Hi [[ session.user.profile.firstName ]]

ISACA Online Events

  • Date
  • Rating
  • Views
  • Pragmatic Networking: One of Your Most Effective Career Tools Pragmatic Networking: One of Your Most Effective Career Tools Caitlin McGaw, President of Candor McGaw Inc. Recorded: Aug 25 2016 61 mins
    Business today still runs on the “it’s not what you know, but who you know” philosophy. Nevertheless, most professionals dislike the prospect of networking. It’s kind of like knowing you should be eating green stuff, like kale or spinach, but not having any salad with dinner. Numerous articles identify networking as a critical skill tied to leadership competency; it also increases your visibility for new opportunities and allows you to meaningfully giving back to your profession. You’ve heard it will make you stronger, smarter, and cooler…but you avoid it.

    Women in technology are still in the minority in IT audit, information security, IT GRC, and other related fields. It’s not surprising that many female IT professionals find it daunting to dive into networking opportunities, even when we know it could open doors and build our careers! Networking feels awkward, salesy, and self-serving. How do you even start?

    In this webinar, Caitlin McGaw will discuss the benefits of networking and then jump into practical methods for becoming an adept networker at work, conferences, or any professional event. She’ll also discuss how to leverage the unique advantages that women bring to the networking dynamic.

    You will learn:
    • How to overcome feeling nervous or awkward about networking
    • Women and networking – what we’ve got in our favor
    • Goal-setting for networking
    • The dynamics of networking – the give and take that makes it effective
    • What to listen for in networking conversations
    • Body language that will facilitate positive networking
    • How to close the loop and follow up after meeting a new contact
    • Caring for and feeding your network
  • Demystifying End Point Security and Global Threat Intelligence Demystifying End Point Security and Global Threat Intelligence Craig Jett, Security Product Portfolio Director, Dimension Data and David O'Berry, Worldwide Technical Strategist, Intel Recorded: Aug 23 2016 62 mins
    Over the last several years, there has been significant security industry focus on Advanced Persistent Threats and intelligence-driven security approaches to combat these threats. The challenge of most organizations is turning threat intelligence data from multiple sources into actionable, contextual information that can be utilized quickly and efficiently.

    This ISACA educational, cybersecurity webinar will focus on this integration of threat intelligence data within Security Operation Centers to improve threat detection, response and even predict future threats. The thought-leadership will also include key insights on end point security.
  • ISACA Presents: Building Capability with CMMI ISACA Presents: Building Capability with CMMI Alexander Stall, CMMI Practice Leader, CMMI Institute and Peter Tessin, CISA, CRISC, CGEIT, Technical Research Manager, ISACA Recorded: Aug 17 2016 62 mins
    Join Alex Stall, distinguished CMMI Practice Leader, as he provides an introduction to the Capability Maturity Model Integration (CMMI) and brief information on the synergy between CMMI Institute and ISACA. Peter Tessin, Technical Research Manager (COBIT) at ISACA will be on hand, in addition to Alex, at the end of the webinar to address questions about the relationship between ISACA and CMMI.

    CMMI Background: The Capability Maturity Model Integration (CMMI) maturity model is a framework of best practices initially developed 25 years ago for the United States Department of Defense (DoD) to identify suppliers that could provide consistent, high-quality software on-time. The associated appraisal method proved to be highly effective in identifying and maturing highly capable suppliers; this led to the framework’s use around the world and across almost every industry. Today the CMMI maturity model is used in over 100 countries and by some of the largest and most respected multinational companies in the world: Honeywell, HCL, Siemens, NASA, and more. The CMMI institute continues to evolve the framework and is currently working on the next generation of the model.
  • Top 5 Tips to Overcome Executive Challenges to Implement Data Classification Top 5 Tips to Overcome Executive Challenges to Implement Data Classification Bill Belcher, Vice-President of Sales & Business Development, Boldon James, Ltd. Recorded: Aug 11 2016 57 mins
    Employing data classification is now the best practice standard in the first step to achieving a holistic data-centric security strategy, but where do you start? And how do you overcome challenges to implement classification successfully in your organization?

    Join Bill Belcher, Vice-President – Sales & Business Development of Boldon James on this webinar where he will discuss 5 key approaches to overcome the challenges faced by today’s CISO and senior security professionals in implementing data classification.

    Bill will explore how using Data Classification can protect your most sensitive data, ensure compliance and help identify risky user behavior before it impacts your business. He will also discuss how data classification can be used successfully to protect data, transform security culture, and enhance existing security technologies such as DLP.

    Key takeaways will include:
    • How to approach defining and getting consensus on a data classification policy
    • Determining the right classification approach for your organization (automation vs. user driven)
    • Building the business case for data classification
    • How to communicate the value of data classification to stakeholders
    • Who is employing data classification successfully for competitive advantage
  • Effective Third-Party Risk Assessment – A Balancing Process Effective Third-Party Risk Assessment – A Balancing Process Brad Keller, Senior Director of Third-Party Risk & Compliance, Prevalent Recorded: Jul 26 2016 60 mins
    The key component of every third-party risk management program is the third-party assessment process. However, correctly balancing the growing need for broader and more in-depth assessment due diligence with the need to conduct assessments in a timely and cost-effective manner presents a difficult challenge. Third-parties continue to be the primary source of breach incidents, while regulatory and industry requirements for third-party due diligence continue to expand along with the need for more effective executive and board reporting.

    How do you satisfy the growing demand for more comprehensive assessment of third-party risk controls, without substantially increasing the cost and time for conducting assessments?

