Hi [[ session.user.profile.firstName ]]

Deceiving the Attacker

When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach.

Join this episode of The (Security) Balancing Act to discover how deception technology can be used by organizations to detect, investigate and respond to malicious intruders. How does deceiving the attacker save your company and buy you time?

During this episode, we'll go over:
- What is deception technology and what does it help with?
- How does it work? (e.g. Deception decoys, lures, honeytokens, traps, grids)
- Is your organization ready to adopt deception?
- What do you need to do before you buy the technology / build it in-house?
- Key benefits of using deception for threat hunting
- What else can deception be used for?
- Deception use cases
- The role of AI in deception (e.g. dynamic deception)

Panelists:
- Chris Roberts, vCISO, Researcher, Hacker, Consultant, Devils Advocate
- Christina Fowler, Chief Cyber Intel Strategist at MITRE Corporation

This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
Recorded Nov 17 2020 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Diana Kelley | Chris Roberts | Christina Fowler
Presentation preview: Deceiving the Attacker

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Year In Review 2020 Feb 12 2021 12:00 am UTC 60 mins
    Mansi Thakar, Mari Galloway
    2020 year in review for WSC members/volunteers/staff/partners
  • A Day in the Life of...a Pentester Jan 29 2021 1:00 am UTC 60 mins
    Connie Blaney
    Have you ever wanted to learn more about what it is like to be a Pentester? Join us as we chat with Gabrielle Botbol, an award winning blogger about what the day to day life of a Pentester looks like.
  • Career Conversations with Kerstin Zell Jan 28 2021 12:00 am UTC 60 mins
    Elena Steinke, WSC Founding Board member
    Career Conversations is a focused chat with female leaders within Cybersecurity. Come join us as Elena Steinke chats with Kerstin Zell about her career, how she grew to be the leader she is and overcame challenges faced within the field.

    Kerstin’s skillset is founded on business process, operational effectiveness, strategic planning, communication, and change leadership tying together planning, people, process, technology and risk in a unique way. In her 20 year career, Kerstin has led high exposure, multi-million-dollar, cross-functional, change and transformational efforts and has background in heading up technology implementations and improvement efforts – from refining Supply Chain software, evangelizing an internal social business platform rolled out to >300k employees, to spearheading a GRC implementation for a Fortune 40 Company.

    In her latest role of Director of Risk and Operations for Lynx Technology Partners she is part of the Executive Team, leading strategic planning efforts, overseeing large programs and their resources, and directing the development of Lynx’s Information Security Competency Program.

    In addition, Kerstin is the President of the ICMCP Columbus Chapter, as well as a founding board member of EmpoWE-R Women of InfoSec, both non-profits dedicated to diversity in the field of Information Security
  • Hacking the Technical Interview with Marcelle Lee Recorded: Jan 21 2021 51 mins
    Marcelle Lee
    Preparation is key to a successful interview. So lets get prepared w/Marcelle Lee and others in the industry.
  • Integrating Data Privacy and Brand Protection into your Cybersecurity Recorded: Nov 19 2020 29 mins
    Alex Nette, President, Hive Systems
    Cybersecurity is about how we protect our information, but do we ever stop to ask ourselves what we’re protecting and why? Your company likely collects customer, employee and proprietary information, so the responsibility to protect the data and respond in the event of a cybercrime is yours. This isn’t a big company problem.

    Data privacy issues and data breaches happen to small and mid-sized businesses all the time and can put your company’s reputation and ability to do business at risk.

    This 30-minute live discussion led by Alex Nette, one of the leading cybersecurity experts for small-medium businesses, takes you through a critical examination of your business practices with respect to data privacy and brand protection.
    - Do you really need to be collecting all this information?
    - Do you understand your risk points?
    - Are you in compliance with privacy laws (GDPR, CCPA) and cybersecurity best practices?
    - What if something goes wrong?

    Alex wants every business to benefit from the same strategy and tactics that large enterprises employ. In this webinar, he draws on years of experience in protecting critical data to share a perspective on how to look at your data practices and where to start.


