Hi [[ session.user.profile.firstName ]]

Cybercast by ITPG Secure Compliance

  • Date
  • Rating
  • Views
  • NIST 800-171 Protect CUI or Risk Losing Federal Business
    NIST 800-171 Protect CUI or Risk Losing Federal Business Kelly Handerhan, CISSP, PMP, CASP, CEH, Cybrary.it SME Recorded: Oct 12 2017 63 mins
    Federal contractors that process, store or transmit what’s called Controlled Unclassified Information have until December to implement new, more stringent security guidelines to protect that information. Chances are your organization already meets some of the requirements, but it’s unlikely that you meet them all. Join us to identify what’s new, what’s not, what you have to do and how to assess the impact.
  • PRACTICE : NIST webinar
    PRACTICE : NIST webinar Kelly Handerhan Recorded: Oct 10 2017 24 mins
    NIST 800-171 Protect CUI or Risk Losing Federal Busines
  • Why do corporate breaches continue to succeed?
    Why do corporate breaches continue to succeed? Robert Johnston, CISSP, Adlumnin, Co-Founder & Chief Executive Officer Recorded: Oct 5 2017 38 mins
    Corporate breaches continue to succeed because attackers can steal the legitimate identities of your employees and use those identities to attack your infrastructure. Far deadlier than malware based attacks, identity based attacks can go undetected for months or years because perpetrators impersonate the methods used by your various privileged accounts as if they were that user. Attackers have changed their methods from the now outdated malware based attacks to the evolved identity based attacks. Learn how analytics, deception, and data streams are saving the security industry, or would have at least saved the Democratic National Committee.


    Robert Johnston, CISSP
    Behavior Analytics, Active Defense, President & CEO Adlumin.com, Technology Entrepreneur

    Previously Mr. Johnston worked in the private sector as a principal consultant at CrowdStrike, Inc as an incident response expert conducting engagements against nation state, criminal, and hacktivist organizations across a variety of industry sectors.

    Previously Mr. Johnston served as an officer in the United States Marine Corps. As a Marine Officer he was the Team Lead of 81 National Cyber Protection Team, Cyber National Mission Force and the Director of the Marine Corps Red Team. He is an accomplished leader and technical expert within the cyber security community. Mr. Johnston is a 2008 United States Naval Academy graduate with a degree in Information Technology.

    He has published multiple projects and articles in industry relevant magazines and peer reviewed journals. An avid speaker within the cyber security community (ISC)2 awarded him runner up for the best up-and-coming cyber security professional in North, Central, and South America and the winner of the 2015 Community Awareness Government Information Security Leadership Award. Mr. Johnston can be followed on Twitter at @dvgsecurity.
  • Risk-Cloud-Crypto
    Risk-Cloud-Crypto Donald Parker, CISSP, CCSK, ITIL, MCSE Recorded: Sep 28 2017 57 mins
    The three emerging pillars of cybersecurity include Risk Management, Cloud Security, and Cryptography. Cybersecurity can't be implemented efficiently without risk management. The cloud is taking over and here to stay. Cryptography is the clue that holds it all together.

