Joshua Beeman
Assoc CIO and VP for IT,
University of Pennsylvania
You have created magnificent information security metrics, but now what? Three higher education IT leaders will share their stories about how they used metrics to start conversations, detect trends, explain and educate, and make the case to improve their institutional information information security programs. Learn their top tips to make your information security metrics work for you.
Learning outcomes: