BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Pacific
BEGIN:DAYLIGHT
DTSTART:20250309T030000
TZOFFSETFROM:-0800
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:PDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20251102T010000
TZOFFSETFROM:-0700
TZOFFSETTO:-0800
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:PST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20250529T032547Z
UID:23516E84-BF63-4CF2-A27C-B906F3AD4591
DTSTART;TZID=US/Pacific:20250528T180000
DTEND;TZID=US/Pacific:20250528T193000
DESCRIPTION:Free Registration (with a Zoom account\; you can get one for fr
 ee if you don&#39;t already have it. This requirement is to avoid Zoom bombing
 . Please sign in using the email address tied to your Zoom account — not
  necessarily the one you used to register for the event.):\n\nhttps://sjsu
 .zoom.us/meeting/register/fqCZULv_SnWzwEZ3Tz2MJw\n\nAbstract\n\nCyber risk
 s are not just technical issues but fundamental business challenges with p
 rofound financial and reputational implications. This keynote addresses th
 e intersection of cybersecurity and business strategy\, offering practical
  insights to help executives and business leaders prioritize and act on cy
 ber risks meaningfully.\n\nAttendees will gain an understanding of how to 
 frame cyber risks as business risks\, communicate them effectively to stak
 eholders\, and integrate them into broader organizational strategies. Real
 -world examples and actionable frameworks will equip leaders with the tool
 s to translate technical threats into business priorities. This presentati
 on will also explore how to allocate resources\, measure the effectiveness
  of cybersecurity programs\, and foster resilience across the enterprise.\
 n\nBy the end of the session\, you will be prepared to engage in informed 
 decision-making that balances cost\, compliance\, and risk reduction\, ens
 uring your organization is prepared for the challenges of today’s comple
 x risk landscape.\n\nPresentation Description\n\nIn today’s business env
 ironment\, cyber risk is a growing concern that goes beyond IT departments
 . It is a strategic issue that requires the attention of executives and bu
 siness leaders. This keynote presentation offers a business-centric approa
 ch to understanding\, managing\, and mitigating cyber risks\, enabling lea
 ders to address these challenges with confidence.\n\nAct One begins with a
 n overview of the modern cyber risk landscape\, positioning cybersecurity 
 as a core business issue. We will examine the financial and reputational s
 takes of cyber incidents\, grounding the conversation in tangible impacts 
 that resonate with business decision-makers. The audience will leave this 
 section with a clear understanding of why addressing cyber threats is crit
 ical to their organization’s success.\n\nAct Two focuses on practical st
 rategies for integrating cyber risk into business strategy. This includes 
 defining cyber risks in business terms\, aligning cybersecurity efforts wi
 th organizational goals\, and translating technical concerns into actionab
 le business insights. Attendees will learn how to communicate cyber risks 
 effectively to stakeholders\, including boards\, executives\, and external
  partners.\n\nKey points will include:\n\n- Bridging the gap between IT an
 d business through shared understanding.\n- Prioritizing cyber threats bas
 ed on their business impact.\n- Building business-centric cybersecurity st
 rategies that support enterprise objectives.\n\nAct Three explores methods
  for reducing enterprise risk through focused cybersecurity efforts. This 
 includes identifying critical areas for investment\, implementing effectiv
 e controls\, and measuring the success of cybersecurity programs. Attendee
 s will learn how to allocate resources efficiently\, design controls with 
 maximum impact\, and track the business value of their cybersecurity initi
 atives.\n\nBy the end of the presentation\, participants will have actiona
 ble insights and tools to:\n\n- View cyber risks through a business lens.\
 n- Communicate their significance to internal and external stakeholders.\n
 - Develop and implement strategies that prioritize business resilience.\n\
 nThis session is ideal for executives\, board members\, and business leade
 rs looking to enhance their organization’s approach to cyber risk and al
 ign cybersecurity efforts with strategic goals.\n-------------------------
 --------------------------------------\n\nLessons Learned / Educational Ob
