Hi [[ session.user.profile.firstName ]]

Bitglass Part 2: Security in the Cloud: CASB for SaaS Security

The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August 1, 2019 at 1:00PM Eastern for an engaging webinar where we’ll look at the significance of SaaS apps and how to prioritize their security, how to protect data within managed applications and detect and secure the use of unmanaged applications.
Recorded Aug 1 2019 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jacob Serpa, Sr. Product Manager, Bitglass; Brandon Dunlap (Moderator)
Presentation preview: Bitglass Part 2: Security in the Cloud: CASB for SaaS Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Infoblox #3: Stop Attacks Faster - Using the MITRE ATT&CK Framework Dec 12 2019 6:00 pm UTC 60 mins
    Mike Zuckerman, Consulting Product Maketing Manager, Infoblox; Brandon Dunlap, Moderator
    The MITRE ATT&CK Framework is a comprehensive, up-to-date knowledge base of cyberattacker tactics and techniques gathered from actual observation of attacker behavior. The framework can help anticipate what an attacker will do and how to respond. Join Infoblox and (ISC)2 on December 12, 2019 at 1:00PM Eastern for an examination of how the MITRE ATT&CK can help you make better, faster decisions about assessing risks, deploying new security controls and stopping attacks faster and more efficiently.
  • Bitsight #3 - Experiences in Optimizing Third-Party Risk Management Programs Recorded: Nov 18 2019 59 mins
    Chris Poulin, Princ Consulting Eng; Cushla O'Leary, Customer Success Mgr; Evan Tegethoff, Dir, Consulting & Eng; Pat Puentes,
    When it comes to managing third-party risk, there are different stages on the road to maturity. Many organizations today have a good program in place, but often run into issues with growing and optimizing their program in a scalable way. True optimization requires a confluence of process, policy, automation and cross-functional collaboration with other business leaders. With so many areas to focus on, it can be difficult to know where to even start. Fortunately, there are plenty of examples of companies that have successfully scaled their TPRM programs and offer valuable lessons for those looking to take their program to the next level. Join this discussion on managing third-party risk management to hear about these approaches and lessons learned.
  • Infoblox #2: Threat Intelligence Update - Ransomware Tools Continue to Increase Recorded: Nov 7 2019 60 mins
    Michael Zuckerman, Consulting Product Marketing Manager, Infoblox; Brandon Dunlap, Moderator
    Ransomware continues to be a widespread problem for organizations. Defending against such attacks are paramount for security teams at businesses small and large. Join Infoblox and (ISC)² on November 7, 2019 at 1:00PM Eastern and hear about the latest information concerning many of the leading ransomware threats, as well as updates on the state of the global ransomware assault and overall trends in developing and designing ransomware malware tools. Additionally, there will be details of original research on malware variants to include Shade, Sodinokibi, Megacortex, Cryptomix, Ryuk, Keypass, Hermes and Grandcrab.
  • Infoblox #1 - Get Encrypted! Examining Emerging DNS Privacy Standard Recorded: Oct 3 2019 58 mins
    Paul Adair, Principal Product Manager, Infoblox; Brandon Dunlap (Moderator)
    DNS has always seemed to have a “last mile” security issue. Communications from a local DNS served to a client are typically unencrypted and not secure, leaving this traffic vulnerable to spoofing, hijacking and more. But privacy standards and protocols are emerging which are helping to encrypt this traffic. Join Infoblox and (ISC)2 on October 3, 2019 at 1:00PM Eastern for an examination of DNS over TLS (DoT) and DNS over HTTPS (DoH). The discussion will include the pros and cons of the two protocols, what option might make sense for your security & risk requirements and simple ways to secure your network and DNS.
  • Un día en la vida de un CISSP Recorded: Sep 27 2019 56 mins
    Ricardo Céspedes y Wilson España, instructores CISSP en Chile y Jefferson Gutierrez, CISSP para KPMG México.
