Mark Lex, CSO of Abbott Laboratories, spoke next about Strategic Planning: Developing the Plan that Works for You.After Burrill’s inspirational turn and Rosen’s philosophical turn, it seemed appropriate to head for the practical and tactical. Lex laid out in a straighforward manner Abbott’s method of strategic planning for security, using real documents from Abbott Labs. This was solid risk management at work, or, as Lex put it, “The how of achieving the what.”The most intriguing slide Lex showed was one he used internally to influence executives on security. It was called “Advocates and Assassins,” and it was his company’s org chart (names and titles removed) with each position on the chart rated Red, Yellow or Green, representing the obvious corresponding friendliness of that executive to the security program. Rating the executives this way has helped Lex figure out who to influence and how to turn reds to yellows and yellows to greens, often by influencing Greens who work under Reds to “influence up.” Good stuff. And very useful. Related content feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO CSO and CISO C-Suite news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe