Darktrace #3: Mimicking Human Intuition: The Cyber AI Analyst
Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats. AI technology can help augment an overworked and understaffed security team. But can AI be programmed to think like a living breathing cybersecurity analyst? Join Darktrace and (ISC)2 on December 10, 2020 at 1:00pm for an examination of Darktrace’s Cyber AI Analyst and how this capability detected and prevented a large-scale worming attack in real-time.
RecordedDec 10 202060 mins
Your place is confirmed, we'll send you email reminders
Taking the step toward earning the (ISC)² Certified Cloud Security Professional (CCSP) credential puts you on a path to excel as an expert in cloud security. CCSP empowers individuals and organizations with the highest level of mastery in cloud security.
But how do you get started? How do you prepare? And why…what tangible benefits will you gain? Join (ISC)² for a panel discussion as industry professionals share their stories, experience and tips toward preparing for the Certified Cloud Security Professional certification. Areas for discussion will include:
- Why you should consider CCSP
- How to prepare for CCSP
- How CCSP can accelerate your career progression
Srikrupa Srivatsan, Director, Product Marketing, Infoblox; Brandon Dunlap, Moderator
With hybrid workplaces now the new norm and supply chain attacks on the rise, there’s an increased exposure to cyber-attacks, which can cause substantial disruption to any organization or industry. This increased exposure is forcing companies to not only invest and improve their own cybersecurity posture, but also manage third party risk and protect against cyber risks with cyber insurance. Certain best practices and technologies help reduce your risk and improve your security score while helping to keep insurance premium costs low. DNS security is one such approach that provides extended visibility, protection and security automation to improve a company’s security posture.
Join Infoblox and (ISC)2 November 11th, at 1 p.m., ET/ 10 a.m. PT for this webinar to learn more about:
o Why organizations invest in cyber insurance
o Getting the most out of cyber insurance
o How DNS security improves security scores and reduces cyber insurance premiums
Clar Rosso, Zachary Tudor, Lori Ross O'Neil and Dr. Casey Marks
Join us for (ISC)2 Security Congress Town Hall to learn what’s next for (ISC)2 and hear directly from members of the Board of Directors.
CEO Clar Rosso will provide a strategic update for our association, including recent accomplishments and milestones, as well as what members can expect in 2022 and beyond.
Then, a panel consisting of (ISC)² Board members and management will answer members’ questions about the association, membership, certifications, workforce trends and other cybersecurity issues and challenges facing the profession.
Town Hall is open to (ISC)2 members and associates, as well as all Security Congress attendees.
Clar Rosso, CEO, (ISC)2
Zachary Tudor, CISSP, Board of Directors Chairperson
Lori Ross O'Neil, CISSP Board of Directors Vice Chairperson
Dr. Casey Marks, Chief Qualifications Officer, (ISC)2
Chris Alden, Senior Sales Manager, Synology; Brandon Dunlap, Moderator
During 2020, the worldwide shift to remote work led to a staggering rise in cybercrime, as criminals targeted gaps in previously secure on-site networks. With over 50% of employers expecting to keep employees working remotely, and payments for a ransomware attacks averaging $100,000, businesses must work proactively to protect their data. It is essential for business to have an effective plan in place to protect at-risk systems, detect and mitigate ransomware attacks in real time, and quickly restore affected systems. Join Synology and (ISC)2 on September 28, 2021 at 1:00 p.m. Eastern/10:00 a.m. as we discuss actionable strategies for ransomware preparedness and look at real-world examples and case studies.
Key takeaways include:
Actionable ransomware preparedness tips
Protecting PC data and the elements of a robust ransomware recovery plan
Why and how to backup Microsoft 365 & Google Workspace data
Setting up remote backup to a secondary server or cloud
Aqua Security and ESG Research have partnered to survey and understand how organizations go about addressing challenges of security cloud native applications. With multiple stakeholders across engineering, DevOps, cloud, security and compliance teams, and competing priorities for addressing security pain points, many organizations are either stopping short of fully implementing the needed processes and tools, or conversely fail because they try to do too much at once. Join Aqua Security, ESG Research and (ISC)2 on September 23, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we review some of the key considerations as well as benchmark results from our survey to date.
When you tell people you’re thinking about CISSP, you’ve probably been told:
• CISSP is globally renowned - those holding it are highly sought-after.
• Achieving certification means you get paid more.
• CISSP is HARD to earn.
• It’s a LONG exam.
But what you probably haven’t heard are the unexpected surprises along the way CISSPs never imagined in their certification journey. For example, learning that CISSP is a broad certification that focuses on governance: Do you understand the technology? The people? The management?
Join us for a panel discussion as CISSP-certified members share their personal stories and the unanticipated ways certification continues to benefit their careers. After all is said, you’ll be amazed at what CISSP can do for you in your professional growth and career.
Hear expert insights from: AJ Yawn, Jerome Leach and Angus Macrae
Ronald Eddings & Chris Cochran, Hosts, Hacker Valley Studio Podcast; Brandon Dunlap, Moderator
As IT and security teams struggle to manage a complex sprawl of devices, users, cloud services, and software, there's one certainty we can rely on (thanks to the second law of thermodynamics): things will only get more complex.
