{"id":3615,"date":"2023-10-13T22:54:34","date_gmt":"2023-10-14T02:54:34","guid":{"rendered":"https:\/\/community.mis.temple.edu\/itacs\/?page_id=3615"},"modified":"2025-05-13T12:06:34","modified_gmt":"2025-05-13T16:06:34","slug":"webinars-workshops","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/itacs\/webinars-workshops\/","title":{"rendered":"Talks\/Webinars\/Workshops"},"content":{"rendered":"<div class=\"post-header\">\n<header class=\"entry-header\">\n<h3>Presentation \u2013 <strong><span data-olk-copy-source=\"MessageBody\">\u201cCyber at City Scale: Leading Cybersecurity Across a City of 1.5 Million\u201d<\/span><\/strong><\/h3>\n<p><strong>Date:<\/strong> May 21, 2025, Wednesday, 3:00 pm \u2013 5:00 pm<\/p>\n<p><strong>Location:<\/strong> Room 200,\u00a0<span data-olk-copy-source=\"MessageBody\">Speakman Hall<\/span>\u00a0on Temple University\u2019s Main Campus<\/p>\n<p><strong>Presenter:<\/strong> Jessica Hoffman CISSP, Deputy CISO \u2013 City of Philadelphia<\/p>\n<p>Presentation slides<\/p>\n<div class=\"post-header\">\n<header class=\"entry-header\">\n<hr \/>\n<h3><span style=\"font-size: 16px\">Presentation \u2013 <\/span><strong style=\"font-size: 16px\">\u201cStronger Together: A Look Inside How the First and Third Lines of Defense work together to manage Tech Risk\u201d<\/strong><\/h3>\n<\/header>\n<\/div>\n<p><strong>Date:<\/strong> April 17, 2025, Thursday, 3:00 pm \u2013 5:00 pm<\/p>\n<p><strong>Location:<\/strong> Room 200,\u00a0<span data-olk-copy-source=\"MessageBody\">Speakman Hall<\/span>\u00a0on Temple University\u2019s Main Campus<\/p>\n<p><strong>Presenter:<\/strong> Jodie Lash (Senior Director of Technology Assurance and Controls, FanDuel), and Joshua Leibowitz (Internal Audit Leader, FanDuel)<\/p>\n<p><a href=\"https:\/\/community.mis.temple.edu\/itacs\/files\/2025\/04\/Program-Overview-Presentation-FTLOD.pdf\">Presentation slides<\/a><\/p>\n<div class=\"post-header\">\n<header class=\"entry-header\">\n<hr \/>\n<h3><span style=\"font-size: 16px\">Presentation \u2013 <\/span><strong style=\"font-size: 16px\">Cybersecurity Careers and Professional Certifications<\/strong><\/h3>\n<\/header>\n<\/div>\n<p><strong>Date:<\/strong> Friday, April 4, 2025, from 3:00 pm to 5:00 pm<\/p>\n<p><strong>Location:<\/strong> Room 520, 1810 Liacouras Walk (Temple University \u2013 Main Campus)<\/p>\n<p><strong>Presenter:<\/strong> Roger Vann, Bryan Bechard, Dan Reither, and Ed Jowett<\/p>\n<p><a href=\"https:\/\/community.mis.temple.edu\/itacs\/files\/2025\/04\/TempleCareerFinal040425.pdf\">Presentation slides<\/a><\/p>\n<div class=\"post-header\">\n<header class=\"entry-header\">\n<hr \/>\n<h3><span style=\"font-size: 16px\">Presentation \u2013 Demystifying Cyber Insurance<\/span><\/h3>\n<\/header>\n<\/div>\n<p><strong>Date:<\/strong>\u00a0Friday, March 21, 2025 3:00pm<\/p>\n<p><strong>Location:<\/strong>\u00a0Temple University, Speakman Hall<\/p>\n<p><strong>Presenter:<\/strong>\u00a0Talk by Paul Needle (ITACS MS 2019), Senior VP and Cyber Treaty Underwriter for Munich Reinsurance America<\/p>\n<p><a href=\"https:\/\/community.mis.temple.edu\/itacs\/files\/2025\/04\/Cyber-Insurance-Temple-Presentation-2025-Final-Copy-.pdf\">Presentation slides<\/a><\/p>\n<div class=\"post-header\">\n<header class=\"entry-header\">\n<hr \/>\n<h3><span style=\"font-size: 16px\">CAE Federal Careers\/Lecture Series Follow