Hi [[ session.user.profile.firstName ]]

SCIPP International

  • Date
  • Rating
  • Views
  • CMDSP - Mobile Security for the Mobile IT Administrator
    CMDSP - Mobile Security for the Mobile IT Administrator Ken Lloyd, CMDSP's Board members and CTO for Mi3 Security. Recorded: Aug 10 2017 54 mins
    ITPG Secure Compliance's Cybercast series proudly presents : CMDSP - Mobile Security for the Mobile IT Administrator.

    Come join us for a discussion on the advent of the Mobile IT Administrator position, and how CMDSP is helping organizations improve their enterprise mobility management strategy.

    ITPG Secure Compliance has invited Mr. Ken Lloyd, CMDSP's Board members and CTO for Mi3 Security, a leader in Mobile Application Risk Intelligence and Mobile Threat Defense. With 18 years focused on creating powerful Mobile and Security solutions for Enterprises, SMB's and Consumers. Recognized as a Subject Matter Expert (SME) in Mobile Security, Security Awareness and IT Security.
  • Human Factors in Cyber Security
    Human Factors in Cyber Security Dr. Calvin Nobles Recorded: Aug 10 2017 74 mins
    We discussed Human Factors in Cyber Security. The discourse surrounding human performance in cyber security remains a relevant topic; nevertheless, the scientific underpinning remains deficient. Human error is the primary contributing factor that leads to malicious activity in cyber security. Other domains such as aviation, healthcare, and nuclear power have capitalized on human factors to reduce accidents and to identify critical phases of operations; consequently, the cyber security sector trails behind the above-mentioned industries in leveraging human factors.

    The aim of this presentation is leveraging organizational culture as a platform to address human factors in cyber security. The continuous integration of technology accompanied by (a) advanced persistent threats, (b) ransomware attacks, (c) data breaches, and (d) cyber-attacks increases and threatens the complexity of cyber security operations.

    Included are examples of conceptual processes, models, and frameworks to influence cyber leaders and professionals to mandate the integration of human factors in cyber security.

    Keynote Speaker:
    Dr. Calvin Nobles, Ph.D. is a cyber security subject matter expert (SME), national security leader, researcher, practitioner, and educator with more than 20 years of experience. Culminating a career of military service at the national level in 2017, as a cyber security executive and cyber consultant. He is an adjunct faculty member at the University of Maryland University College and Indian Wesleyan University. Calvin is actively involved in the cyber community, volunteering with multiple professional associations and conducting cyber security research. Calvin is the author of the book, Exploring the Implications of Implementing Technologically Advanced Aircraft in General Aviation.
  • Web Application Testing
    Web Application Testing Ben Pick - Coveros Recorded: Aug 9 2017 124 mins
    We discussed Web Application Testing. Web applications provide a vulnerable window into internal enterprises. These applications often process and use poorly validated input. This presentation discusses methodologies to identify and exploit such vulnerabilities within the applications.

    The target audience for this talk ranges from those with limited prior knowledge of web application testing to those with a moderate understanding.

    Keynote Speaker(s):
    Mr. Ben Pick has 8 years of security and development experience including vulnerability assessments of web and mobile applications, analyzing source code for security risks, and configuring architecture to monitor systems for anomalous activities. For the past few years, Ben has worked to incorporate security into DevOps environments by merging security tools within the software development lifecycle. This includes automating static code analysis and vulnerability tools on development environments which act as supplemental resources for manual tests.
  • SOC Analyst Fundamentals
    SOC Analyst Fundamentals Tyrone E. Wilson - Founder, and CEO of Cover6 Solutions Recorded: Aug 4 2017 129 mins
    We discuss defensive tools/techniques to understand SOC Analyst fundamentals and why SOC Analysts are so highly sought after with the increasing hacking incidents. When most people hear "hacking", they think of offensive tools and software, but defensive tools play a big part in incident prevention, handling, response/recovery and forensics. This webinar is suitable for both beginners and seasoned professionals.

    Keynote Speaker(s):
    Tyrone E. Wilson - Founder, and CEO of Cover6 Solutions 19 years of experience focusing on Information Systems and Network Security. Wilson has extensive expertise in multiple areas of the cyber field including, but not limited to, network defense, cyber threat analysis, penetration testing/vulnerability assessments, and IPv6. Wilson has a passion and a mission for spreading knowledge to all that he can reach about everything that he’s acquired through his years of experience.

    Candan Bolukbas is digital polymath and Certified Ethical Hacker. Candan fully appreciates the growing threat to digital communications and data accumulation which affects all of us. He is co-founder and chief technology officer for NormShield, Inc., a McLean-based “security-as-a-service solutions” company. Candan and NormShield’s primary focus is on cyber threat intelligence, vulnerability management and perimeter monitoring.
  • Protecting identity perimeter of modern enterprises
    Protecting identity perimeter of modern enterprises Shri. P. & Alex Buffington Recorded: Jul 19 2017 28 mins
    Come join a discussion on how identity has become the new enterprise perimeter now and learn how to protect it against 95% of all security breaches that often start with compromised identity.
  • Dark Web AI is bringing Dark Web Intelligence to your desktop
    Dark Web AI is bringing Dark Web Intelligence to your desktop Ross Everett and Larry Lafferty Recorded: May 18 2017 60 mins
    Come join a discussion with two industry leaders in the converging worlds of Dark Web Scanning and Artificial Intelligence. Learn how Intelligent agents can work from your desktop to scan the dark web for your stolen data.
  • Building Your NY State Financial Services Cyber Compliance Plan
    Building Your NY State Financial Services Cyber Compliance Plan David Kim. ITPG Secure Compliance SVP | Governance Risk and Compliance Recorded: Mar 13 2017 32 mins
    What, Why, How, & When to comply with the
    Dept. of Financial Services 23 NYCRR 500 – Cybersecurity Requirements
  • PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply
    PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply David Kim. ITPG Secure Compliance. SVP, Governance Risk and Compliance Recorded: Jan 12 2017 53 mins
    Your organization has little over a year to comply with the new PCI DSS v3.2 standard. If you have yet to assess your current security controls against these new standards, it’s time to start. We’ll highlight the key changes, the issues to think about, and the time required to assess, plan and implement. As a PCI Qualified Security Assessor, we know what can trip organizations up and how to avoid missteps.

Embed in website or blog