Hi [[ session.user.profile.firstName ]]

Dark Web Demystified

Come to the dark side! Charity Wright, a former NSA analyst and current Cyber Threat Intelligence Advisor at IntSights will take you on a tour of the dark web and explain how you can collect and analyze pertinent intelligence from the dark web to neutralize threats outside the wire at the earliest stages of the cyber kill chain. This session will take you on a guided tour of some of the hottest markets and forums for cyber threat intelligence collection in the dark web. See the most popular use cases for intelligence to protect your companies: credential leakage, attack indication, bank cards for sale, PII and PHI for sale, and much more!
Recorded Aug 6 2020 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Charity Wright, Cyber Threat Intelligence Advisor, IntSights
Presentation preview: Dark Web Demystified
  • Channel
  • Channel profile
  • CSA STAR– New Paradigm for Measuring Security, Privacy and Governance in cloud Sep 25 2020 7:30 am UTC 30 mins
    John DIMARIA, Assurance Investigatory Fellow, CSA
    When a paradigm shifts, you cannot ignore change and count on past success. New technology can revolutionize a market, creating a tectonic shift in accepted practice. The advent of the Cloud to date has been such an advancement in technology and optimization of its capability the need for flexible access have led to an increase in business demand for cloud computing along with increased security and privacy concerns. How organizations evaluate Cloud Service Providers (CSPs) has become key to providing increased levels of assurance transparency.
    John DiMaria; CSAs Assurance Investigatory Fellow and one of the key innovators in the evolution of CSA STAR, will discuss the history behind the vison and take you on journey down the road through the three levels of the Open Certification Framework (OCF), but more importantly how it helps organizations optimize processes, reduce costs, decrease risk while meeting the continuing rigorous international demands on cloud services.
  • Software Eats Security: Zero Trust Software Defined Perimeter Sep 25 2020 6:30 am UTC 45 mins
    Ekta MISHRA, APAC Membership Director & Country Manager - India | Keith PRABHU, Chairman, CSA Mumbai Chapter
    Software is eating the world and information security is no different. The network perimeter no longer exists. Traditional IP based security can be blind-sided to evolving attacks. Software based perimeter enhances authentication capabilities. Benefits of SDP approach to Zero Trust. Components required for implementation
  • Building a World-Class Security Program Sep 24 2020 6:00 pm UTC 75 mins
    James Christiansen, Vice President of Cloud Security Transformation, Netskope
    There is no "playbook" for today's information security officer to becoming a successful leader. With thousands of security technologies, millions of threat actors, and new attack vectors to defend against, simply working harder won't solve the problem. Information security leaders must transform from reactive, infrastructure-focused, into proactive, business-aligned security leaders. A world-class security program combines people, process, and technology. The best security programs are guided by dynamic leaders who understand the business to provide consistent demonstrable value.

    Thank you to our sponsors of the SECtember Experience: Adobe, ExtraHop, Qualys, OneTrust, Trendmicro, and Whistic.
  • Deep Fakes, Disinformation and Social Engineering Sep 24 2020 4:00 pm UTC 60 mins
    Etay Maor, Chief Security Officer, IntSights
    In information security, we always talk about PPT – People, Processes, and Technology. We tend to focus mostly on the tech: new sophisticated malware, surprising zero-day vulnerabilities, and advanced detection evasion techniques. But attackers are often one step ahead of security teams because they focus on people and processes. Nation states do the same - whether its meddling in elections, engaging in military PSYOPS or getting a foothold on a target’s network - there is a plethora of tools and tactics that target the person and not the technology.

    Register for, Deep Fakes, Disinformation and Social Engineering, presented by IntSights Chief Security Officer Etay Maor to learn why these technologies should be of interest to businesses and how they may "spill" from election interference to business interference.
  • Impact of COVID-19 on Cloud Adoption & Security Sep 24 2020 8:15 am UTC 45 mins
    Moderator: Vandana VERMA | Panelists: Satyavathi DIVADRI, Dr. Eiji SASAHARA , Dr. Hing-Yan LEE
    Panel Discussion
  • Keynote on FSI Sector in India Sep 24 2020 7:30 am UTC 30 mins
    Raj SHASTRAKAR, Director, Cyber Security Engineering, VISA
    Keynote on FSI Sector in India
  • Blockchain Use Cases & their Documentation Sep 24 2020 6:30 am UTC 45 mins
    Dr. Hing-Yan LEE, EVP, CSA APAC | Ashish MEHTA, Co -chair, CSA Blockchain WG
    This presentation will showcase the optimum way to document & identify a use case and whether deployment in the blockchain makes sense or not. Also,it will be sharing some of the use cases which the CSA Blockchain Working group has worked on and published in a peer-reviewed document available for the wider global cybersecurity community to learn from when they are actually deploying blockchains in their enterprises.
  • Security Automation: Principles, Opportunities, Risks, and Examples Sep 23 2020 6:00 pm UTC 75 mins
    Mike Mellor, Senior Director of Information Security, Adobe
    One of the fundamental principles of any security program is a focus on reducing the “timeline to compromise” for security issues. Not only are attacks getting more and more sophisticated, but they are also starting to get more aggressive as all of us have been forced by the pandemic crisis into new modes of working. Responding well to these challenges requires the ability to focus your resources on your most challenging security problems. Manual processes just cannot keep up with these changing security needs, especially as your organization grows. Thus, using automation as much as possible can help you scale to better manage necessary change.