    Bio
    Alex Nette
    Alex started Hive Systems as he felt that every company deserves big business cybersecurity, even when they have small or medium business budgets. He brings executive level expertise in the establishment and continuous improvement of cybersecurity programs and applies his work from various cybersecurity disciplines in a holistic approach that prioritizes organization’s operations. Alex has provided cybersecurity consulting to the public sector for federal, state, and local agencies, and in the private sector for a wide variety of industry segments.
  • Why Securing Cloud Based Email Requires a Different Approach Recorded: Nov 18 2020 41 mins
    Michael Landewe, Cofounder at Avanan
    The Evolution Beyond Secure Email Gateways - is here.

    Email gateways including Proofpoint, Mimecast, and Barracuda were designed to protect on-premises email servers, but when you moved your email to the cloud, it revealed five vulnerabilities that continue to expose your users to attacks.

    It's why companies are switching from gateway vendors. Come learn how the migration to Office 365 and Gmail necessitated an evolution in how to secure cloud email, and why Secure Email Gateways are not the right answer.
  • Deceiving the Attacker Recorded: Nov 17 2020 56 mins
    Diana Kelley | Chris Roberts | Christina Fowler
    When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach.

    Join this episode of The (Security) Balancing Act to discover how deception technology can be used by organizations to detect, investigate and respond to malicious intruders. How does deceiving the attacker save your company and buy you time?

    During this episode, we'll go over:
    - What is deception technology and what does it help with?
    - How does it work? (e.g. Deception decoys, lures, honeytokens, traps, grids)
    - Is your organization ready to adopt deception?
    - What do you need to do before you buy the technology / build it in-house?
    - Key benefits of using deception for threat hunting
    - What else can deception be used for?
    - Deception use cases
    - The role of AI in deception (e.g. dynamic deception)

    Panelists:
    - Chris Roberts, vCISO, Researcher, Hacker, Consultant, Devils Advocate
    - Christina Fowler, Chief Cyber Intel Strategist at MITRE Corporation

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Securing WhatsApp - What You Need to Know Today Recorded: Oct 28 2020 29 mins
    Cosimo Mortola, Senior Intelligence Analyst, GroupSense
    Already a popular platform, WhatsApp, the Facebook-owned smartphone instant messaging service, posted the biggest gains due to COVID-19 according to Tech Crunch. Learn why this ubiquitous messaging app could be a security risk and what you need to know to secure WhatsApp.
    In this session, you’ll discover:
    + How metadata and message data storage expose you to critical risk
    + Why the legal agreement should give you pause
    + Why WhatsApp is an effective platform for spreading disinformation
    + How the phones and humans using them increase your vulnerability
    + How to increase secure use of the app and mitigate your risk
    + Why WhatsApp leveraged by sophisticated threat actors

    Speaker: Cosimo Mortola is a senior intelligence analyst at GroupSense. Cosimo previously tracked threat actors at MassMutual, and Russian disinformation and associated threat activity at FireEye. Cosimo is fluent in Russian, French, and Italian.
  • 2021 Cybersecurity Budget Must Haves for Every SMB Recorded: Oct 27 2020 26 mins
    Alex Nette, President & CEO, Hive Systems + Michael Cardman, CFO, Hive Systems
    The pressure is on to maximize - possibly reduce - your IT spend, but you know that cybersecurity is critical. As many as 60% of hacked small and medium-sized businesses go out of business after six months. But, how much is right to spend? This 30-minute live discussion between Alex Nette, one of the leading cybersecurity experts for small-medium businesses, and Michael Cardman, a results-oriented financial expert will help you determine:
    + What are the must-haves for your 2021 cybersecurity budget? How do you calculate what to spend?
    + Given your business and your systems, applications and software, what’s the right approach for you?
    + How do you do more with less?

