Due to obligations and conferences our volunteers have, we will not be meeting this month. We look forward to seeing you in July!
Category: Member Meeting

Registration Required: May 12th, 2022 7 PM – 9 PM Greg Maples, CISSP, will review a brief history of ZTA and focus on the fundamental
Registration required: 7 PM to 9 PM Thursday, March 10, 2 CPE We return to the topic of what we must know to remain relevant
Tuesday 6PM 1 hour event: Speaker Robin Basham Details Please, Just Tell Me What to Do Building Cloud Products for Federal Agencies – Using NIST

February 10, 2022 – Member meeting 1-Bot Sentinel organized hate accounts – 2 log4J with Whitesource
Registration for February 10 7:00 PM PST to 9:00 PM – 2 CPE for full attendance Session One: Christopher Bouzy – Using machine learning and

Thursday, January 13th online from 7:00 PM to 9:PM Presenter: Robin Basham, Chapter President, CEO EnterpriseGRC Solutions. Management Discussion: We do not have a quorum
Thursday, 7 PM to 9 PM Webinar – Registration Link Cloud Security Alliance Working Group CCM 4.1 to NIST SP 800-53 r5 Mapping Insights and
Meeting from 7:00 PM to 9:00 PM – 2 CPE for full attendance. Registration is required. Session One: Who’s Accountable Anyway? Sarah Clarke, Data protection

7 PM Jennifer Cohn – Election Integrity, followed by 8 PM Sherri Douville, How to Be an Ambassador of Trust: Putting Risk Management To Work

Please join (ISC)2 East Bay Chapter on August 12th, 7 PM – 9 PM, for Two CPE hours attending “SHARING SENSITIVE INFORMATION SECURELY – Privacy-Preserving
Sorry we missed you, but please enjoy the playback: https://register.gotowebinar.com/recording/recordingView?webinarKey=7663730602062283020®istrantEmail=robin%40enterprisegrc.com How Vulnerability Validation Saves DevSecOps Teams Significant Time Rezilion Prioritize identifies vulnerabilities that are actually

Please enjoy this free playback link. https://register.gotowebinar.com/register/6492462645812148493 7:00 PM Session One: Internet of Things, IoT, Reducing Vulnerability and Unauthorized Endpoints by Implementing Least Privilege Abstract: