Hi [[ session.user.profile.firstName ]]

ISSA Thought Leadership Series: Security Event Overload-How to Net it Out

How do you manage the thousands or tens of thousands of security alerts that are generated by your systems each day? Hear about strategies from practitioners who are dealing with “event overload” and then listen to a follow-up with a discussion about how security products that are building actionable information into their reporting in order to ease the burden.

Moderator: Steve Tcherchian, CISO and Director of Product Management, XYPRO Technology

Speakers:
Robert Hamilton, Director, Product Marketing, Imperva
Shelly Herschkovitz, Product Manager, Research & Innovation, Imperva
Scott McCoy, IT Director, Medtronic
Jessica Doyle, Director of Threat Assessment for Optiv
Recorded Oct 10 2018 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
ISSA International
Presentation preview: ISSA Thought Leadership Series: Security Event Overload-How to Net it Out

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security-as-a-Service for Small and Medium Sized Businesses Jun 5 2019 5:00 pm UTC 60 mins
    ISSA International
    How can IT security professionals take advantage of Security-as-a-Service to supplement their existing security programs?

    While cyber-attacks are increasing, your IT budgets and available security staff probably isn’t. You have too little time, too many alerts, and security tools are becoming more expensive and time consuming.

    In this presentation, Ryan Kelly, Solutions Engineer, AT&T Cybersecurity and Mike Cote, VP Product and Solutions, Cygilant, will explore ways that IT security professionals can leverage Security-as-a-Service options, including:

    - Managed Detection and Response
    - Vulnerability Management
    - Patch Management
    - Managed SIEM
    - SOC-as-a-Service
    - Deployment scenarios
    - Pricing scenarios

    Learn how Security-as-Service can add 24x7 coverage and help improve the security posture of your organization.

    Speakers:

    Ryan Kelly - Solutions Engineer, AT&T Cybersecurity
    Mike Cote – VP Products and Solutions, Cygilant
  • High Assurance Digital Identity in Zero Trust Architecture May 17 2019 5:00 pm UTC 57 mins
    ISSA International
    The Zero Trust Architecture model accepts that secure data can no longer be adequately protected by network perimeter firewall design because there is no longer a physical network perimeter to protect. Digital entities (people and things) cannot be trusted until they have been authenticated through integrated digital ID services. High assurance digital identity has quickly become the center of IT cybersecurity. Fortunately, there are several side benefits to solving this security challenge.

    Moderator:
    Kurt Seifried, Chief Blockchain Officer and Director of Special Projects
    Cloud Security Alliance

    Speaker:
    John MacInnis, Product Marketing Manager, Identity & Access Management Solutions (IAMS), HID Global
  • ISSA Thought Leadership Series - Zero Trust: The evolution of Perimeter Security May 15 2019 5:00 pm UTC 60 mins
    ISSA International
    One key aspect of digital transformation for many companies has been the evolution and rise of the remote user. Application access from any device, anywhere has become an imperative for success, but with transformation comes challenges with attack surface and network vulnerability.

    Adopting a zero trust model is key to combat cybercriminals who are probing security perimeters and enterprise resources for vulnerabilities with a distinct purpose. Application access and identity is one of the key areas to begin.

    Join us on ……May 15th at 1pm EST for a discussion with Akamai security professional Faraz Siddiqui as he shares steps you can take to protect your network against breaches by evolving access policies and solutions.
  • ISSA Thought Leadership Series: Exploring The Frontier For Maliciousness In IPv6 May 8 2019 5:00 pm UTC 60 mins
    ISSA International
    This year saw IPv6 adoption worldwide surpassing the twenty-five percent mark. While previously only used by some innovative attackers, the incentive to explore the space for fresh targets grows as more than a quarter of the Internet is now IPv6-capable. Many organizations are challenged with adequate monitoring their IPv6 networks, misconfigured devices and a shortage of time to implement IPv6 best practices.

    In this session we’ll aim to spur more conversations and curiosity in the IPv6 security space by:

    - Examining ways to enumerate an oasis of infrastructure in the large desert of addresses

    - Discussing current malware observed with IPv6 capabilities

    - Remarking on some already observed security issues with the protocol

    Speaker:
    Chad Anderson, Research Engineer, DomainTools, LLC.
  • ISSA International Series: Threat Detection - Trends and Technology Apr 26 2019 4:00 pm UTC 86 mins
    ISSA International
    The world is changing, attacks come at the speed of light, and are changing so fast detection is almost impossible. So, how do we tell when we are being attacked? What new technologies are coming down the pipe? This session will cover these and many more topics.

