Contact Us   |   Print Page   |   Sign In   |   Register
CISO Mentoring Webinar Series: What It Takes to be a CISO in 2017
Tell a Friend About This EventTell a Friend

Learn from the experts! Tune into this webinar to hear Doug Copley, Deputy CISO/Security & Privacy Strategist for Forcepoint, talk about What It Takes to be a CISO in 2017: expectations, challenges, partnerships, the roadmap,critical activities and more.

When: Thursday, Feb. 9, 2017
From 1:00 pm-2:00 pm Eastern
Where: Webinar
United States
Contact: Leah Lewis

« Go to Upcoming Event List  


Feb. 9, 2017
From 1:00 to 2:00 PM EST
Click here to Register

What It Takes to be a CISO in 2017

Doug Copley, Deputy CISO/Sr. Security & Privacy Strategist, Forcepoint

February 9, 1:00 PM - 2:00 PM EST
Click here to Register

Presentation Agenda:

  • Expectations of a CISO 2007 vs. 2017
  • Is CISO the Impossible Job?
  • Challenges
  • Internal Partnerships
  • The Roadmap
  • Reaching Out
  • So What Does it Take?
  • Critical CISO Activities

About Doug Copley:
With nearly 25 years’ experience in IT, information security and data privacy, Doug Copley is a passionate advocate and evangelist for effective information security and data privacy risk management for both organizations and individuals. Doug has held various roles throughout his career including those of Chief Privacy Officer and Chief Information Security Officer. Doug was the co-founder and past Chairman of the Michigan Healthcare Cybersecurity Council and remains a member of the Michigan Financial Services Industry Cybersecurity Council. Doug is currently with Forcepoint as Deputy CISO and Security & Privacy Strategist where he not only provides oversight of internal security efforts, but also stays tuned to industry threats and best practices and provides thought leadership and advice to leaders across industries. Doug can frequently be found speaking or blogging on information security, data privacy and leadership topics for everyone’s benefit.

Community Search
Sign In


ISSA Mid-Atlantic Conference

ISSA Thought Leadership Series Webinar

Cornerstones of Trust

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information