Why Risk Management Techniques Are Important in Ethical Hacking

You are here:

Irene Corpuz

Speaker: Irene Corpuz,
Designation: Co-founder of the Women in Cyber Security Middle East (WiCSME)
Topic: Why Risk Management Techniques Are Important in Ethical Hacking
Date of Webinar: 24th March, 2021
Time and Location: 04.30 PM GMT+4/6.30 PM IST/12.30 PM GMT

Watch Now

Speaker Bio:

Irene Corpuz has more than 30 years of combined experience in IT (IT Operations, Information Security, and Governance, Risk & Compliance), Project Management, Quality and Excellence Models, and ISO Audit.
She worked at a Swiss-based multinational company for 17 years and is currently based in Abu Dhabi Most of her work in the UAE relates information security strategy development, managing the Security Operations Center (SOC), vendor management, and implementing and auditing according to security standards.
Irene is also a co-founder of the Women in Cyber Security Middle East (WiCSME) and is heavily engaged in its activities ,supporting women and girls in their professional growth.

She has received several accolades, including the Middle East Top 30 CISOs, Middle East Security Awards – Woman Executive, the 100 Most Influential Filipinas in the World, Most Innovative Security Project (London), The Filipino Times IT Professional of the Year, and the Stevie Awards’ Women in Security Award (New York).

Topic Abstract:

The role of an ethical hacker is often used to test compliance and effectiveness by identifying vulnerabilities and validating an organizations security controls. Programs teaching
ethical hacking in higher education are steadily growing, but there is a concern that teaching
students hacking skills increases crime in society by drawing students toward criminal acts. It is equally important to raise awareness of aspiring Information Security professionals on the difference between ethical and unethical practices.

Key takeaways:

  • Role of an ethical hacker in risk management.
  • Designing the ethical hacking code of ethics or conduct
  • Integration of ethical hacking (penetration testing) with IS risk management.

*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)

Share this Article
You may also like

Train with EC-Council

Cyber Talks
Recent Posts