Conferences 

 

 

 

ISACA Silicon Valley 2017 Spring Conference

April 6-7, 2017

Biltmore Hotel and Suites

2151 Laurelwood Rd, Santa Clara, CA 95054

 

Register Now!

For More Current Updates about the Conference, Please Visit

2017 Spring Conference Website 

Theme: Data Security Breaches:

Are you prepared?

 

Most companies have some sort of data breach preparedness program in place however we face several hard to solve security challenges - changing threat spectrum with wide array of actors, Nation-states and proxies, Insider threat, malware, exploitation of zero day vulnerabilities, distributed denial of service (DDoS) attacks. Responding and staying ahead of emerging threats and the increasing sophistication of cybercriminals requires "constant vigilance," as Mad-Eye Moody from J.K. Rowling's Harry Potter series was fond of saying.

 

Topics covered include

·      Risks from system breaches

·      Password breach aftershocks

·      Nation-State cyber-attacks

·      Healthcare hacks

·      International data breaches

·      Changes in legal environment

·      Critical infrastructure

 Call for Speakers

Email topic and brief abstract to "Board of Directors, ISACA SV" [email protected]

Interested in Sponsoring or Volunteering?

Email [email protected] for more information

Who Should Attend?

  • Managers, Directors, CISO and CIOs who want to stay compliant and prevent security breaches
  • Audit, governance and privacy professionals who want to make sure they can prove compliance within budget
  • Technical-level professionals who just want to understand it all and have the confidence to know it’s going to work

 

The conference offers an unrivaled opportunity to expand your network and build onto your knowledge and skills. Check back for information about the expert-led sessions, workshops and learning tracks.

 

Why should you attend?

  • Expertise, Training and Networking…
  • Connect with peers
  • CPE Hours
  • Learn about the newest products and services
  • Content focused sessions
  • Real World Solutions
  • Recognized experts and elite industry speakers
  • Management practices that ensure the confidentiality, integrity and availability of information resource
  • Knowledge that will help you to cut costs, improve performance and increase efficiency

*******************************************************************

 

 

ISACA Silicon Valley 2016 Fall Conference

Nov 9-10, 2016

Biltmore Hotel and Suites

2151 Laurelwood Rd, Santa Clara, CA 95054

Register Now!

 

Enterprise Security, Compliance and Governance

 

Enterprise cybersecurity today is a Board conversation. Increasingly the CEO and the board have realized that they must become more proactive in evaluating security deficiencies as an enterprise risk management issue, and not underrate the importance, or compartmentalize department responsibility, for successful attacks. Nevertheless, there are still too many companies that treat the risk of cyberattack as an IT problem. While technology is an important part of an entity’s ability to keep its data safe, IT Security alone is not sufficient to guard against today’s sophisticated, multi-vector threats.  Security is everyone’s responsibility, starting with the CxO, and including all committee members, the board, department heads, and each employee.  Everyone must learn more about the threats, liability, and their associated responsibility for ensuring proper enforcement of cybersecurity policies and procedures.


Data from recent breaches that highlight the potential impacts and possible implications for the board include:


  • Loss of intellectual property including patented and trademarked material

  • Loss of PII that impacts customers, and triggers breach notification requirements

  • Legal expenses including regulatory fines and defense costs and compensation

  • Potential impact on stock value for public companies

  • Reputation damage that may lead to loss of goodwill and confidence by customers and suppliers and thereby negatively impact corporate market value,

  • Time and cost for breach investigation and communication with shareholders and regulatory authorities

  • Administrative cost to correct the impact of a breach


Fortunately, businesses are taking notice. The top drivers that are making cybersecurity a priority for board members are regulatory requirements, 3rd party risk, the negative publicity from organizations that had significant security but were nevertheless breached (Anthem, J P Morgan Chase, Target, eBay, etc.), and distributed guidance and frameworks from industry organizations. 


"Board involvement has helped improve cybersecurity practices in numerous ways ... as more Boards participate in cybersecurity budget discussions, we saw a 24% boost in security spending," states the PWC Global State of Information Security Survey 2016. This involvement, combined with an identification of key risks, helps manage an organization-wide security culture aligned with overall risk management and business goals that utilize people, process, and technology to create an integrated security posture.  This will go a long way toward managing cybersecurity risk.


To that end, the conference will focus on the following critical areas 


  • Enterprise Risk & Governance

  • CISO, Security Leaders and Board - What do they need to ask?

  • Effective 3rd Party Risk Assessment

  • Addressing Privacy from a Global Scale

  • Cloud & Mobile Security

  • Cyber Threat Intelligence

  • Phishing & Ransomware

  • DevOps Security

  • Cyber-Insurance

  • Underutilized Personnel Resources

Who Should Attend?

