ISACA Los Angeles January Seminar ``IT Hot Topics``
Thursday, January 25, 2024
Earn 4 CPEs while learning about the following hot topics at ISACA Los Angeles Chapter’s virtual seminar
TOPIC 1
Establishing Data Trust Program within your Organization – From Data Governance to Privacy
In the face of escalating cyber threats, organizations must adopt a comprehensive cybersecurity-centric approach to fortify their data assets. This presentation explores the nuanced steps involved in establishing a Cybersecurity-Centric Data Trust Program, emphasizing key elements such as data governance, data classification, and data discovery. Participants will gain actionable insights into safeguarding sensitive information, mitigating cyber threats, and ensuring the resilience of their organizational data infrastructure.
Learning Objectives:
Foundations of Cybersecurity-Driven Data Governance:
– Explore the fundamentals of a cybersecurity-centric data governance framework.
– Understand the role of risk assessment and mitigation in the context of data security.
– Learn to integrate cybersecurity considerations into data governance policies, aligning them with industry standards.
Navigating Regulatory Landscape for Privacy Compliance:
– Acquire knowledge of the global regulatory landscape governing data privacy, including GDPR, CCPA, and other relevant frameworks.
– Learn practical strategies for aligning your data practices with regulatory requirements to mitigate legal risks.
Cultivating a Cybersecurity-Aware Culture and responsible data use:
– Explore methodologies for instilling a cybersecurity-aware culture within your organization.
– Understand the role of human factors in cybersecurity and techniques for building a resilient human firewall.
Data Classification and Discovery for Enhanced Security:
– Delve into the importance of data classification in identifying and protecting sensitive information.
– Learn strategies for implementing robust data discovery processes to identify and track sensitive data across the organization.
– Understand how data classification and discovery contribute to effective data access controls and incident response.
Implementing Advanced Cybersecurity Measures:
– Explore encryption, threat detection, and incident response strategies to counter evolving cyber threats.
– Gain insights into the integration of cybersecurity measures into the entire data lifecycle, from collection to disposal.
SPEAKER

Peter Morin
Principal, National Cyber Security Leader
Grant Thornton LLP
TOPIC 2
CCPA/CPRA Update and New Cybersecurity/Risk Assessment Requirements
The California Privacy Protection Agency (CPPA) recently met on December 8, 2023, to discuss CCPA and CPRA. During this meeting, they also discussed the drafts of the Cybersecurity Audits and Risk Assessments Regulations that will be required of all eligible enterprises subject to CCPA/CPRA. CPPA is responsible for overseeing and enforcing the CPRA. The CPRA builds upon the CCPA, introducing additional privacy rights for consumers and imposing more stringent obligations on businesses handling personal information.
Starting January 1, 2024, companies are obligated to display updated Privacy Policies in accordance with the CCPA that mandates yearly updates of disclosures. This applies to job applicants and employment situations since January 1, 2022.
CPRA also states HIPAA-covered and compliant entities such as healthcare service providers and their business associates may be exempt from new state privacy regulations. However, CPRA provides that only PHI is exempt.
This session will cover CCPA, CPRA, the recent CPPA Board Meeting, new employee and job applicant privacy policy update requirements, PHI exemptions, and the new annual cybersecurity audit requirements currently being planned by the CPPA. Join us to talk about what types of businesses must follow these laws and the impact they will have on them.
SPEAKER

Miguel (Mike) O. Villegas
Founder
iSecurePrivacy LLC
CISA, CDPSE, CEH, CISSP, ISO/IEC 27001 Lead Implementer
TOPIC 3
Cybersecurity Maturity Model Certification (CMMC)
The Department of Defense (DoD) has been talking about making the Cybersecurity Maturity Model Certification (CMMC) a contractual requirement in the Defense Industrial Base (DIB) for years. The Defense Federal Acquisition Regulation Supplement (DFARS) has already been a requirement in the DIB for more than five years. Learn what the latest is on CMMC requirements: When is the earliest it might be a requirement, when is the earliest you can plan of getting certified, what does the certification process look like, and what should you budget for it.
After attending, the participants will better understand the following about CMMC:
1. Learn about CMMC 2.0 including the difference between CMMC and other frameworks (NIST 800-171, NIST CSF, CIS Controls, ISO 27001)
2. Learn about CMMC Certification Requirements
3. Learn about CMMC Certification Budgeting and Planning: When is the earliest it might be a requirement, when is the earliest you can plan of getting certified, what does the certification process look like, and what should you budget for it.
SPEAKERS

Eric Rockwell
Lead Cybersecurity Advisor
SingerLewak LLP
CISSP

Carl Grifka
Managing Director
SingerLewak LLP
CISSP, CISA, CISM, PMP, CDPSE
Event Details
Rate Details
CPE CREDIT & DISCLAIMER
Please note: unauthorized recording, in any form, of presentations and workshops is prohibited