www.getgsi.com
Open in
urlscan Pro
2606:2c40::c73c:671c
Public Scan
Submitted URL: https://info.getgsi.com/e3t/Ctc/ZT+113/cNBWD04/VWYDkP2fpfYtW90RXLZ70BQvvW1KLHGL52w-xvN9h9bGx5m_5PW50kH_H6lZ3mmW4DZmp53X7...
Effective URL: https://www.getgsi.com/webcasts/cybersecurity-webcast-7-challenges-a-vciso-can-help-your-company-address?utm_campaign=C...
Submission: On August 22 via api from US — Scanned from DE
Effective URL: https://www.getgsi.com/webcasts/cybersecurity-webcast-7-challenges-a-vciso-can-help-your-company-address?utm_campaign=C...
Submission: On August 22 via api from US — Scanned from DE
Form analysis
3 forms found in the DOM/hs-search-results
<form data-hs-do-not-collect="true" action="/hs-search-results">
<input type="text" class="hs-search-field__input" name="term" autocomplete="off" placeholder="Enter text here">
<input type="hidden" name="type" value="SITE_PAGE">
<input type="hidden" name="type" value="LANDING_PAGE">
<input type="hidden" name="type" value="BLOG_POST">
<input type="hidden" name="type" value="LISTING_PAGE">
<input type="hidden" name="type" value="KNOWLEDGE_ARTICLE">
<button aria-label="Search">Search</button>
</form>
/hs-search-results
<form data-hs-do-not-collect="true" action="/hs-search-results">
<input type="text" class="hs-search-field__input" name="term" autocomplete="off" placeholder="Enter text here">
<input type="hidden" name="type" value="SITE_PAGE">
<input type="hidden" name="type" value="LANDING_PAGE">
<input type="hidden" name="type" value="BLOG_POST">
<input type="hidden" name="type" value="LISTING_PAGE">
<input type="hidden" name="type" value="KNOWLEDGE_ARTICLE">
<button aria-label="Search">Search</button>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/6549045/2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef
<form id="hsForm_2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/6549045/2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef"
class="hs-form-private hsForm_2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef hs-form-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef hs-form-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_dc35363f-9357-49ce-9436-eab4a37c887a hs-form stacked hs-custom-form"
target="target_iframe_2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" data-instance-id="dc35363f-9357-49ce-9436-eab4a37c887a" data-form-id="2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef" data-portal-id="6549045" data-hs-cf-bound="true">
<fieldset class="form-columns-2">
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" class="" placeholder="Enter your First name"
for="firstname-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170"><span>First name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="firstname-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" name="firstname" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
</div>
<div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field"><label id="label-lastname-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" class="" placeholder="Enter your Last name"
for="lastname-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170"><span>Last name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="lastname-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" name="lastname" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_company hs-company hs-fieldtype-text field hs-form-field"><label id="label-company-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" class="" placeholder="Enter your Company name"
for="company-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170"><span>Company name</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="company-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" name="company" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="organization" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" class="" placeholder="Enter your Email"
for="email-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170"><span>Email</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
</fieldset>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1692725283757","formDefinitionUpdatedAt":"1691681006461","lang":"en","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67","pageTitle":"Cybersecurity Webcast: 7 Challenges a vCISO Can Help Your Company Address","pageUrl":"https://www.getgsi.com/webcasts/cybersecurity-webcast-7-challenges-a-vciso-can-help-your-company-address?utm_campaign=Cybersecurity%202022-2023&utm_medium=email&_hsmi=271295247&_hsenc=p2ANqtz-_TsckQMKl4l5o_aa43k5KeoP8wFoLxCoBE4f4KHA78WCAW5cgw13DihSwqkAqwp0ULrV7pK4TEzvl4ZeF9b8MchdkgrA&utm_content=271295247&utm_source=hs_email","pageId":"128017125545","urlParams":{"utm_campaign":"Cybersecurity 2022-2023","utm_medium":"email","_hsmi":"271295247","_hsenc":"p2ANqtz-_TsckQMKl4l5o_aa43k5KeoP8wFoLxCoBE4f4KHA78WCAW5cgw13DihSwqkAqwp0ULrV7pK4TEzvl4ZeF9b8MchdkgrA","utm_content":"271295247","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://www.getgsi.com/webcasts/cybersecurity-webcast-7-challenges-a-vciso-can-help-your-company-address","contentType":"blog-post","hutk":"3ec6ea340dc3390cc74f04fe6403056d","__hsfp":473076622,"__hssc":"182527097.1.1692725285436","__hstc":"182527097.3ec6ea340dc3390cc74f04fe6403056d.1692725285436.1692725285436.1692725285436.1","formTarget":"#hs_form_target_form_11393659","formInstanceId":"2170","rawInlineMessage":"<p>Thanks for submitting the form!