Hi [[ session.user.profile.firstName ]]

Accelerating Security Culture & Learning

Want to change up and mature your information security awareness and training program? Looking to deliver more content with limited resources? Not sure where to start? In 2020, as we all adjusted our professional and personal lives to navigate the COVID-19 pandemic, it would have been easy to do less, but Target did more by creating immersive online experiences. Learn from two of Target's leaders about how they launched an in-house, university style training program to build skills across info security and increased national cyber security awareness month engagement by 300%.
Recorded Jul 27 2021 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brenda Bjerke, Senior Director, Cybersecurity & Talya Gepner Director of Information Security Awareness & Training @ Target
Presentation preview: Accelerating Security Culture & Learning

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Accessibility by Design: A fresh approach to improve privacy and security Recorded: Sep 14 2021 58 mins
    Angie Max, Accessibility and Inclusive Design & Ramona Pierson Managing Director;Moderated by Jocelyn Aqua, Principal, PwC
    In the Fourth Industrial Revolution, where speed of technologies and products have no historical precedent, the risk to privacy and cybersecurity becomes greater. As we look to emerging technologies on the horizon as well as consider the accessibility challenges presented by today’s technology, privacy and security professionals alike need to rethink how their existing privacy-by-design approach can be enhanced by incorporating accessibility in all phases of development.

    This discussion will introduce the concept of accessibility in this context and raise the argument that, without accessibility, no privacy or security program is delivering its full value to the business, its employees or its customers. Join this discussion to learn more about:
    ● How digital accessibility can improve privacy and security programs
    ● The basics of designing with accessibility in mind
    ● How innovative technologies power accessibility
    ● Key actions that privacy and security professionals can deploy immediately

    Angie Max, Accessibility and Inclusive Design Lead, Governance, Privacy and Ethics - PwC US
    Ramona Pierson, Managing Director, Head of Product Innovation for Societal Change - PwC US
    Moderated by: Jocelyn Aqua, Principal, PwC US
  • Accelerating Security Culture & Learning Recorded: Jul 27 2021 60 mins
    Brenda Bjerke, Senior Director, Cybersecurity & Talya Gepner Director of Information Security Awareness & Training @ Target
    Want to change up and mature your information security awareness and training program? Looking to deliver more content with limited resources? Not sure where to start? In 2020, as we all adjusted our professional and personal lives to navigate the COVID-19 pandemic, it would have been easy to do less, but Target did more by creating immersive online experiences. Learn from two of Target's leaders about how they launched an in-house, university style training program to build skills across info security and increased national cyber security awareness month engagement by 300%.
  • Executive Order – what does this mean to you? Recorded: Jun 23 2021 45 mins
    Lisa O'Connor & Kelly Bissell, Accenture Security & Ann Johnson, Microsoft & Dr. Sezaneh Seymour, National Security Council
    The new Executive Order moves quickly to address greater transparency and information sharing of cyber-attacks and breaches – what does this mean to you?

    We will take a look at the forthcoming (draft of published) Executive Order on Cybersecurity from the White House.

    Spurred by the Solar Winds cyberattack, the Administration determined the need to improve the speed and efficiency of for incident investigation and responses and improving the security of software services.
    The EO proposes rapid and significant policy changes that will have broad implications for both public and private sectors.

    Highlights of the order include:
    • Significant increases in authority and resources for the government to run/coordinate/standardize the security of civilian federal networks (e.g., incident response playbooks, endpoint detection and response, logging event data).
    • Mandatory incident reporting to the federal government for every software and SaaS provider.
    • Removal of Federal and Defense contractual barriers which prevent sharing of data related to event prevention, detection and response
    • New requirements for software suppliers to attest to the security of their software development lifecycle.
    • A swift increase in the pace of federal government agencies to transition to the cloud and adopt a zero-trust model.

