Loading Events

Women in Security SIG Series: Leveraging the Power of Community to Transform the Cybersecurity & GRC Industry

Home » Events » Women in Security SIG Series: Leveraging the Power of Community to Transform the Cybersecurity & GRC Industry

  • This event has passed so registration is closed.

Sponsor

Interested in getting your message in front of a targeted audience? Click on the link to explore sponsorship opportunities.

Details

Date and Time

December 2 @ 1:00 pm - 2:00 pm EST

Event Category

Web Conference

Organizer

Sponsorship Contact

 

Send an email to

Overview

We are in a time marked by the convergence of the digital, physical, and biological worlds, all with additional accelerators such as advanced robotics and cognitive-thinking systems. Fast-paced innovational waves or big-bang disruptions have triggered an accelerated adoption of automation, the effects of which will be fast, hard to detect, and harder to defend. According to the World Economic Forum's Future of Jobs Report 2020, it may cost the jobs of 85M workers, most displaced by a shift in the division of labor between humans and machines. However, 97 million new roles could emerge, and while it might be exciting to think of transformational new jobs, we cannot ignore the fact that millions of people will be left behind.

The Cybersecurity and GRC industries are dangerously understaffed and have issues keeping pace with the speed of technological change. We lack diversity across the board and have created a workforce monoculture that has left us ill-equipped to address threat agents that are diverse by design.

We need a new way of thinking to solve both issues, and it rests in “community.”

In this lecture, we will discuss our forecasts of technological advances over the next few years, the type of workforce necessary to protect and defend these new systems, and how to leverage our local communities to build a new, more diversified cybersecurity workforce trained with a set of futureproofed skills.

Moderator

Betty Burke

Betty Burke has served MN-ISSA as the President for the past five years.  Betty has over twenty years’ experience in Information Technology and Information Security in positions of progressive responsibility and technical expertise. She has worked on information security planning, developing and delivering security programs. She is respected as a decision-maker and creative problem solver with demonstrated ability to achieve desired results while maintaining effective team cooperation. She has worked with several security regulations and standards including HIPAA, ISO17799, COBIT, Payment Card Industry Standard, NIST Standards and IRS Publication 1075. Betty is CISSP and CISA certified.

See Betty Burke‘s full profile.

Speaker/s

Jenai Marinkovic – Chief Information Security and Chief Technology Officer, Tiro Security

Jenai Marinkovic is a multidisciplinary technologist and strategist with 20 years of experience in architecting, building, and securing systems at scale. She has designed and operated cybersecurity capabilities in media, live sports, gaming, and entertainment. She’s also worked in biomedical manufacturing and laboratory diagnostics, healthcare tech, and robotics in agriculture. She has designed cybersecurity and auditing frameworks around artificially intelligent systems including their impact on diversity. Jenai has worked for large enterprise brands including DIRECTV, Electronic Arts, Beyond, and Beckman Coulter, and international investigations firms such as Kroll. She is the virtual CISO for Tiro Security, an award-winning cybersecurity recruitment and consulting firm.

Jenai is also the Executive Director and one of the founders of the startup nonprofit GRC for Intelligent Ecosystems (GRCIE). GRCIE is dedicated to training people from socio and economically disadvantaged communities into GRC and cybersecurity and is home to the award-nominated, NextCISO Apprenticeship school.

See Jenai Marinkovic‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top