Dinner Meeting Topic:
Unbreaking Your Security Program – Using Outcomes As A Business Strategy
The world of cybersecurity has changed. Cybercriminals target organizations and unleash a torrent of malicious files and attacks that flood an enterprise until a breach occurs. Many businesses, both large and small, have been infiltrated exposing their organization to high risks and long-term costs. Executives are increasingly interested in the state of information security, moving cybersecurity from a backroom issue to one in the boardroom. While some organizations have risk management programs in place, few are sufficient in changing the conversation from “fixing problems” to business outcomes and transforming the business proactively.
This presentation will discuss:
• Facilitating a culture that views cybersecurity as a business issue
• Assessing the effectiveness of your cybersecurity program
• Proving that cybersecurity is more than defending against attacks – but also impacts businesses positively from the top-down by aligning security strategies with business opportunities and goals
Exponential data growth, Privacy, and Security issues addressed with Digital Rights Management
Digital Rights Management (DRM) has the potential to affect the operations of organizations in major ways. In addition to giving us control of the content that leaves the organization, it will be a useful tool to address the exponential growth of content.
We will define DRM and some of the early applications and tools. It is a technology that will continue to rely heavily on the systems and processes that have paved the way such as Enterprise Content Management, Workflow, and Digital Loss Prevention to reduce risk and improve operational efficiency of organizations. While the end result is automated lifecycle and access management for every instance of a file; the path to that ideal will require some new policies and procedures. We will discuss who might have a primary interest in adding DRM to the IT stack and who should be on the team in order to achieve a successful implementation and user adoption.
The ability to remove access to content no matter where it is saved or how it traveled is a huge leap forward in privacy and security as well as managing the content lifecycle. Is it the end of IP theft or the “smoking gun”? Likely not, but it moves us in that direction dramatically without making large changes to a technology stack or current business processes.
Corey White, CISSP, CISM
Founder and Chief Experience Officer, Cyvatar.ai
As a transformative, servant leader, Corey is a proven entrepreneur focused on innovating and creating new paradigms in the security industry and life. His leadership style is focused on an employee first approach because of the positive impact of happy employees to their customer relationships. Corey has chosen to take a people centric approach to life and to let all outcomes be driven by that philosophy. Twenty-five years of experience in the security industry has seasoned him to create the next exponential evolution.
As Founder and Chief Experience Officer, Corey has created Cyvatar.ai to enable vendor partners to deliver reliable, repeatable, and measurable business outcomes to clients through an outstanding customer experience. This also allows the partner to engineer out complexity, improve renewal/upsell/cross-sell opportunities, and increase their customer satisfaction and referrals.
Enterprise Account Manager at BlackBerry
Faron has worked in Enterprise Content Management for more than 15 years before joining BlackBerry. His expertise includes process automation and information governance. Faron has broad experience from years in the Legal Solutions Group at Open Text to creating commercial solutions with open source platforms like Alfresco and Ephesoft. Faron is an active participant and supporter of ARMA & ISACA. Faron now focuses on the security spoke of the Information Governance wheel. BlackBerry solutions ensure the security of people, communications, and content everywhere business happens.
Tuesday, October 15th, 2019
3:30 PM – 5:00 PM: Pre-Meeting
5:30 PM – 6:00 PM: Registration and Networking
6:00 PM – 8:30 PM: Dinner and Program
Location: Luminarias Restaurant
3500 W Ramona Blvd, Monterey Park, CA 91754
Dinner Choices: Buffet
Attire: Business Casual
Time Details: 2 CPEs for dinner meeting
|ISACA, IIA, ISSA,
Pre-Paid online by midnight the Friday before the event
Walk-Ins or Pre-Paid online after midnight the Friday before event
Payment: Credit Card
Those who reserve but do not come may be assessed a charge up to $25 if they do not cancel by noon the day before the event.
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed
By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.