Actionable Intelligence:  Supporting the Decision Making Process

RSA and (ISC)2
Today’s security management problem isn't a lack of information, it is not being able to collect everything that is happening in my infrastructure, identify the threats and incidents and putting in place a process to prioritize your incidents to act decisively. The problem is that you just cannot rely on your current way of thinking and approach with the types of advanced threats that can impact your organization.  The key to successful security and risk management practice is in converting raw data into actionable intelligence that informs and drives the investigation, prioritization and incident management process while at the same time provide business context on how the incidents could impact the risk to the organization as a whole. Getting the information to the person is no longer enough. Now, as security professionals, we need a new model, new ideas and a new approach to combating advanced threats.

Join us on April 12, 2012 at 1:00pm Eastern time with RSA, The Security Division of EMC as to learn how you can transform the approach you take to security operations and your profession as a whole.
Apr 12 2012
59 mins
Actionable Intelligence:  Supporting the Decision Making Process
More from this community:

IT Security

  • Live and recorded (5242)
  • Upcoming (122)
  • Date
  • Rating
  • Views
  • Who has earned the bragging rights as the most secure college athletic conference?

    Colleges have rivals both on the football field and in the classrooms, but how do they fare in security performance? Watch this webinar featuring Stephen Boyer, CTO and Co-Founder of BitSight Technologies, and Rebecca Sandlin, CIO of Roanoke College, to learn how the major athletic conferences compared in key security performance metrics. There is also a discussion about why security benchmarking is so significant in education.

    Watch this webinar to discover:

    - The unique challenges higher education faces in securing their networks and how benchmarking can help
    - Why performance varies across the industry, and how that translates into actionable intelligence for security teams
    - How Security Ratings are enabling Roanoke College to gain tremendous insights about security strategy and performance issues that they can share with their board.
  • Who has earned the bragging rights as the most secure college athletic conference?

    Colleges have rivals both on the football field and in the classrooms, but how do they fare in security performance? Watch this webinar featuring Stephen Boyer, CTO and Co-Founder of BitSight Technologies, and Rebecca Sandlin, CIO of Roanoke College, to learn how the major athletic conferences compared in key security performance metrics. There is also a discussion about why security benchmarking is so significant in education.

    Watch this webinar to discover:

    - The unique challenges higher education faces in securing their networks and how benchmarking can help
    - Why performance varies across the industry, and how that translates into actionable intelligence for security teams
    - How Security Ratings are enabling Roanoke College to gain tremendous insights about security strategy and performance issues that they can share with their board.
  • Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Social engineering targets our most challenging assets - people! We'll share a case study on how a regulated, mid-sized company prioritized risks, developed a mitigation strategy, and delivered an innovative awareness campaign.

    What's unique about this example is the program we helped build to incorporate active control testing, user feedback, and metrics to improve employee training alongside traditional technical controls.
  • Social engineering targets our most challenging assets - people! We'll share a case study on how a regulated, mid-sized company prioritized risks, developed a mitigation strategy, and delivered an innovative awareness campaign.

    What's unique about this example is the program we helped build to incorporate active control testing, user feedback, and metrics to improve employee training alongside traditional technical controls.
  • In this webinar we will examine what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Mobile is no longer a supplementary channel for the enterprise; It is quickly becoming the primary channel to deliver business critical information and experiences to partners, customers and employees. Join Sarvesh Jagannivas, VP of Product Marketing at MuleSoft, and Uri Sarid, CTO at MuleSoft, as they discuss the mobile enterprise opportunity, and the biggest challenges preventing successful mobile delivery.

    Join this webinar to learn:
    - Why mobile applications are the new imperative for the enterprise
    - The top challenges preventing rapid, scalable and secure mobile application development
    - Three case studies of industry leaders who are building mobile enterprises
  • Channel
  • Channel profile
  • From the Trenches: Being Your Own "Expert Witness" Mar 26 2015 5:00 pm UTC 60 mins
    With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • Briefings Part 1: Insights from the latest CISO Assessment Mar 24 2015 1:00 pm UTC 60 mins
    Already tasked with protecting companies from a vast domain of ever-changing threats, Chief Information Security Officers (CISOs) and other security leaders must now prepare for more avenues of attack as well as more sophisticated attackers. Research from the IBM Centre for Applied Insights pinpoints what worries today’s security leaders and what they’re doing to address those concerns. We also identify several actions that security leaders can take to help their companies manage the approaching uncertainties in information security.

