Hi [[ session.user.profile.firstName ]]

Cyber Criminals Leave Their Fingerprints on the Internet Too

Everyone leaves breadcrumb trails on the internet, including threat actors. In a post GDPR world, DNS intelligence and analytics become ever more valuable assets for threat hunters and analysts alike. Actionable verdicts on deceitful websites and malign infrastructure along with protective monitoring mechanisms are just a few clicks away. Join DomainTools and (ISC)2 for an examination of the DomainTools threat intelligence suite - and unparalleled data repository – that can be used to profile a network of fraudulent websites. The session will include real-world investigations with practical applications of domain and infrastructure intelligence.
Recorded Jun 23 2020 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Oliver Tonge, Cyber Security Consultant, DomainTools; Brandon Dunlap, Moderator
Presentation preview: Cyber Criminals Leave Their Fingerprints on the Internet Too

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Budget for a Risk-based Program During a Pandemic Sep 15 2020 12:00 pm UTC 60 mins
    Roger Hale, CSO, BigID, Brandon Dunlap, Moderator
    The world has turned upside down in the last six months due to the global pandemic. Everything has been impacted, including your organization’s cyber security program. Join BigID and (ISC)2 on September 15, 2020 at 1:00pm BST as we discuss how a risk-based approach to your Information Security program maturity framework can guide the budgeting process to protect critical services in a time of economic uncertainty. We’ll explore best practices, tips, and concrete steps to follow to implement a risk-based approach - and how to align security services and risks to a scalable and sustainable framework. Other areas explored include:

    ● Where to maintain budget categorization of OpEx, CapEx and HeadCount, matrixed to Service Delivery and Service Risk

    ● Tips on socializing the risk impact of budgetary restrictions

    ● How to align security services and risks to a framework

    ● Where to invest and where to postpone
  • Design Thinking for Zero Trust Sep 8 2020 12:00 pm UTC 60 mins
    J. Wolfgang Goerlich, CISO, Duo Security; Brandon Dunlap, Moderator
    Security happens where man meets machine (or fails to happen, as we see all too often!) As organizations have shifted from local-only to hybrid and cloud-hosted resources, the principles of zero-trust security have helped define human-friendly secure access regardless of a user’s location. While building a zero-trust strategy can improve security wherever a system must make an access decision, ignoring the behavior of the user and their experience can ground these initiatives before you’ve even taken off. So, organizations need to ask the right questions: what exactly happens where people and technology meet? At the very moment of human/system interaction, what factors in human psychology and industrial design are at play? And if we could pause time for a moment to catalog and identify those factors, could we design a better experience, a better outcome, and a better path to the future? Join Duo Security and (ISC)2 on September 8, 2020 at 1:00 p.m. BST where we will explore how to:

    ● Improve the success of zero-trust initiatives through industrial design techniques

    ● Leverage psychology and technology to have people make secure decisions and secure actions.

    ● Construct the design framework (tactics and metrics) to build and manage a security culture.
  • 10 Ways to Harden Your Multi-Cloud Security Posture Aug 25 2020 12:00 pm UTC 60 mins
    Jeremy Snyder, Sr Dir, Business Development & Solution Eng, DivvyCloud; Brandon Dunlap, Moderator
    One of the hottest topics in the Information Security world today is Cloud Security. Many organizations are still struggling with their journey to the cloud, how to secure their users, applications and different clouds (public, private and hybrid). Join DivvyCloud and (ISC)2 on August 25, 2020 at 1:00 p.m. BST as we focus on 10 easy and functional ways to harden your multi-cloud security posture. We’ll examine how to build a foundation based on best practices which have been learned through years of helping leading cloud-adopting enterprises stay secure.
  • Security Secrets: Why Leading SOC Teams Have Cloud-y Vision Aug 18 2020 12:00 pm UTC 60 mins
    Matthias Maier, Product Marketing Director, Splunk; Brandon Dunlap, Moderator
    Security teams need to plan and prepare for a consistent security and compliance posture across a larger, more fluid ecosystem in the cloud. To cover the additional attack surface, it’s important to know all the nooks and crannies, and what operates within them. One of these operators are the App Dev teams that increasingly move toward DevOps. Code is being built and released at a level of speed and complexity that leads to high interdependencies - causing unpredictability and risk. Now more than ever, a strategy needs to balance Security Operations’ costs with the growing list of responsibilities that come as part of the package with cloud. Join Splunk and (ISC)2 on August 18, 2020 at 1:00PM BST and learn the secrets of leading security teams, including:

