Hi [[ session.user.profile.firstName ]]

How the Next Normal will require an Updated Cyber Strategy

As organizations begin to embrace some degree of change coming out of recent global events, it is hard for business and security professionals to determine what the impact to their security strategy will be. Leaders also have to evaluate which “quick-fixes” came with too much risk, and what changes to the strategy to secure internet-facing perimeter are required. In this talk, Advisory CISO at Akamai, Steve Winterfeld and Director of Technology & Security Strategy, also at Akamai, Tony Lauro will review some of the issues that need to be addressed as we establish a new baseline for both our employees and customers that will protect operations based on new business models.
Live online Jun 10 5:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
ISSA International
Presentation preview: How the Next Normal will require an Updated Cyber Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • TLS, Compliance and Zero Trust – Protecting Users from Themselves Jul 22 2020 5:00 pm UTC 60 mins
    ISSA International
    Modern cyberattacks are not limited to network intrusions from outside by hackers. “Internal threat actors” can often be found at the center of a complex mix of simple social engineering attacks and sophisticated, multi-staged infections and data breaches.


    The Zero Trust model, based on the simple principle of “trust nobody”, defines rules which enhance the security of networks against modern cyberattacks, whether they are initiated from the outside or within. However, with most of the internet traffic being encrypted, it is becoming increasingly difficult to implement the Zero Trust model in an effective way.

    In this webinar, we will look at:

    *The role of “internal threat actors” and TLS encryption in modern cyberattacks

    * How the Zero Trust model defines the future of cybersecurity

    * Why effective decryption is essential for a fool proof Zero Trust strategy.
  • ISSA Thought Leadership Series: BEC Attacks - Who's Impersonating Whom? Jun 17 2020 5:00 pm UTC 60 mins
    ISSA International
    The 2019 HMSS Cybersecurity Survey indicated that email is the initial point of compromise for healthcare cyber-attacks, with Business Email Compromise (BEC) becoming the favored tactic by cybercriminals. Because BEC emails do not carry malicious payload and are narrowly targeted, it’s difficult for health institutions to detect these attacks. With overall losses of more than $1.7 billion in 2019, BEC attacks are quickly becoming a significant headache for healthcare CISOs. Join us for a deep dive into the dos and don’ts when it comes to BEC, and best practices to mitigate against risk of this vital attack vector.
  • ISSA Thought Leadership Series: Preventing Burnout and Dealing with Adversity Jun 11 2020 4:00 pm UTC 120 mins
    ISSA International
    We hear so much about "burnout" these days. A 2019 Blind survey from tens of thousands of Tech professional indicated that 57.1% of them self-identify as "burned out." As a former serial CISO for iconic companies including Microsoft, our speaker, Karen Worstell, did the burnout saga not once, but twice, even pushing to the limits where her stress-related illness caused the loss of the use of her left arm for a year. It was in her training for the chaplaincy fellowship in Palliative Care at the VA that she fully understood the dynamics behind chronic unmanaged stress and its manifestations. in this two hour webinar, she will educate, motivate and inspire you to understand how to flameproof your career and handle adversity like a boss with actionable strategies you can use for yourself, your team, and your loved ones. You can download a completely free version of the workbook for this seminar at https://BeAnAlly.today.
  • How the Next Normal will require an Updated Cyber Strategy Jun 10 2020 5:00 pm UTC 60 mins
    ISSA International
    As organizations begin to embrace some degree of change coming out of recent global events, it is hard for business and security professionals to determine what the impact to their security strategy will be. Leaders also have to evaluate which “quick-fixes” came with too much risk, and what changes to the strategy to secure internet-facing perimeter are required. In this talk, Advisory CISO at Akamai, Steve Winterfeld and Director of Technology & Security Strategy, also at Akamai, Tony Lauro will review some of the issues that need to be addressed as we establish a new baseline for both our employees and customers that will protect operations based on new business models.
  • ISSA Thought Leadership Series: Women in Security Special Interest Group Jun 4 2020 5:00 pm UTC 60 mins
    ISSA International
    Jari will share her professional and personal experience to help you at any stage of your career in cyber security. She will share her own standouts, how those apply to her hiring and to her own career success—and yours.

    •You will gain insights and best practice in this series on how you can build new skills, while staying engaged for the long haul in our current global turmoil. We’ll bring to the table with our Guest Expert Speakers, successful strategies and approaches to security today and going forward, for women—and anyone—globally

    •You will be able to apply these to your current and future career in our field, to sustain or grow, at entry, mid-career, senior and executive level, or in transition, whether you hold a senior role, or aspire to something different than where you are today.

