ISC2 Cleveland Chapter Meeting

Slides:



Advertisements
Similar presentations
Enabling traceability and transparency with standards-based regulatory reporting Dr. Said Tabet Senior Technologist and Industry Standards Strategist Office.
Advertisements

MIS 3580 Defending Against Cyber Crime
Mahesh S. Sonavane SunGard VP – Information Security & BCM
Council CyberSecurity Achievements 2013 Achievements 2013 Council established, 18 participants Three Webinars done List of topics created Chairman: Edwin.
Class 8 The State of Cybercrime Today- Threads & Solutions.
Cloud Compliance Considerations March 24, 2015 | Jason Smith, CISSP.
Connecting with Your Peers IT Challenges and Opportunities in 2012 A Facilitated Group Discussion Thursday, January 12, 2012.
CYBER SECURITY IN A BORDERLESS GLOBAL ARENA Avi Hasson | Chief Scientist, Ministry of Industry, Trade and Labor Herzeliya Conference,
Gordon Shevlin Founder, Chief Executive Officer Allgress, Inc.
Center for Cybersecurity Research and Education (CCRE)
Engaging Senior and Middle Management in Organisational Change Dave Gorman, Director of Social Responsibility and Sustainability.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1 northerntrust.com | © Northern Trust 2016 Changing Data Needs in Asset Management CORPORATE & INSTITUTIONAL SERVICES Prepared for the CInvO Roundtable,
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Calgary Computer Security Solutions
Surf smart training.
Cybersecurity as a Business Differentiator
Hurricanes, Earthquakes, and Threat Intelligence
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
CIS 500 Course Experience Tradition / snaptutorial.com
3 Do you monitor for unauthorized intrusion activity?
CIS 500 Slingshot Academy / cis500.com
Enterprise Mobility Suite Technical and Business Briefing
Challenges and opportunities for the CFO
Welcome! Enhancing the Care Team May 25, 2017
Cyber-Security for Healthcare
Leadership Lessons From The Dark Side
Business At the Speed of Cyber
Cyber Security: State of the Nation
© Copyright 1989 – 2013, (ISC)2 All Rights Reserved
ICT Security Expert, DC Cloud Practice Leader HUAWEI
COMPUTER AIDED LOGISTICS & SECURITY
World Forum of Central Securities Depositories (WFC)
NAPA Standing Panel on Technology Leadership
Stretch Your Budget With Organizational Membership
The Open Data Center Alliance
CIS 500Competitive Success/tutorialrank.com
CIS 500 Education for Service-- tutorialrank.com.
CIS 500 STUDY Lessons in Excellence-- cis500study.com.
SMME DEVELOPMENT AND STRATEGIC ALIGNMENT
Built on the Powerful Microsoft Azure Platform, iSwarm Helps Businesses Analyze Social Media Conversations, then Connect with Individuals MICROSOFT AZURE.
cyberopsalliance.com |
EU GDPR a Cyber Security Perspective
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Securing the Threats of Tomorrow, Today.
Cybersecurity Threats and Opportunities in Latin America
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Clerking a trust board Keeping it strategic
Change Framework What Must be Done Barriers Case For Change
Stretch Your Budget With Organizational Membership
Small Firm Connections Feedback Forum
The State of Cybersecurity in State Government NAST March 26, 2019
Information Services Security Management
GRC, A holistic Road Map for Information Security Transformation
TECHNOLOGY, ENGINEERING AND DATA CONTINUING AND PROFESSIONAL EDUCATION
3 Do you monitor for unauthorized intrusion activity?
Session 8: Innovative Uses of Captives: Cyber and Beyond
Adroit Market Research +1 (214) Single Use License: US$ 4800 Request Sample Global.
Security for nonprofits
Today’s cloud and preparing for tomorrow’s
Modernizing Risk Management to Support Evolution of IT
Intro CISO Alliance - Internal use only 9/2/2019.
3 Do you monitor for unauthorized intrusion activity?
Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time?
Streamline your move to the cloud
Streamline your move to the cloud
50% Introducing the Cybersecurity Assessment
Presentation transcript:

ISC2 Cleveland Chapter Meeting 2017 Security Challenges Panel Discussion January 31, 2017

Security Panel Participants Joe Daw, CISSP (FACILTATOR) CyberSecurity Architect Kevin Baker CISO/Security Leader - Westfield Insurance and Bank Billy Heiser InfoSec Manager - Signet, Inc. Jim Rice, DM/IST Director of IT Consulting & Security Services - Sirius Computers Research Fellow – University of Phoenix, Center for Global Business Research

Questions & Topics According to CIO.com and the Information Security Forum feel the following four areas are the top four global security threats for 2017(below).  Do you agree with these?  and do these align with your business and industry? The ISF says the top four global security threats businesses will face in 2017 are the following: Supercharged connectivity and the IoT will bring unmanaged risks. Crime syndicates will take quantum leap with crime-as-a-service. New regulations will bring compliance risks. Brand reputation and trust will be a target. What are the 3 main areas of concern you have in 2017 and beyond? What 3 areas of focus or solutions are you planning to start working on in 2017? Or should all CISO's consider and work on? Are there items that are simply just continuations from 2016? Where does Ransomware and Ransomware-as-a-Service stack in your predictions for risks in 2017? How and where does Machine learning, Analytics and Threat Intel play into your priorities and plans? Other key topics Cloud, XaaS, IoT, etc Cyber Pearl Harbor? How about ensuring you have the right resources?  Budget and skills?  Do you consider those risks? Trust in data - Predictions around bad guys simply modifying data and not always extracting it? Parting words of wisdom you would like to leave with us today?

Format & Rules of the Road Facilitated Questions Guided Discussions Audience Questions