Hi [[ session.user.profile.firstName ]]

Briefings Part 2: Harvard Pilgrim Health Care Case Study

Keeping Compliance in Check & Controlling Access Risk:

Learn how one of the nation's largest health insurers provides access to users efficiently and effectively while also assuring that private constituent data is protected in compliance with HIPAA, HITECH and other federal and state privacy and security regulations. Join (ISC)2, Courion and Harvard Pilgrim Health Care on April 28, 2015 at 1:00pm Eastern to learn how the information security team is able to identify and remediate user access risks such as unnecessary privileged access, orphaned and abandoned accounts, and system or non-human accounts that call for administrative oversight.
Recorded Apr 28 2015 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark Teehan Manager IT Security, Harvard Pilgrim Health Care; Kurt Johnson, Courion
Presentation preview: Briefings Part 2: Harvard Pilgrim Health Care Case Study

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • CA Briefings Part 6: Step 4: Governance and Tying it all Together Feb 9 2017 6:00 pm UTC 75 mins
    CA Technologies and (ISC)2
    Controlling the access of all users, especially privileged ones, is essential not only for risk reduction but also for easier compliance. But, controlling access isn't enough. Organizations need to govern all user access to ensure that no user has more access than they need, and that segregation of duties policies are enforced. On February 9, 2017, CA Technologies and (ISC)2 will highlight the steps for strengthening the enterprise and increasing customer engagement as well as key aspects of effective identity governance, including for contractors and partners who might have access to your systems. Included in the discussion will be key capabilities and processes to help create leading-edge identity governance deployments that can improve the security of your critical data and simplify compliance audits.
  • CA Briefings Part 5: Annual Trends/Predictions Jan 12 2017 6:00 pm UTC 75 mins
    CA Technologies and (ISC)2
    Each year, security experts at CA Technologies offer predictions about some of the most compelling trends in the infosecurity space. Join CA Technologies and (ISC)2 on January 12, 2017 for a review of the research and data that contains compelling insights and information on trends on Security in the digital enterprise and steps for strengthening your enterprise and increasing customer engagement.
  • CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access Dec 8 2016 6:00 pm UTC 75 mins
    Hadeel Dabbaugh, Sr. Principal Product Mgr; Kathy Hickey, VP, Product Mgmt.; Brandon Dunlap (Moderator)
    The steps for strengthening your enterprise and increasing customer engagement has seen the rise of cloud adoption and a "bring your own app" trend in the workplace which continues to grow. IT and security leaders are hard pressed to keep up with the demands of a seamless user experience while protecting user identities across the cloud environment. On December 8, 2016 at 1:00PM Eastern, CA Technologies and (ISC)2 will examine how to leverage identity-as-a-service to secure access to cloud applications - including provisioning, onboarding and deployment, deliver a seamless user experience without compromising security and how to keep up with the pace of cloud adoption.
  • Bitglass Briefings Part 3: The Future of CASBs: A Cloud Security Force Awakens Recorded: Dec 1 2016 60 mins
    Mike Schuricht, Sr. Director, Product Management, Bitglass; Brandon Dunlap, Brightfly (Moderator)
    By now you are likely familiar with Cloud Access Security Brokers (CASBs) and understand how they fit into your broader security and cloud strategy. What should organizations be looking for in a CASB? What capabilities are here or on the horizon that can provide improved data protection in the cloud? On December 1, 2016 at 1:00PM Eastern, Bitglass and (ISC)2 presents the final episode of the CASB series where we will examine where cloud security is headed, discussing agentless and agent-based solutions, the growing number of cloud apps in use and the importance of easy deployment. Learn why cross-app security will become increasingly valuable as organizations look to third-party solutions for deep visibility, behavior analytics, and more.
  • Better Vulnerability Awareness for IT and Development Recorded: Nov 22 2016 58 mins
    Greg Barish, CTO, Cytenna; Brandon Dunlap, Brightfly (Moderator)
    The increasing rate of vulnerability reporting, combined with the number of sources producing those reports has made it more difficult than ever to monitor critical issues affecting your organization. While monitoring vulnerabilities has traditionally been most important for IT teams, it is becoming rapidly more relevant for software development teams as well, especially as the use of open source / third-party libraries increases.

