Hi [[ session.user.profile.firstName ]]

Balancing Security on Premise and In The Cloud

Digital transformation - we hear about it all the time, but what does it really mean for security? As organizations transition users, applications, workloads, and data from on-premise into the cloud to improve agility and competitiveness - how does that change their security landscape and threat model? And how can organizations address the challenge of protecting both legacy on-premise systems, while at the same time, also having to secure dynamic multi-cloud-based environment?

Join today's episode to learn about the reality many organizations are facing when it comes to juggling on prem and multi-cloud security, what the key differences are and how to address them for your organization. The panel will also discuss the following topics:

- What are the differences between Cloud Security vs On-Premise Security and why do they matter for organizations in 2020?
- Can we normalize our security posture across the legacy and hybrid/multi-cloud environments?
- Is it possible to improve security as part of a digital transformation program?
- What kind of cyber hygiene do we need to practice? What should be added and what can be taken off security teams' plates?
- Where does DevOps (or DevSecOps) fit into all of this?
- Are cloud security failures the customer's fault?
- What is SASE and how will it impact your organization?

This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.
Recorded Apr 22 2020 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Diana Kelley | Dominique West | Jon Garside | Dan Harding
Presentation preview: Balancing Security on Premise and In The Cloud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Career Conversations with Camille Stewart Esq Jul 30 2020 12:00 am UTC 60 mins
    Elena Steinke, Board of Directors WSC
    Join us at our next Career Conversations session. We'll discuss topics such as: what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Host: Elena Steinke, WSC Founding Board Member

    Guest: Camille Stewart

    Camille Stewart is an attorney whose cross-cutting perspective on complex technology, cyber, and national security, and foreign policy issues has landed her in significant roles at leading government and private sector companies like the Department of Homeland Security and Google. Camille is Head of Security Policy for Google Play and Android where she leads cybersecurity, provacy, election integrity, and misinformation policy efforts. Prior to Google, Camille managed cybersecurity, election security, tech innovation, and risk issues at Deloitte. Camille was appointed by President Barack Obama the Senior Policy Advisor for Cyber Infrastructure & Resilience Policy at the Department of Homeland Security. She was the Senior Manager of Legal Affairs at Cyveillance, a cybersecurity company after working on Capitol Hill.

    Camille is a Truman National Security Fellow, and Council on Foreign Relations Term Member. Camille is the co-Founder of Diversity inNatioal Security Network, on the Board of Women of Color Advancing Peace & Security and the founder of the Cybersecurity & Emerging Tech working group. She is also leading a project with a DC think tank addressing the exfiltration of sensitive technology and IP through the courts. You can find out more about Camille and her current projects at www.CamilleStewart.com and follow her on Twitter @CamilleEsq
  • Ransomware: Are Your Vulnerabilities Exposing You? Jul 22 2020 5:00 pm UTC 45 mins
    Troy Vennon, Director of Cybersecurity and Trustworthiness, Covail
    More mid-to-smaller companies are being targeted by cyber attackers with ransomware. According to a recent report, the average-sized company impacted has decreased from 2018 to about 650 employees in 2019. This trend will likely continue.

    Join Troy Vennon, who leads the Ohio security community of CISOs and security managers (ISAO), for a discussion about protecting your company with practical steps and tight budgets. Troy will discuss how knowing how vulnerable your company is to ransomware helps you better protect from it.
    You will learn from this discussion:
    + Top 3 steps your security team can take to protect your network on a budget
    + How to find, prioritize and close vulnerabilities that expose you to ransomware
    + What best practices other companies are deploying to defend their enterprise from attack
  • How Companies Are Using Data Analytics to Prioritize Cyber Spend Jul 8 2020 6:30 pm UTC 45 mins
    Jerry Caponera, VP of Products and Cyber Risk Management, Nehemiah Security
    Choosing which cybersecurity projects to implement is more challenging than ever. Cyber risk changes daily and budgets are changing too as the COVID-19 pandemic continues to unfold. Register to see why leading companies are using a data-driven approach to make better decisions about which projects to prioritize, and learn how modeling risk helps optimize cyber spend.

    Join us to learn:
    + What’s changed in how companies look at risk remediation and ROI pre- and post-COVID
    + Why the prioritization of cyber spend is more important than ever
    + How to take a data-driven approach and what data you need to get started
    + Why modeling is important and how you can do this easily (demo)
  • IT Manager's Series: Top 3 Ways to Protect from Ransomware Jul 8 2020 5:00 pm UTC 45 mins
    Troy Vennon, Director, Cybersecurity & Trustworthiness at Covail
    Join us for an informative webinar on how IT managers and small security teams can prevent ransomware from infecting their company’s networks. Ransomware on the rise and no longer focused only on large enterprise (average-sized company impacted in 2019 around 650 employees). Organizations with small security teams or that leverage their IT teams to manage security need help to protect from the growing wave of cybercrime. Here’s what to expect from our webinar on ransomware:
    - How to identify where you are exposed so you can fix your vulnerabilities
    - Why and how to segment your network and identity management programs
    - What kind of a response and recovery process you need in place
  • THREAT INTEL IN THE REAL WORLD: An Expert Roundtable Recorded: Jul 1 2020 54 mins
    Chase Cunningham, Kurtis Minder, Rick Holland, Chris Camacho, Allan Liska, John Grim
    Find out what happens…when intel analysts stop being polite…and start getting real.

    Today’s typical enterprise security team subscribes to at least four, often more, intelligence feeds, which analysts must comb through to find relevant information for operationalization. As a result, most threat intel has become “yet another tool to manage.” It’s simply not practical to expect every security organization to be able to hire threat intelligence analysts to make sense out of the feeds. Vendors need to deliver “threat-analyst-in-a-box” capabilities, so intelligence can be operationalized with minimal intervention.

    In this session, a blue-chip panel of cyber threat experts will discuss the state of current threat intel offerings, and dive into the future of this space to help you understand how it will evolve to meet the needs of enterprise security teams. They will discuss how the next generation of threat intelligence will conform to the conventions of government intelligence operations, where the right information goes to the right people and systems in the right form factor.

    Attendees will learn:

    ​Why general-purpose threat intelligence won’t cut it and how it needs to be customized to each organization’s risk profile.

    What enterprises need to do to make the market mature in this evolving industry.

    ​How to take the right approach to threat intelligence and big data.
  • Making The Leap: From An Individual Contributor to Leader in Cyber Recorded: Jun 25 2020 60 mins
    Elena Steinke, Director & Founding Board Member
    About this webinar:
    Join the Women's Society of Cyberjutsu for a conversation with our distinguished leadership professionals Margot Halstead and Sarah Moffat to explore the different strategies and tactics towards transitioning into a leadership role. This seminar will focus on the common challenges with this transition focusing on the specific tendencies and habits women encounter through this transition.

    About Margot Halstead
    Margot's work focuses on helping leaders realize their greatest potential by identifying how they are potentially getting in their own way. She has coached, written and published articles, as well as designed and delivered 100’s of team and leader development programs for and with a diverse spectrum of organizations. Margot is an engaging facilitator noting the key to her success has been the ability to relate to all members of the team, forge immediate trust and connection, and relate the goals of the team to desired business outcomes. She has developed and delivered courses, workshops, and presentations on leadership transitions, emotional intelligence, communication skills, management, mentoring, executive presence and handling difficult people.

