Hi [[ session.user.profile.firstName ]]

ISACA Online Events

  • Date
  • Rating
  • Views
  • Becoming the Boss: 10 Key Steps for Advancing to Executive Management Becoming the Boss: 10 Key Steps for Advancing to Executive Management Danny M. Goldberg, CPA, CISA, CGEIT, CRISC, Founder of GoldSRD Recorded: May 19 2016 58 mins
    The step up into management seems to be a long and far off leap for many staff. Many obstacles, office politics, managing people, working well within in teams….lots of variables come into play. This webinar will take attendees through key steps that every staff should take to advance their careers.

    Objectives (You’ll Learn):
    • Basics of managing teams and personnel and the key to good relationships
    • How to further your business acumen at your organization
    • Learn to weather the storm of office politics
    • Effectiveness of asking simple questions
  • How to Get Away With Data (Exfiltration) How to Get Away With Data (Exfiltration) Itzik Kotler, CTO and Co-founder, SafeBreach Recorded: May 12 2016 56 mins
    The last phase of the cyber kill chain – before attackers get away with your "crown jewels" – is data exfiltration. Yet, many companies aren't focused enough on this phase. In this webinar, SafeBreach CTO and Co-founder Itzik Kotler demonstrates unique attacker data exfiltration techniques, and shares best practices on how to proactively and preemptively identify breach scenarios in your environment before an attacker does.

    You will learn:
    • Enterprise trends and risky behavior from real-world SafeBreach deployments.
    • Attacker techniques for data exfiltration.
    • Strategies to proactively identify breach scenarios.
  • The Inverted Cloud of Operability The Inverted Cloud of Operability Professor John Walker, Nottingham Trent University Recorded: Apr 20 2016 56 mins
    At time of introduction, cloud was seen by some as outsourcing Mk2, which at times was considered to be synonymous with insecurity, associated with off-perimeter infrastructures, within which companies would potentially store and process some of their most valuable assets. More concerns were also raised relative to the legal challenges, IPR, and other such implied exposures when interfacing commercial assets with none company actors and service providers.

    In this webinar we will commence by investigating the evolution of cloud, and move on to identify some of the positives of embarking on a cloud mission, and look at the negatives which may be encountered along this route. We will seek to expand the conversation into the realms of service delivery, contracts, SLA’s, legalities, incident response, escrow, and of course security.

    To underpin this session, let us consider the entry strapline:

    The selection of a quality cloud provider can bring multiple benefits to the operations of any business. However, the selection of a low quality cloud provider can represent the worst case nightmare scenario. Let us discuss.
  • Protecting the Software Defined Data Center Protecting the Software Defined Data Center Dale R. Gardner, CA Technologies PAM, and Jeremiah Cornelius, Senior Security Architect, VMware Recorded: Apr 14 2016 62 mins
    Virtualized network systems are inherently more secure than physical networks, since what is deployed can be known with absolute certainty – and therefore can be precisely identified and secured. And because the network is defined in software, connections can be securely defined only as a consequence of policy – rather than trying to add policy to physical network links after they’ve been deployed. Security is built in, rather than bolted on after the fact.

    Network virtualization platforms for the Software-Defined Data Center (SDDC) bring the operational model of a virtual machine to your data center network, transforming the economics of network and security operations. This allows you treat your physical network as a pool of transport capacity, with network and security services attached to VMs with a policy-driven approach. Adding specialized protections to monitor and control the activities of privileged users, and to protect and secure the credentials they use are critical to achieving comprehensive security.

    Join us for this informative webcast to learn the key components required for protecting the Software-Defined Data Center.
  • EU Regulation’s Impact on Cyber Security – What is “state of the art”? EU Regulation’s Impact on Cyber Security – What is “state of the art”? Greg Day Recorded: Apr 12 2016 59 mins
    There has been much discussion on the breach disclosure requirements coming in the EU data protection reform and the Network Information Security Directive (that applies to Essential Services), yet the requirement for “state of the art” defenses get much less attention. Is this a technology requirement or broader capabilities? Typically today most see intelligence and skills and the biggest shortcoming in cyber.
    Are we being pressured to focus on response rather than prevention, just what is state of the art and how does it align with transformational cyber strategies?
  • PCI DSS: Developing Robust Trojan Defenses PCI DSS: Developing Robust Trojan Defenses Jim Seaman, Security Consultants Team Lead at Nettitude Group Recorded: Mar 31 2016 61 mins
    Legend has it that in 1200 B.C., King Agamemnon of Mycenae, led a coalition of Greek forces to lay siege against the City of Troy. The goal was to reclaim Menelaus’s wife, Helen (a queen from Sparta), who had been abducted by the Trojan Prince Paris. Troy was subjected to 10 years of hostile activities from a determined enemy, applying numerous different methods to identify and exploit any vulnerability in the city’s defenses. However, despite the best efforts of the attacking Greek forces, an array of physical defenses stood up to these actions. The barrage of attacks lasted for over 10 years, without success, and even led to the death of Achilles. This was until they exploited the failings of the human factor, where the Greeks delivered an attractive gift, containing an unknown and dangerous payload.

