Hi [[ session.user.profile.firstName ]]

Threat Hunting Academy

  • Date
  • Rating
  • Views
  • Gaining the Upper Hand on Network Vulnerabilities
    Gaining the Upper Hand on Network Vulnerabilities
    Nathan Vega, VP Product, Columbus Collaboratory Recorded: Nov 8 2018 60 mins
    Join security experts from Columbus Collaboratory to learn how to elevate your network’s cybersecurity defenses by identifying and remediating the most critical vulnerabilities. We will discuss best practices for vulnerability scanning, managing the seemingly overwhelming volume of scan data, data visualization techniques, and how combining vulnerability data, threat data and asset classification is critical to prioritizing your remediation efforts when resources are scarce and time is of the essence.
  • Crypto-Jacking, Ransomware & Worming Malware's Frightening Future
    Crypto-Jacking, Ransomware & Worming Malware's Frightening Future
    Jay Beale, Co-founder, COO & CTO, InGuardians Recorded: Oct 25 2018 47 mins
    Crypto-mining malware and crypto-jacking have taken center stage in cybercrime news. We’ll discuss the most recent events and see how this links to ransomware, which dominated the cybercrime news last year, where one outbreak cost seven companies over one billion dollars.

    Both crypto-mining malware and ransomware, aside from gathering headlines, demonstrate that cybercriminals and nation state actors are building capabilities for worming malware that could have the ability to do far greater damage than has yet been seen.

    Come to this talk, learn what’s been going on, where it’s likely going, and how to avoid being a victim of a headline-generating event.

    About the Speaker:
    Jay Beale created two tools used by hundreds of thousands of individuals, companies and governments, Bastille Linux and the Center for Internet Security’s first Linux/UNIX scoring tool. He has led training classes on Linux security at the Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training, since 2000. As an author, series editor and speaker, Jay has contributed to nine books and two columns and given more than one hundred public talks. He led the development of the Linux security standard for the Center for Internet Security, served on the board of Mitre’s OVAL project, and serves as a member on the O’Reilly Security Conference’s program committee.

    He is a co-founder, COO and CTO of the information security consulting company InGuardians, a leading information security consultancy with offices in Seattle, Boston, Chicago, Dallas, Atlanta and Washington, DC.
  • Threat Hunting - An In-depth Explanation
    Threat Hunting - An In-depth Explanation
    Juanita Koilpillai, Mark Rasch, Andrew Johnston and David Morris Recorded: Jul 23 2018 61 mins
    Threat Hunting is a complicated and often misunderstood cybersecurity activity that if properly used can add tremendous value to your cybersecurity posture.

    In this session you will learn:
    What is Threat Hunting?
    When do I use it?
    What will it tell me?
    How do I use it?
    What are the legal implications?

    Learn from the following leading experts:
    Juanita Koilpillai: Chief Technology Advisor, Digital Risk Management Institute
    Mark Rasch: Chief Legal Council,Digital Risk Management Institute
    Andrew Johnston: Associate Consultant,Mandiant
  • Breach Detection and Response Handbook
    Breach Detection and Response Handbook
    Alex Holden, CISO of Hold Security Recorded: Jun 6 2018 61 mins
    With GDPR at our doorstep, getting breached not only carries losses due to hackers but the potential of penalties from the regulators and government. What is the best advice on how to deal with breaches, besides not getting breached? Let’s discuss the basics to show a measured standard for detecting malicious events, classifying them, and responding with at most efficiency.
  • CPE Webinar - Cyber Strong: Preparing the Nation’s Cyber Workforce
    CPE Webinar - Cyber Strong: Preparing the Nation’s Cyber Workforce
    Nancy Limauro, Deputy Branch Chief & Noel Kyle, Program Lead, Cybersecurity Education & Awareness Branch at DHS Recorded: May 18 2018 58 mins
    The Nation has an ever-growing need for cybersecurity professionals who can protect our networks and infrastructure from increasing cyber threats and attacks. According to a study by the Center for Cyber Safety and Education, there will be a shortage of 1.8 million information security workers by 2022. Building a skilled and agile cybersecurity workforce to fill these positions is a national challenge.

