Hi [[ session.user.profile.firstName ]]

ISSA International Series; Attack of the BotNets- Internet of Terror loT

Attacks on IoT have been dreaded for the past 5 years. 2020 is supposed to be the year that these attacks will be realized, or will they? Is this another Y2K scare, or will IoT become real?
Live online Oct 22 4:00 pm UTC
or after on demand 120 mins
Your place is confirmed,
we'll send you email reminders
Presented by
ISSA International
Presentation preview: ISSA International Series; Attack of the BotNets- Internet of Terror loT

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • ISSA International Series: SDLC - Is it Useful? Nov 26 2019 5:00 pm UTC 120 mins
    ISSA International
    It has been almost two decades since the roll out and formal adoption of SDLC methodologies. This session will cover how they have evolved and will continue to evolve.
  • ISSA International Series; Attack of the BotNets- Internet of Terror loT Oct 22 2019 4:00 pm UTC 120 mins
    ISSA International
    Attacks on IoT have been dreaded for the past 5 years. 2020 is supposed to be the year that these attacks will be realized, or will they? Is this another Y2K scare, or will IoT become real?
  • ISSA International Series: New Trends in Security - Outsourcing and Other Tech Sep 24 2019 4:00 pm UTC 120 mins
    ISSA International
    As deployment models evolve so does the need for our responses. With technology such as Cloud, containers, and rapid update deployment rolling out, what's going on with security?
  • ISSA International Series: Legislative Aspects Aug 27 2019 4:00 pm UTC 120 mins
    ISSA International
    While GDPR and CCPA have been the focus for most professionals, legislation is not all about PII. Over the past year there have been numerous pieces of legislation and regulation drafted, which has been missed by most of us. With controls on export, technology use, IoT, consumer device security, and other things looming this is your chance to see what's going on.
  • ISSA International Series: Security Standards Organizations Jul 23 2019 4:00 pm UTC 120 mins
    ISSA International
    Security Standards Organizations - The good, the bad, and the ugly? This session covers the evolution of a number of technologies to address the evolving threat models. Changes to the SOC and response technologies will be included.
  • ISSA International Series: Privacy- GDPR a Year Later Jun 25 2019 4:00 pm UTC 120 mins
    ISSA International
    The first year is always the most critical as we wind our way through legislation with companies, courts, and people working to understand and adjust the rules. Well It has been one year since GDPR became active. In that time how many cases have been tried, fines levied, and what changes have been made?
  • ISSA Thought Leadership Series: Passwordless Authentication Jun 12 2019 5:00 pm UTC 60 mins
    ISSA International
    Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.

    It is time to remove human error from the equation.

    The adoption of passwordless authentication protects against phishing attempts and minimizes the threat of stolen credentials. Passwordless technology generally combines: Multi-layered risk analysis that evaluates location, devices, access rights and typing sequences; Intricate yet convenient 2FA/MFA methods;
    Biometrics and hardware authentication keys

    Learn how passwordless authentication works and how it can help you increase security while reducing friction for your users.
  • ISSA Thought Leadership Series: Exploring The Frontier For Maliciousness In IPv6 Jun 7 2019 5:00 pm UTC 55 mins
    ISSA International
    This year saw IPv6 adoption worldwide surpassing the twenty-five percent mark. While previously only used by some innovative attackers, the incentive to explore the space for fresh targets grows as more than a quarter of the Internet is now IPv6-capable. Many organizations are challenged with adequate monitoring their IPv6 networks, misconfigured devices and a shortage of time to implement IPv6 best practices.

    In this session we’ll aim to spur more conversations and curiosity in the IPv6 security space by:

    - Examining ways to enumerate an oasis of infrastructure in the large desert of addresses

    - Discussing current malware observed with IPv6 capabilities

    - Remarking on some already observed security issues with the protocol

    Moderator:
    Michael Levin, CEO/Founder, Center for Information Security Awareness

    Speakers:
    Chad Anderson, Research Engineer, DomainTools, LLC.
    Dipto Chakravarty, Chairman of Security COE, IoT Community
  • Security-as-a-Service for Small and Medium Sized Businesses Jun 5 2019 5:00 pm UTC 60 mins
    ISSA International
    How can IT security professionals take advantage of Security-as-a-Service to supplement their existing security programs?

