Hi [[ session.user.profile.firstName ]]

Women's Society of Cyberjutsu

  • Date
  • Rating
  • Views
  • RSAC 2019 Recap - Emerging Tech, Threats and AI
    RSAC 2019 Recap - Emerging Tech, Threats and AI
    Chris Roberts (Attivio Networks), Nathan Wenzler (Moss Adams), Jessica Gulick (Katzcy), Joseph Carson (Thycotic) Recorded: Mar 26 2019 62 mins
    What were the highlights of this year's RSA Conference in San Francisco? Discover the major security developments that happened in the past year and the biggest topics discussed during RSAC.

    Join this exclusive panel of security experts as they share their experiences, insights and recommendations in an interactive Q&A discussion on:
    - Top security challenges and how are we solving them
    - Biggest buzzwords: Hype vs. reality
    - Exciting new tech
    - Top conference highlights
    - Cybersecurity as a boardroom issue
    - CISO's toolbox
    - Words of wisdom for people interested in security

    This is an interactive session and the audience is encouraged to ask questions during this live webcast.
  • Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group
    Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group
    Jessica Gulick, CEO, Katzcy, MBA | PMP | CISSP Recorded: Mar 21 2019 55 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Merissa Villalobos & Kristin Parke from NCC Group
  • Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search
    Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search
    Brenden Bishop, Data Scientist, the Columbus Collaboratory Recorded: Mar 13 2019 44 mins
    Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corporate network that your IT Security team is trying to defend. Generalized anomaly detectors, without tuning for a specific use case, almost always result in high false alarm rates that lead to analyst alert fatigue and a detector which is effectively useless. In this session, Brenden Bishop, Data Scientist at the Columbus Collaboratory, will present an open source tool and best practices for building specific, repeatable, and scalable models for hunting your network’s anomalies. Through iteration and collaboration, defenders can hone in on interesting anomalies with increasing efficiency.
  • Distinguish Signal from Noise: Find Threats in Your Security Sensor Data
    Distinguish Signal from Noise: Find Threats in Your Security Sensor Data
    Slava Nikitin, Data Scientist, The Columbus Collaboratory Recorded: Feb 27 2019 45 mins
    Join us for this webinar that will recommend how to deal with your “big data” problem when dealing with the massive volume of raw, unprocessed data points from your network security sensors. Hint: don’t start with the data and attempt to drill down to the problem. Instead, as Slava Nitikin, Data Scientist from the Columbus Collaboratory will explain, you must start by the defining problem, building a threat model, and then focusing on the corresponding signals in your sensor data. We will walk through the use case for an Active Directory password spraying attack to demonstrate how to define and apply appropriate filters to your security data for faster detection, more accurate threat scoring and more effective security overall.
  • Survival Skills for Cybersecurity Leaders
    Survival Skills for Cybersecurity Leaders
    Glenn Richardson, Executive Coach, LeaderSages Recorded: Jan 15 2019 60 mins
    Start the new year on the right foot by investing in yourself and improving your leadership skills. Join Glenn Richardson, coach and executive consultant, in this webinar that will explore the principles of leadership. We will review practical tips, supported by real-world examples, from an experienced, successful leader who specializes in coaching and developing new and emerging leaders. Gain confidence in your ability to learn and lead, and, if you’re already in a leadership role or approaching a new position with leadership expectations - congratulations! Join us on this webinar to develop a plan for continue learning, improvement and career advancement.
  • Career Conversations w/ Maggie Powell, Exelon
    Career Conversations w/ Maggie Powell, Exelon
    Jessica Gulick, CEO, Katzcy Recorded: Dec 21 2018 42 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Maggy Powell , MIA, International Economic Policy, Eastern Europe

    Maggy Powell is the Senior Manager, Real Time Systems Security for Exelon. Her teams include security engineering, a security operations center and security compliance focused on real time systems across the enterprise. She is responsible for vulnerability assessment, threat management and incident response for industrial control systems and operational technology as well as compliance fulfillment for applicable CIP cyber security standards.
  • Unified Endpoint Management & Security: A Force Multiplier
    Unified Endpoint Management & Security: A Force Multiplier
    Scott Scheferman, Cylance Director of Global Services; Masataka Hashiguchi, Interfocus Sales Engineer Recorded: Dec 13 2018 56 mins
    Join Interfocus and Cylance for this webinar outlining the workplace productivity gains that your business can realize through an integrated and unified platform delivering both IT asset management and endpoint security. Most IT teams today suffer from "alert fatigue" from the growing number of devices on their network, and spend on average 5-13 hours a week cleaning up compromised endpoints. Scott Scheferman from Cylance and Masataka Hashiguchi from Interfocus will demonstrate how automation and prevention is worth a pound of cure on your endpoints.
  • Career Conversations w/ Amelie Koran, Department of Health and Human Services
    Career Conversations w/ Amelie Koran, Department of Health and Human Services
    Jessica Gulick, MBA | PMP | CISSP Recorded: Nov 16 2018 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Amélie E. Koran serves as the Deputy Chief Information Officer for the U.S. Department of Health and Human Services, Office of the Inspector General. Amélie comes to DHHS OIG via a rather circuitous route through multiple industry sectors, academia, and the public sector
    including The Walt Disney Company, Carnegie Mellon University CERT/CC, Mandiant, The World Bank and The American Chemical Society. Her public sector experience started as Lead Enterprise Security Architect for the U.S. Department of the Interior, the U.S. Treasury Department leading the Continuous Diagnostics and Mitigation implementation across the entire agency and a leadership development rotation as part of the President’s Management Council
    Fellowship serving the Federal CIO in supporting cybersecurity policy analysis and legislative review, including stewardship of the Open Data Initiative and help in giving “birth” to the United States Digital Service (USDS). She’s an ardent advocate for new approaches to hiring talent into and rational applications of security strategy and technologies for the Federal government space.

    Twitter: @webjedi
  • Foolproof Digital Identity with Behavioral Biometrics
    Foolproof Digital Identity with Behavioral Biometrics
    Ehab Samy, VP Product Management, Plurilock Recorded: Nov 15 2018 59 mins
    Digital identity authentication can be challenging to do effectively. Join us to learn about the evolution of biometrics technologies, from those that determine who you ARE in the digital realm, to behavioral biometrics that determine your identity based upon what you DO and how you do it. Ehab Samy, Vice President of Product Management for Plurilock, will map which digital identity management mechanisms are best suited for particular environments including law enforcement, airport security, health care, and the workplace.
  • Gaining the Upper Hand on Network Vulnerabilities
    Gaining the Upper Hand on Network Vulnerabilities
    Nathan Vega, VP Product, Columbus Collaboratory Recorded: Nov 8 2018 60 mins
    Join security experts from Columbus Collaboratory to learn how to elevate your network’s cybersecurity defenses by identifying and remediating the most critical vulnerabilities. We will discuss best practices for vulnerability scanning, managing the seemingly overwhelming volume of scan data, data visualization techniques, and how combining vulnerability data, threat data and asset classification is critical to prioritizing your remediation efforts when resources are scarce and time is of the essence.

Embed in website or blog