• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Events
  • Home
  • / ...
  • /Tech News
  • /Events

Free Live Webinar: Cybersecurity Business Analysis Essentials

Tuesday, Feb 18, 2020 12:00PM to 1:00PM ESTBe Prepared for Today's Cybersecurity Challenges

Sponsored by IEEE Computer Society and International Institute of Business AnalysisSponsored by IEEE Computer Society and International Institute of Business Analysis Due to OVERWHELMING DEMAND, we can't guarantee seating during the live webinar. However, all registrants will receive a recording of the webinar 1 hour after the live event. Today’s business analysis professionals are facing a challenge beyond defining systems or solutions; organizations are looking for well-versed BAs to help overcome critical cybersecurity challenges. In this webinar, together with IEEE Computer Society, we examine the basics of cybersecurity for BAs and discuss key topics such as:
  • How business analysis is changing cybersecurity
  • A look at cybersecurity issues, concepts and mitigation procedures
  • Apply business analysis best practices to advance cybersecurity initiatives
We also take a specific look at what business analysts, data analysts, and process analysts need to know to understand cybersecurity.

ABOUT OUR PANELISTS

TERRY BARESH is a Principal BA at Securian Financial Group as a member of a cybersecurity strategy consultancy. He received his CBAP from IIBA in 2016 and has over fifteen years’ experience practicing business analysis and a background in systems and network administration, manufacturing operations, and project management. During the past five years, Terry worked as a member of several cybersecurity organizations leading digital transformation and change management initiatives. BINDU CHANNAVEERAPPA,  BA Consultant and Director of IIBA UK London Communities. Bindu comes with 15 years of experience and is qualified from IIBA and BCS. She, later on, studied Security Management and since has become a keen advocate to make Cybersecurity inclusive within the business analysis. She is part of the IIBA’s Cybersecurity Certification team authoring the IIBA Cybersecurity Certification curriculum and the exam questions. RICH HILLIARD is a practicing software systems architect. He is chair of the Enterprise Information Technology committee of the Professional and Educational Activities Board at the IEEE Computer Society and is active in ISO and IEEE standards development.
LATEST NEWS
Shaping the Future of HPC through Architectural Innovation and Industry Collaboration
Shaping the Future of HPC through Architectural Innovation and Industry Collaboration
Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence
Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence
Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success
Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success
Computing’s Top 30: Sukanya S. Meher
Computing’s Top 30: Sukanya S. Meher
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Read Next

Shaping the Future of HPC through Architectural Innovation and Industry Collaboration

Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence

Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success

Computing’s Top 30: Sukanya S. Meher

Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces

Computing’s Top 30: Tejas Padliya

Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration

IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter