Event Image

🎤 Speaker Profile

Funsho Abraham, MSc, CISSP, CISM, PMP, CBAP, CPOA, is a visionary Information Security Leader, best-selling author, and coach with over 17 years of cross-industry experience. She is passionate about empowering professionals to see beyond the numbers;  transforming cybersecurity metrics into stories that inspire action, build trust, and shape smarter business decisions. With deep expertise in AI, cloud, compliance, and third-party risk, Funsho helps leaders and analysts alike bridge the gap between technology and strategy. 

Her mission is simple: to equip today’s professionals with the clarity and confidence to communicate risk, influence at the highest levels, and thrive in a future defined by digital threats and possibilities. 

🎯 Objective

To equip business analysts and leaders with the tools and mindset to transform cybersecurity data into compelling, business-aligned narratives—especially in the face of evolving threats like AI, cloud adoption, and third-party risk.

📘 Subject Overview

Business analysts are increasingly called upon to bridge the gap between technical cybersecurity teams and business decision-makers. As organizations face a growing wave of risks from artificial intelligence, cloud migration, and third-party dependencies, the ability to interpret and communicate security data has never been more essential.

This session will explore how business analysts can transform raw cybersecurity metrics into stories that resonate with executives, stakeholders, and cross-functional teams. Through practical examples and proven storytelling techniques, attendees will learn to position cybersecurity not just as a technical concern, but as a driver of business resilience and strategic value.

🚀 Attendees Will Learn

  • 🔑 How to identify the cybersecurity metrics that matter most for business analysis and reporting.

  • 🛠️ Practical methods to convert complex security data into clear, actionable insights.

  • 📖 Storytelling frameworks for presenting risk in a way that is persuasive and memorable.

  • 🎯 Techniques to connect security findings with organizational goals, KPIs, and strategic priorities.

  • 🤝 Strategies to strengthen influence as a business analyst by aligning cybersecurity with executive decision-making in the age of AI, cloud, and third-party risk.