Hi [[ session.user.profile.firstName ]]

ISSA Thought Leadership Series: 2019 Cybersecurity Trends to Watch

What’s really on the 2019 cybersecurity horizon? Join renowned PKI and cybersecurity expert, Ted Shorter, for a look into the future as he covers the 2019 cybersecurity trends to watch:



· Quantum computing & the need for crypto-agility

· The truth behind IoT vulnerabilities

· Cloud-first transformations

· The need for expansive digital security

Moderator:
Michael Levin, CEO/Founder, Center for Information Security Awareness

Speakers:
Ted Shorter, CTO and Co-Founder, Keyfactor
Jim Rutt, Chief Information Officer, Dana Foundation
Recorded Dec 5 2018 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
ISSA International
Presentation preview: ISSA Thought Leadership Series: 2019 Cybersecurity Trends to Watch

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • ISSA Thought Leadership Series: 10 Must-Have Features of a Modern SIEM Feb 20 2019 6:00 pm UTC 60 mins
    ISSA International
    With the return of innovation to the SIEM market, the definition of what comprises an effective solution has changed. Join Exabeam for an informative discussion on the ten essential features and capabilities for IT security decision makers to look for when evaluating potential candidates. Discussion points include:

    - Advanced processing and analytics
    - Automated threat detection and prioritization
    - Facilitated incident investigation and triage
    - Proactive (and reactive) threat hunting
  • Thought Leadership Series: Adopting Zero Trust as an Enterprise Security Model Feb 13 2019 6:00 pm UTC 60 mins
    ISSA International
    A number of digital transformation initiatives are forcing businesses to rethink their enterprise security architecture. With breaches on the rise, users increasingly mobile, and data and applications moving to the cloud, businesses have to consider whether traditional perimeter-based security approaches are relevant.

    The live, online panel discussion will explore:

    Key business imperatives that are changing the way you need to think about security
    What a Zero Trust security model is and why you need it
    Difference approaches to Zero Trust Security
    Zero Trust adoption best practices
  • ISSA Thought Leadership Series: Is Your Organization Ready for Automation? Feb 8 2019 6:00 pm UTC 58 mins
    ISSA International
    Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.

    Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?

    Join a panel of experts for an engaging discussion where you’ll learn:

    Key considerations that should be in place before implementing automation
    When is the right time to add automation (and when it isn’t)
    Which common security tasks are ideal to automate
    How to prepare your organization for SOAR

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management, Farmers Insurance

    Speaker:
    Scott King, Senior Director, Advisory Services
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions
    Jason Winder, Managing Director, Aerstone Labs
  • ISSA International Series: 2018 Year in Review Jan 22 2019 5:00 pm UTC 120 mins
    ISSA International
    2018 was worse than 2017 for cyber security. This year every month was filled with even more major breaches, hacks, and attacks surfacing then 2017. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2018 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2019 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2019 landscape?

    Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2019 challenges to InfoSec.

    Moderator:
    James McQuiggan, Product & Solutions Security Officer, Service Americas Division, Siemens Gamesa Renewable Energy

    Speakers:
    Ricky Allen, CISO, Critical Start
    Ira Winkler
  • ISSA Thought Leadership Series: Is Your Organization Ready for Automation? Recorded: Jan 9 2019 58 mins
    ISSA International
    Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.

    Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?

    Join a panel of experts for an engaging discussion where you’ll learn:

    Key considerations that should be in place before implementing automation
    When is the right time to add automation (and when it isn’t)
    Which common security tasks are ideal to automate
    How to prepare your organization for SOAR

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management, Farmers Insurance

    Speaker:
    Scott King, Senior Director, Advisory Services
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions
    Jason Winder, Managing Director, Aerstone Labs
  • ISSA Thought Leadership Series: 2018 User Risk Report Recorded: Dec 12 2018 60 mins
    ISSA International
    We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening.