up<\/span><\/h3>\n<\/header>\n<\/div>\n<p><strong>Date and Time:<\/strong> Wednesday, <span data-olk-copy-source=\"MessageBody\">October 23, 2024<\/span> 2:00pm<\/p>\n<p><span data-ogsc=\"black\"><strong>Agencies: <\/strong><\/span>DOD Chief Information Officer (CIO), National Security Agency (NSA),\u00a0<span class=\"markszphvn5z2\" data-markjs=\"true\" data-ogac=\"\" data-ogab=\"\" data-ogsc=\"\" data-ogsb=\"\">Federal<\/span> Bureau of Investigations (FBI), and Cybersecurity and Infrastructure Security Agency (CISA)<\/p>\n<p><span data-ogsc=\"black\"><strong>Opportunities: <\/strong>Use<\/span><span data-ogsc=\"black\"> the links below for the CAE Federal Careers information opportunities &amp; CAE Lecture Series resources. The next CAE Federal Careers Information Session will be held on December 4th from 2-4pm EST.<\/span><\/p>\n<\/header>\n<p><span data-ogsc=\"black\"><strong>Links:\u00a0<\/strong><\/span><a href=\"https:\/\/community.mis.temple.edu\/itacs\/files\/2024\/11\/1730491598_U-DoD-Cyber-Service-Academy-CSA-Overview_2024.pdf\">Presentation Slides<\/a>,\u00a0 <a href=\"https:\/\/community.mis.temple.edu\/itacs\/files\/2024\/11\/1730491598_FCSI25_Slides.pptx\">Internship Opportunity<\/a><\/p>\n<p><span data-olk-copy-source=\"MessageBody\"><strong>DOD CIO: <\/strong><a href=\"https:\/\/dodcio.defense.gov\/Cyber-Workforce\/Cyber-Service-Academy\/\">More information on DoD CIO<\/a><\/span><\/p>\n<p><span data-olk-copy-source=\"MessageBody\"><strong>CISA:<\/strong> More information on CISA &#8211; <a href=\"mailto:education@cisa.dhs.gov\">email<\/a>, <a href=\"https:\/\/www.cisa.gov\/careers\">Careers at CISA<\/a>, <a href=\"https:\/\/www.cisa.gov\/students-recent-graduates-employment-opportunities\">Opportunities at CISA<\/a><\/span><\/p>\n<\/div>\n<p><strong>FBI:<\/strong> <a href=\"https:\/\/fbijobs.gov\/\">FBI Jobs<\/a> , <a href=\"https:\/\/fbijobs.gov\/students-and-graduates\">Careers at FBI<\/a><\/p>\n<p style=\"text-align: left\"><strong>NSA: <\/strong>Use\u00a0links below<\/p>\n<ul>\n<li style=\"text-align: left\"><a href=\"https:\/\/www.nsa.gov\/careers\/\">NSA Careers<\/a>, <a href=\"https:\/\/icag1.recsolu.com\/app\/collect\/form\/FXECo5-_giu7kUXz_iTa0Q\">Share Your Details with NSA<\/a><\/li>\n<li style=\"text-align: left\"><a href=\"https:\/\/www.nsa.gov\/About\/Cybersecurity-Collaboration-Center\/\">Cybersecurity Collaboration Center<\/a> &#8211; <a href=\"mailto:kaitlyn.knabe@cyber.nsa.gov\">email<\/a><\/li>\n<li style=\"text-align: left\"><a href=\"https:\/\/nsa-codebreaker.org\/home\">NSA Codebreaker Challenge<\/a><\/li>\n<li style=\"text-align: left\"><a href=\"https:\/\/www.nsa.gov\/Puzzles\/View\/Article\/3926253\/no-such-puzzle-cybersecurity-awareness-month\/\">Cybersecurity Awareness Month &#8211; Test Yourself<\/a><\/li>\n<li style=\"text-align: left\"><a href=\"https:\/\/www.nsa.gov\/Podcast\/\">No Such Podcast<\/a> | <a href=\"https:\/\/www.nsa.gov\/Podcast\/\">The Official NSA Podcast<\/a><\/li>\n<li style=\"text-align: left\"><a href=\"https:\/\/www.youtube.com\/watch?v=c-2EVIJfyIY\">New Artificial Intelligence Security Center<\/a><\/li>\n<li style=\"text-align: left\"><a href=\"https:\/\/www.youtube.com\/watch?v=nFJ6SB_wQrY\">Women in Cyber @ NSA Video<\/a><\/li>\n<li style=\"text-align: left\"><a href=\"https:\/\/www.lps.umd.edu\/2025-future-computing-summer-internship\/\">NSA High