Beginning IT Officer Training
Cybersecurity is one of the top risks on everyone’s radar. Regulators continue to focus on cybersecurity as hackers demonstrate increasing success. Therefore, it is crucial that new IT officers and their supervisors seek current, relevant training.
Updated regulatory guidance now requires clear definition of cybersecurity responsibility (e.g., information security officer), which is independent of IT operations. This session will compare and contrast the roles of IT operations and information security officers. The core of the session will describe key attributes and capabilities that an IT Officer needs to develop. A sample career growth model designed to develop professionals for IT operations and cybersecurity roles will be examined.
Recorded Tuesday, June 12, 2018
Continuing Education: Attendance verification for CE credits upon request
- Differences between IT operations and cybersecurity, including key attributes and responsibilities
- Highlights of regulatory guidance related to IT operations and cybersecurity roles and responsibilities
- Need for cybersecurity governance independent of cybersecurity and IT operations
- Pros and cons of various training programs
- How to fulfill the roles in smaller institutions with limited staffing
- TAKE-AWAY TOOLKIT
- Sample position descriptions
- Training program resources/starting points (i.e., SANS, ISACA, CEH, etc.)
- Employee training log
- Quiz you can administer to measure staff learning and a separate answer key
WHO SHOULD ATTEND?
This informative session is intended for individuals new to or interested in pursuing IT operations/cybersecurity officer positions. Management/leadership, directors, and committee members responsible for organizational governance and risk management will also find the session informative, expanding their understanding of cybersecurity roles and responsibilities.
NOTE: All materials are subject to copyright. Transmission, retransmission, or republishing of any webinar to other institutions or those not employed by your financial institution is prohibited. Print materials may be copied for eligible participants only.
MEET THE PRESENTER
Randy Romes has been a cybersecurity consultant at CliftonLarsonAllen since 1999 and brings a strong background in computer technology, physics, and education. As a Principal in the Information Security Services and Financial Institutions groups, Randy leads a team of technology and industry specialists and is responsible for the continuing development of the open-source, Unix, and Windows applications used in security audits.
Randy has been involved in developing numerous leading-edge hacking/testing methods and security service offerings. A featured speaker at national information and security management conferences, Randy holds multiple certifications, a Master’s in Educational Technology from the University of Saint Thomas, and a Bachelor’s in Education from the University of Wisconsin – Madison. In addition, he is an instructor at the Graduate School of Banking at the University of Colorado in Boulder.