PLEASE NOTE: In the confirmation e-mail you receive there will be a GoToWebinar Link - you MUST register there too - you can do day-of but you're better off doing it now so you're all set. We cannot control the additional registration in GoToWebinar, just the nature of the way things need to work in this virtual world. Thanks for your understanding.
- 1:00 -1:15 Announcements
- 1:15-2:05 Karina Klever
- 2:05-2:25 Break/Cofense and Kudelski Security Sponsor Spotlight
- 2:25-3:15 Tony Asher
- 3:15-3:30 Wrap Up
Karina Klever, Klever Compliance
Presentation: From Governance to Execution
A look at the entire incident management competency. Understand how incident management governance correlates to your overall company strategy., risk and vendor strategies - while - being a significant component of your daily operations tactically.
Understand some best practice recommendations that apply across all industries, maturity levels, and selected frameworks.
Karina Klever is the founder of Klever Compliance, a company whose purpose is to mature client's governance postures. Karina started her IT career in 1989 as a computer operator. In the following 30+ years, her career culminated in executive leadership roles which reinforced that growth occurs when companies apply best practice frameworks consistently. Karina built a company on this simple principle and applies extensive experience from varied industries to her clients - so that proper balance is applied to controls establishment, regulatory adherence preparedness, maturity measurement, alleviation of chronically faulty processes, and appropriate risk management. Karina is an ISSA-LA Advisory Board Member.
Tony Asher - Cybersecurity Consultant
Presentation: Four Areas to Consider When Identifying Your Cybersecurity Goals
Approaches and resources to maximize this annual opportunity to increase capabilities, reduce risk, and catapult your reputation as a cybersecurity leader.
Tony has spent 15+ years helping businesses mature their cybersecurity programs. Tony has worked in government, defense, retail, healthcare, manufacturing, and finance industries including as a CISO at a worldwide investment bank. Tony is passionate about all areas of security. He has found his niche blending his technical background with business focused risk. Tony holds CISSP and CEH certifications.
When not consulting Tony enjoys being on his acreage up north with his family, acting lke a Jedi with a nine, and chasing forest donkeys.
Are non-members and guests welcome at meetings and events?
Yes, we welcome individuals at large from the security community to join us for any of our events. We simply ask that, after experiencing the value of our community at two events, individuals consider joining ISSA for the additional benefits that membership provides.
Why do we have to register to attend meetings and events?
Besides assisting the board with planning logistics for our events, registering for meetings and events, provides you with self-service documentation you can print out to support your CPE credits if you are audited.
***Information/image release. By registering for this event, I agree that:
I am allowing my contact information included in the registration to be shared with MN ISSA and I may be contacted by MN ISSA
I grant MN ISSA and/or ISSA International the right to use any candid photos or videos taken during the event in future marketing and communication efforts, to include, but not limited to, websites, brochures, advertisements, magazines, newspapers, newsletters, emails, videos and web conferences.
If this is a joint chapter meeting with another local security organization, my basic information (name, email) will be shared with the other organization.