    This webinar will attempt to analyse the lessons learned from the Trojans and how these ancient defensive countermeasures relate to the modern day PCI DSS v3.1 controls. In addition, the webinar will introduce a comprehensive seven-stage methodology (PIE FARM) that will help business to reduce the time for successful implementation time, avoiding the 1,300 year Trojan approach. This event will help businesses appreciate the long history of effective DiD countermeasures with advice on how to implement them.
  • Evaluación de Capacidad de los Procesos de TI usando COBIT 5 Evaluación de Capacidad de los Procesos de TI usando COBIT 5 Alexander Zapata Lenis Recorded: Mar 16 2016 61 mins
    Este seminario se enfocará en la presentación del modelo de capacidad de procesos de COBIT 5 (PAM), revisando herramientas y definiendo un método efectivo para mejorar la capacidad de sus procesos de TI, de acuerdo con los requerimientos de COBIT 5 y la ISO 15504. También se presentarán las características del examen de acreditación
  • Understanding How Machine Learning Defends Against Zero-Day Threats Understanding How Machine Learning Defends Against Zero-Day Threats Vinoo Thomas Recorded: Mar 10 2016 60 mins
    Bypassing antivirus software has been an arms race that's been played out for over three decades with security vendors always trying to stay ahead of the bad guys. From monthly .DAT file updates shipped on floppy disks by snail mail to customers, to today's cloud-based reputation systems – the Anti-Malware industry has come a long way in responding to new threats quickly. However, for authoring generic or heuristic signatures, many Anti-Malware vendors still require a copy of the actual file to analyze, replicate and reverse engineer threats in order to author signatures.

    In this session we will cover machine learning as a solution for detecting 0-day threats. In particular, we will look at how:

    •machine learning can be used to overcome gaps left by traditional approaches
    •signature-less, cloud-based detection technologies leverage automated static and behavior-based classification to protect against zero-day malware
    •to best leverage this approach in your environment
  • Prediction: Security Moves from Barrier to Main Benefit of Cloud Adoption Prediction: Security Moves from Barrier to Main Benefit of Cloud Adoption Troy Kitch, Sr. Principal Director of Product Marketing, Security Software, Oracle Recorded: Feb 11 2016 61 mins
    In a recent cloud predictions article, Oracle CIO, Mark Sunday predicts “Today, the #1 reason organizations are not moving to the cloud is security. However, tomorrow, security will be one of the most important drivers to move to the cloud.” A survey by Harvard Business Review Analytic Services (sponsored by Oracle) found that 62 percent of respondents thought security issues were by far the biggest barriers to expanding cloud adoption at their companies. But those very same concerns will soon drive organizations to the cloud. Join this Oracle and ISACA webcast to learn how established cloud vendors with a solid security track record have the expertise and resources to deploy layers of defense that many companies can’t hope to duplicate in-house.
  • What the GDPR Will Mean to Global Businesses What the GDPR Will Mean to Global Businesses Frank Cindrich, Attorney Michael Hopp, Gabe Maldoff, Marshall Toburen, Nancy Cohen Recorded: Jan 28 2016 60 mins
    In recognition of Data Privacy Day – ISACA, in conjunction with the International Association of Privacy Professionals (IAPP) will host a webinar on the implications of the EU General Data Protection Regulation (GDPR).

    The GDPR will bring big changes for data protection in Europe. However, it will not only impact European organizations, but will have significant impact on all companies that operate globally. Companies need to start planning for the impact that the changes from GDPR will bring and move toward compliance sooner rather than later.

    The session will involve a panel discussion with both US and European professionals providing their perspective on the Regulation and how it will impact global businesses.

Embed in website or blog