    In this presentation, Mike Mellor, Head of Security for the Digital Experience Business at Adobe, will share his insights on these issues and talk about how Adobe is using automation throughout our security efforts to better focus our resources, be smarter about resource expansion as our business continues to grow, and better “foolproof” our processes. Mellor will provide details on automation techniques Adobe is using in application security, operational security, compliance, and enterprise security teams. These are techniques based upon industry best practices that you will be able to leverage for your own organization.
  • Harmonizing Serverless Security - Principles, Patterns and Controls Sep 23 2020 8:00 am UTC 30 mins
    Madhav Chablani, Chairman, CSA NCR Chapter
    Serverless architecture aims at changing the economic model of cloud computing, with the hope of introducing efficiency and cost savings. Serverless computing means that there are no servers to manage services. Hence in a serverless world, one no longer has to work on an operating system level. With the complexity of this business model, it is imperative that industry best practices are established to provide companies with guidelines to achieve compliance and security, that developers can effortlessly work with and employers are able to evaluate developers' work, and perceive the serverless architectural model at the same time.
  • Security Implementation Acceleration in the Fast Lane of Digital Transformation Sep 23 2020 7:15 am UTC 30 mins
    Ramesh Narayanaswamy, CTO, Aditya Birla Capital
    Significant acceleration in digital transformation implementation in the last four months , along with regulatory changes has created a need to change some of the data / cyber security strategies . In this session we will learn about what are the key steps that needs to be taken to course correct the short term and long term needs of the organization from a security point of view
  • Collaborating for Inclusion & Equality in Cybersecurity Sep 22 2020 6:00 pm UTC 75 mins
    Larry Whiteside, Jr., Co-Founder & President ICMCP and Illena Armstrong, Industry Strategy Advisor, CSA
    Diversity, inclusion and equality strategies and practices have always been integral to organizations’ daily operations and future growth. The need for executive leaders to genuinely embrace, evolve and continually hone their strategies this front has, indeed, become an even more acute differentiator and positive, constructive attribute of leading organizations. And while the cybersecurity industry, as a whole, has made some solid inroads to drive and nurture diversity, inclusion and equality efforts, more can and must be done. To be truly impactful in the long-term committed and continuous collaboration will be required. In this spirit, the Cloud Security Alliance and the International Association of Minority Cybersecurity Professionals are teaming up to support their respective members and the wider industry to aid them in further refine and reinforcing their inclusion and equality programs and long-term strategies.

    Thank you to our sponsors of the SECtember Experience: Adobe, ExtraHop, Qualys, OneTrust, Trendmicro, and Whistic.
  • In the Trenches of Cloud Governance Battles Sep 21 2020 6:00 pm UTC 75 mins
    Jim de Haas
    When a large organization adopts cloud computing, it goes through several learning curves. Especially when during this journey, a transformation towards a DevOps way of working is implemented. It goes through multiple growth stages. After two to three years, one reaches a stage with turf wars. A true story that reads like an Asterix and Obelix comic book, I will tell a story of an organization adopting both AWS and Azure cloud. While doing so they drastically change their IT strategy. As the years go by, more managers learn about cloud computing and consider themselves to be responsible for govern.
  • How to Prepare for an Audit Against the CSA STAR Standard Sep 18 2020 6:00 pm UTC 75 mins
    Walt Williams, CISO, Monotype & John DiMaria, CSA
    The CSA STAR allows for both an attestation under a SOC 2 audit or certification under ISO 27001. While most organizations self attest to the CSA Star, this presentation will discuss how to prepare for a successful audit under either SOC 2 or ISO 27001 to demonstrate compliance with the CSA STAR standard.

    Thank you to our sponsors of the SECtember Experience: Adobe, ExtraHop, Qualys, OneTrust, Trendmicro, and Whistic.
  • Vendor Risk Assessment: Secrets for Procuring Secure Cloud Services Recorded: Sep 17 2020 61 mins
    Jerry Cochran, Nick Sorenson, Gary Gooden, Walton Stephens, Steve Quane
    In this panel, our experts will share lessons learned and best practices for securing cloud services. From proactive risk assessments within the procurement process to architectural considerations to secure systems management, our diverse panel will provide a holistic perspective on the strategic programs organizations should have in place to secure their cloud experience.

