Hi [[ session.user.profile.firstName ]]

Women's Society of Cyberjutsu

  • Date
  • Rating
  • Views
  • Cloud Computing and Cloud Security
    Cloud Computing and Cloud Security
    Sapna Singh, cyber SME and advocate for women in cyber Recorded: May 18 2019 53 mins
    Join WSC and Sapna Singh, May 18th at 11 AM EST for a discussion on Cloud Computing and Cloud Security. Hear from cyber professional and advocated for women in cyber in the Middle East as she Dives into what the cloud is and how it works. After which she gets into AWS and breaks down a few of the major areas of the platform.

    This is a primer for our hands-on cloud workshop to be hosted later in the year!
  • 2019 Verizon Data Breach Investigations Report - All Women Panel Discussion
    2019 Verizon Data Breach Investigations Report - All Women Panel Discussion
    Mary Beth Borgwing, founder of Cyber Social Club and Uniting Women in Cyber Recorded: May 8 2019 63 mins
    The 2019 Verizon Data Breach Investigations Report, now in its twelfth year, is an industry benchmark for information on cybersecurity threats and vulnerabilities. Each year this report looks at tens of thousands of security incidents and confirmed breaches. Join our all-women panel of experts for the first look at some of the key findings of the 2019 report to understand and what it all means.
  • SANS Extends High School Girls and College Student Cyber Training Programs
    SANS Extends High School Girls and College Student Cyber Training Programs
    Mandy Galante, SANS CyberStart Program Director Recorded: May 1 2019 26 mins
    Don't miss this informative webinar hosted by WSC and featuring Mandy Galante is the CyberStart Program Director for the SANS Institute. Mandy will share vital information about CyberStart Program, for high school girls, and Cyber FastTrack for college students.

    Both programs are 100% scholarshiped for students and open for registeration in April 2019.
  • Developing Your Cyber Security Action Plan
    Developing Your Cyber Security Action Plan
    Teresa Allison, CISSP, CISA, Security+, PMP; ISSA DC Chapter, VP of Strategic Relations Recorded: Apr 18 2019 83 mins
    Have you been thinking about transitioning to a career in cybersecurity, but are not quite sure how to make your dream a reality? Are you currently working a cyber job but want to make a plan for advancement? This program walks you through the steps that you need to take in order to explore your cyber career options. It gives you a structured framework for exploring your interest in cyber, researching cyber positions, learning about cyber policies and standards, learning cyber tools, obtaining cyber / IT certifications, as well as applying for cyber jobs. This approach helps you to create your own cyber career action plan so that you can position yourself to join the field of cybersecurity.

    Join Teresa Allison, CISSP, CISA, Security+, PMP; ISSA DC Chapter, VP of Strategic Relations; & Cyberjutsu Award Winner, for an interactive discussion on building your Cyber Security Action Plan.
  • SANS Extends High School Girls and College Student Cyber Training Programs to 27
    SANS Extends High School Girls and College Student Cyber Training Programs to 27
    Mandy Galante, SANS CyberStart Program Director Recorded: Mar 28 2019 27 mins
    Don't miss this informative webinar hosted by WSC and featuring Mandy Galante is the CyberStart Program Director for the SANS Institute. Mandy will share vital information about CyberStart Program, for high school girls, and Cyber FastTrack for college students.

    Both programs are 100% scholarshiped for students and open for registeration in April 2019.
  • RSAC 2019 Recap - Emerging Tech, Threats and AI
    RSAC 2019 Recap - Emerging Tech, Threats and AI
    Chris Roberts (Attivio Networks), Nathan Wenzler (Moss Adams), Jessica Gulick (Katzcy), Joseph Carson (Thycotic) Recorded: Mar 26 2019 62 mins
    What were the highlights of this year's RSA Conference in San Francisco? Discover the major security developments that happened in the past year and the biggest topics discussed during RSAC.

    Join this exclusive panel of security experts as they share their experiences, insights and recommendations in an interactive Q&A discussion on:
    - Top security challenges and how are we solving them
    - Biggest buzzwords: Hype vs. reality
    - Exciting new tech
    - Top conference highlights
    - Cybersecurity as a boardroom issue
    - CISO's toolbox
    - Words of wisdom for people interested in security

    This is an interactive session and the audience is encouraged to ask questions during this live webcast.
  • Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group
    Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group
    Jessica Gulick, CEO, Katzcy, MBA | PMP | CISSP Recorded: Mar 21 2019 55 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Merissa Villalobos & Kristin Parke from NCC Group
  • Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search
    Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search
    Brenden Bishop, Data Scientist, the Columbus Collaboratory Recorded: Mar 13 2019 44 mins
    Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corporate network that your IT Security team is trying to defend. Generalized anomaly detectors, without tuning for a specific use case, almost always result in high false alarm rates that lead to analyst alert fatigue and a detector which is effectively useless. In this session, Brenden Bishop, Data Scientist at the Columbus Collaboratory, will present an open source tool and best practices for building specific, repeatable, and scalable models for hunting your network’s anomalies. Through iteration and collaboration, defenders can hone in on interesting anomalies with increasing efficiency.
  • Distinguish Signal from Noise: Find Threats in Your Security Sensor Data
    Distinguish Signal from Noise: Find Threats in Your Security Sensor Data
    Slava Nikitin, Data Scientist, The Columbus Collaboratory Recorded: Feb 27 2019 45 mins
    Join us for this webinar that will recommend how to deal with your “big data” problem when dealing with the massive volume of raw, unprocessed data points from your network security sensors. Hint: don’t start with the data and attempt to drill down to the problem. Instead, as Slava Nitikin, Data Scientist from the Columbus Collaboratory will explain, you must start by the defining problem, building a threat model, and then focusing on the corresponding signals in your sensor data. We will walk through the use case for an Active Directory password spraying attack to demonstrate how to define and apply appropriate filters to your security data for faster detection, more accurate threat scoring and more effective security overall.
  • Survival Skills for Cybersecurity Leaders
    Survival Skills for Cybersecurity Leaders
    Glenn Richardson, Executive Coach, LeaderSages Recorded: Jan 15 2019 60 mins
    Start the new year on the right foot by investing in yourself and improving your leadership skills. Join Glenn Richardson, coach and executive consultant, in this webinar that will explore the principles of leadership. We will review practical tips, supported by real-world examples, from an experienced, successful leader who specializes in coaching and developing new and emerging leaders. Gain confidence in your ability to learn and lead, and, if you’re already in a leadership role or approaching a new position with leadership expectations - congratulations! Join us on this webinar to develop a plan for continue learning, improvement and career advancement.

Embed in website or blog