    •Think Big! And yet, at the smallest detail, what can you do to improve your opportunities at any stage? Our executive women will help you become more conscious of where opportunities best exist today for any of us, as an employee, executive, consultant, business owner, entrepreneur, or hiring manager. We will help you sustain for today, and build for your future.
  • How 2020 Changed Cyber Risk Management Jun 4 2020 3:30 pm UTC 45 mins
    Jerry Caponera, VP Cyber Risk Strategy
    Almost overnight COVID-19 upended everyday life as we knew it. A risk that we didn’t even know we faced took center stage both personally and professionally. In this webinar, learn how businesses’ approach to cyber risk management changed in 2020, including:
    - What’s driving cyber risk mitigation decisions today—and what’s very different than it was on January 1
    - Important factors to consider when re-prioritizing your cyber mitigation initiatives
    - Factoring in systemic or cascading risk to measure cyber risk across an entire company portfolio
    - Innovative ways to manage and communicate risk
  • ISSA Thought Leadership Series: CCPA Enforcement: What to Expect after July 1st Recorded: Jun 3 2020 61 mins
    ISSA International
    Signed into law on June 28, 2018, the California Consumer Privacy Act (CCPA) became effective on January 1, 2020. The next milestone will be on July 1, 2020, when the California Attorney General will begin enforcement for the CCPA. Non-compliance can result in the maximum fine of $7,500 per violation. When you consider how many consumer records you hold, the potential fines could stack up quickly if you don't take CCPA seriously. Since July 1st has yet to come, we still don’t know how enforcement will play out for companies, but the Attorney General has established a firm stance on compliance, and there are several indicators of his intent to firmly enforce. In this webinar we’ll cover the key indicators of enforcement and what you can do to prepare. We’ll also review the final version of the modified CCPA regulations.

    Speaker: Dan Clarke, President – IntraEdge

    Speaker: Dominique Shelton Leipzig, Partner Privacy & Security- Perkins Coie LLP
  • Continuous Audit - Achieve More Through Analytics Recorded: May 29 2020 51 mins
    Greg Jordan (Nationwide), Pat Shanahan (Nationwide), Emigdio Zambada (Nationwide), and Brian Sampsel (Covail)
    In honor of International Internal Audit Awareness Month (May 2020), come hear from Greg Jordan, Nationwide's Senior Vice President and Chief Audit Executive, Pat Shanahan, AVP Information Technology Audit Office, Internal Audit and Emigdio Zambada, Nationwide's IA Data Analytics Director, discuss how their department expanded the use of data & analytics by building a continuous auditing program in the cloud. Partnering with Covail, they leveraged advanced analytics like AI and have provided education and resources to all of their auditors to enhance their data analytics skill set.
  • Forecasting Cyber Threats Post Pandemic Recorded: May 27 2020 45 mins
    Richard Stiennon, Kurtis Minder, Jessica Gulick
    The world has changed, and so has your threat landscape. Join us for a discussion on how cyber attacks have pivoted their tactics and targets. From the latest on phishing kits to video threats, our experts will explore how changes in motives and targets is disrupting and increasing our threat landscape. Learn how to reframe your understanding of your threat profile and better defend and respond to these attacks.

    Our featured experts for this webinar include Richard Stiennon, chief research analyst at IT-Harvest and Kurtis Minder, CEO of GroupSense, GroupSense is a digital risk management company that delivers customer-specific intelligence.
    Here’s What Will Be Discussed:

    1) Threat actors are adapting their tactics and targets
    2) Changes in motives and targets are disrupting and expanding the threat landscape
    3) Understanding your threat profile to create a better cyber defense strategy.
  • ISSA Thought Leadership Series: Threat Reports Undone Recorded: May 26 2020 116 mins
    ISSA International
    It's everyone's favorite time of year. What will we learn from this year's breach reports? Join us as we review the latest data, look for lessons and trends, and help you understand what it all means. Our panel of experts will focus on how security professionals can learn from the data, and hopefully avoid becoming a statistic for next year's report.
  • Current Landscape of Mid-Market Threat Intelligence Recorded: May 20 2020 60 mins
    ISSA International
    The global threat landscape is changing. Mid-market enterprises are facing the same threats as larger ones. Attackers are no longer exclusively focused on high-value intellectual property of the assets of billion-dollar corporations; any organization handling sensitive information has become an inviting target for hackers to exploit.

