
Kim Cary
Chief Information Security Officer,
Pepperdine University
OUTCOMES: Understand strategies for organizing security projects that you can adapt to your institutional culture and resources * Engage in evaluation of tactics for deployment of security controls in a minimally disruptive manner