Hi [[ session.user.profile.firstName ]]

How 2020 Changed Cyber Risk Management

Almost overnight COVID-19 upended everyday life as we knew it. A risk that we didn’t even know we faced took center stage both personally and professionally. In this webinar, learn how businesses’ approach to cyber risk management changed in 2020, including:
- What’s driving cyber risk mitigation decisions today—and what’s very different than it was on January 1
- Important factors to consider when re-prioritizing your cyber mitigation initiatives
- Factoring in systemic or cascading risk to measure cyber risk across an entire company portfolio
- Innovative ways to manage and communicate risk
Recorded Jun 4 2020 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jerry Caponera, VP Cyber Risk Strategy
Presentation preview: How 2020 Changed Cyber Risk Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • ISSA Thought Leadership Series: BEC Attacks - Who's Impersonating Whom? Jun 17 2020 5:00 pm UTC 60 mins
    ISSA International
    The 2019 HMSS Cybersecurity Survey indicated that email is the initial point of compromise for healthcare cyber-attacks, with Business Email Compromise (BEC) becoming the favored tactic by cybercriminals. Because BEC emails do not carry malicious payload and are narrowly targeted, it’s difficult for health institutions to detect these attacks. With overall losses of more than $1.7 billion in 2019, BEC attacks are quickly becoming a significant headache for healthcare CISOs. Join us for a deep dive into the dos and don’ts when it comes to BEC, and best practices to mitigate against risk of this vital attack vector.
  • Forecasting Cyber Threats Post Pandemic Jun 15 2020 7:00 pm UTC 44 mins
    Richard Stiennon, Kurtis Minder, Jessica Gulick
    The world has changed, and so has your threat landscape. Join us for a discussion on how cyber attacks have pivoted their tactics and targets. From the latest on phishing kits to video threats, our experts will explore how changes in motives and targets is disrupting and increasing our threat landscape. Learn how to reframe your understanding of your threat profile and better defend and respond to these attacks.

    Our featured experts for this webinar include Richard Stiennon, chief research analyst at IT-Harvest and Kurtis Minder, CEO of GroupSense, GroupSense is a digital risk management company that delivers customer-specific intelligence.
    Here’s What Will Be Discussed:

    1) Threat actors are adapting their tactics and targets
    2) Changes in motives and targets are disrupting and expanding the threat landscape
    3) Understanding your threat profile to create a better cyber defense strategy.
  • ISSA Thought Leadership Series: Preventing Burnout and Dealing with Adversity Jun 11 2020 4:00 pm UTC 120 mins
    ISSA International
    We hear so much about "burnout" these days. A 2019 Blind survey from tens of thousands of Tech professional indicated that 57.1% of them self-identify as "burned out." As a former serial CISO for iconic companies including Microsoft, our speaker, Karen Worstell, did the burnout saga not once, but twice, even pushing to the limits where her stress-related illness caused the loss of the use of her left arm for a year. It was in her training for the chaplaincy fellowship in Palliative Care at the VA that she fully understood the dynamics behind chronic unmanaged stress and its manifestations. in this two hour webinar, she will educate, motivate and inspire you to understand how to flameproof your career and handle adversity like a boss with actionable strategies you can use for yourself, your team, and your loved ones. You can download a completely free version of the workbook for this seminar at https://BeAnAlly.today.
  • How the Next Normal will require an Updated Cyber Strategy Jun 10 2020 5:00 pm UTC 60 mins
    ISSA International
    As organizations begin to embrace some degree of change coming out of recent global events, it is hard for business and security professionals to determine what the impact to their security strategy will be. Leaders also have to evaluate which “quick-fixes” came with too much risk, and what changes to the strategy to secure internet-facing perimeter are required. In this talk, Advisory CISO at Akamai, Steve Winterfeld and Director of Technology & Security Strategy, also at Akamai, Tony Lauro will review some of the issues that need to be addressed as we establish a new baseline for both our employees and customers that will protect operations based on new business models.
  • Continuous Audit - Achieve More Through Analytics Jun 9 2020 4:00 pm UTC 50 mins
    Greg Jordan (Nationwide), Pat Shanahan (Nationwide), Emigdio Zambada (Nationwide), and Brian Sampsel (Covail)
    In honor of International Internal Audit Awareness Month (May 2020), come hear from Greg Jordan, Nationwide's Senior Vice President and Chief Audit Executive, Pat Shanahan, AVP Information Technology Audit Office, Internal Audit and Emigdio Zambada, Nationwide's IA Data Analytics Director, discuss how their department expanded the use of data & analytics by building a continuous auditing program in the cloud. Partnering with Covail, they leveraged advanced analytics like AI and have provided education and resources to all of their auditors to enhance their data analytics skill set.
  • ISSA Thought Leadership Series: Women in Security Special Interest Group Recorded: Jun 4 2020 61 mins
    ISSA International
    Jari will share her professional and personal experience to help you at any stage of your career in cyber security. She will share her own standouts, how those apply to her hiring and to her own career success—and yours.

