
Webinar: CISO Underrepresented
Register Now for an Eye-Opening Conversation!
How do you strive for something that is either rarely seen or you don’t even know exists? Seeing others’ achievements who have similar backgrounds to you opens your eyes to new possibilities. Hearing their stories helps to avoid obstacles they encountered. Join Mark Arnold and Steph Ihezukwu, black cybersecurity professionals in varying levels of their career paths to the executive suite, in an open discussion to inspire current and future generations of underrepresented talent in this FREE EH-Net Live! webinar on Tues June 30, 2020 at 1:00 PM EDT. Join us live to receive certificates for easy submission of CPEs!
Please RT:
Agenda for “CISO Underrepresented”:
Note: Subject to Change
- Intro by Don Donzal, EH-Net Editor-in-Chief
- Bios – Mark Arnold and Steph Ihezukwu
- Open Discussion
- Why CISO?
- Their past, present and future
- Obstacles – Seen and Unseen
- Mentors and Mentees
- Resources for Underrepresented
- Audience Q&A
Although this is a free event, registration is required. Our virtual doors to the webinar open 30 minutes before the scheduled start time. Feel free to invite your friends and colleagues!
EH-Net Live! June 2020 – Guest Bios
Mark Arnold, VP Advisory Services, vCISO Practice at Lares, has a 15+ cybersecurity career, serving 8 of those years in leadership roles. As a transformational leader, Mark has built security teams and programs, authored maturity model blueprints to optimize risk management processes, and implemented security domain practices at large enterprises and service providers. Mark’s areas of interest include cloud security, threat intelligence, and vulnerability research, nation-state attack methods and related activities (e.g. information operations and disinformation campaigns) and their collective impact on nations and society. Mark recently completed an executive education cohort on the intersection of cybersecurity and technology at Harvard’s Kennedy School. Mark also commits time (Read more...) |
*** This is a Security Bloggers Network syndicated blog from The Ethical Hacker Network authored by Don Donzal. Read the original post at: http://feedproxy.google.com/~r/eh-net/~3/EhKLwswXWlA/