Loading…
Type: IT/Technical clear filter
arrow_back View All Dates
Tuesday, April 1
 

2:45pm CDT

Building A Cybersecurity Business Case
Tuesday April 1, 2025 2:45pm - 3:45pm CDT
In today's digital landscape, cybersecurity has become a top priority.  The growing frequency and sophistication of cyber threats, such as ransomware attacks, data breaches, and phishing schemes, present significant challenges. These incidents not only threaten sensitive data, undermine public trust and monetary loss but potentially can threaten public safety and infrastructure.

Critical to combat these ever-increasing risks, having the knowledge and the skill to clearly articulate and defend cybersecurity needs by building solid business cases in this session we will focus on:

Assessing and prioritizing Vulnerabilities and Potential Consequences: This involves identifying critical assets, assessing current security measures, and modeling the consequences of an incident—both immediate and long-term.

Understanding and Prioritizing Purchasing Criteria: When selecting cybersecurity solutions, decision-makers should align their criteria with the organization's unique needs.

Review an example of Business case framework: Demonstrating the return on investment or risk avoidance is crucial to gaining stakeholder approval. A strong business case quantifies the financial benefits of preventing costly incidents, minimizing downtime, and complying with regulatory requirements.
Speakers
avatar for Stacey Smith

Stacey Smith

Cybersecurity Adjunct Instructor, Texas A&M Engineering Extension Service
Stacey is a seasoned leader with a history of driving operational and strategic impact in the telecommunications,  technology and SAAS industries. Through leadership roles at Verizon and NICE Systems, Stacey has played a key role in the development and implementation of integrated... Read More →
Tuesday April 1, 2025 2:45pm - 3:45pm CDT
Spring Lake B 1001 E McCarty Ln, San Marcos, TX 78666

2:45pm CDT

Using Cyber Standards to Drive Risk Reduction
Tuesday April 1, 2025 2:45pm - 3:45pm CDT
Cybersecurity Standards, Policies, Directives, Rules, Orders, Compliance Regulations and other types of mandatory and best practice guidance can be overwhelming… With limited budget and time, learn from the speakers with high audience collaboration how many organizations handle the wide range of cyber and related areas to control. We cover: prioritizing which standards to concentrate on, how to quickly adapt template and other publicly available examples to your unique situations, and successful socialization strategies and techniques.

Attendees come away with actionable steps to better set, socialize and effectively manage the ever-growing array of needed technology and cybersecurity standards and directives.

Provide your contact information if you want access to a growing list of government provided free and reasonably priced services from the likes of TEEX, TxDIR, CISA, CIS and others.
Speakers
avatar for Darrel Raynor

Darrel Raynor

Director, Cybersecurity Business Integration, Lower Colorado River Authority
Darrel serves as Cybersecurity Director, Business Integration for LCRA. Here, he increases organization efficiency, decreases friction and works with all business units, using clear communications internally, with customers, vendors, and partners to increase overall Cyber posture... Read More →
avatar for Scott Karr

Scott Karr

Senior Cybersecurity Analyst, Lower Colorado River Authority
Scott serves as a Senior Cybersecurity Analyst, Business Integration for LCRA. He specializes in vulnerability management and engagement, integrates and socializes standards and polices with business units, and drives overall Cyber process improvement. A US Army veteran, Scott has... Read More →
Tuesday April 1, 2025 2:45pm - 3:45pm CDT
Spring Lake C 1001 E McCarty Ln, San Marcos, TX 78666

4:00pm CDT

Building A Cybersecurity Business Case
Tuesday April 1, 2025 4:00pm - 5:00pm CDT
In today's digital landscape, cybersecurity has become a top priority.  The growing frequency and sophistication of cyber threats, such as ransomware attacks, data breaches, and phishing schemes, present significant challenges. These incidents not only threaten sensitive data, undermine public trust and monetary loss but potentially can threaten public safety and infrastructure.

Critical to combat these ever-increasing risks, having the knowledge and the skill to clearly articulate and defend cybersecurity needs by building solid business cases in this session we will focus on:

Assessing and prioritizing Vulnerabilities and Potential Consequences: This involves identifying critical assets, assessing current security measures, and modeling the consequences of an incident—both immediate and long-term.

Understanding and Prioritizing Purchasing Criteria: When selecting cybersecurity solutions, decision-makers should align their criteria with the organization's unique needs.

Review an example of Business case framework: Demonstrating the return on investment or risk avoidance is crucial to gaining stakeholder approval. A strong business case quantifies the financial benefits of preventing costly incidents, minimizing downtime, and complying with regulatory requirements.
Speakers
avatar for Stacey Smith

Stacey Smith

Cybersecurity Adjunct Instructor, Texas A&M Engineering Extension Service
Stacey is a seasoned leader with a history of driving operational and strategic impact in the telecommunications,  technology and SAAS industries. Through leadership roles at Verizon and NICE Systems, Stacey has played a key role in the development and implementation of integrated... Read More →
Tuesday April 1, 2025 4:00pm - 5:00pm CDT
Spring Lake B 1001 E McCarty Ln, San Marcos, TX 78666

4:00pm CDT

Using Cyber Standards to Drive Risk Reduction
Tuesday April 1, 2025 4:00pm - 5:00pm CDT
Cybersecurity Standards, Policies, Directives, Rules, Orders, Compliance Regulations and other types of mandatory and best practice guidance can be overwhelming… With limited budget and time, learn from the speakers with high audience collaboration how many organizations handle the wide range of cyber and related areas to control. We cover: prioritizing which standards to concentrate on, how to quickly adapt template and other publicly available examples to your unique situations, and successful socialization strategies and techniques.

Attendees come away with actionable steps to better set, socialize and effectively manage the ever-growing array of needed technology and cybersecurity standards and directives.

Provide your contact information if you want access to a growing list of government provided free and reasonably priced services from the likes of TEEX, TxDIR, CISA, CIS and others.
Speakers
avatar for Darrel Raynor

Darrel Raynor

Director, Cybersecurity Business Integration, Lower Colorado River Authority
Darrel serves as Cybersecurity Director, Business Integration for LCRA. Here, he increases organization efficiency, decreases friction and works with all business units, using clear communications internally, with customers, vendors, and partners to increase overall Cyber posture... Read More →
avatar for Scott Karr

Scott Karr

Senior Cybersecurity Analyst, Lower Colorado River Authority
Scott serves as a Senior Cybersecurity Analyst, Business Integration for LCRA. He specializes in vulnerability management and engagement, integrates and socializes standards and polices with business units, and drives overall Cyber process improvement. A US Army veteran, Scott has... Read More →
Tuesday April 1, 2025 4:00pm - 5:00pm CDT
Spring Lake C 1001 E McCarty Ln, San Marcos, TX 78666
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -