BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20230124T210000Z
DTEND:20230124T233000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:Cybersecurity Forum - January 24\, 2023
DESCRIPTION:Privacy and Security Smackdown:\n\nGo together like Oil and Water? Or PB&J?\n\n   \n\nSponsored by: \n\n                            \n\nDigital transformation has permeated throughout organizations.  Data-centric processes\, products\, and services are foundational to a wide range of functional departments and business units.  Corporate officers and directors have obligations and liabilities requiring them to be aware of an organization's state of data privacy and protection compliance.  The responsibilities for data stewardship often lie in different roles and offices within an organization.  Our expert panelists share about where friction exists and synergies can be discovered.\n\nSpeakers:     \n\n\n\n  \n\n Trip Hillman\, Partner\, Cybersecurity Services\, Weaver\n \n\n \n\nTrip has more than a decade of hands-on experience evaluating cybersecurity in a broad range of IT environments. He has consulted with Fortune 100 companies\, private equity groups\, small enterprises and government entities alike on security and compliance\, and has performed and led over 200 substantial assessments across hundreds of unique IT environments. He also performs cyber risk assessments\, cybersecurity compliance assessments\, vulnerability assessments and penetration tests to help companies improve their cybersecurity posture.\n\n               \n\n\n\n\n\n    Hunter Sundbeck\, IT Advisory Manager\, Weaver \n\n\n\n\n\n\n\nHunter has over eight years' experience in Information Technology and has over five years of experience in the Public Accounting & IT Advisory/Consulting sector. During this time\, Hunter has completed various project engagements that include SOX and IT SOX control monitoring\, Information Security Risk Assessments\, PCI Assessments\, HIPAA Security Assessments\, Data Privacy & Protection Assessments\, and Data Governance & Management Maturity Assessments. Hunter is a member of the ISACA Austin Chapter as well as the local chapter of the International Association of Privacy Professionals (IAPP). Hunter received his Master's degree in Business Administration from Texas State University and his Bachelor's Degree in Information Systems from Texas State University. Hunter also holds two certifications in technical fields from CompTIA (A+\, CySA+) related to IT systems and cybersecurity. \n\n\n\nModerator:   \n\n \n\n \n\n  Brittany George\, Weaver\n\n\n\n\n\n\n\nBrittany George\, QSA\, CISA\, CISM\, has more than 19 years of experience\, including former Big Four experience. Her current focus includes PCI\, cybersecurity\, IT consulting\, SOC reporting\, evaluation and testing of ITGCs\, and regulatory compliance services (including SOX). She earned a Bachelor of Business Administration in management information systems from the University of Oklahoma and a professional graduate certificate in cybersecurity from Harvard. She is a member on the Cybersecurity Forum of Tech Titans and serves as the Third Past President on the board of ISACA NTX.
X-ALT-DESC;FMTTYPE=text/html:<h3><span style="font-size:24px\;"><span style="color:#000080\;"><strong><span style="font-family:arial\,sans-serif\;">Privacy and Security Smackdown:<br />\nGo together like Oil and Water? Or PB&amp\;J?</span></strong></span></span><br />\n<strong style="color: rgb(0\, 0\, 128)\; font-size: 24px\;"><span style="font-family:arial\,sans-serif\;"><span style="font-size:20px\;">&nbsp\; &nbsp\;<br />\nSponsored by:<em>&nbsp\;</em></span></span></strong></h3>\n\n<h3><strong style="color: rgb(0\, 0\, 128)\; font-size: 24px\;"><span style="font-family:arial\,sans-serif\;"><span style="font-size:20px\;"><em>&nbsp\;</em>&nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\;</span></span></strong><strong style="color: rgb(0\, 0\, 128)\; font-size: 24px\;"><span style="font-family: arial\, sans-serif\;"><span style="font-size: 20px\;"><em><img alt="" height="90" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/9090/Image/Weaver-Logo-4C-w-indentifier.jpg" style="width: 300px\; height: 90px\;" width="300" /></em></span></span></strong></h3>\n\n<h3><span style="font-size:14px\;"><span style="font-family: arial\, sans-serif\;">Digital transformation has permeated throughout organizations.&nbsp\; Data-centric processes\, products\, and services are foundational to a wide range of functional departments and business units.&nbsp\; Corporate officers and directors have obligations and liabilities requiring them to be aware of an organization&#39\;s state of data privacy and protection compliance.&nbsp\; The responsibilities for data stewardship often lie in different roles and offices within an organization.&nbsp\; Our expert panelists share about where friction exists and synergies can be discovered.