Spinning Plates: A Day in the Life of the
California State University (CSU) CISO
Notice: See below for CPE Policy.
Is there a typical day in the life of a higher education CISO? Being a CISO means a constant state of readiness to respond to the unexpected while balancing the known and planned for. Ed Hudson, Systemwide CISO for the California State University will discuss what gets him up in the morning, keeps him going during the day and how he manages to put his head down in the evening.
About Our Speaker
Ed Hudson
Chief Information Security Officer (CISO), California State University (CSU)
Ed Hudson is the Chief Information Security Officer for the California State University system. He has been with the CSU since 2009 holding roles both on campus and at the Chancellors Office in leading efforts to define and implement system wide information security strategy, change management efforts and leading information security investigations and response across the CSU.
Before joining the CSU, Ed held various senior leadership roles in data encryption, web application security and network security organizations. In these positions, he was responsible for overseeing professional services, strategy and responding to and leading complex investigations regarding external and internal computer security incidents with Fortune 500 companies. Ed served clients in a variety of industries, including information technology, healthcare, higher education, financial services, retail, finance, manufacturing and the food industry. Ed has extensive experience speaking and presenting to various educational, governmental, civic and industry groups on the topics of Computer Security, Privacy, Incident Response, Security Policy and related Regulatory Compliance.
Prior to entering private industry Ed spent 15 years as a police officer, detective and investigations supervisor with agencies on both the East and West Coasts. Ed has held advanced certifications in computer and network forensics, computer crime investigations and has testified as an expert regarding computer crime and electronic evidence in California Superior Courts. Ed was a founding member of the Northern California High Tech Crimes Task Force. He is holds a Bachelor’s degree in Information Technology and a Master’s Degree in Public Administration from CSU San Bernardino. Ed is a Certified Information Security Manager (CISM) and a current member of the Information Systems Audit and Control Association (ISACA). Ed is a EDUCAUSE Leading Change Institute Fellow (2016) and the current faculty director for the EDUCAUSE Management Institute.
Agenda
5:00 PM – 6:15 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
Webinar Rates
ISACA, IIA, ISSA,
ACFE, OWASP |
Non-Members | Full-Time Students & Faculty |
|
Rate |
$0 | $10 | $0 |
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
*Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.