BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Los_Angeles
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250408T000702Z
UID:59246C6A-9C72-4DC6-A860-FB331C587CDF
DTSTART;TZID=America/Los_Angeles:20250404T140000
DTEND;TZID=America/Los_Angeles:20250404T144500
DESCRIPTION:In today’s business environment\, cyber risk is a growing con
 cern that goes beyond IT departments. It is a strategic issue that require
 s the attention of executives and business leaders. This keynote presentat
 ion offers a business-centric approach to understanding\, managing\, and m
 itigating cyber risks\, enabling leaders to address these challenges with 
 confidence.\n\nAct One begins with an overview of the modern cyber risk la
 ndscape\, positioning cybersecurity as a core business issue. We will exam
 ine the financial and reputational stakes of cyber incidents\, grounding t
 he conversation in tangible impacts that resonate with business decision-m
 akers. The audience will leave this section with a clear understanding of 
 why addressing cyber threats is critical to their organization’s success
 .\n\nAct Two focuses on practical strategies for integrating cyber risk in
 to business strategy. This includes defining cyber risks in business terms
 \, aligning cybersecurity efforts with organizational goals\, and translat
 ing technical concerns into actionable business insights. Attendees will l
 earn how to communicate cyber risks effectively to stakeholders\, includin
 g boards\, executives\, and external partners.\n\nKey points will include:
 \n\n- Bridging the gap between IT and business through shared understandin
 g.\n- Prioritizing cyber threats based on their business impact.\n- Buildi
 ng business-centric cybersecurity strategies that support enterprise objec
 tives.\n\nAct Three explores methods for reducing enterprise risk through 
 focused cybersecurity efforts. This includes identifying critical areas fo
 r investment\, implementing effective controls\, and measuring the success
  of cybersecurity programs. Attendees will learn how to allocate resources
  efficiently\, design controls with maximum impact\, and track the busines
 s value of their cybersecurity initiatives.\n\nBy the end of the presentat
 ion\, participants will have actionable insights and tools to:\n\n- View c
 yber risks through a business lens.\n- Communicate their significance to i
 nternal and external stakeholders.\n- Develop and implement strategies tha
 t prioritize business resilience.\n\nThis session is ideal for executives\
 , board members\, and business leaders looking to enhance their organizati
 on’s approach to cyber risk and align cybersecurity efforts with strateg
 ic goals.\n\nSpeaker(s): Kayne McGladrey\n\nVirtual: https://events.vtools
 .ieee.org/m/476428
LOCATION:Virtual: https://events.vtools.ieee.org/m/476428
ORGANIZER:riley.maltos@pnnl.gov
SEQUENCE:20
SUMMARY:Cyber Risk as a Business Imperative: Translating Threats into Strat
 egic Action
URL;VALUE=URI:https://events.vtools.ieee.org/m/476428
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;In today&amp;rsquo\;s busine
 ss environment\, cyber risk is a growing concern that goes beyond IT depar
 tments. It is a strategic issue that requires the attention of executives 
 and business leaders. This keynote presentation offers a business-centric 
 approach to understanding\, managing\, and mitigating cyber risks\, enabli
 ng leaders to address these challenges with confidence.&lt;/p&gt;\n&lt;p class=&quot;Mso
 Normal&quot;&gt;&lt;strong&gt;Act One&lt;/strong&gt; begins with an overview of the modern cyb
 er risk landscape\, positioning cybersecurity as a core business issue. We
  will examine the financial and reputational stakes of cyber incidents\, g
 rounding the conversation in tangible impacts that resonate with business 
 decision-makers. The audience will leave this section with a clear underst
 anding of why addressing cyber threats is critical to their organization&amp;r
 squo\;s success.&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;strong&gt;Act Two&lt;/strong&gt; focuse
 s on practical strategies for integrating cyber risk into business strateg
 y. This includes defining cyber risks in business terms\, aligning cyberse
 curity efforts with organizational goals\, and translating technical conce
 rns into actionable business insights. Attendees will learn how to communi
 cate cyber risks effectively to stakeholders\, including boards\, executiv
 es\, and external partners.&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;Key points will incl
 ude:&lt;/p&gt;\n&lt;ul style=&quot;margin-top: 0in\;&quot; type=&quot;disc&quot;&gt;\n&lt;li class=&quot;MsoNormal
 &quot; style=&quot;mso-list: l0 level1 lfo1\; tab-stops: list .5in\;&quot;&gt;Bridging the g
 ap between IT and business through shared understanding.&lt;/li&gt;\n&lt;li class=&quot;
 MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1\; tab-stops: list .5in\;&quot;&gt;Prior
 itizing cyber threats based on their business impact.&lt;/li&gt;\n&lt;li class=&quot;Mso
 Normal&quot; style=&quot;mso-list: l0 level1 lfo1\; tab-stops: list .5in\;&quot;&gt;Building
  business-centric cybersecurity strategies that support enterprise objecti
 ves.&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;strong&gt;Act Three&lt;/strong&gt; explores
  methods for reducing enterprise risk through focused cybersecurity effort
 s. This includes identifying critical areas for investment\, implementing 
 effective controls\, and measuring the success of cybersecurity programs. 
 Attendees will learn how to allocate resources efficiently\, design contro
 ls with maximum impact\, and track the business value of their cybersecuri
 ty initiatives.&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;By the end of the presentation\,
  participants will have actionable insights and tools to:&lt;/p&gt;\n&lt;ul style=&quot;
 margin-top: 0in\;&quot; type=&quot;disc&quot;&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1
  level1 lfo2\; tab-stops: list .5in\;&quot;&gt;View cyber risks through a business
  lens.&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2\; tab-s
 tops: list .5in\;&quot;&gt;Communicate their significance to internal and external
  stakeholders.&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2
 \; tab-stops: list .5in\;&quot;&gt;Develop and implement strategies that prioritiz
 e business resilience.&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;This session is i
 deal for executives\, board members\, and business leaders looking to enha
 nce their organization&amp;rsquo\;s approach to cyber risk and align cybersecu
 rity efforts with strategic goals.&lt;/p&gt;
END:VEVENT
END:VCALENDAR

