BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:CDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20241103T010000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:CST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250228T145417Z
UID:32F583D2-27AB-40DA-9117-1DF4A59492B6
DTSTART;TZID=America/Chicago:20250227T193000
DTEND;TZID=America/Chicago:20250227T210000
DESCRIPTION:Join us the IEEE RRVS CCS &amp; IAS\, WIE\, YP\, Life members chapt
 er Meeting at 7:30 pm.\n\nTITLE: Advancing Compliance with the GRC Maturit
 y Model: A Roadmap for Cybersecurity Leaders\n\nAbstract:\n\nOrganizations
  face increasing regulatory\, contractual\, and legal compliance requireme
 nts\, yet many struggle with fragmented processes and reactive approaches.
  The Governance\, Risk\, and Compliance (GRC) Maturity Model provides a st
 ructured framework to assess and enhance compliance programs\, aligning th
 em with strategic business objectives.\n\nThis session will guide cybersec
 urity professionals through the four levels of GRC maturity—traditional\
 , initial\, advanced\, and optimal—illustrating how each stage impacts r
 isk management and operational efficiency. Attendees will learn how to eva
 luate their organization&#39;s current maturity level\, identify gaps\, and im
 plement targeted improvements to streamline compliance efforts.\n\nThrough
  real-world examples and practical strategies\, this presentation will dem
 onstrate how advancing GRC maturity enhances collaboration\, reduces compl
 iance risks\, and supports long-term business resilience. Whether an organ
 ization is starting to formalize compliance processes or aiming for an opt
 imized\, risk-based approach\, attendees will gain actionable insights to 
 drive meaningful improvements.\n\nAbout the Speaker:\n\nKayne McGladrey is
  a keynote speaker\, senior IEEE member\, and author of the GRC Maturity M
 odel. With nearly three decades of experience in cybersecurity\, he specia
 lizes in helping organizations navigate the intersection of governance\, r
 isk\, and compliance (GRC) to build more secure and resilient businesses.\
 n\nHis work focuses on enabling CISOs\, internal audit teams\, and executi
 ves to align cybersecurity and business goals\, communicate effectively wi
 th boards\, and proactively address evolving global regulations. As a reco
 gnized thought leader\, he’s spoken at events like Gartner IT Security &amp;
  Risk\, RSA\, ISACA GRC\, and the ISC2 Congress. His presentations are nua
 nced\, accessible\, and actionable\, offering attendees practical guidance
  on current cybersecurity challenges and opportunities.\n\nThroughout his 
 career\, he’s advised Fortune 500 and Global 1000 companies\, leveraging
  his ability to bridge the gap between business and technology. He’s pas
 sionate about reducing organizational friction\, improving GRC maturity\, 
 and inspiring underrepresented communities to pursue cybersecurity careers
 .\n\nLearn more at https://kaynemcgladrey.com.\n\nAgenda: \nAgenda:\n\n7:3
 0 PM Introduction\n\n7:35 PM Meeting\n\n9:00 PM Adjourn\n\nDetailed Presen
 tation Description:\n\nCybersecurity professionals operate in an environme
 nt where compliance is not just a regulatory obligation but a fundamental 
 aspect of risk management. However\, many organizations struggle with inco
 nsistent documentation\, siloed security and compliance initiatives\, and 
 a lack of integration between compliance efforts and business objectives. 
