Hi [[ session.user.profile.firstName ]]

Better Vulnerability Awareness for IT and Development

The increasing rate of vulnerability reporting, combined with the number of sources producing those reports has made it more difficult than ever to monitor critical issues affecting your organization. While monitoring vulnerabilities has traditionally been most important for IT teams, it is becoming rapidly more relevant for software development teams as well, especially as the use of open source / third-party libraries increases.

Join Cytenna and (ISC)2 on November 22, 2016 at 1:00PM Eastern as we discuss solutions to this problem at both the IT and development level. Among other things, we'll cover Vulnerability Central, a free member benefit for all (ISC)2 members that can help you stay more aware of recent vulnerabilities, especially with its new e-mail notification feature.
Recorded Nov 22 2016 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Greg Barish, CTO, Cytenna; Brandon Dunlap, Brightfly (Moderator)
Presentation preview: Better Vulnerability Awareness for IT and Development

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Bitglass Part 3: Security in the Cloud - CASBs for IaaS Security Aug 29 2019 5:00 pm UTC 60 mins
    Jacob Serpa, Sr. Product Marketing Manager, Bitglass; Brandon Dunlap (Moderator)
    Infrastructure as a service (IaaS) has quickly risen to prominence because of the way that it provides enhanced flexibility and scalability to organizations around the world. However, using IaaS platforms like AWS, Azure, or GCP does require that organizations take responsibility for an increased amount of security in the cloud. Fortunately, there are tools designed to help with doing this properly. Join Bitglass and (ISC)² on August 29, 2019 at 1:00PM Eastern for a presentation on the various components of leading IaaS platform, what your organization is responsible for when it comes IaaS security and how Cloud Access Security Brokers (CASB) can help.
  • Gigamon Part #2 - Unleash the Power of True Application Visibility Aug 22 2019 5:00 pm UTC 60 mins
    John Gudmundson, Senior Product Marketing Manager, Brandon Dunlap (Moderator)
    You know that metadata helps you separate signal from noise, reduce time-to-threat-detection and improve overall security efficacy. But did you know that application metadata helps you monitor user experience, troubleshoot problematic apps, understand “Shadow IT” usage and improve security posture within your organization? Join Gigamon and (ISC)² on August 22, 2019 at 1:00 PM Eastern as we discuss the growing need for application-aware network operations and how Gigamon Application Metadata Intelligence provides the deep application visibility needed to rapidly pinpoint performance bottlenecks and potential network security risks. You’ll see how next-gen network packet brokers enhance metadata with intelligence and insights from traffic flows and discover how to understand the performance and control of hundreds of critical apps.
  • (ISC)²’s Digital Transformation Journey - Part 2 Aug 20 2019 5:00 pm UTC 60 mins
    Bruce Beam, CIO, (ISC)²; Wes Simpson, COO, (ISC)²; Brandon Dunlap (Moderator)
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 2 of the (ISC)2 Digital End-to-End Transformation (DETE) will examine how the COO and CIO executed the plan for the project, following the AGILE Project Management framework and the buy-in and support from other departments and stake holders within the organization. Additionally, there was board governance and oversight to contend with. Join Wes Simpson, COO and Bruce Beam, CIO on August 20, 2019 at 1:00PM Eastern for a discussion on these items and the speed bumps that were run into on this project.
  • Bitglass Part 2: Security in the Cloud: CASB for SaaS Security Aug 1 2019 5:00 pm UTC 60 mins
    Jacob Serpa, Sr. Product Manager, Bitglass; Brandon Dunlap (Moderator)
    The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August 1, 2019 at 1:00PM Eastern for an engaging webinar where we’ll look at the significance of SaaS apps and how to prioritize their security, how to protect data within managed applications and detect and secure the use of unmanaged applications.
  • 2019 Security Congress Preview – Cloud Security Recorded: Jul 23 2019 56 mins
    Richard Tychansky, Travis Jeppson, Brandon Dunlap (Moderator)
    (ISC)² will hold its Security Congress 2019 in Orlando, FL October 28th – 30th. This conference will bring together 3000+ attendees and over 180 educational sessions. One of the 18 tracks that are being offered with focus on Cloud Security and the challenges practitioners face when dealing with all things cloud related. On July 23, 2019 at 1:00PM Eastern, join (ISC)² and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • (ISC)²’s Digital Transformation Journey – Part 1 Recorded: Jul 16 2019 59 mins
    Bruce Beam, CIO, (ISC)²; Brandon Dunlap (Moderator)
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. The road to DETE, however, took years of planning and execution as our team modernized our infrastructure and back-end systems, including migrating the majority of key systems to the cloud. In Part One of this series examining the journey the organization undertook, Bruce Beam, CIO, will discuss the rationale behind the initiative and steps taken to gain approval from the board of directors. Join us on July 16, 2019 at 1 p.m. Eastern as we begin this three-part, in-depth case study of how (ISC)² accomplished this ambitious project.
