Hi [[ session.user.profile.firstName ]]

Solution Summit - Part 1: Cloud App Discovery & Analysis

You can't secure what you can't see. While many organizations are actively embracing cloud apps as a strategic part of their IT infrastructure, many employees or lines of business are adopting additional ad hoc cloud services to aid business productivity or for personal applications. Known as "Shadow IT", these additional cloud apps and services bypass the oversight of IT, and may introduce risk or cost inefficiencies. This session will explore this issue, along with approaches.
Recorded Oct 6 2016 54 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Andrews; Blue Coat; Brandon Dunlap, Brightfly (Moderator)
Presentation preview: Solution Summit - Part 1: Cloud App Discovery & Analysis

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Workforce Gap Widens: The Need to Focus on Skills Development Nov 20 2018 6:00 pm UTC 75 mins
    John McCumber, Director of Cybersecurity Advocacy, North America, (ISC)2
    The 2018 (ISC)² Cybersecurity Workforce Study finds the cybersecurity skills shortage continues to grow. But the news isn’t all doom and gloom. Our latest deep dive into the issues and challenges facing cybersecurity professionals adopts a new approach to more broadly define the cybersecurity workforce. The study reveals a relatively satisfied, younger and more diverse field of practitioners focused on developing their skills and advancing their careers. Join (ISC)² Director of Cybersecurity Advocacy, North America, John McCumber On November 20, 2018 at 1:00PM Eastern as we examine how practitioners are dealing with the workforce gap while balancing skills development, hiring priorities and everyday threats they face.
  • Gigamon 3 - Threat Hunting: Objectively Measuring Value Recorded: Nov 1 2018 57 mins
    Justin Kohler, Sen Dir, Customer Success, Gigamon; Patrick Perry, Technical Acct Mgr, Gigamon Insight; Brandon Dunlap
    Someone in leadership always seems to ask the question “How can I tie my threat hunting activities to real impacts for the organization?” Threat hunting programs are encouraged as part of a mature and successful incident response capability and teams invest significant time and effort in the development and maintenance of that program. However, management is always looking for metrics to demonstrate the value of threat hunting in real terms due to the number of hours consumed by such highly skilled professionals. It’s a big investment. Join Gigamon on November 1, 2018 at 1:00PM Eastern for an examination of how to demonstrate value from threat hunting operations with practical methods and examples for tracking hunting operations, reporting and attributing outcomes to industry-leading frameworks and plot hunting goals and coverage across the MITRE ATT&CK framework.
  • Has Your Network Packet Broker Evolved with Your Infrastructure? Recorded: Oct 18 2018 60 mins
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator)
    As your infrastructure has grown to include a mix of physical, virtual and cloud environments with increased network speeds and volume of data, so have the threats increased to your attack surface with more vectors to breach your organization. This challenges your network and security operation teams and tour traditional network packet broker needs to evolve from providing network visibility to also helping strengthen your security posture. Join Gigamon and (ISC)2 on October 18, 2018 at 1:00PM Eastern where we will examine the acquisition and aggregation of data from your physical, virtual and cloud infrastructure, filtering of traffic to provide the right data to the right tools, transforming your data with masking, header stripping and SSL decryption (TLS1.3) to ensure compliance, threat prioritization by providing context and bridging the gap between NetOps and SecOps.
  • Gemalto 3: Preparing for Quantum Recorded: Sep 18 2018 43 mins
    Michael Gardinar, Principal Architect, Enterprise & Cybersecurity CTO Office, Gemalto; Brandon Dunlap (Moderator)
    We’ve all heard that quantum computers are coming; beyond being a boon for materials science they’re going to wreak havoc for cybersecurity. Part 3 of this series from Gemlato will outline the scope of the problem (it’s more than just algorithms) as well as the work required and being done to protect data through the upcoming transition.
  • KnowBe4 #3: Secrets to a Successful Security Awareness Training Program Recorded: Sep 7 2018 61 mins
    Perry Carpenter, Chief Evangelist & Strategy Officer, KnowBe4; Brandon Dunlap (Moderator)
    With 91% of data breaches being the result of human error, security leaders, auditors, and regulators increasingly recognize that a more intentional focus on the human side of security is critical to the protection of organizations. However, organizations have been struggling with and debating the effectiveness of traditional security awareness and training. KnowBe4 shares results-focused strategies and practical insights on how to build a world-class program
  • KnowBe4 #2: How To Phish Like the Bad Guys Recorded: Sep 6 2018 59 mins
    Perry Carpenter, Chief Evangelist & Strategy Officer, KnowBe4; Brandon Dunlap (Moderator)
    In spite of all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. Successful hackers know the user is the weakest link in the security chain. Email phishing campaigns have proven to be the path of least resistance to get unsuspecting individuals to download and install their malicious software. Getting users to identify phishing attacks and training them not to click on links in email messages is not a trivial task. Join KnowBe4 as we discuss the strategies and techniques that social engineers are finding success with, how to implement these techniques and to create real-world simulated phishing email to test your employees and see how phish-prone they really are.
