Hi [[ session.user.profile.firstName ]]

Threat Hunting Academy

  • Date
  • Rating
  • Views
  • Breach Detection and Response Handbook
    Breach Detection and Response Handbook Alex Holden, CISO of Hold Security Recorded: Jun 6 2018 61 mins
    With GDPR at our doorstep, getting breached not only carries losses due to hackers but the potential of penalties from the regulators and government. What is the best advice on how to deal with breaches, besides not getting breached? Let’s discuss the basics to show a measured standard for detecting malicious events, classifying them, and responding with at most efficiency.
  • CPE Webinar - Cyber Strong: Preparing the Nation’s Cyber Workforce
    CPE Webinar - Cyber Strong: Preparing the Nation’s Cyber Workforce Nancy Limauro, Deputy Branch Chief & Noel Kyle, Program Lead, Cybersecurity Education & Awareness Branch at DHS Recorded: May 18 2018 58 mins
    The Nation has an ever-growing need for cybersecurity professionals who can protect our networks and infrastructure from increasing cyber threats and attacks. According to a study by the Center for Cyber Safety and Education, there will be a shortage of 1.8 million information security workers by 2022. Building a skilled and agile cybersecurity workforce to fill these positions is a national challenge.

    To address the shortage of skilled workers, it is critical for all communities to work together to coordinate cybersecurity awareness, education, training, and workforce development efforts. Current initiatives across the Federal Government help advance the cybersecurity workforce, particularly through training and professional development. The Department of Homeland Security (DHS) is leading such efforts through its Cybersecurity Education and Awareness (CE&A) Branch.

    We will also share information about our Stop. Think. Connect.™ campaign to help promote safe online behavior. Stop. Think. Connect.™ resources provide partnership opportunities to academic institutions, government agencies/departments, as well as non-profit organizations.

    Join this webinar to learn:
    1. How to find CE&A awareness, education, and workforce development resources
    2. How to use National Cybersecurity Workforce Framework (NCWF) tools
    3. How to partner with our Stop. Think. Connect.™ Campaign

    This webinar is part of ISSA's Security Education and Awareness Special Interest Group Webinar Series.

    Speakers:
    - Nancy Limauro, DHS, Deputy Branch Chief, Cybersecurity Education & Awareness Branch
    - Noel Kyle, DHS, Program Lead, Cybersecurity Education & Awareness Branch

    This webinar qualifies for CPE credits. Please fill out the survey via the attached link to claim your credit.
  • Moving to an Active Defense - how far can you go?
    Moving to an Active Defense - how far can you go? Andy Robinson, Mark Rasch, Dave Morris Recorded: May 9 2018 75 mins
    This session will delve into the concept of Active Defense in Depth, what is it, and what are its implications - legally, operationally, tactically and strategically.

    Join the following presenters:

    Andy Robinson: Principal at TIBAT, Board of Directors at George Washington University, Center for Cyber and Homeland Security, Research Advisory Board at George Washington University
    Mark Rasch: Chief Legal and Compliance Partner at DRM Institute, former Chief Security Evangelist at Verizon, former Lead Prosecutor at U.S. DOJ. Cyber Crime Unit.
  • Defending from Crypto-Jacking, Ransomware & Worming Malware's Frightening Future
    Defending from Crypto-Jacking, Ransomware & Worming Malware's Frightening Future Jay Beale, Co-founder, COO & CTO, InGuardians Recorded: May 3 2018 47 mins
    In the last six months, crypto-mining malware and crypto-jacking have taken center stage in cybercrime news. We’ll discuss the most recent events and see how this links to ransomware, which dominated the cybercrime news last year, where one outbreak cost seven companies over one billion dollars.

    Both crypto-mining malware and ransomware, aside from gathering headlines, demonstrate that cybercriminals and nation state actors are building capabilities for worming malware that could have the ability to do far greater damage than has yet been seen.