    Moderator:
    Gabe Chomic, President, ISSA-UK

    Speakers:
    Mohan Rao, CTO, RANK Software
    Brian Laing, SVP, Corporate Development & Strategic Alliances, Lastline
    Thomas Fischer, Security Advocate and Threat Researcher
  • ISSA International Series: Breach Report- Review the Various Breach Reports Apr 23 2019 4:00 pm UTC 120 mins
    ISSA International
    This session will cover the traditional breach reports as well as a new style of reports and analysis.

    Moderator:
    Matt Mosley, Vice President of Security Products, Devo

    Speakers:
    Scott Parker, Sr. Principal Systems Engineer, Symantec
    Gabe Chomic, President, ISSA-UK
    Gary Marsden, Senior Director, Data Protection Services, Gemalto
  • Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React Recorded: Apr 17 2019 56 mins
    ISSA International
    In this session, ExtraHop Deputy CISO Jeff Costlow will discuss how security operations teams can escape the cycle of reactivity characterized by constantly responding to a flood of alerts, and move toward a more proactive stance by using the right data sources and workflows, driven by network traffic analysis, to focus on developing proactive capabilities like continuous encryption auditing, policy auditing, and more advanced use cases like threat hunting.

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management for Farmers Insurance

    Speakers:
    Jeff Costlow, CISO, ExtraHop
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions.
  • Up Up and Away: Why The Modern SOC is Rooted in the Cloud Recorded: Apr 12 2019 49 mins
    ISSA International
    Today’s SOC teams are struggling to gain efficiencies that are grounded by the limitations of legacy, on-premise technologies. As a result, organizations are turning to cloud-based solutions to offer the flexibility and scalability they need to keep pace with the modern threat landscape.


    It is critical that we explore the difference between cloud-native and cloud-based security operations center (SOC) technologies. From ensuring that you gain the performance and simplicity your team needs to fully leverage big data analytics to understanding the role that third party integrations will play in your evaluation, we’ll leave you thinking about the questions to consider as you evaluate new SOC technologies.

    Join JASK Vice President of Product Marketing Ken Liao and VP, Field Operations Andrew Maloney to learn about how migrating to a true cloud-platform solution can help your SOC organization with:


    - Improved automation of existing analyst workflows

    - Better visualization of big data analytics

    - Rapid integrations and improved context around threat details

    - Lower total cost of ownership and rapid innovation

    Speakers:
    Ken Liao- VP, Product Marketing, JASK
    Andrew Maloney VP, Field Operations, JASK
    Mark Gelhardt, VP, Technology Governance for US Bank
  • High Assurance Digital Identity in Zero Trust Architecture Recorded: Apr 10 2019 58 mins
    ISSA International
    The Zero Trust Architecture model accepts that secure data can no longer be adequately protected by network perimeter firewall design because there is no longer a physical network perimeter to protect. Digital entities (people and things) cannot be trusted until they have been authenticated through integrated digital ID services. High assurance digital identity has quickly become the center of IT cybersecurity. Fortunately, there are several side benefits to solving this security challenge.

    Moderator:
    Kurt Seifried, Chief Blockchain Officer and Director of Special Projects
    Cloud Security Alliance

    Speaker:
    John MacInnis, Product Marketing Manager, Identity & Access Management Solutions (IAMS), HID Global
  • ISSA International Series: Threat Detection - Trends and Technology Recorded: Mar 26 2019 87 mins
    ISSA International
    The world is changing, attacks come at the speed of light, and are changing so fast detection is almost impossible. So, how do we tell when we are being attacked? What new technologies are coming down the pipe? This session will cover these and many more topics.

