9:00 am – 10:30 am HST
12:00 pm – 1:30 pm PT
1:00 pm – 2:30 pm MT
2:00 pm – 3:30 pm CT
3:00 pm – 4:30 pm ET
Cybersecurity is one of the top risks on everyone’s radar. Regulators continue to focus on cybersecurity as hackers demonstrate increasing success. Therefore, it is crucial that new IT officers and their supervisors seek current, relevant training.
Updated regulatory guidance now requires clear definition of cybersecurity responsibility (e.g., information security officer), which is independent of IT operations. This session will compare and contrast the roles of IT operations and information security officers. The core of the session will describe key attributes and capabilities that an IT Officer needs to develop. A sample career growth model designed to develop professionals for IT operations and cybersecurity roles will be examined.
Continuing Education: Attendance verification for CE credits upon request
- Differences between IT operations and cybersecurity, including key attributes and responsibilities
- Highlights of regulatory guidance related to IT operations and cybersecurity roles and responsibilities
- Need for cybersecurity governance independent of cybersecurity and IT operations
- Pros and cons of various training programs
- How to fulfill the roles in smaller institutions with limited staffing
- TAKE-AWAY TOOLKIT
- Sample position descriptions
- Training program resources/starting points (i.e., SANS, ISACA, CEH, etc.)
- Employee training log
- Quiz you can administer to measure staff learning and a separate answer key
WHO SHOULD ATTEND?
This informative session is intended for individuals new to or interested in pursuing IT operations/cybersecurity officer positions. Management/leadership, directors, and committee members responsible for organizational governance and risk management will also find the session informative, expanding their understanding of cybersecurity roles and responsibilities.
NOTE: All materials are subject to copyright. Transmission, retransmission, or republishing of any webinar to other institutions or those not employed by your financial institution is prohibited. Print materials may be copied for eligible participants only.