Performance Computing Summer Internship (No clearance required)<\/a><\/li>\n<li style=\"text-align: left\"><span data-olk-copy-source=\"MessageBody\">For the copy of Zero Trust for Tactical Edge Network Environments: <a href=\"mailto:calyamp@missouri.edu\">email<\/a><\/span><\/li>\n<\/ul>\n<div class=\"post-header\">\n<header class=\"entry-header\">\n<hr \/>\n<h3>Webinar &#8211; 2024 Cyber Threat Intelligence Trends<\/h3>\n<p><strong>Date:<\/strong> Thursday, February 15th 3:30pm<\/p>\n<p><strong>Location:<\/strong> Zoom, registration to be announced&#8230;<\/p>\n<p><span data-ogsc=\"black\"><strong>Presenter: <\/strong>Thu Nguyen CISA, CRMA, CPDSE<\/span><\/p>\n<p><span data-ogsc=\"black\">Thu Nguyen is an Associate Vice President at Wells Fargo working as part of the Audit Leadership Management Team. She serves on Temple University&#8217;s Information Technology, Auditing and Cybersecurity (ITACS) graduate program&#8217;s Industry Advisory Council and teaches the program&#8217;s IT Governance and IT Audit Capstone courses. Mrs. Nguyen has 30+ years of consulting, risk management, and audit experience; and has held leadership and management positions with Verizon, Lincoln Financial, Tokyo Marine, Capital One, Capital One and other companies; and is a board member of ISACA Philadelphia.\u00a0<\/span><\/p>\n<hr \/>\n<h3 class=\"entry-title\">Webinar \u2013 Cybersecurity Professionals: The New Warfighters for National Security<\/h3>\n<\/header>\n<div class=\"entry-content\">\n<p><strong>Date:<\/strong> Thursday, January 25, 2024 at 3:30pm<\/p>\n<p><strong>Location:<\/strong> Zoom &#8211; registration to be announced&#8230;<\/p>\n<p><strong>Presenter:<\/strong> Rodney A. Newton CISSP, CISA, CMMC, CDPSE, CFE<\/p>\n<p>Rodney Newton is an Information Security Professional with over 20 years of experience in Information Technology Audit, Security Assessments, Data Protection and Remediation. Rodney has worked in various industries including Banking, Utilities, Professional Services, Insurance, Technology, and the Federal Government. He also holds numerous industry certifications such as the Certified Information System Security Professional (CISSP), Certified Information Security Auditor (CISA), Cybersecurity Maturity Model Certification (CMMC) Registered Practitioner (RP), Certified Data Privacy Solutions Engineer (CDPSE), and Certified Fraud Examiner (CFE).<\/p>\n<p>Prior to starting Arnaz Consulting, Rodney was the Director of Internal Control Testing at SAP, where he managed a global team that performed internal control testing of information security controls. He was also the Program Manager for SAP\u2019s NIST Cybersecurity Framework (CSF) Maturity Assessment implementation. While at SAP he built out the Global Control Testing team from scratch, which included creating a process for properly testing IT controls and IT control management. Also implemented a framework to drastically reduce the number of Corrective Actions and Preventative Actions (CAPAs) from the company\u2019s SOC and ISO Audits.<\/p>\n<p>Mr. Newton\u2019s other previous experiences include IT Audit Manager within the Enterprise Technology Audit Group at Wells Fargo Bank, Manager with Grant Thornton, and an independent contractor supporting the Department of Defense (specifically the Navy, Army, and the Defense Logistics Agency).