Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Detecting Network Threats: What Can Endpoint Data Tell You?
    Detecting Network Threats: What Can Endpoint Data Tell You? Greg Foss, Security Architect, LogRhythm & Chris Berninger, Senior Systems Engineer, Carbon Black Recorded: Mar 28 2017 60 mins
    Data-driven security is the future, but alarm fatigue and data overload continue to hold Security Operations teams back. Fortunately, there are some easy ways to organise and correlate data so you can simplify the threat hunting process and free up your resources to better detect, respond and neutralise advanced threats.

    In this webcast, Greg Foss, Security Architect at LogRhythm, and Chris Berninger, Senior Systems Engineer at Carbon Black, discuss how to proactively search for and detect threats in your network.

    You’ll learn:

    • To use endpoint data to gain visibility into your network and understand what’s really going on in your network
    • How LogRhythm SmartResponse can help orchestrate security operations
    • Threat hunting techniques using Carbon Black within LogRhythm

    Register now to discover how to use insights from endpoint data to best protect your organisation from advanced attacks.
  • Learn: SANS CyberTalent Women's Immersion Academy (Cybersecurity Training)
    Learn: SANS CyberTalent Women's Immersion Academy (Cybersecurity Training) Sonny Sandelius, SANS CyberTalent Division Recorded: Mar 27 2017 63 mins
    Join the SANS Institute and WSC for an insightful presentation about the SANS CyberTalent Women’s Immersion Academy. This academy is designed to help qualified women receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the selected women who attend and includes training and certification.

    Applications are due by April 5th, 2017.

    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • Hear from a recent graduate who will share her experience
    • How this training academy and related certifications can help your career
  • Machine Learning Can Address the Most Pressing Security Challenge
    Machine Learning Can Address the Most Pressing Security Challenge Kasey Cross, Director of Product Management at LightCyber Recorded: Mar 23 2017 51 mins
    Noise is the enemy of breach detection and response. After a major data breach it is often the case that signs of an attacker existed, but were buried in thousands of other security alerts that were mainly false positives.

    With machine learning, meaningful signs of an attack are more easily detected and isolated, so a security operator can focus on precisely the right issue.

    This session will examine:
    - The problem of noise
    - The role of machine learning in sifting through vast amounts of data to get to the fidelity needed to detect an attacker
    - Best practices for including machine learning in your security operations

    About the Presenter:
    Kasey Cross is a Sr. Product Marketing Manager at Palo Alto Networks, joining this month through the acquisition of LightCyber. She has over 10 years of experience in marketing positions at cybersecurity companies including Imperva, A10 Networks, and SonicWALL. She was also the CEO of Menlo Logic and led the company through its successful acquisition by Cavium Networks. She graduated from Duke University.
  • Are Your Security Solutions Simple and Efficient to Use?
    Are Your Security Solutions Simple and Efficient to Use? David Morris, Ulf Mattsson and Alex Pezold Recorded: Mar 23 2017 57 mins
    As the adoption of cloud computing increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your firewall. This makes your data blind spots more dangerous than ever—both for your internal data and how customers and clients handle their vital information outside your cloud systems. To protect your business, you need a balanced approach to security—combining compliance, responsiveness, and engineering without sacrificing usability and agility.

    Join this presentation to learn how your security solutions measure up when it comes to simplicity and efficacy.
    - Do you know what data you have, where it is, and how to protect it?
    - Do your data security solutions work seamlessly inside your environment? Are you able to secure multiple business units, ERP’s, etc.?
    - Does it play nice with fraud prevention, analytics, data sharing, etc?
    - Does your data security solution achieve PCI compliance as promised?
    - Does your data security solution secure ALL data sets that are a threat to your organization?
  • BrightTALK at RSA 2017: Chenxi Wang on Diversity and the Future of Cyber Warfare
    BrightTALK at RSA 2017: Chenxi Wang on Diversity and the Future of Cyber Warfare Chenxi Wang, Founder of The Jane Bond Project & Josh Downs, Community Manager, BrightTALK Recorded: Mar 23 2017 11 mins
    BrightTALK caught up with Chenxi Wang, Founder of The Jane Project and Twistlock's Chief Strategy Officer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo Breach and some of her suspected reasons why
    - The influence of the supposed Russian US election hack and what it means for cyber warfare
    - Diversity in the cyber industry and how it can be improved
    - AI & Machine learning and use cases for security
    - The key vulnerabilities in IoT networks that we should be thinking about
  • #Vault7 Happened. There’s No Going Back. Now What?
    #Vault7 Happened. There’s No Going Back. Now What? Tony Busseri/Route1, Nick Bilogorskiy/Cyphort, Darin Andersen/CyberTECH, Jonathan Dambrot/Prevalent, James Carder/LogRhythm Recorded: Mar 22 2017 60 mins
    It's alleged that the CIA developed tools designed to spy on people, taking advantage of weaknesses in smart connected devices such as smart phones, smart TVs, smart personal assistants, and other household IoT technologies.