    Más de 130.000 profesionales de la seguridad de la información han invertido tiempo, determinación y recursos para lograr la certificación CISSP. Únase a (ISC)² miembros de diferentes regiones de América Latina para saber cómo la certificación CISSP les ha ayudado con su trabajo y carrera y quales los puntos de dolor, problemas y desafíos que encuentran en su vida laboral diaria, así como soluciones, consejos y mejores prácticas que han desarrollado a lo largo del camino.
  • 2019 Security Congress Preview – Security Automation Recorded: Sep 24 2019 58 mins
    Winn Schwartau, Chief Visionary Officer, The Security Awareness Co; Chuck Easttom, Professor, Capitol Technology Univ
    (ISC)² will hold its 2019 Security Congress in Orlando, Fl Oct 28th – 30th. This conference will bring together a global community of cybersecurity professionals and more than 180 educational sessions. One of the 18 tracks at the conference will focus on Security Automation and the role that Machine Learning and Artificial Intelligence is playing in securing organizations of all sizes. On September 24, 2019 at 1 p.m. Eastern, join (ISC)² and several speakers who’ll be presenting in the Security Automation track on the Impact of Machine Learning on Cyber Security and Ethical Bias in AI-Based Security Systems as they preview their sessions and discuss why security automation is a leading concern for cyber security practitioners to understand.
  • (ISC)²’s Digital Transformation Journey – Part 3 Recorded: Sep 17 2019 59 mins
    Bruce Beam, CIO, (ISC)²; Wes Simpson, COO, (ISC)²; Brandon Dunlap (Moderator)
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 3 of the (ISC)² Digital End-to-End Transformation (DETE) webcast, we will examine the “new world” of what the project has provided to internal (how we serve the members and visitors), the members (what you as members see and experience) and what’s to come. Join Wes Simpson, COO and Bruce Beam, CIO on September 17, 2019 at 1:00PM Eastern for a discussion on these items and a Q&A with our COO and CIO.
  • Gigamon #3: Network Traffic Decryption: Keeping Secure in a Private World Recorded: Sep 5 2019 56 mins
    Ricardo Font, Senior Product Marketing Manager, Gigamon; Brandon Dunlap (Moderator)
    Today’s network environment can feel like a Cold War-era novel, full of who’s watching whom scenarios and heavily protected intelligence communications. Visibility is critical to an organization’s security posture, and encrypted channel communications can become an obstacle to it when gets to the wrong eyes. Decryption can illuminate what is hidden and restores the advantage you need to see what’s lurking in the shadows. Join Gigamon and (ISC)2 on September 5, 2019 at 1PM Eastern for an examination of decryption best practices, a review of encryption methodologies, the obstacles that impact security, resources and regulatory compliance and what’s changed with TLS 1.3 and how this newer protocol impacts visibility.
  • Bitglass Part 3: Security in the Cloud - CASBs for IaaS Security Recorded: Aug 29 2019 60 mins
    Jacob Serpa, Sr. Product Marketing Manager, Bitglass; Brandon Dunlap (Moderator)
    Infrastructure as a service (IaaS) has quickly risen to prominence because of the way that it provides enhanced flexibility and scalability to organizations around the world. However, using IaaS platforms like AWS, Azure, or GCP does require that organizations take responsibility for an increased amount of security in the cloud. Fortunately, there are tools designed to help with doing this properly. Join Bitglass and (ISC)² on August 29, 2019 at 1:00PM Eastern for a presentation on the various components of leading IaaS platform, what your organization is responsible for when it comes IaaS security and how Cloud Access Security Brokers (CASB) can help.
  • Bitsight #1: How to Set a Solid Foundation for Your Third-Party Risk Management Recorded: Aug 27 2019 56 mins
    Chris Poulin, Principal Consulting Engineer, BitSight Technologies; Brandon Dunlap (Moderator)
    As companies grow, so do their third-party digital ecosystems. This is hardly a new phenomenon, but the dynamic changes and rapid growth often experienced today have made it increasingly difficult for companies to stay on top of their multiplying business relationships. Today, organizations are looking for best practices on how to handle this from a cybersecurity perspective. Given that there are multiple frameworks, approaches, and guidelines, it is hard to figure out which best practices will meet the needs of your organization. In Part 1 of this series, we’ll discuss frameworks, policies, and process to build a successful third-party risk management program; typical roles and responsibilities found in programs across companies of all sizes and best practices for third-party governance and program sponsorship.
