Security Priorities 2025

Wednesday, February 12, at 1:00 PM ET | 10:00 AM PT

Webinar Summary

AI has transformed the security landscape, and in 2025, IT leaders will need to protect against increasingly savvy threat actors. From dealing with typical attack vectors, such as phishing and credential capture attacks, to limitless possibilities for new vectors, including deepfakes and quantum computing, IT leaders will have to move far past a reactive security approach. 


Info-Tech’s Security Priorities 2025 report investigates five critical initiatives that IT leaders should prioritize in 2025 to balance their approach and spend across the triad of people, process, and technology.  
 

Join this insightful webinar to learn how you can safeguard your organization.

Webinar Speakers

 

 

Kate Wood

Associate Vice President, Research Development

  • Kate Wood is a Practice Lead in Security & Privacy, with a primary focus on helping clients align security activities to business objectives through strategic planning, risk management, compliance management, and policy development.

  • Kate has 25 years of experience in IT and information security, principally within the financial industry. Prior to joining Info-Tech Research Group, she spent six years managing the information security office for a global insurance and investments enterprise. In this role Kate led a team of analysts providing cybersecurity services across multiple companies and jurisdictions and was responsible for information security governance, vulnerability and penetration testing, security awareness, risk assessments, and security assurance during mergers and acquisitions. Kate’s expertise encompasses all aspects of security risk management, including compliance, control framework design, vendor risk management, and threat modeling. In addition, Kate has experience in security operations, security technologies, threat intelligence, and incident response. 

  • Ms. Wood has a master’s degree in Cyber Security from the University of Essex, and holds numerous security certifications including Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), and Certified in Risk and Information Systems Control (CRISC). She has also earned a Professional Certificate in Management from Western University.

 

 

Ahmad Jowhar

Research Specialist, Security & Privacy

  • Ahmad Jowhar is a Research Specialist in the Security and Privacy practice at Info-Tech Research Group. He has experience in data analytics research and was a research assistant at the Ted Rogers School of Management at Toronto Metropolitan University. His research focus was on utilizing analytical techniques to uncover insights on new ventures and assist stakeholders in making more informed decisions within the entrepreneurial ecosystem. 

  • Prior to Info-Tech, Ahmad worked in various government roles and assisted in process improvement projects as well as cybersecurity initiatives within the provincial healthcare sector. He holds a MSc in Management and a Bachelor of Commerce in Business Technology Management from Toronto Metropolitan University. 

 

Register for Our Webinar

About Us

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.