Audit
Category

Audit

With the ever-changing cyber attack vectors, how often are you evaluating your security measures? Are they as strong as they were when you first implemented them? How often are you analyzing your security needs? Hear suggestions from our experts on how to conduct an audit properly and how frequently a full assessment is necessary.

Audit & Assessment

Cybersecurity Audits - Effectiveness in Building a Resilient Security Posture

Nitin Bhatnagar - PCI Security Standards Council , Agnelo D'Souza - Kotak Mahindra Bank , Anish Ravindranathan - General Mills , Vicky Shah - Data Privacy Professional  •   • 

Start this Session

Automated Auditing - Cloud Security Orchestration in a Regulated Environment

Craig Gibson - Trend Micro  •   • 

Start this Session

Taming the Beast: Regulatory Compliance in the Cloud

Kevin Flynn - Skybox Security  •   • 

Start this Session

Why Organizations Fail to Implement Proper Security Safeguards and What They Can Do About It

Gregory Wilshusen - U.S. Government Accountability Office  •   • 

Start this Session

Preparing for and Passing an OCR HIPAA Audit

Archived Session  • 

Kate Borten - The Marblehead Group , Adam Greene - U.S. Department of Health and Human Services  •   • 

Start this Session

Stress Free Audits, Reduced Risk, Higher Confidence - How IAM Contributes to the Bottom Line

Archived Session  • 

Kurt Johnson - Courion  •   • 

Start this Session

Updated Federal HIPAA Compliance Audit Preparation Tips

Archived Session  • 

Mac McMillan - CynergisTek  •   • 

Start this Session

Continuous Monitoring: How to Get Past the Complexity

Archived Session  • 

Dwayne Melancon - Tripwire  •   • 

Start this Session

Managing Change: The Must-Have Skills for Security Professionals

Archived Session  • 

Jan Hiller - Kelly School of Business - Indiana University-Bloomington  •   • 

Start this Session

Securing Access to Big Data and Cloud Environments: Federal Defense In-Depth Strategies

Archived Session  • 

David McNeely - Centrify  •   • 

Start this Session

Dept. of Health & Human Services HIPAA Audits: How to Prepare

Archived Session  • 

Mac McMillan - CynergisTek  •   • 

Start this Session

Defenses Against Major Threats Targeting Large Financial Institutions

Archived Session  • 

Jason N. Buck - Top 4 Bank , Todd Thiemann - Vormetric  •   • 

Start this Session

FFIEC Authentication Guidance Compliance: Detecting and Responding to Suspicious Activities

Archived Session  • 

Mike Byrnes - Entrust , Jodi Florence - IDology , Eli Katz - 41st Parameter , George Tubin - Transmit Security  •   • 

Start this Session

How to Build a Successful Enterprise Risk Management Program

Archived Session  • 

Clark Abrahams - SAS , Mona Leung - Alliant CU  •   • 

Start this Session

Creating a Culture of Responsible Application Security

Archived Session  • 

Jeff Williams - Contrast  •   • 

Start this Session

Session Contributors

Adam Greene

former Regulator, U.S. Department of Health and Human Services; Partner, Davis Wright Tremaine LLP

Read Bio
Adam Losner

President and Founder, Finance Technology and Controls (FTC) Consulting

Read Bio
Agnelo D'Souza

CISO, Kotak Mahindra Bank

Read Bio
Alisdair Faulkner

Chief Products Officer, ThreatMetrix

Read Bio
Amir Orad

Cyber Security Evangelist

Read Bio
Andrew Hout

Risk Manager, Citi

Read Bio
Anish Ravindranathan

Cybersecurity Lead-Detection and Response, General Mills

Read Bio
Bill Sewall

Former Dir. Information Security Risk Management, First Republic Bank

Read Bio
Charles Robertson

Product Manager, Verafin

Read Bio
Clark Abrahams

Director - Global Marketing, SAS

Read Bio
Craig Gibson

Principal Threat Defense Architect, Forward-Looking Threat Research, Trend Micro

Read Bio
Dana Turner

Security Practitioner, Security Education Systems

Read Bio
David Matthews

former Dir. of Incident Response, Expedia; Principal Consultant, Public Sector Cyber Security Contracting Services