    About Sarah Moffat
    Sarah is a talent development expert, and both an 'ideas person' and strategic initiator. Sarah’s passion is working with people, strengthening the culture of learning and leadership development, and finding new ways to engage, empower, and excite learners. When leading teams, Sarah employs transformational and servant leadership to engage them and create space for team members to build their strengths and contribute in a way that brings fulfillment and job satisfaction. Sarah has more than 15 years in talent development with a B.S. in Psychology, and is an Independent Certified Coach, Trainer, and Speaker with the John Maxwell Team.
  • Career Conversations wth Tia Hopkins Recorded: Jun 24 2020 60 mins
    Elena Steinke, Director & Founding Board Member
    Join us at our next Career Conversations session. We'll discuss topics such as: what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Host: Elena Steinke, WSC Founding Board Member

    Guest: Tia Hopkins
    As Vice President, Global Sales Engineering, Tia Hopkins is focused on leading the team in providing pre-sales engineering support.  She has held various technology roles, including Senior Solutions Architect and Director of IT Services at services organizations.  She is an adjunct Professor for Yeshiva University’s Cybersecurity Masters program, and a Career Mentor for Cybrary and Built by Girls. Tia is also an SC Media Reboot Leadership Award recipient for 2019 in the Outstanding Educator category.

    Tia is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (C|EH) and Certified Hacking Forensics Investigator (C|HFI). She also holds a BS in Information Technology, MS in Information Security and Assurance and MS in Cybersecurity and Information Assurance, and plans to continue her education in pursuit of an MBA in IT Management.
  • A day in the life of - A Cyber Systems Engineer Recorded: Jun 24 2020 58 mins
    Connie Blaney
    Ever wondered what the job of a Cyber Systems Engineer does? Join me as I chat with Katia Dean to discuss what the day to day is of this cyber role.

    Katia Dean is a public speaker, cybersecurity professional, career coach, and mentor. She holds an M.S in Cyber Security Technology and a B.S in Electronic Engineering. Ms. Dean’s professional experience involves working with various DoD military programs to strengthen and shape their approach to cybersecurity. Her insight and professional expertise quickly led to her becoming a trusted voice in the cybersecurity community.
    She has secured partnerships with top influencers with Blacks In Cybersecurity and Master I.T . During an unexpected stint of unemployment (2018), she felt encouraged to share her story via blogging. The positive response inspired her to launch Katia’s CyLife – a resource for cyber professionals, offering career coaching services.
    In addition to her cybersecurity endeavors, Ms. Dean is also a proud pet parent to Buster!

    She recently authored her 1st Ebook called The Struggle is Real A Blueprint to Excelling Into the Cybersecurity Discipline.

    Katia Dean takes you on a journey through the struggle of finding employment again during a layoff and government shutdown. After the struggle, the readers will know, that everyone goes through the same struggles but just in different paths. The valuable information she shares in this book will get you on the right track to start your career in cybersecurity.

    Follow
    #voiceofcyberpros
    Buy Now https://katiascylife.tech/book/
    Subscribe to YouTube Channel Katias Cylife
    Setup All Services on website https://katiascylife.tech/ services
    Enroll Now at https://katiascylife.tech/courses
  • A day in the life of a...Cloud Security Engineer Recorded: Jun 18 2020 63 mins
    Connie Blaney
    Have you ever wanted to know what is involved in a particular Cybersecurity role? If yes then join us at the WSC for a conversation with a Cloud security engineer!

