Technology leaders discuss cybersecurity talent frameworks
- Details
- Monday, 06 June 2022 21:59
June 6, 2022 – As global cyber threats intensify, security expectations from customers, employees, and boards remain a top priority. As a result, CIOs must implement strategies that protect their organizations and provide the ability to respond to the attacks that get past their defences.
Implementing and operating a comprehensive cybersecurity program requires security expertise and capacity. Unfortunately, the acquisition and retention of increasingly scarce technical talent remain a challenge for most organizations. With a global estimate of 3.5 million unfilled cybersecurity positions, CIOs must consider new frameworks to accomplish their security objectives.
To mitigate the supply versus demand problem, organizations should think of security talent as an ecosystem that doesn't rely on key individuals. This approach focuses on outcomes to ensure that cybersecurity improvements persist and grow over time.
With these principles in mind, on June 1, 2022 The IT Media Group brought together 14 cross-industry IT executives for a virtual roundtable entitled 'Cybersecurity Talent Frameworks for the CIO.' The session provided an opportunity to discuss the challenges and approaches IT executives implement in a rapidly changing world.
Jeff Ishii, Chief Technologist at The IT Media Group, moderated the roundtable. Also participating were executives from the session sponsor, ActZero, President and Chief Operating Officer Chris Finan, and Chief Security Officer Adam Mansour.
The interactive session included a combination of live polling and panel discussion about the challenges and best practices for the following topic areas:
1. Improving organizational cybersecurity maturity
- Focus areas that make the organization better
- Elements of a flexible maturity model
2. Using data to drive the security program
- Measuring security investment efficacy
- Linking KPIs to business outcomes
3. Optimizing the talent pool
- Balancing priorities and focus
- Retention and engagement strategies
4. AI and ML in practice
- Pre-requisites to effective usage
- Ideal places to add AI and ML
IT leaders described reporting approaches and scorecard requirements from their boards. In addition, panellists provided tactics to increase security awareness and how to improve cyber-attack protection. "Connecting with peers about risk management is always beneficial," said Adam Mansour. "CIOs worry about building proper cyber security expertise within IT. Most organizations turn to outsourcing to solve that challenge." Mansour described the fundamentals that drive success, "We realize value by leveraging security engineering, data science, threat hunting and AI-enabled tools to provide effective detection and response for the enterprise."
Chris Finan observed, "I enjoyed hearing the views from the senior information technology executives across industries. Despite their diverse backgrounds, they expressed similar concerns about talent management, board communication, and their enterprises' risks." Participants provided dozens of mitigation strategies during the roundtable to address their challenges. Finan added, "We pride ourselves on delivering positive outcomes and ensuring that organizations can measure those outcomes within their business context. We communicate with data so that our customers always understand what we're delivering."
All participants will receive a strategic insights report containing more than 100 tactics and best practices discussed during the roundtable.
For more on how The IT Media Group fosters collaboration amongst the CIO community, please visit our events page. Interested parties can subscribe to our Youtube channel to watch a host of CIO roundtable highlights and executive interviews covering leadership, technology, and operations topics that address compelling issues.
The IT Media Group is an award-winning producer of events and content for senior IT executives. Based in Toronto, our leadership team includes some of the most experienced and well-respected media, technology, and business professionals serving the IT executive community.






New & Notable


Cyber incidents are no longer isolated IT events. They are enterprise-level crises that can halt operations, trigger regulatory scrutiny and erode customer trust overnight. Yet too often, planning for how to respond is treated as a compliance checkbox or delegated piecemeal across functions.
Having an AI advisor that provides recommendations based on your direction can be helpful. But an expert actor that can make decisions and work without oversight is even more powerful.
Artificial Intelligence is no longer a buzzword; it's a daily boardroom reality. CIOs are tasked not only with adopting AI but also with translating their "AI promise" into operational and financial value. However, despite board-level urgency and growing enterprise investments, many AI programs still fail to deliver—not due to lack of ambition, but because of a strategic value gap.
AI is transforming industries at warp speed, with companies across sectors driven by its potential to accelerate revenue growth, boost operational efficiency and customize customer experiences.
Salad.
The Banking, Financial Services, and Insurance (BFSI) sector is witnessing a rapid AI adoption surge, but this digital acceleration comes with significant challenges. According to the
Why Flexible Infrastructure Consumption is in High Demand and Driving Business Growth
The year is 2035. AI has become as invisible and integral to our lives as Wi-Fi and solar energy. After overcoming energy consumption challenges, chip shortages, and infrastructure limits, technology has evolved into a powerhouse that drives industries while solving sustainability issues.
As AI revolutionizes industries, one major question looms: How can businesses ensure solid returns on their investments without falling into financial traps? Concerns about AI's return on investment (ROI) are valid.
Lessons from CrowdStrike on Safeguarding Your Data with Compliance, Continuity and Disaster Recovery Strategies.