Hi [[ session.user.profile.firstName ]]

Katzcy Consulting

  • Date
  • Rating
  • Views
  • Cybersecurity Trends & Impacts in 2018 and Beyond
    Cybersecurity Trends & Impacts in 2018 and Beyond Dan Waddell, President, ISC-2 Northern Virginia Chapter Recorded: May 23 2018 49 mins
    Join this expert panel as they discuss their thoughts and predictions for the remainder of 2018 and beyond about how the cybersecurity arena is impacting, and is impacted by, human and workforce behavior, machine learning, threats and procedures, software assurance, supply chain risk, and more.

    The panel will consist of the Board of Directors of the Northern Virginia Chartering Chapter of (ISC)2, including:
    * Dan Waddell, President, NoVA (ISC)2 and Senior VP at Zeneth Technology Partners
    * Ed Covert, Lead Enterprise Security Architect, Deutsche Bank
    * Joe Jarzonbek, Director for Government, Aerospace & Defense Programs at Synopsys, Inc.
    * David Rubal, Sr. Account Executive, DoD Modern Infrastructure, Dell Technologies
  • Is Threat Hunting the Next Frontier: Separating the Hype from the Reality
    Is Threat Hunting the Next Frontier: Separating the Hype from the Reality Dr. James Stanger Chief Technology Evangelist, CompTIA Recorded: May 3 2018 78 mins
    One of the more interesting-sounding job skills today is that of the “threat hunter.” Let’s talk about the activity of “threat hunting,” and deconstruct it a little bit. The idea behind threat hunting is to proactively look for adversaries and for traces of their activity. So, is threat hunting all that it’s cracked up to be? Is looking for trouble really the best approach today? It’s very possible that the one key element of threat hunting is one fundamental assumption: That you’ve already been hacked, but you just don’t quite realize it yet. In this presentation, James will discuss the benefits and drawbacks of “active defense,” and where it fits in with other security activities.
  • Pragmatic Security: Balancing Investment and Protection
    Pragmatic Security: Balancing Investment and Protection Pete Clay, Katzcy Consulting Advisory Board member Recorded: Apr 26 2018 53 mins
    With the volume of attacks growing, the mutations and variations in attack methods broadening, and a seemingly endless catalog of defensive solutions available, it can be difficult to prioritize your security investments and operations. Join our cyber defense experts to hear tips on how to cut through the noise, effectively identify the most likely and riskiest attacks and thwarting them efficiently through balanced and targeted investment in resources, time and technology.

    About the Speaker:
    Pete Clay, Katzcy Consulting Advisory Board member, is a 20+ year veteran in the cybersecurity industry with experience in security operations, mergers and acquisitions, cyber policy, risk management, and program management.
  • Gamification and Security: The Role of Competitions in Readiness and Defense
    Gamification and Security: The Role of Competitions in Readiness and Defense Lisa Jiggetts, Founder, President & CEO of the Women's Society of Cyberjutsu Recorded: Apr 26 2018 57 mins
    Security operations face intensifying pressures along numerous fronts, including a constantly shifting threat landscape, an increasingly complex environment to defend, and an extreme shortage of skills. This panel of distinguished security experts will discuss the role that competitions – at the primary school, collegiate and professional levels – can play in attracting workers to the security arena, growing their skills, and developing methods to identify and defend against the greatest threats and risks of the day.

    Lisa Jiggetts, the Founder & CEO of the Women's Society of Cyberjutsu, one of the fastest growing nonprofits dedicated to women in cybersecurity, will spearhead this panel of experts is cyber security and competitions.

    Other panelists include Mika Devonshire, Director of Forensics and Cyber Risk Analytics at SSIC; Marcelle Lee, Threat Researcher at LookingGlass Cyber Solutions; and Dan Manson, Professor of Computer Information Systems at Cal Poly Pomona.
  • [Live Interview from RSA] Mary Writz on AI and Machine Learning Security Trends
    [Live Interview from RSA] Mary Writz on AI and Machine Learning Security Trends Mary Writz, Director of Product Management at Micro Focus Recorded: Apr 17 2018 21 mins
    Join Mary Writz, Director of Product Management at Micro Focus for a live interview with Jessica Gulick, Founder & CEO of KATZCY from RSA 2018 as they discuss everything from the conference, cybersecurity trends and AI and Machine Learning.
  • Innovate Faster with Collaborative Security
    Innovate Faster with Collaborative Security Nathan Vega, Vice President, Business & Product Development, Columbus Collaboratory Recorded: Apr 5 2018 35 mins
    This webinar will review collaboration amongst trusted security peers will enable your business to create a material advantage for your defenders, increase the speed of technology adoption in your security practice, and improve the economics of adopting those technologies. The Columbus Collaboratory partnered with Forrester Research to study the challenges and requirements of security leaders across industries. We will present how shared intelligence, shared processes and shared technologies can speed the adoption of best practices and generate residual technology benefits across your organization.