    Join Cytenna and (ISC)2 on November 22, 2016 at 1:00PM Eastern as we discuss solutions to this problem at both the IT and development level. Among other things, we'll cover Vulnerability Central, a free member benefit for all (ISC)2 members that can help you stay more aware of recent vulnerabilities, especially with its new e-mail notification feature.
  • Bitglass Briefings Part 2: CASBs and Office 365: The Security Menace Recorded: Nov 17 2016 60 mins
    Salim Hafid, Product Marketing Manager, Bitglass
    Office 365 and other SaaS apps offer a number of advantages over premises-based apps, from easy access and deployment to lower costs. A key advantage of SaaS apps is IT's ability to shift the burden for app and infrastructure security to the cloud vendor while data security remains the responsibility of the enterprise. Migrating to Office 365 introduces several new avenues for data leakage: one-click sharing, desktop sync clients, unmanaged device access, and many more. Bitglass and (ISC)2 presents Episode 2 of our CASB Wars webinar trilogy on November 17, 2016 at 1:00PM Eastern where we explore the security gaps in Office 365 and how a Cloud Access Security Broker (CASB) can help mitigate the threat of data leakage across all SaaS apps. Using real-world use cases, see where native Office 365 security falls short and how a CASB can protect data end-to-end, from cloud to device.
  • CA Briefings Part 3: Step 2: Protect from Within - Requirements for PAM Recorded: Nov 3 2016 60 mins
    John Hawley, VP of Security Strategy & Trevor Brown, Project Manager, CA Technologies and Brandon Dunlap, Moderator
    Identity is the new perimeter for Security in the digital enterprise. According to Forrester, 80% of security breaches involve the use or abuse of privileged credentials. At the same time, compliance mandates (such as PCI) require organizations to focus on how they manage and control privileged users in order to protect these critical resources. Privileged Access Management (PAM) provides a host of capabilities that enable organizations to address these critical challenges. Join CA Technologies and (ISC)2 on November 3, 2016 at 1:00PM Eastern as we continue examining the steps for strengthening your enterprise and increasing customer engagement highlighting emerging requirements in privileged access management and present key capabilities that are important in a comprehensive PAM solution.
  • Bitglass Briefings Part 1: The Evolution of CASBs: A New Hope Recorded: Oct 27 2016 61 mins
    Amish Kohli, Solution Engineer, Bitglass; Brandon Dunlap, Brightfly (Moderator)
    For enterprises looking to protect cloud app data, Cloud Access Security Brokers (CASBs) have quickly emerged as the go-to solution. But how have CASBs matured and encompassed critical pieces of the security puzzle, from identity management to data leakage prevention? Join Bitglass and (ISC)2 on October 27, 2016 at 1:00PM Eastern for Episode 1 of the CASB Wars webinar trilogy for a discussion about the evolution of CASBs from app discovery to complete cloud security suites and basic API-based controls to more capable multi-protocol proxies.
  • Solution Summit - Part 3 - A Data Science Approach to Cloud Security Recorded: Oct 6 2016 46 mins
    Deena Thomchick, Senior Director of Cloud Security, Symantec + Blue Coat; Brandon Dunlap (Moderator)
    This session will examine how modern data science and machine learning technologies can be applied to cloud security to address scalability and protection from the increasingly complex threat landscape. Such techniques can be leveraged to continuously monitor cloud activity and identify threats related to compromised accounts or malicious activity. These techniques can also be used to dynamically identify new cloud apps and services, and improve accuracy of automated content inspection - ensuring that sensitive data is properly handled in the cloud. By leveraging these modern tools, enterprise organizations can improve their overall security posture while reducing the amount of time and effort required from their security professionals.
  • Solution Summit - Shadow Data Part 2 - Exploits Leveraging Cloud Apps & Services Recorded: Oct 6 2016 55 mins
    Dr. Aditya Sood, Ph.D., Director of Security and Cloud Threat Labs, Symantec + Blue Coat; Brandon Dunlap (Moderator)
    As valuable company data increasingly migrates to cloud apps and services, the risk and expense of data theft and leakage has risen dramatically. Malicious actors are less likely to attack the well-fortified back-end infrastructure of cloud app vendors, preferring to exploit the weakest link – the human element – to get in through the "front door". Compromised credentials via phishing attacks or other means or malware that hijacks a valid user session are some of the key threats that must be addressed in this new cloud landscape. This session will examine recent exploits leveraging cloud apps and services.
  • Solution Summit Part 1: Shadow Data - The Elastica Shadow Data Report Recorded: Oct 6 2016 56 mins
    Martin Johnson, Sr. Director of Product Marketing of Cloud Security, Symantec + Blue Coat; Brandon Dunlap (Moderator)
    Do you know what apps your employees have adopted without IT approval? Do you know whether the apps your employees are using are secure for business use? Do you know how many risky exposures are lurking in these cloud apps? The Shadow Data Report, published by Elastica Cloud Threat Labs, addresses key trends and challenges faced by enterprises securing data stored and shared via cloud apps and services. This report is based on the analysis of over fifteen thousand cloud apps and 108M documents. This session will examine the findings as well as the potential repercussions of data leakage, including compliance and mitigation costs.
  • Solution Summit - Part 4: Roundtable Discussion Recorded: Oct 6 2016 23 mins
    Eric Andrews, Gerry Grealish, Aditya Sood - Blue Coat; Brandon Dunlap (Moderator)
    A discussion with the presenters of the first 3 parts of the Solution Summit series.
  • Solution Summit Part 3: Threat Protection & Incident Response Recorded: Oct 6 2016 61 mins
    Aditya Sood, Blue Coat; Brandon Dunlap, Brightfly (Moderator)
