Hi [[ session.user.profile.firstName ]]

What Your Security Team Needs to Know about GDPR

The scope of the 435 pages of the EU’s General Data Protection Regulation (GDPR) is vast and has raised the specter of excessive, unforeseen and unintended compliance consequences for companies around the world. In order to ensure individual privacy in the digital realm, there are numerous enterprise security requirements imposed by these regulations with significant compliance concerns, notification requirements and the potential for excessive penalties for non-compliance. Join Interfocus Technologies and security expert Richard Stiennon from IT-Harvest for an overview of GDPR’s implications on your security practices from a people, process and technology point of view. We will review the requirements for and processes to secure your endpoints, monitor and report on malicious user activity, and identify and trace where personal data resides in your network.
Recorded Sep 12 2018 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Richard Stiennon from IT-Harvest & Interfocus Technologies
Presentation preview: What Your Security Team Needs to Know about GDPR

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Career Conversations with Stephanie Ihezukwu Nov 22 2019 12:00 am UTC 60 mins
    Jessica Gulick, WSC VP
    Join us at our next Career Conversations session on Nov 21st 2019 @7pm EST. Discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Stephanie I. WoSec Leader and Podcast Host

    Hosted by Jessica Gulick, MBA | PMP | CISSP

    In her day job, InfoSteph serves as a regional information security analyst. Outside of work, however, InfoSteph has filled her life with all kinds of cool activities. She serves as a Lead for WoSEC Houston and a Lead for WISP DEFCON 2019. She has also started speaking at conferences this year. She co-hosts a “happy hour” inspired podcast called Coolest Nerds in the Room, where conversation surrounding the lives of tech people are nurtured. She attends school full time, hoping to obtain her Bachelor’s by the end of the spring. She had the honor of being a delegate for Security Field Day 2. She writes blog posts on her website, StephAndSec.com, which is also her side business. And she is working on a course for LinkedIn Learning on Social Engineering and Security Awareness. Stephanie recognizes those that inspired her or helped her get to where she is today and hopes that everything she does moving forward does the same for others.

    Follow Steph on Twitter and LinkedIn, or visit her online at StephAndSec.com.
  • Introduction to OSINT with Tracy Z Maleeff Nov 21 2019 2:00 am UTC 60 mins
    Tracy Z Maleeff
    Are you new to this concept of Open Source Intelligence (OSINT) research? Join Tracy Z Maleeff in this introductory session. Maybe you have already been doing this type of research and didn't even realize it! Learn the fundamentals and basic tips to get you started on digging into all the data that surrounds us. This 1-hr webinar will give you a basic foundation on getting started to becoming an OSINT ace!

    Tracy Z. Maleeff (@InfoSecSherpa) has a Master of Library and Information Science degree and works as an Information Security Analyst for The New York Times Company. She has given many presentations about OSINT research and data investigation as a librarian and now as an InfoSec professional.
  • 7 Tips for Marketing Cybersecurity Solutions Recorded: Oct 29 2019 62 mins
    Jessica Gulick, CEO, and Monica Ricci, VP of Marketing, Katzcy
    Join Jessica Gulick, tech & cybersecurity growth hacker, as she shares the top lessons that have not only been learned, but have been put into practice by Katzcy’s growth-stage clients. We’ll talk about the importance of understanding buyer profiles, the techno-buzz trap, the right time for geek-speak, and how to build a narrative that positions your unique solution in the right box in the minds of buyers, industry analysts, and influencers alike.
  • Getting Inside Insider Threats: Response and Mitigation Recorded: Oct 23 2019 49 mins
    Ryan Lai, EVP of Professional Services, Nisos
    Insider threats can wreck your network, your business, and your company's reputation. But stopping malicious or simply incompetent insiders from doing damage isn't just an exercise in analyzing where the damage came from. Insider Threats aren’t just malicious employees. They can run the gamut from incompetent to accidental to theft. Join Ryan Lai, EVP of Professional Services at Nisos, as he discusses the wide-ranging complexities of an insider threat investigation.
  • Sharing Cyber Threat Information: Why, When and How? Recorded: Oct 22 2019 59 mins
    Troy Vennon, Director of Security Innovation, the Columbus Collaboratory
    It’s been 20+ years since the US government first issued a directive mandating that critical infrastructure providers in the public and private sectors share information about cyber threats. This directive, PDD63, recognized that, in the face of increasing threats, organizations that band together to share information and coordinate responses stand a better chance of protecting themselves. Thus, the realm of threat intelligence sharing was created. Join Troy Vennon, Director of Security Innovation at Columbus Collaboratory, as he reviews the basics of sharing threat intelligence and how it can benefit an organization of any size in any industry.
  • Career Conversation with Keirsten Brager Recorded: Oct 17 2019 58 mins
    Mansi Thakar, WSC COO
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest:Keirsten Brager M.S. Cybersecurity | CISSP| CASP

