Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
attend 3T23 and walk-away with a new tech certification
Tuesday, October 3 - 8:00 am - 5:00 pm
This one-day certification course is designed for IT professionals to gain an understanding of the Integrated IT Business Management™ model, which involves connecting multiple business processes into a single unified system.
The course covers the integration of IT service management processes (ITSM) among themselves, the integration of ITSM processes with enabling practices, and the integration of the IT organization with the rest of the business. It provides an overview of the common ITSM processes that organizations use to manage their IT services and the enablers that organizations use to support their ITSM processes. Attendees will learn how these practices can help organizations achieve their business goals and the typical metrics used to measure IT performance and business results. Upon completion, candidates will receive a certificate that demonstrates their foundational knowledge and understanding of integrated IT business management.
Speaker
Wednesday, October 4 - 8:00 am - noon
Learn about job opportunities and concepts on Ethical Hacking and obtain ISC2 Certified in Cybersecurity certification.
4-hour Workshop on Ethical Hacking and Cybersecurity Principles.
Then for BUiLT members (anyone can join), pay $50 to attend the remaining 4 weeks online self-paced training and study group review sessions to review the ISC2 certified in cybersecurity certification.
Along with learning Ethical Hacking, the course provides a review of the subject matter published in the ISC² Certified in Cybersecurity exam outline, which shares the security concepts on which certification candidates will be evaluated, including:
Those who earn the ISC² Certified in Cybersecurity demonstrate to employers that they have the foundational knowledge, skills and abilities necessary for an entry-level cybersecurity role.
Cohort Sessions Are:
October 4, 8:00 - noon pm EST on Ethical Hacking and Security Principles - (at 3T23)
October 11, 6:00 - 7:00 pm CST on BC, DR, and Incident Response (virtual)
October 18, 6:00 - 7:00 pm CST on Access Controls (virtual)
October 25, 6:00 - 7:00 pm CST on Network Security (virtual)
November 7, 6:00 - 7:00 pm CST on Security Operations (virtual)
Speaker
Tuesday, October 3 - 8:00 am - 5:00 pm, and Wednesday, October 4 - 8:00 am - noon
The number and complexity of the critical situations that organizations confront are increasing. As a result, organizations must handle critical communications around such crises as part of an ongoing program rather than as a one-off ‘project.’ A changing media and social landscape amplifies this need. Mishandling crises can significantly and adversely impact an organization’s brand and reputation, ecosystem health, legal and compliance standing, and financial performance. Organizations must have a good preparation for, proper responses to, and effective follow-up after critical situations.
Critical communication situations in today’s digital enterprises span both IT and the business. Therefore, organizations require a single orchestrated capability ingrained in all people and teams, using a common framework and shared visibility of goals, tools, and practices. They must grasp the factors involved in managing crises and develop the capability to respond effectively. A structure for practice and training is essential, as the mere intellectual acceptance of the need for capability is insufficient. Organizations need to build capability into their ‘muscle memory’ to respond effectively to critical situations.
The Critical Communication Capability (CCC®) Framework provides business and IT professionals with a shared approach, a common language, and best-practice guidance for understanding and improving their capability to prepare for, respond to, and follow up on critical situations. The CCC qualification introduces business and IT professionals to intelligent, practical, orchestrated crisis communications. It supplies a unified model for what is needed, including terminology, indicators of capability, and best practices for improving skills and, ultimately, performance in critical situations.
Passing the CCC Foundation certification exam certifies that the candidate can describe the CCC principles, concepts, models, and terminology set out in this syllabus as a basis for applying them in practice.
This 1.5-day CCC Foundation course and certification exam are for business and IT leadership professionals who support and contribute to an organization’s preparation for, response to, and follow-up in the aftermath of critical situations.
At the end of this course, you should be able to:
Speaker
Tuesday, October 3 - 8:00 am - 5:00 pm
What makes an effective information cybersecurity program for any service management organization? This presentation is intended to promote: Awareness of the importance of the need for IT security in all environments, understanding of Cyber security risks, vulnerabilities, and corrective measures to keep clients' systems safe, and address what can be done now and in the future in the changing cybersecurity landscape.
This interactive discussion will focus on those information security risks facing all types of environments for organizations and how those risks can be identified and managed. Topics will include:
• How your data is vulnerable
• What you can lose through an information security breach
• Practical steps to protect your operations
• Transformations in Cybersecurity (futures/ChatGPT/AI)
• How to use information security vendors and consultants
• How to evaluate tools and techniques based on your needs
Speaker
The challenge many teams and organizations are coping with today is getting everyone moving in one direction. This program helps employees recognize the challenges of leaders, and help leaders understand the challenges facing employees.
By ensuring that everyone is moving as one team in one direction the level of commitment increases, turnover is reduced, and morale is boosted.
