For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.
In a recent CyberSecJobs.Com survey, only 54% of the community said that they knew how to find a job. Of those 54% the top tool for finding a job was asking friends. Finding a job is a full time job. Do you have all of the tools available to you to find your next job? Spend a few moments with Kathleen Smith a Recruiting Marketing expert and hear about the top tips you want to make sure you always have at your fingertips to find your next opportunity.
Lee Waskevich, VP Security Solutions, ePlus & Alex Goldstein, Principal Architect- Cisco Security, ePlusRecorded: Jan 8 201931 mins
In today’s rapidly changing IT environment, organizations must be diligent about protecting themselves from evolving cyber threats. Disruptive malware can have a long and lasting effect on business operations and brand reputation. Cisco Umbrella is a cloud security platform that helps stop threats before they reach your network or endpoints. It helps you mitigate remediation costs and breach damage, reduce the time to detect and contain threats, and increase visibility into internet activity across all devices. It is the first line of defense and the simplest security product to deploy, integrating seamlessly into your existing security stack.
In this presentation, we will cover:
*The four tenets of stopping disruptive threats
*Why Cisco Umbrella should be the first stop
*How to assess your organization’s security posture
ePlus believes that making security pervasive across your entire IT landscape positions you for growth and success. By utilizing Cisco Umbrella technology, you gain the visibility you need to stop disruptive threats in their tracks.
Tony UcedaVelez, CEO & Founder, VerSprite SecurityRecorded: Dec 19 201863 mins
The latest talk in managing security programs is the ability to make “shift left” in terms of implementing controls. This concept translates to being able to not apply security controls post-implementation but rather during pre-implementation phases in a System or Software Development Lifecycle. These stages (such as the Definition, Design, or even Development phase) can allow for security requirements to be conceptualized and applied before an Implementation phase. The rise of regulations and demand for more agile engineering practices is forcing CISOs and security programs to develop more sophisticated ways to adhere to security requirements from regulations, internal governance, and clients. This talk will focus on how DevSecOps efforts are changing how we govern security controls via greater automation tools that are readily available to leverage. This talk will also show how the future can support for more cost effective governance models, regardless of industry or size of IT environment.
Steve Durbin, Managing Director, ISF LTDRecorded: Dec 11 201847 mins
Organisations in 2019 will be increasingly faced with a hyper-connected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.
In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:
-The increased sophistication of cybercrime and ransomware
-The impact of legislation
-The myth of supply chain assurance
-Smart devices challenge data integrity
About the presenter
Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
Emma Bickerstaffe, Senior Research Analyst and Benoit Heynderickx, Principal Analyst, ISF LTDRecorded: Oct 23 201844 mins
Organisations increasingly rely on cloud services, motivated by the benefits of scalability, accessibility, flexibility, business efficiencies and reduced IT costs. However, there are several security implications that organisations need to address, including the challenge of verifying identity and managing access to cloud services.
Cloud services bring added complexity to identity and access management, exacerbated by the distribution of data across a myriad of applications accessed by users from multiple devices and locations. Failure to adequately implement user authentication and access control in the cloud can be exploited by attackers to gain access to users’ credentials, manipulate systems and compromise data.
In this webinar, Senior Research Analyst Dr Emma Bickerstaffe and Principal Analyst Benoit Heynderickx will discuss identity management, access control and user authentication in the cloud environment, and consider how organisations can effectively tackle this security concern.
Brian Bork, Technical Content and Events Lead Learn on Demand SystemsRecorded: Sep 18 201840 mins
When you think of a cyber range, you probably think about a lot of hardware, a time-consuming set-up and a ton of money. Something that’s difficult to build and maintain, and not easily deployed. Learn on Demand Systems is out to change that. In this webinar, Brian Bork will take you through the ways Learn on Demand Systems empowers you to quickly build, deliver and scaling a new kind of cyber range.
Why Cyber Ranges aren’t out of reach for your company.
The theory behind reimagined cyber ranges.
How to build & deploy repeatable environments.
Nick Frost, Principal Consultant, ISF LTDRecorded: Sep 18 201847 mins
With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:
‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
‒ end-to-end, covering the complete information life cycle.
This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.
In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
Patrick Grillo, Senior Director, Security Solutions, FortinetRecorded: Jul 3 201831 mins
Although overused, Next Generation Security still means keeping up with the challenges of securing today’s networks. The fundamental rule of keeping up with those challenges is having both a vision and an architecture that provides the foundation, regardless of how the market or the threats themselves change.
This session will focus on what is needed in an evolving security architecture to provide Next Generation Security in a constantly changing environment.
Keith Rayle, Security Strategist, FortinetRecorded: Jun 26 201850 mins
During this presentation, you'll learn about deep learning, the history of artificial intelligence, the history of malware management, and the current approach to eliminating malware threats to the enterprise using AI.
Ronen Shpirer, Security Solutions Architect, FortinetRecorded: May 29 201856 mins
IoT, IIoT, OT... It is likely that for many of us these acronyms are confusing. The fact is that traditional industrial environments, such as utilities and production, have started a digital transformation process which harness these and other technologies to become more efficient, automated and competitive.
Within this transformation from a well-defined and well-controlled industrial ecosystem to a dynamic and open one, lurks a shift in the security challenges, needs and solutions/architecture.
This session will focus on the technologies and challenges digital transformation introduces in industrial environments and how Fortinet’s Security Fabric is deployed in such an environments to provide the required security infrastructure and posture, including demonstration of some simplified use cases.