Notice: See below for CPE Policy.
Note: There is no recording or presentation for this panel session.
A typical misconception is that if you have a college degree, you have a job. The fact is that it takes the average college graduate three to six months to secure employment after graduation. To shorten that timeframe, career planning and preparation give yourself a much-needed competitive edge and should occur throughout your college studies. Our panel will share their key thoughts on career preparation to building a cache of skills and career-relevant experiences that make you valuable to an organization.
Head of Google Developer Community Programs, Developer Relations
Over the last 15 years at Google, Erica has worked in sales, sales operations, and engineering while also living in different cities/countries (San Francisco, London, Singapore, New York). She manages the team that runs Google’s developer community programs including Google Developer Groups and Google Developer Student Clubs. She has been leading the Google Developer Student Clubs program for the last three years, which is a community program in over 1,500 universities in 100 countries through which students learn Google technologies and work on projects that solve local problems. There is a Solution Challenge project competition for students each year and this year students solved for the UN’s 17 Sustainable Development Goals.
Erica is passionate about communities — she has led community programs for Google in Southeast Asia and globally. Outside of work, she co-founded Geek Girl Meetup Singapore, a community for women in tech.
Erica graduated from Stanford University in 2006, majoring in Psychology and minoring in Communications. She played rugby for 4 years in college and continued playing until she moved to New York.
Chief Information Security Officer (CISO), California State University (CSU)
Ed Hudson is the Chief Information Security Officer for the California State University system. He has been with the CSU since 2009 holding roles both on campus and at the Chancellors Office in leading efforts to define and implement system wide information security strategy, change management efforts and leading information security investigations and response across the CSU.
Before joining the CSU, Ed held various senior leadership roles in data encryption, web application security and network security organizations. In these positions, he was responsible for overseeing professional services, strategy and responding to and leading complex investigations regarding external and internal computer security incidents with Fortune 500 companies. Ed served clients in a variety of industries, including information technology, healthcare, higher education, financial services, retail, finance, manufacturing and the food industry. Ed has extensive experience speaking and presenting to various educational, governmental, civic and industry groups on the topics of Computer Security, Privacy, Incident Response, Security Policy and related Regulatory Compliance.
Prior to entering private industry Ed spent 15 years as a police officer, detective and investigations supervisor with agencies on both the East and West Coasts. Ed has held advanced certifications in computer and network forensics, computer crime investigations and has testified as an expert regarding computer crime and electronic evidence in California Superior Courts. Ed was a founding member of the Northern California High Tech Crimes Task Force. He holds a Bachelors degree in Information Technology and a Masters Degree in Public Administration from CSU San Bernardino. Ed is a Certified Information Security Manager (CISM) and a current member of the Information Systems Audit and Control Association (ISACA). Ed is a EDUCAUSE Leading Change Institute Fellow (2016) and the current faculty director for the EDUCAUSE Management Institute.
Senior Vice President, Cyber Security Fusion Center, Citi
Peter Sprenger leads Strategic Initiatives for Citi’s Cyber Security Fusion Center. He previously worked as an investment banker at J.P. Morgan covering Aerospace & Defense and Industrials, and prior to that served in Iraq and Afghanistan in the U.S. Army Infantry. Peter holds an MBA from the Wharton School of Business and a Bachelor of Science with an emphasis in Computer Information Systems from California State Polytechnic University, Pomona
CISSP, CISM, Chief Executive and Experience Officer, Cyvatar
As a transformative, servant leader, Corey is a proven entrepreneur focused on innovating and creating new paradigms in the security industry and life. His leadership style is focused on an employee first approach because of the positive impact of happy employees to their customer relationships. Corey has chosen to take a people centric approach to life and to let all outcomes be driven by that philosophy. Twenty-five years of experience in the security industry has seasoned him to create the next exponential evolution.
As Founder and Chief Experience Officer, Corey has created Cyvatar.ai to enable vendor partners to deliver reliable, repeatable, and measurable business outcomes to clients through an outstanding customer experience. This also allows the partner to engineer out complexity, improve renewal/upsell/cross-sell opportunities, and increase their customer satisfaction and referrals.
Corey is a proven security industry veteran backed by more than twenty-five years of success managing security practices and consulting teams, and delivering on strategic projects as well as tactical assessments, penetration tests, and incident response engagements. His work encompasses virtually every industry sector, including defense, technology, government, critical infrastructure, automotive, finance, healthcare, and manufacturing. Corey has a deep technical background, which has allowed him to deliver and oversee technical assessments, incident response engagements, strategic planning, and risk assessments.
Corey served as the Senior Vice President of Worldwide Consulting and Chief Experience Officer at Cylance managing a team of 150+ globally, culminating in the acquisition of Cylance by Blackberry for $1.5 Billion. In Cylance’s early years, as the primary revenue generating business unit, Corey paved the way for a strong customer base which became the core for the inevitable success of Cylance’s revolutionary product, CylancePROTECT®. Once the product was released, Corey began work on creating the security industry’s first outcome-based service in ThreatZERO™. This service evolved the traditional product implementation approach used by the security industry continuing the engagement with a prevention expert until every client achieved an outcome, giving customers measurable and sustainable PREVENTION.
Cylance Consulting continued to drive business outcomes for customers and partners through seven practice areas led by distinguished experts in Industrial Control Systems, Red Team Services, Incident Containment and Forensics, IoT and Embedded Systems Security, ThreatZERO, Strategic Services, and Education.
Prior to joining Cylance in 2012, Corey was the Director of Consulting for Foundstone & McAfee/Intel Professional Services with responsibilities for all aspects of the business for the Southwest Region.
Carol K. Gonzales
PhD, CISA, CDPSE, ITILv3, AVP IT Security and Compliance, Chief Information Security Officer, Cal Poly Pomona
Carol Gonzales currently serves as Cal Poly Pomona’s AVP for IT Security & Compliance and Chief Information Security Officer. She has over 30 years of experience in cybersecurity, audit, project management, and IT service operations within government, higher education, and financial service sectors. At Cal Poly Pomona, Carol is responsible for the information security and compliance management strategy and programs including the adoption of campus IT policies and procedures, IT auditing and risk management projects, as well as accessible technology and services for persons with disabilities. Carol also serves as an adjunct professor for Cal Poly Pomona’s College of Business Computer Information Systems department.
Carol is an active member of ISACA since 1996 and currently serves as the Los Angeles Chapter’s Vice President. She has also facilitated and presented at the ISACA LA Spring Conference and CISA review sessions.
Carol has a Bachelor of Science in Computer Science and Master of Science in Business Administration with an emphasis in IS Auditing from Cal Poly Pomona. She earned her doctorate from Claremont Graduate University in Information Systems and Technology. Carol is a Certified Information Systems Auditor (CISA), Certified Data Privacy Solutions Engineer (CDPSE), and has the ITILv3 (Information Technology Infrastructure Library) certification.
5:00 PM – 6:30 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
|ISACA, IIA, ISSA,
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.