Join us at the Rocky Mountain Hackfest, Live Online!! Virtual summit and courses take place June 4-13.


To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right.Once you register, you can download the presentaion slides below.

Security Leadership For Everyone: Personal Authority and Beyond

  • Thursday, February 25, 2016 at 9:00 PM EST (2016-02-26 02:00:00 UTC)
  • Ted Demopoulos

You can now attend the webcast using your mobile device!



Security Leadership is not a role for only those in charge. A leader is anyone who has followers: they may have followers because they are in a position of power, because they take initiative, or perhaps simply because they set a good example and people follow their lead.

Leaders have followers because they have some sort of "Authority." They may have "Positional Authority" because they are in charge, because of their position or title. They may have "Personal Authority," authority that is earned through actions. Many leaders have both: Positional Authority because they are in charge and Personal Authority because they have earned respect through their actions.

In this Webinar, we look at leadership and authority, discussing both types of authority and concentrating on what it takes to establish Personal Authority in security.

Security Leadership is not reserved for those "in charge" - Personal Authority can be earned by all of us.

Who should attend?
  • Technically skilled information security professionals who want to build and establish their leadership abilities with managers and other decision makers
  • Information security officers, both new and seasoned
  • Technical professionals that have recently been given leadership responsibilities
  • All other technical professionals who want to make more of a difference in their organizations

Speaker Bio

Ted Demopoulos

Ted Demopoulos' first significant exposure to computers was in 1977 when he had unlimited access to his high school's PDP-11 and hacked at it incessantly. He consequently almost flunked out but learned he liked playing with computers a lot. His business pursuits began in college and have been continuous ever since. His background includes over 25 years of experience in information security and business, including 20+ years as an independent consultant. Ted helped start a successful information security company, was the CTO at a "textbook failure" of a software startup, and has advised several other businesses. Ted is a frequent speaker at conferences and other events, quoted often by the press. He also has written two books on Social Media, has an ongoing software concern in Austin, Texas in the virtualization space, and is the recipient of a Department of Defense Award of Excellence. In his spare time, he is also a food and wine geek, enjoys flyfishing, and playing with his children.

Need Help? Visit our FAQ page or email

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.