    Hosted by Mansi Thakar M.S. Cybersecurity Ops & Leadership

    Keirsten Brager is a Lead Security Engineer at a Fortune 500 power utility company,@tribeofhackers contributor, and was one of Dark Reading’s 2018 top women in security quietlychanging the game. She is also the author Secure The InfoSec Bag: Six Figure Career Guide for Women in Security. She produced this resource to help women strategically plan their careers,diversify their incomes, and fire bad bosses. Keirsten holds a M.S. in Cybersecurity and severalindustry certifications, including Splunk, CISSP and CASP. As an active member of the Houston security community, Mrs. Brager has participated in a number of panels and public speaking engagements promoting strategies for success. In her free time, she loves blogging, cheering for her beloved Saints team, and convincing women not to quit the industry.
  • What’s Your Organization’s Exposure on the Dark Web? Recorded: Oct 17 2019 58 mins
    Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management, Terbium Labs
    A thriving fraud economy exists in the criminal underground, on the Dark Web and beyond, that trades in compromised information. Even if it’s not your business’s information, it’s still your problem because stolen user credentials are used for large-scale phishing attacks, credential stuffing, and account takeover. Join two Terbium Labs VPs—Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management—as they offer insights into how your organization should rethink data security as more information is exposed, and re-exposed, every day.
  • No Geek-Speak Allowed: The Financial View of Cyber Risk Recorded: Oct 15 2019 50 mins
    Jerry Caponera, VP of Products & Cyber Risk, Nehemiah Security
    Join us for this webinar to explore how cyber risk models have evolved to more accurately predict financial outcomes through better alignment with frameworks and models like NIST and MITRE ATT&CK. Jerry Caponera, VP of Products and Cyber Risk at Nehemiah Security, will share insights from global cybersecurity leaders who have risen above cyber geek talk and successfully translated risk into business terms. He will cover managing risk by tracking associated potential financial losses; what’s behind the hype surrounding financial data risk assessment (FinDRA); how to calculate ROI for security and mitigation investments; and how to brief your Board on cyber risk in financial terms.
  • #LevelUp: Move Your Career Forward in 2020 Recorded: Oct 10 2019 61 mins
    Lisa Jiggets/WSC; Marcelle Lee/Fractal Security; Jessica Gulick/Katzcy; Kristin Demoranville/Sony
    Do you know your cyberjutsu tribe? There a many ways your tribe can help you take stock and advance your career. Join us for this webinar where a panel of cybersecurity professionals will discuss tools available for exploring opportunities for job advancement, from education and training and certifications to networking and mentorships. Moderated by Mansi Thakar from the Women's Society of Cyberjutsu (WSC), the group will provide tips for identifying and engaging with your cyberjutsu tribe.
  • How a Trusted Employee Becomes a Business Risk Recorded: Oct 9 2019 52 mins
    Tom Miller, CEO, ClearForce
    Behind professional exteriors, many employees struggle with personal and financial pressures and workplace stress. The implications of employee stress to your business extend well beyond human resource concerns. Join Tom Miller, CEO of ClearForce, for this webinar discussing how employee stress leads to inadvertent errors, financial risks, disengagement, harassment, and in extreme cases, insider threats and criminal activity in the workplace. Tom will discuss how to discover and understand employee behavioral cycles so that you can take action to improve workplace safety, the productivity of both your workers and your business, and defend against insider threats.
  • In Defense of Small Business: Threat Strategies That Work Recorded: Oct 3 2019 49 mins
    Vince Crisler, CEO of DarkCubed