    Speakers: Lisa O'Connor, Managing Director, Global Cybersecurity Research and Development, Accenture
    Kelly Bissell, Sr. Managing Director, Accenture Security
    Ann Johnson, CVP Security, Compliance and Identity, Microsoft
    Dr. Sezaneh Seymour, Senior Advisor to the Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology on the National Security Council
  • Legal Considerations to Hosting Your Data and Operations in the Cloud Recorded: Jan 27 2021 61 mins
    Abeer Abu Judeh, Attorney, founder of LexDock & Galina Datskovsky, CEO Vaporstream
    Fireside Chat with Abeer Abu Judeh

    It is estimated that, in 2020, cloud services spending will reach $266.4 Billion and will surpass $1 Trillion in 2024. With limitless cloud services options such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), what are the legal considerations to keep in mind when developing your strategy to move your data and operations to the cloud.

    Beyond Basic Legal Terms: what are the essential terms to consider when assessing your cloud agreement?
    Data Storage: security, support, backups, e-discovery, migration and purging
    Data Privacy: access and use of all data related to employees, products and clients
    Risk: Liability, Indemnification, Insurance and Damages

    Preparing for a Globalized Work Environment
    Employee remote work policies
    Confidentiality agreements

    Enterprise Agreements and Their Impact on the Cloud Services Future
    Diversity and inclusion
    Corporate accountability

    To learn about our speakers please check out our page:
  • The Everchanging World of Privacy: Tips from a GC on How to Navigate Recorded: Dec 15 2020 22 mins
    Dawn Rogers General Counsel, Veracode
    When GDPR enforcement went into effect in May of 2018, business changed forever. For months leading up, General Counsels, C-Suite executives, marketers, infosec, engineers and just about everyone in an organization had to look at their business through the lens of privacy, for some, truly for the first time. But GDPR was the first mile of a privacy marathon. In this session, join Veracode General Counsel Dawn Rogers as she talks about the lasting and evolving impact of privacy regulations on today’s global businesses – and why businesses must be more agile in their approach to better understanding and planning for privacy law changes.
  • Future Proofing Against Bias in Tech Recorded: Nov 12 2020 39 mins
    Ann Johnson, Vasu Jakkal, Joy Chik, Edna Conway from Microsoft
    Investing in diverse cybersecurity teams isn’t just the right thing to do, the future of cybersecurity depends on it. If we do not devalue group think, cybercriminals will continue to exploit our bias’ and we become weaker to our adversaries. Microsoft’s Ann Johnson, Corporate Vice President of SCI Business Development, Vasu Jakkal Corporate Vice President of SCI Marketing, Joy Chik, CVP, Identity and Edna Conway, VP Security, Risk, & Compliance, share steps organizations can take internally and externally, to help future proof against bias in the cybersecurity industry.
  • How to increase the number of women in information security, risk management and Recorded: Oct 22 2020 46 mins
    Dana-Megan Rossi, Director Information Security Regions & Nastassia Tamari, Director Information Security Operations, BD
    Learn from 3 leaders at a global medical device company and constitute 50% of leaders in our division. We come from a diverse background: biomedical engineering, law and communication. We want to share with the audience why diverse background is a strength in information security. Each one of us is actively engaged in mentoring the young female generation of information security workforce. You will gain useful tips on how to achieve your full potential in information security, risk management and privacy while not missing out in life.

    Dana Megan-Rossi, Director, Information Security Threat & Vulnerability Management
    Inhel Rekik, Sr Director, Information Security Engineering, BD
    Nastassia Tamari, Incident Response Team Lead, Becton Dickinson
  • 2020 Executive Women's Forum Virtual Conference - Opening Keynote Recorded: Oct 21 2020 30 mins
    Joyce Brocaglia Founder, Executive Women's Forum and CEO of Alta Associates; CEO BoardSuited
    Joyce Brocaglia, Founder, Executive Women's Forum and CEO of Alta Associates; CEO BoardSuited
  • Cybersecurity is diverse. Your teams can be too. Recorded: Oct 20 2020 15 mins
    Sloane Menkes, Bhavana Nathani, Jane Allen, Aparna Giridharadas, Lakshmi Yendapalli
    Get perspectives from PwC cybersecurity professionals as they discuss PwC’s participation in the EWF Virtual Conference, diversity and inclusion commitments, and how PwC is effecting change and empowering women.

    Sloane Menkes, PwC, Cybersecurity, Privacy and Forensics Principal
    Bhavana Nathani, PwC, Cybersecurity, Privacy and Forensics Director
    Jane Allen, PwC, Cybersecurity, Privacy and Forensics Principal
    Aparna Giridharadas, PwC, Cybersecurity, Privacy and Forensics Director
    Lakshmi Yendapalli, Strategic Innovation & Technology Director, PwC
  • Incident Response & Truth In Advertising Recorded: Sep 25 2020 31 mins
    Cali Pitchel Schmidt, Porter Novelli, Vice President Strategic Planning
    Cali Pitchel Schmidt, Porter Novelli, Vice President Strategic Planning

    The internet has fundamentally changed the relationship between brands and consumers. The consumer has access to more information than ever before, and this shift in power has broad implications for the way in which brands talk to the market, especially in times of crisis or reputation risk. There are two non-negotiable rules for incident response—tell the truth and take responsibility. Being prepared (and proactive) is key to successfully navigating an always-on communications culture—in good times and in bad. In this session, we’ll cover how to operationalize the truth across your business before a crisis; the right time to think about reputation management; and how to communicate to your customers and the broader market in the case of an incident.
  • 2019 EWF Opening Keynote Recorded: Sep 24 2020 32 mins
    Joyce Brocaglia. CEO, Alta Associates, CEO, BoardSuited, Founder, Executive Women's Forum
    Joyce Brocaglia. CEO, Alta Associates, CEO, BoardSuited, Founder, Executive Women's Forum gives opening remarks for the 2019 Executive Women's Forum on Information Security, Privacy & Risk Management
  • When The Influence of Public Figures & Real Life Collide Recorded: Jul 30 2020 61 mins
    Rianette Leibowitz, Cyber Safety Change Agent, Founder of SaveTNet, Digital Parenting & Cyber Wellness Author
    We have seen the impact and power of social media especially on social issues, fake news and the influence of public figures. Brands are investing marketing budgets on public figures with the aim to influence consumer behaviour, while these influencers are exposing themselves to global opinions, addiction and unexpected sacrifices.
    Rianette Leibowitz, shares her involvement in the international documentary, PUBLIC FIGURE film, and some of her learnings working with schools, students and parents.

    What role do public figures actually play?
    How has this role changed since social media landscapes have been altered by the impact of COVID-19?
    What is all the fuss about and why could it become addictive?
    How are the algorithms and data influencing our decisions to click?
    What does responsible digital citizenship look like in the social media world?
    Cyber wellness and digital detox - why this should be high on your priority list.
  • Untapped potential: Millennials in the Cybersecurity Workforce Recorded: May 12 2020 59 mins
    Karolyn Maloney, Sr. Director-Global Security, CVS & Ariel Weintraub, Head of Security Operations & Engineering, MassMutual
    Just like our threat landscape continues to evolve and change, so does our workforce. With a projected workforce shortage in the cybersecurity field of 1.8M by 2022, we all need to be thinking creatively on how we recruit and retain top talent. There is untapped potential with the millennial generation, but many fear or make assumptions about this generation’s willingness to commit. This talk will debunk some assumptions made about millennials and offer techniques to use to keep these individuals engaged and develop their skill.
  • The Use of Artificial Intelligence: The Advantages and Challenges Recorded: Apr 23 2020 59 mins
    Lisa O’Connor, Managing Director-Accenture; Malek Ben Salem, NA Security R&D Lead-Accenture; Eve Maler, Interim CTO-ForgeRock
    Using artificial intelligence can have great advantages for businesses and society. With the rise of AI, and specifically Machine Learning, we have the ability to get intelligence from our data, creating new insights and accelerating our analysis and decision-making processes. Through AI, we enable voice, character and video recognition, we optimize plant and manufacturing operations, we enable autonomous vehicles. With these new methods for business insights, we also have new challenges understanding the new AI attack surface and how adversaries can exploit AI methods to achieve criminal or unintended outcomes. Each of your businesses is actively using or evaluating the use of AI in its near-term strategy. Join us as Lisa O’Connor, Managing Director, Cybersecurity R&D, Accenture moderates this discussion with two subject matter experts Malek Ben Salem, NA Security R&D Lead, Accenture and Eve Maler, Interim CTO, ForgeRock.

