Hi [[ session.user.profile.firstName ]]

ISSA Thought Leadership Series: Is Your Organization Ready for Automation?

Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.

Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?

Join a panel of experts for an engaging discussion where you’ll learn:

Key considerations that should be in place before implementing automation
When is the right time to add automation (and when it isn’t)
Which common security tasks are ideal to automate
How to prepare your organization for SOAR

Mikhael Felker, Director of Information Security & Risk Management, Farmers Insurance

Scott King, Senior Director, Advisory Services, Rapid7
Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions
Jason Winder, Managing Director, Aerstone Labs
Recorded Jan 9 2019 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
ISSA International
Presentation preview: ISSA Thought Leadership Series: Is Your Organization Ready for Automation?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Building a People-Centric Cybersecurity Strategy for Healthcare Dec 4 2019 6:00 pm UTC 60 mins
    ISSA International
    More than 99% of all targeted cyber-attacks rely on users to activate them. Nowadays, threat actors are not going after an organization's technology and infrastructure. They are going after your most valuable assets - your people and your data. So, do you know when or how your people are being targeted? Do you know who the most cyber-attacked people are in your organization? Are your Very Attacked People (VAPs) the same as your Very Important People (VIPs)?

    Join our cybersecurity experts for a deep dive into what the current healthcare threat landscape looks like, how a people-centric approach can help institutions identify and protect your end users, and the latest findings in healthcare threat research.

    In this session, we’ll share:
    •Why cybersecurity transformation is critical right now
    •What a people-centric approach means to today's healthcare threat landscape
    •How hospitals are leveraging a people-centric strategy to improve their security posture
    •How to better protect your patients' data and improve your end-users' safety
  • ISSA International Series: SDLC - Is it Useful? Nov 26 2019 5:00 pm UTC 120 mins
    ISSA International
    It has been almost two decades since the roll out and formal adoption of SDLC methodologies. This session will cover how they have evolved and will continue to evolve.
  • ISSA Thought Leadership Series: Cloud Key Management Nov 13 2019 6:00 pm UTC 60 mins
    ISSA International
    A range of information technology trends show that the cloud stampede continues unabated but more importantly, it’s a multi-cloud stampede. Meanwhile there are a range of both best practices and statements from cloud providers that put responsibilities on cloud consumers that they appear not to be aware of. This session will cover the aforementioned trends and responsibilities and provide guidance to IT experts on how to start to protect sensitive data stored in the cloud.
  • The Persistent Pernicious Myths and Hidden Truths of Cybersecurity Nov 6 2019 6:00 pm UTC 60 mins
    ISSA International
    IT implementors are made less successful due to ‘Technical Debt’. Cybersecurity suffers from ‘Myth Debt’, where the same untrue tropes are repeated and hold us back. It takes experience to recognize these myths, but worse still is they can mask the valuable truths that lie within the myth. These never-dying misunderstanding spread outside cybersecurity and falsely inform the IT and business leaders, making it harder still to stop bad things from happening.

    So let’s poke some holes in some myths, pick some or all:
    •Insider threat is the biggest worry
    •Great Pen Tests mean excellent security
    •Any attacker motivated enough can hack you easily
    •Security training and education of devs will get us secure code and apps
    •The cloud is secure. The cloud is insecure
    •Encrypting everything makes for strong security
    •Spending more on security makes security better
    •Excellent endpoint security means we no longer have to worry about network or other security
    •You can’t defend yourself against ransomware
  • ISSA International Series; Attack of the BotNets- Internet of Terror loT Oct 22 2019 4:00 pm UTC 120 mins
    ISSA International
    Attacks on IoT have been dreaded for the past 5 years. 2020 is supposed to be the year that these attacks will be realized, or will they? Is this another Y2K scare, or will IoT become real?

    Mark Kadrich, Principal, Kadrich InfoSec Consulting Services

    Don Shin, Lead DDoS Defender Advocate, A10 Networks
    Ryan Leirvik, Principal, Cybersecurity Management Solutions Practice, GRIMM
    David Merritt, VP, Applied Cognitive Solutions
  • Top Five Ways to Identify Automated Attacks to Your Website and Mobile Apps Recorded: Oct 16 2019 60 mins
    ISSA International
    Automated bot attacks are becoming increasingly sophisticated as they learn to avoid detection and stay unidentified longer.
    Tune in for the live webinar on October 16 at 10 am PT as Ido Safruti, co-founder and CTO at PerimeterX and Deepak Patel, VP of Product Marketing at PerimeterX, highlight the top five ways to identify automated bot attacks to your website. We will also cover:
    •Real use cases - attacks that happened in the real world
    •Practical strategies for identifying automated attacks
    Best practices for addressing and blocking bot attacks
  • The 7 Deadly Sins of Insiders: Why They Become Threats Recorded: Oct 9 2019 60 mins
    ISSA International
    In this panel webinar, ObserveIT’s Head of Security, Chris Bush, will discuss the topic of the risk from insider threats. We will illuminate the seven common motives—also known as the seven deadly sins—that influence insider threats, and share best practices for defending against them. We will explore what makes insider threats so different from traditional external threats. We’ll also cover:
    •The seven most common motives for insider threats
    •How to detect & investigate insider threats efficiently and accurately
    •What to do about insider threats in your supply chain
    •How to fit insider threat protection into your broader security program
    •Legal and privacy concerns that often arise within insider threat programs

    Ken Dunham, Senior Director, Technical Cyber Threat Intelligence, Optiv

    Chris Bush, Head of Security, ObserveIT
  • ISSA International Series: New Trends in Security - Outsourcing and Other Tech Recorded: Sep 24 2019 82 mins
    ISSA International
    As deployment models evolve so does the need for our responses. With technology such as Cloud, containers, and rapid update deployment rolling out, what's going on with security?
  • Identities are the new security perimeter in a Zero trust world Recorded: Sep 18 2019 47 mins
    ISSA International
    In a recent Thales survey, two thirds of CISOs cited the increase in cloud service adoption, combined with a lack of strong security solutions, as the main reasons cloud services are the prime targets of attack. As organizations undergo digital and cloud transformation, CISOs and security officers are operating in a high stress environment caused by security, compliance and manageability challenges.
    In this presentation we’ll discuss how identities are becoming the new security perimeter in a zero trust world and present best practices for implementing an access management framework that can help organizations remain secure – and scale – in distributed networking environments.


    Dipto Chakravarty, Chairman of Security, Privacy and Trust COE, IoT Community

    Felice Flake, CEO ScySec, LLC
    Ashley Adams, Product Marketing Manager for Authentication and Access Management, Thales
  • ISSA Thought Leadership Series: Update on the latest cyber threats and trends Recorded: Sep 11 2019 60 mins
    ISSA International
    How protected are you from the latest types of DDoS attacks? Our new cyber threats report confirms that DDoS attacks continue to be an effective means of inflicting damage to brand and revenue.
    During this webinar we’ll provide an in-depth look at our latest findings:

    •Growth and complexity of attacks
    •Emerging new attack trends
    •How to protect your online presence from new and evolving DDoS attacks
    •Which cyber threats most concern senior IT security executives

    And much more.

    Register to attend our webinar to understand the latest developments in DDoS attacks and how to mitigate them.


    Michael Levin, CEO/Founder, Center for Information Security Awareness


    Bob Weiss, CEO, WyzCo Group Inc
    Michael Kaczmarek, VP Product Management, Neustar
  • ISSA International Series: Legislative Aspects Recorded: Aug 27 2019 114 mins
    ISSA International
    While GDPR and CCPA have been the focus for most professionals, legislation is not all about PII. Over the past year there have been numerous pieces of legislation and regulation drafted, which has been missed by most of us. With controls on export, technology use, IoT, consumer device security, and other things looming this is your chance to see what's going on.

    Mathieu Gorge, Vigitrust

    Ross Nodurft, Senior Director of Cybersecurity Services, Venable
    Harley Geiger, Director of Public Policy, Rapid7
    Paul Lanois, Director, Fieldfisher
  • ISSA Thought Leadership Series: Paving the Way to a Passwordless Future Recorded: Aug 21 2019 64 mins
    ISSA International
    It is increasingly apparent that authenticating only with username and password is no longer sufficient as stolen passwords are responsible for 81% of data breaches. And even though many organizations have implemented multi-factor authentication (MFA) through mobile push, or One Time Passwords (OTP) via SMS and mobile apps, these authentication techniques have been shown to be vulnerable to account takeovers.

    Attend this webinar to learn:

    * How WebAuthn, the new web authentication standard, is paving the way for a highly secure passwordless future
    * The key benefits of passwordless login for your employees, partners, and customers
    * Best practices for enterprise authentication

    Abby Guha, Senior Director, Product Marketing, Yubico
  • ISSA Thought Leadership Series: Beyond the Phish - Snapshot of End User Behavior Recorded: Aug 14 2019 63 mins
    ISSA International
    Phishing is one of InfoSec's longstanding threats. But for cyber criminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cyber security threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cyber security topics and best practices. The report features analysis of data related to nearly 130 million cyber security questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end users about cyber security threats beyond email-based social engineering
    - The strengths and weaknesses among end users across 14 cyber security topics, highlighting how end-user knowledge levels vary across industries
    - A more holistic view of susceptibility by looking beyond knowledge assessments and training activities
    - How you can use this information to reduce the risk of successful cyber attacks within your organization

    Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.
  • ISSA International Series: Privacy- GDPR a Year Later Recorded: Jun 25 2019 103 mins
    ISSA International
    The first year is always the most critical as we wind our way through legislation with companies, courts, and people working to understand and adjust the rules. Well It has been one year since GDPR became active. In that time how many cases have been tried, fines levied, and what changes have been made?
  • ISSA Thought Leadership Series - Zero Trust: The Evolution of Perimeter Security Recorded: Jun 14 2019 58 mins
    ISSA International
    One key aspect of digital transformation for many companies has been the evolution and rise of the remote user. Application access from any device, anywhere has become an imperative for success, but with transformation comes challenges with attack surface and network vulnerability.

    Adopting a zero trust model is key to combat cybercriminals who are probing security perimeters and enterprise resources for vulnerabilities with a distinct purpose. Application access and identity is one of the key areas to begin.

    Join us on ……May 15th at 1pm EST for a discussion with Akamai security professional Faraz Siddiqui as he shares steps you can take to protect your network against breaches by evolving access policies and solutions.
  • ISSA Thought Leadership Series: Passwordless Authentication Recorded: Jun 12 2019 58 mins
    ISSA International
    Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.

    It is time to remove human error from the equation.

    The adoption of passwordless authentication protects against phishing attempts and minimizes the threat of stolen credentials. Passwordless technology generally combines: Multi-layered risk analysis that evaluates location, devices, access rights and typing sequences; Intricate yet convenient 2FA/MFA methods;
    Biometrics and hardware authentication keys

    Learn how passwordless authentication works and how it can help you increase security while reducing friction for your users.

    Stephen Cox, Vice President and Chief Security Architect, SecureAuth
    Mike McKinzie, Solutions Advisor, Swivel Secure
  • ISSA Thought Leadership Series: Exploring The Frontier For Maliciousness In IPv6 Recorded: Jun 7 2019 55 mins
    ISSA International
    This year saw IPv6 adoption worldwide surpassing the twenty-five percent mark. While previously only used by some innovative attackers, the incentive to explore the space for fresh targets grows as more than a quarter of the Internet is now IPv6-capable. Many organizations are challenged with adequate monitoring their IPv6 networks, misconfigured devices and a shortage of time to implement IPv6 best practices.

    In this session we’ll aim to spur more conversations and curiosity in the IPv6 security space by:

    - Examining ways to enumerate an oasis of infrastructure in the large desert of addresses

    - Discussing current malware observed with IPv6 capabilities

    - Remarking on some already observed security issues with the protocol

    Michael Levin, CEO/Founder, Center for Information Security Awareness

    Chad Anderson, Research Engineer, DomainTools, LLC.
    Dipto Chakravarty, Chairman of Security COE, IoT Community
  • Security-as-a-Service for Small and Medium Sized Businesses Recorded: Jun 5 2019 59 mins
    ISSA International
    How can IT security professionals take advantage of Security-as-a-Service to supplement their existing security programs?

    While cyber-attacks are increasing, your IT budgets and available security staff probably isn’t. You have too little time, too many alerts, and security tools are becoming more expensive and time consuming.

    In this presentation, Ryan Kelly, Solutions Engineer, AT&T Cybersecurity and Kevin Landt, VP of Product Management, Cygilant, will explore ways that IT security professionals can leverage Security-as-a-Service options, including:

    - Managed Detection and Response
    - Vulnerability Management
    - Patch Management
    - Managed SIEM
    - SOC-as-a-Service
    - Deployment scenarios
    - Pricing scenarios

    Learn how Security-as-Service can add 24x7 coverage and help improve the security posture of your organization.


    Ryan Kelly - Solutions Engineer, AT&T Cybersecurity
    Kevin Landt, VP of Product Management, Cygilant
  • ISSA International Series: Breach Report- Review the Various Breach Reports Recorded: May 31 2019 116 mins
    ISSA International
    This session will cover the traditional breach reports as well as a new style of reports and analysis.

    Matt Mosley, Vice President of Security Products, Devo

    Scott Parker, Sr. Principal Systems Engineer, Symantec
    Gabe Chomic, President, ISSA-UK
    Gary Marsden, Senior Director, Data Protection Services, Gemalto
  • ISSA International Series: Breach Response - Humans in Security Recorded: May 28 2019 117 mins
    ISSA International
    At the end of the day it is not about the technology that runs the system but the humans that detect, respond, and or are co-opted to circumvent it. This session will provide insight into attacks as well as the human breach interactions.
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ISSA Thought Leadership Series: Is Your Organization Ready for Automation?
  • Live at: Jan 9 2019 6:00 pm
  • Presented by: ISSA International
  • From:
Your email has been sent.
or close