  • Bitsight #2: Best Practices to Grow Your Third-Party Risk Management Program Recorded: Aug 22 2019 56 mins
    Evan Tegethoff, Director of Consuting Engineers, BitSight; Brandon Dunlap (Moderator)
    So you’ve established the foundation of your third-party risk management (TPRM) program...now what? For many organizations, growing their TPRM program to scale at the speed of their business can be extremely challenging. This challenge is exacerbated because, in many cases, third-party ecosystem growth occurs with little coordination or oversight. Furthermore, once they establish third-party relationships, companies may not implement centralized processes to continuously monitor and evaluate those relationships, including the cyber risks they may pose. In the second installment of this webinar series, we discuss tips on how to “go beyond” the foundation of third-party risk assessments and drill down further into your vendors’ security posture, best practices for TPRM process improvement, reporting, and dashboard use and how to leverage continuous monitoring to scale your TPRM program at the speed and growth of your business.
  • Gigamon #2 - Unleash the Power of True Application Visibility Recorded: Aug 22 2019 53 mins
    John Gudmundson, Senior Product Marketing Manager, Brandon Dunlap (Moderator)
    You know that metadata helps you separate signal from noise, reduce time-to-threat-detection and improve overall security efficacy. But did you know that application metadata helps you monitor user experience, troubleshoot problematic apps, understand “Shadow IT” usage and improve security posture within your organization? Join Gigamon and (ISC)² on August 22, 2019 at 1:00 PM Eastern as we discuss the growing need for application-aware network operations and how Gigamon Application Metadata Intelligence provides the deep application visibility needed to rapidly pinpoint performance bottlenecks and potential network security risks. You’ll see how next-gen network packet brokers enhance metadata with intelligence and insights from traffic flows and discover how to understand the performance and control of hundreds of critical apps.
  • (ISC)²’s Digital Transformation Journey - Part 2 Recorded: Aug 20 2019 58 mins
    Bruce Beam, (ISC)²; Beth Paredes, (ISC)²; Sommer Hess, (ISC)²; Brandon Dunlap (Moderator)
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 2 of the (ISC)² Digital End-to-End Transformation (DETE) will examine how (ISC)² executed the plan for the project, following the AGILE Project Management framework and the buy-in and support from other departments and stake holders within the organization. Additionally, there was board governance and oversight to contend with. Join Bruce Beam, CIO; Beth Paredes, Sr. Corporate Member Services Manager; and Sommer Hess, Director PMO, Quality and Training on August 20, 2019 at 1:00PM Eastern for a discussion on these items and the speed bumps that were run into on this project.
  • 2019 Security Congress Preview - Privacy Recorded: Aug 13 2019 58 mins
    James Mackay, Deputy CISO & DPO, Global Sec Srvs, Markel Corp.,Anjali Gugle, Technical Leader, Cisco; Jen Sosa, Transperfect
    (ISC)² will hold its 2019 Security Congress in Orlando, Fl Oct 28th – 30th. This conference will bring together a global community of cybersecurity professionals and more than 180 educational sessions. One of the 18 tracks at the conference will focus on Privacy and the challenges organizations and practitioners face in this area. On Aug. 13, 2019 at 1 p.m. Eastern, join (ISC)² and several speakers who’ll be presenting in the Privacy track on GDPR, the role of AI in Privacy and the upcoming California Consumer Privacy Act (CCPA)  at Security Congress as they preview their sessions and discuss why privacy has coming a critical area for cyber security practitioners to understand.
  • Bitglass Part 2: Security in the Cloud: CASB for SaaS Security Recorded: Aug 1 2019 59 mins
    Jacob Serpa, Sr. Product Manager, Bitglass; Brandon Dunlap (Moderator)
    The rise of SaaS applications has forever changed the way that work is completed in the modern enterprise. These apps enable real-time collaboration, enhanced flexibility and efficiency, as well as decreased costs. Join Bitglass and (ISC)2 on August 1, 2019 at 1:00PM Eastern for an engaging webinar where we’ll look at the significance of SaaS apps and how to prioritize their security, how to protect data within managed applications and detect and secure the use of unmanaged applications.
