What Every IT Project Manager Should Know About Cyber Security and AI

What Every IT Project Manager Should Know About Cyber Security and AI

What Every IT Project Manager Should Know About Cyber Security and AI

By Lisa Kauffman

Date and time

Thursday, May 30 · 5:30 - 8:15pm EDT

Location

Penn State Great Valley School of Graduate Professional Studies

30 East Swedesford Road Main Building, Rooms 130/131 Malvern, PA 19355

Refund Policy

Contact the organizer to request a refund.
Eventbrite's fee is nonrefundable.

About this event

  • 2 hours 45 minutes

What Every IT Project Manager Should Know About Cyber Security and AI

When: Thursday, May 30, 2024, 5:30 pm to 8:15 pm. In-person event, only
Credit: 2 PDUs
Registration Fee: $15 for PMI-DVC Members and $20 for Non-Members

Location:

Penn State Great Valley
Main Building, Rooms 130/131
30 E. Swedesford Road
Malvern PA 19355

Parking: Ample free parking

The first 30 registrants will receive Security Yearbook 2023: Richard Stiennon from NICE Cybersecurity Career Ambassador Program.

Agenda:

5:30 pm - 6:30 pm Networking and light fare and refreshments

6:30 pm - 8:00 pm Presentation and Q&A

8:00 pm - 8:15 pm Departure

Abstract:

To improve and assess the robustness of an organization's security posture, key members of your leadership team and board are investing in security audits to validate the protection of company assets.

With the ever-evolving threat landscape, traditional audit methodologies often fall short in addressing emerging risks and vulnerabilities. This session explores the value of assessing the use of artificial intelligence (AI) during security audits to improve an organization's defense against cyber threats.

As a project manager, you play a crucial role in supporting your organization’s investment of time and capital in the cybersecurity audit process.

Learning Objectives:

1. Understanding the Three Pillars of Cyber Security: Develop a comprehensive understanding of cyber security's fundamental principles: confidentiality, integrity, and availability (CIA). Explore how these pillars influence project planning and day-to-day tasks for project managers, empowering them to effectively prioritize security considerations.

2. Reviewing Cyber Security Fundamentals: Deepen knowledge of essential cyber security concepts tailored for project managers. Learn to seamlessly integrate security into all project phases, reducing risks and ensuring successful project outcomes.

3. Exploring Privacy in the Era of AI: Investigate evolving privacy concerns exacerbated by the rise of artificial intelligence (AI). Analyze how AI technologies handle personal data and discuss strategies to address privacy challenges within project management frameworks, equipping project managers to adeptly navigate privacy issues.

4. Managing Risk and Ensuring Compliance with AI Implementation: Examine the convergence of risk management, compliance, and AI integration in cyber security initiatives. Identify and mitigate risks associated with AI technologies, ensure compliance with regulatory requirements, and cultivate a compliance-focused culture within project management practices. Enable project managers to achieve project goals while safeguarding against potential threats and liabilities.

Speaker Bios:

Neferteri Strickland is a Cybertechnology Strategist, military officer and adjunct professor who aligns with her communities through emerging technology initiatives in K-20 Science, Technology, Engineering, Arts and Mathematics (STEAM) education. Neferteri’s current projects include establishing a K12 Cybersecurity Career Ambassador Program with the National Institute of Standards and Technology’s NICE Community of Interest and serving as the 2024-2025 Haub School of Business Innovation Center Director.

At the start of the 2020 COVID-19 Pandemic Neferteri launched TEACHERS & the Design to Disrupt community to support education stakeholders navigating the future of education.

She, her loving husband, and two amazing children, reside in the Greater Philadelphia Region where she serves as an adjunct professor in Blockchain Technology at Saint Joseph’s University and a lecturer at The Wharton School of Business.

Leon Woolford is the Co-Founder and Lead Solutions Architect of Worldwide Computer Consulting Corporation (WC3), a cyber security and systems integration firm that helps organizations select, deploy, and manage technology solutions and maintain regulatory compliance. Leon is responsible for leading and managing the commercial and government solutions lines of business. He is also responsible for developing strategic supplier relationships to suit the unique needs of WC3’s diverse customer base. Before WC3, Leon held various senior-level IT positions within the Telecommunications, Insurance, and Defense Contracting Industries. Leon earned his Bachelor of Science (B.S.) in Management Science and Information Systems (MS&IS) from Penn State University. Leon currently resides in Chester County, PA with his wife and three daughters.

Rodney Newton is the owner and Founder of Arnaz Consulting, specializing in Cybersecurity Consulting, and IT Compliance Readiness. He is an Information Security Professional with over 20 years of experience in Information Technology Audit, Compliance, Security Assessments, Data Protection and Remediation. Rodney has worked in various industries including Banking, Utilities, Professional Services, Insurance, Technology, and the Federal Government. He also holds numerous industry certifications such as the Certified Information System Security Professional (CISSP), Certified Information Security Auditor (CISA), Cybersecurity Maturity Model Certification (CMMC) Certified Professional (CCP), Certified Data Privacy Solutions Engineer (CDPSE), and Certified Fraud Examiner (CFE).

John McNicholas is a Cyber Security officer with the US Government that has twenty-one years of experience in the cyber security field. John’s career has spanned working in security areas such as penetration testing, systems hardening, vulnerability management, disaster recovery, cloud security, data privacy, and certification & accreditation. He prides himself with guiding business teams to secure their applications, systems, and data while meeting the growing compliance regulations. John enjoys introducing, teaching, and mentoring junior analysts to the exhilarating world of cyber security. John holds the CISSP, CISA, CEH, CDPSE, and CCSK certifications. He has a Bachelor's degree in Business Administration from University Maryland University College and a Master's degree in Information Systems Management from Holy Family University. John appreciates time with his family along with camping, hiking, and getting lost in the woods.

Moderator for the Event - Ed Weckerly, MSOD, Director, Professional Programs at Penn State Great Valley

Organized by

$15 – $20