IRVINE, Calif.--(BUSINESS WIRE)--Cylance Inc., the company revolutionizing cybersecurity with the practical application of artificial intelligence to prevent the most advanced cyberthreats, today announced its Chief Security and Trust Officer, Malcolm Harkins will be hosting a webinar series aimed to provide insight into enabling business while managing and surviving risk. Each webinar will feature CISOs and other security professionals such as Steven Young, CISO of Blue Shield (February 8) and Patrick Heim, Head of Trust and Security, Dropbox (March 1).
“Everyone, from corporate executives to security practitioners, shares responsibility for security and privacy,” said Malcolm Harkins. “No matter what motivates us, thoughtfully building systems to support a culture of genuine responsibility for security and privacy is not only good corporate responsibility, it is also good for business.”
Based on Harkins’ book, “Managing Risk and Information Security: Protect to Enable,” the 10-part “Protect to Enable” webinar series is designed to provide management with a blueprint for building an effective organization-wide security posture. The series will begin with identifying organizational requirements for building a security program, and progress through understanding advanced threats and how to combat them with emerging technologies, then conclude with corporate responsibility and the role of the CISO.
The first webinar, “Cybersecurity and Risk Management for Advanced Threats,” kicks off the series on February 8, 2017. Steven Young, CISO of Blue Shield of California will join Malcolm as a guest presenter. Steven is responsible for the overall security program at Blue Shield of California, including evolving Information Security as a strategic imperative and a vital component to protecting Blue Shield’s brand, revenue and reputation. Previously, Steven was CISO and VP of Security and Risk Management for the Kellogg Corporation. In 2013, Steven was recognized as a Top 10 CISO recipient from the CISO Executive Leaders Forum, judged by members from the United States Department of Defense (DOD), Central Intelligence Agency (CIA), and peer group. Prior to Kellogg, Steven held leadership positions at Lucent Technologies, Lockheed Martin, Anderson Consulting, and Anheuser-Busch.
Webinar attendees will learn firsthand from Harkins and guest security experts as they describe a framework for managing cyber business risk, including:
- Misperceptions of risk
- The power of sharing information
- How people have become the perimeter
- Key threat activity areas
- Emerging security capabilities
- The ethics of managing information risk
- Performance coaching: discipline, teamwork and problem solving
“Security and first-person shooter video games have one obvious thing in common: if you’re not continuously moving, you’re dead,” said Patrick Heim, Head of Trust & Security, Dropbox. “In Managing Risk and Information Security: Protect to Enable, Harkins helps us move our thinking into areas of risk that have become more prominent over the past several years.”
Heim will be a guest presenter in the second webinar of the series titled “Cut Through the Risk Confusion: Shedding Light on Common Cyber Misconceptions” slated for March 1.
About Cylance® Inc.
Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cybersecurity to prevent the most advanced security threats in the world. Using a breakthrough predictive analysis process, CylancePROTECT® quickly and accurately identifies what is benign and what is a threat, and prevents malicious code from ever executing on a targeted system. By coupling advanced machine learning and artificial intelligence with a unique understanding of an attacker’s mentality, Cylance provides technology and services that are truly predictive and preventive against the most advanced threats. For more information please visit: www.cylance.com
Cylance and CylancePROTECT are registered trademarks or trademarks owned by Cylance Inc. in the United States and other jurisdictions and may not be used without prior written permission. All other trademarks are the property of their respective owners.