We are attending, speaking, and sponsoring information security events throughout 2019. Let’s make plans to meet — we look forward to seeing you!
4th & Final 2019 Chicago CISO of the Year Social Mixer
When: August 20, 2019 - August 20, 2019
Where: Metropolitan Club at Willis Tower - 67th Floor 233 S Wacker Dr Chicago, IL 60606
Description: WHEN: August 20, 2019 @ 5:00 pm – 8:00 pm
WHERE: Metropolitan Club at Willis Tower - 67th Floor 233 S Wacker Dr Chicago, IL 60606
Cyber Security Summit Chicago
When: August 27, 2019 - August 27, 2019
Where: Chicago, IL
Description: The fourth annual Chicago Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts.
CUNA Technology Council Conference: The Questions a Judge Will Ask You After a Data Breach – A Panel Discussion
When: September 11, 2019 - September 14, 2019
Description: At the CUNA Technology Council Conference, attendees learn new strategies to innovate and connect with one another within and across their business areas.
The Questions a Judge Will Ask You After a Data Breach – A Panel Discussion
Chris Cronin, Principal, HALOCK Security Labs, Schaumburg, IL
Bill Podborny, CISO, Alliant CU, Chicago, IL
Federal regulators, including NCUA, increasingly urge organizations to use risk analysis to determine whether security controls are reasonable. However, regulators are restrained from describing how risk analysis should work. During this session we will show how organizations can use Duty of Care Risk Analysis to demonstrate whether security controls and risks are reasonable, and to do so in a way that supports management objectives, regulatory requirements, and information security disciplines.
The California Consumer Privacy Act (CCPA): Applicability, Requirements, and Practical Tips on Compliance: MCSA Meeting
When: September 12, 2019 - September 12, 2019
Where: Milwaukee, WI
Description: Thursday, September 12, 2019 | 5:00 p.m. – 7:00 p.m. CDT
The California Consumer Privacy Act (CCPA) will be effective January 1, 2020, and enforced beginning six months later. Despite the quickly approaching effective date, there are still a number of pending legislative bills seeking to amend CCPA. This has created immense uncertainty for companies trying to bring their business into compliance with CCPA.Join us at the next Midwest Cyber Security Alliance (MCSA) meeting, which will address the following types of questions to ensure attendees leave the presentation understanding whether CCPA applies to their business and, if so, the steps they should take to comply:
• Does CCPA apply to my business?
• How does CCPA affect our collection, use, and disclosure of personal information?
• What rights do individuals have under CCPA with regard to their personal information?
• What are the “reasonable security procedures and practices appropriate to the nature of the information” required by CCPA to protect personal information?
• What are the status of the various proposed amendments to CCPA?
• What are the potential penalties and risks of noncompliance, including private rights of action and the likelihood of class action lawsuits? Attendees will enjoy complimentary cocktails and networking before the presentation.There is no fee to attend this event, but advance registration is required. Click to register.
CyberNext Summit 2019 – KuppingerCole Analysts
When: October 8, 2019 - October 10, 2019
Description: Cybersecurity is shifting toward more distributed and dynamic models. Decentralized security infrastructure brings its challenges and opportunities. CyberNext Summit (#CNS19) summit will focus on the capabilities needed to achieve security in such a distributed environment, especially in the context of ever-increasing security threats.
SPEAKER: Chris Cronin
CISO of the Year Award Breakfast
When: October 15, 2019 - August 15, 2019
Description: This award has been established to publicly recognize top senior information security leaders through nominations, judges and support from within the local community. The award will be presented on October 15th at a Breakfast Ceremony at the Metropolitan Club of Chicago.
CAMP IT: IT Leadership & Digital Transformation Strategies
When: October 17, 2019 - October 17, 2019
Description: SPEAKER: Jim Mirochnik
Institute of Real Estate Management (IREM) Cybersecurity Webinar: Safekeeping Your Online Accounts – How to stop hackers from taking your money and information.
When: October 22, 2019 - October 22, 2019
Description: Safekeeping Your Online Accounts - How to stop hackers from taking your money and information. Security professionals get asked all of the time "What are the top things that I should be doing right now to keep my online accounts safe?" There are many "attack paths" that bad actors take to attempt to get to your money. Knowing what these attacks are - and what to do to protect your online accounts is the answer to the question asked above.
This session will cover how the attacks are planned and carried out, and the keys to protect your accounts and data. Some topics include the concepts of phishing, spear-phishing, call fraud, scareware, extortion and the ways to protect against them, such as password approach, protecting email, devices and social media accounts.
After attending this session, participants will be able to:
• Understand the various attack paths that bad actors take to get to user accounts.
• What users generally do wrong that helps the bad actors win.
• Be aware of the key things to do to protect online accounts.
(ISC)² Security Congress: The Questions a Judge Will Ask You After a Data Breach
When: October 30, 2019 - October 30, 2019
Where: Orlando, FL
Description: What is “reasonable” security? If you are breached and your case goes to litigation, you will be asked to demonstrate “due care.” This is the language judges use to describe “reasonable.” Organizations must use safeguards to ensure that risk is reasonable to the organization and appropriate to other interested parties at the time of the breach. This presentation references case law, regulatory oversight and the Center for Internet Security Risk Assessment Method (CIS RAM), with a discussion on the future implications of this approach toward defining reasonableness. CIS RAM is based on the Duty of Care Risk Analysis standard (DoCRA.org) and is recognized by attorneys, regulators and interested parties for its ability to demonstrate reasonable implementation of controls. SPEAKERS: Terry Kurzynski, DoCRA Council and Aaron DeMaster, Rexnord Learning Objectives:
Define risk assessment criteria so they allow for comparison, reflect the organization’s values and will hold up to public scrutiny.
Model and select threats that are relevant to information assets and controls.
Estimate the likelihood of risks.
When: November 12, 2019 - November 12, 2019
Where: Milwaukee, WI
Description: MCSA Meeting
AHLA Fundamentals of Health Law Conference Questions a Judge Will Ask You After A Data Breach
When: November 19, 2019 - November 19, 2019
Where: Chicago, IL
Description: SPEAKERS: Terry Kurzynski, HALOCK Security Labs & Jennifer Rathburn, Foley & Lardner
Infosecurity ISACA North America conference: Duty of Care Risk Assessment (DoCRA)
When: November 20, 2019 - November 20, 2019
Where: New York
Description: A discussion of the new Duty of Care Risk Assessment methodology (DoCRA) for infosecurity also known as the Center for Internet Security Risk Assessment Method (CIS RAM) Discuss what sets this method apart and why it is an important business tool. After this session you will be able to: Understand what sets the Duty of Care Risk Assessment apart from all others.
Understand what regulators are looking for in a complete and thorough risk assessment and how the Duty of Care Risk Assessment fulfills those regulations and standards.
Understand what basic questions are asked during litigation after a breach and how the Duty of Care Risk Assessment answers those questions.
Understand how to complete a Duty of Care Risk Assessment along with where to get the free tools to successfully complete the assessment. SPEAKER: Tod Ferran, CISSP, QSA, ISO 27001
Managing Consultant Infosecurity ISACA North America Conference