Hi [[ session.user.profile.firstName ]]

Office Shutdown: Securing an Increased Remote Workforce

The COVID-19 virus outbreak has put immense pressure on IT organizations who now need to scale remote access quickly to thousands of users working from home. Many organizations did not have a plan in place for this and are doing the best they can. Many remote workers haven’t been issued laptops or are using unmanaged devices that may not have adequate protections. Some companies are running into licensing issues for things like their VPN connections. Join ExtraHop and (ISC)2 on April 16, 2020 at 1:00PM Eastern for a timely discussion on how you can deal with performance and security implications of this shift and receive tips and best practices on how to deal with the situation we find ourselves in.
Recorded Apr 16 2020 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Smith, ExtraHop; Glenn Leifheit, Microsoft; Tim Campo, (ISC)2; Diane Brown, Ulta; Brandon Dunlap (Moderator)
Presentation preview: Office Shutdown: Securing an Increased Remote Workforce

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 10 Essential Steps to Rethinking Risk Assessments Jul 8 2021 12:00 pm UTC 60 mins
    Charles Allen, CIPP/E, InfoSec Consulting Manager, OneTrust GRC; Brandon Dunlap, Moderator
    Do you spend countless hours assessing businesses risk, stuck in spreadsheets, sift through emails to find the most up-to-date information? After gathering all the necessary information from your line of business, you still need to review, validate, analyze, and assigned a risk score. All of this must be done before actionable insights can be drawn or mitigation efforts can take place. There is a significant gap in how risk is assessed and rate at which your business operates today. As your program evolves, the need to simplify the risk assessment process becomes unavoidable. But a common reality is that as your business continues to develop, risk assessment practices and resources have largely remained the same. It’s not as simple as getting a risk management tool; it’s about finding the right technology to adapt your processes in line with your current risk landscape and business objectives. On July 8, 2021 at 1:00 pm BST. OneTrust GRC and (ISC)2 will review risk assessment best practices businesses should consider based on leading industry standards from ISO 31000, NIST CSF, and the latest DOJ Corporate Compliance Guidance. We will also share how to:

    · Familiarize yourself with proven best practices and new perspectives on risk assessments

    · Identify opportunities to collect risk insights in context through an automated questionnaire process

    · Streamline risk identification with automation rules tied to your risk methodology
  • 5 Steps to Overcome Data Overload: Using Data Discovery to Standardize Risk Jun 3 2021 12:00 pm UTC 60 mins
    Scott Bridgen, Head of GRC, OneTrust GRC; Brandon Dunlap, Moderator
    Every organization is working to reduce the delay between issuing a risk assessment, receiving a response, gaining risk insight, and making a risk-based decision. Risk insights quickly lose value as time elapses from the initial assessment request. Businesses should leverage the digital workstreams to collect information as updates occur using data discovery tools to find, document, and classify in real-time. Join OneTrust GRC and (ISC)2 on June 3, 2021 at 1:00 pm BST as we explore how to quickly connect enterprise data through automated data discovery and translate the data into meaningful risk insights. We’ll also examine how to:

    · Identify data across business applications for the latest risk insights.

    · Automatically categorize information to deliver meaningful insights across risk, compliance, and your executive teams

    · Explore a new way to quantify risk using risk formulas to aggregate and standardize risk using real-time data points
  • Analyzing a Year of Chaos and Courage: CrowdStrike’s 2021 Global Threat Report Jun 1 2021 12:00 pm UTC 60 mins
    Zeki Turedi, CTO for Europe, Middle East & Africa, Crowdstrike; Brandon Dunlap (Moderator)
    In a year when a global pandemic significantly changed how and where we work, the CrowdStrike 2021 Global Threat Report has never been more highly anticipated. This year, the report exposes how cyber adversaries have exploited the situation, accelerating attacks and introducing increasingly damaging tactics, techniques and procedures. On April 13, 2021 at 1:00Pm BST, CrowdStrike Technology Strategist, Zeki Turedi and (ISC)2 will examine the notable threats, events and trends in the report, including pragmatic recommendations to help you better defend against cyberattacks in 2021 and beyond. We'll also examine:

    · How the COVID-19 pandemic has changed cybersecurity

    · How "big game hunters" are targeting the healthcare sector

    · Significant nation-state-based targeted attacks and operations observed from China, Iran, DPRK, Russia and others

    · The CrowdStrike eCrime Index and how it measures the strength of the cybercriminal market over time
  • Practical steps to Privileged Access Management: Beyond Password Managers May 13 2021 12:00 pm UTC 60 mins
    Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic; Brandon Dunlap, Moderator
    With up to 80% of cyber security breaches due to compromised credentials, more organisations than ever are prioritising privileged access security. This is reflected by Gartner as they have ranked Privileged Access Management (PAM) as the #1 security project for organisations for two years in a row. With the added challenge of cloud applications and services accelerating, organisations across the globe must understand and manage the challenges posed by privileged access from remote employees, third parties, and contractors. Join Thycotic chief security scientist and author Joseph Carson and (ISC)2 on May 13, 2021 at 1:00PM BST as he examines the key differences between Password Managers and Privileged Access Management and explaining why Password Managers are not enough to protect your privileged access. But we won’t stop there, Joseph will then guide you through the practical approach on how to define and implement privileged access cloud security best practices. We’ll also look at:

    · The importance of protecting privileges not just user passwords

    · Why Password Managers are not sufficient to protect your privileged accounts

    · Key difference between Password Managers and Privileged Access Management

    · Best practices for securing cloud privileged access

    · Proven approach to implementing secure privileged access for remote workers and third parties
  • Will SASE Transform IT Security for Businesses? May 6 2021 12:00 pm UTC 60 mins
    Chris Frost, Technical Solutions Architect, Cloud Security, Cisco; Brandon Dunlap, Moderator
    The global pandemic has accelerated the move of edge security controls to a cloud-delivered model. But it hasn’t changed the need for effective threat detection and reliable, fast secure access. The best way for security teams to meet these new challenges head-on is through a secure access service edge (SASE) service. Join Cisco and (ISC)2 on May 6, 2021 at 1:00PM BST as we explore the following:

    • Networking and security solutions that are designed to work together

    • Efficient and effective cloud-delivered security

    • Vendor consolidation and ease of deployment

    • Management that will scale with the needs of your business.
  • Is DoH a Problem or a Solution? Apr 29 2021 12:00 pm UTC 60 mins
    Ollie Sheridan, Principal Sales Engineer, Security, (EMEA) Gigamon; Brandon Dunlap, Moderator
    DoH (DNS over HTTPS) is a means of further encrypting web traffic and another step towards an encrypted safer Internet, or so it would seem. Many browser vendors are offering a means to tunnel your DNS traffic over HTTPS (TLS), combined with other technologies (such as Encrypted SNI) it presents a challenge to any organisation attempting to maintain a strong security posture in the constant battle against Malware and Data Exfiltration. Join Gigamon and (ISC)2 on April 29, 2021 at 1:00PM BST when we will discuss the rise of DoH, what problem it's trying to solve along with the associated problems it inadvertently creates. We'll also look into how it can be implemented and monitored, examining strategies to mitigate any risks this new approach presents us with. We’ll also examine the motivations behind those offering a 'free service' to users on the Internet and how this encrypted traffic is only as private as the trust you put into to the provider in question.
  • Solving the Cloud Identity Challenge Apr 27 2021 12:00 pm UTC 60 mins
    Michael Byrnes, Director, Solutions Engineering, MEIA; Brandon Dunlap, Moderator
    Today, many organizations rely on multiple cloud services with their end users regularly consuming dozens, or even hundreds, of different SaaS applications. This great cloud migration has successfully enabled the increase in remote working and is accelerating digital transformation initiatives. But, more clouds also means more challenges. In addition to the fundamental cloud security issues, there’s the additional complexity and interoperability issues arising from siloed identity stores, native toolsets, and conflicting shared responsibility models between cloud providers, creating an expanded attack surface that organisations need to address. On April 27, 2021 at 1:00PM BST, Beyond Trust and (ISC)2 will look at why the identity challenge is the most important security problem for organisations to solve and is best accomplished by standardizing the management and security controls across the entire IT ecosystem. Join this session to learn:

    · The most pressing cloud security risks
    · Where native toolsets leave gaps in security that you must address
    · How to implement 7 cloud security best practices with privileged access management (PAM) to vastly decrease your likelihood and scope of a cloud-related breach
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Apr 20 2021 12:00 pm UTC 60 mins
    Natasha Karelina, (ISC)² Customer Service Manager, EMEA
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:

    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarised
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Busting Advanced BotNets Apr 15 2021 12:00 pm UTC 60 mins
    Senad Aruc: Lead Technical Solutions Architect at Advanced Threats, Cisco; Brandon Dunlap, Moderator
    Criminal operations who operate advanced botnets have their own rules and secrets they don’t want reveled. They like to infect, hack and control victims without getting caught by law enforcements. Endpoint security is not enough to prevent zero-day malware attacks, so the research we do at Cisco has always been focused on the command and control centers. Having this aim, we managed to expose more than 20 unique C&C/Botnet servers dirty secrets in past years. These research articles are published in various cyber security magazines in Europe and Asia and have also been presented at cybersecurity conferences. Join Cisco and (ISC)2 on April 15, 2021 at 1:00PM BST as we reveal the busted famous botnets from inside and outside, with all the original source code, files, and logic behind those criminals. By revealing these busted C&C servers we will see and learn how serious they take this illegal business and have a chance to peek inside them. A list of the busted botnets we will reveal in this presentation includes:

    *SilverFish Group Threat Actor Report

    *Revealing Unique MitB Builder C&C Server

    *NAS Botnet Revealed
  • Protecting the Enterprise: 5 Components needed for Cybersecurity Training Apr 13 2021 5:00 pm UTC 60 mins
    Spencer Wilcox, CISO, PNM; Derrick Butts, CISO, The Truth Initiative; Mirtha Collin, (ISC)2; Brandon Dunlap, Moderator
    It’s difficult to prescribe a one-size-fits-all approach to training your cybersecurity team. While cybersecurity training needs to be structured and adhere to industry standards, it also must be purposeful and tailored to your organization’s needs. No one organization has precisely the same security needs as another. However, many of the fundamentals of a training and education program apply across different organizations and sectors. Join (ISC)2 for a panel discussion on Tuesday, April 13, 2021 at 1:00PM Eastern as industry leaders share tips they’ve learned and strategies they’re working towards to conquer a secure and compliant cybersecurity training program. Areas for discussion will include:

    · Who needs training

    · Who is responsible for training

    · Determining the curriculum

    · Training and certification

    · Ensuring training effectiveness

    Be prepared for an hour well-spent and discover how to create a cybersecurity training plan that maps to your organization’s specific needs.
  • SolarWinds Fallout Has Execs Asking: How Secure is Our Supply Chain? Recorded: Mar 30 2021 59 mins
    Thomas Scanlon, Carnegie Mellon/CERT; Andrew Boyle, BAH; Shawn Harris, Starbucks; Brandon Dunlap, Moderator
    The ramifications of the SolarWinds incident continue to evolve as more details emerge about the impact it had on a wide range of organizations. A recent survey of more than 300 cybersecurity practitioners by (ISC)2reveals just how concerning the incident was and what these professionals recommend to shield organizations from similar supply chain threats. Join this panel discussion on March 30, 2021 at 1:00pm Eastern to hear anecdotes and best practices related to third-party technologies in the security stack, and how peers in cybersecurity leadership positions are future-proofing their defenses while planning for worst case scenario.
  • Cloud Security Posture Management - Common Public-Cloud Challenges Recorded: Mar 30 2021 60 mins
    Gregg M. Ogden, Sr. Product Marketing Manager, Aqua Security; Brandon Dunlap, Moderator
    Cloud Security Posture Management (CSPM) is a bit of a hot topic right now, especially for anyone trying to meet the security requirements in a multi-cloud environment. Alarmingly, more than 30 billion customer records have been exposed due to cloud misconfigurations. Simply understanding what you need to worry about when developing a security plan for your infrastructure can be a real challenge. Join Aqua Security and (ISC)2 on March 30, 2021 at 1:00PM BST as we discuss common public-cloud challenges and what you need to do to address them:

    · Working with complex cloud environments

    · Avoiding misconfiguration of services

    · Minimizing human error and how to stop configuration drift on cloud accounts
  • Inside (ISC)²: Updates on Exams and Certifications Recorded: Mar 23 2021 61 mins
    Clar Rosso, (ISC)² CEO; Dr. Casey Marks, Chief Product Office and VP, (ISC)²
    Clar Rosso, CEO of (ISC)2 shares the latest insights on what’s happening at our association. Join us for this quarterly update where we cover the latest developments at (ISC)2, ranging from certification to member benefits, continuing education and events, to major milestones and achievements.



    Joining Clar this quarter is Dr. Casey Marks, chief product officer and VP of (ISC)2, to discuss the latest in Exams and certifications.
  • Global Impressions: Endpoint Security Strategies for the Long-Term Recorded: Mar 23 2021 60 mins
    Bob Hansmann, Sr. Product Marketing Manager – Security, Infoblox; Brandon Dunlap, Moderator
    After a painful but relatively successful response to workplace changes driven by the pandemic, how well are those security measures working and what is next for the evolution of the SOC and endpoint security in specific? For most organizations, the future involves a larger remote workforce, of both full and part-time workers, including those in traditional HQ office roles. But many of the measures taken in response to pandemic conditions are proving less-than-ideal as long-term solutions. Join Infoblox and (ISC)2 on March 23, 2021 at 1:00PM GMT for a session that will draw on recent analyst reports and surveys conducted globally, with some EMEA specific call-outs, to help attendees to better understand…

    · Which security alternatives are leaders considering as long-term solutions, and why?

    · What techniques are helping to improve visibility for users and devices regardless of their location?

    · Why are security leaders evolving methods for obtaining and using cyber threat intelligence?

    · How can embracing automation improve response times and overall operational efficiencies?
  • Part 3: How the Pandemic Changed Social Engineering; From Attackers to Defenders Recorded: Mar 18 2021 56 mins
    Sarka Pekarova,Security Consultant,Dreamlab Technologies Switzerland; Chris Green, Head of PR and Comms EMEA, (ISC)²
    (ISC)² Cybersecurity Experiences Series: One Year After The COVID-19 Outbreak

    With the pandemic, our personal digital lives changed, but also our work has been catapulted into digital transformation. What role are humans having now? Why do we always say that humans are the weakest link and why we should start saying the opposite? During these difficult times, it is more than ever evident how humans are important to protect our networks. Understanding the human side of cyber security, gives an invaluable insight into understanding not only threat actors but our own colleagues and employees and how to build better strategies with human assets in mind to combat anything from insider threats to external malicious actors.

    Sarka will walk you through some approaches to her engagements and how this knowledge can help you protect yourself, your loved ones as well as how useful it is for your organisation.
  • Critical Metrics in Incident Response:Time to Contain Recorded: Mar 16 2021 60 mins
    Jan Tietze, Director, Security Strategy EMEA, SentinelOne; Brandon Dunlap, Moderator
    How do you shoot down a missile before it hits its target? That's the problem facing today's incident response teams. As cyberattacks increase in volume, velocity and complexity, the security operations center (SOC) handling incident response is the nexus for this challenge. A well-honed incident response operation that combined EPP+EDR, can deliver an impressive return on investment. In many data breach incidents, the cost is more than financial, and it is well known that the time cyber security teams take from the breach to containment is critical. With the stakes so high, how can your cyber security team shrink the time between detecting and handling cyber threats? Join SentinelOne and (ISC)2 on March 16, 2021 at 1:00pm BST as we cover these key questions and other areas such as:
    · Why traditional protective approaches are no longer enough
    · The importance of automation in the response process
    · How to identify and establish key metrics in incident response
    · Technical live demonstration of SentinelOne’s single agent, AI platform that helps cyber security teams to prevent, detect, respond and hunt threats in real time
  • Inside (ISC)² Quarterly Board Update, 2021 (Q1) Recorded: Mar 12 2021 20 mins
    Clar Rosso, (ISC)² CEO; Zach Tudor, Chair of the Board, (ISC)²
    Join us for (ISC)² Insights, a quarterly review of our association’s latest accomplishments. Each quarter, the (ISC)² Board of Directors Chairperson and CEO will update members on the association’s strategic roadmap, new achievements and milestones, the latest on our certifications, new professional development opportunities, member offers and more.
  • Part 2: COVID-19's Impact on Cyber-Security - Highs, Lows and Lessons Learnt Recorded: Mar 11 2021 56 mins
    Tope S Aladenusi, Chief Strategy Officer Deloitte West Africa; Chris Green Head of PR and Comms – EMEA (ISC)²
    (ISC)² Cybersecurity Experiences Series: One Year After The COVID-19 Outbreak