    Moderator:
    Gabe Chomic, President, ISSA-UK

    Speakers:
    Mohan Rao, CTO, RANK Software
    Brian Laing, SVP, Corporate Development & Strategic Alliances, Lastline
    Thomas Fischer, Security Advocate and Threat Researcher
  • ISSA Thought Leadership Series: 10 Must-Have Features of a Modern SIEM Recorded: Mar 22 2019 57 mins
    ISSA International
    With the return of innovation to the SIEM market, the definition of what comprises an effective solution has changed. Join Exabeam for an informative discussion on the ten essential features and capabilities for IT security decision makers to look for when evaluating potential candidates. Discussion points include:

    - Advanced processing and analytics
    - Automated threat detection and prioritization
    - Facilitated incident investigation and triage
    - Proactive (and reactive) threat hunting

    Moderator:
    Lucas Varela, CyberSecurity Architect, Caixabank

    Speakers:
    Orion Cassetto, Sr. Director Product Marketing, Exabeam
    Brian Engle, CISO, Managing Director CISO Advisory, CyberDefenses, Inc.
  • ISSA Thought Leadership Series: Your Hygiene is Showing-Improving Risk Posture Recorded: Mar 20 2019 58 mins
    ISSA International
    Cyber hygiene is the flossing of cybersecurity — something we all know we should do, but regularly ignore. While it may be more exciting to get the latest silver bullet to solve a zero-day problem, improving processes to better leverage what you already have will go further in protecting against the next cyberattack.

    In this webinar, a panel of industry experts and thought leaders will discuss:

    * Why establishing a single source of truth across your organization’s entire infrastructure is crucial managing hygiene processes

    * What’s needed to bridge the gap between technologies and teams and to get full value from security investments

    * How prevention strategies should be balanced and aligned with detection and response

    * The importance of cyber resilience in the era of continuous compromise

    Moderator:
    Ken Dunham, Senior Director of Technical Cyber Threat Intelligence, Optiv

    Speaker:
    Amrit Williams, Vice President, Products, Skybox Security
    Kelly Roberston, CEO, SEC Consult America, Inc.
  • Thought Leadership Series: Adopting Zero Trust as an Enterprise Security Model Recorded: Mar 15 2019 63 mins
    ISSA International
    A number of digital transformation initiatives are forcing businesses to rethink their enterprise security architecture. With breaches on the rise, users increasingly mobile, and data and applications moving to the cloud, businesses have to consider whether traditional perimeter-based security approaches are relevant.

    The live, online panel discussion will explore:

    Key business imperatives that are changing the way you need to think about security
    What a Zero Trust security model is and why you need it
    Difference approaches to Zero Trust Security
    Zero Trust adoption best practices

    Moderator:
    Tyler Cohen Wood, Executive Director, Cyber Risk and Workforce Development, CyberVista

    Speakers:
    Patrick Sullivan, Global Director, Security Strategy, Akamai Technologies
    Felice Flake, CEO, ScySec LLC
  • Up Up and Away: Why The Modern SOC is Rooted in the Cloud Recorded: Mar 13 2019 50 mins
    ISSA International
    Today’s SOC teams are struggling to gain efficiencies that are grounded by the limitations of legacy, on-premise technologies. As a result, organizations are turning to cloud-based solutions to offer the flexibility and scalability they need to keep pace with the modern threat landscape.


    It is critical that we explore the difference between cloud-native and cloud-based security operations center (SOC) technologies. From ensuring that you gain the performance and simplicity your team needs to fully leverage big data analytics to understanding the role that third party integrations will play in your evaluation, we’ll leave you thinking about the questions to consider as you evaluate new SOC technologies.

    Join JASK Vice President of Product Marketing Ken Liao and VP, Field Operations Andrew Maloney to learn about how migrating to a true cloud-platform solution can help your SOC organization with:


    - Improved automation of existing analyst workflows

    - Better visualization of big data analytics

    - Rapid integrations and improved context around threat details

    - Lower total cost of ownership and rapid innovation

    Speakers:
    Ken Liao- VP, Product Marketing, JASK
    Andrew Maloney VP, Field Operations, JASK
    Mark Gelhardt, VP, Technology Governance for US Bank
  • ISSA International Series: DevOps/AppSec, The State of the World Recorded: Feb 26 2019 118 mins
    ISSA International
    Over the past few years the focus has shifted from ‘does the code have vulnerabilities?’ to issues of ‘could the code have vulnerabilities?’. Of course the later created the question – How would we know? Now, just when we thought we understood things, we realize that we are changing again. Not only is the code and its components are important, but so is the question of the development environment. This webinar will go cover the state, changes, and new directions we are being faced with.

