Hi [[ session.user.profile.firstName ]]

Information Systems Security Association

  • Date
  • Rating
  • Views
  • Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React
    Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React
    ISSA International Recorded: May 24 2019 55 mins
    In this session, ExtraHop Deputy CISO Jeff Costlow will discuss how security operations teams can escape the cycle of reactivity characterized by constantly responding to a flood of alerts, and move toward a more proactive stance by using the right data sources and workflows, driven by network traffic analysis, to focus on developing proactive capabilities like continuous encryption auditing, policy auditing, and more advanced use cases like threat hunting.

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management for Farmers Insurance

    Speakers:
    Jeff Costlow, CISO, ExtraHop
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions.
  • ISSA Thought Leadership Series: What Is A CASB and Why Do You  Need it?
    ISSA Thought Leadership Series: What Is A CASB and Why Do You Need it?
    ISSA International Recorded: May 22 2019 60 mins
    CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud security failures will be the customer’s fault through 2023. So, how do you ensure that you have the right tools in place as your organization adopts more and more cloud applications?

     In this webinar you will learn:

    - How the CASB market has evolved beyond shadow IT?

    - How a CASB fits into the security landscape?

    - Gartner’s 4 pillars for CASBs

    - Common CASB use cases

    And more!
  • High Assurance Digital Identity in Zero Trust Architecture
    High Assurance Digital Identity in Zero Trust Architecture
    ISSA International Recorded: May 17 2019 57 mins
    The Zero Trust Architecture model accepts that secure data can no longer be adequately protected by network perimeter firewall design because there is no longer a physical network perimeter to protect. Digital entities (people and things) cannot be trusted until they have been authenticated through integrated digital ID services. High assurance digital identity has quickly become the center of IT cybersecurity. Fortunately, there are several side benefits to solving this security challenge.

    Moderator:
    Kurt Seifried, Chief Blockchain Officer and Director of Special Projects
    Cloud Security Alliance

    Speaker:
    John MacInnis, Product Marketing Manager, Identity & Access Management Solutions (IAMS), HID Global
  • ISSA Thought Leadership Series - Zero Trust: The Evolution of Perimeter Security
    ISSA Thought Leadership Series - Zero Trust: The Evolution of Perimeter Security
    ISSA International Recorded: May 15 2019 59 mins
    One key aspect of digital transformation for many companies has been the evolution and rise of the remote user. Application access from any device, anywhere has become an imperative for success, but with transformation comes challenges with attack surface and network vulnerability.

    Adopting a zero trust model is key to combat cybercriminals who are probing security perimeters and enterprise resources for vulnerabilities with a distinct purpose. Application access and identity is one of the key areas to begin.

    Join us on ……May 15th at 1pm EST for a discussion with Akamai security professional Faraz Siddiqui as he shares steps you can take to protect your network against breaches by evolving access policies and solutions.
  • ISSA Thought Leadership Series: Exploring The Frontier For Maliciousness In IPv6
    ISSA Thought Leadership Series: Exploring The Frontier For Maliciousness In IPv6
    ISSA International Recorded: May 8 2019 56 mins
    This year saw IPv6 adoption worldwide surpassing the twenty-five percent mark. While previously only used by some innovative attackers, the incentive to explore the space for fresh targets grows as more than a quarter of the Internet is now IPv6-capable. Many organizations are challenged with adequate monitoring their IPv6 networks, misconfigured devices and a shortage of time to implement IPv6 best practices.

    In this session we’ll aim to spur more conversations and curiosity in the IPv6 security space by:

    - Examining ways to enumerate an oasis of infrastructure in the large desert of addresses

    - Discussing current malware observed with IPv6 capabilities

    - Remarking on some already observed security issues with the protocol

    Moderator:
    Michael Levin, CEO/Founder, Center for Information Security Awareness

    Speakers:
    Chad Anderson, Research Engineer, DomainTools, LLC.
    Dipto Chakravarty, Chairman of Security COE, IoT Community
  • ISSA International Series: Threat Detection - Trends and Technology
    ISSA International Series: Threat Detection - Trends and Technology
    ISSA International Recorded: Apr 26 2019 86 mins
    The world is changing, attacks come at the speed of light, and are changing so fast detection is almost impossible. So, how do we tell when we are being attacked? What new technologies are coming down the pipe? This session will cover these and many more topics.

