- About Us
- Events and Training
As the information security industry matures and information security increasingly becomes recognized as an important aspect of any enterprise organisation, there is greater and greater drive and aspiration to be able to ‘influence the board’. Whether you’re a partner at a Big4 consulting firm, a small independent business operator or even an internal Security Manager or CISO, attaining influence of an enterprise board is considered to be crucial to the success of any security programme.
Unfortunately, this approach is misguided and typically driven as a result of a misunderstanding of what the role of the board and its members are in defining and guiding the strategy of an organization. This typically results in wasted time, effort and precious resources. Worse yet, attempting to influence the board can have unintended consequences and actually impair your ability to effect organisational change.
This presentation will help attendees to better understand the role of the board, how boards function and why attempting to influence the board is largely a waste of time. We will also discuss the underlying psychology of influence and why it works; identify appropriate stakeholders within a typical enterprise organisation and how to apply the psychology of influence to those key stakeholders – ensuring that your security programme has the best chance of holistic adoption and ultimately, success.
1.5 hours, based on the assumption you have signed the attendance sheet when attending
Registration and Admittance
• Due to our sponsoring partner’s facilities, access requirements and for catering purposes, we request that you register for this event to ensure you are able to attend.
• Registration to this session is open and free of charge to all current and prospective ISACA members.
• A registration door prize will be drawn from the list of duly registered attendees.