Menu
Log in


Lean Six Sigma Strategies in Cyber Security: Detecting and Defending Against Cyber Attacks

Presenter: Scott Jauman, Master Black Belt, Lean Six Sigma, Target Corporation, Brooklyn Park, MN, USA

Keywords: Cyber Security, Cyber Attack, Information Security

Industry: Defense/Military, Financial Services, Retail

Level: Intermediate


ABSTRACT

The criticality of keeping Enterprise data secure these days is difficult to overstate. Simply reading the headlines in the news each week is sufficient to drive this point home. But are you fully applying your Lean Six Sigma program to this area of critical need? Are you accurately describing the various motivations of attackers and addressing all segments of the roadmap that they use while they are attempting to steal your data? Are there measurements in place that could warn you of an impending attack? Do you know how to describe the signs of an attack that is occurring now? What are the potential costs of inaction?

This seminar will begin by describing the various motivations behind a cyber attack and the lifecycle that many attacks follow. It will then explore the critical metrics and potential process-improvement projects that your enterprise can leverage to increase the level of awareness in your employee population to potential threats. It will also explore how you can improve the security of your data through better prevention, detection, and containment activities.

Finally, while the likelihood of a cyber attack, the impact to the reputation or bottom line of an enterprise, and the return on investment for a process-improvement program in cyber security can be extremely challenging to measure. In this presentation, we will explore steps you can take to improve business cases for investing resources in this arena and for gaining greater visibility to your Lean Six Sigma program efforts.


Proposal Submission Deadline:
October 11, 2019

Acceptance notification date:
November 11, 2019

Early Registration Deadline:
February 11, 2020

Please make sure to review and prepare the material needed before you start the on-line Proposal Submission Form. Click here to see Proposal Submission Guidelines.

Who May Submit: This online form may be used by a principal speaker, co-speaker, contact person, or a committee member submitting on behalf of a speaker.

Multiple Proposals: You may submit multiple proposals.

Conference Registration Fee:
The conference registration fee is waived for the principal speaker of accepted proposals. Speakers are responsible for their travel expenses and arrangements. Co-speakers will receive a 30% discount for the conference that they are presenting at.

Length of Presentations: Technical sessions are typically 35 minutes. There will be a limited number of "double" sessions, 70 minutes, at the end of each day.

Call for Proposals

You will need the following to submit a proposal

Proposal Title: Maximum 80 characters including spaces. 

Keywords:Please include three keywords with a maximum of 100 characters, including spaces. 

Industry Sector: Please select the most relevant Industry sector for the proposal from a list.

Abstract: The Abstract should be 1,500 to 5,000 characters (note that it is Characters, NOT words), including spaces.

Biography: The Biography must be 1,500 to 5,000 characters, including spaces.

Public Profile: LinkedIn or Public Profile for link for the Principal Speaker: 

Speaker's Photo (optional)

Sample Video (optional)

Government Organizations




Corporations

““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““
““
““ ““ ““ ““ ““ ““
““ ““
““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““ ““
““ ““ ““ ““ ““

© Copyright 2019 American Quality Institute. All Rights Reserved.

Log in