<\/p>\n<\/div>\n<hr \/>\n<h3 class=\"post-title\">Workshop &#8211; Social Engineering Educator Workshop<\/h3>\n<\/div>\n<div class=\"post-content\">\n<p><strong>Date:<\/strong> Monday, November 6, 2023<\/p>\n<p><strong>Description:<\/strong>\u00a0 Social engineering (SE) is defined as any act that influences a person to take an action that may or may not be in his or her best interests and is the method of utilizing human behaviours to engage in cybercrime. This 6-hour virtual workshop will introduce attendees to the SE topic, tactics and persuasion techniques used, SE playbooks, and relevance to cyberattacks and cybersecurity. Attendees will also engage in safe, ethical, and fun hands-on social engineering activities in teams and then share their experiences. The workshop will end with an interactive discussion about implementing SE training and education at their respective organizations, the role of ethics in training and education, and a Q&amp;A session with workshop organizers.<\/p>\n<p>Read more about our SE Educator Workshops:\u00a0<a href=\"https:\/\/sites.temple.edu\/care\/educator-workshop-registration\/june-7-2021-workshop\" target=\"_blank\" rel=\"noopener\">Summer 2021<\/a>,\u00a0<a href=\"https:\/\/sites.temple.edu\/care\/educator-workshop-registration\/fall-2021-se-educator-workshop\/\" target=\"_blank\" rel=\"noopener\">Fall 2021<\/a>, and\u00a0<a href=\"https:\/\/sites.temple.edu\/care\/educator-workshop-registration\/spring-2022-se-educator-workshop\/\" target=\"_blank\" rel=\"noopener\">Spring 2022<\/a>.<\/p>\n<p><strong>Apply\u00a0<a href=\"https:\/\/sites.temple.edu\/care\/educator-workshop-registration\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.\u00a0<em>Applications are being accepted until Friday, October 27th, 2023 at 12 pm ET.<\/em><\/strong><\/p>\n<p><strong>Eligibility<\/strong><\/p>\n<p>Full-time\u00a0educators (middle\/high school and higher education institutions), age range 18+.<\/p>\n<p>Please note that we are aligning ourselves with\u00a0<a href=\"https:\/\/www.nsf.gov\/od\/broadeningparticipation\/bp.jsp\" target=\"_blank\" rel=\"noopener\">NSF\u2019s commitment to broadening participation<\/a>, which is embedded in its Strategic Plan through a variety of investment priorities related to the Learning and Stewardship strategic outcome goals. Specifically, we are expanding efforts to broaden participation from\u00a0<strong>underrepresented groups and diverse institutions across all geographical regions<\/strong>.<\/p>\n<p>All applicants will receive a decision about 1-2 weeks after this deadline.<\/p>\n<p><strong>Notes<\/strong><\/p>\n<ol>\n<li>All applicants must provide:\n<ol>\n<li>CV\/resume<\/li>\n<li>A brief letter of support from their supervisor\/principal\/Chair confirming full-time status and knowledge of the applicant\u2019s interest in workshop participation.<br \/>\n<em>**Please do not provide an email exchange; the letter should be on institution letterhead and should only include the information requested.<\/em><\/li>\n<\/ol>\n<\/li>\n<li>All educators participating in the workshop will be required to complete a workshop evaluation survey.<\/li>\n<li>Select Middle\/High school educators selected for the workshop will be compensated for their time at the rate of $25\/hour. We can compensate up to 5 high school educators.