Please join us for an Advisory Council webinar on 1/13/22 featuring Orlando Barone on Voicing Conviction: Keys to Persuading IT Risk Management Decision Makers?
You’ll need to register using the link in advance. https://temple.zoom.us/webinar/register/2116389832348/WN_tyPNNyOxR1yQ4jrox7H42Q
Your best argument is not enough. Persuasiveness requires that you look and sound convincing as an ITACS professional asking executives and board members to approve your audit proposal or accept your recommendations for corrective action. You will learn to educate without condescension or arrogance, interact effectively with decision-makers who are technically uninformed or technically knowledgeable and use voice and gesture to achieve the optimal tone and relevant results.
If you attend the entire webinar in its entirely, you’ll be able to submit 20 PRO points.
Please join us next Thursday, Feb. 3rd, at 2:00 PM for our next ITACS Webinar, which will feature a panel of experts discussing cyber risk, insurance, and the related job market.
In this panel discussion, we will offer a brief evolution of cyber insurance and the prominent role that it plays in business today. In addition, IT auditing and security functions of businesses are paramount to the protection of digital assets and operations. This presentation will provide insight into the value of combining insurance and risk management with IT audit, security, and compliance. Employment demand is strong and offers a viable pathway for graduates of the ITACS (IT Audit and Cyber Security Master of Science) program and RASLS (Risk, Actuarial Science & Legal Studies) graduates. (Be sure to scroll down the registration page to see the panelists’ bios.)
If you attend the entire webinar in its entirely, you’ll be able to submit 20 PRO points.
Connecting college students with employers and professional development: The Main Line Chamber of Commerce’s Talent and Education Network is connecting employers with talent through a series of 4 Opportunity Knocks events and the 2nd Annual No Limits Leadership Women in Tech Experience. These strategic gatherings with a purpose enable employers to impart knowledge that is essential for students to find a job and succeed at work. Students connect with employers seeking diverse candidates for internships and entry-level hires. Specifically, each event includes the below components:
- Learn: Interactive professional development for students focused on developing skills such as writing cover letters, interviewing, workplace communications, networking, and public speaking.
- Connect: The opportunity for students to meet and share resumes with employers.
- Follow Up: Introductions for students with employers they are most interested in.
Please join us for our next ITACS Webinar, which will feature a panel of experts discussing cyber risk, insurance, and the related job market.
If you attend the entire webinar in its entirely, you’ll be able to submit for 20 PRO points.
Register: To register for the webinar, click here. (Be sure to scroll the registration page down to see the panelists’ bios.)
Description of the webinar: In this panel discussion, we will offer a brief evolution of cyber insurance and the prominent role that it plays in business today. In addition, IT auditing and security functions of businesses are paramount to the protection of digital assets and operations. This presentation will provide insight into the value of combining insurance and risk management with IT audit, security, and compliance. Employment demand is strong and offers a viable pathway for graduates of the ITACS (IT Audit and Cyber Security Master of Science) program and RASLS (Risk, Actuarial Science & Legal Studies) graduates.
A Master Class on IT Security: Roger Grimes Teaches you Phishing Mitigation
Thursday, February 8th | 1:00 PM GMT+8
Phishing attacks have come a long way from the spray-and-pray emails of just a few decades ago. Now they’re more targeted, more cunning and more dangerous. And this enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more.
Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist where he’ll share a comprehensive strategy for phishing mitigation. With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against ever-present IT security threats like phishing.
In this webinar you’ll learn:
- How to develop a comprehensive defense-in-depth plan for phishing mitigation
- Ideas for security policies you can implement now
- Technical controls all organizations should consider
- Gotchas to watch out for with cybersecurity insurance
- Why it’s critical to develop your organization’s human firewall
Get the details you need to know now to protect your organization from phishing and social engineering attacks.
Speaker: Roger A. Grimes, Data-Driven Defense Evangelist
He is a 30-year computer security professional, author of 12 books and over 1,000 national magazine articles. He frequently consults with the world’s largest and smallest companies, and militaries, and he has seen what does and doesn’t work. Grimes was a weekly security columnist for InfoWorld and CSO magazines from 2005 – 2019. He regularly presents at national computer security conferences, and has been interviewed by national magazines and radio shows, including Newsweek magazine and NPR’s All Things Considered. Roger is known for his often contrarian, fact-filled viewpoints.
About this talk
Anyone working with AI needs to consider the ethics and governance of their data and the models they build. But there are so many ‘ethical frameworks’ out there, many with ambiguous and impractical statements, that it is difficult to know how to approach the issue or even where to start. In this webinar, Andrew Burgess, author, AI strategist, and qualified data ethics facilitator will take you through a practical AI and data ethics approach using the Open Data Institute’s Data Ethics Canvas. Using real-life examples, Andrew will explain the different risks associated with AI and how they can be mitigated. Andrew will be joined by Simone Larsson from Dataiku, who will take you through the new governance tools available in the latest version of DSS.
