Hi [[ session.user.profile.firstName ]]

Security Briefings Part 2: Top 5 Cloud Security Threats

Cloud apps offer several advantages over premises-based apps, from lower costs to easy deployment. In fact, 59% of organizations have already deployed apps like Office 365, Box, and Salesforce. As data moves to the cloud, security is of utmost importance. On April 6, 2017 at 1:00PM Eastern, join Bitglass and (ISC)2 for Part 2 of our Briefings series where we will discuss security threats such as external sharing, compromised credentials, lost/stolen devices and how you can best mitigate these threats. Learn how Cloud Access Security Brokers (CASBs) can provide end-to-end data protection, in the cloud and on any device.
Recorded Apr 6 2017 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Scott Boda, Solutions Engineer, Bitglass; (ISC)2; Brandon Dunlap, Moderator
Presentation preview: Security Briefings Part 2: Top 5 Cloud Security Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top Five Cybersecurity Predictions for 2022 Dec 15 2021 6:00 pm UTC 60 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    This year was particularly challenging for IT security professionals. For a short while, we thought we finally had this pandemic kicked. Then the Delta variant came along, further extending the work-from-home movement and its associated cybersecurity risks. Meanwhile, we saw record-setting ransomware attacks, including high-profile attacks on critical infrastructure, while the shortage of IT security talent worsened. On a brighter note, we saw increased adoption of promising security technologies, such as zero trust network access (ZTNA) and secure access service edge (SASE).

    So, what does next year have in store for the cybersecurity industry? Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he shares his top five cybersecurity predictions for 2022.
  • Open Doors with CCSP- How to Start Your Career in Cloud Security Dec 8 2021 6:00 pm UTC 60 mins
    James Packer, Joe South, Angus Macrae
    Cloud is an intrinsic part of our everyday lives both personally and professionally. With more organizations running vital business functions in the cloud, the demand for cloud security professionals has never been higher.

    (ISC)2 interviewed about 50 Certified Cloud Security Professionals (CCSPs) who achieved this credential mid or later in their careers and asked them why they chose to add the CCSP to their skillset and the benefits they experienced as a result. And we want to share their answers with YOU!

    Join our live panel of distinguished CCSPs and host Brandon Dunlap on Wednesday, December 8th at 1pm EST to find out why our panelists and thousands of others have pursued the CCSP credential.

    Accelerate Your Career in Cloud Security – with CCSP

    Save your spot today!
  • The Cloud Gambit: Advanced Moves for a Cloud Security Career Nov 17 2021 6:00 pm UTC 59 mins
    Keatron Evans, Dave Hatter, Charlie Platt
    Taking the step toward earning the (ISC)² Certified Cloud Security Professional (CCSP) credential puts you on a path to excel as an expert in cloud security. CCSP empowers individuals and organizations with the highest level of mastery in cloud security.

    But how do you get started? How do you prepare? And why…what tangible benefits will you gain? Join (ISC)² for a panel discussion as industry professionals share their stories, experience and tips toward preparing for the Certified Cloud Security Professional certification. Areas for discussion will include:

    - Why you should consider CCSP
    - How to prepare for CCSP
    - How CCSP can accelerate your career progression
  • Cyber Insurance: Optimizing Costs While Minimizing Risk Nov 11 2021 6:00 pm UTC 60 mins
    Srikrupa Srivatsan, Director, Product Marketing, Infoblox; Brandon Dunlap, Moderator
    With hybrid workplaces now the new norm and supply chain attacks on the rise, there’s an increased exposure to cyber-attacks, which can cause substantial disruption to any organization or industry. This increased exposure is forcing companies to not only invest and improve their own cybersecurity posture, but also manage third party risk and protect against cyber risks with cyber insurance. Certain best practices and technologies help reduce your risk and improve your security score while helping to keep insurance premium costs low. DNS security is one such approach that provides extended visibility, protection and security automation to improve a company’s security posture.

    Join Infoblox and (ISC)2 November 11th, at 1 p.m., ET/ 10 a.m. PT for this webinar to learn more about:

    o Why organizations invest in cyber insurance

    o Getting the most out of cyber insurance

    o How DNS security improves security scores and reduces cyber insurance premiums
  • Strategies for Recruiting and Retaining Top IT Security Talent Nov 10 2021 6:00 pm UTC 60 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    Recruiting and retaining qualified IT security talent has never been more challenging. Nearly nine in 10 organizations are experiencing a shortfall, according to CyberEdge’s 2021 Cyberthreat Defense Report. That’s up from eight in 10 organizations just three years ago. This weighs heavily on the minds of IT security managers as ‘lack of skilled personnel’ is consistently rated as one of the top inhibitors to successfully defending networks against cyberthreats. So, what can organizations do to mitigate the effects of this talent shortage? Well, if you’re willing to ‘think outside the box,’ there is hope. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he:

    Examines the shortage of IT security personnel by job role
    Proposes creative ways for recruiting new security talent
    Suggests clever ways for retaining the talent you already have
    Identifies technologies that enable security teams to do more with less
  • CISSP: The Time Is Now Nov 9 2021 6:00 pm UTC 60 mins
    Adesoji Ogunjobii, CISSP-ISSAP, CCSP, Chris Clinton, CISSP, Samana Haider, CISSP, Tiffany Temple, CISSP, SSCP
    The future is created by what you do today. Oftentimes we don’t feel we are ready to take what seems like a big step forward. But we want to show you why now is the best time to make that first step on your CISSP journey.

    People from all walks of life, of various generation, from every industry and with different lifestyles have all succeeded in their mission to achieve the CISSP. Through this webinar our panel of CISSPs want to share the different paths you can take to achieve the CISSP and the benefits that the CISSP brings to your career.

    Join our live panel of distinguished CISSPs and host Brandon Dunlap on Tuesday, November 9th at 1pm ET to take that first step on the ladder to harnessing the CISSP credential. Stronger cybersecurity starts with CISSP!

    Save your spot today!
  • Of Ransom and Redemption: Findings from the 2021 Application Protection Report Nov 4 2021 5:00 pm UTC 60 mins
    Sander Vinberg, Threat Research Evangelist, F5 Labs; Brandon Dunlap, Moderator
    F5 Labs, one of F5 Networks’ information security research teams, publishes the Application Protection Report to help bridge the divide between tactics and strategy in information security. Join F5 Labs and (ISC)2 on November 4, 2021 at 1:00p.m. Eastern as we will share the findings from the 2021 Application Protection Report, which covers the explosion of ransomware in 2021, formjacking attacks such as Magecart, API security, and cloud misconfigurations, among others. We will wrap up by recommending mitigations for the most frequently observed attack vectors, as well as some strategic insights on the direction of information security as a whole.
  • Gain Comprehensive, Multi-Dimensional Visibility Across Digital Infrastructures Nov 2 2021 5:00 pm UTC 60 mins
    Tom Bienkowski, Dir of Product Mktg, Netscout; Mark Doering, Dir of Technical Mktg, Netscout; Brandon Dunlap, Moderator
    Security Operations Centers (SOC) have traditionally achieved visibility through varying sources, including log files, EDR, and NDR. Each approach has inherent weaknesses and strengths, converging on a superior NDR method. For example, if the flow of data is too broad, and packets can be challenging without highly scalable network instrumentation that converts raw packets into enriched metadata for longer-term and superior analytics. Using a more intelligent network-based security strategy, SOCs can maintain broad and deep network visibility to improve the quality, reliability, and security of services. Join Netscout and (ISC)2 on November 2nd, 2021 at 1 p.m., Eastern/10 am Pacific for a discussion on how to use packet-derived metadata, behavioral analysis, and threat intelligence to reduce MTTR (i.e., Mean Time To Resolution) it takes to detect, investigate and remediate cyber or other IT threats. We’ll explore:

    -How to leverage a robust set of metadata and packets to become a more agile and proactive cybersecurity analyst
    -Why leveraging the same network instrumentation and common source of metadata and packets is advantageous for Net & Sec Ops When and how tap and decryption capabilities are to be addressed
    -How to deploy intelligent network instrumentation in a hybrid cloud environment for a security optimal cyber posture
  • The Many Ways to Defeat Multi-Factor Authentication Oct 28 2021 5:00 pm UTC 60 mins
    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4; Brandon Dunlap, Moderator
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, and (ISC)2 on October 28, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as he explores the many ways hackers can and do get around your favorite MFA solution. This webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security. We’ll also examine the good and bad of MFA and how to become a better computer security defender in the process, including:

    · Ways hackers get around multi-factor authentication

    · How to defend your multi-factor authentication solution

    · The role humans play in a blended-defense strategy
  • BT Sets the Bar Higher with (ISC)2 CISSP Team Training Oct 27 2021 5:00 pm UTC 60 mins
    Jonathan Kilgannon, Cathy Marsh and Mirtha Collins
    Building a strong cybersecurity team takes grit. The best results don’t always come at the first pass. When BT, a world-leading communications provider headquartered in London with offices globally, tasked CSIRT Training Specialist Jonathan Kilgannon and Security Learning & Development Specialist Cathy Marsh with raising the bar for success among the company’s CISSP candidates, they delivered. Average exam pass rates jumped to 90% percent — a 40% increase — following the changes they implemented in the training process. Find out how identifying the right candidates, preparing them in advance and (ISC)2 Official In-Person Team Training made all the difference.
  • (ISC)2 Town Hall 2021 Oct 18 2021 5:00 pm UTC 90 mins
    Clar Rosso, Zachary Tudor, Lori Ross O'Neil and Dr. Casey Marks
    Join us for (ISC)2 Security Congress Town Hall to learn what’s next for (ISC)2 and hear directly from members of the Board of Directors.