    This interactive web conference will cover:

    •Do You Know the Risks?

    •Advanced Attacks Being Leveraged on Mid-Market Companies.

    •Why are Mid-Market Companies a Target?

    •How to Take Advantage of Threat Intelligence.
  • Trends and Statistics for Mobile Phishing in the Enterprise Recorded: May 13 2020 55 mins
    ISSA International
    Your employees work differently now; often using their own devices to access enterprise data from home, airports, shopping malls, and the local coffee shop. Employees working outside of their corporate perimeters, coupled with the shift to cloud-based services, opens a whole new door of vulnerabilities that organizations need to consider. Namely, phishing threats.

    Learn how evolving phishing threats can leave your corporate data unprotected, and how to address this common yet largely undetected issue.

    Attendees will learn:
    •Why is phishing a bigger problem on mobile
    •How big a concern mobile phishing is to your organization
    •Examples of phishing attacks targeting mobile users
    •How can you stop mobile phishing attacks in your organization
  • ISSA Thought Leadership Series: Empowering the Modern SOC Recorded: May 6 2020 58 mins
    ISSA International
    It's harder than ever before for analysts to keep up. The nature of today's operating environment has resulted in an ever-increasing volume of alerts paired with a growing complexity and scale of subsequent investigations. In this talk we will be discussing in depth what this means in the daily life of analysts, and how imperative it is to force multiply them to enable quicker and more effective response. We will explore the key role of operationalized threat intelligence, and why (and how) orchestrating it alongside SOC processes and technology can enable organizations to be more effective when detecting and responding to threats.

    Moderator:

    Alex Grohmann, Founder, Sicher Consulting

    Speakers:

    Sean Ennis, Product Manager, RSA
    Iain Davison, Security Architect & Technical Director of Strategic Alliances & OEM, ThreatConnect
  • ISSA International Series: Breaking Down Zero Trust: What does it actually mean? Recorded: Apr 28 2020 117 mins
    ISSA International
    Over the past six months we have heard the buzz phrase Zero Trust. Like most new concepts, it means different things to different people. While it sounds like a line from a SciFi series, ‘Trust no-one’, does it really mean you should not trust anything in an infrastructure, or does it mean that we should trust but verify? Join us as the presenters provide their take on Zero Trust and far or how little we should really trust things.

    Moderator:

    Thomas Fischer, Security Advocate and Threat Researcher

    Speakers:

    Vladimir Klasnja, Director, Cloud Architecture, Netskope
    Ross Asquith, Product Marketing Manager, Netskope
    James McQuiggan, Security Awareness Advocate, KnowBe4
  • ISSA Thought Leadership Series: Proofpoint State of the Phish 2020 Recorded: Apr 8 2020 62 mins
    ISSA International
    Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization taking a people-centric approach to phishing prevention? The sixth annual State of the Phish again delivers critical, actionable insights into the current state of the phishing threat, including:

    The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses.
    The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
    How organizations are delivering phishing awareness training, and the ways they measure program success

    3,500+ technology user insights: Results of a third-party survey of more than 3,500 working adults across seven countries—the United States, Australia, France, Germany, Japan, Spain and the United Kingdom—provide a global perspective on the cybersecurity awareness levels of the average end-user.

    A survey of more than 600 IT security professionals: Proofpoint surveyed IT security professionals from the same seven countries. They shared insights about what they’re experiencing within their organizations, how they are responding to attacks and the steps they’re taking to improve security postures.

    Nearly 50 million simulated phishing emails: Proofpoint compiled and analyzed data from nearly 50 million simulated phishing emails sent to end-users over a one-year period via its cloud-based Security Education Platform.

    More than 9 million reported emails: Proofpoint logged more than 9 million emails reported by their customers’ end users over a 12-month span.


    Moderator:
    Robert Martin, Sr. Security Engineer, Cisco Systems, Inc.

    Speakers:
    Gretel Egan, Security Awareness Training Strategist, Proofpoint
    Paige Yeater, Director of Information Security Program Management, Mainstay Technologies
    Steve Sanders, Vice President, Internal Audit, CSI
  • ISSA Thought Leadership Series: Dissecting Ransomware to Defeat Threat Actors Recorded: Mar 11 2020 61 mins
    ISSA International
    In 2019, ransomware has caused significant disruption for hospitals, transportation, government agencies, and more. This flavor of malware is particularly vicious and shows no signs of slowing. The positive side, however, is that there is much to be learned from these attacks and ransomware actor profiling can help inform cyber security strategy.