But there's good news.
What we previously thought of as "asset management" has evolved. Today, we have “asset intelligence”, which moves from a spreadsheet approach — focused on getting an inventory of devices — to an API-driven, always up-to-date way of seeing all assets through integrations of existing tools, data correlation at scale, and querying capabilities to find and respond to gaps. Join Axonious and (ISC)2 on September 16, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific and hear from Ronald Eddings and Chris Cochran, producers and hosts of the Hacker Valley Studio Podcast and learn how this new approach to asset intelligence and the emerging Cyber Asset Attack Surface Management (CAASM) category helps IT and security teams improve security hygiene, reduce manual work, and remediate gaps.
The U.S. Department of Defense (DoD) Directive 8570.1 requires every full- and part-time military service member, defense contractor, civilian and foreign employee with "privileged access" to a DoD system — regardless of job series or occupational specialty — to get an approved IA baseline certification. Which certifications are the right fit for your team?
Government agencies have trusted (ISC)² to train and certify their cybersecurity personnel for more than two decades. With the recent addition of (ISC)2 Certified Cloud Security Professional (CCSP) and HealthCare Information Security and Privacy Practitioner (HCISPP) certifications, the entire portfolio of (ISC)² certifications now meet the requirements for different security workforce categories within the Department, depending on the functional area the role covers. Discussion topics include:
• How to Become DoD 8570 Compliant
• (ISC)2 Certifications Overview: IA Baseline Certification Requirements
• How to Maximize Your Training and Certification Budget
• Keep Your Team’s Cybersecurity Skills Sharp
Be prepared for 45 minutes well-spent and discover how (ISC)2 can help you train and certify your team to become DoD 8570 compliant.
Mark Sangster, V.P. and Industry Security Strategist, eSentire; Brandon Dunlap, Moderator
The majority of crippling cyberattacks begin with a simple phishing email. And while most companies provide some form of annual training, they focus on overly simplistic lures taken from public events that fail to represent the real danger of targeted criminal campaigns. Join eSentire and (ISC)2 on September 14, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as they explore how to build a comprehensive training and testing program that leverages realistic threat scenarios to foster context-relevant security awareness that drives behavioral change:
· Use risk management data and accurate phishing lures to build comprehensive awareness training
· Maximize your resources and programs to increase return on investment
· Conduct testing that improves resilience
· Meet regulatory requirements and demonstrate program success to your leadership
Steve Piper, CISSP, Founder & CEO, CyberEdge Group
Colonial Pipeline, CNA Financial, JBS Foods, Garmin, and Travelex. All victimized by high-profile ransomware attacks. All paid ransoms. Did these companies do the right thing by paying ransoms to accelerate data and system recovery? Or are they merely funding the ransomware industry and prompting even more attacks? Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews key findings from CyberEdge’s 2021 Cyberthreat Defense Report. In this webinar, Steve will:
- Examine disturbing ransomware trends, by country and by industry
- Evaluate key factors that go into deciding whether to pay ransoms
- Outline ways to be prepared for a successful ransomware attack
- Review technologies to help give security teams the upper hand
Clar Rosso, CEO of (ISC)2 shares her insights on what’s happening at our association. Join us for this quarterly update in which we cover the latest developments at (ISC)2, ranging from certification to member benefits, continuing education and events, to major milestones and achievements. On August 31, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific, Megan Gavin, Director of Events at (ISC)2 joins Clar to provide an overview of what to expect at this year’s annual Security Congress taking place this October 18-20, as well as the new global (ISC)2-hosted events being planned for 2022.
Zachary Tudor, CISSP, (ISC)² Board of Directors Chairperson and Clar Rosso, CEO, (ISC)²
(ISC)² Board of Directors Chairperson, Zachary Tudor, CISSP and CEO Clar Rosso update members on accomplishments in Q3 of 2021 including the association’s strategic roadmap, new achievements and milestones, the latest on our certifications, new professional development opportunities, member offers and more. The Q3 2021 update includes membership milestones, association accreditations and new executive leadership focused on member benefits and advocacy. (ISC)² continues to concentrate on global diversity, equity and inclusion initiatives and examining the workforce gap.
Ameet Naik, Product Marketing, Cloudflare; Brandon Dunlap, Moderator
DDoS attacks have dominated the charts in terms of frequency, sophistication, and geo-distribution over the last year. More recently, we have seen a surge in Ransom DDoS attacks — that usually accompany or follow ransomware attacks. This can cripple an organization’s attempt to respond effectively to these threats. Join Cloudflare and (ISC)2 on August 19, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we examine key DDoS attack trends from Q2 2021, ransom DDoS threats (and what you can do if you are affected) and steps organizations can take to make the impact of DDoS attacks a thing of the past.