    We will discuss the 2018 User Risk Report to see how employees shaped up globally and regionally on cybersecurity awareness issues that are impacting organizations worldwide, including:

    • Knowledge of phishing and ransomware

    • Safe use of WiFi, location tracking, and social media

    • Password habits (including password reuse)

    • The types of personal activities (shopping online, playing games, streaming media, etc.) that your organization's devices are being used for by employees and their families and friends

    Moderator:
    Michael Levin, CEO/Founder, Center for Information Security Awareness

    Speakers:
    Gretel Egan, Security Awareness and Training Strategist, Wombat Security, a division of Proofpoint
    Kelly Robertson, CEO, SEC Consult America
    Richard Bird, Chief Customer Information Officer, Ping Identity
  • ISSA Thought Leadership Series: 2019 Cybersecurity Trends to Watch Recorded: Dec 5 2018 59 mins
    ISSA International
    What’s really on the 2019 cybersecurity horizon? Join renowned PKI and cybersecurity expert, Ted Shorter, for a look into the future as he covers the 2019 cybersecurity trends to watch:



    · Quantum computing & the need for crypto-agility

    · The truth behind IoT vulnerabilities

    · Cloud-first transformations

    · The need for expansive digital security

    Moderator:
    Michael Levin, CEO/Founder, Center for Information Security Awareness

    Speakers:
    Ted Shorter, CTO and Co-Founder, Keyfactor
    Jim Rutt, Chief Information Officer, Dana Foundation
  • ISSA International Series: Security Professionals Dilemma Recorded: Nov 27 2018 102 mins
    ISSA International
    We as security professionals are faced with a multitude of dilemma’s in the performance of our duties. These dilemmas range in nature including the following questions;
    •What new technology do we need to protect against the latest threats?
    •How much security do we put into our infrastructures and yet still not be obtrusive?
    •Should we or can we hack back to stop an attack?
    •How often do we test?
    •How do we harmoniously integrate our operational processes with those of our enterprise?
    •How much time do we need to spend tracking laws and regulations?

    This webinar will attempt to provide insight into these issues and others as we move forward.

    Moderator:
    Mark Kadrich, Principal, Kadrich InfoSec Consulting Services

    Speakers:
    Matt Mosley, VP Products, Cybersecurity, Devo
    Karen Worstell, CEO, W Risk Group
    Geoff Horne, Distinguished Engineer and Senior Manager of SMEs, Infoblox Inc.
  • ISSA Thought Leadership Series: Micro-Segmentation 101 Recorded: Nov 14 2018 58 mins
    ISSA International
    Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.


    YOU'LL LEARN...

    Why you need micro-segmentation
    How micro-segmentation works
    The 5 steps to implementing a micro-segmentation strategy for your data center and cloud

    Moderator:
    David Vaughn, ISSA International Board of Directors Chairperson for Education & Professional Development

    Speakers:
    Vijay Chauhan, Senior Director of Product Marketing, Illumio
    Branden Williams, Director, Cyber Security, MUFG Union Bank N.A.
    John Donovan, ISSA Silicon Valley Chapter & Rook Security
  • The Threat Intelligence Playbook: Keys to Building Your Own Threat Intelligence Recorded: Nov 7 2018 60 mins
    ISSA International
    Acronyms such as IOCs (indicators of compromise) and IOAs (indicators of attack) are ubiquitous in the security industry. But a recent SANS Institute survey revealed that a vast majority of security professionals don't even know how many indicators they receive or can use. Join DomainTools Sales Engineer, Taylor Wilkes-Pierce to learn how IOCs and IOAs can work in tandem to build your own threat intelligence, enrich your investigations and overall security strategy.


    In this webinar, you will learn

    How security professionals go about sourcing indicators
    What can you do with IOCs/IOAs after locating valuable indicators
    To pivot through threat actor infrastructure and determine the "Who" and the "How Bad".

    Moderator:
    C-A Washington, Founder, Image & Etiquette Institute

    Speakers:
    Taylor Wilkes-Pierce, Sales Engineer, DomainTools
    Ken Dunham, Senior Director, Technical Cyber Threat Intelligence, Optiv
    Greg Reith, Sr. Solutions Architect, CenturyLink
  • ISSA International Series: Key & Residual Risk Indicators Recorded: Oct 23 2018 118 mins
    ISSA International
    While we continue to spend an ungodly amount of money on securing our infrastructure and trying to staff up security responders and improve corporate expertise, we are still getting hacked. Given that we do not have an unlimited budget and the availability of security expertise is extremely scarce, how can we survive? This webinar will bring us back to the basics with Key Risk Indicators and provide a way to re-think how we monitor and analyze residual risk.

    Moderator: Matt Mosley, VP Products, Cybersecurity, Devo

    Presenters:
    Pete Lindstrom, Research Vice President for Security Strategies, IDC
    Michael Angelo, Chief Security Architect, Micro Focus | NetIQ
  • ISSA Thought Leadership Series: Security Event Overload-How to Net it Out Recorded: Oct 10 2018 55 mins
    ISSA International
    How do you manage the thousands or tens of thousands of security alerts that are generated by your systems each day? Hear about strategies from practitioners who are dealing with “event overload” and then listen to a follow-up with a discussion about how security products that are building actionable information into their reporting in order to ease the burden.

