Hi [[ session.user.profile.firstName ]]

Cybercast by ITPG Secure Compliance

  • Date
  • Rating
  • Views
  • Build Your Cyber Budget for 2019: Part 1
    Build Your Cyber Budget for 2019: Part 1 Jerry Caponera, VP of Cyber Risk Strategy Recorded: Aug 16 2018 35 mins
    Choosing cyber vendors and balancing budgets can be a challenge. We want to help cut through the clutter and show how we build a cybersecurity budget and identify spending needs an organization needs to immediately address. This is a two-part webinar series where you will learn how to approach the cybersecurity budgeting process (as well as see common mistakes to avoid) and how to build your own cyber budget. We will offer a budget plan worksheet to guide you along the way and share best practices and takeaways.
  • Artificial Intelligence & Employee Security: Greasing the Wheels of Productivity
    Artificial Intelligence & Employee Security: Greasing the Wheels of Productivity Ehab Samy, VP Product Management, Plurilock Recorded: Aug 15 2018 32 mins
    Traditional security and authentication methods are designed to put up stumbling blocks for your employees, challenging them at several points throughout their workday to identify themselves. To do this they must enter, remember, and frequently change passwords, and in the expanding world of two- or multi-factor authentication the enterprise seeks greater security at the further expense of productivity. But traditional passwords and other authentication methods can be compromised, so the impact to your user processes does not always deliver proportional security.

    Artificial intelligence and biometrics can change the authentication game, supporting enhanced security by automatically identifying employee identity without impacting workflows and user processes. Join Ehab Samy, VP Product Management, to learn about applications of biometrics and Artificial Intelligence that smooth your employees’ path to completing any task at work.
  • Making Cybersecurity Matter to Business -  A conversation with Pete Herzog
    Making Cybersecurity Matter to Business - A conversation with Pete Herzog Pete Herzog, Managing Director at ISECOM Recorded: Jul 26 2018 55 mins
    In early 2000, the Open Source Security Testing Methodology Manual (OSSTMM) was released with the primary objective of improving how the enterprise conducted security testing. Key sections of this methodology include operational, human, physical, wireless, telecommunication, and data network security testing. Today, OSSTMM is widely regarded as a methodology for penetration testing world-wide, offering a standard approach to conducting security testing.

    Frank Shirmo of ITPG Secure Compliance, a Cyber Security Boutique in Northern Virginia will be joined by Pete Herzog, the creator of OSSTMM, to answer key questions, and provide clarifications on OSSTMM for CTOs, CISOs, CIOs, Security Engineers and Analysts, and all other stakeholders interested in the topic of security testing.
  • ISSA International Series: Trials & Tribulations of Social Engineering
    ISSA International Series: Trials & Tribulations of Social Engineering ISSA International Recorded: Jul 24 2018 121 mins
    We all know about social engineering and phishing; but ‘Is it as simple as sending an email or asking for a click?’ probably not. As hackers and attacks evolve, they will go from simple tricks to very sophisticated attacks. So how do we know what these attacks will be? Simply, we can’t. So how can we detect the new attacks? This session will cover the state of the attacks and the directions they are taking. Ultimately, we will discuss strategies and how we can define the science that will evolve to thwart the evolving various attacks

    Moderated by: Pete Lindstrom, IDC

    Presenters:

    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
    Andrew Lewman, Laxdaela Technology
    Ben Rothke, Senior Security Consultant, Nettitude
    Paul Williams, CEO, Clarity Consulting Corporation
  • Increasing Cyber Workforce Diversity
    Increasing Cyber Workforce Diversity Max Shuftan, Jessica Gulick and other panelist Recorded: Jun 20 2018 64 mins
    Join this webinar to hear from past students and current champions discuss how the SANS CyberTalent program is changing lives and closing the workforce gap. The cybersecurity workforce gap can be partly solved through increasing diversity. Organizations like SANS CyberTalent and the WSC are reaching into communities throughout Maryland and the US searching for professionals with technical appitude but new to cybersecurity.

    These academies are designed to help qualified veterans and women receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the students selected.


