The Dawn of Frameworks and Measuring Cybersecurity Business Value
Free the CISO, a podcast series that attempts to free CISOs from their shackles so they can focus on securing their organization, is produced by CIO.com in partnership with DataBee®, from Comcast Technology Solutions.
In each episode, Robin Das, Executive Director at Comcast under the DataBee team, explores the CISO’s role through the position’s relationship with other security stakeholders, from regulators and the Board of Directors to internal personnel and outside vendors.
Presented by: Robin Das, Executive Director, Market Growth Strategy, DataBee
Since the dawn of cybersecurity, end users and vendors alike have focused on technologies and tools to protect, defend and respond to threats. After years of techno-speak, there is now a shift away from the technical and towards thinking about security in terms of business value. This presentation from the Gartner Security and Risk Summit in London, explores how frameworks are helping organizations measure this business value, and how unified, accurate and accessible data is essential to this effort.

Presented by: Robin Das, Executive Director, Market Growth Strategy, DataBee
Since the dawn of cybersecurity, end users and vendors alike have focused on technologies and tools to protect, defend and respond to threats. After years of techno-speak, there is now a shift away from the technical and towards thinking about security in terms of business value. This presentation from the Gartner Security and Risk Summit in London, explores how frameworks are helping organizations measure this business value, and how unified, accurate and accessible data is essential to this effort.

More posts


How Security Data Fabric is Helping Weave a New Era of Cybersecurity


Revolutionize your cybersecurity compliance program by making Continuous Controls Monitoring truly continuous
Discover how to revolutionize your cybersecurity compliance program with Continuous Controls Monitoring (CCM). Learn from DataBee experts how real-time visibility, a cybersecurity data fabric, and proactive strategies can transform compliance from a checkbox to a continuous advantage.