Event

How can Security leaders make the most of their first year in a new role?

Community Event

Virtual Roundtable
08 October 2020
6pm

There are only 12 places available so please register your interest early.

Hosted by Amy Lemberger, Information Security Director at Gamma and Manoj Bhatt, Head of Cyber Security Advisory and Consulting at Telstra Purple EMEA.

Why attend?

The New in Role Dinner Debates provide an opportunity for technology to hear the experiences of their peers and discuss their current challenges in a safe and congenial environment. Come prepared to share: bring along your tips and best practices, and benefit from the power of collective wisdom.

Themes for discussion may include:

  • Aligning personal priorities with business priorities at onset of role.
  • Defining leadership in your position.
  • How to balance fixing immediate problems with making strategic improvements?
  • Examples of ‘quick wins’ to build trust and credibility early.
  • Relationship-building tactics for internal and external stakeholders.
  • Plans for attracting and nurturing talent within your team.
  • Managing your mental health and those of the team.
Event Details:

Date
08 October 2020

Time
6pm

Location
Virtual Roundtable

Register here

Related Insights

The Cybersecurity needed to fight state sponsored attacks

In this edition of AI Magazine, Manoj Bhatt contributes his perspective on the rising threats and vulnerabilities that have emerged during the global pandemic and how business security must adapt.

Learn more

The critical role of mobile and cloud security for business success

Following our recent survey of industry leaders to identify the main enablers of business agility, Manoj Bhatt highlights the essential mobile and cloud security components that business must include in their move forward approach.

Learn more

Easing the headache of third-party risk assessments

Manoj Bhatt joins an Infosecurity Magazine panel talk explaining how security teams can conduct efficient and accurate assessments of the security vulnerabilities in third parties.

Learn more