agenda - institute of internal auditors › chicago › about › documents › iia...title...

Post on 27-Jun-2020

4 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Day 1

Keynote Law Enforcement Key Note

Session 1 Security. Risks. Compliance. How can third party assurance help your business drive efficiencies and build trust in the market? * Jason Lipschultz, BDO

Management Track Technical Track

Session 2 Maturing Your Data Security Program * Angela Fitzpatrick & Keith Henkell, Meditology Services

DNS Filtering: The Missing Security Control* John Bambenek, ThreatSTOP

Lunch

Session 3This isn't the Pen Test You're Looking For: Understanding the Appropriate Assessment to Reduce Risk* Douglas Logan, Cyber Ninjas

Beginning DFIR: Fun with Forensics* Lisa Wallace, MicroSolved

Session 4 The Danger Within: Another Look at Insider Threats* Jeremy Wittkop, InteliSecure

Exploring the Mobile Ecosystem: How to Prepare for a Mobile Application Assessment* Brandyn Fisher, The Mako Group

Session 5Cybersecurity Third Party Risk Management. It’s like Spiderman vs the Sinister Six* Jason Torres, Rush University Medical Center* Anders Norremo, ThirdPartyTrust

Evolution of Magecart: The Dawn of Web-Skimming* Steve Ginty, RiskIQ

Session 6 Inside Out Security: Building Castles not Warehouses* Alyssa Miller, CDW

Short links: Security blown to bits* Matt Findlay , FRSecure

Day 2

Keynote CISO Panel – What do CISO’s worry about

Session 1 Developing a Unified Security Framework – Insider Risk and Data Protection* Homayun Yaqub, Forcepoint

Management Track Technical Track

Session 2 The Clouds Are Out To Get Me* John Strand, Blackhills Infosec

Hunting as necessity for survival* Fayyaz Rajpari, Optiv

Lunch

Session 3Not a Matter of If: Preparing Your Team and Your Organization for Disaster Recovery and Business Continuity* Robert Kirley, iDiscovery Solutions

Threat Detection Simulation with Infocyte* Paul Hinds, PwC

Session 4Building an Effective Vulnerability Management Program to Improve Cybersecurity and Decrease Cyber Risk* Kenneth Zoline, Baker Tilly Virchow Krause LLP

Metric Driven DevelopmentCharles Herring, WitFoo

Session 5 The State of the Endpoint* Kevin Thompson, Absolute

The Much Anticipated ISO 27701 and What You Need To KnowDebbie Zaller, Schellman

Session 6The Impacts of a Compromise Assessment on Mergers & Acquisitions* Ray Strubinger, VerSprite

A Panicked Response* Eric Jeffrey, IBM

top related