With rapid and constant changes to the technology landscape, threats, frameworks, and legislations – it’s easy to neglect progression and get lost in the day-to-day of cybersecurity.
Working across the full spectrum of security teams, from new to well-established; Splunk constantly observes the patterns for success in cybersecurity, at every level. Spoiler alert – promotions and pay rises don’t come for maintaining the status quo. Join to learn:
- What security success looks like
- How organizations and the board define success
- What personal and team success looks like for individual contributors
- The top six observations of a ‘stand out’ security professional
EMEA Director of Product Marketing
Matthias Maier is a technical evangelist for Splunk in EMEA and is responsible for communicating Splunk’s go-to-market strategy in the region. He works closely with leading organizations and agencies to help them understand how to bring Data-to-Everything. Matthias has a particular interest and expertise in security, from Nmap scans to Information Risk Management and alignment with regulatory requirements. He is a regular speaker at conferences on a range of enterprise technology topics. Matthias holds active certifications as a Certified Ethical Hacker (CEH), Certified Information Security Professional (CISSP) as well as the Certified Information Security Manager (CISM).
The Salesforce economy is expected to create 4.2 million new jobs and $1.2 trillion of new business revenue by 2024 according to IDC. Join this webinar to learn more about the technology and the jobs and career prospects in the economy. We’ll also tell you the easiest, free way to become a Salesforce Developer.
Key points of discussion
- Learn the What, Why and How of Salesforce
- Understand Salesforce Job and Career Prospects
- Hear from Employers hiring Salesforce Developers
- Hear from successful Salesforce Developers
- Learn more about the #Journey2Salesforce program
Naga Kiran Manyala
Senior Manager, Developer Relations – Salesforce
Kiran has been with Salesforce for nine years and has been instrumental in building the Salesforce Trailblazer Community in India today. He has had a front-row seat to the explosion of opportunities in the Salesforce Economy in India and has seen the community grow from 9 community groups in 2012 to 180+ groups today. He’s personally invested in your success in Salesforce technology and is the best person to introduce and guide you on Salesforce.
Key points of discussion
- Paysafe & It’s inclusive culture
- Tips and tricks for navigating at Workplace
- Upgrade your self- How Paysafe helps- ( Trainings, Certifications)
Who should attend
Men & Women in Tech- Product Managers, Project management, Developers, Testers who are keen to understand gender diversity in Indian context
Project Manager – Paysafe Group
Project Management leader with 14 + years of professional experience managing software projects using traditional & agile methodologies at successful companies like CA, IBM, United Health Group, Poly. Passionate about building and leading high-caliber product organizations. Currently with Paysafe as a Project Manager managing complex projects across the globe. Her global and diverse experience of working in the US, she understands the challenges women face. An optimistic individual who believes, women can achieve what they wish if they are persistent. She is a public speaker and has given lectures in the US on technical and leadership topics.
Follow us as we follow the sun around the world on International Women’s Day, celebrating women in data science and related fields.
WiDS Philadelphia is an independent event organized by Vanguard, Temple, Drexel, UPenn, SAP, Comcast, and others to coincide with the annual Global Women in Data Science Conference held at Stanford University and an estimated 150+ locations worldwide. The Global WiDS Conference aims to inspire and educate data scientists worldwide, regardless of gender, and to support women in the field.
This one-day technical conference provides an opportunity to hear about the latest data science-related research and applications in a number of domains and connect with others in the field. The program will include technical talks, panel discussions, recruiting opportunities, and several networking breaks throughout the day and will bring together local academic leaders, industry professionals, and students. All genders are invited to attend WiDS regional events, which features outstanding women doing outstanding work.
Our vision is to foster a community of data scientists and supporters in Philadelphia from various backgrounds, both in industry and academia. We hope to create a space for data scientists and technical professionals to meet, where networking and knowledge sharing can flourish. We believe that this will help connect the community of technical professionals, promote women in data science, and support continuous learning.
PowerShell is a critical tool for IT personnel in many job roles, across a broad spectrum of different technologies; but many have not used it, may not understand it, or avoid using it with: – Client & Server programs: Windows 10, Windows Server, and Linux. – On Premises/Private Cloud: Exchange, SharePoint, and SQL Server, Endpoint Configuration Manager (formally SCCM) and more! – Public Cloud: Microsoft 365 [Online versions of SharePoint, Exchange, Teams, Azure Active Directory, Intune/Endpoint Manager, Yammer and more], Azure services, Dynamics 365, Amazon Web Services, Cisco, Citrix and many more! In this webinar, New Horizons Instructor Bob Krone will introduce some PowerShell fundamentals to help give you a kickstart into the world of PowerShell. After this, there are many ways to continue building your skills with PowerShell.
