Will you hear the bell ring? Cybersecurity Cat and Mouse Games

Cloud Computing Today: Myths and Realities
April 28, 2019
Show all

Will you hear the bell ring? Cybersecurity Cat and Mouse Games

When:
June 13, 2019 @ 11:30 am – 1:00 pm
2019-06-13T11:30:00-05:00
2019-06-13T13:00:00-05:00
Where:
Hess Club
5430 Westheimer Rd Houston
TX 77056 USA
Contact:
Communications

Presentation: Will You Hear The Bell Ring? 


Speaker: Norman Comstock – President & Managing Director UHY Advisors TAP, Inc.

Abstract: There are numerous cybersecurity products, architectures, and cyber risk management best practices to help harden your enterprise perimeter, improve preventive and detective controls, and mature overall cybersecurity posture. Yet data breaches continue. Could it happen to your business? Would you know it was happening?

Like the business environment, cybersecurity risk management is complicated. There are multiple variables changing subtly throughout the year. Similarly, expenditures on security skilled people, security related processes, and security technologies are subject to entropy and may lose potency as your company’s cybersecurity risk profile changes. Legacy security activities can lose focus of adapting to emerging security risks in favor of automating routine security activities.

Bio: Mr. Comstock (Norman) is president of UHY Advisors TAP, Inc. a subsidiary of UHY Advisors, bringing over 25 years of experience in strategic consulting services. He has an extensive information technology background. Norman advises clients on enterprise risk management, information technology governance, technology assurance, program management, and cybersecurity.

Contact Information:

 Name: Norman Comstock – MBA, CIA, CRMA, CISSP, CISA
 Title: President
 Company: UHY Advisors TAP, Inc. 
 eMail: ncomstock@uhy-us.com
 Web: www.uhy-us.com
https://www.linkedin.com/in/normancomstock/


Our Sponsor:

Name: YTBD
Title:
Company:
eMail:
Website:
Mobile:


Luncheon Meeting Schedule:

 

11:15 a.m. Registration / Networking
11:30 a.m. Luncheon / Networking
11:45 a.m. Chapter Business Meeting
12:00 noon Keynote Presentation
1:00 p.m. Adjourn Luncheon

Pre-requisites:

  • Background in Information Security.

CPE:

  • 1 CPE

Leave a Reply