Hi [[ session.user.profile.firstName ]]

(ISC)²’s Digital Transformation Journey - Part 2

(ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learning Management Systems where members can access all the courses developed by our Professional Development Institute. In Part 2 of the (ISC)² Digital End-to-End Transformation (DETE) will examine how (ISC)² executed the plan for the project, following the AGILE Project Management framework and the buy-in and support from other departments and stake holders within the organization. Additionally, there was board governance and oversight to contend with. Join Bruce Beam, CIO; Beth Paredes, Sr. Corporate Member Services Manager; and Sommer Hess, Director PMO, Quality and Training on August 20, 2019 at 1:00PM Eastern for a discussion on these items and the speed bumps that were run into on this project.
Recorded Aug 20 2019 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bruce Beam, (ISC)²; Beth Paredes, (ISC)²; Sommer Hess, (ISC)²; Brandon Dunlap (Moderator)
Presentation preview: (ISC)²’s Digital Transformation Journey - Part 2

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Demystifying WAN-as-a-Service May 13 2021 5:00 pm UTC 60 mins
    Vivek Ganti, Security Product Marketing, Cloudflare; Brandon Dunlap, Moderator
    The building blocks of traditional WAN architectures are showing their age. MPLS is expensive and has painfully slow deployment times. Broadband Internet does not deliver the millisecond performance and constant reliability needed for most business applications today. And neither infrastructure was designed with security in mind. Compounding matters further, the surge in remote work and increased cloud adoption is straining traditional WAN architectures. WAN-as-a-service is a cloud-based WAN architecture that offers global scale, integrated enterprise network security functions, and direct, secure connectivity to remote users. Join Cloudflare and (ISC)2 on May 13, 2021 at 1:00PM Eastern for an examination on how WAN-as-a-Service can increase operational agility and lower total costs of ownership and solve the inherent challenges associated with MPLS and broadband Internet.

    We’ll also cover:

    · What is WAN-as-a-service and what are its advantages over traditional WAN architectures
    · How can enterprises build and deploy a successful WAN strategy with fast connectivity and robust security built-in
    · How enterprises can increase your operational agility with easy deployment and management of network services
  • Crypto Service Mesh - A New Perspective to Enterprise Cryptography May 6 2021 5:00 pm UTC 60 mins
    Muralidharan Palanisamy, Chief Solutions Officer, AppViewX; Brandon Dunlap, Moderator
    Cryptography is omnipresent. Every business unit uses crypto in some shape or form. A marketing web page uses a TLS certificate to assert its identity. A CRM solution that stores customer data uses symmetric key cryptography to encrypt data at rest.

    An organization's digital security is only as strong as its business units' weakest crypto practices. This has forced organizations to rethink the way teams consume crypto services and driven the need for centralized orchestration and control. Join AppviewX and (ISC)2 on May 6, 2021, at 1:00 PM Eastern Time for a discussion on how a Crypto Service Mesh orchestrates all the diverse crypto services in an organization, abstracts the nitty-gritty details, and provides a standardized, user-friendly, policy-controlled way for different business units to consume these services. We’ll examine:

    · How various business units consume crypto today

    · An introduction to Crypto Service Mesh

    · How a Crypto Service Mesh weaves together people, process, and technology
  • Beyond the Buzzwords – The Trends Behind SASE and Zero Trust May 4 2021 5:00 pm UTC 60 mins
    Eric Cornelius, Chief Product Officer, iboss; Brandon Dunlap, Moderator
    Zero Trust has generated a great deal of “buzz” in the last few years. Many solution providers tout the benefits of Zero Trust, but the approach may not be a fit for you and your organization. Join iboss and (ISC)2 on May 4, 2021 at 1:00PM Eastern as we explore the evolution of network security design principles in order to gain a deeper understanding of how technology can be leveraged to meet evolving user needs and the behavioral and technological direction behind SASE and Zero Trust.
  • Cloud Native Vulnerability Mgmt: Securing Container Images, VMs, and Functions Apr 22 2021 5:00 pm UTC 60 mins
    Steven Zimmerman, Sr. Product Marketing Manager, Aqua Security; Brandon Dunlap, Moderator
    Full cloud native security requires more than application security testing and network monitoring. It requires a concerted approach to vulnerability management within CI/CD pipelines, in pre-production testing, and at runtime. Join Aqua Security and (ISC)2 on April 22, 2021 at 1:00PM Eastern for an examination on how to secure applications in complex cloud native ecosystems, including:

    · Detecting vulnerabilities and exploits in container images, VMs, and serverless functions

    · Prioritizing and triaging security risks to accelerate remediation

    · Uncovering hidden malware and attack kill chains before they’re executed in production
  • Modernize Security Operations using MITRE ATT&CK with a Cloud SIEM Apr 20 2021 5:00 pm UTC 60 mins
    Girish Bhat, VP, Sumo Logic; Paul Tobia, Senior Product Manager, Sumo Logic; B. Dunlap, Moderator
    Modernizing Security Operations involves a combination of people, process, technology, and services to manage risk, monitor, detect, and respond to cybersecurity threats and incidents. Security leaders seeking to modernize security operations face serious challenges in identifying the resources, expertise and tools to meet their goals. Over the past few years, MITRE ATT&CK® a globally-accessible knowledge base of adversary tactics and techniques has gained prominence as a way to determine the effectiveness of Security Operations to detect, analyze, and respond to attacks. Join Sumo Logic and (ISC)2 on April 20, 2021 at 1:00PM Eastern for an exploration on how security practitioners can leverage the MITRE ATT&CK framework and integrate using the Sumo Cloud SIEM.
  • Top 3 Trends in Today’s Cyber Attack Landscape Apr 15 2021 5:00 pm UTC 60 mins
    Ryan Toohil, Chief Technology Officer & Head of Platform, Aura; Will Taylor, Senior Security Consultant, NXTsoft; B. Dunlap
    Cyber attacks are at an all-time high and threat actors are becoming more sophisticated in their attempts. When considering today’s trends (and threats) in the industry, three recurring themes often come up amongst Cybersecurity professionals: the continued growth of ‘double extortion’ ransomware attacks, the increased risk that employee identity theft poses to organizations, and the additional fallout from supply chain attacks. Join Aura, NXTsoft, and (ISC)2 on April 15, 2021 at 1:00 PM Eastern as we discuss these three cyber threat trends and different ways you can address them within your organization.
  • Protecting the Enterprise: 5 Components needed for Cybersecurity Training Recorded: Apr 13 2021 62 mins
    Spencer Wilcox, CISO, PNM; Derrick Butts, CISO, The Truth Initiative; Mirtha Collin, (ISC)2; Brandon Dunlap, Moderator
    It’s difficult to prescribe a one-size-fits-all approach to training your cybersecurity team. While cybersecurity training needs to be structured and adhere to industry standards, it also must be purposeful and tailored to your organization’s needs. No one organization has precisely the same security needs as another. However, many of the fundamentals of a training and education program apply across different organizations and sectors. Join (ISC)2 for a panel discussion on Tuesday, April 13, 2021 at 1:00PM Eastern as industry leaders share tips they’ve learned and strategies they’re working towards to conquer a secure and compliant cybersecurity training program. Areas for discussion will include:

    · Who needs training

    · Who is responsible for training

    · Determining the curriculum

    · Training and certification

    · Ensuring training effectiveness

    Be prepared for an hour well-spent and discover how to create a cybersecurity training plan that maps to your organization’s specific needs.
  • Gigamon #3: Securing the Hybrid Cloud: 5G Networks Recorded: Apr 8 2021 61 mins
    Gordon Beith, Senior Director, Product Marketing, Gigamon; Brandon Dunlap, Moderator
    5G networks, almost by definition, are hybrid cloud networks. Any company adopting 5G is in effect adopting a hybrid cloud model. As mobile network service providers launch their 5G services around the world starting with radio access network (RAN) deployment followed by the core network, security vulnerabilities, including preventing or mitigating their effects, are top of mind. Whether the network functions and services are physical, virtual on-prem, or public cloud, ensuring comprehensive continuous visibility into the network is crucial to ensuring and maintaining adequate security. Join Gigamon and (ISC)2 on April 9, 2021 at 1:00PM Eastern for a discussion on understanding how coherent, high-fidelity network data can enable a strong security posture without breaking the bank.
  • The Security Outcomes Study: A Blueprint to Enable Growth and Mitigate Risk Recorded: Apr 6 2021 60 mins
    Cindy Valladares, Head of Security Thought Leadership, Cisco; Steve Caimi, Cyber Specialist, Cisco; B. Dunlap, Moderator
    Cybersecurity is about priorities, but the challenge is knowing what works and what doesn’t. What if you could learn from thousands of peers, around the globe, about how they’re succeeding? You can. Cisco recently commissioned the Security Outcomes Study, outlining which security best practices lead to the most impactful results. Join Cisco and (ISC)2 on April 6, 2021 at 1:00PM Eastern for a discussion that will cover:

    · The business outcomes that cyber professionals are working to achieve

    · The specific security practices that contribute the most

    · How to use their advice to improve your cyber program today
  • SolarWinds Fallout Has Execs Asking: How Secure is Our Supply Chain? Recorded: Mar 30 2021 59 mins
    Thomas Scanlon, Carnegie Mellon/CERT; Andrew Boyle, BAH; Shawn Harris, Starbucks; Brandon Dunlap, Moderator
    The ramifications of the SolarWinds incident continue to evolve as more details emerge about the impact it had on a wide range of organizations. A recent survey of more than 300 cybersecurity practitioners by (ISC)2reveals just how concerning the incident was and what these professionals recommend to shield organizations from similar supply chain threats. Join this panel discussion on March 30, 2021 at 1:00pm Eastern to hear anecdotes and best practices related to third-party technologies in the security stack, and how peers in cybersecurity leadership positions are future-proofing their defenses while planning for worst case scenario.
  • Inside (ISC)²: Updates on Exams and Certifications Recorded: Mar 23 2021 61 mins
    Clar Rosso, (ISC)² CEO; Dr. Casey Marks, Chief Product Office and VP, (ISC)²
    Clar Rosso, CEO of (ISC)2 shares the latest insights on what’s happening at our association. Join us for this quarterly update where we cover the latest developments at (ISC)2, ranging from certification to member benefits, continuing education and events, to major milestones and achievements.



    Joining Clar this quarter is Dr. Casey Marks, chief product officer and VP of (ISC)2, to discuss the latest in Exams and certifications.
  • Global Impressions: Endpoint Security Strategies for the Long-Term Recorded: Mar 18 2021 61 mins
    Bob Hansmann, Sr. Product Marketing Manager – Security, Infoblox; Brandon Dunlap, Moderator
    After a painful but relatively successful response to workplace changes driven by the pandemic, how well are those security measures working and what is next for the evolution of the SOC and endpoint security in specific? For most organizations, the future involves a larger remote workforce, of both full and part-time workers, including those in traditional HQ office roles. But many of the measures taken in response to pandemic conditions are proving less-than-ideal as long-term solutions. Join Infoblox and (ISC)2 on March 18, 2021 at 1:00PM Eastern for a session that will draw on recent analyst reports and surveys conducted globally, with some North American specific call-outs, to help attendees to better understand…· Which security alternatives are leaders considering as long-term solutions, and why?

    · What techniques are helping to improve visibility for users and devices regardless of their location?

    · Why are security leaders evolving methods for obtaining and using cyber threat intelligence?

    · How can embracing automation improve response times and overall operational efficiencies?
  • Inside (ISC)² Quarterly Board Update, 2021 (Q1) Recorded: Mar 12 2021 20 mins
    Clar Rosso, (ISC)² CEO; Zach Tudor, Chair of the Board, (ISC)²
    Join us for (ISC)² Insights, a quarterly review of our association’s latest accomplishments. Each quarter, the (ISC)² Board of Directors Chairperson and CEO will update members on the association’s strategic roadmap, new achievements and milestones, the latest on our certifications, new professional development opportunities, member offers and more.
  • Gigamon #2: Securing the Hybrid Cloud: Optimizing SIEM Recorded: Mar 9 2021 59 mins
    Muhammad Durrani, Technical Marketing Engineer, Gigamon; Brandon Dunlap, Moderator
    SIEM systems are pivotal to IT organization’s security operations. Many companies are adopting a hybrid cloud model, and cloud-based SIEMs are becoming common as a result. Regardless of on-prem or cloud deployments, the challenges around SIEM remain the same, from data overload, lack of contextual information, to high costs. Security best practices in deploying SIEMs also remain unchanged, which include establishment of use cases, data ingestion types and development of parsers for various tool vendors. On March 9, 2021 at 1:00pm Eastern, Gigamon and (ISC)2 will present a webinar that will cover solutions to these challenges such as Gigamon’s Application Metadata Intelligence as well as various smart filtering techniques.
  • Gigamon #1: Securing the Hybrid Cloud: Visibility Best Practices Recorded: Feb 25 2021 62 mins
    Jim Mandelbaum, Senior Security Engineer, Gigamon; Brandon Dunlap, Moderator
    With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join Gigamon and (ISC)2 on February 25, 2021 at 1:00pm Eastern for a discussion of the security considerations for on-prem private, public and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment. Join our session to learn how.
  • What's This Thing? Solving Asset Management for Security Ops Recorded: Feb 18 2021 59 mins
    Daniel Trauner, Director of Security, Axonius; Brandon Dunlap, Moderator
    SecOps teams struggle to quickly gather useful, accurate and up-to-date asset date to inform investigations. It’s important to correlate datea from multiple sources to understand the intersection of connected devices, cloud instances, user and security controls. Ultimately SecOps teams care most about alerts and investigations, but some of the most basic asset data challenges make getting context a massive pain. Join Axonius and (ISC)2 on February 18, 2021 at 1:00PM Eastern as we look at asset management and its impact for security operations.
  • Engaging Your Line of Business for Cybersecurity Initiatives Recorded: Feb 10 2021 60 mins
    Scott Bridgen, Head of OneTrust GRC; Sharon Smith, CISSP, Moderator
    Security cannot be done in a silo. The extent and nature of data shared across lines of business functions, both internally and externally, fuels instances of system and organizational vulnerabilities. GRC must transcend the traditional lines of defense, specifically risk managers and audit professionals. In this webinar, we’ll discuss roles and responsibilities of effective risk management practices. What can businesses do to better align key stakeholders? How can businesses incorporate Security by Design process and practices and where can technology support with structured data sets and automation? We’ll look at:

    · Aligning organizational goals, and department objectives to translate risk into business impacts.   
    · Automating GRC touchpoints into your line of business functions  
    · Integrating Audit to document and support continuous improvement initiatives
  • Darktrace #3: The Industrial Immune System: Securing IT/OT Converged Ecosystems Recorded: Feb 9 2021 59 mins
    David Masson, Director of Enterprise Security, Darktrace; Brandon Dunlap, Moderator
    The increasing convergence of information technology (IT) and operational technology (OT) in ICS environments creates significant challenges from a security perspective. Attacks originating in the inbox can now more easily disrupt processes on the factory floor. Further, many organizations are unaware of the extent of IT/OT convergence in their own ecosystems. Join Darktrace and (ISC)2 on February 9, 2021 at 1:00pm Eastern as we look at how Darktrace’s Industrial Immune System helps organizations tackle these challenges by providing a unified view of IT and OT networks. The self-learning AI detects threats throughout the ecosystem and the AI analyst also automates the investigation process in both IT and OT-specific contexts in order to augment human teams. The session will also include a discussion on how the system defended against a Serpent ransomware infection in real time.
  • From the Front Lines – Incident Response at Scale Recorded: Feb 4 2021 78 mins
    James Perry, Senior Director and Head of Incident Response, CrowdStrike Services
    In this session from our recent Security Congress event, you hear stories of CrowdStrike incident response engagements and how they have changed the model for how companies respond to a breach. Learn the methods CrowdStrike uses to disrupt and ultimately remove bad actors from networks.
  • Entrust #3: What Type of Passwordless Solution is Right for You? Recorded: Jan 28 2021 60 mins
    Madhur Bhargava, Product Marketing Manager, Entrust Identity; Sharon Smith, Moderator
    Passwords are easily the most irritable thing for securing your digital identity. Be it workforce or consumers, everybody gets bogged down with the task of remembering passwords for multiple websites and applications. They are also the weakest form of security, often hacked by cybercriminals. With the advent of biometrics and their widespread reach (thanks to smartphones), passwordless access became a reality with mobile push authentication. As biometrics are unique to every individual, it is a pretty secure way to access applications and authorize transactions. Passwordless techniques were further modified with the introduction of physical keys (USB devices). But the foremost approach to passwordless access is credential based authentication which works on the principal of securing both your device and identity. Join us for a session where we will talk about all things passwordless. We’ll examine:

    · How security paradigms changed with COVID-19 ?
    · Why is the world moving towards passwordless ?
    · Different types of Passwordless solutions offered by Entrust Identity
    · How to secure your workforce with Entrust Identity's high assurance passwordless solution
(ISC)² Security Briefings - In-depth examination of infosec topics.
(ISC)² Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: (ISC)²’s Digital Transformation Journey - Part 2
  • Live at: Aug 20 2019 5:00 pm
  • Presented by: Bruce Beam, (ISC)²; Beth Paredes, (ISC)²; Sommer Hess, (ISC)²; Brandon Dunlap (Moderator)
  • From:
Your email has been sent.
or close