Hi [[ session.user.profile.firstName ]]

Security is the Ultimate Business Enabler

Strong security, risk, and compliance programs enable businesses to adapt to rapidly changing markets, focus on innovation, and take advantage of the many benefits of cloud computing architectures and supporting agile practices. The cloud gives customers access to the most flexible and secure computing environment available today. Building a solid foundation based on security best practices helps organizations be more agile, drive faster internal adoption and improve time-to-market.

Join our panelists to learn how:
- A strong security focus can be the ultimate business enabler.
- Understanding how high performing organizations focus on security engineering.
- Building reusable security patterns, to focus on automation, and securely enabling the larger organization’s success as part of digital transformation efforts.
Recorded Oct 21 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Clarke Rodgers and Stephen Quigg
Presentation preview: Security is the Ultimate Business Enabler

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • User-Centric Privacy: Designing Effective Protections that Meet Users' Needs Dec 17 2020 6:00 pm UTC 60 mins
    Florian Schaub, CIPP/US, CIPT Assistant Professor, University of Michigan School of Information.
    Privacy engineering aims to respect and protect user privacy. In order to ensure that privacy protections actually meet people’s privacy needs it is important to understand those needs, concerns and expectations and build privacy into systems with a user-centric perspective. This session will draw on the speaker's research regarding privacy notices and controls online, on smartphones and with smart speakers to discuss how and why privacy controls are often misaligned with user needs and how we can design privacy for users instead of past them. It will also examine how user studies can inform the design of user-centric privacy protections to more effectively meet user needs, as well as benefit companies.
  • The Rise of Zero Trust in the Digital Era Dec 2 2020 6:00 pm UTC 60 mins
    Dave Taku. Director Product Management, RSA Identity & Access Assurance
    Almost a decade since “Zero Trust” emerged as an approach to network security, the buzz around it is stronger than it has ever been. Zero Trust rejects the outdated idea that everything inside the internal network is safe, while everything outside it is unsafe.

    The recent rise of Zero Trust suggests the time has come to completely rethink how we define trust in considering how to secure critical data and resources. But why is Zero Trust in particular gaining traction now? And is it really the best way to ensure effective security today? To answer these questions, join this session with Dave Taku.
  • Reshaping Your SOC Team in the Wake of Remote Work Nov 19 2020 6:00 pm UTC 60 mins
    Jason Mical
    High-performing SOCs are aligned with organizational needs and deliver actionable business value, but leaders need to have sufficient talent, tools and technology in place to be successful. Analyst burnout continues to be a challenge in the industry. According to the Devo SOC Performance Report 78% of personnel say that working in the SOC is painful. CISOs have a responsibility to reduce the stress and pain that come with working in a SOC to ultimately improve retention and effectiveness.

    Join this webinar and hear industry experts discuss strategies to:
    •Identify common areas of analyst turnover and burnout
    •Share recommendations for improving the culture of the SOC
    •Learn measurements to validate improvements in SOC effectiveness
  • Securing Your Digital Future: Merging Mobile and Security Strategies Nov 18 2020 6:00 pm UTC 60 mins
    Steve Banda | Senior Manager, Security Solutions, Lookout
    Mobile devices, apps, networks, and cloud services are all interconnected and complex to manage, let alone, secure. Yet in today’s world of remote workers, organizations are tasked with the challenge of making mobile simple, secure, and scalable for all employees. With mobile devices at the intersection of our personal and professional, we need on-demand access to work resources as well as the immediate flexibility to manage our personal tasks. Security is essential but privacy must be respected.

    This session demonstrates how mobile management and security strategies are merging to satisfy the requirements of a mobile-first world. We will cover how managed and unmanaged devices – app security, malware, phishing and content protection, identity management, and security intelligence services – integrate to make it easier to scale device and platform deployment, while gaining visibility and remediating today’s advanced mobile threats.
  • Deceiving the Attacker Nov 17 2020 5:00 pm UTC 60 mins
    Diana Kelley | Chris Roberts | Christina Fowler
    When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach.

    Join this episode of The (Security) Balancing Act to discover how deception technology can be used by organizations to detect, investigate and respond to malicious intruders. How does deceiving the attacker save your company and buy you time?

