p129_blog

October 31, 2017

2017 information security events bring new opportunities

Network with your peers, develop skills and knowledge, and even fulfill CE requirements and these information security events.

Keeping your skills current is a must in the ever-changing world of cybersecurity. Fortunately, many professional organizations are hosting information security events that provide opportunities to develop new and crucial skills, connect with industry professionals and leaders, and in some cases, earn the continuing education credits you may need to maintain professional certifications.

Explore upcoming cybersecurity conferences and events:

Event: An Introduction to Privacy and Data Protection

Sponsor: ISACA

Date: October 23–26, 2017

Location: Chicago, Illinois

As organizations focus on protecting the privacy of their customers and users, information security professionals are challenged with staying current on new laws and advances in technology. In this course, you’ll explore different perspectives on the risk and value of personal information as well as the consequences of privacy failures. You can earn up to 32 CE hours during this event.

Course Learning Objectives

  • Analyze the global landscape of privacy and data protection regulations
  • Demonstrate knowledge of web privacy and security issues
  • Explain workplace privacy requirements
  • Describe identity theft and prepare an incident response plan
  • Describe data leakage and its impact on the organization
  • Plan and conduct a privacy audit

Register today.

 

Event: SANS San Diego 2017

Sponsor: SANS

Date: October 30–November 4, 2017

Location: San Diego, California

At the 2017 SANS security training in San Diego, you can choose from 10 information security courses designed for professionals of all kinds. The keynote presentation "Actionable Detects: Blue Team Cyber Defense Tactics" will be delivered by Seth Misenar. There will also be two nights of Cyber Defense NetWars tournament activities and a range of networking opportunities available.

Explore available courses and register today.

 

Event: SecureBoston 2017

Sponsor: (ISC)2

Date: November 3, 2017

Location: Boston, Massachusetts

This event, Lessons from the Cloud: The Evolution of Cloud Environments, presents opportunities to explore how the cloud has changed over the years and what those changes mean for information security professionals. Including presentations, panel discussions, and more, this experience offers practical and actionable advice from the field that you can begin using immediately.

View full agenda and register today.

 

Event: Training Week Scottsdale

Sponsor: ISACA

Date: December 4–7, 2017

Location: Scottsdale, AZ­

ISACA’s training week in Scottsdale gives professionals the opportunity to dig deep into one of four educational tracks:

Cybersecurity Fundamentals

This course is designed to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals, covering four key areas of cybersecurity:

  • Cybersecurity architecture principles
  • Security of networks, systems, applications, and data
  • Incident response
  • The security implications of the adoption of emerging technologies.

Designed as a foundational course, this track will also prepare learners for the CSX Fundamental Exam.

Fundamentals of IS Audit and Assurance

This track will introduce the essential components and steps needed to perform an information system audit and gain a basic understanding of audit objectives and controls. This foundational-level course will also provide an overview of some IT audit tools and techniques used to plan, perform, and manage an IS audit.

Foundations of IT Risk Management 

This course provides an in-depth view of IT-related business risk management and the methodology that includes risk identification, evaluation, and response. You’ll also have the opportunity to create a business-focused, process-oriented, and measurement-driven risk response plan.

COBIT 5: Strategies for Implementing IT Governance

Learn how COBIT 5 is used to promote effective alignment of IT with business goals to manage delivery and risk mitigation. Integrating research by the IT Governance Institute (ITGI) and ISACA's COBIT education courses, this comprehensive program highlights IT issues, governance concepts, risk management, and control.

You can also earn up to 32 CE hours during this event. Learn more about the educational tracks offered and register today.