About Us | Contact Us
View Cart

IBA Planning Yet Another Great Conference!

By Dan Hadaway | Thursday, October 23, 2014 - Leave a Comment

Have you checked out the itinerary?


Another great lineup of speakers!
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .


ServIcons_ITAudit_01

Yesterday my Client said summed it up pretty well:

“I can’t afford not to go!”

On 11/19 and 11/20/2014 Information Security Officers from organizations all over Indiana, Ohio, and Michigan will be attending the seventh annual Information Security and Risk Management Conference in Indianapolis!

Some of the speakers lined up:

I’ve had many a bank ask me about CyberInsurance so I’m gonna be taking lots of notes when Andrew talks!

Those of you who have been coming to this conference for years don’t have to be reminded how it gets better each year.  We’ve really gone all out this year.  We’re going to have desert with the vendors; we’re going to have table topic discussions again; we’ve got more than one “prime-time” speaker!

And infotex is honored to have a role to play as well. Sean Waugh will be orchestrating yet another Hack Attack Live.  We really tried hard to get out of it this year, but just couldn’t find a technical firm wanting to take the risk.  Believe me, we understand why . . . .

And I get to give a talk about Customer Education.  I haven’t started structuring it yet, but I’ve been visiting a lot of bank sites to see what’s out there in the “public presence.”  And darn it, there’s not a lot (yet.)

Though the supplement turned three last June, it seems that the education piece is the last step for most banks and credit unions in the Midwest.  This makes sense because not only is this piece address the area of least control, but it requires parts of the organization to work together who haven’t done much together to-date.  But that’s just one more of the hidden treasures in the Supplement . . . . forcing the marketing and technology people to meet in the ISO’s office has always been beneficial (think back to your first Incident Response Plan.)

It’ll be a couple more weeks before I start to bring together a PowerPoint, and I’m trying to keep my eyes and ears open.  If you have a program you[‘re proud of, please let us know!  We’d love to learn from you, and share your good ideas on this blog and at the conference.

Still, my research will only be an eyes-wide supplement to my experience building customer education programs.  Heck, I’ve been addressing rather complex customer education problems since BEFORE the infotex days.  Back in the video days, we leveraged our information system to create a parental control system so that parents could regulate the movies their children were viewing using the MPAA rating system along with other rating systems to cover TV Programs, Games, etc.  The success of the program depended more on the savvy of our marketing people than it did on the code.  But we succeeded, and our member base was very appreciative.

So over the years I’ve collected an arsenal of tools, both infotex-developed and what I have found “out there,” and I’m going to share them all!

But my talk is but one of So if you are a bank within driving distance of Indianapolis, or even if you are not a bank, give the conference a look!  Find out more here!


Original article by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex

“Dan’s New Leaf” is a “fun blog to inspire thought in the area of IT Governance.”

 


same_strip_012513


 

Latest News
    PRESS RELEASE – FOR IMMEDIATE RELEASE SERVICE NEWS Dateline: Dayton, IN, June 22, 2022 We are proud to announce that infotex will now be supporting Endpoint Detection and Response (XDR/MDR)! We can manage/monitor solutions you already have or offer one as part of our service while still maintaining a segregated response posture. In recent years […]
    Over 85 percent of surveyed companies report having no  centralized monitoring of networked industrial devices… An article review. If you are involved in IT within your organization, you’re probably aware of the importance of being able to monitor relevant activity from your networked devices, especially if your organization is involved in healthcare, finance, or government.  […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    We always strive to bring you the best content that we possibly can. Your opinion on any content, presentation, service, or anything else you have received from us is important! Please click the button below to let us know how we are doing!  
    What to Expect in an Annual Information Security Report to the Board Webinar-Movie Information security ranks as a top risk to financial institutions, both in terms of likelihood and overall impact. It is important that boards receive annual comprehensive reporting from management about the information security risks and incidents, and the actions taken to address […]
    The Five Precepts of IT Vendor Management Webinar-Movie We’re going back to basics on Vendor Management. This webinar will give you a training tool to help out that new person that is starting to take on the gargantuan task that is Vendor Management.
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around […]
    The joint cybersecurity advisory includes the 15 most exploited vulnerabilities reported in 2021… An article review.  While a lot of attention is focused on previously undisclosed or “zero day” attacks, some of the most likely attack vectors are vulnerabilities that have been widely known for weeks or even months.  That’s according to a new joint […]
    Threats are changing, EDR can help us adapt . . . Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home.  While WFH offers many conveniences, it also imparts increased risks. BitSight conducted a 2021 study of […]
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]