Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Zero to Hero: Blissfully Ignorant to Risk Focused
    Zero to Hero: Blissfully Ignorant to Risk Focused Casey Reid, Principal Security Engineer, Tenable Recorded: Jul 19 2018 36 mins
    Innovation is the key to survival in today's Digital economy. Providing fresh content in new ways to broader markets is expanding the attack surface. The adoption of DevOps, cloud proliferation and enterprise IoT has added significant challenges to understanding your Cyber Risk.

    In this webinar Casey Reid, Principal Security Engineer at Tenable will talk about:
    - Why there no such thing as "Secure"
    - How the "Race to Zero" is killing your productivity and increasing your Cyber Risk
    - How "Chasing the Zero Day" could be a big waste of time
    - What it takes to be Risk focused: Going from Zero to Hero

    About the Speaker:
    Casey Reid is a Principal Security Engineer at Tenable, responsible for helping enterprise customers reduce their Cyber Exposure and strengthen their Vulnerability Management program. He is an energetic, outspoken, problem solver and hobby hacker with over 15 years of diverse technical experience. When he's not learning new technologies or hacking in his lab, he is competing at local CrossFit competitions and Obstacle Course Races such as the World's Toughest Mudder.
  • Two Companies Walk into a Bar: Cyber Risk for the C-Suite
    Two Companies Walk into a Bar: Cyber Risk for the C-Suite Cynthia Wright, CEO at Synthus Recorded: Jul 19 2018 51 mins
    It's become a truism among cybersecurity professionals that there are two types of companies: those that have been hacked and those that will be. If cyber incidents are inevitable, what can organizations do to pro-actively minimize the impact on their operations? This session addresses considerations for organizations addressing cyber-risk at the strategic level.
  • Threat Hunter: Implications of an Active Cyber Defense
    Threat Hunter: Implications of an Active Cyber Defense Griff James (Damrod Analysis) | Wyatt Hoffman (CEIP) | Will Lymer (Loki Labs) | Philip Thomas (Reed Smith) Recorded: Jul 18 2018 62 mins
    It is beyond the ability or willingness of the world’s governments to protect and secure information technology. What role then can the private sector play in making cyberspace safer? Can private enterprises do anything to strike back at attackers, curtailing their freedom of action and raising the costs of malicious activity?

    Consisting of academics and industry experts, this panel will explore the potential for active cyber defence to impede and deter malicious activity and the conditions under which it could be conducted responsibly.

    - Griff James, Director at Damrod Analysis
    - Wyatt Hoffman, Research Analyst, Cyber Policy Initiative at Carnegie Endowment for International Peace
    - Will Lymer, Chief Growth Officer at Loki Labs
  • Trends in Security Analytics & Threat Intelligence
    Trends in Security Analytics & Threat Intelligence Anupam Sahai (Cavirin) | Setu Kulkarni (WhiteHat Security) | Yiyi Miao (OPSWAT) Recorded: Jul 17 2018 56 mins
    Discover the trends in security analytics technology and how leveraging threat intelligence can help organizations on their journey to cyber resilience.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
    - What's new on the threatscape
    - How to leverage security analytics to investigate and hunt modern threats
    - How cyber threat intelligence helps organizations understand their risk of external threats
    - CISO recommendations for improving security

    - Anupam Sahai, Vice President of Product Management, Cavirin
    - Setu Kulkarni, VP Product & Corporate Strategy, WhiteHat Security
    - Yiyi Miao, VP Products, OPSWAT
  • Best Practices for Securing Your Enterprise
    Best Practices for Securing Your Enterprise Sushila Nair (NTT DATA Services) | Sergio Caltagirone (Dragos) | Chris Sestito (Cylance) | James Ignacio (JFI Cyber) Recorded: Jul 17 2018 58 mins
    Cybercriminals are constantly innovating ways to infiltrate your organization, and steal your valuable data. With an ever expanding attack surface, security professionals are struggling to secure the enterprise.

    Join this roundtable discussion with top security experts to learn more about:
    - What's new on the cyber threat landscape
    - Why cyber threat intelligence Is more critical than ever
    - How to prevent and protect against breaches
    - What tools and approaches should security teams use
    - Why network visibility and actionable data about attackers is key
    - Best practices and expert recommendations on improving your enterprise security

    - Sushila Nair, Sr. Director, NTT DATA Services
    - Sergio Caltagirone, Director of Threat Intelligence, Dragos
    - Chris Sestito, Director of Threat Research, Cylance
    - James Felix Ignacio, Founder & CEO, JFI Cyber Solutions
  • Maximising SoC Effectiveness With Advanced Threat Intelligence
    Maximising SoC Effectiveness With Advanced Threat Intelligence Amar Singh Recorded: Jul 17 2018 60 mins
    Running a security operations is not a simple undertaking. It takes skilled staff, technology, processes and procedures and loads of practice. In addition, actionable contextual threat intelligence is key when it comes to ensuring the SoC and its teams are affective in early detection of attacks.

    The key word here is EARLY detection. Join Amar Singh and his special panelists as they discuss some of the key pillars of threat intelligence and how to make them work in any SoC environment.
  • Building a Risk-Based Business Case for Cybersecurity
    Building a Risk-Based Business Case for Cybersecurity Johna Till Johnson, CEO & Founder, Nemertes Research Recorded: Jul 11 2018 54 mins
    Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk.

    But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they can build the case for cybersecurity tools, staffing, and initiatives in a way that business professionals will understand--and fund.
  • What Does “Next Generation Security” Mean To You?
    What Does “Next Generation Security” Mean To You? Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Jul 3 2018 31 mins
    Although overused, Next Generation Security still means keeping up with the challenges of securing today’s networks. The fundamental rule of keeping up with those challenges is having both a vision and an architecture that provides the foundation, regardless of how the market or the threats themselves change.

    This session will focus on what is needed in an evolving security architecture to provide Next Generation Security in a constantly changing environment.
  • [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program
    [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program Rebecca Herold. Panel: Jake Olcott, BitSight; Todd Boehler, ProcessUnity; Matt Kunkel, LogicGate; Scott Schneider, CyberGRX. Recorded: Jun 26 2018 76 mins
    As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.

    Learning objectives:

    • Find out how to gain executive leadership buy-in for your VRM program.
    • Learn how to perform quantifiable vendor security analyses.
    • Discover how to leverage Automation to Scale your VRM program.
  • Increasing Cyber Workforce Diversity
    Increasing Cyber Workforce Diversity Max Shuftan, Jessica Gulick and other panelist Recorded: Jun 20 2018 64 mins
    Join this webinar to hear from past students and current champions discuss how the SANS CyberTalent program is changing lives and closing the workforce gap. The cybersecurity workforce gap can be partly solved through increasing diversity. Organizations like SANS CyberTalent and the WSC are reaching into communities throughout Maryland and the US searching for professionals with technical appitude but new to cybersecurity.

    These academies are designed to help qualified veterans and women receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the students selected.

    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • Hear from a recent graduate who will share her experience
    • How this training academy and related certifications can help your career

Embed in website or blog