    •What the future of security operations centres (SOCs) and job roles will look like
    •How the SOC Team needs to be strategically embedded in DevOps
    •How to ensure and monitor compliance with an organization's security policy across multi-cloud services
    •How DevOps’ principles can be practiced in the SOC operating model
    •What it looks like to plan and establish a SOC in the cloud
    •Starting your plan and how to communicate it to management
  • The 'Hottest' IT Security Technologies in 2020 Recorded: Jul 28 2020 59 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
    Want to know which IT security technologies are hot and which ones are not? 2020 has thrown many purchasing and deployment plans into a state of flux and your organization has probably been caught up in this. Join Steve Piper, Founder & CEO of CyberEdge (and a proud CISSP) and (ISC)2 on Tuesday, July 28, 2020 at 1:00PM Eastern as Steve reviews key purchase insights from the 2020 Cyberthreat Defense Report. Specifically, this webcast will examine which security technologies are most widely deployed and most planned for acquisition in 2020 so you can benchmark your company’s current and planned investments against your peers. Purchase intent across five key security technology categories will be focused on including:

    •Network security
    •Endpoint security
    •Application and data security
    •Security management and operations
    •Identity and access management
  • Managing Shadow IT Realities with A Remote Workforce Recorded: Jul 28 2020 61 mins
    Scott Bridgen, GRC Consulting Director, One Trust; Brandon Dunlap, Moderator
    Business teams have been enabled by technology solutions effectively so that their reliance on centralized teams such as IT and security has decreased significantly. The cyber threat landscape continues to evolve and organizations need to be prepared to identify vulnerabilities and points for exposure, including unforeseen shadow IT applications. As businesses have been forced to adapt to new working realities, how has the shift to a remote workforce impacted businesses' ability to identify undocumented systems and vulnerabilities? Join One Trust and (ISC)2 on Thursday, July 28, 2020 at 1:00PM BST as we discuss some of the contributing factors to shadow IT, the potential impacts and risk exposure, and some best practices in protecting stakeholders across the business. We’ll also examine:

    · Key roles and responsibilities to align an effective defense in your risk management program

    · Identify processes that fuel and encourage shadow IT practices

    · Best practices to engage line of business employees to educate and promote cyber threat awareness
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Recorded: Jul 21 2020 61 mins
    Natasha Karelina, (ISC)² Customer Service Manager, EMEA
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session

    Viewing this webinar for at least 45 minutes will earn you 1 group B CPE.
  • Network Visibility in a Kubernetes Environment Recorded: Jul 14 2020 63 mins
    Ollie Sheridan, Principal Sales Engineer, Security, (EMEA); Brandon Dunlap, Moderator
    IT, cloud and security architects are responsible for addressing the following questions before they can successfully deploy applications in containers with Kubernetes-based orchestration and ensure the resultant traffic is optimally processed and distributed:

    · How can I get visibility into inter-container traffic as containers are ephemeral and constantly in-motion?
    · Can I ensure scalable visibility as deployed apps grow and can span hundreds of microservices each?

    · What if the underlying network architecture changes with a different virtual switch methodology?

    · Is there a way to automate the configured policies across thousands of containers in real-time?

    Not addressing these considerations slows down the transition to container-based applications, limits the use of datacenter automation and leaves the organization vulnerable to potential security breaches, with potential impact to reputation and brand. Join Gigamon and (ISC)2 on July 14, 2020 at 1:00PM BST for answers to these and other questions as we dive into containers and network visibility.
  • From Cost-Center to Business Enabler: How Cybersecurity is Changing Recorded: Jul 13 2020 54 mins
    Jake Olcott, VP of Government Affairs and Corporate Strategies, BitSight; Brandon Dunlap, Moderator
    These unprecedented times are ushering in a new world for security and risk professionals. Many organizations have transitioned to full-time remote work and acceleration of digital initiatives while CISOs are increasingly being asked to adapt to the speed of business and demonstrate value to the organization. How can security and risk leaders adapt to the new normal? What changes must they make to their programs? How can security enable the business to succeed — moving beyond the “cost center” mindset? Join BitSight and (ISC)2 for a discussion on the changing role of the security professional, the rise of quantitative measurement and metrics, and how you should be thinking about your program and relationships with executives in the months and years ahead.
  • ECRIME PAY$! - The New Reality of Ransomware Attacks Recorded: Jul 7 2020 61 mins
    Zeki Turedi, Technology Strategist, Crowdstrike; Brandon Dunlap (Moderator)
    There’s no question that ransomware is a growing threat. In what may be the biggest attack against a commercial business in history, ZDNet reported that a European manufacturer was forced to pay around $95 million following a ransomware attack. And in a separate incident, BBC reported a large renewable energy company lost access to 22,000 computers in 40 countries, reducing its workforce to using pen and paper until the ransomware infection was resolved. However, these attacks reflect only the public side of a much larger cybercriminal industry that is constantly innovating its capabilities. In fact, ransomware is one of the fastest-growing threats in cybersecurity, with damages predicted to crest $20 billion globally by 2021, up from “only” $345 million* in 2015. Join Crowdstrike and (ISC)2 on July 7, 2020 at 1:00PM BST as we explore:

    - The increase in state-sponsored ransomware seen within the last 12 months where focused attacks promise greater financial payoffs

    - The tactics, techniques and procedures observed by today’s ransomware attackers and how they’re getting more sophisticated

    - What you can do to stop ransomware in its tracks
  • Cyber Criminals Leave Their Fingerprints on the Internet Too Recorded: Jun 23 2020 47 mins
    Oliver Tonge, Cyber Security Consultant, DomainTools; Brandon Dunlap, Moderator
    Everyone leaves breadcrumb trails on the internet, including threat actors. In a post GDPR world, DNS intelligence and analytics become ever more valuable assets for threat hunters and analysts alike. Actionable verdicts on deceitful websites and malign infrastructure along with protective monitoring mechanisms are just a few clicks away. Join DomainTools and (ISC)2 for an examination of the DomainTools threat intelligence suite - and unparalleled data repository – that can be used to profile a network of fraudulent websites. The session will include real-world investigations with practical applications of domain and infrastructure intelligence.
  • OpenSource Security Tools for Cloud Native Environments Recorded: Jun 23 2020 61 mins
    Steve Giguere, CSSLP, Senior Solution Architect, Aqua Security; Brandon Dunlap, Moderator
    Securing production workloads used to be the responsibility of information security specialists. In a DevOps culture, security becomes part of everyone's responsibility as security shifts left of boom. Join Aqua Security and (ISC)2 on June 23, 2020 at 1:00PM BST for a discussion on the cloud native threat landscape and some recent high profile attacks. We will review how security can be embedded at every stage of the CI/CD pipeline and demonstrate opensource tools that can be used to assess the security posture of your kubernetes cluster and container images.
  • Improving the Cybersecurity Value of Your DNS and IPAM System Recorded: Jun 16 2020 61 mins
    Michael Katz, Security Sales Specialist, Infoblox; Brandon Dunlap, Moderator
    Even in 2020, many organizations overlook the DNS and IP Address Management systems in their cyber security strategy. Many DNS and IPAM systems are afterthoughts in cyber policy and relegated to unmanaged freeware. This approach misses the benefits DNS and IPAM can bring to your security practice. Join Infoblox and (ISC)2 on June 16, 2020 at 1:00PM BST for a discussion that will examine concrete ideas you can implement in your organization to maximize the cyber-benefit from DNS and IPAM services.
  • Engaging End Users in Phishing Defence – Are your Teams Combat Ready? Recorded: Jun 9 2020 60 mins
    David Mount, Sr. Dir. Sales Engineering, Cofense; Andy Spencer, VP Sales Engineering, Cofense; Brandon Dunlap (Moderator)
    As the world locks down to mitigate the risks of COVID-19, many employees are still adjusting to working from home, and companies like yours are working hard to support it. However, organizations cannot completely lock down their networks. For example, phishing emails continue to evade Secure Email Gateways, with threat actors adapting their tactics to exploit the ongoing crisis. Businesses are threatened by a surge of phish related to COVID-19 and remote work. Join Cofense and (ISC)2 on June 9, 2020 at 1:00PM BST as Cofense security experts David Mount and Andy Spencer provide an in-depth review of the current phishing threat landscape, as seen through the inboxes and eyes of those on the front line – your end users, the new face of your front-line phishing defence. Highlights will include:

    · Insights of various phishing campaigns that evaded SEGs and reached enterprise end users, delivering credential phish and malware.

    · How threat actors are using trusted services, such as online business surveys and document sharing platforms, to evade SEGs.

