Nth Blog

IT Security & Risk Management in 2019 – Soft and Tactical Skills to Becoming a Leader in InfoSec

2019


05.29

IT Security & Risk Management in 2019 – Soft and Tactical Skills to Becoming a Leader in InfoSec

Don’t Miss Nth Generation’s Presentation: IT Security & Risk Management in 2019 – Becoming a Leader in InfoSec

Presented by: Jeromie Jackson, Director of Security and Analytics

Tuesday, June 18th l 8:20 a.m. – 10:00 a.m.

CLICK HERE TO REGISTER NOW

IT Security & Risk Management in 2019 – Soft and Tactical Skills to Becoming a leader in InfoSec

Session Track: Managing and Leading Security | Category: Hands-on Lab | Speaker: Jeromie Jackson | Location: Hutchison Hall, Room 73 | Start Time: 8:20 AM | End Time: 10:00 AM

Information security has changed dramatically as we moved from a centralized to a distributed model. Cloud providers provide certifications “OF” the cloud, customers still must secure what is “IN” the cloud. Multi-tenancy, distributed networking, and a workforce familiar with always-on and progressive technology, require teams to be agile and nimble. We will discuss hard technical skills and soft skills necessary for individuals and organizations to improve their IT security posture. Soft skills: Learn skills essential to becoming a strong leader in information security. Being able to empathize, mentor, and align to business or end-user goals, are critical. Students will pair up in small groups to learn how to deliver potentially sensitive topics and information to the organization. Students will discuss several frameworks and methods used to ascertain existing posture, primary remediation steps, and areas to work on. We’ll discuss how to communicate upwards and outwards, and how to demonstrate success. Tactical skills: With the morphing of IT to include personal devices, distributed network, IoT, Cloud IaaS/PaaS/SaaS, there are many facets an IT security executive must address. Leveraging frameworks as the Cloud Security Alliance Common Body of Knowledge, the Center for Internet Security Critical Security Controls (CIS-CSC), and the NIST Cybersecurity Framework (CSF), can help an organization with best practices and prioritize risk. We will collaborate on how these solutions can be best applied, and which are best applied towards IT risk and security management moving forward.

Goals: Use team-oriented exercises to learn more from team members and apply the skills to their teams in the organization. At the end of this session, participants will have collaborated on all facets of the program. Soft skills will be used in interactive sessions to immerse participants in the experience. From a tactical perspective, participants will gain insight through live training on how to leverage frameworks, such as the CIS-CSC and the NIST CSF, to document existing state and roadmap remediation plans, and to hit the organization’s IT and security risk management goals over time.

Jeromie-Jackson-HeadshotJeromie Jackson
Director of Security & Analytics
LinkedIn

Jeromie Jackson is an accomplished executive and leader with over 24 years of consulting experience on security and risk management. Jeromie has been featured in Forbes Magazine as one of the nation’s top ethical hackers. He is a trusted advisor to senior executives with a focus on strategy development, IT optimization, governance, and risk management. Mr. Jackson engages executives with a consultative approach to enable businesses with innovative opportunities to mitigate and reduce information technology (IT) risks. Mr. Jackson’s deep technical knowledge coupled with a passion for leading-edge security architecture gives his clientele the ability to move quickly from concept into executive decisioning and delivery. Mr. Jackson executes with precision and focus on enabling businesses by wielding the Control Objectives from frameworks, such as Center for Internet Security’s (CIS) Critical Security Controls (CSC), the NIST Cybersecurity Framework, Balanced Scorecards (BSC) implementations, and Strategy Maps.

________________________________________________________________________

Attend the 2019 Information Security Symposium at UC Davis l June 18 – 19

UC Davis Conference Center, 550 Alumni Lane, Davis, California 95616

On June 18-19, 2019, technical professionals and administrative managers from ten University of California campuses and medical centers/health systems will convene at UC Davis for the ninth Information Security Symposium. This biennial event provides IT professionals from all UC campuses, other higher education guests, and invited California state agencies, the opportunity to meet and discuss computer, network and information security issues and strategies, and provides an ideal forum for the exchange of privacy and security enhancement ideas and solutions. As technology advances, so do the cyber security threats. Security and the use of technology to confront these threats is a high priority for the California university systems and state agencies.

  • CLICK HERE for the Full Program Agenda
  • CLICK HERE for the Information Security Symposium Event Website

Attendees:

Information privacy professionals, system and security administrators, and unit managers from the ten University of California campuses, as well as Medical Centers and Health Systems will attend. The chief information security officers from the California community colleges, the California State University system, and California state agencies also attend. These are the leaders and technologists responsible for making technology and training decisions and typically have budgetary approval. Many are leading edge technology adopters.

General Schedule

The main conference site will be the UC Davis Conference Center and Mondavi Center. The event takes place Tuesday and Wednesday, June 18-19, 2019. Instructional computing labs and lectures are scheduled for both days. Financial sponsors may host a lecture and all sponsors (financial and instructional) will have an opportunity to informally meet conference attendees to showcase their technology offerings. Continental breakfasts, as well as lunch and snacks will be provided both days.

Keynotes and Tracks

This year’s theme is Connect, Share, Fortify. The symposium will feature keynotes and speakers from the security and technology industries and include tracks for:

  • Managing and Leading Security
  • IS-3 and other Policy and Regulations
  • Protecting Assets
  • Data Privacy and Integrity
  • Incident Management
  • Secure Code and Applications

CLICK HERE for more information about the 2019 Information Security Symposium at UC Davis.

Comments are closed.

© Nth Generation, 2014-2019. All Rights Reserved.   Privacy Policy   |   Legal Terms