GoToWebinar room will be launched at 2:45 and meeting begins promptly at 3:00 PM CT
Format (each speaker):
As information security professionals, we’ve had to address more challenges than anyone could have perceived over the year. We are all super heroes for making our way through this. Jill will discuss her top lessons learned throughout the COVID crisis. As a leader, manager, information security professional, mom, family member, friend and everything in between, COVID brought all of these forces together and pushed her to be her best self and worst self all at the same time. The question that remains is where do we go from here and how do we plan for 2021? Join us for this discussion.
Senior Information Security Leader and attorney adept at bringing disparate facets of an organization together to solve complex information security, data, and privacy related challenges. Integrates business, legal, and government experience to provide an in-depth understanding of information security risk issues at all levels. Proven track record building new groups within an organization related to data and information security matters. Jill is a former Foreign Service Officer and who has lived and traveled extensively overseas.
In this talk, we examine big-data bias as the root of error in AI-driven anthro-cyber-kinetic systems and how that bias is amplified when viewed through different cultural lenses and can cost lives. The global effects of unrestrained use of AI creates uncertainty and, in Analogue Network Security terms, a tendency towards infinity and chaos.I hope to disrupt your mind, and just for the record, there is no such thing as AI. Seriously. WARNING: Some topics and images may be disturbing and offensive to some attendees. Please, I don’t wanna hear about it. What is the real truth about AI? Can you trust AI when faced with Trolleyological Conundra? Does AI have any value in security? I will ask you to question the real value of AI in security by asking simple questions: Do you know how AI really works? Do you employ bias-free ’honest’ datasets? How does your AI function in Failure Mode and by which implicit bias? How do feedforward and feedback OODA loops help or hinder the reliability of your AI goals. Think Time! Not a snapshot! And then how about the basics? Can you define your problem and why you think you need AI? Can you measure the problems and the results? Can you afford an AI ‘solution’ in dollars, manpower, resources, training, legal counsel, failure and global compliance? Before restructuring security infrastructures, models and SOAR, what is the real cost (ROI) to your organization to pull off such a massive project that can take years? How much embedded institutional ‘error’ is tolerable? And then there’s the lawyers! Oh, the lawyers make it all the harder: can you take your AI to court to testify and defend you and your organization? In short, no one, anywhere, can even explain how AI ’solutions’ arrive at their answers. Then what about the elephant? Do you have the technical skills to competently talk to your vendors about these fundamental issues, or do you take their word for everything? How sensitive is your AI BS-Meter? Do you know how to choose an AI solution wisely? I have stories
Winn has lived Cyber Security since 1983, and now says, “I think, maybe, I’m just starting to understand it.” His predictions about the internet & security have been scarily spot on. He coined the term “Electronic Pearl Harbor” while testifying before Congress in 1991 and showed the world how and why massive identify theft, cyber-espionage, nation-state hacking and cyber-terrorism would be an integral part of our future. He was named the “Civilian Architect of Information Warfare,” by Admiral Tyrrell of the British MoD. His new book, “Analogue Network Security” is a mathematical, time-based and probabilistic approach to justifiable security. His goal is to provide a first set of tools and methods to “fix security and the internet”, including fake news, spam, phishing, DDoS and more. It will twist your mind.
Looking for presentations from past meetings? Members can access them HERE on the ISSA.org web site.
Continuing Professional Education Units
ISSA Chicago Chapter meeting attendees are eligible to claim CPE units. CPE allotment is determined by your certification body and is typically one CPE per hour of attendance with reporting in quarter-CPE increments. For auditing purposes, the start and stop times of your participation will be provided as evidence in an email following the meeting. ISSA Chicago suggests attendees round down to the nearest quarter; i.e. 1 hour 54 minutes would be reported as 1.75 CPEs
If an attendee participates for less than 15 minutes, the system will not send a confirmation.
Event Anti-Harassment Policy
The ISSA Chicago Chapter is dedicated to providing a harassment-free event experience for everyone, regardless of gender, sexual orientation, disability, gender identity, age, race, or religion. We do not tolerate harassment of event participants in any form. Sexual language and imagery is not appropriate for any event venue, including talks. Event participants violating these rules may be sanctioned or expelled from the event at the discretion of the event organizers/management.
Please follow this link to see the full text of our Anti-Harassment Policy.