Hi [[ session.user.profile.firstName ]]

Deceiving the Attacker

When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach.

Join this episode of The (Security) Balancing Act to discover how deception technology can be used by organizations to detect, investigate and respond to malicious intruders. How does deceiving the attacker save your company and buy you time?

During this episode, we'll go over:
- What is deception technology and what does it help with?
- How does it work? (e.g. Deception decoys, lures, honeytokens, traps, grids)
- Is your organization ready to adopt deception?
- What do you need to do before you buy the technology / build it in-house?
- Key benefits of using deception for threat hunting
- What else can deception be used for?
- Deception use cases
- The role of AI in deception (e.g. dynamic deception)

Panelists:
- Chris Roberts, vCISO, Researcher, Hacker, Consultant, Devils Advocate
- Christina Fowler, Chief Cyber Intel Strategist at MITRE Corporation

This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
Recorded Nov 17 2020 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Diana Kelley | Chris Roberts | Christina Fowler
Presentation preview: Deceiving the Attacker

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Integrating Data Privacy and Brand Protection into your Cybersecurity Recorded: Nov 19 2020 29 mins
    Alex Nette, President, Hive Systems
    Cybersecurity is about how we protect our information, but do we ever stop to ask ourselves what we’re protecting and why? Your company likely collects customer, employee and proprietary information, so the responsibility to protect the data and respond in the event of a cybercrime is yours. This isn’t a big company problem.

    Data privacy issues and data breaches happen to small and mid-sized businesses all the time and can put your company’s reputation and ability to do business at risk.

    This 30-minute live discussion led by Alex Nette, one of the leading cybersecurity experts for small-medium businesses, takes you through a critical examination of your business practices with respect to data privacy and brand protection.
    - Do you really need to be collecting all this information?
    - Do you understand your risk points?
    - Are you in compliance with privacy laws (GDPR, CCPA) and cybersecurity best practices?
    - What if something goes wrong?

    Alex wants every business to benefit from the same strategy and tactics that large enterprises employ. In this webinar, he draws on years of experience in protecting critical data to share a perspective on how to look at your data practices and where to start.


    Bio
    Alex Nette
    Alex started Hive Systems as he felt that every company deserves big business cybersecurity, even when they have small or medium business budgets. He brings executive level expertise in the establishment and continuous improvement of cybersecurity programs and applies his work from various cybersecurity disciplines in a holistic approach that prioritizes organization’s operations. Alex has provided cybersecurity consulting to the public sector for federal, state, and local agencies, and in the private sector for a wide variety of industry segments.
  • Why Securing Cloud Based Email Requires a Different Approach Recorded: Nov 18 2020 41 mins
    Michael Landewe, Cofounder at Avanan
    The Evolution Beyond Secure Email Gateways - is here.

    Email gateways including Proofpoint, Mimecast, and Barracuda were designed to protect on-premises email servers, but when you moved your email to the cloud, it revealed five vulnerabilities that continue to expose your users to attacks.

    It's why companies are switching from gateway vendors. Come learn how the migration to Office 365 and Gmail necessitated an evolution in how to secure cloud email, and why Secure Email Gateways are not the right answer.
  • Deceiving the Attacker Recorded: Nov 17 2020 56 mins
    Diana Kelley | Chris Roberts | Christina Fowler
    When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach.

    Join this episode of The (Security) Balancing Act to discover how deception technology can be used by organizations to detect, investigate and respond to malicious intruders. How does deceiving the attacker save your company and buy you time?

    During this episode, we'll go over:
    - What is deception technology and what does it help with?
    - How does it work? (e.g. Deception decoys, lures, honeytokens, traps, grids)
    - Is your organization ready to adopt deception?
    - What do you need to do before you buy the technology / build it in-house?
    - Key benefits of using deception for threat hunting
    - What else can deception be used for?
    - Deception use cases
    - The role of AI in deception (e.g. dynamic deception)

    Panelists:
    - Chris Roberts, vCISO, Researcher, Hacker, Consultant, Devils Advocate
    - Christina Fowler, Chief Cyber Intel Strategist at MITRE Corporation

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Securing WhatsApp - What You Need to Know Today Recorded: Oct 28 2020 29 mins
    Cosimo Mortola, Senior Intelligence Analyst, GroupSense
    Already a popular platform, WhatsApp, the Facebook-owned smartphone instant messaging service, posted the biggest gains due to COVID-19 according to Tech Crunch. Learn why this ubiquitous messaging app could be a security risk and what you need to know to secure WhatsApp.
    In this session, you’ll discover:
    + How metadata and message data storage expose you to critical risk
    + Why the legal agreement should give you pause
    + Why WhatsApp is an effective platform for spreading disinformation
    + How the phones and humans using them increase your vulnerability
    + How to increase secure use of the app and mitigate your risk
    + Why WhatsApp leveraged by sophisticated threat actors

    Speaker: Cosimo Mortola is a senior intelligence analyst at GroupSense. Cosimo previously tracked threat actors at MassMutual, and Russian disinformation and associated threat activity at FireEye. Cosimo is fluent in Russian, French, and Italian.
  • 2021 Cybersecurity Budget Must Haves for Every SMB Recorded: Oct 27 2020 26 mins
    Alex Nette, President & CEO, Hive Systems + Michael Cardman, CFO, Hive Systems
    The pressure is on to maximize - possibly reduce - your IT spend, but you know that cybersecurity is critical. As many as 60% of hacked small and medium-sized businesses go out of business after six months. But, how much is right to spend? This 30-minute live discussion between Alex Nette, one of the leading cybersecurity experts for small-medium businesses, and Michael Cardman, a results-oriented financial expert will help you determine:
    + What are the must-haves for your 2021 cybersecurity budget? How do you calculate what to spend?
    + Given your business and your systems, applications and software, what’s the right approach for you?
    + How do you do more with less?

    This webinar draws on years of experience in working with business and IT professionals to help them craft the right spend strategy. Both Alex and Michael will provide a number of best practices for you to consider, but also show you the behind the scenes tools they’ve used for years! See what happens when IT and cybersecurity gets real with a CFO.
  • Ransomware Negotiation Do’s and Don’ts with an Expert Negotiator Recorded: Oct 21 2020 44 mins
    Kurtis Minder, GroupSense and Jessica Gulick (Host), Katzcy
    No one ever expects it to happen to them. But with ransomware and cybercrime on the rise, it’s more likely than ever to discover that ransomware has locked down your system and cybercriminals are holding your data hostage. Kurtis Minder, an expert ransomware negotiator, advises executive teams when their worst cybersecurity nightmares come to life. Join us for an interview with Kurtis as we discuss:

    + What most people don’t realize about ransomware and the cybercriminals that run these exploits
    + Immediate do’s and don’t if your systems are being held captive
    + How to limit potential damage like data loss, overpaying threat actors, tarnished brand reputation, and compliance violations
    + Team Event: who to involve and when
  • How She Got There—Women in Health IT Recorded: Oct 6 2020 58 mins
    Moderator: Karen Diamond, Vice President of Strategic Accounts, pureIntegration
    Women are increasingly finding a career in healthcare IT. According to a recent article in Healthcare Finance News, women make up 66% of all entry-level healthcare employees and 30% of C-suite positions in healthcare IT.*

    Our panelists are challenging the ecosystem—transforming the information technology space in healthcare, driving improved patient care, and leading with a purpose.

    Join us for an open and honest hour-long conversation with influential women in healthcare information and technology who are leading the way to a more diverse and enriched community. Gain a better understanding of the challenges and opportunities that these female executives have experienced as they have navigated their careers. Learn from them how they are leading their organizations to digitally transform and serve their patients in more effective ways. Discover how they see the healthcare ecosystem evolving to achieve more diversity and balance in the workforce.

    Webinar host pureIntegration is an IT consulting services firm, led by a team of 53% women and minorities.

    *Reference: https://www.healthcarefinancenews.com/news/women-healthcare-hold-most-manager-positions-lack-minority-representation-persists
  • The Evolution Beyond Secure Email Gateways Recorded: Oct 6 2020 42 mins
    Michael Landewe, Cofounder at Avanan
    Why Securing Cloud-Based Email Requires a Different Approach

    Email gateways including Proofpoint, Mimecast, and Barracuda were designed to protect on-premises email servers, but when you moved your email to the cloud, it revealed five vulnerabilities that continue to expose your users to attacks.