 jectives\n\n- Understand Cyber Risk as a Business Issue\nAttendees will le
 arn to frame cyber risks in business terms\, connecting them to financial\
 , operational\, and regulatory impacts.\n- Communicate Cyber Risk Effectiv
 ely\nParticipants will gain strategies for translating technical jargon in
 to language that resonates with boards\, executives\, and other stakeholde
 rs.\n- Integrate Cybersecurity into Business Strategy\nAttendees will expl
 ore methods to align cybersecurity initiatives with organizational goals\,
  prioritize risks based on business impact\, and measure program success.\
 n---------------------------------------------------------------\n\nBy reg
 istering for this event\, you agree that IEEE and the organizers are not l
 iable to you for any loss\, damage\, injury\, or any incidental\, indirect
 \, special\, consequential\, or economic loss or damage (including loss of
  opportunity\, exemplary or punitive damages). The event will be recorded 
 and will be made available for public viewing.\n\nSpeaker(s): Dr. Vishnu S
 . Pendyala\, Kayne McGladrey\n\nVirtual: https://events.vtools.ieee.org/m/
 483555
LOCATION:Virtual: https://events.vtools.ieee.org/m/483555
ORGANIZER:pendyala@ieee.org
SEQUENCE:34
SUMMARY:Cyber Risk as a Business Imperative: Translating Threats into Strat
 egic Action
URL;VALUE=URI:https://events.vtools.ieee.org/m/483555
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;Free Registration (with a Zoom account\; y
 ou can get one for free if you don&#39;t already have it. This requirement is 
 to avoid Zoom bombing. Please sign in using the email address tied to your
  Zoom account &amp;mdash\; not necessarily the one you used to register for th
 e event.):&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;&lt;a href=&quot;https://sjsu.zoom.us/meeting/register/f
 qCZULv_SnWzwEZ3Tz2MJw&quot;&gt;https://sjsu.zoom.us/meeting/register/fqCZULv_SnWzw
 EZ3Tz2MJw&lt;/a&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;h2&gt;Abstract&lt;/h2&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;Cyber ri
 sks are not just technical issues but fundamental business challenges with
  profound financial and reputational implications. This keynote addresses 
 the intersection of cybersecurity and business strategy\, offering practic
 al insights to help executives and business leaders prioritize and act on 
 cyber risks meaningfully.&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;Attendees will gain an
  understanding of how to frame cyber risks as business risks\, communicate
  them effectively to stakeholders\, and integrate them into broader organi
 zational strategies. Real-world examples and actionable frameworks will eq
 uip leaders with the tools to translate technical threats into business pr
 iorities. This presentation will also explore how to allocate resources\, 
 measure the effectiveness of cybersecurity programs\, and foster resilienc
 e across the enterprise.&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;By the end of the sessi
 on\, you will be prepared to engage in informed decision-making that balan
 ces cost\, compliance\, and risk reduction\, ensuring your organization is
  prepared for the challenges of today&amp;rsquo\;s complex risk landscape.&lt;/p&gt;
 \n&lt;p class=&quot;MsoNormal&quot;&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;h2&gt;Presentation Description&lt;/h2&gt;\n&lt;p 
 class=&quot;MsoNormal&quot;&gt;In today&amp;rsquo\;s business environment\, cyber risk is a
  growing concern that goes beyond IT departments. It is a strategic issue 
 that requires the attention of executives and business leaders. This keyno
 te presentation offers a business-centric approach to understanding\, mana
 ging\, and mitigating cyber risks\, enabling leaders to address these chal
 lenges with confidence.&lt;/p&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;strong&gt;Act One&lt;/strong&gt;
  begins with an overview of the modern cyber risk landscape\, positioning 
 cybersecurity as a core business issue. We will examine the financial and 
 reputational stakes of cyber incidents\, grounding the conversation in tan
 gible impacts that resonate with business decision-makers. The audience wi
 ll leave this section with a clear understanding of why addressing cyber t
 hreats is critical to their organization&amp;rsquo\;s success.&lt;/p&gt;\n&lt;p class=&quot;
 MsoNormal&quot;&gt;&lt;strong&gt;Act Two&lt;/strong&gt; focuses on practical strategies for in
