• Skip to primary navigation
  • Skip to main content

American Cyber Security Management

Secure and certify all your data and processes

  • LinkedIn
  • Twitter
  • YouTube
  • Services
    • MSP/MSSP
    • Privacy
    • Security
    • ISO/IEC 27001:2022 Training & Certification
    • Secure DevOps
    • InfoSec Risk Management
    • Incident Response Planning
    • Artificial intelligence Readiness Offering
    • AppSec-as-a-Service
    • CISO As A Service
    • DPO As A Service
    • Security Monitoring
    • Security Operations
    • Awareness Training
  • Frameworks
    • CPA
    • CCPA/CPRA
    • GDPR
    • ISO 27001:2022
    • NIST 800-171
    • NIST 800-53
    • US Privacy Laws
  • News
  • Careers
    • DPO
    • CISO
  • Partners
  • About Us
    • Privacy Notice
    • Cookie Policy
  • Contact Us

Session Highlight:  A One Hit Wonder

May 1, 2024 By Paul Herbka

The Rocky Mountain Information Security Conference (RMISC.org) is not just a conference; it’s a dynamic hub for learning, networking, and innovation, featuring over 70 sessions led by industry leaders. The conference aims to blend education with practical insights, offering attendees a unique opportunity to dive deep into the latest trends and advancements in cybersecurity.

One of the highlights of this year’s conference is the session titled “A One Hit Wonder,” co-presented by industry experts Carlin Dornbusch and Paul Herbka. Prepare to be part of an immersive “live play” that gives you a front-row seat behind closed doors into the intense world of a ransomware attack scenario. This session isn’t just a presentation; it’s a behind-the-scenes journey into the mechanics of a real-world cybersecurity crisis.  This session is unlike any other you have seen.  

The Experience

Imagine the tension of a ticking clock as a ransomware attack unfolds. In “A One Hit Wonder,” you don’t just learn about ransomware—you live it. This session is crafted to make you feel part of the action, engaging directly with scenarios that test your decision-making under pressure. You’ll gain an inside view of the chaos and critical thinking required when facing a digital extortion crisis.

Why You Can’t Miss This

Interactive Learning: This unique format goes beyond traditional presentations. It’s interactive and designed to pull you into the narrative, making the experience not only memorable but also highly educational.

Real-World Insights: Dive deep into the dynamics of ransomware through a storyline that mirrors true events. Witness first-hand how crucial decisions can lead to triumph or disaster.  Learn what to do before it’s too late!

Skill Enhancement: You’ll be challenged to assess and enhance your own Incident Response (IR) planning skills. The session is structured to help you learn effective strategies for preparing and defending against cyber threats, including ransomware.

Learning Objectives

By participating in this session, you will:

  • Develop a robust Incident Response Plan that’s ready to be enacted at the first sign of trouble.
  • Understand common pitfalls in ransomware defense and how to avoid them.
  • Ensure your Disaster Recovery (DR) plan or Business Continuity/Disaster Recovery (BC/DR) plan fully supports your business operations.
  • Discover remediation steps necessary to recover from a ransomware event effectively.

Join Us at RMISC 2024 – This session, “A One Hit Wonder” will be Thursday June 13, 2024 from 2:30 – 3:30 pm in room 3C.

Also feel free to meet Carlin Dornbusch and Paul Herbka at the American Cyber Security Management booth, located in the expo hall.

This session is just a glimpse of what RMISC 2024 has to offer. We encourage all cybersecurity professionals and enthusiasts to join us at this premier event. It’s more than a conference; it’s an opportunity to network, learn, and prepare for the challenges ahead in the cybersecurity realm.

Don’t miss out on this chance to transform your approach to cybersecurity. Register now for RMISC 2024, and be sure to join us for “A One Hit Wonder” to see cybersecurity in action like never before!

For more details on the conference and to register, please visit: (https://rmisc.org/). For more information on how AmericanCSM supports our clients visit: (https://AmericanCSM.com)

Filed Under: Cyber Security News

Session Highlight:  How is AI Impacting Privacy?

