Online Store   |   Print Page   |   Your Cart   |   Sign In
Community Search
Cybersecurity SIG Events
HOMEPAGE LIBRARY

 

 

2018 Cybersecurity SIG Events Calendar

Title Description Date & Time Featured Speaker(s)
Cyber Vision 2018 An overview of upcoming social, political and business trends in 2018 and the cybersecurity implications.

January 23

12:00pm PT / 3:00pm ET

(Webinar)

Caren Shiozaki,

Laszlo Gonc

LEARN MORE / REGISTER
Building a Culture of Cybersecurity You've implemented the latest and greatest solutions to protect yourself from cyber threats. But the most vulnerable companies will be those that fail to develop a culture of security.

February 27

12:00pm PT / 3:00pm ET

(Webinar)

Keri Pearlson

LEARN MORE / REGISTER
Hacktivism: Preparing for a Cyber Attack Hacktivism is a fairly recent phenomena where hackers are driven by the pursuit of social change, as opposed to seeking profit or intellectual rewards.  A recent event in our community sparked a hacktivism campaign directed to the City of Albuquerque.

March 27

12:00pm PT / 3:00pm ET

(Webinar)

Peter Ambs

LEARN MORE / REGISTER
Talent Management Challenges of the Cybersecurity Workforce Everywhere we turn we hear that there is a shortage of cyber security professionals to fill expanding cyber security program requirements.  The path to filling these roles is complex, and requires more than just finding the right person with the right skills to fill a need.  While attracting talent or building new skills with training and certifications helps to fill an initial gap, long term management of the challenge requires companies to think in new ways.  A more effective approach is to create a cybersecurity culture across the larger organization – sharing ownership to give everyone a common goal.  This session will discuss the ways to balance cybersecurity risk through cultural changes and shared perspectives.

April 24

12:00pm PT / 3:00pm ET

(Webinar)

Bonnie Stith

LEARN MORE / REGISTER
Lost in Translation: Avoiding the Pitfalls of Cyber Communication with the Board CIOs/CISOs and their security teams collect a multitude of metrics, all of which are important to their ability to do their jobs. They’ve not been as successful when it comes to condensing all of that information for Board risk reporting. This session will provide guidance on building security metrics that tell a story the Board really cares about.

May 22

12:00pm PT / 3:00pm ET

(Webinar)

Caren Shiozaki

LEARN MORE / REGISTER
The Intersection of Cybersecurity and Digital Transformation
Tremendous technology changes in recent years have made exponential leaps in the way we will communicate, interact and transact with each other for generations to come. What are the technology risks? How do we balance the highest security measures with innovation? How do we securely engage customers in their space? We have now entered the Transformative Age – are you ready to do business in the future?

June 26

12:00pm PT / 3:00pm ET

(Webinar)

Laszlo Gonc

LEARN MORE / REGISTER
Mature and Cost-Effective Alignment of Information Security Programs to Strategic Business Objectives In a typical organization, the CEO has a list of business goals and objectives that trickle down through chain of leadership. Information security supports the business in achieving these objectives. To begin the development of a strategic plan for security it is essential to understand the business objectives and the key elements of the information security function. Business objectives can be analyzed to identify dependencies on security. The security objectives can then be defined in terms of the business objectives. Weaknesses in information security can jeopardize an organization’s mission, threaten its profitability, and invite fines and penalties from regulatory bodies. As IT leaders, we need a clear vision for security, the ability to communicate its relevance and the managerial discipline to deliver its full value. A more effective means of managing the impact that IT risk can have on the business involves taking a holistic approach. July 24

12:00pm PT / 3:00pm ET

(Webinar)

 Abu Sadeq LEARN MORE / REGISTER              
Navigating Away from the Land of Business Resiliency Make-Believe: An IT/IS Therapeutic Couch  Session The reality is that most of us in IT and IS live in the”Land of Business Resiliency Make-Believe”. We have “THE PLAN ” and we may periodically “somewhat” test it. The reality is our business resiliency preparedness is its own disaster waiting to happen within our organizations for far too many of us. Today we are also highly reliant upon a host of service providers whom we think and they think have it all covered when it comes to their business resiliency. We blindly trust them as a plethora of perfect storms hover over our IT landscape waiting to strike with a vengeance.  We also may not have the backups we think we have to survive a cyber intrusion or disaster.  This session with explore how we can navigate out of  ” Land of Business Resiliency Make-Believe” in the 21st century and sleep soundly at night knowing we have true business resiliency in place.  

August 28

12:00pm PT / 3:00pm ET

(Webinar)

 Brian Kelley LEARN MORE / REGISTER 
2018 Virtual Cyber Summit

September 20

(Virtual Summit)

Details coming soon!

October 23

12:00pm PT / 3:00pm ET

(Webinar)

Details coming soon!

November 27

12:00pm PT / 3:00pm ET

(Webinar)

 

Webinar events are for Cybersecurity SIG members only.  Webinar details will be provided at time of registration for those events where a Webinar is available.

 

CALL FOR PRESENTERS

 

If you would like to make a presentation at one of our upcoming meetings or have a suggestion for a speaker, please contact us at CyberSecuritySIG@simnet.org

Latest News

Important! Make Your Hotel Reservation for SIM Connect Live

 

SIM News Extra: December 2017

more Chapter & National Events

6/13/2018 » 6/14/2018
APC June 2018 Meeting

6/13/2018
SIM Boston Golf Outing

6/15/2018
ELIT Roundtable - Digitization from your point of you – And what does it mean

2018 IT Trends Study

Membership Management Software  ::  Legal