    To address the shortage of skilled workers, it is critical for all communities to work together to coordinate cybersecurity awareness, education, training, and workforce development efforts. Current initiatives across the Federal Government help advance the cybersecurity workforce, particularly through training and professional development. The Department of Homeland Security (DHS) is leading such efforts through its Cybersecurity Education and Awareness (CE&A) Branch.

    We will also share information about our Stop. Think. Connect.™ campaign to help promote safe online behavior. Stop. Think. Connect.™ resources provide partnership opportunities to academic institutions, government agencies/departments, as well as non-profit organizations.

    Join this webinar to learn:
    1. How to find CE&A awareness, education, and workforce development resources
    2. How to use National Cybersecurity Workforce Framework (NCWF) tools
    3. How to partner with our Stop. Think. Connect.™ Campaign

    This webinar is part of ISSA's Security Education and Awareness Special Interest Group Webinar Series.

    Speakers:
    - Nancy Limauro, DHS, Deputy Branch Chief, Cybersecurity Education & Awareness Branch
    - Noel Kyle, DHS, Program Lead, Cybersecurity Education & Awareness Branch

    This webinar qualifies for CPE credits. Please fill out the survey via the attached link to claim your credit.
  • Moving to an Active Defense - how far can you go?
    Moving to an Active Defense - how far can you go?
    Andy Robinson, Mark Rasch, Dave Morris Recorded: May 9 2018 75 mins
    This session will delve into the concept of Active Defense in Depth, what is it, and what are its implications - legally, operationally, tactically and strategically.

    Join the following presenters:

    Andy Robinson: Principal at TIBAT, Board of Directors at George Washington University, Center for Cyber and Homeland Security, Research Advisory Board at George Washington University
    Mark Rasch: Chief Legal and Compliance Partner at DRM Institute, former Chief Security Evangelist at Verizon, former Lead Prosecutor at U.S. DOJ. Cyber Crime Unit.
  • Defending from Crypto-Jacking, Ransomware & Worming Malware's Frightening Future
    Defending from Crypto-Jacking, Ransomware & Worming Malware's Frightening Future
    Jay Beale, Co-founder, COO & CTO, InGuardians Recorded: May 3 2018 47 mins
    In the last six months, crypto-mining malware and crypto-jacking have taken center stage in cybercrime news. We’ll discuss the most recent events and see how this links to ransomware, which dominated the cybercrime news last year, where one outbreak cost seven companies over one billion dollars.

    Both crypto-mining malware and ransomware, aside from gathering headlines, demonstrate that cybercriminals and nation state actors are building capabilities for worming malware that could have the ability to do far greater damage than has yet been seen.

    Come to this talk, learn what’s been going on, where it’s likely going, and how to avoid being a victim of a headline-generating event.

    About the Speaker:
    Jay Beale created two tools used by hundreds of thousands of individuals, companies and governments, Bastille Linux and the Center for Internet Security’s first Linux/UNIX scoring tool. He has led training classes on Linux security at the Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training, since 2000. As an author, series editor and speaker, Jay has contributed to nine books and two columns and given more than one hundred public talks. He led the development of the Linux security standard for the Center for Internet Security, served on the board of Mitre’s OVAL project, and serves as a member on the O’Reilly Security Conference’s program committee.

    He is a co-founder, COO and CTO of the information security consulting company InGuardians, a leading information security consultancy with offices in Seattle, Boston, Chicago, Dallas, Atlanta and Washington, DC.
  • Why CISO's Get Fired
    Why CISO's Get Fired
    Douglas Bayne, Rosario Mastrogiacomo and Bill Noonan Recorded: Apr 5 2018 23 mins
    This live webinar covers the most important things you need to know about the data, systems and assets that are living in your organization’s environment. Three of our industry experts: Douglas Bayne, Bill Noonan and Rosario Mastrogiacomo will be discussing the importance of knowing what’s in your environment and how to protect your most sensitive information. Specifically, they will be discussing:

    • How to gain visibility into your environment
    • Data security
    • The problems people have with unstructured data
    • Mishandling of data
    • Open access and much more!