April 26, 2024 By Paul Herbka

How is AI Impacting Privacy: The Intersection of AI and Privacy

As we approach the Rocky Mountain Information Security Conference (RMISC) 2024, the conversation around artificial intelligence (AI) and its implications on privacy is more vital than ever. The session is scheduled for June 12, from 1:15 p.m. to 2:15 p.m., titled “How is AI Impacting Privacy?” promises to be a cornerstone event, bringing together distinguished experts in the fields of cybersecurity, legal, privacy, and data protection.

AI technologies are integrating deeper into our daily lives, from personalized marketing and smart home devices to complex decision-making systems that can influence everything from credit approvals to healthcare outcomes. With this pervasive deployment, the intersection of AI and privacy is increasingly fraught with complex challenges and risks.

The ability of AI systems to collect, analyze, and store vast amounts of personal data raises significant privacy concerns. These systems often operate as “black boxes,” with opaque processes that make it difficult for users and regulators to understand how data is being used or misused. This lack of transparency can undermine the trust essential for the healthy adoption of technology.

Expert Panel Insights

The panel of experts at RMISC, including Carlin Dornbusch from American Cyber Security Management, Jill Stacey from Holland & Hart, Elizabeth Schweyen from Druva, and Janis Preese, will delve into these challenges. Each brings a unique perspective on how to navigate the evolving landscape of AI-driven technologies while protecting individual privacy rights.

Ethical Considerations

The ethical dimensions of AI and privacy are profound. AI systems that analyze personal data can inadvertently lead to biased outcomes or discrimination if not carefully managed. Ensuring ethical AI usage involves scrutinizing the data inputs, the algorithms themselves, and the resultant decisions for fairness and equity.  What if an AI tool is used by one company, developed and hosted by another company, yet the data collected is about Colorado residents.  Who has ethical responsibility for the data?

Regulatory Landscape

With GDPR in Europe and various state laws in the U.S., such as the California Consumer Privacy Act, the Colorado Privacy Act (CPA), and many others, the regulatory landscape is becoming increasingly complex. Our panelists will discuss how these regulations impact AI development and deployment and the role of compliance in fostering consumer trust and safety. Also, who owns the data, what rights do people have for data about themselves, and how can we ensure we protect people’s privacy as well as their data rights?

Practical Strategies for Data Protection

Balancing innovation with privacy is a delicate act but not insurmountable. The experts at RMISC will share practical strategies that organizations can employ. These might include the implementation of privacy-by-design principles, regular audits of AI systems for compliance and ethics, and the adoption of technologies like federated learning that can help minimize privacy risks.

The session at RMISC is not just about discussing the problems but also about forging pathways towards solutions. It’s an invitation to IT professionals, legal experts, policymakers, and industry leaders to come together to ensure that as AI capabilities grow, they do so in ways that respect and protect personal privacy.

In conclusion, as AI continues to evolve, the dialogue about its impact on privacy must not only keep pace but anticipate and shape future developments. The RMISC 2024 session on AI and privacy is poised to be a pivotal moment in this ongoing conversation. We are on the brink of a new era in cybersecurity and privacy, and the decisions we make now will resonate well into the future. Join us to contribute to this critical discourse and help shape the landscape of AI and privacy for a safer digital world.

For more details on the conference and to register, please visit: (https://rmisc.org/). For more information on how AmericanCSM supports our clients visit: (https://AmericanCSM.com)

Filed Under: Cyber Security News

Session Highlight:  Leadership, Cybersecurity & the CISO

April 18, 2024 By Paul Herbka

The Rocky Mountain Information Security Conference (RMISC.org) is not just a conference; it’s a dynamic hub for learning, networking, and innovation, featuring over 70 sessions led by industry leaders. The conference aims to blend education with practical insights, offering attendees a unique opportunity to dive deep into the latest trends and advancements in cybersecurity.

