Cyber Risk as a Business Imperative: Translating Threats into Strategic Action
-- cybersecurity, compliance, risk reduction, risk landscape, ...--
Free Registration (with a Zoom account; you can get one for free if you don't already have it. This requirement is to avoid Zoom bombing. Please sign in using the email address tied to your Zoom account — not necessarily the one you used to register for the event.):
https://sjsu.zoom.us/meeting/register/fqCZULv_SnWzwEZ3Tz2MJw
Abstract
Cyber risks are not just technical issues but fundamental business challenges with profound financial and reputational implications. This keynote addresses the intersection of cybersecurity and business strategy, offering practical insights to help executives and business leaders prioritize and act on cyber risks meaningfully.
Attendees will gain an understanding of how to frame cyber risks as business risks, communicate them effectively to stakeholders, and integrate them into broader organizational strategies. Real-world examples and actionable frameworks will equip leaders with the tools to translate technical threats into business priorities. This presentation will also explore how to allocate resources, measure the effectiveness of cybersecurity programs, and foster resilience across the enterprise.
By the end of the session, you will be prepared to engage in informed decision-making that balances cost, compliance, and risk reduction, ensuring your organization is prepared for the challenges of today’s complex risk landscape.
Presentation Description
In today’s business environment, cyber risk is a growing concern that goes beyond IT departments. It is a strategic issue that requires the attention of executives and business leaders. This keynote presentation offers a business-centric approach to understanding, managing, and mitigating cyber risks, enabling leaders to address these challenges with confidence.
Act One begins with an overview of the modern cyber risk landscape, positioning cybersecurity as a core business issue. We will examine the financial and reputational stakes of cyber incidents, grounding the conversation in tangible impacts that resonate with business decision-makers. The audience will leave this section with a clear understanding of why addressing cyber threats is critical to their organization’s success.
Act Two focuses on practical strategies for integrating cyber risk into business strategy. This includes defining cyber risks in business terms, aligning cybersecurity efforts with organizational goals, and translating technical concerns into actionable business insights. Attendees will learn how to communicate cyber risks effectively to stakeholders, including boards, executives, and external partners.
Key points will include:
- Bridging the gap between IT and business through shared understanding.
- Prioritizing cyber threats based on their business impact.
- Building business-centric cybersecurity strategies that support enterprise objectives.
Act Three explores methods for reducing enterprise risk through focused cybersecurity efforts. This includes identifying critical areas for investment, implementing effective controls, and measuring the success of cybersecurity programs. Attendees will learn how to allocate resources efficiently, design controls with maximum impact, and track the business value of their cybersecurity initiatives.
By the end of the presentation, participants will have actionable insights and tools to:
- View cyber risks through a business lens.
- Communicate their significance to internal and external stakeholders.
- Develop and implement strategies that prioritize business resilience.
This session is ideal for executives, board members, and business leaders looking to enhance their organization’s approach to cyber risk and align cybersecurity efforts with strategic goals.
Lessons Learned / Educational Objectives
- Understand Cyber Risk as a Business Issue
Attendees will learn to frame cyber risks in business terms, connecting them to financial, operational, and regulatory impacts. - Communicate Cyber Risk Effectively
Participants will gain strategies for translating technical jargon into language that resonates with boards, executives, and other stakeholders. - Integrate Cybersecurity into Business Strategy
Attendees will explore methods to align cybersecurity initiatives with organizational goals, prioritize risks based on business impact, and measure program success.
By registering for this event, you agree that IEEE and the organizers are not liable to you for any loss, damage, injury, or any incidental, indirect, special, consequential, or economic loss or damage (including loss of opportunity, exemplary or punitive damages). The event will be recorded and will be made available for public viewing.
Date and Time
Location
Hosts
Registration
- Date: 29 May 2025
- Time: 01:00 AM UTC to 02:30 AM UTC
-
Add Event to Calendar
Speakers
Dr. Vishnu S. Pendyala of San Jose State University
Moderator
Biography:
Vishnu S. Pendyala, PhD, is a faculty member in Applied Data Science and an Academic Senator with San Jose State University, current chair of the Santa Clara Valley Chapters of IEEE Computer and Computational Intelligence Societies, Area 4 Coordinator for Region 6, and a Distinguished Contributor of the IEEE Computer Society. As a past ACM Distinguished Speaker, researcher, and industry expert, he gave nearly 100 talks and tutorial sessions in various forums such as faculty development programs, the 12th IEEE GHTC, IEEE ANTS, 12th IACC, 10th ICMC, IUCEE, 12th ACM IKDD CODS and 30th COMAD to audiences at venues such as Stanford University, Google, University of Bolton, Computer History Museum, Universidad de Ingeniería y Tecnología, Lima, Peru, IIIT Hyderabad, KREA, IIT Jodhpur, University of Hyderabad, IIT Indore, IIIT Bhubaneswar. Some of these talks are available on YouTube and IEEE.tv. He is a senior member of the IEEE and ACM. He has over two decades of experience in the software industry in the Silicon Valley, USA. His book, “Veracity of Big Data,” is available in several libraries, including those of MIT, Stanford, CMU, the US Congress and internationally. Two other books on machine learning and software development that he edited are also well-received and found place in the US Library of Congress and other reputed libraries. Dr. Pendyala taught a one-week course sponsored by the Ministry of Human Resource Development (MHRD), Government of India, under the GIAN program in 2017 to Computer Science faculty from all over the country and delivered the keynote in a similar program sponsored by AICTE, Government of India in 2022. Dr. Pendyala served on a US government's National Science Foundation (NSF) proposal review panel in 2023. He received the Ramanujan memorial gold medal and a shield for his college at the State Math Olympiad. He also played an active role in the Computer Society of India and was the Program Secretary for its annual national convention.
Address:One Washington Sq, San Jose State University, San Jose, New Jersey, United States, 95192-0250
Kayne McGladrey
Cyber Risk as a Business Imperative: Translating Threats into Strategic Action
Biography:
Kayne McGladrey is a keynote speaker, senior IEEE member, and author of the GRC Maturity Model. With nearly three decades of experience in cybersecurity, he specializes in helping organizations navigate the intersection of governance, risk, and compliance (GRC) to build more secure and resilient businesses.
His work focuses on enabling CISOs, internal audit teams, and executives to align cybersecurity and business goals, communicate effectively with boards, and proactively address evolving global regulations. As a recognized thought leader, he’s spoken at events like Gartner IT Security & Risk, RSA, ISACA GRC, and the ISC2 Congress. His presentations are nuanced, accessible, and actionable, offering attendees practical guidance on current cybersecurity challenges and opportunities.
Throughout his career, he’s advised Fortune 500 and Global 1000 companies, leveraging his ability to bridge the gap between business and technology. He’s passionate about reducing organizational friction, improving GRC maturity, and inspiring underrepresented communities to pursue cybersecurity careers.
Learn more at https://kaynemcgladrey.com.