    Moderator:
    Gabe Chomic, President, ISSA-UK

    Speakers:
    Mohan Rao, CTO, RANK Software
    Brian Laing, SVP, Corporate Development & Strategic Alliances, Lastline
    Thomas Fischer, Security Advocate and Threat Researcher
  • ISSA International Series: Breach Report- Review the Various Breach Reports
    ISSA International Series: Breach Report- Review the Various Breach Reports
    ISSA International Recorded: Apr 23 2019 117 mins
    This session will cover the traditional breach reports as well as a new style of reports and analysis.

    Moderator:
    Matt Mosley, Vice President of Security Products, Devo

    Speakers:
    Scott Parker, Sr. Principal Systems Engineer, Symantec
    Gabe Chomic, President, ISSA-UK
    Gary Marsden, Senior Director, Data Protection Services, Gemalto
  • Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React
    Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React
    ISSA International Recorded: Apr 17 2019 56 mins
    In this session, ExtraHop Deputy CISO Jeff Costlow will discuss how security operations teams can escape the cycle of reactivity characterized by constantly responding to a flood of alerts, and move toward a more proactive stance by using the right data sources and workflows, driven by network traffic analysis, to focus on developing proactive capabilities like continuous encryption auditing, policy auditing, and more advanced use cases like threat hunting.

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management for Farmers Insurance

    Speakers:
    Jeff Costlow, CISO, ExtraHop
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions.
  • Up Up and Away: Why The Modern SOC is Rooted in the Cloud
    Up Up and Away: Why The Modern SOC is Rooted in the Cloud
    ISSA International Recorded: Apr 12 2019 49 mins
    Today’s SOC teams are struggling to gain efficiencies that are grounded by the limitations of legacy, on-premise technologies. As a result, organizations are turning to cloud-based solutions to offer the flexibility and scalability they need to keep pace with the modern threat landscape.


    It is critical that we explore the difference between cloud-native and cloud-based security operations center (SOC) technologies. From ensuring that you gain the performance and simplicity your team needs to fully leverage big data analytics to understanding the role that third party integrations will play in your evaluation, we’ll leave you thinking about the questions to consider as you evaluate new SOC technologies.

    Join JASK Vice President of Product Marketing Ken Liao and VP, Field Operations Andrew Maloney to learn about how migrating to a true cloud-platform solution can help your SOC organization with:


    - Improved automation of existing analyst workflows

    - Better visualization of big data analytics

    - Rapid integrations and improved context around threat details

    - Lower total cost of ownership and rapid innovation

    Speakers:
    Ken Liao- VP, Product Marketing, JASK
    Andrew Maloney VP, Field Operations, JASK
    Mark Gelhardt, VP, Technology Governance for US Bank
  • High Assurance Digital Identity in Zero Trust Architecture
    High Assurance Digital Identity in Zero Trust Architecture
    ISSA International Recorded: Apr 10 2019 58 mins
    The Zero Trust Architecture model accepts that secure data can no longer be adequately protected by network perimeter firewall design because there is no longer a physical network perimeter to protect. Digital entities (people and things) cannot be trusted until they have been authenticated through integrated digital ID services. High assurance digital identity has quickly become the center of IT cybersecurity. Fortunately, there are several side benefits to solving this security challenge.

    Moderator:
    Kurt Seifried, Chief Blockchain Officer and Director of Special Projects
    Cloud Security Alliance

    Speaker:
    John MacInnis, Product Marketing Manager, Identity & Access Management Solutions (IAMS), HID Global

Embed in website or blog