Have you had success with using guest speakers to drive security awareness, such as executive leaders/other internal employees, external experts or public figures? What sorts of speakers create the biggest impact, in your experience?

78 views3 Comments
Sort By:
Oldest
CISO/CPO & Adjunct Law Professor in Finance (non-banking)2 months ago
Personally, I haven't found much success using guest speakers, but that could be by design. My worry is that if people spend their attention focusing on the guest speaker, they might miss the message. So, I've generally steered clear of that approach.

People have suggested bringing in executives, but I feel they would need to be recognized as a security expert by our regular users. Unfortunately, I don't know of anyone who fits that description. My team knows who the security gurus are, but our goal is to educate beyond our team.

If an executive is tasked with speaking about cybersecurity, they might be able to read a speech, but that doesn't necessarily foster interaction. I'm aiming for a more personal connection with my staff. If they perceive it as an executive issue, they might hesitate to report. 

My goal is to create a comfortable environment for my staff, and I feel an external party might not help achieve that.

CISO in Banking2 months ago
In my previous role at a credit union, we often used guest speakers. We've also done so for board meetings at Apple. At my former employer, we brought in Dr. Ron Ross, one of the authors of the NIST framework guidelines, and financial industry experts to speak at annual board retreats. This approach served as reinforcement for the strategic direction we were taking as an organization.

lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Associate Vice President, Information Technology & CISO in Education2 months ago
We have a group called the O Triple CIO, which comprises the 24 colleges in Ontario. We meet monthly and share information. We also host an annual conference where IT professionals gather. Before my time, they brought in Kevin Mitnick, a famous hacker, as a guest speaker. His talk had a lasting impact on not just the cybersecurity team, but the entire IT community.

When I present to the board, we often bring in our partners, such as KPMG, who assist us with our cybersecurity strategy, or technical experts from companies like Proofpoint. They provide an executive perspective and validate our security efforts. It's not just me pushing the security agenda, but a trusted third party sharing what other institutions are doing and how we measure up against them. This approach has proven beneficial for us.

Content you might like

Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.
1.4k views1 Comment

Implementation complete23%

Implementation in progress54%

Planned within the next 12 months12%

Not planned7%

Not enabling O365 on mobile2%

View Results
2.4k views2 Upvotes

Account deletion19%

Personal data (PII) deletion from a company's own data warehouses.55%

Personal data (PII) deletion from both a company's own data warehouses and connected SaaS tools.18%

Account deletion and PII deletion from both a company's own data warehouses and connected SaaS tools.7%

View Results
1.5k views2 Upvotes