![(ISC)2 Security Congress @ Anaheim Convention Center | Anaheim | California | United States](https://cadinc.com/wp-content/uploads/2015/08/2015-Congress-Logo-on-Blue.png)
Carolina Advanced Digital’s VP of Engineering and (ISC)2 Board of Directors member will be speaking at the (ISC)2 Security Congress conference, co-located with ASIS in Anaheim, CA.
Presenters
- Jennifer Minella, VP of Engineering and Consulting CISO and (ISC)² Board Secretary, Carolina Advanced Digital, Inc.
- Galina Antova, Team8
- Shirley Pierini, Vice President, KMS Security
- Christina Duffey CPP, President, Anderson Security Age
Date: Wednesday, September 30, 2015
Time: 1:45PM – 2:45PM
![(ISC)2 Security Congress 2017 @ JW Marriott Austin | Austin | Texas | United States](https://cadinc.com/wp-content/uploads/isc2logo.png)
Join our VP of Engineering for sessions at Security Congress. As vice chair of the Board of Directors, Jennifer will be answering questions at the Town Hall panel session Monday afternoon. Join her Tuesday for a session on “A Snapshot of Women in Cybersecurity”
5115 – A Snapshot of Women in Cybersecurity
Tuesday, September 26
10:30 AM – 11:30 AM central
Tweet us at @cadinc with event tag #isc2congress.
About the Conference
(ISC)² Security Congress cybersecurity conference brings together over 1,900 industry colleagues, offers 100+ educational and thought-leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our conference is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
About (ISC)²
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. (ISC)² is best known for the acclaimed CISSP®. Visit www.isc2.org.
At this year’s Infosec World CISO Leadership Summit, Carolina Advanced Digital’s VP of Engineering switches roles and presents on topics of mindfulness-based leadership for infosec professionals, and navigating through change.
In today’s high-stakes cybersecurity environment, chief information security officers must be more than technology and people managers. An effective CISO is a combination of business leader, risk visionary, technology translator and team mentor and enabler. If this sounds different than the technology-focused infosec path of the past, that’s because it is. To be an effective leader, security practitioners must become strategists who can look across the entire organization—its technology and people—and identify vulnerabilities proactively. These vulnerabilities, though, aren’t what you will find in the CVE; instead, leaders understand that running a proactive, capable security organization starts with people and processes. And to accomplish that, the CISO her/himself must first possess the leadership skills and tools to inspire those around them.
Attend the CISO Leadership Summit to participate in this interactive day of learning with peers, and take home new techniques and ideas to inspire and lead your organization.
9:00 AM – 10:00 AM
Inside & Out: Mindfulness-Based Leadership
Jennifer Minella, Vice President of Engineering & Security, Carolina Advanced Digital
Leaders in any organization aren’t necessarily the people on top of the org chart. Take a break from the conference mayhem and join peers for a candid session on leading from all sides including from within, using mindfulness to increase performance and efficiency in the workplace, increasing EQ, and building a toolset for bringing mindfulness to your professional life.
Take-away skills include a new level of listening and engaging, differentiating reactions from responses, and tips and tricks for finding the time and space each day to focus on the most important tasks.
10:00 AM – 10:45 AM
The Pace of Change: Building a Change Culture, How to Lead Teams through Change
Jennifer Minella, Vice President of Engineering & Security, Carolina Advanced Digital
“Nothing endures but change.” The popular quote summarizes Heraclitus’ understanding that change was central to the universe. Yet, the complex human brain is often change averse, and leading oneself through change is challenging enough. The prospect of leading a team or entire organization through change may seem insurmountable. Leading through change means taking an inside-out approach and effectively wielding the weapons of culture and communication in managing conflict and complexity throughout change—at every level.
Build your toolset for leading through change, creating a change culture and managing the risks while reaping rewards.
11:00 AM – 12:30 PM
Workshop: Board Level Communications Challenges and Opportunities
Tony Spinelli, Chief Operating Officer, Fractal Industries, Inc
Demonstrating the progress of your program, strategy, and your personal leadership brand are some of the challenges and opportunities you have to build credibility and confidence with your company’s Board of Directors and executive management. It’s become the norm for cybersecurity leaders to meet with a company’s Board of Directors on a regular basis, and it’s your one opportunity in the spotlight to demonstrate your leadership and command of risk management and cybersecurity.
The Board’s responsibility is oversight and governance for what has been identified as a top risk for nearly every company: cybersecurity. With that in mind, security leaders should expect to be incredibly challenged and receive deep inquiry about the dimensions of your program, the program’s maturity against your peers, and how you and your program have addressed the most recent cybersecurity threats.
Given these challenges we’ll discuss the methods to effectively articulate your program’s maturity, risks and threats, and how to best communicate cybersecurity leadership, risk management and demonstrate well-managed stewardship.
12:30 PM – 1:30 PM Networking Lunch
1:30 PM – 3:00 PM
Workshop: Understand Yourself and Your Team for Greater Success
Todd Fitzgerald, Managing Director, CISO Spotlight
3:15 PM – 4:15 PM
What Kind of Leader Do You Need to Be?
