Loading Events
This event has passed.

The 22nd annual Volunteer Leadership Institute-Hawaii is the credit union industry’s premier conference and draws nationally acclaimed speakers. The Institute allows Volunteers to enhance their ability to make strategic, effective decisions and create governance processes to lead effectively. Networking opportunities are abundant and the location isn’t bad either!




Cybercriminals are taking hacking to the next level, by leveraging ever-more-sophisticated toolsets and increasingly mature techniques. Professional hackers around the world target YOU in attempts to gain access to confidential information, bank accounts, and other valuable data. Over the next year, we expect to see more dangerous types of cyber extortion, where criminals demand ransom payments not just from the hacked organization, but also customers, vendors and employees. Business email compromise is another critical threat, as organized crime groups use increasingly sophisticated tactics to mine data from your email and leverage it for financial gain.  In this fast-paced talk, we’ll cover these and other high-risk developments in the cybercriminal underground.  Learn about the top threats and ways that you can protect yourself, your customers and your organization.

Learning Objectives:

  • Understand the threats and vulnerabilities that lead to cybersecurity breaches.
  • Learn about the “hacker economy” and how criminals monetize data.
  • Learn strategies for protecting both your organization and members from attacks.
  • Know the 9 Building Blocks of an effective cybersecurity program.


Karen Sprenger – COO, LMG Security

Karen Sprenger is the Chief Operating Officer at LMG Security and is primarily responsible for overseeing day-to-day operations and project management, as well as speaking about cybersecurity throughout the country. She has over 25 years of experience in information technology, most recently serving as Director of Technology for Billings Public Schools, where she was responsible for securing and supporting 18,000 users, 8,500 computers, 5,000 mobile devices, 2,000 telephones, 50 miles of network and 1 very temperamental vending machine. A true geek, she considers “Digital Forensics” a perfectly acceptable answer to the question, “But what do you do for fun?”. Karen is a GIAC-Certified forensics examiner (GCFE) and Certified Information Systems Security Professional (CISSP).