    This webinar draws on years of experience in working with business and IT professionals to help them craft the right spend strategy. Both Alex and Michael will provide a number of best practices for you to consider, but also show you the behind the scenes tools they’ve used for years! See what happens when IT and cybersecurity gets real with a CFO.
  • Ransomware Negotiation Do’s and Don’ts with an Expert Negotiator Recorded: Oct 21 2020 44 mins
    Kurtis Minder, GroupSense and Jessica Gulick (Host), Katzcy
    No one ever expects it to happen to them. But with ransomware and cybercrime on the rise, it’s more likely than ever to discover that ransomware has locked down your system and cybercriminals are holding your data hostage. Kurtis Minder, an expert ransomware negotiator, advises executive teams when their worst cybersecurity nightmares come to life. Join us for an interview with Kurtis as we discuss:

    + What most people don’t realize about ransomware and the cybercriminals that run these exploits
    + Immediate do’s and don’t if your systems are being held captive
    + How to limit potential damage like data loss, overpaying threat actors, tarnished brand reputation, and compliance violations
    + Team Event: who to involve and when
  • How She Got There—Women in Health IT Recorded: Oct 6 2020 58 mins
    Moderator: Karen Diamond, Vice President of Strategic Accounts, pureIntegration
    Women are increasingly finding a career in healthcare IT. According to a recent article in Healthcare Finance News, women make up 66% of all entry-level healthcare employees and 30% of C-suite positions in healthcare IT.*

    Our panelists are challenging the ecosystem—transforming the information technology space in healthcare, driving improved patient care, and leading with a purpose.

    Join us for an open and honest hour-long conversation with influential women in healthcare information and technology who are leading the way to a more diverse and enriched community. Gain a better understanding of the challenges and opportunities that these female executives have experienced as they have navigated their careers. Learn from them how they are leading their organizations to digitally transform and serve their patients in more effective ways. Discover how they see the healthcare ecosystem evolving to achieve more diversity and balance in the workforce.

    Webinar host pureIntegration is an IT consulting services firm, led by a team of 53% women and minorities.

    *Reference: https://www.healthcarefinancenews.com/news/women-healthcare-hold-most-manager-positions-lack-minority-representation-persists
  • The Evolution Beyond Secure Email Gateways Recorded: Oct 6 2020 42 mins
    Michael Landewe, Cofounder at Avanan
    Why Securing Cloud-Based Email Requires a Different Approach

    Email gateways including Proofpoint, Mimecast, and Barracuda were designed to protect on-premises email servers, but when you moved your email to the cloud, it revealed five vulnerabilities that continue to expose your users to attacks.

    It's why companies are switching from gateway vendors. Come learn how the migration to Office 365 and Gmail necessitated an evolution in how to secure cloud email, and why Secure Email Gateways are not the right answer.
  • A day in the life of a Cyber Intelligence Analyst Recorded: Sep 29 2020 57 mins
    Connie Blaney, WSC Webinar lead
    Have you ever wanted to know about what a day in the life of a Cyber Intelligence Analyst looks like? Get to know what it takes to do this role, hopefully find your passion. This is our ninth episode this year and I am delighted to have Lea Cure with me as guest speaker.
    Lea Cure's background is in financial threat intelligence, cyber incident response, and data loss prevention. At Recorded Future, Lea works as a cyber threat intelligence analyst who focuses her research on major trends across the cyber security threat landscape, specifically trends within malware and ransomware
  • What the Phish? Recorded: Sep 12 2020 49 mins
    Ashish Kirtikar
    "Congrats!!! You have won 5000000000 dollars". We all receive such emails on a daily basis. But are they true, of course not!! So, what are these mails?? Who sends them?? How to stay safe?? "What the Phisssh!!!" will discuss all these questions and much more. We gladly welcome you to the world of Phishing: an unhealthy mix of social engineering and technology.
  • A day in the life of a Cyber Strategist Recorded: Aug 25 2020 64 mins
    Connie Blaney, WSC Webinar lead
    Have you ever wondered what the day to day life is like for certain roles in Cyber Security? What do they actually do that you could get passionate about.
    The A day in the life series covers the details of different roles and this month, join me as we dive into the role of a Cyber Strategist. We talk to Caroline Wong, Chief Strategy Officer for Cobalt.io
  • Career Conversations with Camille Stewart Esq Recorded: Jul 30 2020 51 mins
    Elena Steinke, Board of Directors WSC
    Join us at our next Career Conversations session. We'll discuss topics such as: what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Host: Elena Steinke, WSC Founding Board Member

