Digital transformation promises business growth by providing value to customers by leveraging emerging technologies and supporting skills for new business models. At its core, data-driven decisions are the lifeblood of digital transformation. When data is poisoned, stolen, and misused for malicious intent, progress slows resulting in poor customer experience and satisfaction. In this session, we will explore how sophisticated bot attacks are contaminating top digital transformation trends related to automation, data analytics, and application architectures that should be part of every security strategy to solve in 2022.
Betty currently serves on the ISSA International Board of Directors and is a past President of the MN-ISSA chapter. Betty has over twenty years’ experience in Information Technology and Information Security in positions of progressive responsibility and technical expertise. She has worked on information security planning, developing and delivering security programs. She is respected as a decision-maker and creative problem solver with demonstrated ability to achieve desired results while maintaining effective team cooperation. She has worked with several security regulations and standards including HIPAA, ISO17799, COBIT, Payment Card Industry Standard, NIST Standards and IRS Publication 1075. Betty is CISSP and CISA certified.
Gavin Hill – VP of Threat Insights, HUMAN
Gavin Hill is the VP of Threat Insights at HUMAN where he is responsible for helping customers mitigate the risk of high impact bot problems with HUMANs unique insights and threat models. He has held leadership positions in Product Management, Product Marketing and Marketing at Secureworks, Bitdefender, Bromium (HP), Venafi and Trend Micro. With 25 years’ experience in cyber security, he has a broad range of knowledge, including Email Security, Cloud Security, Encryption, PKI, Keys & Certificates, Endpoint Security, EDR, Network Traffic Analytics, Isolation, Hypervisor Security, Sandboxing, and VDI Security.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.