Read Bio
David McNeely

Chief Strategy Officer, Centrify

Read Bio
Derek Melber

Author of The Group Policy Resources Kit by Microsoft

Read Bio
Donald Saxinger

Team Lead - IT & Operations Risk, Federal Deposit Insurance Corporation (FDIC)

Read Bio
Eddie Holt

Partner, KPMG LLP

Read Bio
Eli Katz

VP - Enterprise Strategies/Finance, 41st Parameter

Read Bio
George Tubin

Director of Marketing, Transmit Security

Read Bio
Gregory Wilshusen

Director, Information Security Issues, U.S. Government Accountability Office

Read Bio
James Christiansen

VP, Third Party Risk Programs, Optiv

Read Bio
James Kist, CISSP

Senior Information Security Consultant, Icons, Inc

Read Bio
Jan Hiller

Clinical Asst Professor of Management, Kelly School of Business - Indiana University-Bloomington

Read Bio
Jason N. Buck

Technology Manager and VP for Data Encryption, Top 4 Bank

Read Bio
Jeff Kopchik

Sr. Policy Analyst, Federal Deposit Insurance Corporation (FDIC)

Read Bio
Jeff Lake

VP - Federal Operations, Proofpoint

Read Bio
Jeff Williams

Co-Founder and CTO, Contrast

Read Bio
Jill Martin

Product Support Manager

Read Bio
Jim Doherty

Chief Marketing Officer (CMO), Certes Networks

Read Bio
Jim Routh

Chief Information Security Officer, Aetna

Read Bio
Jodi Florence

VP - Marketing, IDology

Read Bio
Joe Rogalski

Principal Security Strategist, Symantec

Read Bio
Kate Borten

President, The Marblehead Group

Read Bio
Kevin Flynn

Global Director of Products, Skybox Security

Read Bio
Kevin Sullivan

Former Investigator, New York State Police; President, AML Training Academy & Advisory

Read Bio
Kurt Johnson

VP - Strategy & Corporate Development, Courion

Read Bio
Mac McMillan

Co-Founder and CEO, CynergisTek, Inc.

Read Bio
Mark Benoit

Security Specialist, Attachmate Corporation

Read Bio
Matthew M. Speare

Executive Vice President & Enterprise CIO, Regions Bank

Read Bio
Michael Smith

Fraud Market Planning Lead, LexisNexis Risk Solutions

Read Bio
Michele Edson

Senior Vice President, The Santa Fe Group

Read Bio
Mike Byrnes

Director - Customer Authentication & Fraud Detection Solutions, Entrust

Read Bio
Mona Leung

CFO, Alliant CU

Read Bio
Niall Browne

Chief Information Security Officer, LiveOps

Read Bio
Nitin Bhatnagar

Associate Director-India, PCI Security Standards Council

Read Bio
Philip Alexander

Information Security Officer, UMC Health System

Read Bio
Robin Tatam

Director - Security Technologies, PowerTech Group

Read Bio
Sarah Carter

VP - Marketing, FaceTime Communications

Read Bio
Sarah Fender

VP - Marketing & Product Management, PhoneFactor

Read Bio
Scott Brown

Program Manager, Financial Services, Iron Mountain

Read Bio
Shakeel Tufail

Federal Practice Manager, HP - Fortify Security Solutions

Read Bio
Shirley Inscoe

Senior Analyst, Aite Group

Read Bio
Steve Dispensa

CTO & Co-Founder, PhoneFactor

Read Bio
Sudha Iyer

Director of Product Management, LogLogic

Read Bio
Susan Orr, CISA, CISM, CRP

President, Susan Orr Consulting

Read Bio
Todd Thiemann

Senior Director - Product Marketing, Vormetric

Read Bio
Vicky Shah

Advocate, Data Privacy Professional

Read Bio
Warren G. Kruse

Vice President of Data Forensics and Analytics, Encore Legal Solutions

Read Bio
Wasim Ahmad

VP - Marketing, Voltage Security

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.