  • Managers, Directors, CISO and CIOs who want to stay compliant and prevent security breaches

  • Audit, governance and privacy professionals who want to make sure they can prove compliance within budget

  • Technical-level professionals who just want to understand it all and have the confidence to know it’s going to work

The conference offers an unrivaled opportunity to expand your network and build onto your knowledge and skills. Check back for information about the expert-led sessions, workshops and learning tracks.

Why should you attend?

  • Expertise, Training and Networking…

  • Connect with peers

  • CPE Hours

  • Learn about the newest products and services

  • Content focused sessions

  • Real World Solutions

  • Recognized experts and elite industry speakers

  • Management practices that ensure the confidentiality, integrity and availability of information resource

  • Knowledge that will help you to cut costs, improve performance and increase efficiency

Communicate Why Attendance is Valuable

It has long been proven that conferencing with your peers brings together an opportunity to tap experience that lends an invaluable resource to anyone in attendance. You can bring home the knowledge and experience to share within your organization, repaying your company several times over.

A few benefits that you will experience at ISACA-SV Conference

  • Discuss new technologies and trends with colleagues
  • Network with experienced professionals
  • Learn from experienced presenters, current professionals and leaders, with technical, practical information
  • Gain best practices for existing and new applications
  • Learn about future trends and innovations in the InfoSec industry

Nov 09, 2016 - Day 1 Session Schedule

 
TIme Session Abstract Speaker Name Title / Company
7.45 - 8.15 AM Registration, Networking, and Breakfast
8.15 - 8.30 AM Welcome Message from the ISACA – SV Board
8.30 - 9.15 AM Bring Order into Data Security Chaos Eric Tilenius CEO at BlueTalon
9.15 - 10.00 AM DDoS is Coming -- A Story of DD4BC and The Copy Cats Tin Zaw Director, Global Security Solutions
Verizon Digital Media Services
10.00 - 10.15 AM Break
10.15 - 11.00 AM Risk Assessments: are they still relevant? Sixto Bernal Director of Information Security
Marketo
11.00 - 11.15 AM Sponsor Session
11.15 -12.15 PM Lunch
12.15-1.00 PM The Politics of Running Security Office
Shanit Gupta Vice President, Security and Reliability
Practice Fusion
1.00 - 1.45 PM Facing the inevitable risk of insider threats - Strategies for detecting and mitigating them inside your network. Tony Zirnoon Head of Global Alliances and Channels at TrapX Security
1.45 - 2.00 PM Break
2.15 - 3.00 PM Panel Discussion - State of Cloud Security
3.00 - 3.45 PM Three security lessons from rapid growth of a healthtech start-up selling to large health-care companies Dinesh Gambhir Chief Product and Security Officer
HealthExpense
3.45 - 4.00 PM Sponsor Session
4.00 - 4.45 PM CISO, Security Leaders and Board - What they need to ask? Ashish Popli Director of Security
2K Games
4.45 - 6.00 PM Evening Reception and Networking

Nov 10, 2016 - Day 2 Session Schedule

 
TIme Session Abstract Speaker Name Title / Company
7.45 - 8.15 AM Registration, Networking, and Breakfast
8.15 - 8.30 AM Welcome Message from the ISACA – SV Board
8.30 - 9.15 AM Security Risk & Compliance Automation: Using GRC and other DevOps tools. Navarasu Dhanasekhar Director, Cyber & InfoSec Ops
GE Digital
9.15 - 10.00 AM Third party risk Ken Baylor President, Vendor Security Alliance,
Uber
10.00 - 10.15 AM Break
10.15 - 11.00 AM A View into the Threat Landscape -- Who? What? Where? Rudolph Araujo Vice President,Product and Solutions Marketing at FireEye, Inc.
11.00 - 11.15 AM Sponsor Session
11.15 -12.15 PM Lunch
12.15-1.00 PM Cloud Security at Speed: Keeping Pace with Expanding Cloud Environments Ganesh Kirti Founder and CTO /// Palerra
1.00 - 1.45 PM AI - Hype or Help? Tim Mather Chief Security Strategist at PatternEx / Partner at Fortium Partners, LP
1.45 - 2.00 PM Break
2.15 - 3.00 PM Panel Discussion - The brave new world of innovative security startups Mahendra Ramsinghani Chief Steward
Secure Octane
3.00 - 3.45 PM Improving CISO Communication with Senior Level Executives Nadeem Siddiqui Director, Cybersecurity and Privacy
PwC
3.45 - 4.00 PM Sponsor Raffle
4.00 - 4.45 PM Evolving a Bug Bounty Program Mike Shema VP of SecOps and Research
Cobalt.io
4.45 - 6.00 PM Evening Reception and Networking