Resources and information to help you further your InfoSec career
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security.
- Post Security jobs
- Set up and manage your resume to get found by security employers & recruiters
- Security training & certification offers
- Security resources, including reports, white papers & toolkits.
This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after.
InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more
Nope this is NOT another webinar on How to Protect Against Ransomware blah blah blah.
If you reckon that users (yes that includes you and me) are the first line of defence against ransomware! Sorry to break it to you but you are WRONG! We are all humans and we make mistakes and ransomware creators know that.
You have a choice.Hope and or pray that your awareness training protects your employees and your business from becoming a ransomware victim OR attend this webinar and learn what you can do to protect your business.
Note: This is not your typical webinar. Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
Data-driven security is the future, but alarm fatigue and data overload continue to hold Security Operations teams back. Fortunately, there are some easy ways to organise and correlate data so you can simplify the threat hunting process and free up your resources to better detect, respond and neutralise advanced threats.
In this webcast, Greg Foss, Security Architect at LogRhythm, and Chris Berninger, Senior Systems Engineer at Carbon Black, discuss how to proactively search for and detect threats in your network.
• To use endpoint data to gain visibility into your network and understand what’s really going on in your network
• How LogRhythm SmartResponse can help orchestrate security operations
• Threat hunting techniques using Carbon Black within LogRhythm
Register now to discover how to use insights from endpoint data to best protect your organisation from advanced attacks.
BrightTALK caught up with Chenxi Wang, Founder of The Jane Project and Twistlock's Chief Strategy Officer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The Yahoo Breach and some of her suspected reasons why
- The influence of the supposed Russian US election hack and what it means for cyber warfare
- Diversity in the cyber industry and how it can be improved
- AI & Machine learning and use cases for security
- The key vulnerabilities in IoT networks that we should be thinking about
BrightTALK caught up with vArmour's Chief Strategist, Mark Weatherford for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The rise of Ransomware and where companies are more vulnerable
- DDoS and why it's still a key threat to businesses
- The increased vulnerability of the IoT
- Challenges for Donald Trump and his new cyber team
- How to boost equality and diversity in the information security industry
- How cloud and virtualization are changing the security game
About the Speaker:
Mark Weatherford is Chief Cybersecurity Strategist at vArmour, the data center and cloud security company. He was formerly a Principal at the Chertoff Group, was Deputy Under Secretary for Cybersecurity at DHS, was Chief Security Officer at the North American Electric Reliability Corporation (NERC) and was the CISO for the states of California and Colorado. He also served as a cryptologic officer in the US Navy. Weatherford is a Director on the Boards of Coalfire, the Center for Cyber and Homeland Security (CCHS) at the George Washington University, and the National Cybersecurity Center (NCC) in Colorado Springs. He is also on the Advisory Board at both Cylance and AlertEnterprise.
Europe’s General Data Protection Regulation (GDPR) will come into effect on 25th May 2018, leaving all organisations that process the data of EU residents with less than 18 months to meet the stringent requirements of the regulation. Organisations must implement a cloud security strategy that supports compliance and minimises their organisation’s exposure to the new breach notification requirements and financial penalties, as high as 20 million Euros or 4% of total annual turnover.
Still figuring out how your organisation is going to comply? What actionable steps you should be taking today? Look no further. Join Oliver Pinson-Roxburgh, EMEA Technical Director from Alert Logic for an in-depth discussion about GDPR, highlights include:
- Cutting through the ambiguity and focusing on the key cloud security considerations
- Data breach responsibilities and what that means to your organisation
- What is the role and expectation of your cloud provider when it comes to GDPR
- Insight into real-life case studies
Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
Learn how intelligence-led organizations globally apply threat intelligence to prioritize vulnerability patching, accelerate incident response, reveal strategic risks and plan cyber security investments.
Amongst other things this webinar will provide insight into:
1. Importance of visibility over an entire attack lifecycle
2. How NATO military doctrine for intelligence collection & analysis can be applied in a commercial environment
3. Key Threat Hunting skills and requirements
As the scale and sophistication of cyber attacks increases, businesses need to manage risk in ways beyond those traditionally handled by the information security function.
In this webinar, Steve Durbin, Managing Director, ISF will offer insights into how security and business teams across the organisation can work together to minimise the impact of cyber attacks on shareholder value and business reputation.
Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally by 2021, up from $3 trillion in 2015. Every industry and government is at risk, highlighting the need for stronger cyber defence.
This live panel will focus on the tools and techniques threat hunters use to patrol your networks, mitigate threats and remove unwanted presence.
For the Threat Hunters in Action series, this webinar presents a guide to how social engineering forms a large part of insider threats within organisations.
Learn how insider threats are created and manipulated by external parties as well as how organisations help create their own insider threats through cultural and behavioural factors.
The webinar will give advice on how to spot individuals "within the family" who may have malicious intentions towards the business, and gives advice on how to manage the problem within an organisation.
New threats and new defenses constantly challenge the rules for managing security across third party cloud services. In this webcast, you will learn 7 strategies for how to structure and adapt the complex commercial agreements to assure both vendors and customers new risks are being controlled.
The snowballing complexity of the business and technology risks, introduction of new regulations and ever increasing compliance requirements have made it vital for every enterprise to set up a proficient Governance, Risk and Compliance (GRC) framework.
This webinar will emphasise on the essential GRC elements that organizations must adopt in order to protection business critical assets and exploit new opportunities with confidence.