but rather a professional discipline, continuous in nature, where to be effective strategic leadership must establish effective and efficient structures for evolving controls to sustain an optimal level of security.  This presentation will discuss the challenges, organizational opportunities, and explore best practices to align investments in security to the risk appetite of an organization.

Twitter: @Matt_Rosenquist

IT Peer Network: My Previous Posts


My Blog: Information Security Strategy

Published on Categories Archive
Matthew Rosenquist

About Matthew Rosenquist

Matthew Rosenquist is a Cybersecurity Strategist for Intel Corp and benefits from 20+ years in the field of security. He specializes in strategy, measuring value, and developing cost effective capabilities and organizations which deliver optimal levels of security. Matthew helped with the formation of the Intel Security Group, an industry leading organization bringing together security across hardware, firmware, software and services. An outspoken advocate of cybersecurity, he strives to advance the industry and his guidance can be heard at conferences, and found in whitepapers, articles, and blogs.