Wednesday, 20 January 2016

(ISC)² Opens Call For Speakers For Fourth Annual CyberSecureGov Training Event Invited Keynotes Confirmed



(ISC)2 ("ISC-squared"), the largest not-for-profit membership body of certified cyber, information, software and infrastructure security professionals with nearly 110,000 members worldwide, academia and industry to address a variety of government cyber issues from a holistic perspective.

"The government cannot continue taking one step forward and two steps back in its response to cyber threats," said Dan Waddell, CISSP, CAP, PMP, managing director, North America Region and director of U.S. Government Affairs, (ISC)². "With a unique perspective on what is at stake, cybersecurity professionals are being called as agents of change to influence and empower the government's progress at all levels and in new ways. This year's CyberSecureGov training event is designed to shake up the status quo and incite progress in new ways."

Themed Inspiring Change Agents in an Environment of Game-Changing Threats, the CyberSecureGov training program will include three tracks focused on Prevention, Detection and Resilience. (ISC)² is currently accepting speaker submissions from experts in government, industry and academia in the following topic areas:
  • Cloud Security
  • Threats and the Advanced Adversary
  • Critical Infrastructure Protection
  • Automation, Detection and CDM
  • Incident Response and Recovery
  • Professional Development
  • Business, Financial and Risk Implications
  • Identity Access Management
  • The Privacy Challenge
  • Game Changing Solutions
 

Distinguished Keynote Speakers Have Been Confirmed:


The University of Maryland's Director of the Human-Computer Interaction Lab, Jennifer Golbeck, will open Day 1 of the training program addressing, "The Human Side of Cybersecurity." As a world leader in social media research and communication, Ms. Golbeck's research focuses on analyzing and computing with social media and creating usable privacy and security systems. Her research has influenced industry, government and the military.

Harvard Visiting Executive In-Residence, Eisenhower Fellow, and Chief Information Officer (CIO) for the Federal Communications Commission (FCC), Dr. David A. Bray, will open Day 2 of the training program addressing, "Positive #ChangeAgents in our Exponential Era." He served as IT Chief for the Center for Disease Control's Bioterrorism Preparedness and Response Program during 9/11, volunteered to deploy to Afghanistan to "think differently" on military and humanitarian issues in 2009, and served as Executive.

Director for a national commission reviewing the research and development efforts of the U.S. Intelligence Community. Together with a team of change agents, Dr. Bray led the FCC's award-winning IT transformation that demonstrated solutions at 1/6th the price and in half the time compared to legacy on premise approaches.

About (ISC)²Ò


Formed in 1989, (ISC)² is the largest not-for-profit membership body of certified cyber, information, software and infrastructure security professionals worldwide, with nearly 110,000 members in more than 160 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Authorization Professional (CAPÒ), Certified Cyber Forensics Professional (CCFPÒ),

Certified Cloud Security Professional (CCSPSM), Certified Information Systems Security Professional (CISSPÒ) and related concentrations, Certified Secure Software Lifecycle Professional (CSSLPÒ), HealthCare Information Security and Privacy Practitioner (HCISPPÒ) and Systems Security Certified Practitioner (SSCPÒ) credentials to qualifying candidates.

(ISC)²'s certifications are among the first information technology credentials to meet the stringent requirements of ISO/IEC Standard 17024, a global benchmark for assessing and certifying personnel. (ISC)² also offers education programs and services based on its CBK®, a compendium of information and software security topics. More information is available at http://www.isc2.org.

No comments:

Post a Comment

Note: only a member of this blog may post a comment.