    Moderator: Steve Tcherchian, CISO and Director of Product Management, XYPRO Technology

    Speakers:
    Robert Hamilton, Director, Product Marketing, Imperva
    Shelly Herschkovitz, Product Manager, Research & Innovation, Imperva
    Scott McCoy, IT Director, Medtronic
    Jessica Doyle, Director of Threat Assessment for Optiv
  • ISSA International Series: Latest & Greatest Security Attacks & Why They Happen Recorded: Sep 25 2018 87 mins
    ISSA International
    With all the money that we spend on precautions, and mitigations for security vulnerabilities, why do we keep on getting hacked? This question is not new, but will be looked at with respect to recent attacks, that have been successful. While not all of these attacks are brand new or represent unique vulnerabilities, they've been very effective. So come and join us as we look at the issues that are being exploited.
  • ISSA Thought Leadership Series: Eliminating Security Blind Spots in your AWS Recorded: Sep 19 2018 54 mins
    ISSA International
    As consumption of cloud services increases, security teams struggle to maintain visibility of the cloud assets in use across multiple environments throughout the enterprise. In fact, 43% of security pros say lack of visibility into cloud environments are their biggest operational headache. Cloud defenders struggle to answer two simple, but important questions: what do I have, and is it secure? The only way to answer these critical questions is with comprehensive security visibility of your AWS public cloud environments.

    Join us for a discussion on gaining security visibility across all of your AWS accounts, including best practices for:
    - Discovering workloads and resources in use across your AWS accounts, services, and regions
    - Reducing your attack surface by identifying and remediating security issues
    - Finding and responding to critical risks using different assessment methods (agent-based, agent-less, API, etc.)

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management, Farmers Insurance


    Speakers:

    Edward Smith, Product Marketing Principal, CloudPassage
    Matthew Hicks, Senior Principal, IT Security | Cyber Security Operations, Amtrak
    Alex Grohmann, Founder, Sicher Consulting
  • ISSA Thought Leadership Series: Cybersecurity risk is a shared responsibility Recorded: Sep 12 2018 63 mins
    ISSA International
    As organizations increase the quantity and complexity of digital services they provide to their customers they are increasingly relying on partners, vendors and 3rd parties to support them.

    This means that the old model of snapshot assessments is falling behind in providing the timely conversations needed in today’s dynamic environment where data sharing is assumed and partners are providing business critical services outside an organization’s infrastructure.

    Join us to discuss how digital attack surfaces are expanding, what information is available to assess risk, the methodology on what makes up a score and where to use them, how to engage in constructive conversations with your partners and showcase results to leadership.

    Moderator:
    Ken Dunham

    Speakers:
    Vamsi Gullapalli, Product Team, RiskIQ
    Steve Tcherchian, CISO, XYPRO Technology Corporation
    Wayne Proctor, Vice President, Information Security, WestRock
  • ISSA Thought Leadership Series: Email, the Original Sin Recorded: Sep 5 2018 58 mins
    ISSA International
    As email evolved from its early days, nobody could have predicted that there would one day be more than 3.8 Billion email users sending 270 Billion emails a day, and that email would become the number one source of cyberattacks. Business Email Compromise (BEC) and impersonation attacks are now one of the most insidious threats to organizations. Take a walk through the history of email with us to learn how email's "original sin" – its inherent lack of authentication – is being addressed with identity-based automated email authentication, including DMARC enforcement and other strategies to bring trust back to email.

    Moderator:
    David Vaughn, Director, ISSA International Board

    Speakers:
    Seth Blank, Director of Industry Initiatives, Valimail
    Karl Mattson, President, LA Cyber Lab
  • ISSA International Series: Regulation and Legislation Recorded: Aug 28 2018 124 mins
    ISSA International
    We all realize that our security jobs are much more than just specifying technology and controls, protecting and defending our infrastructure, and investigating incidents. Over the last year privacy has been mainstreamed with GDPR going into effect, California passed its own version of GDPR, and with 40 + privacy laws in the US, and more just over the horizon. In addition, some of the questions around cloud and privacy have been addressed with the Cloud Act (which gives government agencies direct access to consumer information in the cloud). We also see more government export controls looming on the horizon. These controls will impact cyber tools and techniques and our ability to test and mitigate vulnerabilities while complying with laws and regulations.

