Loading Events

« All Events

Women in Leadership and Technology 2020

August 20 @ 8:30 am - 12:00 pm EDT

DETAILS

The ISACA GWDC is proud to host our Women in Leadership and Technology 2020 conference on August 20th. Even though opportunities in technology and cyberspace continue to grow, the United States Department of Labor estimates two-thirds of 1.1 million computing-related jobs by 2024 may be unfilled. Despite immense opportunities in technology sciences, according to the National Center for Women and Technology, only 19 percent of 2016 computer and information sciences bachelor's degree recipients were female. 

Who Should Attend

Risk Management professionals, IT Auditors, Cybersecurity professionals, students or anyone interested in learning more about diversity can improve IT operations.

In order to receive CPE credits, participants must respond to all questions in Zoom.  Failure to respond to questions in may result in the attendee not being granted CPE credits.  Zoom display names must reconcile with the Cvent registration.  Participants are responsible to configuring their Zoom application prior to the event.  Phone participants will not be entitled to CPE credits.

AGENDA

Attendees of ISACA GWDC's Women in Technology 2020 conference will hear insights from thought leadership on innovation, opportunities and challenges surrounding women in today’s tech workforce.

PRESENTATIONS

Inclusion of Women in the Fourth Industrial Revolution – Presented by Sonia Bashir Kabir

The Fourth Industrial Revolution (4IR) gives us an incredible opportunity to unite. To unite as human beings. A chance to unite against automation.  The reality is, it is not just about men losing roles to women or vice versa, but humans losing roles to automation.  However, in order to unite as human beings, we need to first address the challenge of women being left behind.  Inclusion of women is a joint responsibility with men and exclusion has joint risks.

From Surviving to Thriving as an "Only" in IT Leadership – Presented by Sandy Silk

Information technology needs more diversity among its leaders and role models to inspire future generations of under-represented groups to pursue this profession and bring their varied experiences to inspire better problem-solving and innovation. Evolving into a leader involves much more than being put in a leadership role, acquiring new skills and adapting one’s style. It involves a fundamental identity shift. In a profession built upon ever-evolving technology, the susceptibility to imposter syndrome is already high. The internalization of leadership can be particularly challenging then to those who feel added scrutiny as an “only” in the group, who must also find personal resilience to navigate conflicting mindsets that support biases about expected behaviors and performance. This session empowers attendees to emerge as confident leaders by promoting awareness of self-limiting habits and nurturing an EPIC leadership that aligns with your personal values and advances organizational goals.

Cyber Governance and Privacy Risk Management: An Opportunity for Women - Presented by Jody Westby

No one is minding the store. Organizations are being targeted by cybercriminals, and privacy regulators are sharpening their pencils. Whenever there is a major cyber event, the outcome always seems the same: the bad guys keep winning, the companies keep losing, and the victims keep having their data disclosed. It doesn’t have to be this way. Good cyber governance and privacy risk management can tip the balance and change the outcome. ISACA was a leader with its Information Security Governance publication in 2008. In 2013, ISO released a standard for the governance of information security, ISO/IEC 27014, and over the past several years, privacy laws have gotten stricter. Regulators are ramping up penalties, and major cyber events are resulting in class action lawsuits. Even so, cyber governance and privacy risk management are lacking in many organizations, making them easy targets for cybercriminals. Rather than wait for the troglodytes at the top to finally decide to get their act together on cybersecurity and privacy, women in the ranks can seize the opportunity and help establish appropriate governance frameworks and ensure privacy controls are integrated in cybersecurity programs. This presentation will tell you how.

MEET THE PRESENTERS

Sonia Bashir Kabir

Sonia Bashir Kabir

Presenter

Vice Chair & Governing Council Member United Nations Technology Bank and Board member UNESCO Mahatma Gandhi Institute of Education for Peace and Sustainable Development (MGIEP)

Educated & Trained in Silicon Valley, Sonia Bashir Kabir, a Female Tech Venture Capitalist, began her career as a Tech Corporate Professional in the Valley and her journey led her to become a Tech Entrepreneur, a Tech Angel Investor and a Tech Philanthropist.

She is the Founder & Chairman of SBK Tech Ventures, the first women-led impact Venture Capital for tech start-ups in South Asia. She has investments in over 20 startups across South East Asia, which support the digital transformation in different fields, ranging from FinTech, Med Tech, Ed Tech, Legal Tech, Agri Tech and E-Commerce. 