This session is fun, engaging, inspiring and thought provoking. A number of activities are utilized to demonstrate what happens when the team is moving in one direction.
ATTENDEE TAKE-AWAYS
- The concept of getting one team moving in one direction
- Recognize the importance of trust and that it flows in all directions
- How to maximize conflict to move the team forward and gain commitment
- The power of getting synchronized across departmental lines
- The ability to hold everyone accountable without fear of retribution
- Clarity that sharing knowledge is a powerful tool to the success of the team
Speaker
This training session delves into the intersection of Generative AI and cybersecurity, illustrating how these transformative technologies can be utilized to fortify both technical and management aspects of cybersecurity. The course explores foundational aspects of Generative AI, such as generative models and algorithms, and proceeds to outline their applications in cybersecurity, such as AI-driven risk assessment and mitigation strategies, malware identification, digital forensics, incident response planning, phishing prevention, and the role of Generative AI in crafting cyber policies and standards.
Attendees will learn to apply Generative AI approaches in the technical and strategic management of cybersecurity, focusing on enhancing organizational resilience and agility in the face of evolving cyber threats.
The training also addresses ethical and privacy considerations when implementing these powerful technologies in a security setting.
Designed for cybersecurity professionals and IT managers, this session offers a unique forward-looking perspective on leveraging AI in cybersecurity.
Speaker
This course introduces business leaders, ITSM professionals, and operational stakeholders to the fundamentals of digital business risks and the role of the “NIST Cybersecurity Framework for Improving Critical Infrastructure” (NIST-CSF) plays in helping organizations mitigate digital risk.
The course supports organizational compliance with the latest rules for Cybersecurity Risk Management published by the Securities and Exchange Commission on 07/26/2023 https://www.sec.gov/news/press-release/2023-139.
The course is based on the book “Fundamentals of Adopting the NIST Cybersecurity Framework,” and the companion 2-day Fundamentals certification course. This Awareness class is accredited by APMG International, certified in the UK by NCSC/GCHQ, and recognized in the USA by DHS-CISA.
The course covers:
Digital business evolution and the evolving threat landscape
Digital evolution, the digital mindset, the dynamic threat landscape
Digital evolution and the NIST-CSF
Workshop: Understand and identify digital business models
Digital business risk, cyber threats, and cybersecurity
Introduction to cyber risk as a business opportunity, not an IT problem
Workshop: Apply organizational perspectives to identify meaningful cyber risks.
Adopting and adapting the NIST-CSF to your context
Adopt is a governance decision; adapt fits the decision to organizational needs.
Chapter quiz
Workshop: Using the NIST-CSF to understand cyber risk responses.
Upon completion of the program, students will have the option to purchase a discounted training kit that includes the following (the website will be provided to the class):
The course is eligible for 8 CPE credits from ISACA and CompTIA.
Speaker
This one-day certification course is designed for IT professionals to gain an understanding of the Integrated IT Business Management™ model, which involves connecting multiple business processes into a single unified system.
The course covers the integration of IT service management processes (ITSM) among themselves, the integration of ITSM processes with enabling practices, and the integration of the IT organization with the rest of the business. It provides an overview of the common ITSM processes that organizations use to manage their IT services and the enablers that organizations use to support their ITSM processes. Attendees will learn how these practices can help organizations achieve their business goals and the typical metrics used to measure IT performance and business results. Upon completion, candidates will receive a certificate that demonstrates their foundational knowledge and understanding of integrated IT business management.
Speaker
Learn about job opportunities and concepts on Ethical Hacking and obtain (ISC)2 your Certified in Cybersecurity certification.
4 Hour Workshop on Ethical Hacking and Cybersecurity Principles.
Then for BUiLT members (anyone can join), pay $50 to attend the remaining 4 week on-line self-paced training and study group review sessions to obtain the ISC2 certified in cybersecurity certification.
Along with learning Ethical Hacking, the course provides a review of the subject matter published in the (ISC)² Certified in Cybersecurity exam outline, which shares the security concepts on which certification candidates will be evaluated, including:
Those who earn the (ISC)² Certified in Cybersecurity demonstrate to employers that they have the foundational knowledge, skills and abilities necessary for an entry-level cybersecurity role.
Cohort Sessions Are:
October 4, 8:00 - noon pm EST on Ethical Hacking and Security Principles -
October 11, 6:00 - 7:00 pm CST on BC, DR, and Incident Response
October 18, 6:00 - 7:00 pm CST on Access Controls
October 25, 6:00 - 7:00 pm CST on Network Security
November 7, 6:00 - 7:00 pm CST on Security Operations
This course offers a certification
Have you or your team ever over-promised and under-delivered because there wasn’t a clear understanding of a request? What makes a project different than any other type of request? How do you effectively deliver against expectations when you have no formal training in project management?
