Search Options
Content types
Announcements
Blogs
Communities
Discussions
Question & Answers
Question & Answers
Events
Glossary
Page Content
Library
Library Entry
Volunteer Opportunity
Date range
on this day
between these dates
Not a valid date
Not a valid date
Posted by
search criteria =
ALL
Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
ISACA.org
Certifications
Online Forums
Volunteering
My ISACA
Join ISACA
Skip main navigation (Press Enter).
Toggle navigation
Home
About Our Chapter
About
Member Benefits
Become a Member
Chapter Bylaws
Initiatives
CommunITy Day
One In Tech
Partners
Sponsors
Calendar of Events
Our Chapter Events
Search Events For All Communities
My Registrations
Past Events
Contact Us
Calendar of Events
Event Description
ISACA/IIA Joint Session - Jeremy Conway, MAD Security
When:
Dec 3, 2018 from 11:30 to 13:00 (CT)
Associated with
Huntsville Chapter
ISACA Huntsville/IIA Joint Session
Topic
: Vendor Management Cybersecurity Operationalization to Reclaim Control
Speaker:
Jeremy Conway, MAD Security
Background:
In the normal course of business, organizations increasingly rely on external service providers for a variety of technology-related services. While it may be cost efficient, outsourcing information technology services to an outside vendor does not remove the risk associated with information technology. Risks such as loss of funds, loss of competitive advantage, damaged reputation, improper disclosure of information, and regulatory action remain. Further, by outsourcing the service to an outside vendor, the organization may not be able to exercise the same level of control over the operation, compared to an in-house service provider. This presentation aims to provide guidance and tips on how organizations can reclaim control by operationalizing the cybersecurity components of vendor management. A panacea for vendor management does not exist, however pragmatic solutions do.
Learning Objectives
:
Describe why the risk management program, and specifically risk assessment lays the foundation building blocks for an effective vendor management program
Identify the key components and describe the methodology for quantifying risks within a vendor management program
Employ beyond due diligence to construct an operational vendor management program that exceeds regulatory requirements.
Implement procedures and processes that ensure vendor management is a win-win situation for everyone.
Speaker Bio
: Jeremy Conway is responsible for developing MAD Security’s vision for technology and security services. Jeremy has over 20 years of experience in the information security field and is recognized as an industry expert and innovator. Jeremy is a published author and renowned public speaker often sought after for his ability to present extremely technical cybersecurity research and subject matters in a simple and easy to digest format leaving audiences well educated and informed. He draws upon his past experience and expertise of recently founding and building a highly successful security assessment company, to having played an active and vital role in securing some of the largest networks in the world for customers such as NASA, the US Army, and the US Department of Defense. Jeremy’s formal education includes a master’s degree in Information Security, and a bachelor’s degree in Computer Science with a Minor in Mathematics. He holds numerous industry and professional certifications.
past_event
Location
The Atrium at Redstone Federal Credit Union
220-A Wynn Drive
Huntsville, AL 35893
Download to Your Calendar
Copyright 2024 ISACA. All rights reserved.
ISACA COMMUNITIES CODE OF CONDUCT
CHAPTER PRIVACY POLICY
Powered by Higher Logic