Sonia serves on, various boards for Private Universities (BRAC), Telecoms, (Banglalink/VEON), Non-banking financial Institution (NBFI – IPDC), non-profits, institutions (Shakti Foundation) and development organizations. She is the Founder and Chairman of SBK Foundation.  Sonia relocated to Bangladesh and served as the and Chief Operating Officer for Aamra Technologies, Director Business Development for New Markets in South East Asia in Microsoft, Country Director for Dell Bangladesh and last but not least Managing Director of Microsoft for Bangladesh, Myanmar, Nepal, Bhutan & Laos.

Sandy Silk

Sandy Silk

Presenter

Director of Information Security Education and Consulting at Harvard University

Aside from being the Director of Information Security Education and Consulting at Harvard, Sandy is the founder of Cyber Risk and Resilience Consulting, and co-chair of the SIM Women group within SIM Boston.   At Harvard, Sandy leads a team that consult with researchers, faculty, and departments on security risks and controls for the high-risk data, technology, and vendors they use within projects. Sandy is involved in several Women in Technology (WIT) organizations and seeks opportunities to improve diversity, equity, and inclusion for under-represented populations within the IT profession. Sandy’s prior information security career included positions with Fidelity Investments, Bose Corporation, and Wellington Management Company.

Jody Westby

Jody Westby

Presenter

CEO at Global Cyber Risk

Drawing upon a unique combination of more than twenty years of technical, legal, policy, and business experience, Ms. Westby founded Global Cyber Risk LLC (GCR) in 2000.  GCR provides first-tier advisory and technical services to organizations in the areas of privacy, cybersecurity, cyber governance, incident response, and digital asset inventories and data mapping.  Her team has deep expertise in assessing industrial control and SCADA systems used in manufacturing, utility grids, and critical infrastructure sectors. Ms. Westby also serves as Adjunct Professor to the Georgia Institute of Technology’s School of Computer Science. She is a professional blogger for Forbes and writes a regular column for Leader’s Edge magazine on cybersecurity issues. 

Ms. Westby is a member of the bars of the District of Columbia, Pennsylvania, and Colorado. She serves as chair of the American Bar Association’s (ABA) Privacy and Computer Crime Committee (Science & Technology Law Section) and co-chair of the Cybercrime Committee (Criminal Justice Section) and is serving a fourth term on the ABA President’s Cybersecurity Task Force.  She co-chaired the World Federation of Scientists’ (WFS) Permanent Monitoring Panel on Information Security and served on the ITU Secretary-General’s High Level Experts Group on Cybersecurity. Ms. Westby led the development of the International Toolkit on Cybercrime Legislation and is an editor and co-author of the 2010 WFS-ITU publication, The Quest for Cyber Peace. Ms. Westby is co-author and editor of four books on privacy, security, cybercrime, and enterprise security programs and author of two books on legal issues associated with cybersecurity research, all published by the ABA.  She speaks globally on these issues.

Previously, she launched In-Q-Tel for the CIA, was senior managing director at PricewaterhouseCoopers, was senior fellow and director of IT Studies for the Progress and Freedom Foundation, and was director of domestic policy for the U.S. Chamber of Commerce.  Ms. Westby practiced law at Shearman & Sterling and Paul, Weiss, Rifkind, Wharton & Garrison.  She earned a B.A., summa cum laude, University of Tulsa and J.D., magna cum laude, Georgetown University Law Center and was named to the Order of the Coif.  Ms. Westby was elected a member of the American Bar Foundation and the Cosmos Club.

ADDITIONAL DETAILS

Special Instructions

Not Applicable

 

 

CPE

Earn up to 3 Continuing Professional Education (CPE) credits in the area of Specialized Knowledge.  In order to receive CPE credits, participants must respond to all questions in Zoom.  Failure to respond to questions in may result in the attendee not being granted CPE credits.  Zoom display names must reconcile with the Cvent registration.  Participants are responsible to configuring their Zoom application prior to the event.  Phone participants will not be entitled to CPE credits.  The ISACA® GWDC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: http://www.learningmarket.org.

CPE Distribution and Evaluation Survey

CPE's will be distributed via e-mail along with the event evaluation survey after the completion of the event. Attendees must be present for the full event to receive full CPE credit.

CPE-Related Details

  • Prerequisites and Advance Preparation: N/A
  • Program Knowledge Level: N/A
  • Delivery Method: Online / Virtual

Details

Date:
August 20
Time:
8:30 am - 12:00 pm EDT
Event Categories:
,
Event Tags:
, , ,
Website:
<a class="register-button" href="https://cvent.me/zR3Y2a">CLICK TO REGISTER » </a>

Organizer

Noel Nazario – Special Events
Email:
SpecialEvents@isaca-gwdc.org

ISACA GWDC