&nbsp;</p>","hsFormKey":"26a42a70a1110f09e484a962818732d4","pageName":"Cybersecurity Webcast: 7 Challenges a vCISO Can Help Your Company Address","locale":"en","timestamp":1692725285451,"originalEmbedContext":{"portalId":"6549045","formId":"2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef","region":"na1","target":"#hs_form_target_form_11393659","isBuilder":false,"isTestPage":false,"isPreview":false,"formInstanceId":"2170","formsBaseUrl":"/_hcms/forms","css":"","inlineMessage":"<p>Thanks for submitting the form!&nbsp;</p>","isMobileResponsive":true,"rawInlineMessage":"<p>Thanks for submitting the form!&nbsp;</p>","hsFormKey":"26a42a70a1110f09e484a962818732d4","pageName":"Cybersecurity Webcast: 7 Challenges a vCISO Can Help Your Company Address","pageId":"128017125545","contentType":"blog-post","formData":{"cssClass":"hs-form stacked hs-custom-form"},"isCMSModuleEmbed":true},"correlationId":"dc35363f-9357-49ce-9436-eab4a37c887a","renderedFieldsIds":["firstname","lastname","company","email"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.3544","sourceName":"forms-embed","sourceVersion":"1.3544","sourceVersionMajor":"1","sourceVersionMinor":"3544","_debug_allPageIds":{"embedContextPageId":"128017125545","analyticsPageId":"128017125545","pageContextPageId":"128017125545"},"_debug_embedLogLines":[{"clientTimestamp":1692725283903,"level":"INFO","message":"Retrieved customer callbacks used on embed context: [\"getExtraMetaDataBeforeSubmit\"]"},{"clientTimestamp":1692725283903,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Cybersecurity Webcast: 7 Challenges a vCISO Can Help Your Company Address\",\"pageUrl\":\"https://www.getgsi.com/webcasts/cybersecurity-webcast-7-challenges-a-vciso-can-help-your-company-address?utm_campaign=Cybersecurity%202022-2023&utm_medium=email&_hsmi=271295247&_hsenc=p2ANqtz-_TsckQMKl4l5o_aa43k5KeoP8wFoLxCoBE4f4KHA78WCAW5cgw13DihSwqkAqwp0ULrV7pK4TEzvl4ZeF9b8MchdkgrA&utm_content=271295247&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Edg/92.0.902.67\",\"urlParams\":{\"utm_campaign\":\"Cybersecurity 2022-2023\",\"utm_medium\":\"email\",\"_hsmi\":\"271295247\",\"_hsenc\":\"p2ANqtz-_TsckQMKl4l5o_aa43k5KeoP8wFoLxCoBE4f4KHA78WCAW5cgw13DihSwqkAqwp0ULrV7pK4TEzvl4ZeF9b8MchdkgrA\",\"utm_content\":\"271295247\",\"utm_source\":\"hs_email\"},\"pageId\":\"128017125545\",\"isHubSpotCmsGeneratedPage\":true}"},{"clientTimestamp":1692725283904,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1692725285446,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"3ec6ea340dc3390cc74f04fe6403056d\",\"canonicalUrl\":\"https://www.getgsi.com/webcasts/cybersecurity-webcast-7-challenges-a-vciso-can-help-your-company-address\",\"contentType\":\"blog-post\",\"pageId\":\"128017125545\"}"}]}"><iframe
name="target_iframe_2ea77ac7-b1d1-4857-b7f1-aeeeb3a70eef_2170" style="display: none;"></iframe>
</form>
Text Content
* JD Edwards * Overview * JD Edwards EnterpriseOne * License Resale * JD Edwards Consulting * Managed Services * Upgrades * Orchestrator Services * Cloud Migrations * Implementations * Business Assessments * Database Management * Project Recovery Services * Custom Development * Security Practice * World Services * Case Studies * Industries * Manufacturing * Distribution * Consumer Packaged Goods * Engineering/Construction * Real Estate * Healthcare/Life Sciences * Public Sector * Energy and Utilities * Food and Beverage * Professional Services * Partners * Custom Solutions * GENIUS AI – Augmt. Intel. * GENISYS Perf. Optimizer * RapidReconciler * GlobalNext * NetSuite * Overview * NetSuite Support (GSI SuiteCare) * NetSuite Project Rescue (GSI SuiteAlign) * Industries * Alcohol Distribution * Private Equity * Food and Beverage * Health and Beauty * Manufacturing * Nonprofits * Software * Wholesale Distribution * Healthcare * Medical Practices * Retail Companies * Advertising and Digital Marketing * Service Companies * CPA Firms * Case Studies * Switching to NetSuite * Microsoft GP to NetSuite * QuickBooks to NetSuite * NetSuite Pricing * Partners * Tomorrow's Solutions * Overview * HubSpot * Application Modernization * BMC * RemLink – BMC Remedy Flexera Integration * Cloud Infrastructure * ServiceNow * GatewayNow * Enterprise Applications * Cybersecurity * Overview * vCISO Services * Managed SIEM * Assessments * Application Security Testing * Cybersecurity Awareness Training * Security Rating / Vendor Risk Mgmt. * Zero Trust Security * Resources * Case Studies * Blog * Newsletters * Webcasts * Whitepapers * Events * About Us * Company Overview * Careers * Contact Us * News Search Get in Touch Search * JD Edwards * Overview * JD Edwards EnterpriseOne * License Resale * JD Edwards Consulting * Managed Services * Upgrades * Orchestrator Services * Cloud Migrations * Implementations * Business Assessments * Database Management * Project Recovery Services * Custom Development * Security Practice * World Services * Case Studies * Industries * Manufacturing * Distribution * Consumer Packaged Goods * Engineering/Construction * Real Estate * Healthcare/Life Sciences * Public Sector * Energy and Utilities * Food and Beverage * Professional Services * Partners * Custom Solutions * GENIUS AI – Augmt. Intel. * GENISYS Perf. Optimizer * RapidReconciler * GlobalNext * NetSuite * Overview * NetSuite Support (GSI SuiteCare) * NetSuite Project Rescue (GSI SuiteAlign) * Industries * Alcohol Distribution * Private Equity * Food and Beverage * Health and Beauty * Manufacturing * Nonprofits * Software * Wholesale Distribution * Healthcare * Medical Practices * Retail Companies * Advertising and Digital Marketing * Service Companies * CPA Firms * Case Studies * Switching to NetSuite * Microsoft GP to NetSuite * QuickBooks to NetSuite * NetSuite Pricing * Partners * Tomorrow's Solutions * Overview * HubSpot * Application Modernization * BMC * RemLink – BMC Remedy Flexera Integration * Cloud Infrastructure * ServiceNow * GatewayNow * Enterprise Applications * Cybersecurity * Overview * vCISO Services * Managed SIEM * Assessments * Application Security Testing * Cybersecurity Awareness Training * Security Rating / Vendor Risk Mgmt. * Zero Trust Security * Resources * Case Studies * Blog * Newsletters * Webcasts * Whitepapers * Events * About Us * Company Overview * Careers * Contact Us * News Get in Touch CYBERSECURITY WEBCAST: 7 CHALLENGES A VCISO CAN HELP YOUR COMPANY ADDRESS CYBERSECURITY VETERANS REVEAL HOW COMPANIES GET THE BENEFITS OF AN ACCOMPLISHED CYBERSECURITY LEADER WITHOUT COMMITTING EXPONENTIAL SEARCH AND SALARY RESOURCES In an era of ever-evolving digital threats, safeguarding your organization's data and assets is paramount. As a result, the Virtual Chief Information Security Officer (vCISO) has emerged as a pivotal leader who can fortify a company’s cybersecurity posture without the traditional burdens of long-term costs and commitment. During the Webcast John Bassett, GSI CISO and Brian Liceaga, President at Nitra Security, explore seven imperatives of a vCISO in a round-robin conversational format: 1. Prohibitive Costs: Overcoming the financial strain of hiring a full-time CISO. 2. Lack of Expertise/Limited Resources: Accessing specialized resources when you lack in-house capabilities. 3. Navigating Complexity: Addressing multifaceted cybersecurity challenges with strategic guidance. 4. On-Demand Workload Needs: Meeting short-term and long-term workload surges while handling CISO transitions seamlessly. 5. Confidence in Compliance: Streamlining compliance and regulatory adherence with a vCISO's oversight. 6. C-Suite Serenade: Enabling seamless communication between IT and C-suite and fostering executive buy-in. 7. Strategic / Top-level Problem Solving: Leveraging top-level strategic skills to tackle immediate issues and present challenges to the board. More information about our presenters: * John Bassett, GSI’s Chief Information Security Officer and Chief Technology Officer, brings over 25 years of CISO, CTO, software engineering, and ERP technology expertise, making him a seasoned cybersecurity and IT veteran. * Brian Liceaga, President at Nitra Security, offers a diverse and comprehensive cybersecurity strategy experience, helping clients prioritize and mitigate enterprise risks. Whether you're an IT professional or a business leader (CISO, CIO, CTO, CFO), this webcast is tailored to elevate your understanding of the immense value a vCISO can bring to your organization. Don't miss this exclusive opportunity to master the art of cybersecurity preparedness. REGISTER TO ATTEND: First name* Last name* Company name Email* SaaS, Cybersecurity, cyberattack, Webinars, webcast Get in Touch Company Corporate Office: 6595 Roswell Rd Ste G PMB 4003 Atlanta, GA 30328 Phone Number: (855)-474-4377 * About GSI * Careers * Contact Us * Resources * Case Studies * Blog * Newsletters * Webcasts * Whitepapers * Tomorrow's Solutions * Application Modernization * BMC * Cloud Infrastructure * Cybersecurity * ServiceNow * HubSpot © 2023 GSI All rights reserved | word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1