  • Gigamon #1: Network Data Capture for Incident Response Recorded: Jul 11 2019 61 mins
    Ricardo Font, Product Marketing Manager, Insight, Gigamon; Brandon Dunlap (Moderator)
    Information security and incident response teams are often hampered by an inability to see what is happening on the network. That lack of visibility mean they cannot confidently detect threats or respond quickly and effectively. A new approach that consolidates fundamental network detection and response capabilities using enriched metadata collected from sensors in physical, virtual and cloud environments is helping security teams minimize mean-time-to-detection and response. How can you achieve accelerated threat detection and response through broad situational awareness fueled by real-time access to historical metadata? Join Gigamon and (ISC)2 on July 11, 2019 at 1PM Eastern as we dive into metadata’s critical role in incident detection and response strategies and how to best use metadata to focus incident response efforts through data correlation and enrichment.
  • Bitglass Part 1 - Security in the Cloud: CASBs and Their Top Use Cases Recorded: Jun 27 2019 57 mins
    Jacob Serpa, Sr. Product Marketing Manager, Bitglass; Brandon Dunlap, Moderator
    Organizations are flocking to the cloud more than ever before. The use of the cloud continues to proliferate throughout enterprises around the world and organizations are searching for how they can best assure they are properly protecting their data. After all, the rise of software as a service (SaaS) and infrastructure as a service (IaaS), has fundamentally changed the cybersecurity and business landscapes. Join Bitglass and (ISC)2 on June 27, 2019 at 1:00PM Eastern for an examination of the challenges of securing the cloud and BYOD, the shared model or responsibility for security and how cloud access security brokers (CASBs) can protect data.
  • Chronicle #3: Backstory + VirusTotal: Scale, Speed & Intelligence Multiplied Recorded: Jun 19 2019 59 mins
    John Chirhart, Customer Exp. Engineer, Chronicle; Svetla Yankova Head of Customer Exp., Chronicle; Brandon Dunlap, Moderator
    Having access to new technology and intelligence to allow proactive response to the threats will change the way teams protect their environments. Harness the massive computing power of Backstory integrated with the powerful insights from VirusTotal to process petabytes worth of data in almost real-time. Watch a step-by-step demo of how Chronicle's security solutions, working with partners like Tenable, can help your organization be better prepared and connected for what comes onto your network.
  • Gigamon #3 - Why Should I Care About SSL/TLS Decryption? Recorded: Jun 6 2019 52 mins
    Druce MacFarlane, Director, Security Products, Gigamon; Brandon Dunlap, Moderator
    The August 2018 GAO Report on the Equifax breach disclosed that while they used a tool for network layer decryption, their certificates were nine months out of date. This lapse gave the threat actors the time they needed to break in and exfiltrate reams of personal data. Once the certs were updated on their decryption tools, they realized what happened. A lesson learned from this is the importance of efficient decryption for effective threat detection. Join Gigamon and (ISC)2 on June 6, 2019 at 1PM Eastern for a discussion about how SSL/TLS encryption has become a threat vector, why decryption is essential to security and how to effectively perform detection and how to make sure your detection tools are working at their greatest capacity without the latency introduced by decryption.
  • Chronicle #2: Better Threat Hunting and Investigation with VirusTotal Recorded: May 24 2019 59 mins
    Brandon Levene, Head of Applied Intelligence; Chronicle; Brandon Dunlap (Moderator)
    Get a deeper look into malware campaigns using VirusTotal's newest tools. Learn from the expert how to use the platform and how best to leverage the data available to you and your security team. By better understanding the breadth and depth of malicious campaigns, researchers can better investigate and mitigate impact. Recently introduced improved relational metadata as well as expanded retroactive and proactive hunting capabilities allow investigators to dive deep into malware within a global data source.
  • Migrating to the Cloud Safely & Securely - Imperva Part 3 Recorded: May 23 2019 58 mins
    Shawn Ryan, Sr. Product Marketing Manager, Imperva; Brandon Dunlap (Moderator)
    Data capture, storage, and usage continues to grow at exponential rates. As a result, and in an effort to obtain operational efficiencies, many new organizations are “born in the cloud”, while for others, the migration of data and data driven business processes to cloud environments continues to escalate rapidly. The use of third party database and related cloud service offerings to support cloud and hybrid environments is also growing and evolving. However, security teams consistently report concerns with respect to the lack visibility and oversight of their data in the cloud. Typical questions being asked by CISOs are complex and not easy to answer. Join Imperva and (ISC)2 on May, 23, 2019 at 1:00PM Eastern for an examination of these questions and how to address them effectively.
  • Gigamon #2: Application Visibility for Better Security Operations Recorded: May 2 2019 60 mins
    John Gudmundson, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator)
    Securing your infrastructure can sometimes feel like navigating a ship at night in a storm, with pirates attacking. An occasional flash of lightning allows a quick glimpse of the intruders, but you never really know when or from where the next attack is coming. What if you could illuminate the best path forward? A centralized platform gives you a single window with pervasive visibility into all network traffic – both north-south and east-west which allows improvement to the effectiveness and efficiency of all your security tools and better manage SSL decryption as well as NetFlow generation. Join Gigamon and (ISC)2 on May 2, 2019 at 1:00PM for a discussion on how to discover applications on your network you didn’t know where there, spotting potential security vulnerabilities before they become a problem and see a live demo of how you can optimize security and network performance.