 tegrating cyber risk into business strategy. This includes defining cyber 
 risks in business terms\, aligning cybersecurity efforts with organization
 al goals\, and translating technical concerns into actionable business ins
 ights. Attendees will learn how to communicate cyber risks effectively to 
 stakeholders\, including boards\, executives\, and external partners.&lt;/p&gt;\
 n&lt;p class=&quot;MsoNormal&quot;&gt;Key points will include:&lt;/p&gt;\n&lt;ul style=&quot;margin-top:
  0in\;&quot; type=&quot;disc&quot;&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo
 1\; tab-stops: list .5in\;&quot;&gt;Bridging the gap between IT and business throu
 gh shared understanding.&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 l
 evel1 lfo1\; tab-stops: list .5in\;&quot;&gt;Prioritizing cyber threats based on t
 heir business impact.&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 leve
 l1 lfo1\; tab-stops: list .5in\;&quot;&gt;Building business-centric cybersecurity 
 strategies that support enterprise objectives.&lt;/li&gt;\n&lt;/ul&gt;\n&lt;p class=&quot;MsoN
 ormal&quot;&gt;&lt;strong&gt;Act Three&lt;/strong&gt; explores methods for reducing enterprise
  risk through focused cybersecurity efforts. This includes identifying cri
 tical areas for investment\, implementing effective controls\, and measuri
 ng the success of cybersecurity programs. Attendees will learn how to allo
 cate resources efficiently\, design controls with maximum impact\, and tra
 ck the business value of their cybersecurity initiatives.&lt;/p&gt;\n&lt;p class=&quot;M
 soNormal&quot;&gt;By the end of the presentation\, participants will have actionab
 le insights and tools to:&lt;/p&gt;\n&lt;ul style=&quot;margin-top: 0in\;&quot; type=&quot;disc&quot;&gt;\
 n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2\; tab-stops: list .
 5in\;&quot;&gt;View cyber risks through a business lens.&lt;/li&gt;\n&lt;li class=&quot;MsoNorma
 l&quot; style=&quot;mso-list: l1 level1 lfo2\; tab-stops: list .5in\;&quot;&gt;Communicate t
 heir significance to internal and external stakeholders.&lt;/li&gt;\n&lt;li class=&quot;
 MsoNormal&quot; style=&quot;mso-list: l1 level1 lfo2\; tab-stops: list .5in\;&quot;&gt;Devel
 op and implement strategies that prioritize business resilience.&lt;/li&gt;\n&lt;/u
 l&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;This session is ideal for executives\, board memb
 ers\, and business leaders looking to enhance their organization&amp;rsquo\;s 
 approach to cyber risk and align cybersecurity efforts with strategic goal
 s.&lt;/p&gt;\n&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: center\;&quot; align=&quot;center&quot;
 &gt;&lt;hr align=&quot;center&quot; size=&quot;0&quot; width=&quot;100%&quot;&gt;&lt;/div&gt;\n&lt;h2&gt;Lessons Learned / Ed
 ucational Objectives&lt;/h2&gt;\n&lt;ol style=&quot;margin-top: 0in\;&quot; start=&quot;1&quot; type=&quot;1
 &quot;&gt;\n&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l2 level1 lfo3\; tab-stops: lis
 t .5in\;&quot;&gt;&lt;strong&gt;Understand Cyber Risk as a Business Issue&lt;/strong&gt;&lt;br&gt;At
 tendees will learn to frame cyber risks in business terms\, connecting the
 m to financial\, operational\, and regulatory impacts.&lt;/li&gt;\n&lt;li class=&quot;Ms
 oNormal&quot; style=&quot;mso-list: l2 level1 lfo3\; tab-stops: list .5in\;&quot;&gt;&lt;strong
 &gt;Communicate Cyber Risk Effectively&lt;/strong&gt;&lt;br&gt;Participants will gain str
 ategies for translating technical jargon into language that resonates with
  boards\, executives\, and other stakeholders.&lt;/li&gt;\n&lt;li class=&quot;MsoNormal&quot;
  style=&quot;mso-list: l2 level1 lfo3\; tab-stops: list .5in\;&quot;&gt;&lt;strong&gt;Integra
 te Cybersecurity into Business Strategy&lt;/strong&gt;&lt;br&gt;Attendees will explore
  methods to align cybersecurity initiatives with organizational goals\, pr
 ioritize risks based on business impact\, and measure program success.&lt;/li
 &gt;\n&lt;/ol&gt;\n&lt;hr&gt;\n&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size: 10pt\;&quot;&gt;&lt;em&gt;B
 y registering for this event\, you agree that IEEE and the organizers are 
 not liable to you for any loss\, damage\, injury\, or any incidental\, ind
 irect\, special\, consequential\, or economic loss or damage (including lo
 ss of opportunity\, exemplary or punitive damages). The event will be reco
 rded and will be made available for public viewing.&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