    It is said that the bad guys follow the money (why do thief's rob banks? . . .). As valuable assets increasingly migrate to cloud infrastructure, there is a need for diligent protection of these assets. Malicious actors are less likely to attack the well-fortified back-end infrastructure of cloud app vendors, but rather pray on the human element to get in through the "front door". Compromised credentials via phishing attacks or other means or malware that highjacks a valid user session are some of the key threats that must be addressed in this new cloud landscape. This session will examine these and other threats, along with new approaches to address these at scale.
  • CA Briefings Part 2: Step 1: Protecting the Front Door with SSO & Authentication Recorded: Oct 6 2016 60 mins
    Carol Alexander, Sr. Dir Security, CA Technologies; Rob Marti, Princ, Prod. Mgr, CA.; Brandon Dunlap
    Making it easy for your customers to engage with you requires frictionless security. Begin by ensuring you have modern single sign-on and authentication to provide compelling, simple, yet non-intrusive environments for your customers. Continuing the examination of steps for strengthening your enterprise and increasing customer engagement, join CA and (ISC)2 on October 6, 2016 at 1:00PM for Part 2 of our Briefings series where we'll examine how to employ analytics to streamline the path to your applications, address hybrid environments (both SaaS and on premise) and ensure AA and SSO are meeting continually emerging challenges of the digital enterprise.
  • Solution Summit - Part 2: Data Governance & Protection Recorded: Oct 6 2016 55 mins
    Gerry Grealish, Blue Coat; Brandon Dunlap, Brightfly (Moderator)
    Even when applications are "sanctioned", there is still a need to ensure they are being used in a safe manner. Ease of collaboration is a double-edged sword, as employees may inadvertently share sensitive content leading to liability for the company. Furthermore, compliance regulations often have strict requirements on how data is managed in the cloud. This session will explore data governance and protection of sensitive data as it migrates to cloud apps and services.
  • Solution Summit - Part 1: Cloud App Discovery & Analysis Recorded: Oct 6 2016 54 mins
    Eric Andrews; Blue Coat; Brandon Dunlap, Brightfly (Moderator)
    You can't secure what you can't see. While many organizations are actively embracing cloud apps as a strategic part of their IT infrastructure, many employees or lines of business are adopting additional ad hoc cloud services to aid business productivity or for personal applications. Known as "Shadow IT", these additional cloud apps and services bypass the oversight of IT, and may introduce risk or cost inefficiencies. This session will explore this issue, along with approaches.
  • CA Briefings Part 1: The Digital Marketplace & Cybersecurity Recorded: Sep 1 2016 61 mins
    Michelle Waugh, Security Business, CA Technologies; Brandon Dunlap
    Your business is part of a new digital reality and the digital relationships you have with individuals are your greatest assets. They are also the new perimeter, where identities are the unifying control point across apps & data and users demand access and insight with an exceptional user experience. While all this drives your business, it also opens you up to attacks and breaches. Join CA Technologies and (ISC)2 on September 1, 2016 at 1:00PM Eastern for this first event of a six-part webcast series where you will learn how leaders can adapt to the new digital reality -- embrace new identity and access management strategies that allow you to innovate in ways you never imagined.
  • Briefings Part 2: The Evolving Nature of Ransomware Attacks Recorded: Aug 18 2016 59 mins
    Ryan Benson, Senior Threat Researcher, Exabeam; Brandon Dunlap, Moderator
    Like all cyber threats, ransomware continues to evolve and its effects will cause significantly greater impact to corporate organizations and networks. Just as computer viruses caused more damage as they grew in sophistication, ransomware is increasing its way to enter networks and wreak more havoc. Newer strains now know to look for networked file shares as encryption targets. Do you know what signals to look for to detect ransomware as it begins to attack? Exabeam researchers have analyzed nearly 100 strains of malware and have categorized some of the more aggressive techniques being used. Join Exabeam and (ISC)2 on August 18, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms ransomware might use to propagate and how to detect signs of these mechanisms in use.
  • Briefings Part 3: Secure in the Cloud - Securing Email Migration to Office 365 Recorded: Aug 4 2016 60 mins
    Michael Osterman, President, Osterman Research; Marcelo Delima, Global Product Mktg Mgr, HPE SecureMail
    The cloud's promise of on-demand functionality for a lower cost has arrived to business applications. The use of Microsoft Office 365 across the globe is growing rapidly, with a clear value proposition to re-invent productivity for organizations of all sizes. But the transition to the cloud is not without challenges. Office 365 offers concerns in terms of privacy, compliance and security which can be addressed through the use of end-to-end encryption for all e-mails and files sent to Office 365. Join HPE and (ISC)2 on August 4, 2016 at 1:00PM Eastern for an examination of the steps for an Office 365 migration, security and privacy concerns for the cloud environment and how to achieve end-to-end encryption.
  • Briefings Part 1: Anatomy of a Ransomware Attack Recorded: Jul 21 2016 60 mins
    Barry Shteiman, Director, Threat Research, Exabeam; Brandon Dunlap, Brightfly
    Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
(ISC)2 Security Briefings - Deep dive in infosecurity topics
(ISC)2 Security Briefings brings attendees multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Briefings Part 2: Harvard Pilgrim Health Care Case Study
  • Live at: Apr 28 2015 5:00 pm
  • Presented by: Mark Teehan Manager IT Security, Harvard Pilgrim Health Care; Kurt Johnson, Courion
  • From:
Your email has been sent.
or close