    Speaker:

    Greg Davis, Cyber Security Strategist

    Over the last few years Greg has engaged and worked with a wide set of cyber security industry players with the focused intent of delivering value to clients who are faced with modern day security challenges.
    Before rejoining IBM in December 2013 he spent 5 years with BAE Systems Detica developing their Cyber Security capability. He was primarily responsible for new business, security portfolio and oversight of numerous security delivery programmes including the summer 2012 Olympics.
    Greg is an experienced security cleared (SC) business leader successfully delivering change in large scale organisations. His proven track record in developing and winning new business, designing and implementing IT enabled change and running service contracts has equipped him with the necessary broad set of skills to deliver successful change in today’s fast moving complex environments. Throughout his career he has used his IBM management consulting background in solving complex business problems, understanding how people react to change to effectively deliver business through major technology enabled programmes.
  • Using SIEM to Improve Threat Discovery & Response: From Theory to Practice Mar 19 2015 5:00 pm UTC 60 mins
    Threat and adversarial information has become easily accessible and gone mainstream in the last couple of years. However managing the threat lifecycle, can still be challenging for organizations continuously under pressure for the next attack and low on resources. Prioritizing threats, managing incidents and neutralizing the attackers successfully requires dedicated tools, processes as well as broad adoption by the IT Security staff. Join (ISC)2 and Intel Security at 1:00PM on March 19, 2015 as we discuss leveraging SIEM and effective means for improving your discovery and responses to today's emerging threats.
  • Briefings Part 1: Building the Business Case for Risk-Aware IAM Mar 12 2015 5:00 pm UTC 60 mins
    Today's business initiatives include developing stronger security to help protect against vulnerabilities, minimizing corporate risk and meeting compliancy requirements. Investments in intelligent Identity and Access Management (IAM) can help organizations meet these objectives, lower IT operating costs, and improve productivity. Join (ISC)2 and Courion Corp on March 12, 2015 at 1:00PM Eastern for the 1st part of a 3 part series where we'll provide guidelines to help you create a compelling business case for IAM technology and the ability to provide continuous monitoring that makes you aware quicker and react faster to risk.Also included will be real-life examples of how investments IAM infrastructure technology can enhance your security posture.
  • Streamlining Security: Strategies for Improving Effectiveness and Efficiency Recorded: Feb 19 2015 58 mins
    For many of us, current information security operations are largely manual and therefore inefficient. This increases costs and results in lower effectiveness of our hard won efforts. In this interactive session, we will explore opportunities to streamline processes and make effective use of the technologies available to us, and establish ourselves as worthy custodians of our limited resources bestowed upon us. Join us at 1:00PM Eastern on February 19, 2015, with our event sponsor, Bromium, for this spirited panel discussion.
  • Briefings Part 6: Identity Management and APIs – The Evolution Continues Recorded: Feb 12 2015 59 mins
    The Identity Management market has been buffeted over the past two years by several important trends – cloud, mobile, social media, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. But, these changes are not finished. In this webcast, we'll look at the next phase of identity management and APIs, and how the continuing trend towards cloud services and the explosion of mobility and applications will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
  • SARS, MERS, Ebola Oh My! - The Privacy Impact of Disease Tracking in EHRs Recorded: Feb 5 2015 61 mins
    With the US and other nations on high alert for anyone running a fever (AKA: "presenting symptoms"), many healthcare facilities are merging electronic health record (EHR) systems with travel history, looking to "flag" patients who might be at risk.

    - How does this information impact medical personnel workflow?
    - How is the "mashup" of this information impacting privacy and security concerns?
    - Should this information be shared if collected (and with whom)?
    - Are these travel and EHR systems up to the task?