    Host: Connie Blaney

    Guest: Dominique West

    Dominique West is a current Senior Cloud Security Consultant based in Atlanta, GA. She has 8 years of experience in Information Technology, 5 of which are in cybersecurity with her experience spanning over risk assessments, vulnerability assessments, incident and response, and cloud transformation & security across the commercial industries. A Certified Information Systems Security Professional (CISSP), Dominique holds a variety of technical certifications as well as a Master’s Degree in Cybersecurity from the University of Dallas. Dominique is also the chapter lead for various women-focused non-profit and volunteer organizations, notably The Women’s Society of Cyberjutsu, as well as the creator of SecurityinColor.com, a cybersecurity podcast & blog, that provides weekly industry news and professional guidance to those aiming to navigate a career in cybersecurity.
  • ISSA Thought Leadership Series: BEC Attacks - Who's Impersonating Whom? Recorded: Jun 17 2020 60 mins
    Effie Tsiopras Senior Information Security Engineer; Ryan Witt Managing Director, Healthcare Industry Practice
    The 2019 HMSS Cybersecurity Survey indicated that email is the initial point of compromise for healthcare cyber-attacks, with Business Email Compromise (BEC) becoming the favored tactic by cybercriminals. Because BEC emails do not carry malicious payload and are narrowly targeted, it’s difficult for health institutions to detect these attacks. With overall losses of more than $1.7 billion in 2019, BEC attacks are quickly becoming a significant headache for healthcare CISOs. Join us for a deep dive into the dos and don’ts when it comes to BEC, and best practices to mitigate against risk of this vital attack vector.
  • How the Next Normal will require an Updated Cyber Strategy Recorded: Jun 10 2020 51 mins
    ISSA International
    As organizations begin to embrace some degree of change coming out of recent global events, it is hard for business and security professionals to determine what the impact to their security strategy will be. Leaders also have to evaluate which “quick-fixes” came with too much risk, and what changes to the strategy to secure internet-facing perimeter are required. In this talk, Advisory CISO at Akamai, Steve Winterfeld and Director of Technology & Security Strategy, also at Akamai, Tony Lauro will review some of the issues that need to be addressed as we establish a new baseline for both our employees and customers that will protect operations based on new business models.
  • How 2020 Changed Cyber Risk Management Recorded: Jun 4 2020 44 mins
    Jerry Caponera, VP Cyber Risk Strategy
    Almost overnight COVID-19 upended everyday life as we knew it. A risk that we didn’t even know we faced took center stage both personally and professionally. In this webinar, learn how businesses’ approach to cyber risk management changed in 2020, including:
    - What’s driving cyber risk mitigation decisions today—and what’s very different than it was on January 1
    - Important factors to consider when re-prioritizing your cyber mitigation initiatives
    - Factoring in systemic or cascading risk to measure cyber risk across an entire company portfolio
    - Innovative ways to manage and communicate risk
  • How to Self Promote w/ Nada Lena Nasserdeen Recorded: Jun 3 2020 49 mins
    Women's Society of Cyberjutsu
    Join the Women's Society of Cyberjutsu for an afternoon with Nada Nasserdeen,MA Founder of Rise Up For You, Motivational Speaker, Educator and Onstage Performance Coach. This webinar we will explore How to Self Promote anything that you do. As women we tend to view self promotion as bragging and this isn't always the case. So here is your opportunity to learn self promotion and how it can benefit you in the long run!

    Men and women around the world have expressed their frustrations and struggles as they climb the career ladder and achieve next-level results in their business. The truth is, if you want to grow your career and business you must be able to SELL YOUR BUSINESS AND SUCCESSES!

    With years of coaching men and women on career confidence and leadership strategies, the Rise Up For You Team has recognized the top four challenges for professionals. Do these sound familiar?

    Self-Promotion - Struggling with the idea of advocating for and asserting yourself when needed for work promotions, networking, and new opportunities

    Climbing the Career Ladder - Feeling unsure how to climb the ladder and get to the next step in your career—often accompanied by feelings of being unseen and unheard

    Taking Risks - Finding it difficult to take risks at appropriate times, missing out on advances for yourself and your business.

    Imposter Syndrome - Not feeling good enough or afraid that you don't bring enough value to the table.
  • ISSA Thought Leadership Series: CCPA Enforcement: What to Expect after July 1st Recorded: Jun 3 2020 61 mins
    ISSA International
    Signed into law on June 28, 2018, the California Consumer Privacy Act (CCPA) became effective on January 1, 2020. The next milestone will be on July 1, 2020, when the California Attorney General will begin enforcement for the CCPA. Non-compliance can result in the maximum fine of $7,500 per violation. When you consider how many consumer records you hold, the potential fines could stack up quickly if you don't take CCPA seriously. Since July 1st has yet to come, we still don’t know how enforcement will play out for companies, but the Attorney General has established a firm stance on compliance, and there are several indicators of his intent to firmly enforce. In this webinar we’ll cover the key indicators of enforcement and what you can do to prepare. We’ll also review the final version of the modified CCPA regulations.