 The Governance\, Risk\, and Compliance (GRC) Maturity Model offers a struc
 tured approach to assess and improve compliance processes\, helping organi
 zations transition from reactive\, ad-hoc approaches to proactive\, strate
 gic compliance management.\n\nThis session will begin by introducing the f
 our levels of GRC maturity:\n\n- Traditional: Compliance activities are pr
 imarily manual and reactive\, often handled in isolation with minimal inte
 gration into broader risk management efforts.\n- Initial: Formalized compl
 iance processes emerge\, but they remain inconsistent and heavily dependen
 t on individual expertise.\n- Advanced: Compliance is standardized and int
 egrated across the organization\, supported by structured policies and pro
 active risk management.\n- Optimal: Compliance is deeply embedded into bus
 iness strategy\, leveraging automation and data-driven insights for contin
 uous improvement.\n\nAttendees will learn how to assess their organization
 &#39;s current maturity level and recognize common obstacles that hinder progr
 ess\, such as lack of leadership buy-in\, resistance to change\, and resou
 rce constraints. The discussion will cover best practices for moving up th
 e maturity scale\, including:\n\n- Aligning compliance and security effort
 s with business strategy to ensure efficiency and long-term value.\n- Stan
 dardizing processes to improve accuracy\, reduce redundancies\, and enhanc
 e collaboration.\n- Leveraging automation and technology to streamline com
 pliance monitoring and reporting.\n\nThrough case studies and industry ins
 ights\, this session will provide cybersecurity professionals with a roadm
 ap for advancing GRC maturity. By the end of the presentation\, attendees 
 will have a clear understanding of how to enhance their compliance program
 s\, mitigate risks more effectively\, and position their organizations for
  sustained regulatory success.\n\nThree Lessons Learned / Educational Obje
 ctives:\n\n- Understanding Maturity Levels – Attendees will learn how th
 e four levels of the GRC Maturity Model impact compliance\, risk managemen
 t\, and business operations.\n- Identifying and Addressing Gaps – Partic
 ipants will gain practical strategies for assessing their organization&#39;s c
 urrent maturity level and overcoming common barriers to improvement.\n- En
 hancing Compliance Efficiency – The session will highlight how organizat
 ions can integrate compliance into strategic decision-making\, leverage au
 tomation\, and foster a proactive compliance culture.\n\nThis presentation
  will equip cybersecurity professionals with the knowledge and tools neede
 d to advance their organization&#39;s compliance maturity\, ultimately reducin
 g risk exposure and improving operational efficiency.\n\nVirtual: https://
 events.vtools.ieee.org/m/461592
LOCATION:Virtual: https://events.vtools.ieee.org/m/461592
ORGANIZER:d.zinger@ieee.org
SEQUENCE:13
SUMMARY:IEEE RRVS: Feb 2025 Online Meeting (Webex Only)
URL;VALUE=URI:https://events.vtools.ieee.org/m/461592
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Join us the IEEE RRVS CCS &amp;amp\; IAS\, WIE
 \, YP\, Life members chapter Meeting at 7:30 pm.&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p c
 lass=&quot;MsoNormal&quot;&gt;&lt;strong&gt;TITLE: Advancing Compliance with the GRC Maturity
  Model: A Roadmap for Cybersecurity Leaders&lt;/strong&gt;&lt;/p&gt;\n&lt;h1&gt;Abstract:&lt;/h
 1&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;
 &quot;&gt;Organizations face increasing regulatory\, contractual\, and legal compl
 iance requirements\, yet many struggle with fragmented processes and react
 ive approaches. The Governance\, Risk\, and Compliance (GRC) Maturity Mode
 l provides a structured framework to assess and enhance compliance program
 s\, aligning them with strategic business objectives.&lt;/span&gt;&lt;/p&gt;\n&lt;p class
 =&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;This sessi
 on will guide cybersecurity professionals through the four levels of GRC m
 aturity&amp;mdash\;traditional\, initial\, advanced\, and optimal&amp;mdash\;illus
 trating how each stage impacts risk management and operational efficiency.
