Hi [[ session.user.profile.firstName ]]

(ISC)2 From the Trenches

  • Date
  • Rating
  • Views
  • Be Vewy, Vewy Quiet... I'm Hunting Threats! Finding & Dealing with Threats
    Be Vewy, Vewy Quiet... I'm Hunting Threats! Finding & Dealing with Threats
    Lance Cottrell; Dominique Kilman; Aamir Lakhani; Brandon Dunlap Recorded: Jan 26 2017 60 mins
    Threats. They are everywhere and one of those things that keep security practitioners awake at night. However, the exposure to and damage from the myriad threats out there can be mitigated via a number of steps. These include threat hunting and detection, investigation and timely and effective response. If your security is synchronized it can help to reduce the response times and the resources that are used. Join (ISC)2 and our sponsor Sophos for our first From the Trenches webcast of 2017 on January 26, 2017 at 1:00PM Eastern for a discussion about threats and how to cut the time in detecting and responding to them.
  • GDPR - Brexit Means More Changes
    GDPR - Brexit Means More Changes
    Darrin Reynolds, Reynolds Privacy; Graham Jackson, General Counsel, (ISC)2; Harvey Nusz, CISO, 4IT Security Recorded: Jul 28 2016 59 mins
    The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
  • The Need for Speed: Hitting The Afterburners on Detection and Investigation
    The Need for Speed: Hitting The Afterburners on Detection and Investigation
    John Carnes, Anthem; Terry Olaes; Rob Ayoub, IDC; Brandon Dunlap, Brightfly Recorded: Jun 30 2016 61 mins
    Detecting and investigating malicious or unintentional activity is a time consuming effort and an inefficient use of our limited resources. All too frequently, we discover something is amiss and realize that problem has existed for a long time, yet it's just come to your attention. How can an organization increase the speed of detection of malicious activity? Can detection and investigation processes benefit from "hitting the afterburners"? Join RSA Security and (ISC)2 on June 30, 2016 at 1:00PM Eastern for a discussion on detection and investigation visibility and what to leverage to make threat detection effective.
  • CISO Impact: Lighting the Path to Leadership
    CISO Impact: Lighting the Path to Leadership
    Stan Dolberg, Chief Research Officer, IANS Brandon Dunlap, Director of Research, Brightfly Recorded: May 12 2016 62 mins
    New challenges demand new approaches: IANS lights the path to CISO leadership with in-depth research and innovative models based on how top-performing CISOs earn a seat at the table. Join (ISC)2 and IANS on May 12, 2016 at 1:00PM Eastern as IANS presents research findings from the '7 Factors of CISO Impact' to life and illustrate how advanced CISOs and teams have progressed from Foundational, to Transitional, to Executive status with their programs and teams.
  • Backup and Running: Strengthening Your Data Security Strategy
    Backup and Running: Strengthening Your Data Security Strategy
    Raj Goel, Brainlink; Keith Young, Enterprise InfoSecurityOfficer, Montgomery; Darrin Reynolds; Brandon Dunlap-Moderator Recorded: Mar 31 2016 57 mins
    In today's multi-device, mobile world, securing corporate data is of the utmost concern for the enterprise. But restricting data flow and access is simply not aligned to the business requirements of the workforce. So how can the enterprise protect its data from external (and internal) threats without prohibiting productivity for its knowledge workers? Join Code42 and (ISC)2 on World Backup Day, March 31, 2016 at 1:00PM EST for a discussion on how to leverage endpoint backup as a core component of your data security strategy and achieve additional security benefits.
  • Continuing the Conversation - Contracts and Indemnification
    Continuing the Conversation - Contracts and Indemnification
    Darrin Reynolds, Owner, Reynolds Privacy; Graham Jackson, General Counsel, (ISC)2, Raj Goel, CTO, Brainlink, Brandon Dunlap Recorded: Jan 14 2016 59 mins
    Last month, we talked about cloud providers and agreements with them and how users can go rogue and establish their own agreements for services. While this is an issue for organizations, contracts with 3rd parties and other suppliers are a necessary evil and cause headaches and heartburn for infosecurity departments. Being risk adverse by nature, security practitioners want to make sure that contracts and Service Level Agreements are comprehensive and address all their concerns. Enter the legal department. To navigate through all of this, security practitioners and their legal teams need to work hand-in-hand to get the best terms and coverage they feel they need. What's the best way to do this? Join (ISC)2 on January 14, 2016 at 1:00PM Eastern for our first From the Trenches webcast of 2016 where we talk about contracts, SLAs, indemnification and working with legal departments to get the agreements you need.
  • Continuing the Conversation: Healthcare Security
    Continuing the Conversation: Healthcare Security
    John Carnes, Anthem, Brain Rappach, TriHealth, Ray Potter, SafeLogic; Brandon Dunlap, Brightfly Recorded: Dec 15 2015 61 mins
    In last month's webcast, we took a look at Leveraging the Cloud for Healthcare Security (https://www.brighttalk.com/channel/13161). This month, we'll continue the conversation as we get more in-depth about preventing breaches, the use of encryption, HIPAA compliance and Electronic Healthcare Records (EHRs). Join (ISC)2 for our next "From the Trenches" webcast December 15, 2015 at 1:00PM sponsored by Sophos as we delve further into important healthcare security issues.
  • End-Users: The Wildcard in Placing Your Data in Cloud
    End-Users: The Wildcard in Placing Your Data in Cloud
    Darrin Reynolds; Raj Goel, CTO, Brainlink; Mike Webb, SmartVault; Brandon Dunlap Recorded: Nov 24 2015 58 mins
    While compliance frameworks and corporate edicts are well and good, many companies are seeing their intellectual property and other sensitive information being placed in the cloud....all without the knowledge of the security team. Well meaning employees buy cloud services from their credit cards and create shadow IT infrastructures then access and store corporate data there. What can a company do to mitigate this practice, but also focus on the discovery and identification of what data is already in the cloud, as well as maintaining visibility and control of that data moving forward. Join Symantec and (ISC)2 on November 24, 2015 at 1:00PM Eastern for a discussion on Cloud, Compliance and end users who do the wrong thing (for the right reasons).
  • Leveraging the Cloud for Healthcare Security
    Leveraging the Cloud for Healthcare Security
    John Carnes, Anthem, Brain Rappach, TriHealth, Dennis Seymour, Brandon Dunlap, Brightfly Recorded: Oct 29 2015 62 mins
    More and more healthcare providers are adopting a cloud strategy to store information and take advantage of the technology. But there's much to be concerned about. From HIPAA concerns to mobile device management to securing new cloud applications, security practitioners in the healthcare space have a great deal to concern themselves with. Join Symantec and (ISC)2 on October 29, 2015 at 1:00PM for our next "From the Trenches" webcast focusing on these issues and more.
  • Professionalizing the Cloud Security Workforce
    Professionalizing the Cloud Security Workforce
    Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO, (ISC)² Recorded: Aug 20 2015 60 mins
    (ISC)² and CSA recently developed the Certified Cloud Security Professional (CCSP) credential to meet a critical market need to ensure that cloud security professionals have the required knowledge, skills and abilities to audit, assess and secure cloud infrastructures. Join Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO, (ISC)² on August 20, 2015 at 1:00PM Eastern to learn more about the CCSP, the qualifications for it and the future of cloud security.

Embed in website or blog