    Thank you to our sponsors of the SECtember Experience: Adobe, ExtraHop, Qualys, OneTrust, Trendmicro, and Whistic.
  • “The More You Know” About Securing E-Learning Recorded: Sep 17 2020 44 mins
    Amanda Rogerson, Product Marketing Manager & Leya Leydiker, Technology Partnerships Manager, Duo
    Securing a good education for students has always been a top priority, but information security isn’t the first consideration to come to mind for most parents and educators. However, the move to eLearning and virtual lessons has increased the importance of cybersecurity -- with more and more students and teachers accessing school materials through a variety of devices and platforms in a variety of remote locations, the attack surface widens and the risk of breaches increases.

    So what if someone gains access to your/student’s/child’s information? What happens if someone’s identity is breached? To handle these situations and prevent them from happening in the first place, we need to stop thinking of cybersecurity as a “nice-to-have,” and instead see it as a “need-to-have,” with all parties onboard -- parents, teachers, students, tutors, and other caretakers.

    Luckily, there are many tools and resources available to help secure account access, prevent breaches, and which don’t take excessive resources to set up. For example, tools like password managers can help prevent insecure passwords or old password re-use.

    Schools implementing eLearning should incorporate tools like this early in the rollout process, and it can seem like a daunting challenge, but it doesn’t have to be -- with the right guidance and resources, security can be a seamless and lightweight part of an institution’s distance learning plan. As both security professionals and parents of children in distance learning, Duo’s Leya Leydiker and Amanda Rogerson are invested in getting you started. Join them on September 17 for a discussion on prioritizing security for student eLearning, handling breaches, and the best ways and places to teach and maintain security hygiene for parents, students, and educators alike.
  • XDR: Myth or Reality Recorded: Sep 16 2020 42 mins
    Sumedh Thakar, President and Chief Product Officer, Qualys
    In this session, Sumedh will discuss XDR a term that’s been trending in the security industry of late. Is this just a buzz word, or is there something real behind its rapid rise in popularity? He will discuss the current interpretations of the term, the background of why this is trending and possible reasons for the interest. He will discuss the pain points an XDR solution may address and which types of companies and departments will benefit from its implementation.
  • Risk Appetite & the Alignment of Cybersecurity w/ Business Agility. Recorded: Sep 15 2020 58 mins
    Andy Kirkland, CISO, Starbucks
    Risk Appetite and the Alignment of Cybersecurity with Business Agility. Are You Hungry?

    Most organizations would like you to believe they are agile. In 2020, they get to prove it. Everything has changed. Historical trend and proforma comparisons suddenly mean nothing. Sales drivers and market dynamics are now being influenced at a hyper-local level. Meanwhile, a workforce that used to pile into conference rooms to review data together now have to find a quiet place at home and find other ways to be heard. Join me as we discuss how a business value-driven cybersecurity organization keeps up with a rapidly evolving business.

    Thank you to our sponsors of the SECtember Experience: Adobe, ExtraHop, Qualys, OneTrust, Trendmicro, and Whistic.
  • Open Security – From Patchwork to Platform Abstract Recorded: Sep 15 2020 44 mins
    Patrick Vowles, NA Marketing Team Lead, IBM Security
    As organization adopt new technologies and utilize the cloud for business innovation and growth, security teams are challenged with ensuring that those initiatives and missions are successful. To do that they are faced with creating an effective security program from a fragmented patchwork of solutions and data sources that really don’t interoperate very well without a great deal of development work.

    Join us to hear how a number of leading vendors are coming together with the intent of creating an open source platform to allow security solutions to communicate over a standard fabric during the entire threat management life cycle, from threat hunting, analytics and detection through to incident response and orchestration.
  • Maturing Your Cloud Security Recorded: Sep 14 2020 43 mins
    Mike Rothman, President, Securosis
    In this session, Mike will go through the Cloud Security Maturity Model, developed in partnership between Securosis and IANS, to provide perspective on your cloud security journey. The session will describe the 12 categories across 3 domains, as well as laying out success criteria to improve maturity (and there improve cloud security posture). Anchored by a number of stories of success (and failure) in cloud security, attendees will leave with a clear view of what lies ahead for them.

    Thank you to our sponsors of the SECtember Experience: Adobe, ExtraHop, Qualys, OneTrust, Trendmicro, and Whistic.
Educational series on cloud computing, security and privacy.
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. It also allows audience members the opportunity to earn (ISC)2 CPE Credits.

Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Dark Web Demystified
  • Live at: Aug 6 2020 4:00 pm
  • Presented by: Charity Wright, Cyber Threat Intelligence Advisor, IntSights
  • From:
Your email has been sent.
or close