    Small and medium-sized businesses (SMBs) regularly struggle to get attention in a marketplace crowded with larger, noisier competitors, but this is certainly not the case when it comes to cyber attacks. As large enterprises continue to invest dollars and resources into their security programs, malicious actors have turned their attention to small, less protected companies. And for an SMB, the traditional approach to threat intelligence—knowing where the next attack is coming from before it hits—is simply too costly, too technical, and too complicated. Join Vince Crisler, CEO of Dark Cubed, for a discussion about what SMBs need: cost-effective solutions for threat intelligence that are automated, powered by machine learning, and provide insights through user-friendly dashboards that the business can understand.
  • #CyberIsASport: A Recap of the Wicked6 Cyber Games Recorded: Oct 2 2019 60 mins
    Jessica Gulick, CEO Katzcy; Monica Ricci, Director Wicked6 Cyber Games; Mari Galloway, CEO Women’s Society of Cyberjutsu
    On August 8 in Las Vegas, the world of cybersecurity competitions met the world of eSports and everything changed. The inaugural Wicked6 Cyber Games, a fundraiser hosted by the Women’s Society of Cyberjutsu, brought some of the top collegiate cyber teams to compete onstage in the HyperX Esports Arena. Join us for this recap of the event where we will share audience and participant reactions and key lessons, how the gamification of cybersecurity can increase diversity in the workforce, and how the abilities that competitors exhibit in cyber games can be quantified and mapped to critical skills that corporations seek when filling IT security roles.
  • Career Conversations w/ Katy Huneycutt, Information Security Consultant Recorded: Sep 19 2019 48 mins
    Jessica Gulick, CEO, Katzcy, LLC; Vice President of the Women's Society of Cyberjutsu
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Katy Huneycutt, B.S. Major: Software & Information Systems – Minors: Criminal Justice
  • Managing Your Organization's Cyber Risk as a Service Recorded: Aug 29 2019 56 mins
    Troy Vennon, Director of Security Innovation, the Columbus Collaboratory
    Join us for this webinar that will demonstrate how your organization can adopt best practices for vulnerability management, threat intelligence and cyber risk management that previously had been beyond your means. For various reasons - tight budgets, lack of skills or resources, or a focus on other priorities - most companies perform vulnerability, threat and risk management in a very tactical way. Join Troy Vennon, Director of Security Innovation at the Columbus Collaboratory, for this session outlining how the combination of cloud-based vulnerability management, threat analysis and risk assessment, bundled with expert reporting and guidance for your specific IT environment, will cost-effectively transform your security operations from the tactical to the strategic.
  • Why Join an ISAO? The Network Effects of Threat Intelligence Sharing Recorded: Aug 27 2019 58 mins
    Troy Vennon, Director of Security Innovation, the Columbus Collaboratory
    Join us for this webinar presenting the benefits of networking with your industry peers to share intelligence about threats and vulnerabilities. In today's environment where the threats seem to intensify, it's critical to know who to trust. During this session, Troy Vennon, Director of Security Innovation at the Columbus Collaboratory, will outline the benefits of an Information Sharing and Analysis Organization (ISAO), explain how you can benefit from joining an ISAO even if you're already part of an ISAC, and provide an example of how collaboration around cyber threat data can enable your organization to efficiently identify and neutralize the most prolific and potentially harmful threats out there.
  • Cybercrime’s Innovation Machine Recorded: Aug 6 2019 25 mins
    Hardik Modi, Senior Director, Threat Intelligence, NETSCOUT & Jessica Gulick, CEO, Katzcy & VP, Women's Society of Cyberjutsu
    It’s hard to express the scale of today’s cyber threat landscape, let alone its global impact. We can tell you that there were nearly four million DDoS attacks around the world in the last six months, and that attack frequency grew by 39 percent. Or that the NETSCOUT ASERT team saw 20,000 unique samples per month from just one family of IoT malware. Or even that it can take only five days from the discovery of a new attack vector to the availability of tools for the script-kiddie designed to exploit that vulnerability.