    Moderator:
    James R. McQuiggan, Product & Solutions Security Officer, Service Americas Division, Siemens Gamesa Renewable Energy.


    Speakers:
    Derek Weeks, Vice President, Sonatype
    Matthew Small, Head of Solutions Architecture, Bitnami
    James Rabon, Sr. Product Manager (SSC & Tools), Fortify
    Bjoern Zinnsmeister, CEO and co-founder, Templarbit
  • ISSA International Series: 2018 Year in Review and Predictions for 2019 Recorded: Feb 22 2019 120 mins
    ISSA International
    2018 was worse than 2017 for cyber security. This year every month was filled with even more major breaches, hacks, and attacks surfacing then 2017. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2018 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2019 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2019 landscape?

    Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2019 challenges to InfoSec.

    Moderator:
    James McQuiggan, Product & Solutions Security Officer, Service Americas Division, Siemens Gamesa Renewable Energy

    Speakers:
    Ricky Allen, CISO, Critical Start
    Ira Winkler, President, Secure Mentem
    Patrick Miller, Managing Partner, Archer International
  • ISSA Thought Leadership Series: 10 Must-Have Features of a Modern SIEM Recorded: Feb 20 2019 58 mins
    ISSA International
    With the return of innovation to the SIEM market, the definition of what comprises an effective solution has changed. Join Exabeam for an informative discussion on the ten essential features and capabilities for IT security decision makers to look for when evaluating potential candidates. Discussion points include:

    - Advanced processing and analytics
    - Automated threat detection and prioritization
    - Facilitated incident investigation and triage
    - Proactive (and reactive) threat hunting

    Moderator:
    Lucas Varela, CyberSecurity Architect, Caixabank

    Speakers:
    Orion Cassetto, Sr. Director Product Marketing, Exabeam
    Brian Engle, CISO, Managing Director CISO Advisory, CyberDefenses, Inc.
  • Thought Leadership Series: Adopting Zero Trust as an Enterprise Security Model Recorded: Feb 13 2019 64 mins
    ISSA International
    A number of digital transformation initiatives are forcing businesses to rethink their enterprise security architecture. With breaches on the rise, users increasingly mobile, and data and applications moving to the cloud, businesses have to consider whether traditional perimeter-based security approaches are relevant.

    The live, online panel discussion will explore:

    Key business imperatives that are changing the way you need to think about security
    What a Zero Trust security model is and why you need it
    Difference approaches to Zero Trust Security
    Zero Trust adoption best practices

    Moderator:
    Tyler Cohen Wood, Executive Director, Cyber Risk and Workforce Development, CyberVista

    Speakers:
    Patrick Sullivan, Global Director, Security Strategy, Akamai Technologies
    Felice Flake, CEO, ScySec LLC
  • ISSA Thought Leadership Series: Is Your Organization Ready for Automation? Recorded: Feb 8 2019 58 mins
    ISSA International
    Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.

    Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?

    Join a panel of experts for an engaging discussion where you’ll learn:

    Key considerations that should be in place before implementing automation
    When is the right time to add automation (and when it isn’t)
    Which common security tasks are ideal to automate
    How to prepare your organization for SOAR

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management, Farmers Insurance

    Speaker:
    Scott King, Senior Director, Advisory Services
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions
    Jason Winder, Managing Director, Aerstone Labs
  • ISSA International Series: 2018 Year in Review and Predictions for 2019 Recorded: Jan 22 2019 121 mins
    ISSA International
    2018 was worse than 2017 for cyber security. This year every month was filled with even more major breaches, hacks, and attacks surfacing then 2017. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2018 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2019 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2019 landscape?

    Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2019 challenges to InfoSec.

    Moderator:
    James McQuiggan, Product & Solutions Security Officer, Service Americas Division, Siemens Gamesa Renewable Energy

    Speakers:
    Ricky Allen, CISO, Critical Start
    Ira Winkler, President, Secure Mentem
    Patrick Miller, Managing Partner, Archer International
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ISSA Thought Leadership Series: Security Event Overload-How to Net it Out
  • Live at: Oct 10 2018 5:00 pm
  • Presented by: ISSA International
  • From:
Your email has been sent.
or close