Hi [[ session.user.profile.firstName ]]

A day in the life of a - Cyber Threat Analyst

Have you ever wanted to know what is involved in a particular Cybersecurity role? If yes then join us at the WSC for a conversation with a Cyber Threat intelligence analyst

Host: Connie Blaney

Guest: Rikki George
Rikki George is the Cyber Threat Intelligence thought leader responsible for Financial Services, Retail & Hospitality cyber threat expertise and strategic level analysis at iDefense, part of Accenture Security’s Cyber Defense practice. Rikki produces industry-focused content that educates senior decisionmakers on the current and emerging threats that affect the resilience of various critical infrastructure sectors. Rikki earned her B.A. in Communications summa cum laude from Drexel University, completing capstone research on social media-enabled cybercrime. She hold a number of industry certifications, completed the selective Pre-Law program at the University of Pennsylvania and Cybersecurity program at the Washington Center in D.C. In 2019, Rikki was selected as a Rising Star Award finalist for the Women in IT Awards - Silicon Valley
Recorded Mar 26 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Connie Blaney
Presentation preview: A day in the life of a - Cyber Threat Analyst

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Zero Trust for the New Normal Jun 16 2021 4:00 pm UTC 60 mins
    Diana Kelley, SecurityCurve | Mari Galloway, Women's Society of Cyberjutsu | Jonathan Nguyen Duy, Fortinet
    Working remotely has become the new normal. This, and many other changes organizations adopted last year in response to the pandemic are likely to stay for the long term. According to Gallup, about two-thirds of U.S. remote workers want to continue to work remotely. So, how can organizations continue to support their growing distributed workforce at a time where reports of security threats have increased by 400% compared to pre-pandemic levels? 

    Here is where the zero-trust approach to security comes into play. 

    Join this month's episode of The (Security) Balancing Act with Diana Kelley and guests as they discuss the emergence of zero trust (“Trust Nothing, Verify Everything”) and what it helps achieve for enterprises in the age of cloud and remote work.

    Viewers will learn about:
    - The evolution of the security perimeter and the shift to zero trust
    - Why zero trust is an approach and not a product
    - Zero Trust Network Access (ZTA) vs. corporate VPN
    - Real-world stories and practical hands-on guidance from people who have deployed a ZTA

    Speakers:
    - Mari Galloway, CEO, Women's Society of Cyberjutsu
    - Jonathan Nguyen Duy, Vice President, Global Field CISO Team, Fortinet
    - Other Panellist TBA

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Announcing the US Cyber Games: Info Session May 18 2021 3:00 pm UTC 45 mins
    Jessica Gulick, US Cyber Games, David Raymond US Cyber Range, and Danielle Santos NIST NICE
    Join us for this informative webinar about an exciting new program - the US Cyber Games! We are bringing together talented cybersecurity athletes, coaches, and industry leaders to create the US Cyber Games.
    It all begins in May with a free US Cyber Open Summit and Capture-the-flag event. In July, the best competitors will be invited to take part in the US Cyber Combine. From here, we will select the Official US Cyber Team to represent the United States at the International Cyber Security Challenge (ICSC). Don’t miss our informational webinar about this fascinating program.
  • In Northern Virginia? Interested in a cyber career? Launch your career today Recorded: May 5 2021 16 mins
    Maureen Shrewsbury, Cyber Workforce Development Programs at SANS Institute
    Join us for a brief information session about the Virginia Cyber Skills Academies (vacyb erskills.com), providing world-class cyber training programs for candidates with no IT Experience and those currently in the cyber industry. Sponsored by the state of Virginia, the program is free to qualified applicants residing in Northern VA.
  • Why women make great Chief Information Security Officers? Recorded: Apr 14 2021 38 mins
    Mari Galloway, CEO of WSC and Dr. Eric Cole, Founder and Director of Secure Anchor
    Leaning forward into her career as a Cyber Leader