    Speaker: Dan Clarke, President – IntraEdge

    Speaker: Dominique Shelton Leipzig, Partner Privacy & Security- Perkins Coie LLP
  • Career Conversation with Angela Rittenbach Recorded: May 28 2020 60 mins
    Elena Steinke WSC Founding Board Member
    Join us at our next Career Conversations session. We'll discuss topics such as: what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Host: Elena Steinke, WSC Founding Board Member

    Guest: Angela Rittenbach

    Angela Rittenbach is the President and CEO of Riverstone Solutions, Inc., an information management and security company located in Huntsville, AL. Riverstone Solutions provides professional services to industry and government agencies, in Enterprise IT solutions including data management, secure cloud services and advanced analytics, Software Engineering and Management Consulting services. The company is a Woman Owned Small Business (WOSB) and Historically Underutilized Business Zone (HUBZone) company.

    Angela is also the President and Founder of CyberReach.Org, a 501(c)3 non-profit organization headquartered in Huntsville, AL. Angela is a long-time advocate for Women in Technology and STEM programs. The mission of CyberReach is to Connect, Prepare and Grow a Qualified and Diverse Cyber Workforce.

    Prior to founding Riverstone Solutions, Angela worked in various industry positions such as system, network and database administration, software engineering, system engineering, database development and program management. Angela received her Bachelor of Science degree in Computer Science from Clemson University.
  • A day in the life of a Senior Information Security Officer Recorded: May 28 2020 62 mins
    Connie Blaney
    Ever wanted to know what certain roles in cyber security do on a daily basis? Would like to know more behind the titles? Join the webinar series 'A day in the life of' to find out more information.

    This month we speak to Katoria Henry as we dig deeper into what it looks like in the role of a Senior Information Security Officer. She is a proven security professional and leader of ISSO teams and programs within Federal and Cloud Service environments, specializing in Enterprise Risk Management, Cloud Security, and Cyber Security Governance. SME-level expertise on the application of FedRAMP, RMF, PCI-DSS, and the CSF. Katoria’s current role as the Senior Information Systems Security Officer is responsible for enhancing multiple information security programs across various Federal agencies, communicating and advising on cloud migration strategies and adoption, serving as the lead ISSO on an Enterprise-Wide SIEM tool migration (Splunk) project, and documenting complex considerations in application security requirements, contracts, risk assessments, and project plans
  • Forecasting Cyber Threats Post Pandemic Recorded: May 27 2020 45 mins
    Richard Stiennon, Kurtis Minder, Jessica Gulick
    The world has changed, and so has your threat landscape. Join us for a discussion on how cyber attacks have pivoted their tactics and targets. From the latest on phishing kits to video threats, our experts will explore how changes in motives and targets is disrupting and increasing our threat landscape. Learn how to reframe your understanding of your threat profile and better defend and respond to these attacks.

    Our featured experts for this webinar include Richard Stiennon, chief research analyst at IT-Harvest and Kurtis Minder, CEO of GroupSense, GroupSense is a digital risk management company that delivers customer-specific intelligence.
    Here’s What Will Be Discussed:

    1) Threat actors are adapting their tactics and targets
    2) Changes in motives and targets are disrupting and expanding the threat landscape
    3) Understanding your threat profile to create a better cyber defense strategy.
  • ISSA Thought Leadership Series: Threat Reports Undone Recorded: May 26 2020 116 mins
    ISSA International
    It's everyone's favorite time of year. What will we learn from this year's breach reports? Join us as we review the latest data, look for lessons and trends, and help you understand what it all means. Our panel of experts will focus on how security professionals can learn from the data, and hopefully avoid becoming a statistic for next year's report.
  • Cyber-Chatter - Fireside with CISO/Executive Panel Recorded: May 19 2020 60 mins
    Elena Steinke, WSC Director & Founding Board Member
    This delegation of experts brings you three of industry's top Cybersecurity leaders. Their experience will shed insight to the current security landscape, challenges, and its role within the organization.