    Donald Parker, CISSP, CCSK, ITIL, MCSE

    As a Sergeant in the US Army, cybersecurity instructor, inventor, author, and consultant to the Federal Government, Donald Parker has dedicated his entire career of over 23 years to the Information Technology industry with a special focus on Information Security. Mr. Parker has taught CISSP and other cybersecurity classes all over the United States and abroad, including Holland, Germany, and Guam. He holds a US patent for a physical computer security device that he believes will provide the greatest defense to one of the greatest threats on the Internet, Bot Networks. He has also developed a mechanical cryptographic cipher. Donald has authored a book on passing the CISSP exam and has published an audio version of the book online with over a million downloads. He has helped federal agencies and fortune 100 corporations comply with the ever-evolving cybersecurity landscape. As an independent consultant and small business owner for the past 10 years, he successfully completed more than a dozen short to midterm contracts. The knowledge gained from more than 25 different public and private sector environments has afforded him a birds-eye view of this exciting new field. Many of Mr. Parker’s customers and students refer to him as a one-man band in the since that; he can identify the laws, regulations, requirements and policies that an organization must comply with and actually implement the security controls necessary to demonstrate compliance. Donald has developed a STEM program to teach kids and young adults cyber security basics and prepare them for capture the flag competitions.
  • Strategies for the CompTIA Security+ Exam: SYS-501
    Strategies for the CompTIA Security+ Exam: SYS-501 Matt Salmon, CyberVista Lead Instructor Recorded: Sep 21 2017 58 mins
    Are you considering in earning the Security+ certification from CompTIA? A new version of the Security+ exam debuts this fall - version SYS-501. In this webinar, cybersecurity training provider, CyberVista, dissects the structure of the new Security+ exam. We will explain the 6 Domains that comprise the test while also providing valuable strategies for test day.
  • Virtual  Chief Information  Security Officer (VCISO)
    Virtual Chief Information Security Officer (VCISO) Frank Shirmo, CISSP, CSSLP, PCI-QSA Recorded: Sep 14 2017 45 mins
    Not all organizations have or can afford a full-time Chief Information Security Officer (CISO) to address regulatory compliance, security, and privacy and its impact on the IT infrastructure. Then again, many organizations don’t need a CISO full time, but rather on a more limited basis
  • Understanding the Metasploit Database
    Understanding the Metasploit Database Tyrone E. Wilson - Founder, and CEO of Cover6 Solutions Recorded: Aug 31 2017 69 mins
    We discussed The Metasploit Database. No matter where you are you should have an understanding of your current network environment. One of the best ways to capture, filter, and share network information is with the Metasploit Database. Keynote Speaker(s): Mr. Tyrone E. Wilson – Founder and President of Cover6 Solutions has over 20 years of experience focusing on Information Systems and Network Security. Wilson has extensive expertise in multiple areas of the cyber field including, but not limited to, network defense, cyber threat analysis, penetration testing/vulnerability assessments, and #IPv6. Wilson has a passion for spreading knowledge to all about everything he’s acquired through his years of experience. Disclaimer: Only scan/test network environments in which you have explicit permission to do so. A sample permission memo can be found at Whttp://www.counterhack.net/permission_memo.html
  • Strategies for CISSP® Exam
    Strategies for CISSP® Exam Sam Meisenberg, Head of CISSP Training at CyberVista Recorded: Aug 24 2017 51 mins
    Are you considering taking the CISSP exam? The CISSP is considered the industry-leading certification in cybersecurity, but the exam is certainly no cake walk. Strategies for CISSP Exam webinar dissects the structure of the CISSP exam. Hosted by (ISC)2 Approved training provider CyberVista, we will explain the 8 Domains that comprise the test while also providing valuable strategies for test day.
  • CMDSP - Mobile Security for the Mobile IT Administrator
    CMDSP - Mobile Security for the Mobile IT Administrator Ken Lloyd, CMDSP's Board members and CTO for Mi3 Security. Recorded: Aug 10 2017 54 mins
    ITPG Secure Compliance's Cybercast series proudly presents : CMDSP - Mobile Security for the Mobile IT Administrator.

    Come join us for a discussion on the advent of the Mobile IT Administrator position, and how CMDSP is helping organizations improve their enterprise mobility management strategy.

    ITPG Secure Compliance has invited Mr. Ken Lloyd, CMDSP's Board members and CTO for Mi3 Security, a leader in Mobile Application Risk Intelligence and Mobile Threat Defense. With 18 years focused on creating powerful Mobile and Security solutions for Enterprises, SMB's and Consumers. Recognized as a Subject Matter Expert (SME) in Mobile Security, Security Awareness and IT Security.
  • Human Factors in Cyber Security
    Human Factors in Cyber Security Dr. Calvin Nobles Recorded: Aug 10 2017 74 mins
    We discussed Human Factors in Cyber Security. The discourse surrounding human performance in cyber security remains a relevant topic; nevertheless, the scientific underpinning remains deficient. Human error is the primary contributing factor that leads to malicious activity in cyber security. Other domains such as aviation, healthcare, and nuclear power have capitalized on human factors to reduce accidents and to identify critical phases of operations; consequently, the cyber security sector trails behind the above-mentioned industries in leveraging human factors.

    The aim of this presentation is leveraging organizational culture as a platform to address human factors in cyber security. The continuous integration of technology accompanied by (a) advanced persistent threats, (b) ransomware attacks, (c) data breaches, and (d) cyber-attacks increases and threatens the complexity of cyber security operations.

    Included are examples of conceptual processes, models, and frameworks to influence cyber leaders and professionals to mandate the integration of human factors in cyber security.

    Keynote Speaker:
    Dr. Calvin Nobles, Ph.D. is a cyber security subject matter expert (SME), national security leader, researcher, practitioner, and educator with more than 20 years of experience. Culminating a career of military service at the national level in 2017, as a cyber security executive and cyber consultant. He is an adjunct faculty member at the University of Maryland University College and Indian Wesleyan University. Calvin is actively involved in the cyber community, volunteering with multiple professional associations and conducting cyber security research. Calvin is the author of the book, Exploring the Implications of Implementing Technologically Advanced Aircraft in General Aviation.

Embed in website or blog