    During this episode, we'll go over:
    - What is deception technology and what does it help with?
    - How does it work? (e.g. Deception decoys, lures, honeytokens, traps, grids)
    - Is your organization ready to adopt deception?
    - What do you need to do before you buy the technology / build it in-house?
    - Key benefits of using deception for threat hunting
    - What else can deception be used for?
    - Deception use cases
    - The role of AI in deception (e.g. dynamic deception)

    - Chris Roberts, vCISO, Researcher, Hacker, Consultant, Devils Advocate
    - Christina Fowler, Chief Cyber Intel Strategist at MITRE Corporation

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Supply Chain Fraud- A Critical Vector in Email Fraud Attacks Nov 11 2020 6:00 pm UTC 60 mins
    ISSA International
    Among various types of business email compromise (BEC) and email account compromise (EAC) attacks, supply chain fraud often accounts for the biggest financial losses. These types of threats leverage both impersonation and account compromise and are often used jointly in the same attack. So how can you better protect your company and your end users?

    Join our experts for a webinar on how to identify and gain visibility to these cyber threats to reduce your supply chain risk.

    In this session we'll talk about:
    •The BEC/EAC variants
    •Real life examples of supply chain fraud attacks
    •How to address email scams from supply chain
  • Lessons from a global transformation initiative for emerging leaders Nov 5 2020 6:00 pm UTC 60 mins
    Wendy Ng. Head of IT Strategy at Experian
    In 2019 and 2020, Wendy Ng had the privilege of being a subject matter expert for Experian’s DevSecOps transformation program.

    DevSecOps describes a set of practices that speed up quality software development by encouraging collaboration between the previously separate disciplines of software development, security and IT operations. In this presentation, Wendy will share some of the lessons learned and behaviors that supported the transformation initiative, which may also help you in your leadership journey.
  • Using Jupyter Notebooks for Repeatable Investigation Automation Nov 4 2020 6:00 pm UTC 60 mins
    Chad Anderson, Senior Security Researcher, DomainTools
    Given the current economic climate and scrutinized security budgets as a result of COVID-19, security teams are finding it more difficult to fill gaps in their threat intelligence collection requirements, therefore limiting their potential effectiveness and efficiency.

    This leaves analysts asking themselves questions like: if I’m starting an investigation from a single or list of indicators, how can I move faster and act as a force multiplier on my team? The resounding answer from seasoned security professionals is automation. In this webinar, join subject matter experts to learn how to harness the power of automation, use open source tools and data sources to build Jupyter Notebook playbooks, and effectively collaborate with team members.

    In this webinar you will learn:
    •The value of using automation in your investigations
    •Practical strategies for collecting information on indicators
    •How to take advantage of pre-existing Jupyter Notebooks playbooks
  • Securing WhatsApp - What You Need to Know Today Oct 28 2020 5:00 pm UTC 60 mins
    Cosimo Mortola, Senior Intelligence Analyst, GroupSense
    Already a popular platform, WhatsApp, the Facebook-owned smartphone instant messaging service, posted the biggest gains due to COVID-19 according to Tech Crunch. Learn why this ubiquitous messaging app could be a security risk and what you need to know to secure WhatsApp.
    In this session, you’ll discover:
    + How metadata and message data storage expose you to critical risk
    + Why the legal agreement should give you pause
    + Why WhatsApp is an effective platform for spreading disinformation
    + How the phones and humans using them increase your vulnerability
    + How to increase secure use of the app and mitigate your risk
    + Why WhatsApp leveraged by sophisticated threat actors

    Speaker: Cosimo Mortola is a senior intelligence analyst at GroupSense. Cosimo previously tracked threat actors at MassMutual, and Russian disinformation and associated threat activity at FireEye. Cosimo is fluent in Russian, French, and Italian.
  • Understanding, assessing, and mitigating insider threats Oct 27 2020 5:00 pm UTC 60 mins
    ISSA International
    Insider Threats are one of the top risks on many organizations list of top threats. They can be divided in three categories which require different view points for mitigating: malicious insiders, negligent insiders, and infiltrators. In this webinar, we look at all three and how organizations can assess and mitigate the risks of insider threats.
  • 2021 Cybersecurity Budget Must Haves for Every SMB Oct 27 2020 4:00 pm UTC 30 mins
    Alex Nette, President & CEO, Hive Systems + Michael Cardman, CFO, Hive Systems
    The pressure is on to maximize - possibly reduce - your IT spend, but you know that cybersecurity is critical. As many as 60% of hacked small and medium-sized businesses go out of business after six months. But, how much is right to spend? This 30-minute live discussion between Alex Nette, one of the leading cybersecurity experts for small-medium businesses, and Michael Cardman, a results-oriented financial expert will help you determine:
    + What are the must-haves for your 2021 cybersecurity budget? How do you calculate what to spend?
    + Given your business and your systems, applications and software, what’s the right approach for you?
    + How do you do more with less?