    About the Speaker:
    Nathan Vega, Vice President, Business & Product Development for Columbus Collaboratory is responsible for bringing to market products and services in cybersecurity and analytics. Nathan's career began his at IBM where he specialized in design thinking, social business adoption, Pragmatic Marketing, and executive communications. Nathan held many roles during his 15 years at IBM, culminating in Offering Management for Bluemix, IBM's cloud platform, where he successfully brought Watson to market exposed through set of APIs.
  • GDPR and you! Perfect together....?
    GDPR and you! Perfect together....? Joshua Marpet. Red Lion, COO/Founder Recorded: Mar 29 2018 58 mins
    GDPR is a huge topic, with issues ranging from "What does it mean to my business processes?" to "Do I have to care about it?" And that's besides the technical bits! Together, let's explore what it means for a sample company. We'll discuss data, geography, and business processes. You'll learn about some of the pitfalls, and some of the opportunities inherent in GDPR. And maybe we can make it work for you, instead of causing a headache. Want to find out? Just show up.

    Joshua Marpet is an accomplished speaker, long time information and physical security practitioner, as well as a start up CEO and serial entrepreneur.
    He has presented on topics ranging from Facial Recognition to National Security, to audiences from government agencies, law enforcement, Fortune 5 companies, and many others. His research encompasses Digital Forensics, business security maturity, and how not to start an information security business!

    Joshua has been in the hot seat, at all levels of IT and Infosec. From the Federal Reserve, to law enforcement, to being an entrepreneur, Josh has been there. Let's talk.
  • The Best Defense Is An Offense-Informed Defense
    The Best Defense Is An Offense-Informed Defense Jeff Schmidt, VP & Chief Security Officer, Columbus Collaboratory Recorded: Mar 27 2018 43 mins
    In this session, you will learn how an offense-informed defense approach will enable your security team to cut through the noise, be more effective at both identifying the most likely and riskiest attacks and thwarting them faster at less cost. We will discuss how to understand not only the attack vectors, the attackers’ tactics, techniques and procedures but also the residual effects so that, in an environment of almost immeasurable alerts and alarms, your team can focus on the indicators that are the most important.

    Jeff Schmidt, VP and Chief Cyber Security Innovator at Columbus Collaboratory is an accomplished cybersecurity expert with a background in security and risk management. He founded JAS Global Advisors LLC, a security consulting firm in Chicago, and Authis, a provider of innovative risk-managed identity services for the financial sector. Jeff is a board member for Delta Risk LLC, A Chertoff Group Company, a global advisory firm focused on security and risk management. In 1998, he worked with the FBI to create the InfraGard Program, receiving commendations from the Attorney General and the Director of the FBI. He is an adjunct professor of systems security engineering at the Stevens Institute of Technology and a Zurich Cyber Risk Fellow, Cyber Statecraft Initiative, at The Atlantic Council. Jeff received a Bachelor of Science in computer information systems and an MBA from the Fisher College of Business at The Ohio State University.
  • Career Conversations w/ Debra J Farber - Privacy Guru
    Career Conversations w/ Debra J Farber - Privacy Guru Debra J. Farber, Privacy Guru and Jessica Gulick, WSC Vice President Recorded: Mar 22 2018 59 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Debra J Farber, CISSP-ISSMP, CIPP/US, CIPP/E, CIPT, CIPM, FIP | Executive Consultant & U.S. Chief Privacy Office, CRANIUM

    Hosted by: Jessica Gulick, WSC Vice President, CEO of Katzcy Consulting

    About the Speaker:
    Debra J. Farber (@privacyguru) is a data privacy and information security executive and entrepreneur with 13+ years of data strategy, operations, public policy, training, product, and compliance experience across industries and frameworks. She's Executive Consultant & U.S. Chief Privacy Officer, at CRANIUM, an EU-based privacy and security consulting firm with offices in Brussels, Utrecht, Budapest, NYC, & San Francisco. She also serves as an Executive Consultant and External DPO for CRANIUM's many clients.

    Based in San Francisco, Debra serves on several industry working groups and startup advisory boards. She is a member of the IEEE Data Privacy Process Standards Working Group, IAPP CIPT Exam Development Advisory Board, and privacy tech vendor BigID's Advisory Board. In addition, Debra serves as Editorial Board Member for Cyber Security: A Peer-Reviewed Journal. She also co-founded the SF-based non-profit project, Women in Security and Privacy (WISP).
  • The Future of Passwords
    The Future of Passwords Hamza Sirag Recorded: Mar 22 2018 58 mins
    This webinar will provide an overview of the future of passwords. Passwords have become very important, protecting a treasure trove of information. You will get an inside look at the techniques and tactics used conduct password attacks. We will discuss the various countermeasures available, new improvements made to the latest operating systems to prevent successful password attacks, and how the industry is trying to eliminate passwords. We will conclude by discussing ways we can potentially circumvent new countermeasures.

    Hamza Sirag Hamza is currently an Information Security consultant. He has spent the majority of his time immersed in the world of cybersecurity. He has had the opportunity to lead complex penetration tests for a variety of federal and commercial clients. He is the founder of Beltway Hackers, a Northern VA based meetup group focused on offensive cybersecurity. https://www.meetup.com/Beltway-Hackers

Embed in website or blog