One of the highlights of RMISC 2024 includes the session titled:

 “Leadership, Cybersecurity & the CISO, The long dark teatime of the CISO (Apologies to Douglas Adams)”

a must-attend for anyone interested in the intersection of executive leadership and security. This session will be presented by Brian Sudis and Paul Herbka, the authors of the forthcoming book by the same name. Their presentation will explore the critical role leadership plays in shaping cybersecurity strategies and the effectiveness of CISOs. Attendees will not only gain from “3 rules and story time!” but will also leave with fresh perspectives on leadership within the cybersecurity community.

Date and Time: Tuesday, June 11, 2024 3:00 PM – 4:00 PM

Whether you are a CISO, and Manager, or brand new to cybersecurity, you will glean insights from the fun, humorous, and exploration of leadership through the eyes of two souls who have traversed the globe and are ready to share some enlightening real-world stories.

Description

3 rules and story time! The stories will be based on the professional experience of the presenters, with lessons learned and mistakes made as it relates to these three rules. How do you communicate with those around you about cybersecurity? This presentation will introduce 3 rules that can be used by cybersecurity professionals to enhance discovery, understanding and alignment with the business objectives. Rules for navigating the organization! (Well, really more like guidelines.)

Learner Objectives

After this session, the learner will:

• Know the 3 rules

• Know how to apply them

• Have great stories to share with others

• Hopefully, learn from our mistakes

• Take what you like, throw away the rest!

Also feel free to meet Brian Sudis and Paul Herbka at the American Cyber Security Management booth, located in the expo hall.

Join us at RMISC 2024 to connect with fellow professionals, engage with cutting-edge content, and gain insights that will empower you and your organization in facing the cybersecurity challenges of today and tomorrow. Let’s explore the vast, mountainous regions of leadership and cybersecurity together. For more information and to register for the event, please visit https://rmisc.org/ . We look forward to welcoming you to Denver and to an event that promises to be as enlightening as it is engaging.

Filed Under: Cyber Security News

American Cyber Security Management once again Proud Sponsor of RMISC

April 15, 2024 By Paul Herbka

Cybersecurity and Privacy Expertise and Community Support at RMISC 2024.

At AmericanCSM.com (https://www.americancsm.com/ ), we are thrilled to announce our continued support and sponsorship for the Rocky Mountain Information Security Conference (RMISC) 2024. This prestigious event, set to take place at the Colorado Convention Center from June 11-13, 2024, represents a vital meeting ground for cybersecurity and privacy professionals in the Rocky Mountain region and beyond.

As a company that prides itself on delivering top-notch cybersecurity services—including Security Assessments, Pen Tests, and our CISO-as-a-Service and DPO-as-a-Service, AmericanCSM.com understands the importance of fostering a strong cybersecurity community. RMISC 2024 is the perfect platform for this, offering a rich tapestry of sessions that cover the most pressing topics in our field today, from IT security and compliance to emerging threats and cybersecurity innovations.

At AmericanCSM.com, we also offer Privacy services, such as privacy assessments and DPO-as-a-Service, recognizing that privacy and security are two sides of the same coin. Events like RMISC allow us to showcase these services while gaining insights into the needs and challenges faced by our community, ensuring that our offerings remain at the cutting edge.

As always, we are not just sponsors; we are also proud participants. Several of our esteemed colleagues will be speaking at the conference. Carlin Dornbusch, Brian Sudis, and Paul Herbka will share their insights and expertise, contributing to the knowledge exchange that RMISC facilitates so well.

Supporting local cybersecurity events like RMISC is crucial for several reasons. First, it allows us to give back to the community that drives our industry forward. These gatherings are essential for networking, sharing knowledge, and discussing new ideas and technologies that can shape the future of cybersecurity and privacy. Second, by sponsoring RMISC, we help ensure that the local cybersecurity and privacy community remains vibrant and accessible, providing professionals of all levels with opportunities to learn, grow, and collaborate.

We invite all attendees to connect with us during the conference, whether it’s attending one of our talks, visiting our booth in the exhibitor’s hall, or just saying hello. Let’s make RMISC 2024 a landmark event for collaboration, learning, and advancement in cybersecurity!

For more information on RMISC 2024, please visit their website at https://rmisc.org/ and we look forward to seeing you there and continuing to build a safer digital world together.