    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • Hear from a recent graduate who will share her experience
    • How this training academy and related certifications can help your career
  • Artificial Intelligence - Internet of Things : Cybersecurity Perspectives
    Artificial Intelligence - Internet of Things : Cybersecurity Perspectives Dr. Shawn P. Murray, President, Murray Security Services & Consulting Recorded: Jun 14 2018 75 mins
    Artificial Intelligence (AI) is quickly gaining recognition as a viable method to increase successful problem solving, advance research in areas that exceed human capabilities and are automating menial processes to increase efficiency and productivity in expediential time. In the future, your interface with a human doctor may be limited, as AI gains more prominence in the medical industry diagnosing patients and determining levels of care. AI is being used to develop humanoids for companionship and is providing additional conveniences that are starting to alarm some organizations. There is a sense that the pace of AI is growing so fast that it may be impacting areas that are not getting the attention required to address various risks. Cybersecurity issues continue to arise regarding the integration of AI in computer systems, network and software platforms and the growing advances in IoT devices. As various industries invest in AI technology, CIOs, CISOs, researchers and manufacturers need to be working together to ensure cybersecurity and other safeguards are being considered in the design phase before allowing AI technology into the computing environment.
  • ISSA International Series: Breach Report Analysis
    ISSA International Series: Breach Report Analysis Matt Mosley | Patrick Cable | Paul Williams | Jay Jacobs | Laurance Dine Recorded: May 22 2018 123 mins
    It's everyone's favorite time of year. What will we learn from this
    year's breach reports? Join us as we review the latest data, look for
    lessons and trends, and help you understand what it all means. Our
    panel of experts will focus on how security professionals can learn
    from the data, and hopefully avoid becoming a statistic for next
    year's report.
  • How Cyber (measured in dollars) Earns a Spot on the Risk Register
    How Cyber (measured in dollars) Earns a Spot on the Risk Register Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security Recorded: May 17 2018 47 mins
    Cyber has yet to be fully integrated into the suite of business functions and monitored risks within most organizations. GRC is the mechanism to align cyber and the business, but it’s current state is not sufficient. Governance hierarchy is ineffective (CISOs reporting to the CIO or COO), Risk leveraging ambiguous risk measurements, and Compliance mistaken as security. Moving forward, Governance must be redefined, making CISOs business leaders, reporting to the Board. Risk should leverage traceable data to measure in a common business language. Compliance should be the baseline for security initiatives, not the end goal. When these initiatives can be achieved, GRC will transform cyber into a business enabler.

    Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security where he leads the effort to quantify cyber risk in financial terms. Prior to Nehemiah he founded PivotPoint Risk Analytics which focused on cyber risk quantification through value-at-risk modeling and simulations. Jerry has a broad background in cyber, having worked for incident response, malware analysis, and services companies. He has spoken at a number of conferences worldwide including ISS World MEA in Dubai, InfoSecurity Russia in Moscow, and TM World Forum in Nice, France. He holds an MBA from the University of Massachusetts, an MS in Computer Science from the University of Pennsylvania, and a BS in Electrical Engineering from the University of Buffalo.
  • Is Threat Hunting the Next Frontier: Separating the Hype from the Reality
    Is Threat Hunting the Next Frontier: Separating the Hype from the Reality Dr. James Stanger Chief Technology Evangelist, CompTIA Recorded: May 3 2018 78 mins
    One of the more interesting-sounding job skills today is that of the “threat hunter.” Let’s talk about the activity of “threat hunting,” and deconstruct it a little bit. The idea behind threat hunting is to proactively look for adversaries and for traces of their activity. So, is threat hunting all that it’s cracked up to be? Is looking for trouble really the best approach today? It’s very possible that the one key element of threat hunting is one fundamental assumption: That you’ve already been hacked, but you just don’t quite realize it yet. In this presentation, James will discuss the benefits and drawbacks of “active defense,” and where it fits in with other security activities.
  • Gamification and Security: The Role of Competitions in Readiness and Defense
    Gamification and Security: The Role of Competitions in Readiness and Defense Lisa Jiggetts, Founder, President & CEO of the Women's Society of Cyberjutsu Recorded: Apr 26 2018 57 mins
    Security operations face intensifying pressures along numerous fronts, including a constantly shifting threat landscape, an increasingly complex environment to defend, and an extreme shortage of skills. This panel of distinguished security experts will discuss the role that competitions – at the primary school, collegiate and professional levels – can play in attracting workers to the security arena, growing their skills, and developing methods to identify and defend against the greatest threats and risks of the day.

    Lisa Jiggetts, the Founder & CEO of the Women's Society of Cyberjutsu, one of the fastest growing nonprofits dedicated to women in cybersecurity, will spearhead this panel of experts is cyber security and competitions.

    Other panelists include Mika Devonshire, Director of Forensics and Cyber Risk Analytics at SSIC; Marcelle Lee, Threat Researcher at LookingGlass Cyber Solutions; and Dan Manson, Professor of Computer Information Systems at Cal Poly Pomona.

Embed in website or blog