  • Security Briefing: What’s So Hard About Securing Virtual Workloads? Recorded: Sep 6 2018 44 mins
    Baseer Balazadeh Sr. Technical Marketing Engineer, Public Cloud, Gigamon; Brandon Dunlap (Moderator)
    As organizations build out their infrastructure across public, private and hybrid platforms, security architects need to extend their enterprise security policies and protocols to all workloads, no matter where they reside. Still, security operations teams are challenged with proactively detecting threats, deviations from organizational policies and violations of industry and organizational compliance for mission-critical applications in the cloud. Why is that? Join Gigamon and (ISC)2 on September 6, 2018 at 1:00PM Eastern where we’ll explore ways to assure compliance and decrease time to detect threats in mission-critical applications, reduce risk by leveraging a common platform across your entire IT environment and ensuring SLAs are met by tightly integrating the public cloud provider’s APIs and critical cloud provider services to automatically detect changes in virtual private clouds and virtual networks.
  • KnowBe4 - Levers of Human Deception: Science & Methodology of Social Engineering Recorded: Sep 4 2018 63 mins
    Perry Carpenter, Chief Evangelist & Strategy Officer, KnowBe4; Brandon Dunlap (Moderator)
    No matter how much security technology we purchase, we still face a fundamental security problem: people. People can be manipulated every day and in many ways; from the tactics used by car dealers, to sophisticated social engineering and online scams. Part 1 of KnowBe4’s 3 part series will This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding and how to ethically use these same levers when educating users.
  • Beyond Office 365: How Your Peers are Taming the Long Tail of SaaS Apps Recorded: Aug 9 2018 61 mins
    Salim Hafid, Marketing Manager, Bitglass; Brandon Dunlap (Moderator)
    The long tail of SaaS is growing rapidly. Today, thousands of unmanaged "Shadow IT" applications are used in every major enterprise around the globe and IT departments have little visibility or control over these rogue apps. While the challenge was first simply to secure major SaaS platforms like Office 365, the new reality is a “cloud and mobile-first world” where employees often use new applications that aren’t approved and put corporate data at risk. Join Bitglass and (ISC)2 on August 9, 2018 at 1PM Eastern for the final part of this Security Briefings series where we’ll discuss how leading organizations are evolving their security to solve these challenges, what organizations are prioritizing when evaluating a solution and how zero-day technologies built for a cloud-first world are able to identify, categorize, and secure unknown apps.
  • Gemalto 2 - The EU’s General Data Protection Regulation (GDPR) - Myth to Action Recorded: Aug 7 2018 56 mins
    Alexander Hanway, Sr. Product Mrky Mgr, Data Protection, Gemalto; Andrea Middleton, Sen Sec. Prod Mgr. NetApp; Brandon Dunlap
    The General Data Protection Regulation (GDPR) is the biggest overhaul of EU data protection law in more than 20 years. It’s not simply another regulation. It’s about accountability and it’s reshaping how organizations view and interpret privacy. Join us as we uncover the regulation, define a new lens and perspective to address not only the GDPR, but other regulations which are sure to follow. Understand the ecosystem and seamless integrated security solutions necessary to address these key privacy challenges. Whether you are looking for insight, guidance, or solutions to privacy, join in on this journey with GDPR as a guide to understanding and addressing privacy in today’s organizations.
  • 2018 Security Congress Preview – Cloud Security Recorded: Jul 24 2018 56 mins
    Mike Brannon, Dir, Infrastructure & Security, Nat'l Gypsum; Eric Fiterman, Consultant, Tyler Smith, IT Analyst, John Deere
    (ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • Mind the Gap: The 5 Most Common Cloud Security Oversights Recorded: Jul 12 2018 60 mins
    Jacob Serpa, Product Marketing Manager, Bitglass, Brandon Dunlap (Moderator)
    Even with a renewed focus on security, cloud applications have introduced new risks that many organizations have yet to address. Powerful productivity platforms have been widely deployed in an effort to enable employee communication and facilitate collaboration. Apps enabling employee communication and collaboration cannot be secured with traditional firewalls and gateways. They require a fundamental rethinking of security – a shift from endpoint and network-centric protection to data protection. Join Bitglass and (ISC)2 on July 12, 2018 at 1:00PM Eastern as we explore the five most common security oversights that may put your cloud data at risk.
  • Gigamon Briefing Part 3 - Improving Security Using Metadata Recorded: Jun 28 2018 62 mins
    Preetham Gopalaswamy, Head of Product Management, Gigamon; Brandon Dunlap, Brightfly (Moderator)
    Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to determine who is talking to whom and get visibility into malware and bad actors that may be hiding on the network. Many enterprises aggregate information from various sources, such as events and logs from DNS servers, web servers and security tools, to hunt for threat events and indicators of compromise. But these are not reliable sources; logging can be turned off inadvertently or for performance reasons. Raw network data is the ultimate source of truth – but sending it all to a SIEM can become very expensive. Join Gigamon and (ISC)2 on Thursday, June 28, 2018 at 1:00PM Eastern for a discussion on how visibility into your application traffic is elemental to security, how application metadata can provide context of potential threat events and to more easily enforce corporate compliance.
