Hi [[ session.user.profile.firstName ]]

ISSA International Series: Privacy- GDPR a Year Later

The first year is always the most critical as we wind our way through legislation with companies, courts, and people working to understand and adjust the rules. Well It has been one year since GDPR became active. In that time how many cases have been tried, fines levied, and what changes have been made?
Recorded Jun 25 2019 103 mins
Your place is confirmed,
we'll send you email reminders
Presented by
ISSA International
Presentation preview: ISSA International Series: Privacy- GDPR a Year Later

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • ISSA International Series: SDLC - Is it Useful? Nov 26 2019 5:00 pm UTC 120 mins
    ISSA International
    It has been almost two decades since the roll out and formal adoption of SDLC methodologies. This session will cover how they have evolved and will continue to evolve.
  • ISSA International Series; Attack of the BotNets- Internet of Terror loT Oct 22 2019 4:00 pm UTC 120 mins
    ISSA International
    Attacks on IoT have been dreaded for the past 5 years. 2020 is supposed to be the year that these attacks will be realized, or will they? Is this another Y2K scare, or will IoT become real?
  • ISSA Thought Leadership Series: The 7 Deadly Sins of Insiders: Why They Become T Oct 9 2019 5:00 pm UTC 60 mins
    ISSA International
    In this panel webinar, ObserveIT’s Head of Security, Chris Bush, will interview two experts on the topic of the risk from insider threats. We will illuminate the seven common motives—also known as the seven deadly sins—that influence insider threats, and share best practices for defending against them. We will explore what makes insider threats so different from traditional external threats. We’ll also cover:
    •The seven most common motives for insider threats
    •How to detect & investigate insider threats efficiently and accurately
    •What to do about insider threats in your supply chain
    •How to fit insider threat protection into your broader security program
    •Legal and privacy concerns that often arise within insider threat programs
  • ISSA International Series: New Trends in Security - Outsourcing and Other Tech Sep 24 2019 4:00 pm UTC 120 mins
    ISSA International
    As deployment models evolve so does the need for our responses. With technology such as Cloud, containers, and rapid update deployment rolling out, what's going on with security?
  • ISSA Thought Leadership Series: Update on the latest cyber threats and trends Sep 11 2019 5:00 pm UTC 60 mins
    ISSA International
    How protected are you from the latest types of DDoS attacks? Our new cyber threats report confirms that DDoS attacks continue to be an effective means of inflicting damage to brand and revenue.
    During this webinar we’ll provide an in-depth look at our latest findings:

    •Growth and complexity of attacks
    •Emerging new attack trends
    •How to protect your online presence from new and evolving DDoS attacks
    •Which cyber threats most concern senior IT security executives

    And much more.

    Register to attend our webinar to understand the latest developments in DDoS attacks and how to mitigate them.
  • ISSA International Series: Legislative Aspects Aug 27 2019 4:00 pm UTC 120 mins
    ISSA International
    While GDPR and CCPA have been the focus for most professionals, legislation is not all about PII. Over the past year there have been numerous pieces of legislation and regulation drafted, which has been missed by most of us. With controls on export, technology use, IoT, consumer device security, and other things looming this is your chance to see what's going on.
  • ISSA Thought Leadership Series: Paving the Way to a Passwordless Future Recorded: Aug 21 2019 64 mins
    ISSA International
    It is increasingly apparent that authenticating only with username and password is no longer sufficient as stolen passwords are responsible for 81% of data breaches. And even though many organizations have implemented multi-factor authentication (MFA) through mobile push, or One Time Passwords (OTP) via SMS and mobile apps, these authentication techniques have been shown to be vulnerable to account takeovers.

    Attend this webinar to learn:

    * How WebAuthn, the new web authentication standard, is paving the way for a highly secure passwordless future
    * The key benefits of passwordless login for your employees, partners, and customers
    * Best practices for enterprise authentication

    Speaker:
    Abby Guha, Senior Director, Product Marketing, Yubico
  • ISSA Thought Leadership Series: Beyond the Phish - Snapshot of End User Behavior Recorded: Aug 14 2019 63 mins
    ISSA International
    Phishing is one of InfoSec's longstanding threats. But for cyber criminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cyber security threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cyber security topics and best practices. The report features analysis of data related to nearly 130 million cyber security questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end users about cyber security threats beyond email-based social engineering
    - The strengths and weaknesses among end users across 14 cyber security topics, highlighting how end-user knowledge levels vary across industries
    - A more holistic view of susceptibility by looking beyond knowledge assessments and training activities
    - How you can use this information to reduce the risk of successful cyber attacks within your organization

    Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.
  • ISSA International Series: Privacy- GDPR a Year Later Recorded: Jun 25 2019 103 mins
    ISSA International
    The first year is always the most critical as we wind our way through legislation with companies, courts, and people working to understand and adjust the rules. Well It has been one year since GDPR became active. In that time how many cases have been tried, fines levied, and what changes have been made?
  • ISSA Thought Leadership Series - Zero Trust: The Evolution of Perimeter Security Recorded: Jun 14 2019 58 mins
    ISSA International
    One key aspect of digital transformation for many companies has been the evolution and rise of the remote user. Application access from any device, anywhere has become an imperative for success, but with transformation comes challenges with attack surface and network vulnerability.

    Adopting a zero trust model is key to combat cybercriminals who are probing security perimeters and enterprise resources for vulnerabilities with a distinct purpose. Application access and identity is one of the key areas to begin.

    Join us on ……May 15th at 1pm EST for a discussion with Akamai security professional Faraz Siddiqui as he shares steps you can take to protect your network against breaches by evolving access policies and solutions.
  • ISSA Thought Leadership Series: Passwordless Authentication Recorded: Jun 12 2019 58 mins
    ISSA International
    Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.

    It is time to remove human error from the equation.

    The adoption of passwordless authentication protects against phishing attempts and minimizes the threat of stolen credentials. Passwordless technology generally combines: Multi-layered risk analysis that evaluates location, devices, access rights and typing sequences; Intricate yet convenient 2FA/MFA methods;
    Biometrics and hardware authentication keys

    Learn how passwordless authentication works and how it can help you increase security while reducing friction for your users.

    Speakers:
    Stephen Cox, Vice President and Chief Security Architect, SecureAuth
    Mike McKinzie, Solutions Advisor, Swivel Secure
  • ISSA Thought Leadership Series: Exploring The Frontier For Maliciousness In IPv6 Recorded: Jun 7 2019 55 mins
    ISSA International
    This year saw IPv6 adoption worldwide surpassing the twenty-five percent mark. While previously only used by some innovative attackers, the incentive to explore the space for fresh targets grows as more than a quarter of the Internet is now IPv6-capable. Many organizations are challenged with adequate monitoring their IPv6 networks, misconfigured devices and a shortage of time to implement IPv6 best practices.

    In this session we’ll aim to spur more conversations and curiosity in the IPv6 security space by:

    - Examining ways to enumerate an oasis of infrastructure in the large desert of addresses

    - Discussing current malware observed with IPv6 capabilities

    - Remarking on some already observed security issues with the protocol

    Moderator:
    Michael Levin, CEO/Founder, Center for Information Security Awareness

    Speakers:
    Chad Anderson, Research Engineer, DomainTools, LLC.
    Dipto Chakravarty, Chairman of Security COE, IoT Community
  • Security-as-a-Service for Small and Medium Sized Businesses Recorded: Jun 5 2019 59 mins
    ISSA International
    How can IT security professionals take advantage of Security-as-a-Service to supplement their existing security programs?

    While cyber-attacks are increasing, your IT budgets and available security staff probably isn’t. You have too little time, too many alerts, and security tools are becoming more expensive and time consuming.

    In this presentation, Ryan Kelly, Solutions Engineer, AT&T Cybersecurity and Kevin Landt, VP of Product Management, Cygilant, will explore ways that IT security professionals can leverage Security-as-a-Service options, including:

    - Managed Detection and Response
    - Vulnerability Management
    - Patch Management
    - Managed SIEM
    - SOC-as-a-Service
    - Deployment scenarios
    - Pricing scenarios

    Learn how Security-as-Service can add 24x7 coverage and help improve the security posture of your organization.

    Speakers:

    Ryan Kelly - Solutions Engineer, AT&T Cybersecurity
    Kevin Landt, VP of Product Management, Cygilant
  • ISSA International Series: Breach Report- Review the Various Breach Reports Recorded: May 31 2019 116 mins
    ISSA International
    This session will cover the traditional breach reports as well as a new style of reports and analysis.

    Moderator:
    Matt Mosley, Vice President of Security Products, Devo

    Speakers:
    Scott Parker, Sr. Principal Systems Engineer, Symantec
    Gabe Chomic, President, ISSA-UK
    Gary Marsden, Senior Director, Data Protection Services, Gemalto
  • ISSA International Series: Breach Response - Humans in Security Recorded: May 28 2019 117 mins
    ISSA International
    At the end of the day it is not about the technology that runs the system but the humans that detect, respond, and or are co-opted to circumvent it. This session will provide insight into attacks as well as the human breach interactions.
  • Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React Recorded: May 24 2019 55 mins
    ISSA International
    In this session, ExtraHop Deputy CISO Jeff Costlow will discuss how security operations teams can escape the cycle of reactivity characterized by constantly responding to a flood of alerts, and move toward a more proactive stance by using the right data sources and workflows, driven by network traffic analysis, to focus on developing proactive capabilities like continuous encryption auditing, policy auditing, and more advanced use cases like threat hunting.

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management for Farmers Insurance

    Speakers:
    Jeff Costlow, CISO, ExtraHop
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions.
  • ISSA Thought Leadership Series: What Is A CASB and Why Do You Need it? Recorded: May 22 2019 60 mins
    ISSA International
    CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud security failures will be the customer’s fault through 2023. So, how do you ensure that you have the right tools in place as your organization adopts more and more cloud applications?

     In this webinar you will learn:

    - How the CASB market has evolved beyond shadow IT?

    - How a CASB fits into the security landscape?

    - Gartner’s 4 pillars for CASBs

    - Common CASB use cases

    And more!
  • High Assurance Digital Identity in Zero Trust Architecture Recorded: May 17 2019 57 mins
    ISSA International
    The Zero Trust Architecture model accepts that secure data can no longer be adequately protected by network perimeter firewall design because there is no longer a physical network perimeter to protect. Digital entities (people and things) cannot be trusted until they have been authenticated through integrated digital ID services. High assurance digital identity has quickly become the center of IT cybersecurity. Fortunately, there are several side benefits to solving this security challenge.

    Moderator:
    Kurt Seifried, Chief Blockchain Officer and Director of Special Projects
    Cloud Security Alliance

    Speaker:
    John MacInnis, Product Marketing Manager, Identity & Access Management Solutions (IAMS), HID Global
  • ISSA Thought Leadership Series - Zero Trust: The Evolution of Perimeter Security Recorded: May 15 2019 59 mins
    ISSA International
    One key aspect of digital transformation for many companies has been the evolution and rise of the remote user. Application access from any device, anywhere has become an imperative for success, but with transformation comes challenges with attack surface and network vulnerability.

    Adopting a zero trust model is key to combat cybercriminals who are probing security perimeters and enterprise resources for vulnerabilities with a distinct purpose. Application access and identity is one of the key areas to begin.

    Join us on ……May 15th at 1pm EST for a discussion with Akamai security professional Faraz Siddiqui as he shares steps you can take to protect your network against breaches by evolving access policies and solutions.
  • ISSA Thought Leadership Series: Exploring The Frontier For Maliciousness In IPv6 Recorded: May 8 2019 56 mins
    ISSA International
    This year saw IPv6 adoption worldwide surpassing the twenty-five percent mark. While previously only used by some innovative attackers, the incentive to explore the space for fresh targets grows as more than a quarter of the Internet is now IPv6-capable. Many organizations are challenged with adequate monitoring their IPv6 networks, misconfigured devices and a shortage of time to implement IPv6 best practices.

    In this session we’ll aim to spur more conversations and curiosity in the IPv6 security space by:

    - Examining ways to enumerate an oasis of infrastructure in the large desert of addresses

    - Discussing current malware observed with IPv6 capabilities

    - Remarking on some already observed security issues with the protocol

    Moderator:
    Michael Levin, CEO/Founder, Center for Information Security Awareness

    Speakers:
    Chad Anderson, Research Engineer, DomainTools, LLC.
    Dipto Chakravarty, Chairman of Security COE, IoT Community
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ISSA International Series: Privacy- GDPR a Year Later
  • Live at: Jun 25 2019 4:00 pm
  • Presented by: ISSA International
  • From:
Your email has been sent.
or close