    · Expert predictions of what we will continue to see through the end of Q2 and the remainder of 2020.
  • Continuing the Conversation: What We’ve Learned From the COVID-19 Outbreak Recorded: May 19 2020 62 mins
    John Carnes, Erik von Geldern, Kris Rosson, Brandon Dunlap, Moderator
    On April 28, 2020, (ISC)2 hosted a diverse panel of cybersecurity professionals who discussed the impact the COVID-19 pandemic has had on their IT operations and cybersecurity teams. The first webcast, in this series, generated a great deal of interest, discussion and questions from the audience. We will continue the conversation on May 19, 2020 to tackle the questions and discussions that continue to be raised during this ongoing crisis. This second webcast will be devoted to the economic impact (budgets slashed with no revenue coming in) due to the shutdown caused by COVID-19. In addition, we’ll discuss what re-opening an office may look like and how the current situation affects individuals both physically and emotionally. Join the conversation to share your thoughts and gain insight into how your team can continue to handle this changing situation.
  • TLS1.3: Two Years On Recorded: May 19 2020 62 mins
    Ollie Sheridan, Principal Sales Engineer, Security, (EMEA) Gigamon; Brandon Dunlap, Moderator
    After being released in August 2018, what does TLS1.3 look like today and how many organisations are using it? There are many claims that TLS1.3 is the one-stop-shop solution to all encryption requirements; but is that the case? Join Gigamon and (ISC)2 on May 19, 2020 at 1:00PM BST for a discussion about organisations using TLS1.3, why they are using it and why in some situations it’s not a suitable fit for encryption requirements. We'll also explore what this means for visibility in terms of decryption and for the generation of Metadata, such as IPFIX (Internet Protocol Flow Information Export) and CEF (Common Event Format). We’ll also examine:

    - Understand how many people are using TLS1.3 and why

    - See what makes TLS1.3 different to TLS1.2 and why TLS1.3 not always the best choice

    - Understand what is required to decrypt TLS1.3 in order to present decrypted traffic to Security Countermeasures

    - How Metadata fits into TLS1.3
  • Paving a Path to a Passwordless Future Recorded: May 12 2020 60 mins
    J. Wolfgang Goerlich, Advisory CISO, Duo Security; Brandon Dunlap, Moderator
    Passwords don’t have a great reputation: between user complaints of friction adhering to complex password policies and admin complaints about how frequently lost or stolen passwords pose a risk of attack, the use of passwords have few fans With these password problems and more, it raises the question: why would we still use passwords at all? Join Duo Security and (ISC)2 on May 12, 2020 at 1:00PM BST Duo Advisory CISO J. Wolfgang Goerlich provides a walkthrough of why security leaders want to move past passwords, and the challenges of a truly universal passwordless future. The session will also show how Duo Security is supporting this initiative, both championing modern authentication standards like WebAuthn and building partnerships with industry leaders including Microsoft to reduce reliance on passwords.
  • CISO Says With Kevin Fielder, Chief Information Security Officer at Just Eat Recorded: May 5 2020 60 mins
    Kevin Fielder, CISO, Just Eat, Brandon Dunlap, Moderator, (ISC)²
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format.

    In this session Kevin Fielder, CISO at the Just Eat will provide insight into the path he took to become a Cybersecurity Leader and how he is reinventing the role in the face of accelerating change.
  • Gamechanger! What We’ve Learned (So Far) from the COVID-19 Outbreak Recorded: Apr 28 2020 62 mins
    John Carnes, Erik von Geldern, Kris Rosson, Brandon Dunlap, Moderator
    The world seemingly changed overnight. Offices and business shut down. Stay-at-home orders. A remote workforce appearing out of nowhere needing equipment and support. Cybersecurity professionals are facing challenges and situations none would have dreamed about even 90 days ago. Join (ISC)2 on Tuesday, April 28, 2020 at 1:00PM Eastern for a panel discussion examining what security practitioners are experiencing during the COVID-19 health crisis. The webcast will include results from an (ISC)2 pulse survey that asked cybersecurity professionals to share how their jobs have been impacted, issues faced securing a "work from home" workforce and more. Panelists will share the challenges they face, what lessons have been learned and the “sliver-lining” they may have discovered as they and their teams jumped into the unknown and transformed their operations in response.
  • Minimizing Security Impacts of a Growing Remote Workforce Recorded: Apr 28 2020 61 mins
    Karl Lankford, Director of Solutions Engineering, EMEIA, BeyondTrust; Brandon Dunlap, Moderator
    Many organisations are implementing remote working policies and need to quickly support an unprecedented increase in the number of remote employees. However, an expanding remote workforce can significantly increase the attack surface and has changed the threat model of organisations overnight. Many remote access options are quick to implement but are not secure and organisations are trying to navigate the challenges of quickly, but securely, operationalising their remote employees. On April 28, 2020 at 1:00PM BST, BeyondTrust and (ISC)2 will explore the risks unsecure remote access presents and discuss how the secure remote access and endpoint privilege management pillars of a PAM solution can securely and efficiently connect remote employees to corporate resources.
(ISC)² Secure Webinars - EMEA
Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² Secure Webinars - EMEA Channel. Sign up to join us for educational Security Briefings, Roundtables and eSummits aimed at all those vested in the world of information security. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber Criminals Leave Their Fingerprints on the Internet Too
  • Live at: Jun 23 2020 1:30 pm
  • Presented by: Oliver Tonge, Cyber Security Consultant, DomainTools; Brandon Dunlap, Moderator
  • From:
Your email has been sent.
or close