  • Before You Choose Microsoft - 5 Things to Consider in an Access Mgmt Solution Recorded: Jun 13 2018 52 mins
    Mor Ahuvia, Product Marketing Mgr - IAM, Gemalto; Brandon Dunlap, Brightfly (Moderator)
    Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well. This Security Briefing will examine the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
  • Taming the Cloud Together – CCSP & CCSK Cloud Certification Synergy Recorded: Jun 12 2018 58 mins
    David Shearer, CEO, (ISC)2; Jim Reavis, CEO, CSA; Kevin Jackson, GovCloudNetwork ; Rich Mogull, Securosis; B. Dunlap (Mod)
    Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney. Batman and Robin. In the ever-changing world of the cloud, cyber security professionals need continuous training and certifications to stay up-to-speed and pairing (ISC)2’s CCSP (Certified Cloud Security Professional) with CSA’s CCSK (Certificate of Cloud Security Knowledge) can put any cyber security practitioner ahead in terms of knowledge, skills and job opportunities. On June 12, 2018 at 1:00PM Eastern, join David Shearer, (ISC)2’s CEO and Jim Reavis, CSA’s CEO, along with other subject matter expects as we explore the differences between each program, the training options available for each, and how these programs are synergistic in nature and together were designed to build on one another.
  • Briefings Part 1: CASBs in the Wild - The Most Leveraged Cloud Security Policies Recorded: Jun 7 2018 59 mins
    Salim Hafid, Product Marketing Manager, Bitglass; Brandon Dunlap, Brightfly (Moderator)
    Cloud security is top of mind for all organizations as they migrate to SaaS and IaaS platforms like Office 365 and AWS, but many are grappling with selecting solutions that best balance employee privacy, productivity, and data integrity. While most enterprises are already following security best practices on-premises, few have extended those practices and policies to the cloud. Cloud access security brokers (CASBs) have emerged as the go-to solutions for real-time data and threat protection in the cloud. Purpose-built to solve some of these challenges, CASBs feature a suite of capabilities that can implement granular policies around data at access and at rest. Join Bitglass and (ISC)2 on June 7, 2018 at 1:00PM Eastern for a Security Briefing as we explore the most leveraged security policies necessary to protect corporate data in a cloud and mobile-first world.
  • Organizational Dynamics of Information Security Recorded: Jun 5 2018 60 mins
    Daniel Kennedy, Research Director, 451 Research; Brandon Dunlap, Moderator
    Positioning Information Security within the enterprise presents its own set of challenges. Our recent survey data from hundreds of senior security and IT leaders like you uncovered a number of systemic security challenges – from skills shortages to retention strategies; not to mention responding to new challenges around cloud and IoT, and other organizational and operational issues. Join 451 Research and (ISC)2 on June 5, 2018 at 1:00PM Eastern as Research Director and former CISO Daniel Kennedy discusses this survey data and takes questions from the audience.
  • Briefings Part 2 - Threat Detection in TLS: The Good, Bad & Ugly Recorded: May 31 2018 59 mins
    Ian Farquhar, Global Security Strategist, Gigamon; Brandon Dunlap, Brightfly (Moderator)
    While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to encrypted attacks, hidden command and control threats and data exfiltration exploits that go undetected. Making this situation even more complex, the TLS 1.3 draft 28 proposal, ratified at the IETF 101 conference in London and now moving toward official RFC status, has actually removed the visibility which was widely deployed for threat identification in TLS 1.2. On one hand, encryption is moving toward ubiquity but on the other, we need to detect when threat actors use it too. Join Gigamon and (ISC)2 on May 31, 2018 at 1PM Eastern where we’ll discuss the necessity of deploying TLS decryption in the core of networks and will explore innovative architectures that deliver that capability while maintaining availability and reliability.
  • Briefings Part 1: Using Inline Security Tools to Achieve Your Security Goals Recorded: Apr 26 2018 60 mins
    Patrick Riley, Principle Product Manager, Gigamon; Brandon Dunlap, Moderator
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)2 on April 26, 2018 at 1:00PM Eastern for Part One of a Security Briefings series where we will examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Briefings Part 3 - Hybrid Cloud – What it is & How Do You Secure It? Recorded: Apr 5 2018 59 mins
    Speakers: Ajay Uggirala, Product Marketing, Imperva; Marty Jost, Sen Product Mktg Mgr; Brandon Dunlap, Brightfly (Moderator)
    The advantages offered by a cloud-based environment makes it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. Join Imperva and (ISC)2 on April 5, 2018 at 1:00PM Eastern as we define the hybrid cloud and talk about best practices to secure your company assets as you start managing and securing them both on-premises and in the cloud.
(ISC)2 Security Briefings - In-depth examination of infosec topics.
(ISC)2 Security Briefings brings attendees multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Solution Summit - Part 1: Cloud App Discovery & Analysis
  • Live at: Oct 6 2016 2:45 pm
  • Presented by: Eric Andrews; Blue Coat; Brandon Dunlap, Brightfly (Moderator)
  • From:
Your email has been sent.
or close