    Come to this talk, learn what’s been going on, where it’s likely going, and how to avoid being a victim of a headline-generating event.

    About the Speaker:
    Jay Beale created two tools used by hundreds of thousands of individuals, companies and governments, Bastille Linux and the Center for Internet Security’s first Linux/UNIX scoring tool. He has led training classes on Linux security at the Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training, since 2000. As an author, series editor and speaker, Jay has contributed to nine books and two columns and given more than one hundred public talks. He led the development of the Linux security standard for the Center for Internet Security, served on the board of Mitre’s OVAL project, and serves as a member on the O’Reilly Security Conference’s program committee.

    He is a co-founder, COO and CTO of the information security consulting company InGuardians, a leading information security consultancy with offices in Seattle, Boston, Chicago, Dallas, Atlanta and Washington, DC.
  • Why CISO's Get Fired
    Why CISO's Get Fired Douglas Bayne, Rosario Mastrogiacomo and Bill Noonan Recorded: Apr 5 2018 23 mins
    This live webinar covers the most important things you need to know about the data, systems and assets that are living in your organization’s environment. Three of our industry experts: Douglas Bayne, Bill Noonan and Rosario Mastrogiacomo will be discussing the importance of knowing what’s in your environment and how to protect your most sensitive information. Specifically, they will be discussing:

    • How to gain visibility into your environment
    • Data security
    • The problems people have with unstructured data
    • Mishandling of data
    • Open access and much more!

    About the presenters:

    Douglas Bayne:

    Doug Bayne is the Director of Professional Services at SPHERE Technology Solutions. Doug is an industry expert with over 25 years of experience solving challenging business problems with re-engineering and technology across the Data Governance, E-Communications & Surveillance, and Identity & Access Management domains. Doug is a thought-leader and innovator with a deep understanding of technology, security and compliance. Doug brings his years of expertise to SPHERE by managing our services organization that delivers on the solutions that our clients depend on to solve their risk and mitigation needs.

    Rosario Mastrogiacomo:

    Rosario Mastrogiacomo is the Director of Architecture and Design at SPHERE Technology Solutions. Rosario is an experienced technology executive and industry leader with over 25 years of experience working in the financial services industry. At SPHERE, Mastrogiacomo is responsible for the strategy of SPHERE’s suite of solutions including SPHEREengine, and SPHEREboard.

    Bill Noonan:

    Bill Noonan is a Senior Director at SPHERE Technology Solutions and oversees Sales, Marketing and Business Development. As an experienced Executive and industry leader who is well-known throughout the business world, Noonan brings over 30 years of experience and expertise in a variety of disciplines, and has a huge list of accomplishments – and stories!
  • Innovate Faster with Collaborative Security
    Innovate Faster with Collaborative Security Nathan Vega, Vice President, Business & Product Development, Columbus Collaboratory Recorded: Apr 5 2018 35 mins
    This webinar will review collaboration amongst trusted security peers will enable your business to create a material advantage for your defenders, increase the speed of technology adoption in your security practice, and improve the economics of adopting those technologies. The Columbus Collaboratory partnered with Forrester Research to study the challenges and requirements of security leaders across industries. We will present how shared intelligence, shared processes and shared technologies can speed the adoption of best practices and generate residual technology benefits across your organization.

    About the Speaker:
    Nathan Vega, Vice President, Business & Product Development for Columbus Collaboratory is responsible for bringing to market products and services in cybersecurity and analytics. Nathan's career began his at IBM where he specialized in design thinking, social business adoption, Pragmatic Marketing, and executive communications. Nathan held many roles during his 15 years at IBM, culminating in Offering Management for Bluemix, IBM's cloud platform, where he successfully brought Watson to market exposed through set of APIs.
  • The Best Defense Is An Offense-Informed Defense
    The Best Defense Is An Offense-Informed Defense Jeff Schmidt, VP & Chief Security Officer, Columbus Collaboratory Recorded: Mar 27 2018 43 mins
    In this session, you will learn how an offense-informed defense approach will enable your security team to cut through the noise, be more effective at both identifying the most likely and riskiest attacks and thwarting them faster at less cost. We will discuss how to understand not only the attack vectors, the attackers’ tactics, techniques and procedures but also the residual effects so that, in an environment of almost immeasurable alerts and alarms, your team can focus on the indicators that are the most important.