This webinar will introduce cyber risk quantification (CRQ) and the means and methods used to employ it in the enterprise. The presenters will describe some of the problems associated with using verbal and ordinal scales to measure cybersecurity risk. They will emphasize the importance of utilizing ratio scales for quantification measures such as frequency, control capability, and economic impact—to achieve meaningful risk assessments. Also covered are the sources for data (external and internal) as well as soliciting data from subject matter experts. The webinar will end with information on integrating CRQ with other risk assessment methods.
Jack Freund, Ph.D.
Head of Cyber Risk Methodology
Over the course of his 20-year career in technology and risk, Dr. Jack Freund has become a leading voice in cyber risk measurement and management. He is the co-author of an award-winning book on cyber risk quantification and holds a doctorate in Information Systems. Jack is currently serving as Head of Cyber Risk Methodology for VisibleRisk (Moody’s and Team8 JV). Previously Jack served as Cyber Risk Director for RiskLens and TIAA. Jack was named Distinguished Fellow of the ISSA, awarded Global Achievement Awards by ISACA and (ISC)2, and named a Fellow of the IAPP and the FAIR Institute.
Chief Risk Scientist
RiskLens and Chairman of the FAIR Institute
Jack has worked in information security for over thirty-five years, including ten years of experience as a CISO with three different companies, including a Fortune 100 company. His work was recognized in 2006 with the ISSA Excellence in the Field of Security Practices award. In 2012 Jack received the CSO Compass award for risk management leadership. An adjunct professor at Carnegie Mellon University, he teaches in the CRO and CISO executive programs. Jack also created the “Factor Analysis of Information Risk” (FAIR) model adopted as an international standard. Currently, Jack is the Chief Risk Scientist at RiskLens and Chairman of the FAIR Institute, an award-winning global non-profit organization. He has also co-authored a book on FAIR entitled “Measuring and Managing Information Risk, a FAIR Approach” which was inducted into the Cyber Security Canon in 2016.
Today, more than ever, ethical use of data and AI must be a foundational principle resulting in actions for marketers. We will discuss that trust matters in marketing and how marketers can begin to create and apply principles to their work in order to avoid the pitfalls of intentional and unintentional misuse of data and AI.
With the cybersecurity threat landscape constantly evolving it is more important than ever that companies implement practices and techniques to mitigate and build cyber resilience.
In this webinar, Dustin Brewer will take you on a journey through the cybersecurity process from beginning to end, utilizing cyber maturity measurements to discover gaps from the policy all the way down to the technical controls on the end-user device—and everything in between. This presentation is a fit for your entire cyber team, from your top-level c-suite executives to GRC and IT and risk professionals.
Key discussion points in this webinar include:
- Maturity assessment documentation process illustration
- Discovery via live computing environments
- Cyber maturity and the future of Cybersecurity
- Live Q&A
Cannot make the live webinar date? Be sure to register and we will send you the recording after the event.
Sr. Director, Emerging Technologies and Innovation
Dustin Brewer has 20 years of experience in the IT field beginning with networks, programming, and hardware specialization. He completed a bachelor’s degree in Cybersecurity and Information Assurance at Western Governor’s University, and while serving in the U.S. Military, he excelled in the Cybersecurity field with Computer Incident Response Teams and as a Senior Test Engineer while stationed at Fort Meade. Working as an independent contractor and lead developer for defense contract agencies, he specialized in computer networking security, penetration testing, and training for various DoD and commercial entities. As the Sr. Director, Emerging Technologies and Innovation with ISACA, he currently develops innovative training programs to best prepare cybersecurity specialists for the future of this dynamic field.
Third-party risk management doesn’t end when you sign the contract. As regulations evolve and market conditions change it’s important to keep tabs on your vendor population to make sure risk hasn’t crept back into your organization. Ongoing vendor monitoring is just as critical as pre-contract due diligence, but many organizations struggle to keep pace with a vendor population that only gets larger and larger each year. Join ProcessUnity for expert advice on how to build a world-class, post-contract vendor monitoring engine. We’ll offer practical tips to assess more vendors, more thoroughly on a schedule that makes sense for your company.
Attendees will learn how to:
- Design review cadences using inherent risk calculations
- Properly scope due diligence based on vendor criticality
- Incorporate expert ratings into review processes
- Improve vendor response rates, times, and quality
- Integrate vendor service reviews with assessment processes
Senior Vice President of Marketing and Sales Operations
Ed Thomas leads ProcessUnity’s marketing team and is responsible for the company’s awareness, demand generation, and thought-leadership programs. In his marketing and sales operations roles at ProcessUnity, Cura Software Solutions, and OpenPages (now IBM), Ed has helped hundreds of organizations streamline their risk and compliance programs using next-generation automation tools.