Filed Under: Cyber Security News

Strategic Edge – Elevating your Cybersecurity Posture with a vCISO

March 12, 2024 By Paul Herbka

The Strategic Edge:  Elevating your Cybersecurity Posture with a vCISO

In an era where digital threats are a constant reality, the significance of robust cybersecurity strategies has never been more pronounced. We have seen how critical a comprehensive, strategic approach to cybersecurity is for the modern enterprise. It’s not merely about defense; it’s about enabling trust, compliance, and business growth. American Cyber Security Management’s innovative CISO-As-A-Service model stands out as a pivotal solution for businesses aiming to enhance their cybersecurity posture while aligning with their core business objectives.

Strategic Alignment: The Foundation of Effective Cybersecurity

The journey to robust cybersecurity begins with alignment. Your cybersecurity strategy must be a reflection of your business goals, tailored to protect and propel your enterprise forward. CISO-As-A-Service brings to the table the expertise necessary to ensure that your cybersecurity measures are not just shields but also strategic assets, woven into the very fabric of your business objectives.

Investment Optimization: Getting the Most Out of Your Cybersecurity Spend

Cybersecurity is an investment, and like all investments, it demands judicious management to ensure maximum returns. With CISO-As-A-Service, businesses gain access to a wealth of experience and knowledge, enabling them to implement and continuously refine their cybersecurity efforts. This ensures not only the effectiveness of your security measures but also their efficiency, guaranteeing that every dollar spent contributes directly to the safeguarding of your enterprise.

Compliance Mastery: Staying Ahead in a Shifting Regulatory Landscape

In today’s fast-paced regulatory environment, maintaining compliance is a moving target. The CISO-As-A-Service model excels in demystifying this complexity, offering the guidance needed to navigate the evolving compliance landscape. From GDPR to CCPA and future regulations, this service ensures your business is not just compliant today but prepared for tomorrow’s requirements.

The Comprehensive Approach to Cybersecurity

American Cyber Security Management’s CISO-As-A-Service covers all the bases, including:

  • ISMS Management: Building a robust framework for continuous cybersecurity improvement.
  • Strategic Communication: Ensuring clear, effective communication across all levels of the organization.
  • Policy and Control: Developing adaptable policies and controls to counteract emerging threats.
  • Incident Response: Preparing your team for efficient, effective response to security incidents.
  • Security Auditing: Regularly evaluating your security posture to identify and address vulnerabilities.
  • Awareness and Training: Cultivating a culture of security mindfulness among your staff.
  • Risk Management: Proactively identifying and mitigating cybersecurity risks.
  • Best Practices Implementation: Leveraging industry-leading strategies to fortify your defenses.

In the current digital landscape, adopting a strategic, comprehensive approach to cybersecurity is not optional—it’s essential. The CISO-As-A-Service model offers a scalable, integrated solution that not only protects your business but also aligns with and advances your strategic objectives. It transforms cybersecurity from a mere necessity into a strategic advantage, fostering resilience, trust, and innovation.

As you chart your course through these digital challenges, it’s crucial to view cybersecurity not as a line-item expense but as a strategic investment in your company’s future. By aligning our cybersecurity initiatives with your business goals, we can transform potential vulnerabilities into opportunities for growth, innovation, and sustained success.

American Cyber Security Management is a leader in data privacy, cybersecurity, and Compliance. Our mission is to help enterprises protect their data from internal and external threats. We offer on-demand assessment, implementation, and sustainability services that focus on Privacy and Cybersecurity readiness and compliance, risk reduction, and mitigation. https://www.americancsm.com

Filed Under: Cyber Security News

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Interim pages omitted …
  • Page 25
  • Go to Next Page »
  • ISSA
  • ISACA
  • ISC2
  • IAPP
  • CSA
  • CIS
  • Privacy Notice
  • Cookie Policy
  • Services
  • Frameworks
  • News
  • Careers
  • Partners
  • About Us
  • Contact Us

Copyright © 2026 American Cyber Security Management