    These numbers, while startling, don’t fully convey the impact of that steady drumbeat of new threats. Cybercrime has entered the mainstream of our culture to an unprecedented extent, and it is here to stay.

    Join this video interview live from Las Vegas during Black Hat to learn more about:
    - The big trends in DDoS
    - New attack vectors found in the past six months and what this means for device and software security
    - What enterprises can do to protect themselves
  • Thrill of the Hunt: My Leap into Bug Bounties Recorded: Jun 8 2019 31 mins
    Jasmine Jackson, Bug bounty hunter and cool nerd
    Bug bounty hunter and cool nerd, Jasmine Jackson will kick off our newest webinar series #SheSpeaksTech with a short talk on " Thrill of the Hunt: My Leap into Bug Bounties.

    Join this webinar series for a quick starter talk with women in cybersecurity. Each webinar will explore a new tech topic by a newbie speaker. She will deliver the first 20 minutes of her 1 hour talk and open to feedback on topic, delivery and tips. Check out (https://womenscyberjutsu.org/page/SHESPEAKSTECH) for more on SheSpeakTech or to register for your 30 minutes to shine.
  • Cloud Computing and Cloud Security Recorded: May 18 2019 53 mins
    Sapna Singh, cyber SME and advocate for women in cyber
    Join WSC and Sapna Singh, May 18th at 11 AM EST for a discussion on Cloud Computing and Cloud Security. Hear from cyber professional and advocated for women in cyber in the Middle East as she Dives into what the cloud is and how it works. After which she gets into AWS and breaks down a few of the major areas of the platform.

    This is a primer for our hands-on cloud workshop to be hosted later in the year!
  • 2019 Verizon Data Breach Investigations Report - All Women Panel Discussion Recorded: May 8 2019 63 mins
    Mary Beth Borgwing, founder of Cyber Social Club and Uniting Women in Cyber
    The 2019 Verizon Data Breach Investigations Report, now in its twelfth year, is an industry benchmark for information on cybersecurity threats and vulnerabilities. Each year this report looks at tens of thousands of security incidents and confirmed breaches. Join our all-women panel of experts for the first look at some of the key findings of the 2019 report to understand and what it all means.
  • SANS Extends High School Girls and College Student Cyber Training Programs Recorded: May 1 2019 26 mins
    Mandy Galante, SANS CyberStart Program Director
    Don't miss this informative webinar hosted by WSC and featuring Mandy Galante is the CyberStart Program Director for the SANS Institute. Mandy will share vital information about CyberStart Program, for high school girls, and Cyber FastTrack for college students.

    Both programs are 100% scholarshiped for students and open for registeration in April 2019.
WSC is helping women in cybersecurity reach their career goals
The Women’s Society of Cyberjutsu (WSC) is a non-profit, 501c(3) organization passionate about helping and empowering women to succeed in the cybersecurity field.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: What Your Security Team Needs to Know about GDPR
  • Live at: Sep 12 2018 5:00 pm
  • Presented by: Richard Stiennon from IT-Harvest & Interfocus Technologies
  • From:
Your email has been sent.
or close