Hi [[ session.user.profile.firstName ]]

Inside (ISC)² Quarterly Board Update, 2021 (Q2)

(ISC)² Board of Directors Chairperson, Zachary Tudor, CISSP and CEO Clar Rosso update members on accomplishments in Q2 of 2021 including a significant increase in professional development opportunities, record numbers of exam offerings, and sharing new research findings to help fill the cybersecurity profession pipeline. Tune in to hear what the organization has planned for the rest of 2021, including an update on this year’s (ISC)² Security Congress event.
Recorded May 6 2021 15 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Zachary Tudor, CISSP, (ISC)² Board of Directors Chairperson and Clar Rosso, CEO, (ISC)²
Presentation preview: Inside (ISC)² Quarterly Board Update, 2021 (Q2)

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Darktrace #3: Securing Smart Cities with Cyber AI Jul 27 2021 5:00 pm UTC 60 mins
    Marcus Fowler, Director of Strategic Threat, Darktrace; Brandon Dunlap, Moderator
    In recent months, major incidents such as the attack related to SolarWinds has led organizations to reevaluate their cyber security strategy. Governments and municipalities in particular, who are facing threats from increasingly professional threat-actors, need robust and adaptive defenses to secure critical data and infrastructure. While traditional tools rely on rules and signatures to spot signs of known threats, cyber-criminals continue to innovate and circumvent these defenses with new tools, techniques, and procedures. For this reason Cyber AI is becoming increasingly critical for its ability to understand ‘normal’, and detect and respond to subtle deviations indicative of a cyber-threat. Join Darktrace and (ISC)2 on July 27, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as Darktrace’s Director of Strategic Threat, Marcus Fowler explores:

    o The unique challenges facing the digital infrastructures of cities and nations

    o Top cyber incidents of 2021 and what they show us about government cyber-risk

    o Case studies of Darktrace municipal customers
  • Key Insights from the 2021 Cloud Security Report Jul 20 2021 5:00 pm UTC 60 mins
    Holger Schultz and Steve Prentice
    The 2021 Cloud Security Report, sponsored by (ISC)2, explores current cloud security trends and challenges, how organizations are responding to security threats in the cloud and reveals tools and best practices organizations are considering.

    Based on a comprehensive survey of 783 cybersecurity professionals conducted in early 2021 to uncover how cloud user organizations are responding to security threats in the cloud, and what training, certifications and best practices IT cybersecurity leaders are prioritizing in their move to the cloud.

    Join (ISC)2 on July 21, 2021 at 1:00PM Eastern for highlights of the results and to get key insights including:
    •A majority of cybersecurity professionals (96%) confirm they are at least moderately concerned about public cloud security, a small increase from last year’s survey.
    •For the second year in a row, the key barrier to cloud adoption, organizations mention was a lack of qualified staff (39%) as the biggest impediment to faster adoption.
    •More than half of organizations (57%) expect their cloud budgets to increase over the next 12 months.
    •When asked how organizations rate their overall security readiness, 73% rate their team’s security readiness average or below average. Of those, 78% believe their teams would benefit from cloud security training and/or certification.
  • Darktrace #2: Cyber AI and Protecting the Innovation that Drives Transportation Jul 13 2021 5:00 pm UTC 60 mins
    Justin Fier, Darktrace Director of Cyber Intelligence & Analytics; Brandon Dunlap, Moderator
    Organizations in the automotive industry and cyber-physical transportation ecosystems face unique security challenges. Self-learning AI has provided a answer to get pace with the rapid changes in the threat landscape and industrial technologies, with its ability to detect never-before-seen attacks and adapt to any changes in infrastructure. Join Justin Fier, Darktrace’s Director of Cyber Intelligence & Analytics and (ISC)2 on July 13, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as he examines the security challenges facing the automotive industry and cyber-physical transportation ecosystems. We’ll also examine:

    o How CASE innovations in the transportation sector complexify the cyber threat landscape

    o How McLaren Racing is using AI to protect their critical systems

    o The benefits of Autonomous Response in fighting back against emerging cyber-threats at machine speed
  • Inside (ISC)2: Updates on Member Services, Benefits and Experience Jul 1 2021 5:00 pm UTC 60 mins
    Clar Rosso, CEO, (ISC)2; Beth Paredes, Director of Member Services, (ISC)2
    Clar Rosso, CEO of (ISC)2 shares the latest insights on what’s happening at our association. Join us for this quarterly update where we cover the latest developments at (ISC)2, ranging from certification to member benefits, continuing education and events, to major milestones and achievements. On July 1, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as Beth Paredes, Director of Member Services at (ISC)2 join Clar to provide an overview of the wealth of benefits and services available to members and associates.
  • Darktrace #1: Cyber-Threats Facing Global Healthcare Jun 22 2021 5:00 pm UTC 60 mins
    Brianna Leddy, Darktrace, Director of Analysis; Brandon Dunlap, Moderator
    Attackers are hitting healthcare organizations with targeted and topical email attacks, exploiting concerns about the pandemic. There has been a global rise of ‘fearware’ hitting health organizations around the world, including attackers posing as the Center for Disease Control (CDC) and World Health Organization (WHO). Attackers continue to launch evolving campaigns to convince people to open emails and click on malicious links, using newly-created email domains to bypass traditional gateways. Join Darktrace and (ISC)2 on June 22, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific for Part 1 or a 3 part series as we explore how Cyber AI fights back against increasingly targeted attacks, from advanced phishing to ransomware designed to compromise healthcare workers and organizations as they work on the frontlines against the pandemic.
  • Countering Threat Evasion: You Cannot Stop What You Cannot See! Jun 17 2021 5:00 pm UTC 60 mins
    Bob Hansmann, Sr. Product Marketing Manager - Security, Infoblox; Brandon Dunlap, Moderator
    Cybercriminals must become masters of evasion if they are to be successful. Many threats, such as APT’s, are designed to remain hidden for weeks or longer as they slowly monitor their victim, compromising select information in a way that is also intended to go unnoticed. Others, like ransomware, may only need to hide their malicious intentions long enough to infect and begin encryption processes. And even when these attacks trip some defensive sensor, it can take analysts days to investigate and launch an effective incident response, often too late to prevent significant damage. Join Infoblox and (ISC)2 on June 17, 2021 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we assess evasion methodologies and the value of DNS, with some unique North American callouts, to counter them across the kill chain including:

    · Why does DNS visibility expose threat activity other solutions miss?

    · How can DNS visibility be used to make other solutions more effective?

    · What role does DNS play in investigation and response?
  • Secure Modern Apps, Regain Network Visibility & Enhance Your Team’s Value Recorded: Jun 10 2021 60 mins
    Eric Kostlan, Technical Leader, Technical Marketing, Cisco: Brandon Dunlap, Moderator
    Cisco is redefining network security by offering superior threat visibility, ensuring protection for modern apps & hybrid workforce, and empowering firewall users with dynamic policies for application environments. Join Cisco and (ISC)2 on June 10, 2021 at 1:00 p.m Eastern/10:00 a.m. Pacific as we reimagine network security and learn how the firewall can keep pace with DevOps and the application team and offer threat defense with encrypted traffic, TLS 1.3, and accelerate investigation & remediation with the platform approach.
  • Become Cyber Resilient - The Next Generation of Cyber Investigations & IR Recorded: Jun 8 2021 61 mins
    Bryan Sartin, Chief Services Officer, eSentire; Brandon Dunlap, Moderator
    Cyber investigations and Incident Response (IR) stand to benefit more from disruption than any proficiency in security. What should and could be on the leading edge still relies on outdated, people-heavy approaches, and circa 2005 technologies. Shockingly, this is still how some of the biggest players in the industry tackle the most brand damaging cyber events today. This traditional engagement model is tedious; takes too long and costs too much. Smarter, better and faster options are within our grasp. Join eSentire and (ISC)2 on June 8, 2021 at 1:00 p.m. Eastern/ 10:00 a.m. Pacific for an examination of some of the big rock innovations that are accelerating and revolutionizing the IR world. We’ll cover advancements in endpoint and network sensors, and process improvements in evidence acquisition and analysis and will pivot to forward-leaning engagement models converging IR, cyber intelligence and SOC analyst expertise. Other topics to be covered include:

    - How modern day cyber investigations and Incident Response can leap off the starting blocks more quickly, with faster time-to-execution and time-to-value for customers.