    CEO Clar Rosso will provide a strategic update for our association, including recent accomplishments and milestones, as well as what members can expect in 2022 and beyond.

    Then, a panel consisting of (ISC)² Board members and management will answer members’ questions about the association, membership, certifications, workforce trends and other cybersecurity issues and challenges facing the profession.

    Town Hall is open to (ISC)2 members and associates, as well as all Security Congress attendees.

    Clar Rosso, CEO, (ISC)2
    Zachary Tudor, CISSP, Board of Directors Chairperson
    Lori Ross O'Neil, CISSP Board of Directors Vice Chairperson
    Dr. Casey Marks, Chief Qualifications Officer, (ISC)2
  • Is Zero Trust a Pipe Dream? Debunking Five Zero Trust Security Myths Recorded: Oct 12 2021 59 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    Zero trust network access (ZTNA) has been one of the most widely discussed and debated security technology categories in recent years. While most enterprise IT security teams have already started drinking the zero trust Kool-Aid, there are still some skeptics who are hesitant to embrace zero trust architectures for a variety of reasons. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he debunks five common zero trust security myths so you can distinguish between fact and fiction.
  • Surviving a Ransomware Attack: Disaster Recovery for Critical Cloud & PC Data Recorded: Sep 28 2021 61 mins
    Chris Alden, Senior Sales Manager, Synology; Brandon Dunlap, Moderator
    During 2020, the worldwide shift to remote work led to a staggering rise in cybercrime, as criminals targeted gaps in previously secure on-site networks. With over 50% of employers expecting to keep employees working remotely, and payments for a ransomware attacks averaging $100,000, businesses must work proactively to protect their data. It is essential for business to have an effective plan in place to protect at-risk systems, detect and mitigate ransomware attacks in real time, and quickly restore affected systems. Join Synology and (ISC)2 on September 28, 2021 at 1:00 p.m. Eastern/10:00 a.m. as we discuss actionable strategies for ransomware preparedness and look at real-world examples and case studies.

    Key takeaways include:

    Actionable ransomware preparedness tips

    Protecting PC data and the elements of a robust ransomware recovery plan

    Why and how to backup Microsoft 365 & Google Workspace data

    Setting up remote backup to a secondary server or cloud
  • Prioritizing Security for Your Cloud Native Initiatives – A Maturity Model Recorded: Sep 23 2021 62 mins
    Rani Osnat,VP Strategy & Product Marketing,AquaSecurity;Doug Cahill, VP Analyst Services & Senior Analyst, ESG;B Dunlap, Mod
    Aqua Security and ESG Research have partnered to survey and understand how organizations go about addressing challenges of security cloud native applications. With multiple stakeholders across engineering, DevOps, cloud, security and compliance teams, and competing priorities for addressing security pain points, many organizations are either stopping short of fully implementing the needed processes and tools, or conversely fail because they try to do too much at once. Join Aqua Security, ESG Research and (ISC)2 on September 23, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we review some of the key considerations as well as benchmark results from our survey to date.
  • CISSP- Tales of the Unexpected Recorded: Sep 21 2021 59 mins
    AJ Yawn, Jerome Leach and Angus Macrae
    When you tell people you’re thinking about CISSP, you’ve probably been told:

    • CISSP is globally renowned - those holding it are highly sought-after.
    • Achieving certification means you get paid more.
    • CISSP is HARD to earn.
    • It’s a LONG exam.

    But what you probably haven’t heard are the unexpected surprises along the way CISSPs never imagined in their certification journey. For example, learning that CISSP is a broad certification that focuses on governance: Do you understand the technology? The people? The management?

    Join us for a panel discussion as CISSP-certified members share their personal stories and the unanticipated ways certification continues to benefit their careers. After all is said, you’ll be amazed at what CISSP can do for you in your professional growth and career.

    Hear expert insights from: AJ Yawn, Jerome Leach and Angus Macrae
  • Crossing the CAASM: The Evolution of "Asset Management" Recorded: Sep 16 2021 60 mins
    Ronald Eddings & Chris Cochran, Hosts, Hacker Valley Studio Podcast; Brandon Dunlap, Moderator
    As IT and security teams struggle to manage a complex sprawl of devices, users, cloud services, and software, there's one certainty we can rely on (thanks to the second law of thermodynamics): things will only get more complex.