    •You will gain insights and best practice in this series on how you can build new skills, while staying engaged for the long haul in our current global turmoil. We’ll bring to the table with our Guest Expert Speakers, successful strategies and approaches to security today and going forward, for women—and anyone—globally

    •You will be able to apply these to your current and future career in our field, to sustain or grow, at entry, mid-career, senior and executive level, or in transition, whether you hold a senior role, or aspire to something different than where you are today.

    •Think Big! And yet, at the smallest detail, what can you do to improve your opportunities at any stage? Our executive women will help you become more conscious of where opportunities best exist today for any of us, as an employee, executive, consultant, business owner, entrepreneur, or hiring manager. We will help you sustain for today, and build for your future.
  • How 2020 Changed Cyber Risk Management Recorded: Jun 4 2020 44 mins
    Jerry Caponera, VP Cyber Risk Strategy
    Almost overnight COVID-19 upended everyday life as we knew it. A risk that we didn’t even know we faced took center stage both personally and professionally. In this webinar, learn how businesses’ approach to cyber risk management changed in 2020, including:
    - What’s driving cyber risk mitigation decisions today—and what’s very different than it was on January 1
    - Important factors to consider when re-prioritizing your cyber mitigation initiatives
    - Factoring in systemic or cascading risk to measure cyber risk across an entire company portfolio
    - Innovative ways to manage and communicate risk
  • ISSA Thought Leadership Series: CCPA Enforcement: What to Expect after July 1st Recorded: Jun 3 2020 61 mins
    ISSA International
    Signed into law on June 28, 2018, the California Consumer Privacy Act (CCPA) became effective on January 1, 2020. The next milestone will be on July 1, 2020, when the California Attorney General will begin enforcement for the CCPA. Non-compliance can result in the maximum fine of $7,500 per violation. When you consider how many consumer records you hold, the potential fines could stack up quickly if you don't take CCPA seriously. Since July 1st has yet to come, we still don’t know how enforcement will play out for companies, but the Attorney General has established a firm stance on compliance, and there are several indicators of his intent to firmly enforce. In this webinar we’ll cover the key indicators of enforcement and what you can do to prepare. We’ll also review the final version of the modified CCPA regulations.

    Speaker: Dan Clarke, President – IntraEdge

    Speaker: Dominique Shelton Leipzig, Partner Privacy & Security- Perkins Coie LLP
  • Continuous Audit - Achieve More Through Analytics Recorded: May 29 2020 50 mins
    Greg Jordan (Nationwide), Pat Shanahan (Nationwide), Emigdio Zambada (Nationwide), and Brian Sampsel (Covail)
    In honor of International Internal Audit Awareness Month (May 2020), come hear from Greg Jordan, Nationwide's Senior Vice President and Chief Audit Executive, Pat Shanahan, AVP Information Technology Audit Office, Internal Audit and Emigdio Zambada, Nationwide's IA Data Analytics Director, discuss how their department expanded the use of data & analytics by building a continuous auditing program in the cloud. Partnering with Covail, they leveraged advanced analytics like AI and have provided education and resources to all of their auditors to enhance their data analytics skill set.
  • Continuous Audit - Achieve More Through Analytics Recorded: May 29 2020 51 mins
    Greg Jordan (Nationwide), Pat Shanahan (Nationwide), Emigdio Zambada (Nationwide), and Brian Sampsel (Covail)
    In honor of International Internal Audit Awareness Month (May 2020), come hear from Greg Jordan, Nationwide's Senior Vice President and Chief Audit Executive, Pat Shanahan, AVP Information Technology Audit Office, Internal Audit and Emigdio Zambada, Nationwide's IA Data Analytics Director, discuss how their department expanded the use of data & analytics by building a continuous auditing program in the cloud. Partnering with Covail, they leveraged advanced analytics like AI and have provided education and resources to all of their auditors to enhance their data analytics skill set.
  • Forecasting Cyber Threats Post Pandemic Recorded: May 27 2020 45 mins
    Richard Stiennon, Kurtis Minder, Jessica Gulick
    The world has changed, and so has your threat landscape. Join us for a discussion on how cyber attacks have pivoted their tactics and targets. From the latest on phishing kits to video threats, our experts will explore how changes in motives and targets is disrupting and increasing our threat landscape. Learn how to reframe your understanding of your threat profile and better defend and respond to these attacks.