Tony Spinelli, Chief Operating Officer, Fractal Industries, Inc
4:15 PM – 5:00 PM
Essential Privacy Principles Every CISO Must Know
Todd Fitzgerald, Managing Director, CISO Spotlight
![(ISC)2 Security Congress 2019 @ Swan & Dolphin | Austin | Texas | United States](https://cadinc.com/wp-content/uploads/isc2logo.png)
Join our VP of Engineering for sessions at Security Congress. As chair of the Board of Directors, Jennifer will be answering questions at the Town Hall panel session Monday afternoon. Join her Monday for a panel on diversity and inclusion.
Diversity, Equity and Inclusion: How to Create a Winning Security Company Culture
Monday, October 28
9:45 – 10:45 am
Tweet us at @cadinc with event tag #isc2congress.
About the Conference
(ISC)² Security Congress cybersecurity conference brings together over 1,900 industry colleagues, offers 100+ educational and thought-leadership sessions, and fosters collaboration with other forward-thinking companies. The goal of our conference is to advance security leaders by arming them with the knowledge, tools, and expertise to protect their organizations.
About (ISC)²
(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. (ISC)² is best known for the acclaimed CISSP®. Visit www.isc2.org.
![SOCaaService Whisky Tasting with Arctic Wolf & Carolina Advanced Digital](https://cadinc.com/wp-content/uploads/banner-whiskytasting-200x115-1.jpg)
Join us for this special invite-only event
to learn about our new SOC-as-a-Service
Ensuring your organization is free from threats is important now more than ever. Come together with Carolina Advanced Digital, Arctic Wolf and other cybersecurity leaders through a virtual whiskey tasting experience. After a quick introduction by Arctic Wolf and Carolina Advanced Digital, our whiskey expert will lead you through a tasting of a variety of different labels, discussing the flavor profile, production style, and aging characteristics.
Whisky Tasting and Webinar
February 18th, 2021 | 4:00pm ET
This is a special invite-only event with registration limited to 20 attendees. Please do not forward this invite. If there’s a colleague at your organization that’s more appropriate to attend let us know.
![SOC-as-a-Service: Because it's not just SIEM](https://cadinc.com/wp-content/uploads/thumbsupSOCguy-200x200-1.png)
Join us to learn about the key elements of SOC-as-a-Service (monitoring, response, and vulnerability management), calculating buy vs. build TCOs, and intro to our new offering with 24x7x365 unlimited SOC services and NOC consulting.
|
|
Security incidents are on the rise, and running a SOC isn’t a part-time job. Even if your organization can afford the top-of-the-line SIEM, SOAR, and vulnerability management tools, chances are your already over-extended sys admin and networking teams simply can’t dedicate the time and energy to managing and monitoring them all.
That’s the story we’ve heard over and over for the past 18 months, and the issue we’ve been striving to solve. With our partner, Arctic Wolf, we’re able to give customers a truly holistic SOC-NOC experience with unlimited security services and network consulting for a flat fee that’s less than ¼ the price of building and managing a SOC in-house. If you need more immediate assistance, reply, contact your account manager, or visit https://cadinc.com/services/security. |
![Lunch n' Learn- How to Select a Cybersecurity Service: Examining MDR, MSSP, and SIEM](https://cadinc.com/wp-content/uploads/graphic-202106-AWN-pizza-webinar-300x149.jpg)
Join us for this special lunch & learn event:
How to Select a Cybersecurity Service: Examining MDR, MSSP, and SIEM
Join us for a discussion on some of the most common managed security services available and find out their key differences as you identify the right fit for your organization. Attendees will receive a Domino’s Pizza gift card for lunch during the event. Registration is limited to 30 attendees.
At this webinar you’ll learn:
- Distinctions between MDR, MSSP, and SIEM and details on their benefits and drawbacks
- Key cybersecurity learnings from over 30 years of industry experience
- How to solve today’s most prominent security operations challenges, including a lack of talent, shrinking budgets, and incompatible tools
Lunch & Learn Webinar
June 15th, 2021 | 12:00pm ET
Register by June 14 at https://bit.ly/3ftaAxi
![Crash Course- Winston-Salem, NC @ Footnote (Foothills Brewing) | Fayetteville | North Carolina | United States](https://cadinc.com/wp-content/uploads/Crash-Course-for-CC-300x67.jpg)
Our customer-favorite Crash Course event is back! We are hosting this FREE one-day event at Footnote (Foothills Brewing) in Winston-Salem, NC on Wednesday, November 9th. Registration is limited to make sure you get the most out of the sessions. Carolina Advanced Digital will be joined by partners Arctic Wolf & Barracuda to bring you the newest industry updates in cybersecurity operations, web application security, and more.
Who should attend:
• Security analysts, engineers, directors
• Network and wireless admins and managers
• Technology Directors, CIOs, CTOs, CISOs
• Anyone with cyber security, networking, web application or other security projects
Date and location:
• Wednesday, November 9th @ Footnote (Foothills Brewing), Winston-Salem, NC
Registration
Free
Limited seats- Please email your account manager or sales (at) cadinc.com to request an invite.