</span></span></h3>\n\n<h2 style="font-weight: normal\; line-height: 1.2\; color: rgb(51\, 51\, 51)\; font-family: sans-serif\, Arial\, Verdana\, " trebuchet=""><span style="font-family:arial\,sans-serif\;"><span style="color:#000080\;"><span style="font-size:18px\;"><strong>Speakers:</strong>&nbsp\;&nbsp\;</span>&nbsp\;&nbsp\;&nbsp\;</span><br />\n<br />\n&nbsp\;<img alt="" height="100" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/9090/Image/TripHIllman.jpg" style="width: 100px\; height: 100px\; float: left\;" width="100" /><span style="color:#000080\;"><strong>&nbsp\;</strong></span></span><br />\n<span style="color:#000080\;"><span style="font-size:16px\;">&nbsp\;<strong>T<span style="font-family:arial\;">rip Hillman\, Partner\, Cybersecurity&nbsp\;Services\,&nbsp\;Weaver</span></strong></span></span></h2>\n&nbsp\;\n\n<h3><span style="font-family:arial\,sans-serif\;">&nbsp\;</span><br />\n<span style="font-size:14px\;"><span style="font-family:arial\,sans-serif\;">Trip</span><strong><span style="font-family:arial\,sans-serif\;">&nbsp\;</span></strong><span style="font-family:arial\,sans-serif\;">has more than a decade of hands-on experience&nbsp\;evaluating&nbsp\;</span><span style="text-decoration:none\;text-underline:none\;"><span style="font-family:arial\,sans-serif\;">cybersecurity</span></span><span style="font-family:arial\,sans-serif\;">&nbsp\;in a broad range of IT environments. He has consulted with Fortune 100 companies\,&nbsp\;</span><span style="text-decoration:none\;text-underline:none\;"><span style="font-family:arial\,sans-serif\;">private equity groups</span></span><span style="font-family:arial\,sans-serif\;">\, small enterprises and&nbsp\;</span><span style="text-decoration:none\;text-underline:none\;"><span style="font-family:arial\,sans-serif\;">government</span></span><span style="font-family:arial\,sans-serif\;">&nbsp\;entities alike on security and compliance\, and has performed and led over 200 substantial assessments across hundreds of unique IT environments. He also performs cyber risk assessments\, cybersecurity compliance assessments\, vulnerability assessments and penetration tests to help companies improve their cybersecurity posture.</span></span><br />\n<span style="font-family:arial\,sans-serif\;"><span style="font-size:14px\;">&nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\; &nbsp\;</span><br />\n<br />\n<img alt="" height="100" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/9090/Image/HunterSundbeck.jpg" style="width: 100px\; height: 100px\; float: left\;" width="100" /></span><br />\n&nbsp\;&nbsp\;&nbsp\;<strong><span style="color:#000080\;"><span style="font-family:arial\;"><span style="font-size:16px\;">&nbsp\;Hunter Sundbeck\, IT Advisory Manager\, Weaver </span></span></span></strong></h3>\n\n<h3><br />\n<br />\n<br />\n<span style="font-size:14px\;"><span style="font-family:arial\;">Hunter has over eight years&rsquo\; experience in Information Technology and has over five years of experience in the Public Accounting &amp\; IT Advisory/Consulting sector. During this time\, Hunter has completed various project engagements that include SOX and IT SOX control monitoring\, Information Security Risk Assessments\, PCI Assessments\, HIPAA Security Assessments\, Data Privacy &amp\; Protection Assessments\, and Data Governance &amp\; Management Maturity Assessments. Hunter is a member of the ISACA Austin Chapter as well as the local chapter of the International Association of Privacy Professionals (IAPP). Hunter received his Master&rsquo\;s degree in Business Administration from Texas State University and his Bachelor&rsquo\;s Degree in Information Systems from Texas State University. Hunter also holds two certifications in technical fields from CompTIA (A+\, CySA+) related to IT systems and cybersecurity.&nbsp\;</span></span><br />\n<br />\n<span style="font-family:arial\,sans-serif\;"><span style="font-size:18px\;"><span style="color:#000080\;"><strong>Moderator:</strong></span></span><strong>&nbsp\;&nbsp\;&nbsp\;<br />\n&nbsp\;</strong><br />\n&nbsp\;<img alt="" height="98" src="https://chambermaster.blob.core.windows.net/userfiles/UserFiles/chambers/9090/Image/BrittanyGeorge.jpg" style="height: 98px\; width: 110px\; float: left\;" width="110" /><br />\n<span style="font-family:arial\;"><span style="font-size:16px\;">&nbsp\; <strong><span style="color:#000080\;">Brittany George\, Weaver</span></strong></span></span></span></h3>\n\n<h3><br />\n<br />\n<br />\n<span style="font-size:14px\;"><span style="font-family:arial\;">Brittany George\, QSA\, CISA\, CISM\, has more than 19 years of experience\, including former Big Four experience. Her current focus includes PCI\, cybersecurity\, IT consulting\, SOC reporting\, evaluation and testing of ITGCs\, and regulatory compliance services (including SOX). She earned a Bachelor of Business Administration in management information systems from the University of Oklahoma and a professional graduate certificate in cybersecurity from Harvard. She is a member on the Cybersecurity Forum of Tech Titans and serves as the Third Past President on the board of ISACA NTX.<br />\n&nbsp\;</span></span><br />\n&nbsp\;</h3>\n
LOCATION:Weaver's Dallas Office Location: The Union 2300 North Field Street Suite 1000 (10th Floor) Dallas\, Texas 75201 The Union is located on Field Street in the Victory Park/Uptown neighborhood. The building is across from and just north of the Perot Museum. Parking instructions will be emailed to registrants the week before the event. In-person only
UID:e.9090.4789
SEQUENCE:3
DTSTAMP:20260413T131939Z
URL:https://business.techtitans.org/events/details/cybersecurity-forum-january-24-2023-4789
END:VEVENT

END:VCALENDAR