    Lisa O'Connor - Managing Director and Cyber Labs Lead, Accenture Security: Lisa is a senior executive at Accenture who leads our Global Security Research and Development for Accenture Technology Labs.

    Malek Ben Salem @malekcyber - NA Security R&D Lead, Accenture: Lead researcher at the intersection of Artificial Intelligence and Cyber Security. Over 20 years of experience developing first of a kind technology solutions. Dr. Malek Ben Salem was a NewAmerica Cyber Security fellow and is a regular guest with the CyberWire podcast.

    Eve Maler @xmlgrrl- Interim CTO for ForgeRockGlobally recognized strategist, innovator, and communicator on digital identity, security, privacy, and consent. Founder and leader of User-Managed Access (UMA) standards effort and provides expert advice to forums such as Open Banking. Co-inventor of the SAML and XML standards.
  • NICE Cybersecurity Workforce Framework Recorded: Apr 8 2020 61 mins
    Sarah Moffat and Lynn Terwoerds
    Companies across America are competing for cyber talent. With over 500,000 vacant cyber jobs, the competition is fierce. We've heard a lot of talk about recruiting creatively and 'overcoming the skills gap,' but what are the practical things organizations can do today to help bring in the talent? The NICE Cybersecurity Workforce Framework offers us the foundation of a solution. Join us for a BrightTalk about how to apply the Framework to not only retain your current cyber-ready workforce but recruit the workforce of the future

    The NICE Cybersecurity Workforce Framework outlines 52 work roles and the requisite knowledge, skills, abilities, and tasks needed to execute the roles. But how can companies apply the Framework to not only retain the current cyber-ready workforce but recruit cyber workers for the future?

    There are currently over 500,000 vacant cybersecurity jobs nationally, and a "very low" supply of cybersecurity workers. Major companies across the country are working hard to overcome this skills gap – competing with each other for cyber talent — through expanding recruitment, focusing on core requirements for jobs, and making career paths more understandable and accessible.

    Join us for a BrightTalk to discuss what practical solutions companies can employ starting today to bring in more talent. This is certainly a time to do more than talk about solutions -- this is a time to roll up our sleeves, get out there and recruit, reskill, and upskill our workforce. During this session, we'll not only talk about things companies can do today, but also ways that you can set yourself up for success in the future -- with a key element of the discussion focusing on the NICE Cybersecurity Workforce Framework and how to apply it for job, career, and professional development.
  • The Confidence Game: Managing your biggest insider threats Recorded: Mar 16 2020 37 mins
    Linda Dolceamore, Director of Leadership Development, EWF
    Join Linda to elevate your awareness of your internal confidence hacks and learn how to restore and elevate your confidence to make positive life changes. This program will focus on minimizing the fears and internal thoughts that undermine your confidence and AMPLIFY the voice that speaks to your greatness. Linda will empower you to cultivate what is best within you to enhance your life and your success.
  • Secure Communications in an Insecure World Recorded: Feb 28 2019 61 mins
    Dr. Galina Datskovsky
    Secure messaging is nothing new. During WWII, Winston Churchill required a secure channel to speak to Franklin D. Roosevelt. In today's business and geopolitical environments, it’s more than world leaders who require it. Join Dr. Galina Datskovsky for a fireside chat and explore the trends, risks and threat factors that make secure communications such a compelling and timely topic for healthcare, financial services, energy, government, consumers and more.

