Attendees who attend and complete the post survey will automatically be entered into our raffle for Apple AirPods, courtesy of MIMECAST
Notice: See below for CPE Policy
Update: Presentation/Supplementary Files have been uploaded. See below for the files.
The Internet of Things (IoT) has rapidly evolved into ubiquitous communication and data management through digital technology. Smart, connected objects offer tremendous opportunities for value creation and capture, but can also create tremendous risk, demanding new strategies for value protection. Enterprises adopting IoT at scale will need to strategically plan to solve the cyber risk challenges associated with IoT, and also stay in compliance with increasing regulatory requirements.
Smart devices and sensors are able to collect and transform data into business insights more rapidly, at a lower cost, and with higher accuracy. Businesses have realized the enormous benefit of leveraging IoT technologies to drive business decisions. Yet industry leaders and business innovators have a number of concerns—including impacts to life/safety and business operations if a cyber-attack were to occur. As a result, the adoption of IoT has been slower than initially forecasted by optimistic technologists, pointing toward the need for a capability or framework to help businesses navigate through these risks, and harvest high-quality ROI.
Please join us as we will discuss the following during the webinar:
- Securing the Industrial IoT (IIoT) and Medical Device Safety and Security (MeDSS)
- Challenges organizations are facing in adoption IoT technologies
- How IoT cyber risks differ from traditional IT cyber risks
- Leading practices on managing IoT security risks
- Aligning operational technology (OT), IT, and security
Principal, IoT & ICS Leader, Deloitte & Touche
Ramsey, a principal at Deloitte & Touche LLP, is the Cyber Risk Services Internet of Things (IoT) & Industrial Controls Systems (ICS) leader for Deloitte Risk & Financial Advisory. He specializes in security architecture around Industrial Control Systems, identity and access management implementation, and assessment services with a focus on manufacturing and distribution clients. He brings nearly 20 years of experience using emerging technologies to help clients solve their business problems.
Ramsey holds a Master of Science in Information Systems and has been a Certified Information Systems Security Professional (CISSP) since 2003.
Partner, MeDSS Leader, Deloitte & Touche
Russell, a partner at Deloitte & Touche LLP, is the Medical Device Safety and Security (MeDSS) leader for the Cyber Risk Services Infrastructure practice of Deloitte Risk & Financial Advisory. He is also the Global Connected Medical Device leader and the Deloitte Risk & Financial Advisory Services MedTech leader.
Russell brings more than 25 years of experience in helping the life sciences, health care, and consumer products sectors address challenging cybersecurity, security-by-design, privacy-by-design, DevSecOps, product security, OT security, cloud, and IoT security issues.
Louverture Lojo Jones
Senior Manager, Cyber Risk, Deloitte & Touche
Executive business development leader; having 19 years delivering transformative security strategy, governance/risk compliance and technical integration for clients within the public and private sectors. His portfolio of industry exposure includes Hight Tech Companies, Aerospace and Defense (A&D), Energy and Resources, Financial Services, Healthcare, and DoD customers.
5:00 PM – 6:15 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
|Rates||ISACA, IIA, ISSA,
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.