    Join (ISC)² and several healthcare infosecurity practitioners on February 5, 2015 at 1:00pm as we discuss this hot button topic.
  • The POS Challenge: Securing Cardholder Data and Maintaining PCI Compliance Recorded: Jan 22 2015 62 mins
    In 2014, (ISC)2 and Bit9, along with the PCI Security Standards Council, hosted two webcasts looking at PCI and how to keep up with changes and threats to point of sale (POS) systems. With high profile data breaches leading the 24 hour news cycle, PCI compliance is still still front and center. Join (ISC)2, Bit9 as well as the PCI Security Standards Council for our first roundtable of the New Year on January 22, 2015 at 1:00pm Eastern to discuss what's new with PCI and the challenges of securing cardholder data across POS systems, kiosks, mobile applications and more.
  • Briefings Part 5: The Business of Identities – Predictions for 2015 Recorded: Jan 15 2015 61 mins
    Last year, experts at CA Technologies offered a set of predictions about interesting trends in the identity market and its related technology areas. In this webcast, we will review those predictions and rate ourselves on how we did. But, more importantly we will fearlessly offer predictions about what will be happening in the world of identities during 2015, and offer specific guidance into what organizations can be doing now to prepare for these changes.
  • Briefings Part 4: Your Business is Exposed: Avoiding API Security Vulnerabilites Recorded: Dec 18 2014 58 mins
    APIs are quickly becoming the hacker's new favorite attack vector. Why wouldn't they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. And your private APIs can be exploited just as easily as a public API. So what measures can you take to strengthen your security position? During this webcast, Francois Lascelles, Chief Architect, CA Technologies, will discuss recent API data breaches, the top 5 API security vulnerabilities that are most impactful to today's enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
  • Defending Against the Mobile "Patient Zero" Recorded: Dec 11 2014 59 mins
    Mobility is now ubiquitous, and so are the threats. With each new platform we allow in, the pipeline between your users and the corporate environment becomes a freeway for malware. While mobility promises incredible connectivity and productivity gains, it also exposes the cracks in your armor to a wide variety of adversaries. How do YOU secure your mobile devices so that they don’t become a gateway for threats to your company or organization? Join (ISC)2 and Lacoon on December 11, 2014 at 1:00pm for a discussion concerning mobile threats and malware and how to defend against them.​
  • Next Generation Threats Require Next Generation Security Recorded: Dec 4 2014 61 mins
    The threats continue to multiply and morph on a daily basis, meaning that today's organizations need to be just as nimble in their efforts to defend against these new menaces. New threats need new approaches to meet them head on. Collaborative solutions that provide for a holistic view across the organization and up the technology stack are critical. Join (ISC)2 and McAfee on December 4, 2014 at 1:00PM Eastern as we have a discussion about Next Generation Threats and the Solutions we can field to respond to them.​
  • Briefings Part 3: End-to-End Mobile Security, Samsung Knox and CA Technologies Recorded: Nov 20 2014 57 mins
    As the largest Android device manufacturer Samsung understands the value as well as the security implications that apps have introduced. While businesses are reshaping delivery models to capitalize on its opportunities, security risks are forcing organizations to think differently. Controlling access to the app is no longer sufficient. Instead, businesses have to take an end-to-end security approach – protecting access from the app to the backend API. Please attend this webinar to hear Leif Bildoy, Product Manager at CA Technologies, discuss how Samsung has increased the security within its KNOX Workspace to deliver end-to-end security while maintaining the ever important user experience.
  • Briefings Part 2: Are You Prepared For the Next Attack? Recorded: Oct 23 2014 57 mins
    Today, usernames and passwords continue to be stolen and exploited in record numbers. Hackers are still stealing credentials and accessing sensitive data. To stay ahead of hackers, you need to combine the appropriate forms of authentication and application access/session management to reduce risk and to prevent security breaches before they happen. Please join CA Technologies to learn about risk appropriate authentication and SSO/access management capabilities that can help protect your organization from hackers and their popular attack vectors.
  • Measure Twice, Cut Once: Getting the Most Out of Your SIEM Implementation Recorded: Oct 16 2014 60 mins
    Whether you are implementing a SIEM solution for the first time or you are “ripping and replacing” with something newer, it’s crucial to prepare the organization and infrastructure for what you have in mind. Once the solution has been installed, optimizing it for threat detection and alert output will be critical to your project's success. Join (ISC)2 and McAfee on October 16, 2014 at 1:00PM Eastern for a discussion about SIEM, including the preparation for a SIEM rollout and tips on using it to get ahead of the threats.
  • Briefings Part 3: An Intelligent Approach to Stopping Advanced Threats Recorded: Oct 7 2014 57 mins
    Beyond Traditional Defences

    Up to now, many organisations have responded to security concerns by deploying separate new tools to address each new risk, and the heightened awareness caused by high-profile security breaches has only intensified this trend. With a shortage of security skills in the market, adding more and more point solutions is unsustainable and, in many cases, has the opposite effect of what was intended.