    - How the next generation of cyber investigation and Incident Response will change the game for information security executives who are looking for a leg up when going into battle to protect their businesses from cybersecurity incidents.
  • Building Your Cybersecurity Bench: (ISC)2’s Cybersecurity Career Pursuers Study Recorded: May 18 2021 59 mins
    Clar Rosso,(ISC)2 CEO;Emilie McLaughlin,VP,HR Centers of Excellence;John Carnes,Information Security Pro;Brandon Dunlap,Mod
    As organizations continue to struggle to find trained cybersecurity professionals to build out their teams, recruiters and hiring managers may need to adjust the tactics they use to proactively identify internal and external candidates. Developing bench strength by targeting candidates who have transferable skills can lead to long term depth and stability on security teams. Understanding who to look for and managing their expectations of what cybersecurity roles entail is critical to success. Join Clar Rosso, CEO of (ISC)2 on May 18, 2021 at 1:00 p.m, Eastern/10:00 a.m. Pacific as she provides an overview of the 2021 (ISC)2 Cybersecurity Career Pursuers Study, which surveyed both experienced cybersecurity professionals as well as jobseekers considering a career in the field. The study examines such topics as which tasks and experiences make a cybersecurity professional successful, the value of mentorship, at what point in their careers pursuers seem likely to seek a cybersecurity path, what attracts people to the profession and which qualities rank as strong indicators of future success for team members.
  • Demystifying WAN-as-a-Service Recorded: May 13 2021 57 mins
    Vivek Ganti, Security Product Marketing, Cloudflare; Brandon Dunlap, Moderator
    The building blocks of traditional WAN architectures are showing their age. MPLS is expensive and has painfully slow deployment times. Broadband Internet does not deliver the millisecond performance and constant reliability needed for most business applications today. And neither infrastructure was designed with security in mind. Compounding matters further, the surge in remote work and increased cloud adoption is straining traditional WAN architectures. WAN-as-a-service is a cloud-based WAN architecture that offers global scale, integrated enterprise network security functions, and direct, secure connectivity to remote users. Join Cloudflare and (ISC)2 on May 13, 2021 at 1:00PM Eastern for an examination on how WAN-as-a-Service can increase operational agility and lower total costs of ownership and solve the inherent challenges associated with MPLS and broadband Internet.

    We’ll also cover:

    · What is WAN-as-a-service and what are its advantages over traditional WAN architectures
    · How can enterprises build and deploy a successful WAN strategy with fast connectivity and robust security built-in
    · How enterprises can increase your operational agility with easy deployment and management of network services
  • Key Insights from CyberEdge’s 2021 Cyberthreat Defense Report Recorded: May 11 2021 60 mins
    Steve Piper, Co-Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
    Did you know that 86% of organizations experienced a successful attack in 2021? Up from 81% the prior year, the largest year-over-year increase in six years. CyberEdge’s 2021 Cyberthreat Defense Report (CDR) has become the de facto standard for assessing organizations’ security posture, for gauging perceptions of IT security professionals, and for ascertaining current and planned investments in IT security infrastructure. Now in its eighth year, the 2021 CDR assesses the views of 1,200 IT security professionals representing 17 countries and 19 industries. It’s the most geographically comprehensive view of IT security perceptions in our industry. Join (ISC)2 (a sponsor of this year’s study) and CyberEdge on May 11, 2021 at 1:00 pm ET/10 am PT for highlights of the results and get key insights including:

    - The chronic shortage of IT security skilled staff is still prevalent; hiring gaps exist across all major IT security roles
    - Lack of skilled personnel is the #2 obstacle to effective defense against cyberthreats
    - The fastest and most economical solution is to train existing IT members to fill security positions
    - IT security professionals see personal and organization-wide benefits of cybersecurity certifications, especially for cloud security, software security, security administration, and management
    - And more!
  • Crypto Service Mesh - A New Perspective to Enterprise Cryptography Recorded: May 6 2021 58 mins
    Muralidharan Palanisamy, Chief Solutions Officer, AppViewX; Brandon Dunlap, Moderator
    Cryptography is omnipresent. Every business unit uses crypto in some shape or form. A marketing web page uses a TLS certificate to assert its identity. A CRM solution that stores customer data uses symmetric key cryptography to encrypt data at rest.

