The immediate shift to remote work during the impact of COVID-19 increases data risk in your organization, as well as provide new opportunities for data exfiltration. Data is more portable than ever because your employees are more mobile than ever, and employees feel like they own the data they work with. In this webinar, we will discuss:

•  How to adapt your organization's approach to data security in order to manage remote work for the short and long term—even if resources may be slim
•  Insider threat
•  Third-party risk
•  Shadow IT

Join our experts as they discuss how work from home has changed data security, from the ever-present Shadow IT to insider threat to third-party risk.

Generously Supported By:

supported by logo
Speakers
speaker photo
Jadee Hanson
CISO & CIO, Code42

As Chief Information Security Officer at Code42, Jadee Hanson leads global risk and compliance, security operations, incident response, and insider threat monitoring and investigations. To her position, she brings more than 15 years of information security experience and a proven track record of building security programs. Prior to Code42, Jadee held a number of senior leadership roles in the security department of Target Corporation, where she implemented key programs, including compliance, risk management, insider threat assessments and more. Jadee also spearheaded the effort to embed security resources into the development process as well as the security plans behind the acquisition of software development and online retail companies. She was the security lead for the sale of Target Pharmacies to CVS Health.

speaker photo
Jake Bernstein, Esq.
Attorney-at-Law, Focal

Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense counsel representing companies subject to data security and privacy regulations enforced by federal, state, and international authorities.

speaker photo
Benjamin Brooks
Adjunct Professor, Retired US Navy

Benjamin Brooks is 19-year Navy veteran of Information Warfare, Electronic Warfare, and Special Warfare. He is a CISSP exam writing team member, and has written curriculum on Information and Cyber Security for three universities.

Benjamin currently serves as the President of the Board of Cyber Warrior Foundation, VP of Beryllium InfoSec Collaborative, and Training Officer for Navy Information Operations Command Texas, Minneapolis Branch.

His approach to information security is about balance between operations and security in a way that creates awareness throughout the organization. This ultimately leads to harmonious integration of security into the daily work processes with sufficient security for protecting the most vital information assets of the organization.

speaker photo
Arif Hameed
Sr. Director, Client Security, Equifax Canada

Arif Hameed is Senior Director at a Credit Bureau, where he leads a team that handles client cybersecurity assurance activities including questionnaires, audits, remediation support, security schedules, RFPs, etc. Prior to his current role, he worked at two of the largest banks in Canada in Security Advisory, IT Risk, Third Party Cyber Risk, and IT Audit. He actively participates in industry organizations including ISACA, EC-Council, Cloud Security Alliance, and SecureWorld, and sits on the Program Advisory Committee of educational institution programs in Cybersecurity and IT Audit.