    It's been a year since the World Health Organisation (WHO) declared the COVID-19 outbreak as a Pandemic and even longer since the first case was recorded in the world. With total lockdowns lasting months in many parts of the word, organisations and individuals were forced to embrace the 'new normal'. Governments are reconsidering ways to ensure that their countries are stable, and businesses are trying to stay afloat. Nevertheless, while the world is focused on the health and economic threats posed by COVID-19, cybercriminals worldwide are undoubtedly capitalising on this crisis.

    In a bid to support and secure a remote workforce, and ensure resiliency, there has been an increased investment in mobility, collaboration, and other remote working technologies and the adoption of cloud services. On the threat landscape, there was a significant shift in the frequency and magnitude of cybersecurity attacks and data breaches on SMEs, health institutions, public, private, financial and non-financial institutions globally.

    In 2021, while the economic and social situation will largely remain the same in most parts of the world, although with a much positive outlook given vaccines' development in different countries, there is likely to be a significant increase in cybercriminals' activities. Therefore, an introspection into the lessons learnt, highs and lows in the past one year will help us develop foresight and adequately prepare as we progress in 2021 and beyond.
  • Celebrating International Women’s Day: Carving a Cybersecurity Career Path Recorded: Mar 8 2021 60 mins
    Clar Rosso, CEO, (ISC)2; Aanchal Gupta, CISSP, VP, Azure Security, Microsoft; Lori Ross O'Neil, CISSP; Megan Hargrove, CISSP
    To mark the 46th annual International Women’s Day on March 8, 2021, (ISC)2 is proud to present a panel of accomplished women in the field of cybersecurity for a webinar discussion at 11:00am Eastern. This group will come together to discuss data on the demographics that make up the workforce and how they are shifting. They will also outline their own journeys in the profession that led them to the leadership positions they now hold, including the challenges they encountered and strategies they employed to succeed. The discussion will also look ahead to the evolution of diverse cybersecurity teams and the principles that inform how they are being assembled today. Speakers include:
    Clar Rosso, CEO, (ISC)2

    Aanchal Gupta, CISSP, Vice President, Azure Security at Microsoft

    Lori Ross O’Neil, CISSP, Sr. ICS Cyber Researcher & Project Manager, Pacific Northwest National Laboratory; Vice Chairperson, 2021 (ISC)2 Board of Directors

    Megan Hargrove, CISSP, Cyber Security Incident Response Manager, Tech Data
  • Part 1: COVID-19 Cybersecurity Attacks Recorded: Mar 4 2021 61 mins
    Flavio Aggio, CISO, World Health Organization, Chris Green, Head of PR and Comms EMEA, (ISC)²
    (ISC)² Cybersecurity Experiences Series: One Year After The COVID-19 Outbreak

    Cybersecurity technologies are extremely important in identifying, detecting, responding to and recovering from attacks. However, they are not sufficient. A "HumanOS" upgrade is required to safely use the Internet. It is not only about training and awareness, though. It is about the way users must behave online and the IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.
(ISC)² Security Briefings - EMEA
(ISC)² Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Office Shutdown: Securing an Increased Remote Workforce
  • Live at: Apr 16 2020 5:00 pm
  • Presented by: John Smith, ExtraHop; Glenn Leifheit, Microsoft; Tim Campo, (ISC)2; Diane Brown, Ulta; Brandon Dunlap (Moderator)
  • From:
Your email has been sent.
or close