    In this webinar, join subject matter experts as they conduct data driven analysis highlighting the evolution of ransomware from a technical perspective. They will examine high impact samples like REvil, TeslaCrypt, Locky, SimpleLocker, and provide practical advice to defenders.

    This webinar will cover:

    •A deep dive into the evolution of malware
    •Analysis of high impact malware samples
    •Practical takeaways for defenders

    Moderator:
    Tim Mackey, Principal Security Strategist, Synopsys CyRC

    Speakers:
    Tony Buenger, Cybersecurity Manager & Deputy CISO, Auburn University
    Tarik Saleh, Senior Security Engineer & Malware Researcher, DomainTools
  • ISSA International Series: Supply Chain Security - Shifting Left Recorded: Mar 3 2020 116 mins
    ISSA International
    As Systems continue to be assaulted by hackers, we often wonder why and how they succeed. You have heard it said that they succeed because we have flaws in our cyber supply chain, but what is the cyber supply chain? We know it includes the software and (with recent news ) the hardware. But the chain can even include the environment (power grid, facilities, etc) and ultimately the people.

    Moderator:
    Michael Angelo, Chief Security Architect, Micro Focus | NetIQ

    Speakers:

    Thomas Fischer, Security Advocate and Threat Researcher
    James McQuiggan, Security Awareness Advocate, KnowBe4
  • Combating Business Email Compromise (BEC) & Email Account Compromise (EAC) Recorded: Feb 19 2020 59 mins
    ISSA International
    Since 2016, Business Email Compromise (BEC) and Email Account Compromise (EAC) have become an exponentially increasing problem, costing organizations over $26 Billion in losses according to the FBI. These very targeted attacks utilize public research and social engineering to target an organization’s people and fraudulently obtain funds and valuable information. So how can you better protect your end users in 2020?

    Join us for our webinar to learn more about these BEC and EAC attacks and how you can effectively protect your organization's most valuable assets: your people and your data. In this session we'll share:
    •Techniques for preventing these cyber threats
    •A framework for understanding where potential gaps exist
    •What a people-centric approach looks like to better protect your company

    Moderator:
    Lee Neely, Senior IT and Cybersecurity Professional, LLNL

    Speakers:
    Tanner Luxner, Product Marketing Manager, Proofpoint
    Sue Bergamo, CIO & CISO, Episerver
  • ISSA International Series: 2019 - A Year in Review Recorded: Jan 28 2020 55 mins
    ISSA International
    As we head into a new year, we continue to anticipate new and complicated challenges around Cyber Security. This past year we continued to see major breaches, hacks, and attacks surfacing and that does not look to be slowing down. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2019 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2020 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2020 landscape?

    Join us, make notes, and then check back in a year to see how our panel of experts did in providing insight and making predictions for the 2020 challenges to InfoSec.


    Moderator:
    James McQuiggan, Security Awareness Advocate, KnowBe4

    Speakers:
    Ira Winkler, Lead Security Principal, Trustwave
    Jim Reavis, CEO, Cloud Security Alliance
  • ISSA Thought Leadership Series: The Asset Management Resurgence Recorded: Jan 22 2020 59 mins
    ISSA International
    In the world of cybersecurity, asset management has been the boring sibling of more exciting things like threat hunting, deception, and automation. But the foundational challenges of understanding what devices, users, and cloud instances are in our environments have jumped to the top of CISOs priority lists. Despite the amazing tools we have in cybersecurity, teams still struggle to answer basic questions like: how many devices and cloud instances do I have, and are they secure?

    In this webinar, we’ll examine:
    •Why asset management has a bad reputation
    •What’s changed that has made security teams prioritize asset management for cybersecurity
    •The challenges around making sure all assets comply with security policies
    •Six essential questions you should know about every asset

    Moderator:
    David Vaughn, Director, ISSA International Board of Directors

    Speakers:

    Nathan Burke, Chief Marketing Officer, Axonius
    Brian Bethelmy, CISO, Mancon
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How the Next Normal will require an Updated Cyber Strategy
  • Live at: Jun 10 2020 5:00 pm
  • Presented by: ISSA International
  • From:
Your email has been sent.
or close