Hi [[ session.user.profile.firstName ]]

(ISC)² Secure Webinars - EMEA

  • Date
  • Rating
  • Views
  • How Attackers Exploit Office 365 Vulnerabilities
    How Attackers Exploit Office 365 Vulnerabilities
    Liam Cleary, Microsoft MVP, CEO, SharePlicity, Dan Goater, Solutions Engineer, Netwrix, Brandon Dunlap, Moderator, (ISC)² Recorded: Jun 11 2019 62 mins
    Office 365 has become the platform of choice for document collaboration and sharing. If you’re using Microsoft Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative.

    Discover how to:

    - Simulate common Office 365 attacks
    - Test and educate your end users
    - Spot attacks in their early stages
  • Fight the Good Fight Against the Bad Bots
    Fight the Good Fight Against the Bad Bots
    David Warburton, Senior Threat Research Evangelist, F5 Networks, Brandon Dunlap, Moderator, (ISC)² Recorded: Jun 4 2019 60 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:

    • How bots infect, propagate, and attack applications
    • What types of application attacks are commonly performed by bots
    • How you can defend against bad bots without disrupting the good ones
  • Real Phish Remain the Real Problem
    Real Phish Remain the Real Problem
    Mollie MacDougall, Threat Intelligence Manager, David Mount, Product Marketing, Cofense, Brandon Dunlap, Moderator, (ISC)² Recorded: May 28 2019 59 mins
    Despite investment in next-gen technologies and employee awareness training, phishing threats continue to become more sophisticated and more effective. It’s time for organisations to accept that REAL phish are the REAL problem. Join the Cofense Phishing Threat Landscape review to discover the trends defining phishing in 2019 and priorities for defending your organisation going forward.
    Attend this webinar to learn how attackers are:
    •Using major malware types and their innovative tactics, techniques, and procedures
    •Intensifying credential theft as organizations move infrastructure and applications to the cloud
    •Evolving Emotet and the threat actors behind the botnet
    •Increasing proliferation of sextortion phishing emails

    We’ll examine the obvious changes in the phishing threat landscape, plus look ahead at trends shaping 2019.
  • A Day in the Life - Tips and Best Practices from 3 CISSPs
    A Day in the Life - Tips and Best Practices from 3 CISSPs
    James Packer, CISSP, London; Chuan-Wei Hoo, CISSP, Singapore; James R. McQuiggan, CISSP, United States; B. Dunlap (Moderator) Recorded: May 21 2019 60 mins
    More than 130,000 information security professionals have invested time, determination and resources to attain the CISSP certification. Join (ISC)² members from different regions on May 21, 2019 at 10:00AM Eastern as we discuss what pain points, issues and challenges they encounter in their day-to-day work life, as well as solutions, tips and best practices they have developed along the way. We’ll also examine how the CISSP certification has helped them with their job and career.
  • DNS as a Foundation Security Architecture for Digital Transformation
    DNS as a Foundation Security Architecture for Digital Transformation
    Lee Clark, System Engineer, Infoblox, Brandon Dunlap, Moderator, (ISC)² Recorded: May 21 2019 57 mins
    Today, your users directly access cloud applications from everywhere. Transformative technologies such as SD-WAN, IoT and the cloud are borderless and complicate security. Non-standard IoT devices using non-standard protocols are rapidly proliferating. And yet, securing your digital transformation doesn’t require a new tool.

    Instead, it takes a simple, scalable and integrated security solution that makes your existing security infrastructure smarter and more efficient. DNS is foundational to the Internet and IP-based communication. It is also the perfect foundation for security: simple to deploy, ubiquitous in networks, essential for connectivity and scalable to Internet size.

    Join this webinar to learn how using DNS as a foundational security architecture can:
    • Protect your brand by securing traditional networks and digital transformations
    • Reduce time and cost of defending your enterprise against threats
    • Detect and remediate problems automatically and provide data to the entire ecosystem
  • The Next Paradigm Shift – AI-Driven Cyber-Attacks
    The Next Paradigm Shift – AI-Driven Cyber-Attacks
    Max Heinemeyer, Director of Threat Hunting, Darktrace, Brandon Dunlap, Moderator, (ISC)² Recorded: May 14 2019 60 mins
    Every day, security professionals around the globe face advanced cyber-threats, ranging from opportunistic malware to targeted, human-driven attacks. As we enter a new era of AI attacks that are hyper-stealthy and self-masking, how can organizations adapt their defenses? Join Darktrace’s Director of Threat Hunting, Max Heinemeyer, as he shares expert insights on the future of AI-driven cyber-attacks and the need for AI that fights back.