    What does it take to be a successful CISO?
    How to create YOUR career path to leadership?
    Education, experience, networking, and certification - what's best when resources and time are limited
    Why women, in particular, do well at the top
  • Digitally Evolving Credit Unions: A Business Case for Evolving Member Experience Recorded: Apr 14 2021 42 mins
    Elizabeth Kaspern, SVP at TruMark Financial Credit Union, Jay Levin, CRO at Relay Network & Karen Diamond, pureIntegration
    Today’s credit union members expect a consistent, personalized experience—no matter how or where they interact with you: in person, by telephone, through a smartphone application, or on your website. Join us to hear from industry leaders who will break down what it really means to evolve the member experience, how to plan your member’s digital journey, and how small changes make a big difference.
  • Digitally Evolving Credit Unions: A Business Case for Automation Recorded: Mar 25 2021 28 mins
    Ashwin Krishnamurthi, Large credit union and Karen Diamond, pureIntegration
    Credit unions that seek digital solutions to improve overall operating efficiency and member satisfaction will hear how a large credit union successfully implemented process automation to achieve significant business goals. We will discuss the lessons learned, as well as best and worst decisions made along the way. Join Ashwin Krishnamurthi, a Process and Automation Expert at a large credit union and Karen Diamond, VP of Enterprise Accounts at pureIntegration for this fascinating discussion.
  • Transitioning from Individual Contributor to Manager Recorded: Mar 18 2021 60 mins
    Mari Galloway
    Join us as we speak with Supriya Mazumdar from GreyNoise Intelligence as we talk about the transition from being an individual contributor to a Manager.
  • Social Identity, Leadership & Womankind Recorded: Mar 4 2021 55 mins
    Dr. Crystal Williams
    We will explore social identity and how it guides one to develop “sense of self”. We will focus on avoiding the destructive characteristics of stereotyping and misinformation that may affect one’s leadership capabilities, create challenges, and lead to unethical behavior. We will learn that using one’s social Identity to develop a sense of self is a better choice than falling victim to other’s perceptions.
  • Are Your Vendors a Threat to Your Business? Recorded: Feb 11 2021 66 mins
    Troy Vennon, Director, Cybersecurity & Trustworthiness, Covail
    Your vendors present a real operational risk to your business in 2021. The pandemic drove major shifts in not only how your business operates and partners, but also how your suppliers operate and partner. These systemic changes left unchecked can leave your business at significant risk to real cybersecurity threats.

    Join Troy Vennon, Director of Cybersecurity and Trustworthiness at Covail, for a quick session on:
    1. The 2021 outlook on supply chain risk and threats
    2. How MITRE ATT&CK can help prioritize threats and risks
    3. Practical, actionable steps to get you on the right path to managing third-party risk with confidence
  • Revamp Your Supply Chain Risk Strategy Recorded: Feb 4 2021 46 mins
    Brandon Ritze, Security Assessment Specialist, Covail
    Supply Chain Risk Management doesn’t need to be complex or resource intensive. A well-designed approach to your risk strategy can save you time, money, and headache.

    In this webinar, Security Assessment Specialist Brandon Ritze will share:
    1. The key building blocks to an effective risk strategy
    2. Common pitfalls organizations make that should be avoided
    3. Practical, actionable steps to get you on the right path to managing third-party risk with confidence
  • A Day in the Life of...a Pentester Recorded: Jan 29 2021 66 mins
    Connie Blaney
    Have you ever wanted to learn more about what it is like to be a Pentester? Join us as we chat with Gabrielle Botbol, an award winning blogger about what the day to day life of a Pentester looks like.
  • Career Conversations with Kerstin Zell Recorded: Jan 28 2021 60 mins
    Elena Steinke, WSC Founding Board member
    Career Conversations is a focused chat with female leaders within Cybersecurity. Come join us as Elena Steinke chats with Kerstin Zell about her career, how she grew to be the leader she is and overcame challenges faced within the field.

    Kerstin’s skillset is founded on business process, operational effectiveness, strategic planning, communication, and change leadership tying together planning, people, process, technology and risk in a unique way. In her 20 year career, Kerstin has led high exposure, multi-million-dollar, cross-functional, change and transformational efforts and has background in heading up technology implementations and improvement efforts – from refining Supply Chain software, evangelizing an internal social business platform rolled out to >300k employees, to spearheading a GRC implementation for a Fortune 40 Company.

    In her latest role of Director of Risk and Operations for Lynx Technology Partners she is part of the Executive Team, leading strategic planning efforts, overseeing large programs and their resources, and directing the development of Lynx’s Information Security Competency Program.

    In addition, Kerstin is the President of the ICMCP Columbus Chapter, as well as a founding board member of EmpoWE-R Women of InfoSec, both non-profits dedicated to diversity in the field of Information Security
  • Hacking the Technical Interview with Marcelle Lee Recorded: Jan 21 2021 51 mins
    Marcelle Lee
    Preparation is key to a successful interview. So lets get prepared w/Marcelle Lee and others in the industry.
  • Social Identity, Leadership & Womankind Recorded: Dec 13 2020 56 mins
    Dr. Crystal Williams
    We will explore social identity and how it guides one to develop “sense of self”. We will focus on avoiding the destructive characteristics of stereotyping and misinformation that may affect one’s leadership capabilities, create challenges, and lead to unethical behavior. We will learn that using one’s social Identity to develop a sense of self is a better choice than falling victim to other’s perceptions.
  • Integrating Data Privacy and Brand Protection into your Cybersecurity Recorded: Nov 19 2020 29 mins
    Alex Nette, President, Hive Systems
    Cybersecurity is about how we protect our information, but do we ever stop to ask ourselves what we’re protecting and why? Your company likely collects customer, employee and proprietary information, so the responsibility to protect the data and respond in the event of a cybercrime is yours. This isn’t a big company problem.

    Data privacy issues and data breaches happen to small and mid-sized businesses all the time and can put your company’s reputation and ability to do business at risk.

