One of the largest challenges security leaders face is not technology, process, or budget. It’s actually a lack of influence and authority. It’s something often lamented by security professionals, but rarely do we actually do anything about it. In this presentation we will look at ways to engage and build relationships with management, stakeholders, and end-users alike in order to gain the traction we need to deliver effective assurance no matter the situation or goal. It comes down to one simple thing: Becoming someone worth listening to.
Greg van der Gaast
Head of cyber security, University of Salford
Starting as one of the most notorious hackers of the 1990’s having been involved in the largest mass hack of the time and setting off an international incident after hacking into a nuclear weapons facility, Greg has over two decades of technical, management, and leadership experience in Information Security.
He is currently the Head of Information Security at the University of Salford, a freelance security strategy advisor, guest lecturer, mentor, trainer and creator of the UoS Information Security Leadership course. He is also the author of the InfoSec Leadership Series; Rethinking InfoSec, Influencing InfoSec, and Structuring InfoSec.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Google is scrapping its dark web report featureNews Google said while the dark web report feature offered “general information”, the tool didn’t provide “helpful next steps” for users potentially impacted by a breach.
-
AI means you're probably going to need bigger developer teamsAnalysis Software developers may be forgiven for worrying about their jobs in 2025, but the end result of AI adoption will probably be larger teams, not an onslaught of job cuts.
-
‘The worst thing an employee could do’: Workers are covering up cyber attacks for fear of reprisal – here’s why that’s a huge problemNews More than one-third of office workers say they wouldn’t tell their cybersecurity team if they thought they had been the victim of a cyber attack.
-
"Thinly spread": Questions raised over UK government’s latest cyber funding schemeThe funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag
-
Modern enterprise cybersecuritywhitepaper Cultivating resilience with reduced detection and response times
-
IDC InfoBrief: How CIOs can achieve the promised benefits of sustainabilitywhitepaper CIOs are facing two conflicting strategic imperatives
-
The complete guide to the NIST cybersecurity frameworkWhitepaper Find out how the NIST Cybersecurity framework is evolving
-
Are you prepared for the next attack? The state of application security in 2024Webinar Aligning to NIS2 cybersecurity risk-management obligations in the EU
-
The economics of penetration testing for web application securitywhitepaper Get the most value from your security solution
-
How to extend zero trust to your cloud workloadsWhitepaper Implement zero trust-based security across your entire ecosystem