    In this discussion, we do a walk-through of what happened, what didn't happen, what systems and devices are impacted, and what data is involved in the leaks. Most importantly, we'll get some insight into what the larger societal impact of this could be.

    Join us for this in-depth conversation to learn:
    - Where stuff broke down.
    - Who is impacted, how are they impacted, and what’s at risk.
    - What the government can do to help.
    - What the commercial InfoSec community can do to help.
    - What consumers need to know to help (protect) themselves.

    Darin Andersen, Chairman & Founder, CyberTECH
    Nick Bilogorskiy, Sr. Director of Threat Operations, Cyphort
    Tony Busseri, CEO, Route1 Inc.
    Jonathan Dambrot, CEO & Co-Founder, Prevalent
    James Carder, CISO & VP of LogRhythm Labs

    Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
  • WikiLeaks Vault 7:  Facts, Fiction & Implications
    WikiLeaks Vault 7: Facts, Fiction & Implications Vince Tocce (Vince in the Bay), Jake Kouns (Risk Based Security), Kenesa Ahmad (WISP) Recorded: Mar 22 2017 61 mins
    Wikileaks recently published a throve of documents, "Vault 7 Year Zero", which they claim expose a wide-ranging hacking tools used by the Central Intelligence Agency (CIA). If true, these cyber-weapons include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. In some cases, it might use smart TVs and other IoT devices in cyber surveillance and espionage.

    Join this panel discussion and find out more about the Vault 7 leak:
    - Truth / Fiction
    - How likely are you to get hacked
    - Security and privacy implications
    - Long-term effect across the tech industry and its relationship with government agencies

    Vince Tocce a.k.a. Vince in the Bay

    Jake Kouns, CISO of Risk Based Security
    Kenesa Ahmad, Chair of Women in Security and Privacy (WISP)
  • The Advantages of User ID/Awareness in Public Sector Network Security
    The Advantages of User ID/Awareness in Public Sector Network Security Neil Mantle - Systems Engineer - Palo Alto Networks Recorded: Mar 21 2017 32 mins
    To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. Traditional network security focuses on detecting outsiders attempting to steal data or disrupt network operations, but does little to monitor or limit the actions of legitimate users that make mistakes or deliberately misuse data. User and directory controls verify legitimate users, but they won't prevent accidental disclosure of sensitive data, exfiltration of sensitive data by legitimate users, or insiders with stolen credentials from accessing data. Preventing security incidents and protecting government information requires a comprehensive, organization-wide access approach that can accommodate the context of individual users, the data they need access to, and the limits on what they can do with that data.

    The Palo Alto Networks Next-Generation Security Platform prevents security incidents while fully enabling user productivity by granting access contextually to those who need it, and denying it to all others. This, coupled with denying all applications that are not needed by the organization, immediately reduces a government organization’s threat posture. Join us to learn more.
  • Privacy and Security in the U.S.: The Times They Are a-Changin’
    Privacy and Security in the U.S.: The Times They Are a-Changin’ Tamara Dull, ‎Director of Emerging Technologies at SAS Institute Recorded: Mar 21 2017 37 mins
    No matter how you feel about Edward Snowden, we could probably all agree that he played a significant role in bringing the privacy and security discussion to the Town Square. His actions have triggered a lot of discussions—within the U.S. government and outside, most notably with the tech industry and its citizens. But has anything changed? And how are things changing now that the United States is under a new administration?

    Join Tamara Dull in this webcast as she highlights key events since Snowden’s revelations, where we’re at today, and what’s on the horizon as we move forward with the Trump administration.

    About the Presenter:
    Tamara Dull is the Director of Emerging Technologies for SAS Best Practices, a thought leadership team at SAS Institute. Through key industry engagements, and provocative articles and publications, she delivers a pragmatic perspective on big data, the Internet of Things, open source, privacy, and cybersecurity. Tamara began her high-tech journey long before the internet was born, and has held both technical and management positions for multiple technology vendors and consultancies, and a non-profit. She is listed in the IoT Institute's "25 Most Influential Women in IoT," as well as the "Big Data 2016: Top 100 Influencers and Brands" and "Top 100 Big Data Experts to Follow in 2016" lists.
  • Cloudbleed: Facts, Implications & Next Steps
    Cloudbleed: Facts, Implications & Next Steps Chris Roberts (Acalvio), Ted Eull (NowSecure), Nathan Wenzler (AsTech), RJ Gazarek (Thycotic) Recorded: Mar 21 2017 63 mins
    Cloudbleed - a major security breach from the web services and security company Cloudflare, may have leaked user passwords and other information to thousands of websites over a period of six months. Join this Q&A session with trusted experts and discover how Cloudbleed may affect you, your organization and the industry as a whole.

    - Chris Roberts, Chief Security Architect at Acalvio Technologies

    - Nathan Wenzler, Chief Security Strategist at AsTech Consulting
    - Ted Eull, VP Privacy and Risk at NowSecure
    - RJ Gazarek, Product Manager at Thycotic

Embed in website or blog