    While we may not have all the answers, we will review the current state of our world. To do this, we will bring in legislative and regulatory experts to discuss the changes and some of the directions we see looming.

    Some of the questions we will try to address are:

    what happens when these laws and regulations conflict with one another
    what happens when these controls impact our ability to do our job
    can we mitigate any of our liability by just getting insurance.

    Moderator:
    Michael Angelo, Chief Security Architect, Micro Focus | NetIQ

    Speakers:
    Maher Shomali, Partner, Thomsen & Burke LLP
    Randy Sabett, Cooley, LLP
    Lisa Angelo, Attorney, Cyber Law & Insurance
  • ISSA Thought Leadership Series: Cybersecurity Heroes Aren't Born...They're Made Recorded: Aug 22 2018 52 mins
    ISSA International
    Phishing continues to be one of the fastest growing and most malicious threats to the security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most sophisticated technical safeguards through carefully planned, socially-engineered emails that are only getting more advanced.


    During this panel, we will discuss key findings from Wombat’s 2018 State of the Phish™ and 2018 Beyond the Phish® Reports. You will gain insight into current vulnerabilities, industry-specific phishing metrics, and emerging threats.

    This collection of data is taken from tens of millions of simulated phishing attacks sent through Wombat’s Security Education Platform over a 12-month period; data compiled from nearly 85 million questions asked and answered inside the CyberStrength® Knowledge Assessments and interactive training modules, responses from quarterly surveys of InfoSec professionals; and an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors.

    We will also discuss best practices related to security awareness and training. Our panelists will highlight key components and common threads of some of the most successful programs, and help attendees identify ways to apply new techniques and increase the effectiveness of their own cybersecurity education initiatives.

    Moderator:
    Jorge Orchilles, SANS Instructor

    Speakers:
    Gretel Egan, Brand Communications Manager at Wombat, a division of Proofpoint
    Michael Levin, CEO & Founder, Center for Information Security
    Kurt Wescoe, Chief Architect, Wombat Security
  • ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility Recorded: Aug 8 2018 64 mins
    ISSA International
    On the eve of quantum computing, the definitive need for crypto-agility is greater than ever. The ability to locate, manage, and securely update digital certificates on a network or on a device seems like a simple task, yet with the advent of new Enterprise use cases and flourishing IoT device introductions, management at massive scale becomes a challenge. Facing mounting pressures, IT security personnel and product managers are tasked with implementing solutions fit for today’s environment plus tomorrow’s post-quantum world. Join renowned Public Key Infrastructure (PKI) expert and Certified Security Solutions (CSS) CTO, Ted Shorter, as he outlines the defense against quantum computing and the IoT device invasion, crypto-agility:

    · How can crypto-agility lend itself to a truly future-proof Enterprise and IoT device security strategy?
    · Cryptographic kryptonite: demystifying quantum computing
    · Challenges with digital certificate/device management at scale

    Moderator:

    Dr. Shawn Murray, Principal Scientist, US Missile Defense Agency & Director, ISSA International

    Presenters:

    Ted Shorter, CTO, Certified Security Solutions (CSS)
    Michael Gardiner, Principal Architect, Gemalto
    Michele Mosca, Founder, Institute for Quantum Computing
    Mike Brown, CTO & Co-Founder, ISARA Corporation
  • ISSA International Series: Trials & Tribulations of Social Engineering Recorded: Jul 24 2018 121 mins
    ISSA International
    We all know about social engineering and phishing; but ‘Is it as simple as sending an email or asking for a click?’ probably not. As hackers and attacks evolve, they will go from simple tricks to very sophisticated attacks. So how do we know what these attacks will be? Simply, we can’t. So how can we detect the new attacks? This session will cover the state of the attacks and the directions they are taking. Ultimately, we will discuss strategies and how we can define the science that will evolve to thwart the evolving various attacks

    Moderated by: Pete Lindstrom, IDC

    Presenters:

    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
    Andrew Lewman, Laxdaela Technology
    Ben Rothke, Senior Security Consultant, Nettitude
    Paul Williams, CEO, Clarity Consulting Corporation
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ISSA Thought Leadership Series: 2019 Cybersecurity Trends to Watch
  • Live at: Dec 5 2018 6:00 pm
  • Presented by: ISSA International
  • From:
Your email has been sent.
or close