John McCumber, Director of Cybersecurity Advocacy, North America, (ISC)2
The 2018 (ISC)² Cybersecurity Workforce Study finds the cybersecurity skills shortage continues to grow. But the news isn’t all doom and gloom. Our latest deep dive into the issues and challenges facing cybersecurity professionals adopts a new approach to more broadly define the cybersecurity workforce. The study reveals a relatively satisfied, younger and more diverse field of practitioners focused on developing their skills and advancing their careers. Join (ISC)² Director of Cybersecurity Advocacy, North America, John McCumber On November 20, 2018 at 1:00PM Eastern as we examine how practitioners are dealing with the workforce gap while balancing skills development, hiring priorities and everyday threats they face.
Justin Kohler, Sen Dir, Customer Success, Gigamon; Patrick Perry, Technical Acct Mgr, Gigamon Insight; Brandon DunlapRecorded: Nov 1 201857 mins
Someone in leadership always seems to ask the question “How can I tie my threat hunting activities to real impacts for the organization?” Threat hunting programs are encouraged as part of a mature and successful incident response capability and teams invest significant time and effort in the development and maintenance of that program. However, management is always looking for metrics to demonstrate the value of threat hunting in real terms due to the number of hours consumed by such highly skilled professionals. It’s a big investment. Join Gigamon on November 1, 2018 at 1:00PM Eastern for an examination of how to demonstrate value from threat hunting operations with practical methods and examples for tracking hunting operations, reporting and attributing outcomes to industry-leading frameworks and plot hunting goals and coverage across the MITRE ATT&CK framework.
Sam Kumarsamy, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator)Recorded: Oct 18 201860 mins
As your infrastructure has grown to include a mix of physical, virtual and cloud environments with increased network speeds and volume of data, so have the threats increased to your attack surface with more vectors to breach your organization. This challenges your network and security operation teams and tour traditional network packet broker needs to evolve from providing network visibility to also helping strengthen your security posture. Join Gigamon and (ISC)2 on October 18, 2018 at 1:00PM Eastern where we will examine the acquisition and aggregation of data from your physical, virtual and cloud infrastructure, filtering of traffic to provide the right data to the right tools, transforming your data with masking, header stripping and SSL decryption (TLS1.3) to ensure compliance, threat prioritization by providing context and bridging the gap between NetOps and SecOps.
Michael Gardinar, Principal Architect, Enterprise & Cybersecurity CTO Office, Gemalto; Brandon Dunlap (Moderator)Recorded: Sep 18 201843 mins
We’ve all heard that quantum computers are coming; beyond being a boon for materials science they’re going to wreak havoc for cybersecurity. Part 3 of this series from Gemlato will outline the scope of the problem (it’s more than just algorithms) as well as the work required and being done to protect data through the upcoming transition.
Perry Carpenter, Chief Evangelist & Strategy Officer, KnowBe4; Brandon Dunlap (Moderator)Recorded: Sep 7 201861 mins
With 91% of data breaches being the result of human error, security leaders, auditors, and regulators increasingly recognize that a more intentional focus on the human side of security is critical to the protection of organizations. However, organizations have been struggling with and debating the effectiveness of traditional security awareness and training. KnowBe4 shares results-focused strategies and practical insights on how to build a world-class program
Perry Carpenter, Chief Evangelist & Strategy Officer, KnowBe4; Brandon Dunlap (Moderator)Recorded: Sep 6 201859 mins
In spite of all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. Successful hackers know the user is the weakest link in the security chain. Email phishing campaigns have proven to be the path of least resistance to get unsuspecting individuals to download and install their malicious software. Getting users to identify phishing attacks and training them not to click on links in email messages is not a trivial task. Join KnowBe4 as we discuss the strategies and techniques that social engineers are finding success with, how to implement these techniques and to create real-world simulated phishing email to test your employees and see how phish-prone they really are.
Baseer Balazadeh Sr. Technical Marketing Engineer, Public Cloud, Gigamon; Brandon Dunlap (Moderator)Recorded: Sep 6 201844 mins
As organizations build out their infrastructure across public, private and hybrid platforms, security architects need to extend their enterprise security policies and protocols to all workloads, no matter where they reside. Still, security operations teams are challenged with proactively detecting threats, deviations from organizational policies and violations of industry and organizational compliance for mission-critical applications in the cloud. Why is that? Join Gigamon and (ISC)2 on September 6, 2018 at 1:00PM Eastern where we’ll explore ways to assure compliance and decrease time to detect threats in mission-critical applications, reduce risk by leveraging a common platform across your entire IT environment and ensuring SLAs are met by tightly integrating the public cloud provider’s APIs and critical cloud provider services to automatically detect changes in virtual private clouds and virtual networks.
Perry Carpenter, Chief Evangelist & Strategy Officer, KnowBe4; Brandon Dunlap (Moderator)Recorded: Sep 4 201863 mins
No matter how much security technology we purchase, we still face a fundamental security problem: people. People can be manipulated every day and in many ways; from the tactics used by car dealers, to sophisticated social engineering and online scams. Part 1 of KnowBe4’s 3 part series will This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding and how to ethically use these same levers when educating users.
Salim Hafid, Marketing Manager, Bitglass; Brandon Dunlap (Moderator)Recorded: Aug 9 201861 mins
The long tail of SaaS is growing rapidly. Today, thousands of unmanaged "Shadow IT" applications are used in every major enterprise around the globe and IT departments have little visibility or control over these rogue apps. While the challenge was first simply to secure major SaaS platforms like Office 365, the new reality is a “cloud and mobile-first world” where employees often use new applications that aren’t approved and put corporate data at risk. Join Bitglass and (ISC)2 on August 9, 2018 at 1PM Eastern for the final part of this Security Briefings series where we’ll discuss how leading organizations are evolving their security to solve these challenges, what organizations are prioritizing when evaluating a solution and how zero-day technologies built for a cloud-first world are able to identify, categorize, and secure unknown apps.
Alexander Hanway, Sr. Product Mrky Mgr, Data Protection, Gemalto; Andrea Middleton, Sen Sec. Prod Mgr. NetApp; Brandon DunlapRecorded: Aug 7 201856 mins
The General Data Protection Regulation (GDPR) is the biggest overhaul of EU data protection law in more than 20 years. It’s not simply another regulation. It’s about accountability and it’s reshaping how organizations view and interpret privacy. Join us as we uncover the regulation, define a new lens and perspective to address not only the GDPR, but other regulations which are sure to follow. Understand the ecosystem and seamless integrated security solutions necessary to address these key privacy challenges. Whether you are looking for insight, guidance, or solutions to privacy, join in on this journey with GDPR as a guide to understanding and addressing privacy in today’s organizations.
Mike Brannon, Dir, Infrastructure & Security, Nat'l Gypsum; Eric Fiterman, Consultant, Tyler Smith, IT Analyst, John DeereRecorded: Jul 24 201856 mins
(ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.