    Guest: Camille Stewart

    Camille Stewart is an attorney whose cross-cutting perspective on complex technology, cyber, and national security, and foreign policy issues has landed her in significant roles at leading government and private sector companies like the Department of Homeland Security and Google. Camille is Head of Security Policy for Google Play and Android where she leads cybersecurity, provacy, election integrity, and misinformation policy efforts. Prior to Google, Camille managed cybersecurity, election security, tech innovation, and risk issues at Deloitte. Camille was appointed by President Barack Obama the Senior Policy Advisor for Cyber Infrastructure & Resilience Policy at the Department of Homeland Security. She was the Senior Manager of Legal Affairs at Cyveillance, a cybersecurity company after working on Capitol Hill.

    Camille is a Truman National Security Fellow, and Council on Foreign Relations Term Member. Camille is the co-Founder of Diversity inNatioal Security Network, on the Board of Women of Color Advancing Peace & Security and the founder of the Cybersecurity & Emerging Tech working group. She is also leading a project with a DC think tank addressing the exfiltration of sensitive technology and IP through the courts. You can find out more about Camille and her current projects at www.CamilleStewart.com and follow her on Twitter @CamilleEsq
  • A day in the life of a Insider Threat Investigations lead Recorded: Jul 29 2020 74 mins
    Connie Blaney
    Join myself Connie Blaney and our guest speaker Stacey Champagne aka Hacker in heels as we discuss what the day to day looks like for an Insider threat Investigations lead
  • Ransomware: Are Your Vulnerabilities Exposing You? Recorded: Jul 22 2020 48 mins
    Troy Vennon, Director of Cybersecurity and Trustworthiness, Covail
    More mid-to-smaller companies are being targeted by cyber attackers with ransomware. According to a recent report, the average-sized company impacted has decreased from 2018 to about 650 employees in 2019. This trend will likely continue.

    Join Troy Vennon, who leads the Ohio security community of CISOs and security managers (ISAO), for a discussion about protecting your company with practical steps and tight budgets. Troy will discuss how knowing how vulnerable your company is to ransomware helps you better protect from it.
    You will learn from this discussion:
    + Top 3 steps your security team can take to protect your network on a budget
    + How to find, prioritize and close vulnerabilities that expose you to ransomware
    + What best practices other companies are deploying to defend their enterprise from attack
  • How Companies Are Using Data Analytics to Prioritize Cyber Spend Recorded: Jul 8 2020 42 mins
    Jerry Caponera, VP of Products and Cyber Risk Management, Nehemiah Security
    Choosing which cybersecurity projects to implement is more challenging than ever. Cyber risk changes daily and budgets are changing too as the COVID-19 pandemic continues to unfold. Register to see why leading companies are using a data-driven approach to make better decisions about which projects to prioritize, and learn how modeling risk helps optimize cyber spend.

    Join us to learn:
    + What’s changed in how companies look at risk remediation and ROI pre- and post-COVID
    + Why the prioritization of cyber spend is more important than ever
    + How to take a data-driven approach and what data you need to get started
    + Why modeling is important and how you can do this easily (demo)
WSC is helping women in cybersecurity reach their career goals
The Women’s Society of Cyberjutsu (WSC) is a non-profit, 501c(3) organization passionate about helping and empowering women to succeed in the cybersecurity field.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Deceiving the Attacker
  • Live at: Nov 17 2020 5:00 pm
  • Presented by: Diana Kelley | Chris Roberts | Christina Fowler
  • From:
Your email has been sent.
or close