#IMOS20 - Combatting Burnout and Stress for Infosecurity Leaders: How to Keep Our Industry Healthy

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Cybersecurity is a fascinating, fulfilling and fun industry to work in. However, along with the exciting highs of a job well done, CISOs and security leaders can face devastating lows, feelings of failure and immense pressure as part of the job.

As result, and as recent research has proven, stress and burnout has become a significant problem for CISOs and security leaders across the globe. This has led to a number of individuals quitting the industry, turning to drugs and alcohol to cope, or even suffering serious risks to their health.

Join a panel of experts as they discuss the reasons for and the impact of stress and burnout within security leadership roles, along with highlighting how to keep those in the industry supported and healthy.

Key takeaways:

  • The impact of stress and burnout in security leadership
  • The pressures of security leadership
  • How to lighten the CISO stress and burnout load

Speakers

Photo of Amanda Finch

Amanda Finch

General Manager. IISP

Photo of Neil Shah

Neil Shah

Chief De-Stressing Officer and Founder of The Stress Management Society

Photo of David  Slade

David Slade

Psychotherapist, CREST

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.