For many organizations, cybersecurity ranks in the top five business risks for an organization. This is no surprise given the cyber incidents reported in the headlines putting all organizations on alert. While every employee can act as a first line of defense against a cyberattack, it is often a member of the IT C-suite who owns the security strategy, policy and deployment across an organization. Most would agree there are some security practices that apply to both IT or corporate environments and ICS/OT environments. As cybersecurity raises the risk equation, most organizations realize the two environments need to apply cybersecurity practices appropriate for their priorities. As a leader within an industrial organization, how do you influence security policy when you do not own the strategy? During this webinar, Willi Nelson, CISO for OT at Fortinet sits down with Matt Bunch, CISO for Tyson Foods to discuss how you can influence cybersecurity strategy and execution without having the authority or responsibility.
From this session, you’ll learn about:
- Strategies tried and applied to influence cybersecurity strategy given the different needs of ICS/OT environments
- Approaches for navigating change while building consensus
- Bridging the gap between people, process and technology
Field CISO for Operational Technology
Willi joined Fortinet as the CISO for Operational Technology in August 2022. He brings more than 25 years of experience in Information Security working across industry verticals such as Healthcare, Telecom, Financials, Manufacturing, and Life Sciences. Most recently with GlaxoSmithKline (GSK), he established and directed the Global OT Infrastructure Security team charged with monitoring and protecting the OT assets for GSK.
Sr. Director of Information Security/Cyber (CISO)
Tyson Foods, Inc.