    This webinar will look at what are organisations doing to evolve their defences to deal with new breeds of attack.

    Join Simon Smith, Technical Professional at IBM Security Systems and understand the recommended steps organisations should take to prevent even the most sophisticated attacks, detect advanced threats across the entire infrastructure in real-time and respond continuously to security incidents. An intelligent approach requires continuous appraisal and adjustment

    The session will be moderated by John Colley, Managing Director at (ISC)2 EMEA.
  • Briefings Part 1: Unleashing The Power of Consumer Identity Recorded: Sep 25 2014 62 mins
    How can today’s enterprises position themselves to best leverage large consumer populations in ways that meet the business’ requirements without overwhelming the IT organization? In this webinar, Merritt Maxim, Director, Security Solutions for CA Technologies, will discuss the key requirements to deliver consumer scale identity management and examine how capabilities such as user management, social login and risk-based authentication can help organizations realize the full value of consumer identities, while providing a simple user experience and one which helps keep risks in check.
  • Briefings Part 2: Who's accessing your critical data, and what are they doing? Recorded: Sep 11 2014 55 mins
    Beyond Traditional Defences

    Recent security breaches by trusted insiders have propelled Identity and Access Management (IAM) to the top security priority of many organisations.. After all, it’s clear security is only as strong as its weakest link – people – and the press is full of articles documenting the damage people can do. So it’s natural for security managers to want to shore up their IAM infrastructure to avoid similar embarrassment.

    Some are finding it difficult to understand who has access to their critical data and whether they are using it appropriately. Understanding the full extended environment and by taking associated risks into account is the way to avoid being in the headlines. In other words, whether you are starting from scratch or taking on new IAM challenges such as cloud and mobile, there are certain principles you should follow to build a successful, effective IAM solution.

    Join Neil Warburton, Security Architect at IBM and learn about the key principles that will help you implement a successful IAM solution. The session will be moderated by John Colley, Managing Director at (ISC)2 EMEA.
  • From The Trenches – Mobile Devices and Forensics Recorded: Sep 4 2014 62 mins
    What’s in your mobile or BYOD policy? Do you "wipe” lost or compromised devices? Is that even legal in your jurisdiction?

    As the perimeter has moved from the data center to our pocket, responding to and managing security incidents have become much more complex. With the introduction of BYOD strategies, forensics and e-discovery processes have had to adapt, leaving many organizations ill prepared if their response tactics haven’t kept pace with the rate of change.

    Join (ISC)2 on September 4, 2014 at 1:00PM Eastern for our new "From The Trenches" series where we gather three industry practitioners to discuss their experiences with the collision point between mobility solutions and incident response. ​​
  • Briefings Part 1: What can we learn from the Target security breach? Recorded: Aug 21 2014 54 mins
    Beyond Traditional Defences

    The personal and financial information of approximately 110 million individuals, comprising 11 GB of data, was stolen in a successful compromise of the retail giant Target during the 2013 Christmas shopping season. Equally concerning is that the attackers persisted - undetected - for as long as two weeks before the breach was discovered. Leveraging media reports, expert analyses and IBM research, this webinar will explain how the Target breach occurred, and provide a great deal of useful information about methods used by attackers, missed prevention methods and the need to have intelligence to stop attacks and prevent data loss at the earliest opportunity.

    Join David Bosomworth, European Business Director at IBM and learn about the anatomy of this breach and recommended steps to protect you against similar attacks. The session will be moderated by John Colley, Managing Director at (ISC)2 EMEA.
ThinkTank
(ISC)2 hosts a monthly panel discussion around different thought engaging topics within the information security sector.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Actionable Intelligence:  Supporting the Decision Making Process
  • Live at: Apr 12 2012 5:00 pm
  • Presented by: RSA and (ISC)2
  • From:
Your email has been sent.
or close
You must be logged in to email this