Webinar: Topic 1: Zero Trust a business imperative, Topic 2: Risk Management in Cyber (2 CPEs)

When:  May 2, 2024 from 18:00 to 20:00 (PT)
Associated with  Silicon Valley Chapter

Topic 1: Zero Trust as a business imperative

Brief: In today's rapidly evolving digital landscape, the concept of Zero Trust has emerged as a critical business imperative. Zero Trust is not merely a cybersecurity strategy; it's a holistic approach that encompasses revenue protection, regulatory compliance, resilience, and reputation management. Revenue Protection: Zero Trust ensures that every access request, whether internal or external, is rigorously authenticated and authorized. By adopting Zero Trust principles, organizations safeguard their revenue streams by mitigating the risk of data breaches, fraud, and unauthorized access to sensitive financial information. Regulatory Compliance: In an era of stringent data protection regulations such as GDPR, CCPA, and HIPAA, compliance is non-negotiable. Zero Trust provides a framework for continuous monitoring, granular access controls, and encryption, thereby helping organizations maintain compliance with regulatory requirements and avoid costly penalties. Resilience: With the proliferation of cyber threats, resilience is paramount for business continuity. Zero Trust's "never trust, always verify" approach ensures that even if one layer of defense is compromised, critical assets remain protected. By implementing Zero Trust architecture, organizations bolster their resilience against cyberattacks, minimizing the impact of potential breaches on operations and reputation. Reputation Management: A single data breach can tarnish an organization's reputation irreparably. Zero Trust reinforces trustworthiness by prioritizing security and transparency. By demonstrating a commitment to safeguarding customer data and sensitive information, organizations enhance their reputation and build trust with customers, partners, and stakeholders. In conclusion, Zero Trust is not just a cybersecurity strategy; it's a strategic imperative for businesses seeking to protect revenue, maintain regulatory compliance, enhance resilience, and safeguard reputation in an increasingly interconnected and threat-prone digital landscape. Join us for an insightful webinar as we delve deeper into the principles and benefits of Zero Trust and explore how it can drive business success in today's dynamic environment.

Speaker Bio: Umar Carter is a Cyber Risk Advisor and Certified Chief Information Security Officer. As a Risk Advisor, he advises executives on Cybersecurity domains. Previously, he served as VP of Cyber Analytics at Zurich Insurance where he led the development, coordination, and execution of complex information security programs. He has also held several CFO roles with MNCs. He also holds a Cyber Policy certification from Harvard, several industry certifications, a Bs in Finance and Economics, and an Ms. in Information-Systems. Umar is a podcast host and board-chair at Inner-city Muslim Action Network (Chicago/Atlanta) and serves as an advisor for tech startups. 

Topic 2: Risk Management, Human Aspects of Cybersecurity, Professional Development in Cybersecurity

Brief: Assuming risk management: I have contended that the biggest problem is cybersecurity is that CISOs get the budgets they deserve, not the budgets they need. The problem is that generally cybersecurity executives have not learned how to make cost benefit based justifications for their budgets and it leaves them with some modified budget from the prior year. By incorporating business principles, cyber risk quantification, vulnerability management, and several other sciences, they can learn to deserve the budget that they need, and be able to make decisions on the optimization of their budgets. 

Speaker Bio: Ira Winkler, CISSP is the Field CISO for CYE (pronounced Sigh) Security, former Chief Security Architect at Walmart, and author of You Can Stop Stupid, Security Awareness for Dummies, and Advanced Persistent Security. He is considered one of the world’s most influential security professionals, and has been named a “Modern Day James Bond” by the media. He did this by performing espionage simulations, where he physically and technically “broke into” some of the largest companies in the World and investigating crimes against them, and telling them how to cost effectively protect their information and computer infrastructure. He continues to perform these espionage simulations, as well as assisting organizations in developing cost effective security programs. Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards. CSO Magazine named Ira a CSO Compass Award winner as The Awareness Crusader. Most recently, Ira was named 2021 Top Cybersecurity Leader by Security Magazine. Ira is also author of the riveting, entertaining, and educational books, Advanced Persistent Security, Spies Among Us and Zen and the Art of Information Security. He also writes for a variety of online sites, including RSA Conference, DarkReading and ComputerWorld, and for several other industry publications. Mr. Winkler has been a keynote speaker at almost every major information security related event, on 6 continents, and has keynoted events in many diverse industries. He is frequently ranked among, if not the, top speakers at the events. Mr. Winkler began his career at the National Security Agency, where he served as an Intelligence and Computer Systems Analyst. He moved onto support other US and overseas government military and intelligence agencies. After leaving government service, he went on to serve as President of the Internet Security Advisors Group, Chief Security Strategist at HP Consulting, and Director of Technology of the National Computer Security Association. He was also on the Graduate and Undergraduate faculties of the Johns Hopkins University and the University of Maryland. Mr. Winkler was previously elected the International President of the Information Systems Security Association, which is a 10,000+ member professional association. Mr. Winkler has also written the book Corporate Espionage, which has been described as the bible of the Information Security field, and the bestselling Through the Eyes of the Enemy. Both books address the threats that companies face protecting their information. He has also written hundreds of professional and trade articles. He has been featured and frequently appears on TV on every continent. He has also been featured in magazines and newspapers including Forbes, USA Today, Wall Street Journal, San Francisco Chronicle, Washington Post, Planet Internet, and Business 2.0