Security Success Academy

On demand 4-part series exploring the fundamentals of an effective cybersecurity program.

What does a resilient cybersecurity program look like?

The Security Success Academy explores the fundamentals of an effective cybersecurity program, based on findings from the Security Outcomes Study, Vol. 2.

How do you take a sound security strategy and put it into practice? This 4-part series showcases cybersecurity professionals leading the charge at their organizations as they share their unique perspectives on the study and how you can apply them to your organization’s needs. Together, with Cisco Advisory CISOs and Talos, these experts engage in thought-provoking conversations that shine light on how they've developed strategies to build the most responsive and resilient cybersecurity programs possible.

Watch these recordings to:

  • Hear what security teams can do to strengthen their protocols and improve outcomes
  • Learn how organizations can proactively refresh their security tools and gain security resilience through tech connection
  • Find how to balance a skilled staff, efficient processes, and effective technology to drive security resilience
  • Discover what organizations can do to maintain business continuity and best practices to prepare for disruptive attacks
View the Security Success Academy series on-demand.
Submit the form below to access all recordings from this 4-part series.
* required fields




I understand I can unsubscribe at any time.

Session topics

Behind the data with Richard Archdeacon

We take a closer look at the data from our Security Outcomes Study, Vol. 2 and learn what security teams can do to strengthen protocols and improve outcomes without interrupting their employees' jobs.

A modern tech stack with Helen Patton

Well-integrated, up-to-date technology contributes to success more than any other factor. We explore how organizations can refresh their security tools and gain security resilience through tech connection.

The SecOps trinity with Dave Lewis

Great cybersecurity programs have three main components: a skilled staff, efficient processes, and effective technology. Learn how to balance each component to drive security resiliency.

Speed and resiliency with Wolf Goerlich

Don't leave resiliency to chance. Cyberattacks and outages have made business continuity and disaster recovery vital to successful cybersecurity programs. We discuss best practices to prepare for disruptive attacks.

Speakers

Richard Archdeacon

Advisory CISO, Cisco

Wouter Hindriks

Security Lead, Avit Group

Helen Patton

Advisory CISO, Cisco 

Kurt John

Chief Cybersecurity Officer, Siemens USA

Dave Lewis

Advisory CISO, Cisco

Martin Lee

EMEA Lead, Talos Strategic Planning & Communications

Wolfgang Goerlich

Advisory CISO, Cisco

Dan Turner

Chief Information Officer, Per Mar Security Services

Security Outcomes Study, Volume 2

Discover five actionable, data-backed practices that can boost your security.