    Panel Experts:
    Dr. Crystal Williams, Senior Cyber Executive: Her professional career in the IT field begun when she enlisted in the U.S. Marine Corps. She’s the CEO of Infinite Innovations, LLC, serving a DoD organization, the SE Regional Director for the WSC, and an Adjunct Professor at 3 universities. With over 30 years specializing in IA/IS, regulatory, programming, policy, acquisition, C&A, CND, and risk management.

    Amelie E. Koran, Technology Therapist: The Sr. Technology Advocate for Splunk, she served as the Deputy CIO and the CTO for the HHS-OIG. Her path took her through multiple industry sectors, with experiences at The Walt Disney Company, Carnegie Mellon University’s CERT/CC, Mandiant, The World Bank, Constellation Energy and The American Chemical Society. She began in public sector as Lead Enterprise Security Architect for the DoI, moving to lead CDM implementation for the DoT. She served on a leadership development rotation as part of the President’s Management Council Fellowship serving the Federal CIO in supporting cybersecurity policy analysis and legislative review, where she took an active role in the government-wide Open Data Initiative, helping give “birth” to the U.S. Digital Service.

    Victor 'Vic' Molloy, Cybersecurity Ambassador: An Independent Consultant working with the CyberTexas Foundation as the General Manager. He is a small business owner. He has over 20 years of specialized experience as senior and executive leader in IT programs with Air Force, DoD Major Commands, commercial financial services and civilian defense contractor industry. Provided expert technical advice and guidance with senior leadership on appropriate application of technology to meet current and future mission requirements to defend against Cyber threats.
  • A day in the life of a - Cybersecurity SOC Analyst Recorded: Apr 30 2020 61 mins
    Connie Blaney
    Have you ever wanted to know what is involved in a particular Cybersecurity role? If yes then join us at the WSC for a conversation with a Cybersecurity SOC analyst


    Host: Connie Blaney

    Guest: Afton Bell


    The Unconventional Approach Afton Bell is a Cybersecurity Analyst located in Austin, TX. Her path to cybersecurity was a bit unconventional but she’s always had a passion for security. Afton was born and raised in East Orange, NJ. She started flying single-engine aircraft at the age of 12, only a few months before the tragic events of 9/11. She saw the change of the aviation world as they started to enhance security measures across the country’s airports. In 2011, she earned 2 undergraduate degrees in Aviation Technology from Purdue University in West Lafayette, IN. After graduation, Afton followed her drive for security with a focus in IT and earned a Master of Professional Studies in Homeland Security from Penn State University in 2014. In 2017, Afton decided to shift from working in physical security management and earned multiple CompTIA certs to pursue her dream career of cybersecurity. She began working as a Configuration Lab Technician in Chicago to gain valuable experience before moving to Austin, TX for an analyst position. She recently started working as a Cybersecurity Security Operations Center Analyst for a large government entity with a focus in SIEM as of February 2020. Afton often volunteers to mentor young women interested in STEM during events in Austin and is very eager to continue to grow and evolve in such an exciting industry.
WSC is helping women in cybersecurity reach their career goals
The Women’s Society of Cyberjutsu (WSC) is a non-profit, 501c(3) organization passionate about helping and empowering women to succeed in the cybersecurity field.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Balancing Security on Premise and In The Cloud
  • Live at: Apr 22 2020 4:00 pm
  • Presented by: Diana Kelley | Dominique West | Jon Garside | Dan Harding
  • From:
Your email has been sent.
or close