    Our featured experts for this webinar include Richard Stiennon, chief research analyst at IT-Harvest and Kurtis Minder, CEO of GroupSense, GroupSense is a digital risk management company that delivers customer-specific intelligence.
    Here’s What Will Be Discussed:

    1) Threat actors are adapting their tactics and targets
    2) Changes in motives and targets are disrupting and expanding the threat landscape
    3) Understanding your threat profile to create a better cyber defense strategy.
  • ISSA Thought Leadership Series: Threat Reports Undone Recorded: May 26 2020 116 mins
    ISSA International
    It's everyone's favorite time of year. What will we learn from this year's breach reports? Join us as we review the latest data, look for lessons and trends, and help you understand what it all means. Our panel of experts will focus on how security professionals can learn from the data, and hopefully avoid becoming a statistic for next year's report.
  • A day in the life of a - Cybersecurity SOC Analyst Recorded: Apr 30 2020 61 mins
    Connie Blaney
    Have you ever wanted to know what is involved in a particular Cybersecurity role? If yes then join us at the WSC for a conversation with a Cybersecurity SOC analyst


    Host: Connie Blaney

    Guest: Afton Bell


    The Unconventional Approach Afton Bell is a Cybersecurity Analyst located in Austin, TX. Her path to cybersecurity was a bit unconventional but she’s always had a passion for security. Afton was born and raised in East Orange, NJ. She started flying single-engine aircraft at the age of 12, only a few months before the tragic events of 9/11. She saw the change of the aviation world as they started to enhance security measures across the country’s airports. In 2011, she earned 2 undergraduate degrees in Aviation Technology from Purdue University in West Lafayette, IN. After graduation, Afton followed her drive for security with a focus in IT and earned a Master of Professional Studies in Homeland Security from Penn State University in 2014. In 2017, Afton decided to shift from working in physical security management and earned multiple CompTIA certs to pursue her dream career of cybersecurity. She began working as a Configuration Lab Technician in Chicago to gain valuable experience before moving to Austin, TX for an analyst position. She recently started working as a Cybersecurity Security Operations Center Analyst for a large government entity with a focus in SIEM as of February 2020. Afton often volunteers to mentor young women interested in STEM during events in Austin and is very eager to continue to grow and evolve in such an exciting industry.
  • Career Conversation with Christina Morillo Recorded: Apr 23 2020 60 mins
    Elena Steinke WSC Founding Board Member
    Description: Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?


    Host: Elena Steinke, WSC Founding Board Member

    Guest: Christina Morillo

    Christina is an information security and technology professional with a background in cloud technologies, enterprise security, and identity engineering. By day, she works on all things cloud identity and security as a Senior Technical Program Manager at Microsoft.

    In 2015, she co-founded Women of Color in Tech Chat, best known for boosting visual representation across the tech industry by way of an open-source collection of stock photos. Christina advocates and is passionate about empowering women, and the underestimated to follow careers in security and technology, visual representation in tech, and connecting and creating opportunities for others.

    When she is not spending time with her family, you can find her co-leading Women in Security and Privacy’s NYC chapter, supporting others as an advisor and mentor, and focusing on her graduate studies. She lives in New York City with her husband and children.
  • A day in the life of a - Cyber Threat Analyst Recorded: Mar 26 2020 58 mins
    Connie Blaney
    Have you ever wanted to know what is involved in a particular Cybersecurity role? If yes then join us at the WSC for a conversation with a Cyber Threat intelligence analyst

