CISO Trainings , Critical Infrastructure Security , Information Sharing

Cyber Maturity and the Board: Delivering the Right Message

ISACA'S Kelly Hood on How to Improve Communication with Board, Senior Leaders
Kelly Hood, executive vice president and cybersecurity engineer at Optic Cyber Solutions

Cybersecurity has the board's attention these days - the daily headlines assure that. But how does a security leader keep that attention and also win over other key stakeholders in the enterprise? Kelly Hood shares guidance rooted in ISACA's CMMI Cybermaturity Platform.

In this video interview with Information Security Media Group, Hood discusses:

  • Where some security leaders stumble in board communication;
  • How to win over and influence key business stakeholders;
  • The role of the CMMI Cybermaturity Platform in guiding discussions.

For more on cyber maturity, see The New Road Map to Cybersecurity Maturity.

For more information on ISACA’s cyber security solutions, please visit here.

Hood assists organizations in implementing cybersecurity and privacy best practices, controls and standards to manage risks and meet compliance goals. She supports organizations across industries as a CMMC registered practitioner by developing and implementing cybersecurity strategies to help manage the risks to their business. As a member of the NIST Cybersecurity Framework team, she supported the evolution and outreach of the Cybersecurity Framework through the current version. She also has been supporting the development and expansion of ISACA's CMMI Cybermaturity Platform. The patent-pending approach she helped develop for ISACA translates cybersecurity risk to cyber maturity goals and identifies mitigation strategies to help organizations improve their cybersecurity capabilities.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.