    But there's good news.

    What we previously thought of as "asset management" has evolved. Today, we have “asset intelligence”, which moves from a spreadsheet approach — focused on getting an inventory of devices — to an API-driven, always up-to-date way of seeing all assets through integrations of existing tools, data correlation at scale, and querying capabilities to find and respond to gaps. Join Axonious and (ISC)2 on September 16, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific and hear from Ronald Eddings and Chris Cochran, producers and hosts of the Hacker Valley Studio Podcast and learn how this new approach to asset intelligence and the emerging Cyber Asset Attack Surface Management (CAASM) category helps IT and security teams improve security hygiene, reduce manual work, and remediate gaps.
  • DoD 8570 and Beyond: (ISC)2 Certifications to Get Your Team in Compliance Recorded: Sep 15 2021 50 mins
    Mirtha Collin, Elizabeth Cardona
    The U.S. Department of Defense (DoD) Directive 8570.1 requires every full- and part-time military service member, defense contractor, civilian and foreign employee with "privileged access" to a DoD system — regardless of job series or occupational specialty — to get an approved IA baseline certification. Which certifications are the right fit for your team?

    Government agencies have trusted (ISC)² to train and certify their cybersecurity personnel for more than two decades. With the recent addition of (ISC)2 Certified Cloud Security Professional (CCSP) and HealthCare Information Security and Privacy Practitioner (HCISPP) certifications, the entire portfolio of (ISC)² certifications now meet the requirements for different security workforce categories within the Department, depending on the functional area the role covers. Discussion topics include:

    • How to Become DoD 8570 Compliant
    • (ISC)2 Certifications Overview: IA Baseline Certification Requirements
    • How to Maximize Your Training and Certification Budget
    • Keep Your Team’s Cybersecurity Skills Sharp

    Be prepared for 45 minutes well-spent and discover how (ISC)2 can help you train and certify your team to become DoD 8570 compliant.
  • Building Cyber Resilience with Managed Phishing and Security Awareness Training Recorded: Sep 14 2021 59 mins
    Mark Sangster, V.P. and Industry Security Strategist, eSentire; Brandon Dunlap, Moderator
    The majority of crippling cyberattacks begin with a simple phishing email. And while most companies provide some form of annual training, they focus on overly simplistic lures taken from public events that fail to represent the real danger of targeted criminal campaigns. Join eSentire and (ISC)2 on September 14, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as they explore how to build a comprehensive training and testing program that leverages realistic threat scenarios to foster context-relevant security awareness that drives behavioral change:

    · Use risk management data and accurate phishing lures to build comprehensive awareness training

    · Maximize your resources and programs to increase return on investment

    · Conduct testing that improves resilience

    · Meet regulatory requirements and demonstrate program success to your leadership
  • Ransomware Deep Dive: To Pay or Not to Pay? Recorded: Sep 9 2021 59 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    Colonial Pipeline, CNA Financial, JBS Foods, Garmin, and Travelex. All victimized by high-profile ransomware attacks. All paid ransoms. Did these companies do the right thing by paying ransoms to accelerate data and system recovery? Or are they merely funding the ransomware industry and prompting even more attacks? Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews key findings from CyberEdge’s 2021 Cyberthreat Defense Report. In this webinar, Steve will:
    - Examine disturbing ransomware trends, by country and by industry
    - Evaluate key factors that go into deciding whether to pay ransoms
    - Outline ways to be prepared for a successful ransomware attack
    - Review technologies to help give security teams the upper hand
  • Inside (ISC)2: Updates on Global Events Program Recorded: Aug 31 2021 59 mins
    Clar Rosso, CEO, (ISC)2; Megan Gavin, Director, Events, (ISC)2
    Clar Rosso, CEO of (ISC)2 shares her insights on what’s happening at our association. Join us for this quarterly update in which we cover the latest developments at (ISC)2, ranging from certification to member benefits, continuing education and events, to major milestones and achievements. On August 31, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific, Megan Gavin, Director of Events at (ISC)2 joins Clar to provide an overview of what to expect at this year’s annual Security Congress taking place this October 18-20, as well as the new global (ISC)2-hosted events being planned for 2022.
(ISC)² Security Briefings - In-depth examination of infosec topics.
(ISC)² Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Briefings Part 2: Top 5 Cloud Security Threats
  • Live at: Apr 6 2017 5:00 pm
  • Presented by: Scott Boda, Solutions Engineer, Bitglass; (ISC)2; Brandon Dunlap, Moderator
  • From:
Your email has been sent.
or close