
Kim Cary
Chief Information Security Officer,
Pepperdine University
OUTCOMES: Discover how to devise an action plan for operational, network, and endpoint security * Learn how to detect, assess, and remediate security risks * Learn how to mount a better defense against malware