2022 Planning

A Four-Part Webinar Series to Help Cybersecurity Teams Plan for Their 2022 Needs

The past two years have presented plenty of challenges for cybersecurity professionals with the rapid adoption of remote working and cloud services at the same time budgets shrank, workforce woes abounded and attackers thrived. We’re now starting to see some level of recovery and normalcy and hopefully that means a return of resources, but our cybersecurity challenges continue. As we enter the 2022 planning cycle, it’s critical to develop a clear strategy and prioritization for your security program, identifying what progress looks like, how you will measure it, how you will optimize the resources you have, and how the regulatory and news landscapes can help you drive support from your organization. This series will provide a range of content and topics to help you navigate the stressful 2022 planning period and process.


Free Planning Tool

To help security teams plan for 2022, our research team has created a planning deck for your organization to leverage. The deck includes all the usual questions and topics for planning, plus provides information on the threat and regulatory landscapes and current cybersecurity dynamics to help you make your business case to your leadership.

Download the resource here

The Series

On Demand
Designing Effective Strategies To Manage Supply Chain Risk

Virtually no organization can operate without some dependency on one or more partners or vendors. Understanding the risks associated with these dependencies is challenging, as is designing strategies to constructively mitigate, manage, and accept them. Tune in to this Rapid7 webinar to learn how to catalog your supply chain dependencies, quantify and communicate your exposure, and employ effective processes and procedures to manage this ever-increasing area of organizational risk.

North America:

Loren Morgan, VP, Global IT Operations, Infrastructure and Delivery at Owens & Minor International

Dan Walsh, CISO at VillageMD

Erick Galinkin, Principal Artificial Intelligence Researcher at Rapid7

Bob Rudis, Senior Director - Chief Security Data Scientist at Rapid7

EMEA:

Erick Galinkin, Principal Artificial Intelligence Researcher at Rapid7

Jen Ellis, Vice President of Community and Public Affairs at Rapid7

Bob Rudis, Senior Director - Chief Security Data Scientist at Rapid7

Carl Nightingale, Partner, Cyber Security & Digital Trust at PA Consulting

On Demand
On Demand
The Path To Effective Cybersecurity Program Maturity

Unfortunately, there is no magical djinn one can conjure up to instantaneously bring cyber-safety & resilience to all parts of your organization. Achieving the goal of having a truly impactful cybersecurity program requires planning, prioritization, and building partnerships with the rest of the organization. Tune into this Rapid7 webinar to discover how you can build a solid path to cybersecurity maturity — measuring progress along the way — all while adapting to the ever-changing threat and regulatory landscapes.

Bob Rudis, Senior Director - Chief Security Data Scientist at Rapid7

Erick Galinkin, Principal Artificial Intelligence Researcher at Rapid7

Wade Woolwine, Principal Operational Program Manager at Rapid7

On Demand
Webinar 3
A CISO’s view of 2022 Planning

We’ll be joined by an experienced CISO, who will share their approach to planning, including how they think about setting goals and priorities, allocate and optimize resources, and drive buy-in from leadership and the rest of the business.

North America:

Katie Ledoux, Chief Information Security Officer at Attentive

Bob Rudis, Senior Director - Chief Security Data Scientist at Rapid7

EMEA:

Simon Goldsmith, Director of Information Security at OVO Energy

Jen Ellis, Vice President of Community and Public Affairs at Rapid7

On Demand
Webinar 4
Common Cybersecurity Compliance Requirements

Compliance does not equal security, but it is also true that a strong cybersecurity program meets many compliance obligations. How can we communicate cybersecurity regulations in a more straightforward way that enhances understanding while saving time and effort? How can we more easily demonstrate that a robust cybersecurity program meets many compliance requirements?

Join Rapid7 as we present findings from our new white paper, “Simplifying the Complex: Common practices across cybersecurity regulations.” We identify commonalities among 10 major cybersecurity regulations, break down complicated regulatory text into a set of consistent cybersecurity practices, and organize the practices into core components of organizational security programs.

In addition, we provide insight into how organizations can operationalize the cybersecurity practices incorporated in regulations. This insight is based on Rapid7’s experiences of how we typically see organizations approach implementation. Finally, we touch on how cybersecurity solutions can help meet and exceed the cybersecurity practices commonly required by regulations.

Key Takeaways:

  • Quick overview of major cybersecurity regulations across sectors (mostly focused on the US).
  • Demonstration of the shared requirements in these regulations, and how these requirements translate to organizational cybersecurity practices.
  • Successful approaches and common challenges for organizations implementing these practices.

Harley Geiger, Senior Director - Public Policy at Rapid7

Brian Carey, Senior Manager - Advisory Services at Rapid7

On Demand

Register for the series.

Week 1 Designing Effective Strategies To Manage Supply Chain Risk
Week 2 The Path To Effective Cybersecurity Program Maturity
Week 3 A CISO’s view of 2022 Planning
Week 4 Common Cybersecurity Compliance Requirements
Week 1: Designing Effective Strategies To Manage Supply Chain Risk

Watch the Discussion

North America:

EMEA:

Week 2: The Path To Effective Cybersecurity Program Maturity

Watch the Discussion

Week 3: A CISO’s view of 2022 Planning

Watch the Discussion

North America:

EMEA:

Week 4: Common Cybersecurity Compliance Requirements

Watch the Discussion

Our response to the COVID-19 pandemic


Read our commitment