    About the presenters:

    Douglas Bayne:

    Doug Bayne is the Director of Professional Services at SPHERE Technology Solutions. Doug is an industry expert with over 25 years of experience solving challenging business problems with re-engineering and technology across the Data Governance, E-Communications & Surveillance, and Identity & Access Management domains. Doug is a thought-leader and innovator with a deep understanding of technology, security and compliance. Doug brings his years of expertise to SPHERE by managing our services organization that delivers on the solutions that our clients depend on to solve their risk and mitigation needs.

    Rosario Mastrogiacomo:

    Rosario Mastrogiacomo is the Director of Architecture and Design at SPHERE Technology Solutions. Rosario is an experienced technology executive and industry leader with over 25 years of experience working in the financial services industry. At SPHERE, Mastrogiacomo is responsible for the strategy of SPHERE’s suite of solutions including SPHEREengine, and SPHEREboard.

    Bill Noonan:

    Bill Noonan is a Senior Director at SPHERE Technology Solutions and oversees Sales, Marketing and Business Development. As an experienced Executive and industry leader who is well-known throughout the business world, Noonan brings over 30 years of experience and expertise in a variety of disciplines, and has a huge list of accomplishments – and stories!
  • Innovate Faster with Collaborative Security
    Innovate Faster with Collaborative Security
    Nathan Vega, Vice President, Business & Product Development, Columbus Collaboratory Recorded: Apr 5 2018 35 mins
    This webinar will review collaboration amongst trusted security peers will enable your business to create a material advantage for your defenders, increase the speed of technology adoption in your security practice, and improve the economics of adopting those technologies. The Columbus Collaboratory partnered with Forrester Research to study the challenges and requirements of security leaders across industries. We will present how shared intelligence, shared processes and shared technologies can speed the adoption of best practices and generate residual technology benefits across your organization.

    About the Speaker:
    Nathan Vega, Vice President, Business & Product Development for Columbus Collaboratory is responsible for bringing to market products and services in cybersecurity and analytics. Nathan's career began his at IBM where he specialized in design thinking, social business adoption, Pragmatic Marketing, and executive communications. Nathan held many roles during his 15 years at IBM, culminating in Offering Management for Bluemix, IBM's cloud platform, where he successfully brought Watson to market exposed through set of APIs.
  • The Best Defense Is An Offense-Informed Defense
    The Best Defense Is An Offense-Informed Defense
    Jeff Schmidt, VP & Chief Security Officer, Columbus Collaboratory Recorded: Mar 27 2018 43 mins
    In this session, you will learn how an offense-informed defense approach will enable your security team to cut through the noise, be more effective at both identifying the most likely and riskiest attacks and thwarting them faster at less cost. We will discuss how to understand not only the attack vectors, the attackers’ tactics, techniques and procedures but also the residual effects so that, in an environment of almost immeasurable alerts and alarms, your team can focus on the indicators that are the most important.

    Jeff Schmidt, VP and Chief Cyber Security Innovator at Columbus Collaboratory is an accomplished cybersecurity expert with a background in security and risk management. He founded JAS Global Advisors LLC, a security consulting firm in Chicago, and Authis, a provider of innovative risk-managed identity services for the financial sector. Jeff is a board member for Delta Risk LLC, A Chertoff Group Company, a global advisory firm focused on security and risk management. In 1998, he worked with the FBI to create the InfraGard Program, receiving commendations from the Attorney General and the Director of the FBI. He is an adjunct professor of systems security engineering at the Stevens Institute of Technology and a Zurich Cyber Risk Fellow, Cyber Statecraft Initiative, at The Atlantic Council. Jeff received a Bachelor of Science in computer information systems and an MBA from the Fisher College of Business at The Ohio State University.

Embed in website or blog