As an (ISC)2 member or a practitioner considering certification or membership, wouldn't you like to have the ability to interact with an (ISC)2 Board Member, Director or Manager to ask questions or discover what's being worked on within the organization that will benefit the members or the industry in general? Our new webinar series, Inside (ISC)2 will feature various key personnel within the organization interacting with and answering questions from members and non-members alike in a moderated webcast setting. This is chance to find out, first hand, what's going at (ISC)2 and ask your questions of the key people making decisions at the organization. First up, join us on May 28, 2015 at 1:00PM as David Shearer, Executive Director, stops by to answer your questions.Read more >
Every two years, (ISC)2 surveys infosecurity practitioners from around the world about the profile of the global information security workforce. This year, over 12,000 professionals from 135+ countries responded to the survey to provide invaluable insight about their careers, positions and organizations. Join Julie Peeler, (ISC)2 Foundation Director and other industry experts on April 30, 2015 at 1:00pm Eastern for an examination and discussion of the survey results, gain insight into what hiring managers and looking for in job candidates, the areas of expertise in demand and the challenges facing infosec pros around the world.Read more >
(ISC)2 will hold its 3rd Annual Security Congress at the Annual ASIS Conference this September in Chicago, IL. This year’s conference promises to be bigger and better as it brings together thought leaders in traditional and information security for three days of educational sessions and an exhibit floor featuring over 350 solution providers. Join (ISC)2 and several of the conference speakers who’ll be presenting at the Security Congress on August 21, 2013 at 1:00pm Eastern as we discuss their sessions, get a preview of what will be discussed at the event and examine some of the “hot button” issues facing security practitioners today.Read more >
The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.Read more >
The General Data Protection Regulation (GDPR) is being instituted to improve data protection and privacy for individuals in the European Union (EU). Additionally, it addresses the export of data outside the EU, which will impact all multi-national businesses operating in the EU. Almost 3/4 of US Privacy professional believe that this is the most significate change to privacy regulations in the last 20 years. What should an organization be doing now to prepare for this new regulation to avoid non-compliance, fines and increased spending? Join Oracle and (ISC)2 on April 14, 2016 at 1:00PM Eastern for a discussion on this new regulation and how your organization could be impacted.Read more >
In today’s complex security landscape, networks are getting larger and more complicated, creating myriad holes in defenses, while cyberattacks are increasing in sophistication and persistence. CISOs are challenged to centralize security and gain visibility over the attack surface, the ways in which their IT systems are vulnerable to threats, including potential attack vectors.
According to a 2015 Gartner report1, enterprises are shifting security budgets to security management platforms that integrate existing technologies, unify data from multiple vendors, provide greater insight through advanced analytics and enable security operations teams to automate and prioritize activities.
Register today to learn how to:
* Visualize and analyze your attack surface with an interactive model that links network topology, network connections, business units and organizational hierarchy
* Categorize Indicators of Exposure (IOEs), rank the severity of those IOEs and display the data in a format understandable to both technical and business-oriented viewers
* Drill down with interactive tools to get quick summaries of actionable intelligence; pinpoint and protect the systems most vulnerable to threats
* Systematically manage and reduce the attack surface by allocating security resources to where they are most needed
1 Gartner Innovation Tech Insight for Security Operations, Analytics and Reporting, Oliver Rochford and Paul E. Proctor. November 11, 2015.
Join Skybox Security and (ISC)2 on April 12, 2016 at 1PM (GMT+8; Hong Kong, Singapore, Beijing) for a discussion on this topic.
As a truly global organization, (ISC)2 membership stretches to over 110,000 members in over 160 countries. To help serve the needs of the membership, (ISC)2 has regional offices to oversee the operations and efforts in North America (NA), Asia-Pacific (APAC), Europe, Middle East, & Africa (EMEA) and Latam America (Latam). These offices are managed by regional directors with their own teams to offer regional support and resources and to be the voice of the region. On January 28, 2016 at 1:00PM Eastern you'll have the opportunity to discover what's going on in each of these regions as we gather our three Regional Directors Dan Waddell (NA), Clayton Jones (APAC), Adrian Davis (EMEA) and Gina Van Dijk (Latam) for a view into what they have planned for 2016.Read more >
Research has shown that organisations typically have 3-4 times as many privileged accounts as employees. What all of these accounts have in common is that they act as a gateway to an organisation's most sensitive data. Unfortunately, the management and monitoring of privileged accounts is not a key priority in many organisations due to their other seemingly more critical aspects of running an organisation.
