GoToWebinar room will be launched at 2:45 and meeting begins promptly at 3:00 PM CT
Format (each speaker):
Senior Information Security Leader and attorney adept at bringing disparate facets of an organization together to solve complex information security, data, and privacy related challenges. Integrates business, legal, and government experience to provide an in-depth understanding of information security risk issues at all levels. Proven track record building new groups within an organization related to data and information security matters.Following are representative examples:
INFORMATION SECURITY LEADERSHIP – Establish Information Security program from inception for multi-billion dollar healthcare company and near billion dollar insurance company. Reduces company information security risk by addressing key security controls, especially those related to governance, people, process, and technology.
COLLABORATIVE GOVERNANCE – Developed and implemented information security governance process bringing together senior leaders from across the enterprise to prioritize information security risk, determine response, and promote appropriate information security practices across the enterprise.
EXCEPTIONAL ORAL AND WRITTEN COMMUNICATION SKILLS – Regularly present to the CEO and Board of Directors on information security threats, risk, and response; tailors communication to any level, from small audiences to Congressional leaders; edited three books, including two on information security; published on various other topics such as privacy and technology, data mining, quarantine, and business resiliency.
Jill is a former Foreign Service Officer and who has lived and traveled extensively overseas.Specialties include:
• InfoSec Risk Management, Data Management and Data Protection
• Communication with Board of Directors
• Privacy and Information Security Integration, Education and Training
• Information Security Governance including HITRUST, NIST Cyber Security Framework, SOC2
• Strategic Planning & Execution
• Enterprise Solution Development and Implementation
Winn has lived Cyber Security since 1983, and now says, “I think, maybe, I’m just starting to understand it.” His predictions about the internet & security have been scarily spot on. He coined the term “Electronic Pearl Harbor” while testifying before Congress in 1991 and showed the world how and why massive identify theft, cyber-espionage, nation-state hacking and cyber-terrorism would be an integral part of our future. He was named the “Civilian Architect of Information Warfare,” by Admiral Tyrrell of the British MoD. His new book, “Analogue Network Security” is a mathematical, time-based and probabilistic approach to justifiable security. His goal is to provide a first set of tools and methods to “fix security and the internet”, including fake news, spam, phishing, DDoS and more. It will twist your mind.
Looking for presentations from past meetings? Members can access them HERE on the ISSA.org web site.
Continuing Professional Education Units
ISSA Chicago Chapter meeting attendees are eligible to claim CPE units. CPE allotment is determined by your certification body and is typically one CPE per hour of attendance with reporting in quarter-CPE increments. For auditing purposes, the start and stop times of your participation will be provided as evidence in an email following the meeting. ISSA Chicago suggests attendees round down to the nearest quarter; i.e. 1 hour 54 minutes would be reported as 1.75 CPEs
If an attendee participates for less than 15 minutes, the system will not send a confirmation.
Event Anti-Harassment Policy
The ISSA Chicago Chapter is dedicated to providing a harassment-free event experience for everyone, regardless of gender, sexual orientation, disability, gender identity, age, race, or religion. We do not tolerate harassment of event participants in any form. Sexual language and imagery is not appropriate for any event venue, including talks. Event participants violating these rules may be sanctioned or expelled from the event at the discretion of the event organizers/management.
Please follow this link to see the full text of our Anti-Harassment Policy.