    Host: Connie Blaney

    Guest: Rikki George
    Rikki George is the Cyber Threat Intelligence thought leader responsible for Financial Services, Retail & Hospitality cyber threat expertise and strategic level analysis at iDefense, part of Accenture Security’s Cyber Defense practice. Rikki produces industry-focused content that educates senior decisionmakers on the current and emerging threats that affect the resilience of various critical infrastructure sectors. Rikki earned her B.A. in Communications summa cum laude from Drexel University, completing capstone research on social media-enabled cybercrime. She hold a number of industry certifications, completed the selective Pre-Law program at the University of Pennsylvania and Cybersecurity program at the Washington Center in D.C. In 2019, Rikki was selected as a Rising Star Award finalist for the Women in IT Awards - Silicon Valley
  • Preparing for COVID-19: An Infosec Perspective Recorded: Mar 25 2020 30 mins
    Jeff Schmidt, VP of Cyber at Columbus Collaboratory
    COVID-19 pandemic has not only changed our lives but immediately changed our corporate threat profiles by extending our cyber attack surface and increasing our exposure to all kinds of attacks from authentication to human error. Transitioning to a remote workforce directly and significantly impacts your defensive protections. Practical changes can reduce the risk exposure while also minimize unneeded disruptions and fire drills during this turbulent time. In this webinar, we will discuss important cyber threats to consider and provide actionable advice on how to reduce your risk.
  • Vulnerability Management Solutions: How to Tame the Vulnerability Beast Recorded: Nov 26 2019 39 mins
    Troy Vennon, Director of Security Innovation, the Columbus Collaboratory
    Join us for this webinar that will demonstrate how your organization can adopt best practices for vulnerability management, threat intelligence and cyber risk management that previously had been beyond your means. For various reasons - tight budgets, lack of skills or resources, or a focus on other priorities - most companies perform vulnerability, threat and risk management in a very tactical way. Join Troy Vennon, Director of Security Innovation at the Columbus Collaboratory, for this session outlining how the combination of cloud-based vulnerability management, threat analysis and risk assessment, bundled with expert reporting and guidance for your specific IT environment, will cost-effectively transform your security operations from the tactical to the strategic.
  • Career Conversations with Stephanie Ihezukwu Recorded: Nov 22 2019 58 mins
    Jessica Gulick, WSC VP
    Join us at our next Career Conversations session on Nov 21st 2019 @7pm EST. Discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Stephanie I. WoSec Leader and Podcast Host

    Hosted by Jessica Gulick, MBA | PMP | CISSP

    In her day job, InfoSteph serves as a regional information security analyst. Outside of work, however, InfoSteph has filled her life with all kinds of cool activities. She serves as a Lead for WoSEC Houston and a Lead for WISP DEFCON 2019. She has also started speaking at conferences this year. She co-hosts a “happy hour” inspired podcast called Coolest Nerds in the Room, where conversation surrounding the lives of tech people are nurtured. She attends school full time, hoping to obtain her Bachelor’s by the end of the spring. She had the honor of being a delegate for Security Field Day 2. She writes blog posts on her website, StephAndSec.com, which is also her side business. And she is working on a course for LinkedIn Learning on Social Engineering and Security Awareness. Stephanie recognizes those that inspired her or helped her get to where she is today and hopes that everything she does moving forward does the same for others.

    Follow Steph on Twitter and LinkedIn, or visit her online at StephAndSec.com.
  • 7 Tips for Marketing Cybersecurity Solutions Recorded: Oct 29 2019 62 mins
    Jessica Gulick, CEO, and Monica Ricci, VP of Marketing, Katzcy
    Join Jessica Gulick, tech & cybersecurity growth hacker, as she shares the top lessons that have not only been learned, but have been put into practice by Katzcy’s growth-stage clients. We’ll talk about the importance of understanding buyer profiles, the techno-buzz trap, the right time for geek-speak, and how to build a narrative that positions your unique solution in the right box in the minds of buyers, industry analysts, and influencers alike.
  • Getting Inside Insider Threats: Response and Mitigation Recorded: Oct 23 2019 49 mins
    Ryan Lai, EVP of Professional Services, Nisos
    Insider threats can wreck your network, your business, and your company's reputation. But stopping malicious or simply incompetent insiders from doing damage isn't just an exercise in analyzing where the damage came from. Insider Threats aren’t just malicious employees. They can run the gamut from incompetent to accidental to theft. Join Ryan Lai, EVP of Professional Services at Nisos, as he discusses the wide-ranging complexities of an insider threat investigation.
Hear from Tech Experts, Executives, and CMOs
The Tech & Cyber Security Trends channel features experts and executives in and around the high tech, high growth sector to learn about new trends, market changes, and leadership tips. Join our channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How 2020 Changed Cyber Risk Management
  • Live at: Jun 4 2020 3:30 pm
  • Presented by: Jerry Caponera, VP Cyber Risk Strategy
  • From:
Your email has been sent.
or close