Join CyberArk and (ISC)2 on Thursday, Nov 26, 2015 at 2:00PM (GMT+8) as Mr Z. H. Tan will deconstruct recent attacks to demonstrate how the commonly traveled "privileged pathway" is a fast pass to your organisation's most sensitive data or operations, whether on-premise or in the cloud. Traditionally thought of as a vulnerability for insider-based attacks only, privileged accounts are increasingly being used by cyber attackers to perpetrate some of the most devastating advanced attacks.
While the economics of moving workloads to the cloud is well understood by small and medium sized businesses (SMBs), they often struggle with corresponding economics associated with these changes in security challenges. These SMBs often rely on service providers and suppliers for security, but how can they take control or have more of a hand in the security of the cloud services they are using? Join (ISC)2 and our sponsor Sophos on June 25, 2015 for our next From the Trenches where we’ll discuss cloud security and challenges SMBs face when leveraging cloud services.Read more >
Join IBM and (ISC)2 to learn about the latest Cost of a Data Breach study and discuss the implications of the study for today's businesses.
In this live webinar, you will learn the key findings of the Cost of a Data Breach study, including:
-Major factors that affect the financial consequences of a data breach
-How companies changed their operations and compliance following a breach
-Most common cybersecurity governance challenges
-Why companies failed to stop data breaches
Cybersecurity is a mess. The number of guides, standards, laws, rules, and regulations grows every day, and most organisations don’t have the ability or the resources to handle the continuously changing (and expanding) set of requirement:
In this webinar run jointly by (ISC)2 and Unified Compliance, you will learn
· How to efficiently manage complex compliance requirements by creating customised control sets and compliance templates in seconds
· What harmonisation of compliance across multiple regulations, standards & frameworks looks like—including Sarbanes Oxley to FFIEC, PCI, GLBA and HIPAA to CMS, NERC, NIST, and ISO among others
· How to understand and clarify overlaps and conflicts between documents in your regulatory requirements
· How to save time and eliminate duplicate efforts by asserting compliance across multiple authority documents simultaneously
Taking this new approach will save organisations considerable time, effort, and resources when it comes to audit and cybersecurity compliance. More importantly, this will improve the efficiency and effectiveness of their overall Governance, Risk Management, and Compliance programs.
Osterman Research and (ISC)2 recently conducted a survey of individuals in mid-sized and large organizations on how they choose off-the-shelf applications, how they develop custom applications, and how they select third-party application developers. Join (ISC)², Michael Osterman and a panel of experts for a discussion about the findings from the survey and the state of software development quality on Tuesday, April 7th at 1:00pm Eastern. Attendees will also have the opportunity to download the entire survey report.Read more >
Moving to the cloud is always a difficult decision, but when you look at the impact of solutions as broad reaching as Office 365, chances are your primary concern is going to be about security. There are a number of facets and features (e-mail, OneDrive, Lync) to Office 365 and the security issues can be myriad. Join Intel Security and (ISC)2 on May 7, 2015 at 1:00PM Eastern for a discussion on how to overcome these challenges through critical protection and often overlooked best practices to build the confidence you need to securely deploy Office 365.Read more >
The threats continue to multiply and morph on a daily basis, meaning that today's organizations need to be just as nimble in their efforts to defend against these new menaces. New threats need new approaches to meet them head on. Collaborative solutions that provide for a holistic view across the organization and up the technology stack are critical. Join (ISC)2 and McAfee on December 4, 2014 at 1:00PM Eastern as we have a discussion about Next Generation Threats and the Solutions we can field to respond to them.Read more >
Whether you are implementing a SIEM solution for the first time or you are “ripping and replacing” with something newer, it’s crucial to prepare the organization and infrastructure for what you have in mind. Once the solution has been installed, optimizing it for threat detection and alert output will be critical to your project's success. Join (ISC)2 and McAfee on October 16, 2014 at 1:00PM Eastern for a discussion about SIEM, including the preparation for a SIEM rollout and tips on using it to get ahead of the threats.Read more >
It's now widely recognized that traditional security solutions are insufficient to protect organizations from advanced threats and targeted attacks. To fight back you need your own unified plan of attack so that you can better sense malicious activity and take preventive action that will crush attackers and keep your environment safe
Join Brett Williams, Senior Security Engineer for Carbon Black on March 23, 2016 at 1PM (GMT+8; Hong Kong, Singapore, Beijing) for an overview of how organizations are moving from a passive to proactive defense on the end point.
This webinar will cover:
* End point security challenges organizations face today
* Why using a trusted security model on the endpoint is essential
* The importance of choosing the right solution and integration with your existing security investments
* Example of Ransomware detection and protection using proactive defense.
* Best practices learned from successful deployments