Loading Events

Cyber Risk IS Business Risk

Home » Events » Cyber Risk IS Business Risk

  • This event has passed so registration is closed.

Sponsor

Details

Date and Time

February 14 @ 1:00 pm - 2:00 pm EST

Event Category

Web Conference

Organizer

Amelia Ghidotti

Contact

Lisa O'Connell

Overview

The recent new SEC rules around cyber-risk governance, management, and disclosure have reverberated across all echelons of American corporations.  In this webinar, three seasoned cybersecurity executives discuss the implications for today’s information security professionals, their leaders, and what can be done to address the new requirements using an integrated risk management and reporting approach that appeals to all stakeholders. Join us on February 14th at 1pm EST for this ISSA webinar, sponsored by AuditBoard, where we will explore time tested strategies for getting it right the first time.

Moderator

Brandon Dunlap – Executive Partner, Security & Risk

With more than 30 years of experience, Brandon Dunlap's Cybersecurity experience spans a variety of heavily regulated sectors, most notably in critical infrastructure and high tech. Across his career, Brandon has been a CISO, Information Security entrepreneur, Product Manager and consultant. Brandon has cultivated and helped build communities around emerging security topics for a number of professional and industry associations, as well as developing and delivering curriculum on key security and compliance topics for security leaders across the globe. In a previous role at Amazon, he led the Global Security Compliance teams responsible for Amazon’s compliance to PCI-DSS, HIPAA and a myriad of global, country and state specific financial regulations.

 Previously, he was the Global CISO at Black & Veatch an international Engineering, Construction and Engineering firm specializing in critical infrastructure.

He continues to give back to the information security community by hosting and moderating (ISC)2 web events for the Americas and EMEA regions.

Brandon has also addressed international gatherings and regional events of the Institute of Internal Auditors, ISACA, IANS, ASIS International as well as being quoted and profiled in major industry publications, including CSO Online, Information Security Magazine, Dark Reading, Compliance Week, TechTarget’s SearchSecurity and (ISC)2’s InfoSec Professional.

See Brandon Dunlap‘s full profile.

Speaker/s

Keyaan J Williams

Keyaan J Williams has been building and managing cybersecurity and privacy programs to support enterprise risk management for more than two decades. After many years in various departments of the Centers for Disease Control and Prevention (CDC), he started a global consulting firm that supports government, critical infrastructure, and commercial customers.

Keyaan actively serves as a board member for commercial and non-profit companies. He also serves as a mentor and advisor for corporate directors and early-stage entrepreneurs. He regularly shares interesting insights on LinkedIn based on ideas he has published in books and professional journals.

See Keyaan J Williams‘s full profile.

Umar Carter

Umar Carter is a Cyber Risk Advisor and Certified Chief Information Security Officer. As a Risk Advisor, he advises executives on Cybersecurity domains.

Previously, he served as VP of Cyber Analytics at Zurich Insurance where he led the development, coordination, and execution of complex information security programs.  He has also held several CFO roles with MNCs.  

He also holds a Cyber Policy certification from Harvard, several industry certifications, a BS in Finance and Economics, and an MS in Information-Systems.

Umar is a podcast host and board-chair at Inner-city Muslim Action Network (Chicago/Atlanta) and serves as an advisor for tech startups.

See Umar Carter‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top