  • 2019 Security Congress Preview – Cloud Security Recorded: Jul 23 2019 56 mins
    Richard Tychansky, Travis Jeppson, Brandon Dunlap (Moderator)
    (ISC)² will hold its Security Congress 2019 in Orlando, FL October 28th – 30th. This conference will bring together 3000+ attendees and over 180 educational sessions. One of the 18 tracks that are being offered with focus on Cloud Security and the challenges practitioners face when dealing with all things cloud related. On July 23, 2019 at 1:00PM Eastern, join (ISC)² and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • (ISC)²’s Digital Transformation Journey – Part 1 Recorded: Jul 16 2019 59 mins
    Bruce Beam, CIO, (ISC)²; Brandon Dunlap (Moderator)
    (ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. The road to DETE, however, took years of planning and execution as our team modernized our infrastructure and back-end systems, including migrating the majority of key systems to the cloud. In Part One of this series examining the journey the organization undertook, Bruce Beam, CIO, will discuss the rationale behind the initiative and steps taken to gain approval from the board of directors. Join us on July 16, 2019 at 1 p.m. Eastern as we begin this three-part, in-depth case study of how (ISC)² accomplished this ambitious project.
  • Gigamon #1: Network Data Capture for Incident Response Recorded: Jul 11 2019 61 mins
    Ricardo Font, Product Marketing Manager, Insight, Gigamon; Brandon Dunlap (Moderator)
    Information security and incident response teams are often hampered by an inability to see what is happening on the network. That lack of visibility mean they cannot confidently detect threats or respond quickly and effectively. A new approach that consolidates fundamental network detection and response capabilities using enriched metadata collected from sensors in physical, virtual and cloud environments is helping security teams minimize mean-time-to-detection and response. How can you achieve accelerated threat detection and response through broad situational awareness fueled by real-time access to historical metadata? Join Gigamon and (ISC)2 on July 11, 2019 at 1PM Eastern as we dive into metadata’s critical role in incident detection and response strategies and how to best use metadata to focus incident response efforts through data correlation and enrichment.
  • Bitglass Part 1 - Security in the Cloud: CASBs and Their Top Use Cases Recorded: Jun 27 2019 57 mins
    Jacob Serpa, Sr. Product Marketing Manager, Bitglass; Brandon Dunlap, Moderator
    Organizations are flocking to the cloud more than ever before. The use of the cloud continues to proliferate throughout enterprises around the world and organizations are searching for how they can best assure they are properly protecting their data. After all, the rise of software as a service (SaaS) and infrastructure as a service (IaaS), has fundamentally changed the cybersecurity and business landscapes. Join Bitglass and (ISC)2 on June 27, 2019 at 1:00PM Eastern for an examination of the challenges of securing the cloud and BYOD, the shared model or responsibility for security and how cloud access security brokers (CASBs) can protect data.
  • Chronicle #3: Backstory + VirusTotal: Scale, Speed & Intelligence Multiplied Recorded: Jun 19 2019 59 mins
    John Chirhart, Customer Exp. Engineer, Chronicle; Svetla Yankova Head of Customer Exp., Chronicle; Brandon Dunlap, Moderator
    Having access to new technology and intelligence to allow proactive response to the threats will change the way teams protect their environments. Harness the massive computing power of Backstory integrated with the powerful insights from VirusTotal to process petabytes worth of data in almost real-time. Watch a step-by-step demo of how Chronicle's security solutions, working with partners like Tenable, can help your organization be better prepared and connected for what comes onto your network.
(ISC)2 Security Briefings - In-depth examination of infosec topics.
(ISC)2 Security Briefings brings attendees multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Bitglass Part 2: Security in the Cloud: CASB for SaaS Security
  • Live at: Aug 1 2019 5:00 pm
  • Presented by: Jacob Serpa, Sr. Product Manager, Bitglass; Brandon Dunlap (Moderator)
  • From:
Your email has been sent.
or close