Steve Piper, CISSP, Founder & CEO, CyberEdge Group
Want to know which IT security technologies are hot and which ones are not? Join Steve Piper, Founder & CEO of CyberEdge (and a proud CISSP), and (ISC)2 as Steve reviews key purchase insights from the 2021 Cyberthreat Defense Report. Specifically, this webcast will identify those security technologies most widely deployed and most planned for acquisition in 2021 so you can benchmark your company’s current and planned investments against your peers. We'll review adoption rates of emerging technologies, such as ZTNA and SASE, and examine purchase intent across five key security technology categories, including:
• Network security
• Endpoint security
• Application and data security
• Security management and operations
• Identity and access management
Katey Wood, Product Marketing Director, Illumio; Brandon Dunlap, Moderator
How well is your remote workforce secured against Ryuk and other ransomware – or will you find out once they return to the office? How businesses are protecting employee endpoints, on or off the corporate network, as we shift to a hybrid work model? Join Illumio and (ISC)2 on July 29, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific to find out how to benchmark your own IT efforts to prevent mass infections, and learn how to achieve Zero Trust for the endpoint, with default containment to stop the spread before it starts. We will also cover:
· What security visibility and control does IT have into endpoints on ungoverned home networks?
· How can businesses prevent the spread of ransomware like Ryuk to avoid mass endpoint infections?
· How can Zero Trust security support a hybrid model as employees – and their endpoints – start returning to the office?
Marcus Fowler, Director of Strategic Threat, Darktrace; Brandon Dunlap, Moderator
In recent months, major incidents such as the attack related to SolarWinds has led organizations to reevaluate their cyber security strategy. Governments and municipalities in particular, who are facing threats from increasingly professional threat-actors, need robust and adaptive defenses to secure critical data and infrastructure. While traditional tools rely on rules and signatures to spot signs of known threats, cyber-criminals continue to innovate and circumvent these defenses with new tools, techniques, and procedures. For this reason Cyber AI is becoming increasingly critical for its ability to understand ‘normal’, and detect and respond to subtle deviations indicative of a cyber-threat. Join Darktrace and (ISC)2 on July 27, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as Darktrace’s Director of Strategic Threat, Marcus Fowler explores:
o The unique challenges facing the digital infrastructures of cities and nations
o Top cyber incidents of 2021 and what they show us about government cyber-risk
The pandemic Work From Home (WFH) era fueled a dramatic shift to edge networking using technologies like SASE, SD-WAN, and cloud. With all the changes in the network, it is only reasonable to expect change in how you test and troubleshoot these new technologies and approaches. Join Keysight and (ISC)2 on July 22, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we explore the industry’s first cloud-native test solution, Keysight CyPerf as a new way of testing.
The 2021 Cloud Security Report, sponsored by (ISC)2, explores current cloud security trends and challenges, how organizations are responding to security threats in the cloud and reveals tools and best practices organizations are considering.
Based on a comprehensive survey of 783 cybersecurity professionals conducted in early 2021 to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications and best practices IT cybersecurity leaders are prioritizing in their move to the cloud.
Join (ISC)2 on July 21, 2021 at 1:00PM Eastern for highlights of the results and to get key insights including:
•A majority of cybersecurity professionals (96%) confirm they are at least moderately concerned about public cloud security, a small increase from last year’s survey.
•For the second year in a row, the key barrier to cloud adoption, organizations mention was a lack of qualified staff (39%) as the biggest impediment to faster adoption.
•More than half of organizations (57%) expect their cloud budgets to increase over the next 12 months.
•When asked how organizations rate their overall security readiness, 73% rate their team’s security readiness average or below average. Of those, 78% believe their teams would benefit from cloud security training and/or certification.
Erich Kron, CISSP, Security Awareness Advocate, KnowBe4; Brandon Dunlap, Moderator
Ransomware attacks are on the rise — and they’re estimated to cost global organizations $20 billion by 2021 with government agencies, healthcare providers, and educational institutions in the U.S. impacted by ransomware attacks at a cost of more than $7.5 billion in 2019 alone. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks. So, how can your organization avoid getting held hostage? Join KnowBe4 and (ISC)2 on July 15, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as Erich Kron CISSP, Security Awareness Advocate at KnowBe4 looks at the scary features of new ransomware strains, gives actionable info that you need to prevent infections, and provides tips on what to do when you are hit with ransomware.
Justin Fier, Darktrace Director of Cyber Intelligence & Analytics; Brandon Dunlap, Moderator
Organizations in the automotive industry and cyber-physical transportation ecosystems face unique security challenges. Self-learning AI has provided an answer to keep pace with the rapid changes in the threat landscape and industrial technologies, with its ability to detect never-before-seen attacks and adapt to any changes in infrastructure. Join Justin Fier, Darktrace’s Director of Cyber Intelligence & Analytics and (ISC)2 on July 13, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as he examines the security challenges facing the automotive industry and cyber-physical transportation ecosystems. We’ll also examine:
o How CASE innovations in the transportation sector complexify the cyber threat landscape
o How McLaren Racing is using AI to protect their critical systems
o The benefits of Autonomous Response in fighting back against emerging cyber-threats at machine speed
(ISC)² Security Briefings - In-depth examination of infosec topics.
(ISC)² Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.
Darktrace #3: Mimicking Human Intuition: The Cyber AI AnalystBrianna Leddy, Director of Analysis, Darktrace; Brandon Dunlap, Moderator[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]60 mins