    While cyber-attacks are increasing, your IT budgets and available security staff probably isn’t. You have too little time, too many alerts, and security tools are becoming more expensive and time consuming.

    In this presentation, Ryan Kelly, Solutions Engineer, AT&T Cybersecurity and Kevin Landt, VP of Product Management, Cygilant, will explore ways that IT security professionals can leverage Security-as-a-Service options, including:

    - Managed Detection and Response
    - Vulnerability Management
    - Patch Management
    - Managed SIEM
    - SOC-as-a-Service
    - Deployment scenarios
    - Pricing scenarios

    Learn how Security-as-Service can add 24x7 coverage and help improve the security posture of your organization.

    Speakers:

    Ryan Kelly - Solutions Engineer, AT&T Cybersecurity
    Kevin Landt, VP of Product Management, Cygilant
  • ISSA International Series: Breach Report- Review the Various Breach Reports May 31 2019 4:00 pm UTC 116 mins
    ISSA International
    This session will cover the traditional breach reports as well as a new style of reports and analysis.

    Moderator:
    Matt Mosley, Vice President of Security Products, Devo

    Speakers:
    Scott Parker, Sr. Principal Systems Engineer, Symantec
    Gabe Chomic, President, ISSA-UK
    Gary Marsden, Senior Director, Data Protection Services, Gemalto
  • ISSA International Series: Breach Response - Humans in Security May 28 2019 4:00 pm UTC 120 mins
    ISSA International
    At the end of the day it is not about the technology that runs the system but the humans that detect, respond, and or are co-opted to circumvent it. This session will provide insight into attacks as well as the human breach interactions.
  • Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React May 24 2019 5:00 pm UTC 55 mins
    ISSA International
    In this session, ExtraHop Deputy CISO Jeff Costlow will discuss how security operations teams can escape the cycle of reactivity characterized by constantly responding to a flood of alerts, and move toward a more proactive stance by using the right data sources and workflows, driven by network traffic analysis, to focus on developing proactive capabilities like continuous encryption auditing, policy auditing, and more advanced use cases like threat hunting.

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management for Farmers Insurance

    Speakers:
    Jeff Costlow, CISO, ExtraHop
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions.
  • ISSA Thought Leadership Series: What Is A CASB and Why Do You Need it? May 22 2019 5:00 pm UTC 60 mins
    ISSA International
    CASBs have quickly evolved into highly specialized solutions that are an essential part of any cloud security strategy. They help organizations to govern the use of the cloud and protect sensitive data. According to Gartner, at least 99% of cloud security failures will be the customer’s fault through 2023. So, how do you ensure that you have the right tools in place as your organization adopts more and more cloud applications?

     In this webinar you will learn:

    - How the CASB market has evolved beyond shadow IT?

    - How a CASB fits into the security landscape?

    - Gartner’s 4 pillars for CASBs

    - Common CASB use cases

    And more!
  • High Assurance Digital Identity in Zero Trust Architecture Recorded: May 17 2019 57 mins
    ISSA International
    The Zero Trust Architecture model accepts that secure data can no longer be adequately protected by network perimeter firewall design because there is no longer a physical network perimeter to protect. Digital entities (people and things) cannot be trusted until they have been authenticated through integrated digital ID services. High assurance digital identity has quickly become the center of IT cybersecurity. Fortunately, there are several side benefits to solving this security challenge.

    Moderator:
    Kurt Seifried, Chief Blockchain Officer and Director of Special Projects
    Cloud Security Alliance

    Speaker:
    John MacInnis, Product Marketing Manager, Identity & Access Management Solutions (IAMS), HID Global
  • ISSA Thought Leadership Series - Zero Trust: The Evolution of Perimeter Security Recorded: May 15 2019 59 mins
    ISSA International
    One key aspect of digital transformation for many companies has been the evolution and rise of the remote user. Application access from any device, anywhere has become an imperative for success, but with transformation comes challenges with attack surface and network vulnerability.

    Adopting a zero trust model is key to combat cybercriminals who are probing security perimeters and enterprise resources for vulnerabilities with a distinct purpose. Application access and identity is one of the key areas to begin.