    It's why companies are switching from gateway vendors. Come learn how the migration to Office 365 and Gmail necessitated an evolution in how to secure cloud email, and why Secure Email Gateways are not the right answer.
  • A day in the life of a Cyber Intelligence Analyst Recorded: Sep 29 2020 57 mins
    Connie Blaney, WSC Webinar lead
    Have you ever wanted to know about what a day in the life of a Cyber Intelligence Analyst looks like? Get to know what it takes to do this role, hopefully find your passion. This is our ninth episode this year and I am delighted to have Lea Cure with me as guest speaker.
    Lea Cure's background is in financial threat intelligence, cyber incident response, and data loss prevention. At Recorded Future, Lea works as a cyber threat intelligence analyst who focuses her research on major trends across the cyber security threat landscape, specifically trends within malware and ransomware
  • What the Phish? Recorded: Sep 12 2020 49 mins
    Ashish Kirtikar
    "Congrats!!! You have won 5000000000 dollars". We all receive such emails on a daily basis. But are they true, of course not!! So, what are these mails?? Who sends them?? How to stay safe?? "What the Phisssh!!!" will discuss all these questions and much more. We gladly welcome you to the world of Phishing: an unhealthy mix of social engineering and technology.
  • A day in the life of a Cyber Strategist Recorded: Aug 25 2020 64 mins
    Connie Blaney, WSC Webinar lead
    Have you ever wondered what the day to day life is like for certain roles in Cyber Security? What do they actually do that you could get passionate about.
    The A day in the life series covers the details of different roles and this month, join me as we dive into the role of a Cyber Strategist. We talk to Caroline Wong, Chief Strategy Officer for Cobalt.io
  • Career Conversations with Camille Stewart Esq Recorded: Jul 30 2020 51 mins
    Elena Steinke, Board of Directors WSC
    Join us at our next Career Conversations session. We'll discuss topics such as: what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Host: Elena Steinke, WSC Founding Board Member

    Guest: Camille Stewart

    Camille Stewart is an attorney whose cross-cutting perspective on complex technology, cyber, and national security, and foreign policy issues has landed her in significant roles at leading government and private sector companies like the Department of Homeland Security and Google. Camille is Head of Security Policy for Google Play and Android where she leads cybersecurity, provacy, election integrity, and misinformation policy efforts. Prior to Google, Camille managed cybersecurity, election security, tech innovation, and risk issues at Deloitte. Camille was appointed by President Barack Obama the Senior Policy Advisor for Cyber Infrastructure & Resilience Policy at the Department of Homeland Security. She was the Senior Manager of Legal Affairs at Cyveillance, a cybersecurity company after working on Capitol Hill.

    Camille is a Truman National Security Fellow, and Council on Foreign Relations Term Member. Camille is the co-Founder of Diversity inNatioal Security Network, on the Board of Women of Color Advancing Peace & Security and the founder of the Cybersecurity & Emerging Tech working group. She is also leading a project with a DC think tank addressing the exfiltration of sensitive technology and IP through the courts. You can find out more about Camille and her current projects at www.CamilleStewart.com and follow her on Twitter @CamilleEsq
  • A day in the life of a Insider Threat Investigations lead Recorded: Jul 29 2020 74 mins
    Connie Blaney
    Join myself Connie Blaney and our guest speaker Stacey Champagne aka Hacker in heels as we discuss what the day to day looks like for an Insider threat Investigations lead
  • Ransomware: Are Your Vulnerabilities Exposing You? Recorded: Jul 22 2020 48 mins
    Troy Vennon, Director of Cybersecurity and Trustworthiness, Covail
    More mid-to-smaller companies are being targeted by cyber attackers with ransomware. According to a recent report, the average-sized company impacted has decreased from 2018 to about 650 employees in 2019. This trend will likely continue.

    Join Troy Vennon, who leads the Ohio security community of CISOs and security managers (ISAO), for a discussion about protecting your company with practical steps and tight budgets. Troy will discuss how knowing how vulnerable your company is to ransomware helps you better protect from it.
    You will learn from this discussion:
    + Top 3 steps your security team can take to protect your network on a budget
    + How to find, prioritize and close vulnerabilities that expose you to ransomware
    + What best practices other companies are deploying to defend their enterprise from attack
  • How Companies Are Using Data Analytics to Prioritize Cyber Spend Recorded: Jul 8 2020 42 mins
    Jerry Caponera, VP of Products and Cyber Risk Management, Nehemiah Security
    Choosing which cybersecurity projects to implement is more challenging than ever. Cyber risk changes daily and budgets are changing too as the COVID-19 pandemic continues to unfold. Register to see why leading companies are using a data-driven approach to make better decisions about which projects to prioritize, and learn how modeling risk helps optimize cyber spend.