<\/li>\n<li>Each selected participant must also complete\u00a0an audio-visual release waiver. This allows organizers to use images, audio, text, and video generated during the event for promotion and dissemination via conferences, publications, and podcasts.<\/li>\n<\/ol>\n<p>This event and evaluation are considered research and are part of the education and outreach efforts of\u00a0<a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=2032292&amp;HistoricalAwards=false\" target=\"_blank\" rel=\"noopener\">NSF Award # 2032292<\/a>.<\/p>\n<\/div>\n<hr \/>\n<h3>Webinar &#8211; New Securities and Exchange Commission (SEC) Cybersecurity Reporting Rules for Public Companies<\/h3>\n<p><strong>Date\/Time:<\/strong> Wednesday, October 25, 2023, 3:30 pm -4:30 pm<br \/>\n<strong>Location: <\/strong>In-person <strong>&#8211; <\/strong>1810 Liacouras Walk, Room 520 &amp; Online Zoom webinar<\/p>\n<p style=\"margin: 0in\"><span data-ogsc=\"rgb(36, 36, 36)\" data-ogsb=\"white\"><strong>Description:<\/strong> This presentation will cover rules public companies need to follow for disclosing cybersecurity\u00a0<\/span><span data-ogsc=\"rgb(36, 36, 36)\" data-ogsb=\"white\">incidents and risk management strategy and governance.\u00a0<\/span><\/p>\n<p><strong>Register <em><a href=\"https:\/\/temple.zoom.us\/webinar\/register\/WN_dyRvDSh-TBikYy50hUB7Gw\" target=\"_blank\" rel=\"noopener\">here<\/a><\/em><\/strong><\/p>\n<p><span data-ogsc=\"black\"><strong>Presenter: <\/strong>Thu Nguyen CISA, CRMA, CPDSE<\/span><\/p>\n<p><span data-ogsc=\"black\">Thu Nguyen is an Associate Vice President at Wells Fargo working as part of the Audit Leadership Management Team. She serves on Temple University&#8217;s Information Technology, Auditing and Cybersecurity (ITACS) graduate program&#8217;s Industry Advisory Council and teaches the program&#8217;s IT Governance and IT Audit Capstone courses. Mrs. Nguyen has 30+ years of consulting, risk management, and audit experience; and has held leadership and management positions with Verizon, Lincoln Financial, Tokyo Marine, Capital One, Capital One and other companies; and is a board member of ISACA Philadelphia.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Presentation \u2013 \u201cCyber at City Scale: Leading Cybersecurity Across a City of 1.5 Million\u201d Date: May 21, 2025, Wednesday, 3:00 pm \u2013 5:00 pm Location: Room 200,\u00a0Speakman Hall\u00a0on Temple University\u2019s Main Campus Presenter: Jessica Hoffman CISSP, Deputy CISO \u2013 City of Philadelphia Presentation slides Presentation \u2013 \u201cStronger Together: A Look Inside How the First and [&hellip;]<\/p>\n","protected":false},"author":29750,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-3615","1":"page","2":"type-page","3":"status-publish","5":"entry"},"jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/P2CTMC-Wj","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/pages\/3615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/users\/29750"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/comments?post=3615"}],"version-history":[{"count":32,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/pages\/3615\/revisions"}],"predecessor-version":[{"id":3993,"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/pages\/3615\/revisions\/3993"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs\/wp-json\/wp\/v2\/media?parent=3615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}