    Join us on ……May 15th at 1pm EST for a discussion with Akamai security professional Faraz Siddiqui as he shares steps you can take to protect your network against breaches by evolving access policies and solutions.
  • ISSA Thought Leadership Series: Exploring The Frontier For Maliciousness In IPv6 Recorded: May 8 2019 56 mins
    ISSA International
    This year saw IPv6 adoption worldwide surpassing the twenty-five percent mark. While previously only used by some innovative attackers, the incentive to explore the space for fresh targets grows as more than a quarter of the Internet is now IPv6-capable. Many organizations are challenged with adequate monitoring their IPv6 networks, misconfigured devices and a shortage of time to implement IPv6 best practices.

    In this session we’ll aim to spur more conversations and curiosity in the IPv6 security space by:

    - Examining ways to enumerate an oasis of infrastructure in the large desert of addresses

    - Discussing current malware observed with IPv6 capabilities

    - Remarking on some already observed security issues with the protocol

    Moderator:
    Michael Levin, CEO/Founder, Center for Information Security Awareness

    Speakers:
    Chad Anderson, Research Engineer, DomainTools, LLC.
    Dipto Chakravarty, Chairman of Security COE, IoT Community
  • ISSA International Series: Threat Detection - Trends and Technology Recorded: Apr 26 2019 86 mins
    ISSA International
    The world is changing, attacks come at the speed of light, and are changing so fast detection is almost impossible. So, how do we tell when we are being attacked? What new technologies are coming down the pipe? This session will cover these and many more topics.

    Moderator:
    Gabe Chomic, President, ISSA-UK

    Speakers:
    Mohan Rao, CTO, RANK Software
    Brian Laing, SVP, Corporate Development & Strategic Alliances, Lastline
    Thomas Fischer, Security Advocate and Threat Researcher
  • ISSA International Series: Breach Report- Review the Various Breach Reports Recorded: Apr 23 2019 117 mins
    ISSA International
    This session will cover the traditional breach reports as well as a new style of reports and analysis.

    Moderator:
    Matt Mosley, Vice President of Security Products, Devo

    Speakers:
    Scott Parker, Sr. Principal Systems Engineer, Symantec
    Gabe Chomic, President, ISSA-UK
    Gary Marsden, Senior Director, Data Protection Services, Gemalto
  • Practical Advice for the Proactive SOC: How to Escape The Vicious Cycle of React Recorded: Apr 17 2019 56 mins
    ISSA International
    In this session, ExtraHop Deputy CISO Jeff Costlow will discuss how security operations teams can escape the cycle of reactivity characterized by constantly responding to a flood of alerts, and move toward a more proactive stance by using the right data sources and workflows, driven by network traffic analysis, to focus on developing proactive capabilities like continuous encryption auditing, policy auditing, and more advanced use cases like threat hunting.

    Moderator:
    Mikhael Felker, Director of Information Security & Risk Management for Farmers Insurance

    Speakers:
    Jeff Costlow, CISO, ExtraHop
    Michael Wylie, Director of Cybersecurity Services, Richey May Technology Solutions.
  • Up Up and Away: Why The Modern SOC is Rooted in the Cloud Recorded: Apr 12 2019 49 mins
    ISSA International
    Today’s SOC teams are struggling to gain efficiencies that are grounded by the limitations of legacy, on-premise technologies. As a result, organizations are turning to cloud-based solutions to offer the flexibility and scalability they need to keep pace with the modern threat landscape.


    It is critical that we explore the difference between cloud-native and cloud-based security operations center (SOC) technologies. From ensuring that you gain the performance and simplicity your team needs to fully leverage big data analytics to understanding the role that third party integrations will play in your evaluation, we’ll leave you thinking about the questions to consider as you evaluate new SOC technologies.

    Join JASK Vice President of Product Marketing Ken Liao and VP, Field Operations Andrew Maloney to learn about how migrating to a true cloud-platform solution can help your SOC organization with:


    - Improved automation of existing analyst workflows

    - Better visualization of big data analytics

    - Rapid integrations and improved context around threat details

    - Lower total cost of ownership and rapid innovation

    Speakers:
    Ken Liao- VP, Product Marketing, JASK
    Andrew Maloney VP, Field Operations, JASK
    Mark Gelhardt, VP, Technology Governance for US Bank
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ISSA International Series; Attack of the BotNets- Internet of Terror loT
  • Live at: Oct 22 2019 4:00 pm
  • Presented by: ISSA International
  • From:
Your email has been sent.
or close