Meet the Hacker and Balancing the GRC equation
(ISC)² Long Island Presents, “Meet the Hacker and Balancing the GRC equation“
Please join us for our October meeting featuring the topic of Real-World Exploits with primary speaker Justin Rhinehart from Bishop Fox, followed by GRC Equation by Stas Bojoukha. We are continuing the return to in-person meetings. This will be a hybrid event and will include Teams access for remote attendees and presenters.
Additional details and registration information can be found at the “Register Now” link below. Members can get their promo codes by logging into the chapter website and going to their “My Page”. Sponsor promo codes have been previously distributed. Non-members can register for a nominal fee. The hybrid event will qualify for two CPEs.
Agenda
5:00 – 6:00 In-Person Registration and Networking
5:15 – 6:00 Remote attendees join via Teams and can participate in virtual networking
6:00 – 6:10 Welcome and Chapter Business
6:10 – 7:05 Speaker 1: Meet the Hacker: Real-World Exploits with Bishop Fox
7:15 – 8:00 Speaker 2: Risk, Responsibility, and ROI: Balancing the GRC Equation
8:10 Session Wrap-up
Speaker 1:
Justin Rhinehart, Bishop Fox
Abstract: Join us for a unique opportunity to meet experienced hacker Justin Rhinehart, Senior Analyst at Bishop Fox. During this session, Justin will demonstrate his expertise in identifying and exploiting vulnerabilities within real-world systems. Attendees will have the unique opportunity to witness firsthand Justin’s use of advanced techniques to infiltrate systems, while gaining an understanding of the latest hacker trends and methods. Regardless of your experience in the cybersecurity field, this event promises to equip you with invaluable knowledge and insights to better safeguard your organization against cyber threats.
About Justin Rhinehart:
Justin Rhinehart is an accomplished Senior Analyst on the Cosmos team at Bishop Fox, spearheading the organization’s efforts in monitoring and reporting the ever-evolving landscape of emerging threats. Before joining the team at Bishop Fox, Justin excelled as a full-time bug bounty hunter helping secure organizations like Apple, Yahoo, Sony, and many more. He most recently spoke in Dubai at GISEC about research into car hacking, and has previously spoken at both the Recon and Red Team Villages at DEF CON. In his downtime Justin enjoys traveling, photography, CTFs, and hacking on vulnerability disclosure programs for critical infrastructure.
Speaker 2:
Stas Bojoukha, Founder at Compyl
Abstract: Risk, Responsibility, and ROI: Balancing the GRC Equation is an insightful webinar addressing the common challenges information security professionals face in implementing Governance, Risk Management, and Compliance (GRC) programs. This session is particularly relevant in an era where many GRC initiatives are criticized for being costly, less effective, and suffering from low user adoption. We will begin by reviewing the high costs often associated with GRC programs. Then, we will explore how these costs can escalate due to complex regulatory environments often requiring specialized tools and integrating GRC processes into existing systems. The session offers strategies for optimizing resources and maximizing the value of GRC investments
About Stas Bojoukha
Stas has 20+ years of experience as an information security expert, focusing on delivering compliance and security solutions to organization in heavily regulated fintech and financial services sectors. He has worked with regulators worldwide, including the US, Canada, UK, EU, Singapore, Japan and Hong Kong. Stas helps companies builds secure and robust information security program and implement strategies to remain compliant as they scale.
Stas is the CEO and Founder of Compyl, a company that offers information security software and advisory services to assist businesses in maturing their information security posture, mitigating security risks and surpassing regulatory compliance and audit requirements. Compyl’s application automates information security management systems focusing on access governance and tracking internal, external and regulatory compliance risks, threats and remedial action using real-time data. As the found, he has built an agile global development team and project delivery process that is rapidly evolving and scaling to meet the growing and increasingly complex client demands