    Join us as we discuss how to analyze your third-party assessment process to find the best methods to balance these competing demands, and key ways to enhance your assessment process to be able to do more without increasing the time and cost of assessment due diligence.
  • IT/OT Convergence and Industrial Cybersecurity IT/OT Convergence and Industrial Cybersecurity Frank Schettini, CIO at ISACA, Marcus Sachs, Sr. VP and CSO at NERC, and Eric Cosman, ISA Executive Board Member Recorded: Jul 20 2016 62 mins
    Much has been written and presented on the topic of “IT/OT convergence”; a phrase used to describe the trend that is blurring the line between what have traditionally been well-differentiated classes of information technology based systems. The IT term has been retained as shorthand for the tradition business-oriented solutions, while the OT term has gained acceptance as a means of referring to the application of information technology in an Operations context (including automation).

    While this trend is well established, the full implications are still developing in areas such as the management and protection of systems against cybersecurity threats. The diversity of technologies involved ensures that there is effective collaboration across multiple disciplines. This webinar examines various aspects of this phenomenon and identifies specific implications for industrial control systems cybersecurity.

    You will learn about…
    • How this convergence has been developing over the years, and how it has shaped responses in many areas.
    • How the convergence is reflected in international standards for cybersecurity, such as ISA/IEC 62443.
    • The typical and needed responses from the various stakeholders.
    • The importance of consequence estimation for the asset owner.
    • The fundamental concepts that form the basis of the ISA/IEC 62443 standards and practices.
    • The resources available for those creating their cybersecurity management system.
  • How to Protect Yourself in the World with No Parameters How to Protect Yourself in the World with No Parameters Ruchin Kumar, Security Evangelist, Identity & Data Protection, Gemalto Recorded: Jul 6 2016 55 mins
    Let’s understand the new reality of data protection, which is dynamic and keeps improving itself to beat the bad guys. New technologies – like the cloud, mobility, virtualization – as well as the consumerization of IT are transforming how applications and services are delivered and how data and information is accessed.

    Perimeter security used to be enough. It used to be sufficient to put up a big wall around your sensitive information and encrypt that data between gated sites. That is no longer the case. Data is in more places than ever before and our enemies are not simpletons. The only way to be truly certain that your data is safe is to encrypt the data itself wherever it resides. At Gemalto we have coined the phrase “securing the breach.” Organizations have to expect that their “perimeter” security can and will be breached at some point; however, if the data behind the walls is encrypted, the breach is inconvenient – not detrimental.

    Join us for this interactive webinar where we will discuss:
    •Security of data in the cloud;
    •Strong identity authentication and authorization;
    •Best practices in encryption and key management;
    •What’s coming next and what to do now to remain on the safe side.
  • Breaking the Data Breach Kill Chain Breaking the Data Breach Kill Chain Dale R. Gardner, CA Technologies PAM Recorded: Jun 21 2016 60 mins
    Cybercrime costs the global economy $445 Billion a year, more than the worldwide illicit drug trade, and even the GDP of many countries. And, targeted breaches are increasingly a tool of nation-states seeking intellectual property, dossiers on influential individuals, and devastating disruptions of business operations.

    But for all their variety, each of these attacks share a common thread — a kill chain that exploits privileged users and their credentials to gain access to sensitive systems. Privileged access management is the most direct means of disrupting the kill chain and stopping attackers before they ever get started.

    Join CA Technologies Dale Gardner and ISACA in an informative discussion on how to break the kill chain.

    You will learn:
    • How risks from system breaches — and the potential for long-lasting damages — are increasing
    • How attackers exploit privileged users and their credentials in an ongoing string of data breaches and security incidents
    • How to master the processes and tools needed to easily disrupt the kill chain, stopping attackers in their tracks and preventing breaches.
  • Next-Gen GRC: Building a Road to GRC Maturity Next-Gen GRC: Building a Road to GRC Maturity Charlie Miller; Diana Kelley; Dave Newell; Patrick Potter Recorded: Jun 16 2016 58 mins
    The standards and expectations have never been higher for corporate governance, risk management, and controls that ensure institutions anticipate, evaluate, and mitigate risks and impacts to business operations. The need for efficient processes, automated controls and Governance Risk and Compliance (GRC) processes and solutions is evolving toward automating and connecting disparate risk disciplines to better identify, assess, manage, mitigate, monitor, and report on risks.

    Join RSA and a renowned GRC panel of experts for a live discussion on moving to the next generation of GRC solutions.

    You'll learn:
    • Where to begin – smaller corporations to global enterprises – makes a difference.
    • Baseline components of a GRC program.
    • Risk management practices, key challenges, and supporting technologies.
  • Key Lessons from the IT Audit Director Forums Key Lessons from the IT Audit Director Forums Frank Schettini, Chief Innovation Officer at ISACA Recorded: Jun 14 2016 58 mins
    The 2016 ISACA IT Audit Director Forums held in conjunction with North America and Euro CACS demonstrate what top IT Audit Leaders perceive as top challenges facing IT auditors. Among other topics, forum participants discussed challenges, opportunity and best practices related to Cybersecurity, Big Data, Regulation and Compliance, and Talent Hiring and Retention. This presentation will provide a look into the most significant conclusions drawn from these meetings and the role that ISACA plays in helping IT auditors meet new challenges.

    You will learn:
    • Top challenges facing IT Auditors
    • Key lessons emerged from the forums
    • Recommendations on how to build IT Audit experience that matches the new IT landscape

Embed in website or blog