Hi [[ session.user.profile.firstName ]]

(ISC)2 Security Briefings

  • Date
  • Rating
  • Views
  • Migrating to the Cloud Safely & Securely - Imperva Part 3
    Migrating to the Cloud Safely & Securely - Imperva Part 3
    Shawn Ryan, Sr. Product Marketing Manager, Imperva; Brandon Dunlap (Moderator) Recorded: May 23 2019 58 mins
    Data capture, storage, and usage continues to grow at exponential rates. As a result, and in an effort to obtain operational efficiencies, many new organizations are “born in the cloud”, while for others, the migration of data and data driven business processes to cloud environments continues to escalate rapidly. The use of third party database and related cloud service offerings to support cloud and hybrid environments is also growing and evolving. However, security teams consistently report concerns with respect to the lack visibility and oversight of their data in the cloud. Typical questions being asked by CISOs are complex and not easy to answer. Join Imperva and (ISC)2 on May, 23, 2019 at 1:00PM Eastern for an examination of these questions and how to address them effectively.
  • Gigamon #2: Application Visibility for Better Security Operations
    Gigamon #2: Application Visibility for Better Security Operations
    John Gudmundson, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator) Recorded: May 2 2019 60 mins
    Securing your infrastructure can sometimes feel like navigating a ship at night in a storm, with pirates attacking. An occasional flash of lightning allows a quick glimpse of the intruders, but you never really know when or from where the next attack is coming. What if you could illuminate the best path forward? A centralized platform gives you a single window with pervasive visibility into all network traffic – both north-south and east-west which allows improvement to the effectiveness and efficiency of all your security tools and better manage SSL decryption as well as NetFlow generation. Join Gigamon and (ISC)2 on May 2, 2019 at 1:00PM for a discussion on how to discover applications on your network you didn’t know where there, spotting potential security vulnerabilities before they become a problem and see a live demo of how you can optimize security and network performance.
  • Buying Down Risk in the New World of App Development - Imperva Part 2
    Buying Down Risk in the New World of App Development - Imperva Part 2
    Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator) Recorded: Apr 25 2019 47 mins
    In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
  • Chronicle #1: How Backstory Can Help Organizations Rethink Enterprise Security
    Chronicle #1: How Backstory Can Help Organizations Rethink Enterprise Security
    Mike Hom, Product Management, Chronicle; Brandon Dunlap (Moderator) Recorded: Apr 16 2019 63 mins
    Today, most security teams struggle to identify and locate threats in their networks. Without the ability to find the bad actors in the network, security teams are unable to be effective in their roles. Organizations need tools to link intelligence about threats in the wild, threats in your network, and understand unique signals from both. In this webcast, we’ll examine the latest trends and downfalls in this space, and how Chronicle, an Alphabet company, is looking to solve them at a global scale with a focus on speed and efficacy. We’ll also have a demo of the Chronicle security platform, Backstory and how it can help streamline your security.
  • Gigamon #1: Network Upgrades Giving You Security Headaches?
    Gigamon #1: Network Upgrades Giving You Security Headaches?
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator) Recorded: Apr 4 2019 58 mins
    As the insatiable demand for bandwidth drives the need for faster networks, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB. Join Gigamon and (ISC)2 on April 4, 2019 at 1:00PM Eastern as we discuss how to solve the security headaches that go with these network upgrades and new architectures that strengthen your security posture, simplify IT and reduce costs. We’ll also discuss how to increase your security ROI, reduce your security risk and improve threat response.
  • Best Practices for Mitigating Data Breach Risk - Imperva Part 1
    Best Practices for Mitigating Data Breach Risk - Imperva Part 1
    Sara Pan, Sr. Prod Mktg Mgr, Imperva; Brandon Dunlap (Moderator) Recorded: Mar 28 2019 57 mins
    Data breach(es) remains atop the list of any CISO’s main concern. With the exponential growth of users, apps, and data, that leads to more and more legitimate data access, the attack surface expands making it harder to determine whether a data access is appropriate. Many organizations rely on traditional perimeter-based security approach, but they’re still getting breached. Additionally, trying to constrain and control the interactions between users and data by locking down usage can not only slow down business, but also frustrate users. Due to this, they may decide to work around you, creating an even bigger risk for your company. Join Imperva and (ISC)2 on March 28, 2019 at 1:00PM Eastern to learn about some best practices to mitigate data breach risk without decelerating your business growth.
  • Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Infoblox #3: DNS….. One of the Best Weapons for Securing Networks?
    Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap Recorded: Mar 21 2019 60 mins
    Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
  • ExtraHop #3: How to Succeed at Threat Hunting & IR: Think Differently about Data
    ExtraHop #3: How to Succeed at Threat Hunting & IR: Think Differently about Data
    Matt Cauthorn, VP of Cyber Security Engineering, ExtraHop; Brandon Dunlap, Moderato Recorded: Mar 12 2019 59 mins
    Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas. This webcast will examine threat hunting and incident response and how network traffic analysis can make Tier 1 and Tier 3 analysts faster and more effective at validating, investigating, and responding to threats and security incidents
  • ExtraHop #2: Case Study: Proactive Security Hygiene in a Hybrid Enterprise
    ExtraHop #2: Case Study: Proactive Security Hygiene in a Hybrid Enterprise
    Mike Sheward, Senior Director of Information Security, Accolade; Brandon Dunlap, Moderator Recorded: Feb 14 2019 56 mins
    Ever wonder how network traffic analysis (NTA) can reduce and harden an organization’s attack surface? In this webcast, the Director of Information Security at Accolade present a case study on how they use NTA to audit their security hygiene in real time, assuring that current standards for handling regulated data are being followed, and that all apps, services, and devices follow established security protocols to proactively reduce the chances of a data breach.
  • ExtraHop #1: Getting More Value from SecOps Frameworks
    ExtraHop #1: Getting More Value from SecOps Frameworks
    John Matthews, CIO, ExtraHop, Brandon Dunlap (Moderator) Recorded: Feb 12 2019 53 mins
    Attack and Control frameworks provided by such organizations like NIST, CIS and MITRE can help enterprises to improve, understand their capabilities and build better security. Join ExtraHop and (ISC)2 for a webcast on how to leverage these frameworks to better understand how network traffic analysis can provide the visibility and actionable insights to accelerate an enterprise's success at increasing security maturity.

Embed in website or blog