ISACA South Florida - 3rd Annual GRC Conference

When:  Jun 21, 2019 from 8:00 AM to 7:00 PM (ET)
The GRC Conference is the premier summer conference for South Florida IT executives in the private and public sectors and provides opportunities for IT leaders (CIOs, CISOs, CSOs, CTOs, and IT Directors) and other industry practitioners to share their experiences and network while hearing informative and engaging presentations. Topics will cover pertinent areas in the security world including security automation, security responsibilities for cloud services, incident response, IoT and mobile devices security. 

8 hours of CPE will be available and breakfast and lunch will be served.


Registration Costs:
ISACASFL Members: $115
Non-members: $125


Speaker Topic
James_Ward.jpg
James Ward,
Esq, Managing Partner
https://www.linkedin.com/in/privacylawjjw/

Christian_Ward.jpg
Christian Ward, Chief Data Officer
https://www.linkedin.com/in/wardchristianj/

Having a positive influence on the global information security crisis

Let's face it, headlines about cybersecurity are usually bad news. And with the constant spread of fear, uncertainty, and doubt, how is the professional community supposed to meaningfully advance the conversation about driving value with data?
James and Christian will discuss how to turn the information security conversation from one only about value at risk to one that includes opportunities for driving value.


Prior to Ward PLLC and SourceMedia, Christian Ward was EVP of Data Partnerships for Yext, Chief Data Officer for Infogroup, and Global Head of Content Innovation at Thomson Reuters. He has also founded two different data companies, one in financial research and the other in media analytics.

James ("Jay") is a privacy attorney and consultant, and offers clients expertise in data security, information management, and privacy while providing high-quality legal services.
Josh.jpg
Joshua Franklin, Sr. Cybersecurity Engineer, Center for Internet Security
https://www.linkedin.com/in/joshuamichaelfranklin/

Making the 20 critical security controls work for you



Everyone knows that a robust cyber defense program should be designed with defense in depth, but how to tactically implement layered defenses isn't necessarily obvious. For years, risk and security professionals have looked to the Center for Internet Security (CIS) Top 20 Critical Security Controls for guidance.

In addition to his work on the CIS Controls, Joshua is also focused on developing companion guides for mobile and Internet of Things (IoT) technologies. Prior to CIS, Joshua researched enterprise mobile security, cellular security, and electronic voting at National Institute of Standards and Technology (NIST). While at NIST, he managed the mobile security laboratory at the National Cybersecurity Center of Excellence (NCCoE).
Christine.jpg

Christine Vanderpool
, VP, Chief Information Security Officer for Florida Crystals
https://www.linkedin.com/in/christine-vanderpool-278b472/

Now we are breached: Is this a robust or regrettable incident response program?



It's the moment that you've dreaded. A data breach has been confirmed. Have you sufficiently prepared for this moment? Has the rest of the team?

Christine Vanderpool brings over 15 years of progressive job responsibilities with companies including IBM, Molson Coors, Kaiser Permanente, and most recently Florida Crystals Corporation. Her areas of expertise include application security management and IT governance, risk, and compliance informed by years of experience as Chief Information Security Officer.
Belardo.jpg

Eric Belardo
, CEO and Founder of ProtectX Solutions
https://www.linkedin.com/in/ebelardo/

Understanding the mobility of today’s threats with IOTs and mobile devices

With the continued proliferation of "smart" devices and sensors in the home and workplace, the Internet of Things (IoT) presents growing risk for professionals and organizations. How can organizations manage risk presented by the use of IoT devices?

Eric is a former CISO and has approximately 30 years of experience in cybersecurity risk management, security operations center management, security architecture (COBIT, TOGAF, DODAF), application security, penetration testing and GRC.
Herrera.jpg

Rene Herrera
, Director IT Audit, Internal Audit at Office Depot 
https://www.linkedin.com/in/rene-herrera-b40a581/

Varshney.jpg

Prateek Varshney
, IT Auditor at Office Depot
https://www.linkedin.com/in/prateekvarshney/

Automation and Auditing



Robotic Process Automation (RPA) keeps making headlines. As a means to increase efficiency and/or productivity, the automation approach is frequently part of the conversation. Does your organization know how to effectively leverage RPA?

In addition to leading a team of auditors to conduct IT and operational audit projects and IT SOX testing at Office Depot, Rene coordinates the ERM process and is responsible for innovation initiatives including Data Analytics and GRC implementation. Prior to Office Depot, Rene worked for Verizon in Internal Audit, International Operations and Lean Six-Sigma Process Improvement. Rene also serves on the Board of Directors of the non-profit organization Hispanics Inspiring Students' Performance and Achievement (HISPA), where he launched the HISPA role model program for schools in South Florida.
Prateek IT and integrated audits at Office Depot and works to identify potential efficiencies, control enhancements and process improvement opportunities. Prior to joining Office Depot, Prateek was as an Auditor at Petco.

Location

FAU Tech Runway
901 NW 35th St
Boca Raton, FL 33431
Event Image

Contact