  Attendees will learn how to evaluate their organization&#39;s current maturit
 y level\, identify gaps\, and implement targeted improvements to streamlin
 e compliance efforts.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-f
 amily: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Through real-world examples and practical 
 strategies\, this presentation will demonstrate how advancing GRC maturity
  enhances collaboration\, reduces compliance risks\, and supports long-ter
 m business resilience. Whether an organization is starting to formalize co
 mpliance processes or aiming for an optimized\, risk-based approach\, atte
 ndees will gain actionable insights to drive meaningful improvements.&lt;/spa
 n&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;About the S
 peaker:&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,san
 s-serif\;&quot;&gt;&lt;strong&gt;Kayne McGladrey&lt;/strong&gt; is a keynote speaker\, senior 
 IEEE member\, and author of the GRC Maturity Model. With nearly three deca
 des of experience in cybersecurity\, he specializes in helping organizatio
 ns navigate the intersection of governance\, risk\, and compliance (GRC) t
 o build more secure and resilient businesses.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNor
 mal&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;His work focuses o
 n enabling CISOs\, internal audit teams\, and executives to align cybersec
 urity and business goals\, communicate effectively with boards\, and proac
 tively address evolving global regulations. As a recognized thought leader
 \, he&amp;rsquo\;s spoken at events like Gartner IT Security &amp;amp\; Risk\, RSA
 \, ISACA GRC\, and the ISC2 Congress. His presentations are nuanced\, acce
 ssible\, and actionable\, offering attendees practical guidance on current
  cybersecurity challenges and opportunities.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNorm
 al&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Throughout his care
 er\, he&amp;rsquo\;s advised Fortune 500 and Global 1000 companies\, leveragin
 g his ability to bridge the gap between business and technology. He&amp;rsquo\
 ;s passionate about reducing organizational friction\, improving GRC matur
 ity\, and inspiring underrepresented communities to pursue cybersecurity c
 areers.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdan
 a&#39;\,sans-serif\;&quot;&gt;Learn more at &lt;/span&gt;&lt;a href=&quot;https://kaynemcgladrey.com
 &quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;https://kaynemcgladre
 y.com&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;.&lt;/span
 &gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;Agenda:&lt;/p&gt;\n&lt;p&gt;7:30 PM Introduction&lt;/p&gt;
 \n&lt;p&gt;7:35 PM Meeting&lt;/p&gt;\n&lt;p&gt;9:00 PM Adjourn&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p class
 =&quot;MsoNormal&quot;&gt;&lt;span class=&quot;Heading1Char&quot;&gt;&lt;span style=&quot;font-size: 20.0pt\; l
 ine-height: 107%\;&quot;&gt;Detailed Presentation Description&lt;/span&gt;&lt;/span&gt;&lt;strong
 &gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;\
 n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;C
 ybersecurity professionals operate in an environment where compliance is n
 ot just a regulatory obligation but a fundamental aspect of risk managemen
 t. However\, many organizations struggle with inconsistent documentation\,
  siloed security and compliance initiatives\, and a lack of integration be
 tween compliance efforts and business objectives. The Governance\, Risk\, 
 and Compliance (GRC) Maturity Model offers a structured approach to assess
  and improve compliance processes\, helping organizations transition from 
 reactive\, ad-hoc approaches to proactive\, strategic compliance managemen
 t.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,s
 ans-serif\;&quot;&gt;This session will begin by introducing the four levels of GRC
  maturity:&lt;/span&gt;&lt;/p&gt;\n&lt;ul style=&quot;margin-top: 0in\;&quot; type=&quot;disc&quot;&gt;\n&lt;li cla
 ss=&quot;MsoNormal&quot; style=&quot;mso-list: l2 level1 lfo1\; tab-stops: list .5in\;&quot;&gt;&lt;
 strong&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Traditional:&lt;/sp
 an&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt; Compliance
  activities are primarily manual and reactive\, often handled in isolation
  with minimal integration into broader risk management efforts.&lt;/span&gt;&lt;/li
 &gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l2 level1 lfo1\; tab-stops: list
  .5in\;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Initia
 l:&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt; Form
 alized compliance processes emerge\, but they remain inconsistent and heav
 ily dependent on individual expertise.&lt;/span&gt;&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; 