    About Dr. Galina Datskovsky:
    Dr. Galina Datskovsky, CRM, FAI and serial entrepreneur is an internationally recognized information governance, privacy, compliance, security and artificial intelligence expert. Galina is currently the CEO of Vaporstream®, a position where she applies her knowledge and strategic guidance in building businesses, product development, governance policies, as well as cybersecurity. Prior to Vaporstream, Galina held the position of Senior Vice President of Information Governance at Autonomy/HP; in addition she was General Manager of the Information Governance Business Unit and Senior Vice President of Architecture while at CA Technologies. She joined CA in 2006 with the acquisition of MDY Group International, where she was founder and CEO. Currently, Galina sits on the advisory board of the Executive Woman’s Forum and is also part of the Voice Privacy Alliance. She is a champion of the entrepreneurial spirit as she has served on the board of multiple startups assisting with strategy, and continues to support the startup community. Galina served as Chair, President, President Elect and Director of ARMA International (2007-2013) and has been widely published in academic journals, speaking frequently for industry organizations worldwide.
  • The Day Before GDPR Enforcement Recorded: May 24 2018 58 mins
    Lisa Berry-Tayman - Privacy and Information Governance Professional
    GDPR’s enforcement date begins May 25th – a day after this webinar. Is your organization ready? What if you are just getting budget for GDPR compliance efforts. What if you just learned about the GDPR and your organization is subject to this law. If any of these scenarios apply, this is the webinar for you!

    Lisa Berry-Tayman, a long-time privacy and information governance professional, will discuss:

    • Benefits of being fashionably late to the GDPR party
    • Getting your GDPR efforts back on track (or getting on the track for some folks)
    • Rethinking the timeline and action items (or creating a timeline and action items for some folks)

    Crawl out from underneath your desk, uncurl from the fetal position, and join us for a Executive Women’s Forum webinar on May 24th.
  • Playing Through the Pain: Strategies for Working in the Real World Recorded: Jan 18 2018 64 mins
    Richard Thieme, Author and Professional Speaker
    After 25 years of speaking and writing about the impacts of technologies on “the human in the machine,” Richard Thieme documented the traumatic consequences for security and intelligence professionals of swimming in dark and turbulent waters that challenged our abilities, our ethos, and sometimes our very identity. Who we thought we were came up against what we had to do and the friction threw off sparks.

    This webinar goes beyond those stories to explore in particular how what dominant cultures call “minorities” manage their unique challenges. Thieme has uncharacteristically lived as “a minority” in five different ways and the dynamics and resultant strategies he had learned port seamlessly to the experience of others. There’s more to it than “playing through the pain” - there’s real gold in discovering our capacities for the resilience, power, and self-transcendence intrinsic to the human condition.

    Beginning with the “real facts” of the matter, Thieme draws on his experience to suggest ways to make this game a long distance run, not a sprint, and not lose our selves along the way.
  • Hacking Diversity in Cybersecurity Recorded: Jul 26 2017 53 mins
    Joyce Brocaglia (Alta Associates, EWF) | Jason Painter (Queercon) | Angela Messer (Booz Allen Hamilton) | Suzanne Hall (PwC)
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -
    Cybersecurity investment has gone through the roof in recent years. Yet, there is a global shortage of qualified professionals to fill a growing number of open cybersecurity roles. According to a recent study by Frost & Sullivan, the global cybersecurity workforce will be short by around 1.8 million people by 2022.

    How do organizations cope with the growing demand for security professionals, especially in an age of ever-expanding attack surface and more frequent and sophisticated cyber attacks?

    Watch this live video panel of experts as they discuss the current trends shaping the cybersecurity industry, the need for diversity and inclusion, and strategies enterprises can employ to stay ahead of the game.

    - Joyce Brocaglia, Founder/CEO of Alta Associates & Founder of the Executive Women's Forum

    - Angela Messer, Senior Partner, Cyber Business and Talent Lead, Booz Allen Hamilton
    - Jason Painter, Co-Founder & President of Queercon, the largest social network of LGBT hackers in the world
    - Suzanne Hall, Managing Director, Advisory Services, PwC
Engage, develop, and advance women leaders
The Executive Women's Forum on Information Security, Risk Management & Privacy is the largest member organization serving emerging leaders as well as the most prominent and influential female executives in the Information Security, Risk Management and Privacy industries.
Website: www.ewf-usa.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Accelerating Security Culture & Learning
  • Live at: Jul 27 2021 7:00 pm
  • Presented by: Brenda Bjerke, Senior Director, Cybersecurity & Talya Gepner Director of Information Security Awareness & Training @ Target
  • From:
Your email has been sent.
or close