Information Security Officer Essentials: What Every ISO Must Know

July 27, 2026
Live Webinar:
DateJul 27, 2026Duration60 minutes
12:00 PM PDT01:00 PM MDT
02:00 PM CDT03:00 PM EDT
  • Unlimited connections for your institution
  • Available on desktop, mobile & tablet
  • Take-away toolkit
  • Presenter’s contact info for questions
On-Demand Webinar:
  • Unlimited & shareable access starting two business days after live stream
  • Available on desktop, mobile & tablet devices 24/7
  • Take-away toolkit
  • Ability to download webinar video
  • Presenter's contact info for questions
See Registration Options

When a cyber incident hits, examiners and accountholders will not ask IT what happened.

They will look straight at the Information Security Officer, and your program either stands up or falls apart in that moment. This session will equip ISOs to turn patchwork IT controls into a confident examiner-ready information security program that truly protects data and reputation.

KEY WEBINAR TAKEAWAYS
  • How information security, cybersecurity, and information technology relate to each other
  • Components of an information security program
  • Regulatory and industry cybersecurity frameworks that may impact your information security program

BONUS MATERIALS

  • Sample policy resources
  • Regulatory and industry cybersecurity framework resources

WEBINAR DETAILS

This webinar will assist Information Security Officers (ISOs) in developing and refining their information security program (ISP) at their organization. We will discuss how information security relates to information technology and cybersecurity and how an ISP encompasses each of these topics. We will also examine the general organization of an ISP and its major elements. Finally, we will review a few cybersecurity frameworks that you may use in your organization to guide your ISP.

WHO SHOULD ATTEND?

  • Chief Information Security Officer (CISO)/Information Security Officer (ISO)
  • Chief Information Officer (CIO)/Chief Technology Officer (CTO)
  • Chief Risk Officer (CRO)/risk manager
  • IT security management

TAKE-AWAY TOOLKIT

  • Employee training log
  • Interactive quiz
  • PDF of slides and speaker’s contact info for follow-up questions
  • Attendance certificate provided to self-report CE credits

NOTE: All materials are subject to copyright. Transmission, retransmission, or republishing of any webinar to other institutions or those not employed by your institution is prohibited. Print materials may be copied for eligible participants only.

Presented By

amy-mchughAmy McHugh
CyberAssurance
© 2026 FINANCIAL EDUCATION & DEVELOPMENT, INC