Thank to our Chapter sponsor, PwC
for hosting this program.
Member Price: Complimentary
LIMITED SEATING EVENT
The assets of companies, large and small, are facing an increased risk of losing or compromising their IP, confidential personnel and customer information, and diminished market brand to name a few. If unprepared, the consequences of a breach could result in a loss of public and investor confidence, disruption to vital infrastructure, and legal and regulatory sanctions. It is no surprise, then, that the level of board engagement in this area is also increasing. Yet overseeing a company's IT initiatives, particularly the adequacy of cybersecurity, can be a challenging task for directors.
During this presentation, we will dive into the primary questions a board member should be asking its leadership to understand the threat landscape and the risk mitigation measures being performed to protect the company’s interest.
The following questions will be addressed during the presentation from a board member’s point of view:
45 S 7th Street #3400
Minneapolis, MN 55402
Registration: 7:00 AM
Roundtable: 7:30 AM - 9:00 AM
A complimentary continental breakfast will be available.
Michael CoreyMike has more than 24 years of experience and is responsible for PwC's West Coast Cybersecurity and Privacy practice. Additionally, Mike is responsible for PwC’s Internal Technology Audit Solutions practice in the US. He has provided governance, management, organization design & effectiveness and strategy & planning services to a wide array of industries and firms.He has a reputation for helping clients anticipate future risks and building productive relationships. Mike’s primary area of focus today is the strategic program development for internal technology audit, cybersecurity, privacy and IT Risk. This experience gives him a unique perspective in discussing relevant board considerations, including mitigating related cybersecurity risks. He’s worked and presented to numerous board and audit committee members on the topic of IT risk and cybersecurity.