    An organization's digital security is only as strong as its business units' weakest crypto practices. This has forced organizations to rethink the way teams consume crypto services and driven the need for centralized orchestration and control. Join AppviewX and (ISC)2 on May 6, 2021, at 1:00 PM Eastern Time for a discussion on how a Crypto Service Mesh orchestrates all the diverse crypto services in an organization, abstracts the nitty-gritty details, and provides a standardized, user-friendly, policy-controlled way for different business units to consume these services. We’ll examine:

    · How various business units consume crypto today

    · An introduction to Crypto Service Mesh

    · How a Crypto Service Mesh weaves together people, process, and technology
  • Inside (ISC)² Quarterly Board Update, 2021 (Q2) Recorded: May 6 2021 15 mins
    Zachary Tudor, CISSP, (ISC)² Board of Directors Chairperson and Clar Rosso, CEO, (ISC)²
    (ISC)² Board of Directors Chairperson, Zachary Tudor, CISSP and CEO Clar Rosso update members on accomplishments in Q2 of 2021 including a significant increase in professional development opportunities, record numbers of exam offerings, and sharing new research findings to help fill the cybersecurity profession pipeline. Tune in to hear what the organization has planned for the rest of 2021, including an update on this year’s (ISC)² Security Congress event.
  • Beyond the Buzzwords – The Trends Behind SASE and Zero Trust Recorded: May 4 2021 59 mins
    Eric Cornelius, Chief Product Officer, iboss; Brandon Dunlap, Moderator
    Zero Trust has generated a great deal of “buzz” in the last few years. Many solution providers tout the benefits of Zero Trust, but the approach may not be a fit for you and your organization. Join iboss and (ISC)2 on May 4, 2021 at 1:00PM Eastern as we explore the evolution of network security design principles in order to gain a deeper understanding of how technology can be leveraged to meet evolving user needs and the behavioral and technological direction behind SASE and Zero Trust.
  • ExtraHop #1: How To Stop Breaches Faster with Integrated NDR & EDR Recorded: Apr 26 2021 66 mins
    Chase Snyder, Sr. Security Product Marketing Manager, ExtraHop; Dixon Styres, Solutions Architect, Crowdstrike; Sharon Smith
    Defending against advanced threats requires advanced insights from the three foundational data sources for security operations: endpoint data, log data, and the network. In the first part of a three-part series, we'll discuss:

    ·advanced threat behaviors, how they gain access to the network through both commonplace and sophisticated means, how they act once they're inside.

    ·how to leverage the three foundational data sources, integrated into a best-of-breed XDR approach to detect and investigate advanced threats like supply chain attacks, insider threats, and more

    ·how to rapidly respond to minimize the blast radius and reduce business impact when an advanced threat gets inside.
  • Cloud Native Vulnerability Mgmt: Securing Container Images, VMs, and Functions Recorded: Apr 22 2021 61 mins
    Steven Zimmerman, Sr. Product Marketing Manager, Aqua Security; Brandon Dunlap, Moderator
    Full cloud native security requires more than application security testing and network monitoring. It requires a concerted approach to vulnerability management within CI/CD pipelines, in pre-production testing, and at runtime. Join Aqua Security and (ISC)2 on April 22, 2021 at 1:00PM Eastern for an examination on how to secure applications in complex cloud native ecosystems, including:

    · Detecting vulnerabilities and exploits in container images, VMs, and serverless functions

    · Prioritizing and triaging security risks to accelerate remediation

    · Uncovering hidden malware and attack kill chains before they’re executed in production
  • ExtraHop #2: Stopping Advanced Threats Doesn't Require a Big Budget Recorded: Apr 21 2021 61 mins
    Aaron Davidson, Sr. Sales Engineer, ExtraHop; Don Shin, Sr. Security PMM, ExtraHop; Sharon Smith, Moderator
    Security and compliance frameworks from CIS, NIST, and PCI SSC point to long lists of must-have technology to build secure and compliant defenses. But they don’t tell us which ones to do first or how to allocate our limited budgets. Advanced Threats follows a land and pivots toward your valuables workflow. This knowledge gives you a roadmap to prioritize investments while leaving others as “good enough” that fit your budget and time constraints.

