ISACA Los Angeles January Seminar ``IT Hot Topics``
Thursday, January 25, 2024
Earn 4 CPEs while learning about the following hot topics at ISACA Los Angeles Chapter’s virtual seminar
TOPIC 1
Establishing Data Trust Program within your Organization – From Data Governance to Privacy
In the face of escalating cyber threats, organizations must adopt a comprehensive cybersecurity-centric approach to fortify their data assets. This presentation explores the nuanced steps involved in establishing a Cybersecurity-Centric Data Trust Program, emphasizing key elements such as data governance, data classification, and data discovery. Participants will gain actionable insights into safeguarding sensitive information, mitigating cyber threats, and ensuring the resilience of their organizational data infrastructure.
Learning Objectives:
Foundations of Cybersecurity-Driven Data Governance:
– Explore the fundamentals of a cybersecurity-centric data governance framework.
– Understand the role of risk assessment and mitigation in the context of data security.
– Learn to integrate cybersecurity considerations into data governance policies, aligning them with industry standards.
Navigating Regulatory Landscape for Privacy Compliance:
– Acquire knowledge of the global regulatory landscape governing data privacy, including GDPR, CCPA, and other relevant frameworks.
– Learn practical strategies for aligning your data practices with regulatory requirements to mitigate legal risks.
Cultivating a Cybersecurity-Aware Culture and responsible data use:
– Explore methodologies for instilling a cybersecurity-aware culture within your organization.
– Understand the role of human factors in cybersecurity and techniques for building a resilient human firewall.
Data Classification and Discovery for Enhanced Security:
– Delve into the importance of data classification in identifying and protecting sensitive information.
– Learn strategies for implementing robust data discovery processes to identify and track sensitive data across the organization.
– Understand how data classification and discovery contribute to effective data access controls and incident response.
Implementing Advanced Cybersecurity Measures:
– Explore encryption, threat detection, and incident response strategies to counter evolving cyber threats.
– Gain insights into the integration of cybersecurity measures into the entire data lifecycle, from collection to disposal.
SPEAKER

Peter Morin
Principal, National Cyber Security Leader
Grant Thornton LLP
TOPIC 2
CCPA/CPRA Update and New Cybersecurity/Risk Assessment Requirements
The California Privacy Protection Agency (CPPA) recently discussed the draft of Cybersecurity Audits and Risk Assessments Regulations under CPRA during its September 8th board meeting. CPRA, which grants enforcement authority to the CPPA, expands on CCPA privacy laws and introduces new rights. Initially set for enforcement by January 1, 2023, CPRA’s enforcement was delayed until March 29, 2024, due to a lawsuit by the California Chamber of Commerce. This session will cover CCPA, CPRA, the recent CPPA Board Meeting, and the new annual cybersecurity audit requirements, providing insights into the changes and readiness for CCPA/CPRA.
SPEAKER

Miguel (Mike) O. Villegas
Founder
iSecurePrivacy LLC
CISA, CDPSE, CEH, CISSP, ISO/IEC 27001 Lead Implementer
TOPIC 3
Cybersecurity Maturity Model Certification (CMMC)
The Department of Defense (DoD) has been talking about making the Cybersecurity Maturity Model Certification (CMMC) a contractual requirement in the Defense Industrial Base (DIB) for years. The Defense Federal Acquisition Regulation Supplement (DFARS) has already been a requirement in the DIB for more than five years. Learn what the latest is on CMMC requirements: When is the earliest it might be a requirement, when is the earliest you can plan of getting certified, what does the certification process look like, and what should you budget for it.
After attending, the participants will better understand the following about CMMC:
1. Learn about CMMC 2.0 including the difference between CMMC and other frameworks (NIST 800-171, NIST CSF, CIS Controls, ISO 27001)
2. Learn about CMMC Certification Requirements
3. Learn about CMMC Certification Budgeting and Planning: When is the earliest it might be a requirement, when is the earliest you can plan of getting certified, what does the certification process look like, and what should you budget for it.
SPEAKERS

Eric Rockwell
Lead Cybersecurity Advisor
SingerLewak LLP
CISSP

Carl Grifka
Managing Director
SingerLewak LLP
CISSP, CISA, CISM, PMP, CDPSE
Event Details
Rate Details
CPE CREDIT & DISCLAIMER
Please note: unauthorized recording, in any form, of presentations and workshops is prohibited