If your team is plagued by missed expectations and disappointed customers or if you would just like to build some structure around inject requests that come your way. This session is for you! Doug Rabold will share the central tenets of project management methodology, distilled into twelve easy steps that anyone can use to effectively meet – or exceed – customer expectations. Takeaways will include: 1) Awareness that inject requests can derail normal operational responsibilities 2) An understanding that any request can (and should) be treated as a project 3) A simple methodology that can be applied to all requests - regardless of size - to ensure expected deliverables are met
Did you know that 80 percent of your job performance is linked to emotional intelligence?
At the end of an engaging session, attendees will be able to:
Speaker
This powerful and interactive program is the foundation for all great leaders and focuses on the following key elements:
• General leadership skills
• An overview of behavioral styles and how to lead teams and individuals
• How to hold effective team meetings – including brief huddle meetings
• Fundamentals of decision-making
• The science of communication, including listening in three primary mediums; in-person, voice, and electronically
• Listening empathetically to the needs of followers, while continually serving customers, vendors, and other stakeholders
• Strategies for working with difficult, or different, people
• Techniques to recognize and work through unhealthy conflict
• The power behind setting individual and team goals
• Systems for holding followers accountable to their goals and developing future leaders
• The fundamentals of, and how to work through, change
• Strategies for basic project management
• Simple methods for motivating others
Speaker
In this half-day workshop, with content taken from Pink Elephant’s three-day certification course, Integrated IT Service Management Essentials George will describe what it means to use an “integrated” approach to IT service management and how it enables business value. Followed by a review of what is ‘system thinking”, what ‘process management’ really means, and what are the nine specific components that should be considered for every process. George then takes a deep dive into the process of business relationship management (BRM) and reviews: why this is a key and essential IT service management process for all IT organizations; what are the nine important components of BRM; the key role of business relationship manager; lessons learned about implementing and managing BRM in the real world.
Speaker
Tuesday, October 3 - 1:00 pm - 5:00 pm
This course introduces business leaders, ITSM professionals, and operational stakeholders to the fundamentals of digital business risks and the role of the “NIST Cybersecurity Framework for Improving Critical Infrastructure” (NIST-CSF) plays in helping organizations mitigate digital risk.
We all start somewhere in our cyber careers and growing technical skills is a big part of advancing in the field. In this training we will cover essential tools and techniques along with practical examples of how to use them. We will wrap up the session with a mini cyber challenge to test those skills the participants acquired during the workshop.
Participants will be provided access to an online learning platform that can be used after the training.
Agenda:
Speaker
The number and complexity of the critical situations that organizations confront are increasing. As a result, organizations must handle critical communications around such crises as part of an ongoing program rather than as a one-off ‘project.’ A changing media and social landscape amplifies this need. Mishandling crises can significantly and adversely impact an organization’s brand and reputation, ecosystem health, legal and compliance standing, and financial performance. Organizations must have a good preparation for, proper responses to, and effective follow-up after critical situations.
Critical communication situations in today’s digital enterprises span both IT and the business. Therefore, organizations require a single orchestrated capability ingrained in all people and teams, using a common framework and shared visibility of goals, tools, and practices. They must grasp the factors involved in managing crises and develop the capability to respond effectively. A structure for practice and training is essential, as the mere intellectual acceptance of the need for capability is insufficient. Organizations need to build capability into their ‘muscle memory’ to respond effectively to critical situations.
The Critical Communication Capability (CCC®) Framework provides business and IT professionals with a shared approach, a common language, and best-practice guidance for understanding and improving their capability to prepare for, respond to, and follow up on critical situations. The CCC qualification introduces business and IT professionals to intelligent, practical, orchestrated crisis communications. It supplies a unified model for what is needed, including terminology, indicators of capability, and best practices for improving skills and, ultimately, performance in critical situations.
Passing the CCC Foundation certification exam certifies that the candidate can describe the CCC principles, concepts, models, and terminology set out in this syllabus as a basis for applying them in practice.
This 1.5-day CCC Foundation course and certification exam are for business and IT leadership professionals who support and contribute to an organization’s preparation for, response to, and follow-up in the aftermath of critical situations.
At the end of this course, you should be able to:
Speaker
Service Portals average adoption rates of around 30% and offer the lowest customer satisfaction of any support channel.
This program trains and prepares professionals to design effective service portals and service request catalogs. It provides an understanding of structuring services for offer and how to create a digital experience that fits with a modern-day customer experience for digital support. It achieves this by focusing on the employee and customer experience and offering training on designing a complete and holistic experience.
Students will learn:
Target Audience:
This course is designed for IT, HR, Facilities, and other service providers.
Speaker