Arm Against Cyberthreats: Collaborate, Comply, Conquer
Rolling Meadows, IL, USA (27 February 2014)—With cyberattacks occurring more frequently, compliance regulations becoming more stringent, and cloud and mobile devices blurring work and personal lines, securing enterprise IT has become more complex than ever. To help professionals strengthen their organization’s security and prepare for attacks, ISACA, a global association of 110,000 IS professionals, is hosting a free virtual conference, Cybersecurity: Collaborate, Comply, Conquer, on Tuesday, 18 March 2014, from 8:15 a.m.-5:00 p.m. EDT (UTC-4).
In this virtual conference, attendees will learn about the continually evolving threat landscape and how they can better secure their enterprises, including:
- The effect proposed legislation will have on their role and industry
- How to prepare for and mitigate enhanced attacks, such as DNS
- How to link critical infrastructure protection with industrial cybersecurity
Samuel Linares, CISA, CISM, CGEIT, CRISC, director of the Industrial Cybersecurity Center (CCI), said, “Although there is one reality, the cybersecurity of our organizations, we have multiple perceptions that should be shared and analyzed to adequately protect ourselves. We need to go beyond public private partnerships (PPP). Collaboration-, coordination- and commitment-based relationships (C3R) are key aspects for improving industrial cybersecurity.” Linares will present Industrial Cybersecurity: Is There a Cyber-tsunami in Waiting? during the virtual conference.
Other sessions include:
- Global Cybersecurity: New and Proposed Rules, Regulations Facing Modern Industry, presented by Jeffrey Ritter, founder of Waters Edge Consulting
- The Other Advanced Attacks: DNS/NTP Amplification and Careto, presented by Mike Chapple, senior director for Enterprise Support Services, University of Notre Dame
- Customized Malware—How to Address the “Invisible” Threat, presented by John Moynihan, CGEIT, CRISC, president and founder of Minuteman Governance
During ISACA’s virtual conference, several thousand attendees can participate in educational sessions, network with peers from around the world, and interact with exhibitors and sponsors in a virtual exhibit hall. They can earn up to five free continuing professional education (CPE) hours.
To register for the event, visit www.isaca.org/elearning. To learn more about ISACA’s global events, visit www.isaca.org/conferences.
With more than 110,000 constituents in 180 countries, ISACA (www.isaca.org) helps business and IT leaders maximize value and manage risk related to information and technology. Founded in 1969, the nonprofit, independent ISACA is an advocate for professionals involved in information security, assurance, risk management and governance. These professionals rely on ISACA as the trusted source for information and technology knowledge, community, standards and certification. The association, which has 200 chapters worldwide, advances and validates business-critical skills and knowledge through the globally respected Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk and Information Systems Control (CRISC) credentials. ISACA also developed and continually updates COBIT, a business framework that helps enterprises in all industries and geographies govern and manage their information and technology.
Participate in the ISACA Knowledge Center: www.isaca.org/knowledge-center
Follow ISACA on Twitter: https://twitter.com/ISACANews
Join ISACA on LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial
Like ISACA on Facebook: www.facebook.com/ISACAHQ
Joanne Duffer, +1.847.660.5564, email@example.com
Kristen Kessinger, +1.847.660.5512, firstname.lastname@example.org