    Join ExtraHop experts to get insights into building effective layered defenses that prioritize your budget:

    - How the “Defender’s Dilemma” should guide your investments at the edge

    - How “Intruder’s Dilemma” sets the network trap for intruders and advanced threats

    - Why your IDS needs a next-gen upgrade against advanced threats

    - See how NG-IDS stops advanced threats (demonstration)
  • Modernize Security Operations using MITRE ATT&CK with a Cloud SIEM Recorded: Apr 20 2021 60 mins
    Girish Bhat, VP, Sumo Logic; Paul Tobia, Senior Product Manager, Sumo Logic; B. Dunlap, Moderator
    Modernizing Security Operations involves a combination of people, process, technology, and services to manage risk, monitor, detect, and respond to cybersecurity threats and incidents. Security leaders seeking to modernize security operations face serious challenges in identifying the resources, expertise and tools to meet their goals. Over the past few years, MITRE ATT&CK® a globally-accessible knowledge base of adversary tactics and techniques has gained prominence as a way to determine the effectiveness of Security Operations to detect, analyze, and respond to attacks. Join Sumo Logic and (ISC)2 on April 20, 2021 at 1:00PM Eastern for an exploration on how security practitioners can leverage the MITRE ATT&CK framework and integrate using the Sumo Cloud SIEM.
  • Top 3 Trends in Today’s Cyber Attack Landscape Recorded: Apr 15 2021 61 mins
    Ryan Toohil, Chief Technology Officer & Head of Platform, Aura; Will Taylor, Senior Security Consultant, NXTsoft; B. Dunlap
    Cyber attacks are at an all-time high and threat actors are becoming more sophisticated in their attempts. When considering today’s trends (and threats) in the industry, three recurring themes often come up amongst Cybersecurity professionals: the continued growth of ‘double extortion’ ransomware attacks, the increased risk that employee identity theft poses to organizations, and the additional fallout from supply chain attacks. Join Aura, NXTsoft, and (ISC)2 on April 15, 2021 at 1:00 PM Eastern as we discuss these three cyber threat trends and different ways you can address them within your organization.
  • Protecting the Enterprise: 5 Components needed for Cybersecurity Training Recorded: Apr 13 2021 62 mins
    Spencer Wilcox, CISO, PNM; Derrick Butts, CISO, The Truth Initiative; Mirtha Collin, (ISC)2; Brandon Dunlap, Moderator
    It’s difficult to prescribe a one-size-fits-all approach to training your cybersecurity team. While cybersecurity training needs to be structured and adhere to industry standards, it also must be purposeful and tailored to your organization’s needs. No one organization has precisely the same security needs as another. However, many of the fundamentals of a training and education program apply across different organizations and sectors. Join (ISC)2 for a panel discussion on Tuesday, April 13, 2021 at 1:00PM Eastern as industry leaders share tips they’ve learned and strategies they’re working towards to conquer a secure and compliant cybersecurity training program. Areas for discussion will include:

    · Who needs training

    · Who is responsible for training

    · Determining the curriculum

    · Training and certification

    · Ensuring training effectiveness

    Be prepared for an hour well-spent and discover how to create a cybersecurity training plan that maps to your organization’s specific needs.
(ISC)² Security Briefings - In-depth examination of infosec topics.
(ISC)² Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Inside (ISC)² Quarterly Board Update, 2021 (Q2)
  • Live at: May 6 2021 1:42 pm
  • Presented by: Zachary Tudor, CISSP, (ISC)² Board of Directors Chairperson and Clar Rosso, CEO, (ISC)²
  • From:
Your email has been sent.
or close