Audit, Risk, and Compliance departments want to use automation to reduce costs, create efficiencies and enhance their value proposition to the business when managing risk; however, they do not have the internal capabilities to execute. Monitoring controls and control testing are often inefficient, expensive, and burdensome for organizations; however, many organizations do not have the internal capabilities to shift from a manual approach (susceptible to human error, with manual labor costs, and significant limitations on outcomes given the sub-sets of data used for controls /testing samples) to an automated approach. Our methodology and objective is to bring an automated continuous monitoring service offering to market, in order to help our clients identify their business case so that they are able to realize the benefits of control test automation in today’s market.
Don’t miss the GraphQL event of the year! Developers, software architects, and product leaders will gather together online from all over the world to learn, discuss, and advance GraphQL best practices.
We will be splitting the content across two weeks to help prevent screen time burnout. GraphQL Summit Worldwide will take place on July 30-31 and August 6-7, 2020.
Attendees will have access to 3-4 hours of interactive talks and panels each event day from experts in the GraphQL community. As always, we’ll create multiple environments for attendees to network with each other and meet GraphQL leaders.
Are your work-from-home personnel putting the information they access at risk? Do they comply with your organization’s security and privacy requirements within home offices? Where are hidden digital spies who can access business data in home offices?
Rebecca Herold, CEO of The Privacy Professor, and author of the new CRC Press book, “Security & Privacy when Working from Home & Travelling,” will describe what she has learned in 25+ years of being an information security and privacy leader, and what her research into these issues teaches all organizations about how to effectively manage information security and privacy risk management in work-from-home situations.
Understanding your assets is the foundation of cybersecurity, right? So then why is asset management still such a monster of a problem? As IT environments become increasingly complex, teams are struggling to keep up.
We are spending millions of dollars on security solutions, but we cannot even validate that they are deployed and functioning like they ought to. It is a nightmare…but it does not have to be.
Join us for Mastering Cybersecurity Asset Management — Once and For All, a free webinar hosted by Andrew Senko, Sr. Security Engineer at Axonius.
Andrew will cover why it’s more important than ever to have a foundational understanding of the assets in your environment.
RSVP now to learn:
- Why cybersecurity asset management is at the top of CISOs’ priorities
- The massive challenge that comes with aggregating disparate data sets
- How tools built specifically for cybersecurity asset management are helping real teams at real org
Enterprise organizations exist to provide products, services, and value to the communities they serve. Whether public or private, government or military, non-profit, or profit-making, all enterprises need to deliver on their goals and objectives. Risk can impede the enterprise’s ability to be successful in meeting their mission.
Today, more than ever, our dependence on the intangible digital domain, information and technology assets, and virtual connectivity make managing risk of all types critically important.
Join us for this webinar on 12 August and learn more about:
- Risk is ubiquitous, that’s why risk identification is a vital step
- The risk thread and how it connects to cyber, information security, audit, governance, etc.
- How to think about managing the different types of risks that enterprises face
The COVID-19 pandemic changed how many of us get our work done in substantial ways – some of which may end up more longer-term changes.
One of the biggest changes that Adobe and many other large organizations had to go through – and quickly – is the mass enablement of productive working from home for employees around the world. This transition had to happen quickly – for Adobe and I’m sure many of you, almost overnight. But how do you go about protecting – or even improving – your current security posture with such a mass transition while also keeping everyone working and collaborating effectively?
Join Eric Anderson, Adobe’s Acting Director for Enterprise Security, as he discusses learnings and best practices, we gathered from making this transition for our over 22,000 employees worldwide.
Join this webinar and hear Eric speak about:
- How our policies, procedures, preparations enable us to respond quickly to the changes required for our pandemic response
- How we maintained our security risk posture during this transition
- Some of the technology solutions we leveraged to help us make the transition
- What we learned from this experience that is making how we go about security at Adobe even better
As researchers, we use contextual inquiry as part of our generative-research toolbox, leveraging in-person observation to tell us about user needs, expectations, and behavior. It is an essential methodology that provides valuable insight into understanding the customers we serve. Now that we’re living in a social-distancing world, how do we make use of this key technique to help the designers in our lives create compelling experiences? This presentation will share ideas and tips for how to conduct contextual inquiry research in the age of quarantine, including collaboration tools, remote-conferencing opportunities, and ways to involve other researchers, designers, and product owners in the research process.
The Digital Leader Fireside chats will feature one prominent executive in a 45-minute informal Q&A discussion about an important topic.
Typically offered online around lunchtime on Zoom, the chats will offer industry participants and students with a brief yet in-depth perspective on the opportunities and challenges of digital leadership. Participants can pose questions during the discussion. Each session is moderated.
Space is limited and you must register in advance. IBIT reserves the right to screen attendees. If you register for the webinar but do not attend or leave early points will be deducted.
George Llado, Senior Vice President & CIO, Alexion
Topic: The Future of Work
September 8, 2020, 12pm – 1pm
Linda Descano, Executive Vice President, Red Havas
Topic: Digital Employee Engagement Through and Post COVID-19
September 30, 2020, 12pm – 1pm
Christopher Kearns, Senior Vice President, NBCUniversal
Topic: Is Digital Transformation in the end all about the customer experience?
November 6, 2020, 11am-12pm
Cindy Leavitt, CIO & Vice President of Information Technology Services, Temple University
Topic: Accelerating Agile/DevOps transformation in a CoVID world
January 20, 2021, 12pm-1pm
Renee Galitis, EVP & Chief Information Officer, Caliber Home Loans
Topic: Women in Tech
February 3, 2021, 12pm-1pm
Stacy Greiner, Chief Marketing Officer, Dun & Bradstreet
Topic: Organizing for and Digitizing the Next Generation Customer Journey
February 10, 2021, 12pm-1pm
Join The Girls in Tech Conference to learn from inspiring leaders, have real conversations, and connect with a diverse community, designed to help you triumph!
The Girls in Tech Conference is your chance to have a real conversation about all the things that matter —- life experiences, triumphs, setbacks, tricks of the trade, and industry trends. It will feature motivational presentations from some of the most extraordinary minds in tech, science, space and business, meaningful networking opportunities, breakout sessions, meditation, music, and more. This highly interactive virtual event is here to help you become your best self and thrive in work and life.
These are just some of the reasons to join us on September 9, 2020.
- You will walk away with the knowledge and skills to advance your career and seek exciting job opportunities.
- You also will expand your community of colleagues, mentors, and role models who can nurture your growth and development.
- You will learn about companies that are leveraging technology to drive change and growth within their industries — and how you can best be poised to impact that change.
Two panels will discuss current practice trends in testing and the future of cybersecurity. Following the panel discussions, attendees are invited to interact in topic-specific breakout groups.
State of Cyber Security: Current Industry Practices in Testing and Cyber Research Innovations
Noon – 12:30 PM – Panel 1 – Current Industry Practices in Security Testing & Assessment
12:30 – 1:00 PM – Panel 2 – A View into Temple Cyber Research and Industry Partnerships
1:00 – 1:30 PM – Interactive Breakout Rooms
Sponsored by Temple University’s College of Science and Technology (CST) and the Office of the Vice President for Research (OVPR).