Resources and information to help you further your InfoSec career
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security.
- Post Security jobs
- Set up and manage your resume to get found by security employers & recruiters
- Security training & certification offers
- Security resources, including reports, white papers & toolkits.
This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after.
InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more
If your processing and data is in the cloud, how can you deliver assurance, compliance and governance? How do you find the flaws and soft spots that criminals will exploit? From browser to database, through human factors and end points, this presentation will take a threat-based approach to securing the cloud.
Bitcoin is all the rage right now. But many question the security behind this popular cryptocurrency.
Join this session where Anupam's agenda will include:
-Anonymity Vs. Pseudonymity
-Bitcoin working mechanics and cryptography involved
-Transaction conduct and types
-Wallets and types
The South West Regional Cyber Crime Unit are involved in fighting cyber crime along with other national and international law enforcement agencies.
As such they see certain traits, methodologies and vulnerabilities over and over again. Lisa Forte, the Cyber Protect Officer for the Unit, will be explaining how businesses should adapt their thinking to "see what the hackers see" to better defend themselves against the threat she sees every day.
Lisa will also be talking about the importance of planning and war gaming out cyber attack scenarios. The businesses that have a plan are the businesses that survive to tell the tale. Lisa will be using real life cases that the Cyber Crime Unit have dealt with to highlight how quickly things can go wrong as well as providing some simple steps businesses can apply to reduce their vulnerability.
Lisa Forte is the Cyber Protection Officer for the South West Police Cyber Crime Unit. Her role involves helping businesses of all shapes and sizes defend against the ever growing cyber threat. Prior to working in the Cyber Crime Unit Lisa worked in intelligence for Counter Terrorism agencies in the UK.
Join this interactive webinar presentation with Bart Parys, Threat Intelligence Analyst at PwC to learn more about:
- The history of ransomware
- How it came to be, how it works and its purpose
- How you can protect yourself and your organisation from this threat.
This presentation will focus not only on technology, but also the human factor in ransomware protection.
About the Presenter
Bart is a lead researcher in PwC's cyber threat intelligence team, responsible for tracking cyber threat actors, their latest toolsets and methodologies. He has particular familiarity with ransomware, crimeware and any other malware and malware analysis in general.
2017 was a bumper year for Ransomware; with WannaCry & notPetya grabbing headlines around the world and instilling fear in the hearts of security professionals around the globe.
With GDPR regulations on the horizon and potentially huge fines for badly protected and breached data, security professionals need to improve their defensive stature and ensure that their organisation's data is fully protected from end to end.
This roundtable discussion will discuss how to best protect your data so if it falls into the wrong hands, you won't end up on the front of the worlds' papers!
Topics for discussion:
- Why ransomware should still be top of your list of concerns in 2018
- Methods to protect your organisation's sensitive data
- Steps to take if your organisation does suffer a damaging breach
There are many challenges for data privacy legislation within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem seems to constantly be playing catch-up.
This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz),
Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.
During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.
Healthcare industry would be one of the major adopters of IoT. What are the security challenges of healthcare industry? How does IoT change the security equation in healthcare?
Minatee leads the Security Center of Excellence (ScoE) in Philips HealthTech and has been instrumental in setting up the SCoE within Philips. The SCoE , which is a central organization responsible for doing cutting edge work in the field of security testing, doing secure code analysis , finding the vulnerable components within the software and more. Minatee has been in the field of software for 18 years right from designing and architecting systems to securing in systems, She has a bachelors in electrical engineering from NIT and Masters from IIT Kharagpur. She holds CISSP, GCIH, CEH certifications. She has been a speaker at various forums/conferences like RSA, RISC, NullCon, BPM etc.
"Prepare, Respond, Assess" … "Prevent, Detect, Respond" … Security professionals are awash in a myriad of buzzwords triads and theoretical frameworks.
Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
We are excited to bring you an updated version of our hugely popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next". Traditional ransomware, for the want of a better word, is boring and truthfully a fairly opportunistic way to make money. Guess what, criminal gangs don't believe in opportunistic attacks that may make them money. They want a certain assurance of success and importantly, they want big bucks.
Modern ransomware is going to be able to deliver this and more to anyone who can pay top dollar.
Join global CISO and cybersecurity expert, Amar Singh, as he shares his insights and experience on the murky world of cyber crime and ransomware and how you can be better prepared to manage this growing threat.