    Join us to learn:
    + What’s changed in how companies look at risk remediation and ROI pre- and post-COVID
    + Why the prioritization of cyber spend is more important than ever
    + How to take a data-driven approach and what data you need to get started
    + Why modeling is important and how you can do this easily (demo)
  • IT Manager's Series: Top 3 Ways to Protect from Ransomware Recorded: Jul 8 2020 46 mins
    Troy Vennon, Director, Cybersecurity & Trustworthiness at Covail
    Join us for an informative webinar on how IT managers and small security teams can prevent ransomware from infecting their company’s networks. Ransomware on the rise and no longer focused only on large enterprise (average-sized company impacted in 2019 around 650 employees). Organizations with small security teams or that leverage their IT teams to manage security need help to protect from the growing wave of cybercrime. Here’s what to expect from our webinar on ransomware:
    - How to identify where you are exposed so you can fix your vulnerabilities
    - Why and how to segment your network and identity management programs
    - What kind of a response and recovery process you need in place
  • THREAT INTEL IN THE REAL WORLD: An Expert Roundtable Recorded: Jul 1 2020 54 mins
    Chase Cunningham, Kurtis Minder, Rick Holland, Chris Camacho, Allan Liska, John Grim
    Find out what happens…when intel analysts stop being polite…and start getting real.

    Today’s typical enterprise security team subscribes to at least four, often more, intelligence feeds, which analysts must comb through to find relevant information for operationalization. As a result, most threat intel has become “yet another tool to manage.” It’s simply not practical to expect every security organization to be able to hire threat intelligence analysts to make sense out of the feeds. Vendors need to deliver “threat-analyst-in-a-box” capabilities, so intelligence can be operationalized with minimal intervention.

    In this session, a blue-chip panel of cyber threat experts will discuss the state of current threat intel offerings, and dive into the future of this space to help you understand how it will evolve to meet the needs of enterprise security teams. They will discuss how the next generation of threat intelligence will conform to the conventions of government intelligence operations, where the right information goes to the right people and systems in the right form factor.

    Attendees will learn:

    ​Why general-purpose threat intelligence won’t cut it and how it needs to be customized to each organization’s risk profile.

    What enterprises need to do to make the market mature in this evolving industry.

    ​How to take the right approach to threat intelligence and big data.
  • Making The Leap: From An Individual Contributor to Leader in Cyber Recorded: Jun 25 2020 60 mins
    Elena Steinke, Director & Founding Board Member
    About this webinar:
    Join the Women's Society of Cyberjutsu for a conversation with our distinguished leadership professionals Margot Halstead and Sarah Moffat to explore the different strategies and tactics towards transitioning into a leadership role. This seminar will focus on the common challenges with this transition focusing on the specific tendencies and habits women encounter through this transition.

    About Margot Halstead
    Margot's work focuses on helping leaders realize their greatest potential by identifying how they are potentially getting in their own way. She has coached, written and published articles, as well as designed and delivered 100’s of team and leader development programs for and with a diverse spectrum of organizations. Margot is an engaging facilitator noting the key to her success has been the ability to relate to all members of the team, forge immediate trust and connection, and relate the goals of the team to desired business outcomes. She has developed and delivered courses, workshops, and presentations on leadership transitions, emotional intelligence, communication skills, management, mentoring, executive presence and handling difficult people.

    About Sarah Moffat
    Sarah is a talent development expert, and both an 'ideas person' and strategic initiator. Sarah’s passion is working with people, strengthening the culture of learning and leadership development, and finding new ways to engage, empower, and excite learners. When leading teams, Sarah employs transformational and servant leadership to engage them and create space for team members to build their strengths and contribute in a way that brings fulfillment and job satisfaction. Sarah has more than 15 years in talent development with a B.S. in Psychology, and is an Independent Certified Coach, Trainer, and Speaker with the John Maxwell Team.
  • Career Conversations wth Tia Hopkins Recorded: Jun 24 2020 60 mins
    Elena Steinke, Director & Founding Board Member
    Join us at our next Career Conversations session. We'll discuss topics such as: what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Host: Elena Steinke, WSC Founding Board Member

    Guest: Tia Hopkins
    As Vice President, Global Sales Engineering, Tia Hopkins is focused on leading the team in providing pre-sales engineering support.  She has held various technology roles, including Senior Solutions Architect and Director of IT Services at services organizations.  She is an adjunct Professor for Yeshiva University’s Cybersecurity Masters program, and a Career Mentor for Cybrary and Built by Girls. Tia is also an SC Media Reboot Leadership Award recipient for 2019 in the Outstanding Educator category.

    Tia is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (C|EH) and Certified Hacking Forensics Investigator (C|HFI). She also holds a BS in Information Technology, MS in Information Security and Assurance and MS in Cybersecurity and Information Assurance, and plans to continue her education in pursuit of an MBA in IT Management.
WSC is helping women in cybersecurity reach their career goals
The Women’s Society of Cyberjutsu (WSC) is a non-profit, 501c(3) organization passionate about helping and empowering women to succeed in the cybersecurity field.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Deceiving the Attacker
  • Live at: Nov 17 2020 5:00 pm
  • Presented by: Diana Kelley | Chris Roberts | Christina Fowler
  • From:
Your email has been sent.
or close