Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • 10 Tips Every Job Seeker Should Know
    10 Tips Every Job Seeker Should Know
    Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com Recorded: Mar 20 2019 49 mins
    In a recent CyberSecJobs.Com survey, only 54% of the community said that they knew how to find a job. Of those 54% the top tool for finding a job was asking friends. Finding a job is a full time job. Do you have all of the tools available to you to find your next job? Spend a few moments with Kathleen Smith a Recruiting Marketing expert and hear about the top tips you want to make sure you always have at your fingertips to find your next opportunity.
  • Stop disruptive cyber threats and boost your security posture
    Stop disruptive cyber threats and boost your security posture
    Lee Waskevich, VP Security Solutions, ePlus & Alex Goldstein, Principal Architect- Cisco Security, ePlus Recorded: Jan 8 2019 31 mins
    In today’s rapidly changing IT environment, organizations must be diligent about protecting themselves from evolving cyber threats. Disruptive malware can have a long and lasting effect on business operations and brand reputation. Cisco Umbrella is a cloud security platform that helps stop threats before they reach your network or endpoints. It helps you mitigate remediation costs and breach damage, reduce the time to detect and contain threats, and increase visibility into internet activity across all devices. It is the first line of defense and the simplest security product to deploy, integrating seamlessly into your existing security stack.

    In this presentation, we will cover:

    *The four tenets of stopping disruptive threats
    *Why Cisco Umbrella should be the first stop
    *How to assess your organization’s security posture

    ePlus believes that making security pervasive across your entire IT landscape positions you for growth and success. By utilizing Cisco Umbrella technology, you gain the visibility you need to stop disruptive threats in their tracks.
  • Getting your Security Program to Shift Left: Operationalizing Security Controls
    Getting your Security Program to Shift Left: Operationalizing Security Controls
    Tony UcedaVelez, CEO & Founder, VerSprite Security Recorded: Dec 19 2018 63 mins
    The latest talk in managing security programs is the ability to make “shift left” in terms of implementing controls. This concept translates to being able to not apply security controls post-implementation but rather during pre-implementation phases in a System or Software Development Lifecycle. These stages (such as the Definition, Design, or even Development phase) can allow for security requirements to be conceptualized and applied before an Implementation phase. The rise of regulations and demand for more agile engineering practices is forcing CISOs and security programs to develop more sophisticated ways to adhere to security requirements from regulations, internal governance, and clients. This talk will focus on how DevSecOps efforts are changing how we govern security controls via greater automation tools that are readily available to leverage. This talk will also show how the future can support for more cost effective governance models, regardless of industry or size of IT environment.
  • Emerging Cyber Threats for 2019
    Emerging Cyber Threats for 2019
    Steve Durbin, Managing Director, ISF LTD Recorded: Dec 11 2018 47 mins
    Organisations in 2019 will be increasingly faced with a hyper-connected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.

    In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:

    -The increased sophistication of cybercrime and ransomware
    -The impact of legislation
    -The myth of supply chain assurance
    -Smart devices challenge data integrity

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • CCISO War Games
    CCISO War Games
    Tari Schreider Recorded: Nov 29 2018 52 mins
    CCISO Instructor-led War Games training: What are they, How are they run (as a C-Level Roundtable, and as part of the CCISO class), and Why are they a critical part of C-Level Executive training.
  • Security in the Cloud: Identity Management, Access Control and Authentication
    Security in the Cloud: Identity Management, Access Control and Authentication
    Emma Bickerstaffe, Senior Research Analyst and Benoit Heynderickx, Principal Analyst, ISF LTD Recorded: Oct 23 2018 44 mins
    Organisations increasingly rely on cloud services, motivated by the benefits of scalability, accessibility, flexibility, business efficiencies and reduced IT costs. However, there are several security implications that organisations need to address, including the challenge of verifying identity and managing access to cloud services.

    Cloud services bring added complexity to identity and access management, exacerbated by the distribution of data across a myriad of applications accessed by users from multiple devices and locations. Failure to adequately implement user authentication and access control in the cloud can be exploited by attackers to gain access to users’ credentials, manipulate systems and compromise data.

    In this webinar, Senior Research Analyst Dr Emma Bickerstaffe and Principal Analyst Benoit Heynderickx will discuss identity management, access control and user authentication in the cloud environment, and consider how organisations can effectively tackle this security concern.
  • Cyber Ranges Reimagined: Fast, Easy & Scalable
    Cyber Ranges Reimagined: Fast, Easy & Scalable
    Brian Bork, Technical Content and Events Lead Learn on Demand Systems Recorded: Sep 18 2018 40 mins
    When you think of a cyber range, you probably think about a lot of hardware, a time-consuming set-up and a ton of money. Something that’s difficult to build and maintain, and not easily deployed. Learn on Demand Systems is out to change that. In this webinar, Brian Bork will take you through the ways Learn on Demand Systems empowers you to quickly build, deliver and scaling a new kind of cyber range.

    You’ll learn:

    Why Cyber Ranges aren’t out of reach for your company.
    The theory behind reimagined cyber ranges.
    How to build & deploy repeatable environments.
  • A Data Breach Prevention, Detection & Response Strategy to Combat Todays Threats
    A Data Breach Prevention, Detection & Response Strategy to Combat Todays Threats
    Nick Frost, Principal Consultant, ISF LTD Recorded: Sep 18 2018 47 mins
    With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:

    ‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
    ‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
    ‒ end-to-end, covering the complete information life cycle.

    This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.

    In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
  • What Does “Next Generation Security” Mean To You?
    What Does “Next Generation Security” Mean To You?
    Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Jul 3 2018 31 mins
    Although overused, Next Generation Security still means keeping up with the challenges of securing today’s networks. The fundamental rule of keeping up with those challenges is having both a vision and an architecture that provides the foundation, regardless of how the market or the threats themselves change.

    This session will focus on what is needed in an evolving security architecture to provide Next Generation Security in a constantly changing environment.
  • Malware versus AI
    Malware versus AI
    Keith Rayle, Security Strategist, Fortinet Recorded: Jun 26 2018 50 mins
    During this presentation, you'll learn about deep learning, the history of artificial intelligence, the history of malware management, and the current approach to eliminating malware threats to the enterprise using AI.

Embed in website or blog