 style=&quot;mso-list: l2 level1 lfo1\; tab-stops: list .5in\;&quot;&gt;&lt;strong&gt;&lt;span st
 yle=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Advanced:&lt;/span&gt;&lt;/strong&gt;&lt;span 
 style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt; Compliance is standardized a
 nd integrated across the organization\, supported by structured policies a
 nd proactive risk management.&lt;/span&gt;&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;ms
 o-list: l2 level1 lfo1\; tab-stops: list .5in\;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font
 -family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Optimal:&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;fon
 t-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt; Compliance is deeply embedded into bus
 iness strategy\, leveraging automation and data-driven insights for contin
 uous improvement.&lt;/span&gt;&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;fo
 nt-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Attendees will learn how to assess the
 ir organization&#39;s current maturity level and recognize common obstacles th
 at hinder progress\, such as lack of leadership buy-in\, resistance to cha
 nge\, and resource constraints. The discussion will cover best practices f
 or moving up the maturity scale\, including:&lt;/span&gt;&lt;/p&gt;\n&lt;ul style=&quot;margin
 -top: 0in\;&quot; type=&quot;disc&quot;&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level
 1 lfo2\; tab-stops: list .5in\;&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans
 -serif\;&quot;&gt;Aligning compliance and security efforts with business strategy 
 to ensure efficiency and long-term value.&lt;/span&gt;&lt;/li&gt;\n&lt;li class=&quot;MsoNorma
 l&quot; style=&quot;mso-list: l1 level1 lfo2\; tab-stops: list .5in\;&quot;&gt;&lt;span style=&quot;
 font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Standardizing processes to improve a
 ccuracy\, reduce redundancies\, and enhance collaboration.&lt;/span&gt;&lt;/li&gt;\n&lt;l
 i class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2\; tab-stops: list .5in
 \;&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Leveraging automati
 on and technology to streamline compliance monitoring and reporting.&lt;/span
 &gt;&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,s
 ans-serif\;&quot;&gt;Through case studies and industry insights\, this session wil
 l provide cybersecurity professionals with a roadmap for advancing GRC mat
 urity. By the end of the presentation\, attendees will have a clear unders
 tanding of how to enhance their compliance programs\, mitigate risks more 
 effectively\, and position their organizations for sustained regulatory su
 ccess.&lt;/span&gt;&lt;/p&gt;\n&lt;h1&gt;Three Lessons Learned / Educational Objectives:&lt;/h1
 &gt;\n&lt;ol style=&quot;margin-top: 0in\;&quot; start=&quot;1&quot; type=&quot;1&quot;&gt;\n&lt;li class=&quot;MsoNormal
 &quot; style=&quot;mso-list: l0 level1 lfo3\; tab-stops: list .5in\;&quot;&gt;&lt;strong&gt;&lt;span 
 style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Understanding Maturity Levels
 &lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt; &amp;ndash
 \; Attendees will learn how the four levels of the GRC Maturity Model impa
 ct compliance\, risk management\, and business operations.&lt;/span&gt;&lt;/li&gt;\n&lt;l
 i class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo3\; tab-stops: list .5in
 \;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Identifying
  and Addressing Gaps&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,s
 ans-serif\;&quot;&gt; &amp;ndash\; Participants will gain practical strategies for ass
 essing their organization&#39;s current maturity level and overcoming common b
 arriers to improvement.&lt;/span&gt;&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list
 : l0 level1 lfo3\; tab-stops: list .5in\;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-famil
 y: &#39;Verdana&#39;\,sans-serif\;&quot;&gt;Enhancing Compliance Efficiency&lt;/span&gt;&lt;/strong
 &gt;&lt;span style=&quot;font-family: &#39;Verdana&#39;\,sans-serif\;&quot;&gt; &amp;ndash\; The session 
 will highlight how organizations can integrate compliance into strategic d
 ecision-making\, leverage automation\, and foster a proactive compliance c
 ulture.&lt;/span&gt;&lt;/li&gt;\n&lt;/ol&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family:
  &#39;Verdana&#39;\,sans-serif\;&quot;&gt;This presentation will equip cybersecurity profe
 ssionals with the knowledge and tools needed to advance their organization
 &#39;s compliance maturity\, ultimately reducing risk exposure and improving o
 perational efficiency.&lt;/span&gt;&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp\;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