    This 30-minute live discussion led by Alex Nette, one of the leading cybersecurity experts for small-medium businesses, takes you through a critical examination of your business practices with respect to data privacy and brand protection.
    - Do you really need to be collecting all this information?
    - Do you understand your risk points?
    - Are you in compliance with privacy laws (GDPR, CCPA) and cybersecurity best practices?
    - What if something goes wrong?

    Alex wants every business to benefit from the same strategy and tactics that large enterprises employ. In this webinar, he draws on years of experience in protecting critical data to share a perspective on how to look at your data practices and where to start.


    Bio
    Alex Nette
    Alex started Hive Systems as he felt that every company deserves big business cybersecurity, even when they have small or medium business budgets. He brings executive level expertise in the establishment and continuous improvement of cybersecurity programs and applies his work from various cybersecurity disciplines in a holistic approach that prioritizes organization’s operations. Alex has provided cybersecurity consulting to the public sector for federal, state, and local agencies, and in the private sector for a wide variety of industry segments.
  • Why Securing Cloud Based Email Requires a Different Approach Recorded: Nov 18 2020 41 mins
    Michael Landewe, Cofounder at Avanan
    The Evolution Beyond Secure Email Gateways - is here.

    Email gateways including Proofpoint, Mimecast, and Barracuda were designed to protect on-premises email servers, but when you moved your email to the cloud, it revealed five vulnerabilities that continue to expose your users to attacks.

    It's why companies are switching from gateway vendors. Come learn how the migration to Office 365 and Gmail necessitated an evolution in how to secure cloud email, and why Secure Email Gateways are not the right answer.
  • Deceiving the Attacker Recorded: Nov 17 2020 56 mins
    Diana Kelley | Chris Roberts | Christina Fowler
    When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach.

    Join this episode of The (Security) Balancing Act to discover how deception technology can be used by organizations to detect, investigate and respond to malicious intruders. How does deceiving the attacker save your company and buy you time?

    During this episode, we'll go over:
    - What is deception technology and what does it help with?
    - How does it work? (e.g. Deception decoys, lures, honeytokens, traps, grids)
    - Is your organization ready to adopt deception?
    - What do you need to do before you buy the technology / build it in-house?
    - Key benefits of using deception for threat hunting
    - What else can deception be used for?
    - Deception use cases
    - The role of AI in deception (e.g. dynamic deception)

    Panelists:
    - Chris Roberts, vCISO, Researcher, Hacker, Consultant, Devils Advocate
    - Christina Fowler, Chief Cyber Intel Strategist at MITRE Corporation

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Securing WhatsApp - What You Need to Know Today Recorded: Oct 28 2020 29 mins
    Cosimo Mortola, Senior Intelligence Analyst, GroupSense
    Already a popular platform, WhatsApp, the Facebook-owned smartphone instant messaging service, posted the biggest gains due to COVID-19 according to Tech Crunch. Learn why this ubiquitous messaging app could be a security risk and what you need to know to secure WhatsApp.
    In this session, you’ll discover:
    + How metadata and message data storage expose you to critical risk
    + Why the legal agreement should give you pause
    + Why WhatsApp is an effective platform for spreading disinformation
    + How the phones and humans using them increase your vulnerability
    + How to increase secure use of the app and mitigate your risk
    + Why WhatsApp leveraged by sophisticated threat actors

    Speaker: Cosimo Mortola is a senior intelligence analyst at GroupSense. Cosimo previously tracked threat actors at MassMutual, and Russian disinformation and associated threat activity at FireEye. Cosimo is fluent in Russian, French, and Italian.
  • 2021 Cybersecurity Budget Must Haves for Every SMB Recorded: Oct 27 2020 26 mins
    Alex Nette, President & CEO, Hive Systems + Michael Cardman, CFO, Hive Systems
    The pressure is on to maximize - possibly reduce - your IT spend, but you know that cybersecurity is critical. As many as 60% of hacked small and medium-sized businesses go out of business after six months. But, how much is right to spend? This 30-minute live discussion between Alex Nette, one of the leading cybersecurity experts for small-medium businesses, and Michael Cardman, a results-oriented financial expert will help you determine:
    + What are the must-haves for your 2021 cybersecurity budget? How do you calculate what to spend?
    + Given your business and your systems, applications and software, what’s the right approach for you?
    + How do you do more with less?

    This webinar draws on years of experience in working with business and IT professionals to help them craft the right spend strategy. Both Alex and Michael will provide a number of best practices for you to consider, but also show you the behind the scenes tools they’ve used for years! See what happens when IT and cybersecurity gets real with a CFO.
WSC is helping women in cybersecurity reach their career goals
The Women’s Society of Cyberjutsu (WSC) is a non-profit, 501c(3) organization passionate about helping and empowering women to succeed in the cybersecurity field.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A day in the life of a - Cyber Threat Analyst
  • Live at: Mar 26 2020 12:00 am
  • Presented by: Connie Blaney
  • From:
Your email has been sent.
or close