    In this webinar, Max will:
    · Present three scenarios of advanced cyber-attacks
    · Illustrate how these sophisticated attacks can be supercharged with AI
    · Explore the critical importance of deploying AI to prepare for this paradigm shift in the threat landscape
  • CASB Fundamentals: How Leading Organisations Protect Sensitive Cloud Data
    CASB Fundamentals: How Leading Organisations Protect Sensitive Cloud Data
    Rich Campagna, Bitglass, Steve Armstrong, Bitglass, Brandon Dunlap, Moderator, (ISC)² Recorded: May 7 2019 59 mins
    As more organisations deploy cloud apps like Office 365, AWS, and Slack securing corporate data becomes a challenge. Cloud Access Security Brokers (CASBs) have emerged as the go-to solution for organisations that need end-to-end data security, from cloud to device. In fact, Gartner believes that by 2022, 60% of large enterprises will use a CASB to govern some cloud services.

    In this webinar, we'll explore:
    •Critical gaps in cloud applications that must be filled
    •The 4 pillars of CASB
    •What makes CASBs different from security solutions built natively into cloud apps like Office 365.
    •Case studies on how leading enterprises leverage CASB to secure their cloud footprint.

    Join us to learn how a CASB can help you meet your security and compliance requirements.
  • CISO Says with Abeer Khedr, Information Security Dir. at National Bank of Egypt
    CISO Says with Abeer Khedr, Information Security Dir. at National Bank of Egypt
    Abeer Khedr, InfoSec. Dir. at National Bank of Egypt, Brandon Dunlap, Moderator, (ISC)² Recorded: May 2 2019 56 mins
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format.

    In this session Abeer Khedr, Information Security Director at the National Bank of Egypt will provide insight into the path she took to become a Cybersecurity Leader and how she is reinventing the role in the face of accelerating industry change.
  • Top Tips on Combatting Today’s Active Attacker
    Top Tips on Combatting Today’s Active Attacker
    John Titmus, Director, EMEA Cyber Security Expert, CrowdStrike, Brandon Dunlap, Moderator, (ISC)² Recorded: Apr 23 2019 59 mins
    Key Trends, Predictions and the Need for Speed.

    This year’s CrowdStrike global threat report – Adversary Tradecraft and The Importance of Speed – is one of the industry’s most comprehensive reports on today’s leading cyber threats. It combines CrowdStrike’s comprehensive global observations with real-world case studies, delivering deep insights on modern adversaries and their tactics, techniques and procedures (TTPs).

    Join us for a webcast featuring CrowdStrike’s John Titmus as he explores the global trends and observations the report reveals.

    -Learn from real-world examples of how cybercriminals combine advanced, targeted attack techniques with ransomware to cause massive financial loss
    -Gain insight into global ‘breakout time’ metrics and achieving the “1-10-60” rule to defeat adversaries and prevent a mega-breach
    -Prepare for the now: discover the favourite TTPs seen over the last 12 months to predict what you should expect to see in 2019
  • Understanding Security Performance with Peer Analytics
    Understanding Security Performance with Peer Analytics
    Miguel Pinto, Senior Product Manager at BitSight, Brandon Dunlap, Moderator, (ISC)² EMEA Recorded: Apr 9 2019 47 mins
    BitSight’s Peer Analytics allows organisations to understand their security programme performance at a more granular level, providing visibility to develop achievable improvement plans, allocate resources appropriately & consistently measure outcomes.

    In this session you will learn how to:
    • Determine the level of security performance that your company should attain to be ‘best-in-class’
    • Profile organisations for communication and benchmarking purposes.
    • Understand how specific risk vectors drive security performance.
    • Determine the initial conditions for BitSight Forecasting

Embed in website or blog