A management consultant, author, and speaker with over 25 years of experience, Andrew is considered an authority on innovative and disruptive technologies, including Artificial Intelligence and Robotic Process Automation. He is regularly invited to speak at conferences on these subjects. He is the author of ‘The Executive Guide to Artificial Intelligence (Palgrave MacMillan, 2018), Visiting Senior Fellow in AI and RPA at Loughborough University, and Expert-in-Residence for AI at Imperial College’s Enterprise Lab. He is a prolific writer on the ‘future of work’ and is frequently published in industry magazines and blogs.
– Andrew Burgess (AI Strategist & Founder at Greenhouse Intelligence)
– Simone Larsson (AI Strategy & Evangelism at Dataiku)
A business case for a strategic initiative as a role play between Head of R&D and Head of Compliance in an innovative agricultural machinery manufacturer company. The debate centres on the business opportunities that the Company can leverage in the Agricultural Technology space by successfully embracing emerging technology such as Blockchain, IoT, Machine Learning and Big Data all bound together by Artificial Intelligence and the associated risks and ethical considerations to the company. Using an appropriate governance framework for enterprise IT (COBIT 2019) is discussed to address these concerns.
Information Assurance Auditor
Everett has served as Vice-President and Certification Director of the ISACA Ireland Chapter and is currently the Chapter training lead on CRISC and COBIT 2019. He holds the mainstream ISACA certifications including CGEIT. He has delivered numerous training sessions to Chapter Members on Enterprise Architecture, Risk Management at four levels (101, 201, 301 & 401), and Information Management. He also serves as Secretary of the Chapters Risk Management – Special Interest Group. Professionally he currently provides guidance to SME’s on Information Assurance and Compliance.
IT Risk Manager
Martin has over 25 years experience in Technical, Audit and Risk roles across different industries.
He currently serves as ISACA Ireland board Vice President and board representative on the Chapters Risk Management Special Interest Group. He holds a BSc. Information & Systems and the following ISACA designations: CISA, CRISC, CGEIT, CDPSE and is an accredited trainer for CISA, CDPSE, COBIT 5.0 / 2019 and Cybersecurity. He has delivered numerous ISACA Ireland Risk Management, COBIT and Cybersecurity courses. He has presented at ISACA conferences and Global webinars and has had IT Audit articles and blogs published in the ISACA Journal international magazine.
Finding patterns and matching strategies are well-known NLP procedures to extract information from text.
Spark NLP library has two annotators that can use these techniques to extract relevant information or recognize entities of interest in large-scale environments when dealing with lots of documents from medical records, web pages, or data gathered from social media.
In this talk, we will see how to retrieve the information we are looking for by using the following annotators:
- Entity Ruler, an annotator available in open-source Spark NLP.
- Contextual Parser, an annotator available only in Spark NLP for Healthcare.
- In addition, we will enumerate use cases where we can apply these annotators.
After this webinar, you will know when to use a rule approach to extract information from your data and the best way to set the available parameters in these annotators.
About this event
Internet of Things (IoT) devices are creating cyber risks to organizations across all industries. From industrial operations to building controls to healthcare services these proliferating, often-unmanaged devices open new threat vectors into traditional IT systems. John Livingston, CEO – Verve Industrial Protection, discusses the biggest threats created by IoT device proliferation, why these systems and devices are unique to protect, and what organizations can do to address these risks. Tammy Klotz, Chief Information Security Officer – Covanta, will share an executive point of view on the challenges and solutions perspectives on IoT.
John Livingston is the CEO at Verve Industrial Protection, a leading cybersecurity software and services firm. John has extensive experience with IoT and securing IoT environments. Verve’s software platform provides an integrated approach to IoT security, and the company’s services team helps clients develop holistic security management for these “cyber physical systems”. He’s also become a leading contributor to the DOD’s efforts in securing their supply chain through his role at the DOD’s cyber hub for manufacturing.
Tammy Klotz is the Chief Information Security Officer at Covanta (CVA). Tammy’s background includes Information Risk Management, Plant/OT Cyber Security as well as IT Security, Risk & Compliance activities.
5:15PM – Meeting Room Opens
5:30 – 6:30PM: Welcome and Presentation
6:30 – 7:00PM: Open networking/ Breakout rooms
About this event
This webinar is a replay
Companies store their data in a database, and SQL is a common database query language that helps you to build your database, retrieve the data, and work with that data in a structured manner.
In this course, you’ll learn to extract and analyze data stored in databases. You’ll first learn to extract data and work with simple queries to pull specific data you need for your analysis. Join us for a fun interactive workshop that will get you on your way to using SQL.
What you will learn:
- What is SQL?
- Managing an SQL Database
- SQL statements like SELECT and WHERE
- And so much more…