Date |
Time |
Method |
Meeting Topic |
CPEs |
January 18 |
5:30 pm to 8:30 pm (PT) |
In-Person |
Topic 1: Implementing an Effective AI Governance Program
Topic 2: Help, the auditors are coming!
|
2 CPEs |
February 1 |
6:00 pm to 8:00 pm (PT) |
Virtual |
Topic 1: Embracing Intelligence driven red-teaming and cyber resiliency testing
Topic 2: Impact of Corporate Culture in Organization Business, Internal Audit, and Digital Trust
|
2 CPEs |
February 15 |
5:30 pm to 8:30 pm (PT) |
In-Person |
Topic 1: Why AI governance is critical for AI safety and what threats does the rise of AI bring
Topic 2: Cloud Dinosaur to Cloud Cheetah
|
2 CPEs |
March 7 |
6:00 pm to 8:00 pm (PT) |
Virtual |
Topic 1: Information Security - Code Generation - Risks, Rewards, and de-risking the adoption
Topic 2: Security pitfalls of AI, solved by GenAI
|
2 CPEs |
March 21 |
5:30 pm to 8:30 pm (PT) |
In-Person |
Topic 1: Compliance as Code: Automating Controls at Scale
Topic 2: The Iranian cyber attack against Unitronics and what it means to critical infrastructure
|
2 CPEs |
April 4 |
6:00 pm to 8:00 pm (PT) |
Virtual |
Topic 1: Generative AI in Healthcare - Tech Stack, Prompt Engineering, Cybersecurity & Compliance Risks
Topic 2: Zero Trust in Web3 Technologies
|
2 CPEs |
April 18 |
5:30 pm to 8:30 pm (PT) |
In-Person |
Topic 1: Balancing AI: From Innovation to Responsibility
Topic 2: Building Fortresses: Designing a resilient Cybersecurity Program with Cutting-Edge Security Technology and Controls
|
2 CPEs |
May 2 |
6:00 pm to 8:00 pm (PT) |
Virtual |
Topic 1: Zero Trust as a business imperative
Topic 2: Why Your Cybersecurity Program is a Horse’s Behind
|
2 CPEs |
May 16 |
5:30 pm to 8:30 pm (PT) |
In-Person |
Topic 1: A mathe-magical shift left in the SDLC with formal methods
Topic 2: How to secure data destruction for end of life equipment
|
2 CPEs |
June 6 |
6:00 pm to 8:00 pm (PT) |
Virtual |
Topic 1: How to get started with AI Governance
Topic 2: Navigating Security Risk Management Challenges: Performing effective Risk Assessments and Influencing without Authority
|
2 CPEs |
June 20 |
5:30 pm to 8:30 pm (PT) |
In-Person |
Topic 1: Building Lean agile Security Risk Management strategies
Topic 2: Techniques to Identify and Resolve Conflict Before it Starts
|
2 CPEs |
July 11 |
6:00 pm to 8:00 pm (PT) |
Virtual |
Topic 1: Building and Scaling Continuous Security-Compliance
Topic 2: Preparing an effective info security compliance program for a small-and-medium business (SMB) to build trust for their service-offering
|
2 CPEs |
July 18 |
5:30 pm to 8:30 pm (PT) |
In-Person |
Topic 1: Supply Chain Security: How a large enterprise manages supplier and product risk
Topic 2: Privileged Access Management
|
2 CPEs |
Aug 1 |
6:00 pm to 8:00 pm (PT) |
Virtual |
Topic 1: Introduction to Privacy Enhancing & Privacy Preserving Technologies
Topic 2: Healthy Posture and you are in the Clouds
|
2 CPEs |
Aug 15 |
5:30 pm to 8:30 pm (PT) |
In-Person |
Topic 1: Securing Machine Learning workloads
Topic 2: Risk considerations in the age of AI
|
2 CPEs |
Sept |
6:00 pm to 8:00 pm (PT) |
Virtual |
Topic 1: SASE Unleashed: Redefining Network Security for the Cloud
Topic 2: Security Assurance and Compliance
|
2 CPEs |