Hi [[ session.user.profile.firstName ]]

ISACA Online Events

  • Date
  • Rating
  • Views
  • At time of introduction, cloud was seen by some as outsourcing Mk2, which at times was considered to be synonymous with insecurity, associated with off-perimeter infrastructures, within which companies would potentially store and process some of their most valuable assets. More concerns were also raised relative to the legal challenges, IPR, and other such implied exposures when interfacing commercial assets with none company actors and service providers.

    In this webinar we will commence by investigating the evolution of cloud, and move on to identify some of the positives of embarking on a cloud mission, and look at the negatives which may be encountered along this route. We will seek to expand the conversation into the realms of service delivery, contracts, SLA’s, legalities, incident response, escrow, and of course security.

    To underpin this session, let us consider the entry strapline:

    The selection of a quality cloud provider can bring multiple benefits to the operations of any business. However, the selection of a low quality cloud provider can represent the worst case nightmare scenario. Let us discuss.
  • Virtualized network systems are inherently more secure than physical networks, since what is deployed can be known with absolute certainty – and therefore can be precisely identified and secured. And because the network is defined in software, connections can be securely defined only as a consequence of policy – rather than trying to add policy to physical network links after they’ve been deployed. Security is built in, rather than bolted on after the fact.

    Network virtualization platforms for the Software-Defined Data Center (SDDC) bring the operational model of a virtual machine to your data center network, transforming the economics of network and security operations. This allows you treat your physical network as a pool of transport capacity, with network and security services attached to VMs with a policy-driven approach. Adding specialized protections to monitor and control the activities of privileged users, and to protect and secure the credentials they use are critical to achieving comprehensive security.

    Join us for this informative webcast to learn the key components required for protecting the Software-Defined Data Center.
  • There has been much discussion on the breach disclosure requirements coming in the EU data protection reform and the Network Information Security Directive (that applies to Essential Services), yet the requirement for “state of the art” defenses get much less attention. Is this a technology requirement or broader capabilities? Typically today most see intelligence and skills and the biggest shortcoming in cyber.
    Are we being pressured to focus on response rather than prevention, just what is state of the art and how does it align with transformational cyber strategies?
  • Legend has it that in 1200 B.C., King Agamemnon of Mycenae, led a coalition of Greek forces to lay siege against the City of Troy. The goal was to reclaim Menelaus’s wife, Helen (a queen from Sparta), who had been abducted by the Trojan Prince Paris. Troy was subjected to 10 years of hostile activities from a determined enemy, applying numerous different methods to identify and exploit any vulnerability in the city’s defenses. However, despite the best efforts of the attacking Greek forces, an array of physical defenses stood up to these actions. The barrage of attacks lasted for over 10 years, without success, and even led to the death of Achilles. This was until they exploited the failings of the human factor, where the Greeks delivered an attractive gift, containing an unknown and dangerous payload.

    This webinar will attempt to analyse the lessons learned from the Trojans and how these ancient defensive countermeasures relate to the modern day PCI DSS v3.1 controls. In addition, the webinar will introduce a comprehensive seven-stage methodology (PIE FARM) that will help business to reduce the time for successful implementation time, avoiding the 1,300 year Trojan approach. This event will help businesses appreciate the long history of effective DiD countermeasures with advice on how to implement them.
  • Este seminario se enfocará en la presentación del modelo de capacidad de procesos de COBIT 5 (PAM), revisando herramientas y definiendo un método efectivo para mejorar la capacidad de sus procesos de TI, de acuerdo con los requerimientos de COBIT 5 y la ISO 15504. También se presentarán las características del examen de acreditación
  • Bypassing antivirus software has been an arms race that's been played out for over three decades with security vendors always trying to stay ahead of the bad guys. From monthly .DAT file updates shipped on floppy disks by snail mail to customers, to today's cloud-based reputation systems – the Anti-Malware industry has come a long way in responding to new threats quickly. However, for authoring generic or heuristic signatures, many Anti-Malware vendors still require a copy of the actual file to analyze, replicate and reverse engineer threats in order to author signatures.

    In this session we will cover machine learning as a solution for detecting 0-day threats. In particular, we will look at how:

    •machine learning can be used to overcome gaps left by traditional approaches
    •signature-less, cloud-based detection technologies leverage automated static and behavior-based classification to protect against zero-day malware
    •to best leverage this approach in your environment
  • In a recent cloud predictions article, Oracle CIO, Mark Sunday predicts “Today, the #1 reason organizations are not moving to the cloud is security. However, tomorrow, security will be one of the most important drivers to move to the cloud.” A survey by Harvard Business Review Analytic Services (sponsored by Oracle) found that 62 percent of respondents thought security issues were by far the biggest barriers to expanding cloud adoption at their companies. But those very same concerns will soon drive organizations to the cloud. Join this Oracle and ISACA webcast to learn how established cloud vendors with a solid security track record have the expertise and resources to deploy layers of defense that many companies can’t hope to duplicate in-house.
  • In recognition of Data Privacy Day – ISACA, in conjunction with the International Association of Privacy Professionals (IAPP) will host a webinar on the implications of the EU General Data Protection Regulation (GDPR).

    The GDPR will bring big changes for data protection in Europe. However, it will not only impact European organizations, but will have significant impact on all companies that operate globally. Companies need to start planning for the impact that the changes from GDPR will bring and move toward compliance sooner rather than later.

    The session will involve a panel discussion with both US and European professionals providing their perspective on the Regulation and how it will impact global businesses.
  • Why you need to know about mentoring:
    • Finding mentors and building excellent mentoring relationships is critical in today’s hypercompetitive job market.
    • Studies have shown that employees who receive mentoring, more likely to find well-suited career roles and move up the organizational ladder faster.
    • Employees who mentor others typically earn more (because of their role as a mentor) and are recognized as leaders.

    This webinar on mentoring will provide you with the practical how-to’s for finding mentors, establishing the relationship, being an outstanding mentee, and developing yourself as a mentor to others. We will start with understanding what mentoring is and how it works, particularly in organizations where there is no formal mentoring program and you have to do it yourself.

    We will take a pragmatic look at the elements of a sound mentoring relationship including expectations, goal-setting, feedback, reciprocity and boundaries. We will also address the process of identifying mentors and how to curate your mentor pool as your career advances. Finally, we will look at what it takes to be a great mentor, and how to develop mentoring opportunities throughout your career.
  • Discovering a breach after the malware has had time to corrupt your systems is bad. First hearing about a breach from customers or the FBI is even worse. In either case, the pressure to know what happened, to whom, and how many were affected couldn’t be greater.
    Preparation reduces the time required to resolve the breach, and includes access to network packets that may contain the malware. That preparation also means knowing how to use those packets most effectively.

    Join Savvius and renowned security investigator Keatron Evans for a live webinar on strategies for storing the network packets you need and how to effectively use the information.

    You’ll learn:
    Effective strategies for using network packets to enhance security investigations
    Making network packets available for investigations into recent breaches
    Long-term network packet storage strategies

Embed in website or blog