One Day Left to get an iPad Pro with Smart Keyboard, HP ProBook, or $350 Off with OnDemand & vLive!

Webcasts

To attend this webcast, login to your SANS Account or create your Account.

Security Leadership For Everyone: Personal Authority and Beyond

  • Friday, February 26, 2016 - 1:00 pm Canberra
  • Ted Demopoulos
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.

You can now attend the webcast using your mobile device!

Overview

Security Leadership is not a role for only those in charge. A leader is anyone who has followers: they may have followers because they are in a position of power, because they take initiative, or perhaps simply because they set a good example and people follow their lead.

Leaders have followers because they have some sort of "Authority." They may have "Positional Authority" because they are in charge, because of their position or title. They may have "Personal Authority," authority that is earned through actions. Many leaders have both: Positional Authority because they are in charge and Personal Authority because they have earned respect through their actions.

In this Webinar, we look at leadership and authority, discussing both types of authority and concentrating on what it takes to establish Personal Authority in security.

Security Leadership is not reserved for those "in charge" - Personal Authority can be earned by all of us.

Who should attend?
  • Technically skilled information security professionals who want to build and establish their leadership abilities with managers and other decision makers
  • Information security officers, both new and seasoned
  • Technical professionals that have recently been given leadership responsibilities
  • All other technical professionals who want to make more of a difference in their organizations

Speaker Bio

Ted Demopoulos

Ted Demopoulos' first significant exposure to computers was in 1977 when he had unlimited access to his high school's PDP-11 and hacked at it incessantly. He consequently almost flunked out but learned he liked playing with computers a lot. His business pursuits began in college and have been continuous ever since. His background includes over 25 years of experience in information security and business, including 20+ years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other businesses. Ted is a frequent speaker at conferences and other events, quoted often by the press. He also has written two books on Social Media, has an ongoing software concern in Austin, Texas in the virtualization space, and is the recipient of a Department of Defense Award of Excellence. In his spare time, he is also a food and wine geek, enjoys flyfishing, and playing with his children.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.