  • Buying Down Risk in the New World of App Development - Imperva Part 2 Recorded: Apr 25 2019 47 mins
    Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator)
    In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
  • Chronicle #1: How Backstory Can Help Organizations Rethink Enterprise Security Recorded: Apr 16 2019 63 mins
    Mike Hom, Product Management, Chronicle; Brandon Dunlap (Moderator)
    Today, most security teams struggle to identify and locate threats in their networks. Without the ability to find the bad actors in the network, security teams are unable to be effective in their roles. Organizations need tools to link intelligence about threats in the wild, threats in your network, and understand unique signals from both. In this webcast, we’ll examine the latest trends and downfalls in this space, and how Chronicle, an Alphabet company, is looking to solve them at a global scale with a focus on speed and efficacy. We’ll also have a demo of the Chronicle security platform, Backstory and how it can help streamline your security.
  • Gigamon #1: Network Upgrades Giving You Security Headaches? Recorded: Apr 4 2019 58 mins
    Sam Kumarsamy, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator)
    As the insatiable demand for bandwidth drives the need for faster networks, organizations still need to inspect and enforce network security policies at wire speed. And that is particularly challenging when you are upgrading networks from 10GB to 40GB or from 40GB to 100GB. Join Gigamon and (ISC)2 on April 4, 2019 at 1:00PM Eastern as we discuss how to solve the security headaches that go with these network upgrades and new architectures that strengthen your security posture, simplify IT and reduce costs. We’ll also discuss how to increase your security ROI, reduce your security risk and improve threat response.
  • Best Practices for Mitigating Data Breach Risk - Imperva Part 1 Recorded: Mar 28 2019 57 mins
    Sara Pan, Sr. Prod Mktg Mgr, Imperva; Brandon Dunlap (Moderator)
    Data breach(es) remains atop the list of any CISO’s main concern. With the exponential growth of users, apps, and data, that leads to more and more legitimate data access, the attack surface expands making it harder to determine whether a data access is appropriate. Many organizations rely on traditional perimeter-based security approach, but they’re still getting breached. Additionally, trying to constrain and control the interactions between users and data by locking down usage can not only slow down business, but also frustrate users. Due to this, they may decide to work around you, creating an even bigger risk for your company. Join Imperva and (ISC)2 on March 28, 2019 at 1:00PM Eastern to learn about some best practices to mitigate data breach risk without decelerating your business growth.
  • Infoblox #3: DNS….. One of the Best Weapons for Securing Networks? Recorded: Mar 21 2019 60 mins
    Chris Kissel, IDC, Research Director, Worldwide Security Products; Dawn Bedard, Sen Technologist; Elevi Assocs; B. Dunlap
    Today’s sophisticated cybersecurity attacks often unfold in the blink of an eye. To respond quickly, your security teams need to see security incidents as they happen to ensure that attempts to hack your server environment are thwarted before entry into your machines. Whether detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks – DNS can help with this and much more. But are you leveraging it as part of your cyber strategy? Nearly all threats use the DNS system therefore threats in your network can easily be seen in your DNS data. Join Infoblox and (ISC)2 on March 21, 2019 at 1:00PM Eastern as we bring in experts from IDC and ELEVI for a discussion on how leveraging DNS can help identify attacks as they happen or even prevent them before they happen, remediate attacks faster, and help detect and stop malware from spreading.
  • ExtraHop #3: How to Succeed at Threat Hunting & IR: Think Differently about Data Recorded: Mar 12 2019 59 mins
    Matt Cauthorn, VP of Cyber Security Engineering, ExtraHop; Brandon Dunlap, Moderato
    Two pillars of a successful and proactive SOC are threat hunting and incident response. The use of network traffic analysis can help improve performance in these two areas. This webcast will examine threat hunting and incident response and how network traffic analysis can make Tier 1 and Tier 3 analysts faster and more effective at validating, investigating, and responding to threats and security incidents
  • ExtraHop #2: Case Study: Proactive Security Hygiene in a Hybrid Enterprise Recorded: Feb 14 2019 56 mins
    Mike Sheward, Senior Director of Information Security, Accolade; Brandon Dunlap, Moderator
    Ever wonder how network traffic analysis (NTA) can reduce and harden an organization’s attack surface? In this webcast, the Director of Information Security at Accolade present a case study on how they use NTA to audit their security hygiene in real time, assuring that current standards for handling regulated data are being followed, and that all apps, services, and devices follow established security protocols to proactively reduce the chances of a data breach.
(ISC)2 Security Briefings - In-depth examination of infosec topics.
(ISC)2 Security Briefings brings attendees multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Better Vulnerability Awareness for IT and Development
  • Live at: Nov 22 2016 6:00 pm
  • Presented by: Greg Barish, CTO, Cytenna; Brandon Dunlap, Brightfly (Moderator)
  • From:
Your email has been sent.
or close