    Jeff Schmidt, VP and Chief Cyber Security Innovator at Columbus Collaboratory is an accomplished cybersecurity expert with a background in security and risk management. He founded JAS Global Advisors LLC, a security consulting firm in Chicago, and Authis, a provider of innovative risk-managed identity services for the financial sector. Jeff is a board member for Delta Risk LLC, A Chertoff Group Company, a global advisory firm focused on security and risk management. In 1998, he worked with the FBI to create the InfraGard Program, receiving commendations from the Attorney General and the Director of the FBI. He is an adjunct professor of systems security engineering at the Stevens Institute of Technology and a Zurich Cyber Risk Fellow, Cyber Statecraft Initiative, at The Atlantic Council. Jeff received a Bachelor of Science in computer information systems and an MBA from the Fisher College of Business at The Ohio State University.
  • Red vs. Blue: The Threatscape Predictions for 2018
    Red vs. Blue: The Threatscape Predictions for 2018 Adi Ashkenazy, VP Product for XM Cyber Recorded: Mar 21 2018 45 mins
    Analyzing cyber-attacks from last year, this session will cover leading trends, and identify potential evolution both in the defensive and offensive fields going forward. As we do so, we will explore the increasing importance of automation and the diminishing role of the human professional in large scale networks.

    About the Speaker:
    Adi Ashkenazy is the VP Product for XM Cyber, an innovative cyber security start-up developing a revolutionary breach and attack simulation solution, capable of identifying critical attack paths towards key organizational assets, while providing actionable prioritized remediation. Prior to XM Cyber, Adi served as deputy director of an elite cyber technology department in the prime minister's office in Israel, leading Israel's finest engineers and security professionals through some of the most complex cyber security challenges in the world today.
  • The State of Cyber Resiliency in the Age of Attacks
    The State of Cyber Resiliency in the Age of Attacks Dave Klein (GuardiCore) | Craig Dods (Juniper) | Troy Vennon (Columbus Collaboratory) | Jeannie Warner (WhiteHat Security) Recorded: Mar 20 2018 61 mins
    Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.

    Join this panel of experts as they discuss:
    - The biggest trends in cyber crime
    - Impact of Cryptocurrencies
    - Breaches and preventing future fraud and cyber attacks
    - Advancements in security technology
    - Why security awareness training should be a key part of your overall data protection strategy

    Speakers:
    - Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
    - Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory
    - Jeannie Warner, Security Manager, WhiteHat Security
    - Craig Dods, Chief Architect for Security, Juniper Networks' Strategic Verticals
  • Tracking Hackers - AI cybersecurity for APIs
    Tracking Hackers - AI cybersecurity for APIs Bernard Harguindeguy, CEO, ElasticBeam Recorded: Feb 27 2018 49 mins
    What do oBike, a bicycle rental company, Instagram, and the IRS have in common? Answer -- hackers used APIs to access their customers sensitive information forcing these organizations to announce breaches. Although these API attacks were exposed, most API-based attacks go undetected these days – particularly attacks that used compromised credentials.

    This webinar will discuss API cyberattack examples and the techniques used by hackers to breach APIs. It will also review how AI-based security ​solutions can effectively stop these attacks and provide deep visibility into your API sessions for forensic and compliance reporting. Topics covered in this webinar include:
    - API cyberattack trends
    - Review of recent API attacks
    - How to monitor and protect your API activity
    - How to detect and block API attacks on your data/apps (live demo)
    - How to deliver reports with detailed traffic insight for any API
    - Best practices for securing APIs

Embed in website or blog