    This webinar draws on years of experience in working with business and IT professionals to help them craft the right spend strategy. Both Alex and Michael will provide a number of best practices for you to consider, but also show you the behind the scenes tools they’ve used for years! See what happens when IT and cybersecurity gets real with a CFO.
  • The Life and Times of Cybersecurity Professionals 2020 and The Impact of COVID - Oct 26 2020 5:00 pm UTC 60 mins
    Candy Alexander and Jon Oltsik
    Candy and Jon will walk you through the findings, provoking a discussion on what the data means to you. They will share ways to relate this information to your professional career and utilize the data within your organization. Further, they will provide insight into the future of cybersecurity as it relates to business strategy and mission during and post COVID-19.
  • Security is the Ultimate Business Enabler Recorded: Oct 21 2020 58 mins
    Clarke Rodgers and Stephen Quigg
    Strong security, risk, and compliance programs enable businesses to adapt to rapidly changing markets, focus on innovation, and take advantage of the many benefits of cloud computing architectures and supporting agile practices. The cloud gives customers access to the most flexible and secure computing environment available today. Building a solid foundation based on security best practices helps organizations be more agile, drive faster internal adoption and improve time-to-market.

    Join our panelists to learn how:
    - A strong security focus can be the ultimate business enabler.
    - Understanding how high performing organizations focus on security engineering.
    - Building reusable security patterns, to focus on automation, and securely enabling the larger organization’s success as part of digital transformation efforts.
  • Ransomware Negotiation Do’s and Don’ts with an Expert Negotiator Recorded: Oct 21 2020 44 mins
    Kurtis Minder, GroupSense and Jessica Gulick (Host), Katzcy
    No one ever expects it to happen to them. But with ransomware and cybercrime on the rise, it’s more likely than ever to discover that ransomware has locked down your system and cybercriminals are holding your data hostage. Kurtis Minder, an expert ransomware negotiator, advises executive teams when their worst cybersecurity nightmares come to life. Join us for an interview with Kurtis as we discuss:

    + What most people don’t realize about ransomware and the cybercriminals that run these exploits
    + Immediate do’s and don’t if your systems are being held captive
    + How to limit potential damage like data loss, overpaying threat actors, tarnished brand reputation, and compliance violations
    + Team Event: who to involve and when
  • Address the Hidden Risk in Cloud Infrastructure Recorded: Oct 14 2020 58 mins
    Arick Goomanovsky
    Address the Hidden Risk in Cloud Infrastructure: Misconfigured Identities, Access & Privileges

    In the public cloud, thousands of human and machine identities, roles, policies, entitlements and configurations determine what hackers can do if they gain a foothold in your environment. One excess permission or open port can make the difference between a failed breach attempt and devastating data loss. By 2023, Gartner predicts that 75% of cloud security failures will result from inadequate management of identities, access and privileges. First-generation cloud security solutions do not give you visibility into access entitlements and risks. And the complexity of cloud infrastructure and development velocity make it virtually impossible to analyze and remediate at scale.

    In this session we’ll discuss:
    •The hidden threats to AWS, Azure and Google Cloud Platform
    •The difference between managing human and machine identities
    •How identity and network configuration affect data security
    •Automating public cloud security throughout the software lifecycle
  • Live Demo – Security Awareness Training Recorded: Oct 8 2020 30 mins
    Sean Walker, Sr. Account Executive at Proofpoint
    99% of the attacks in 2019 require human interaction to succeed. Attackers are becoming more sophisticated and using new lures to deliver malware, obtain credentials, and complete wire fraud. It's more important than ever to change user behavior while staying ahead of the changing threat landscape. Proofpoint Security Awareness Training helps you deliver the right training to the right people, so they have the right response to today’s dangerous attacks.

    Join our live demo to learn how to:
    - Assess your users’ susceptibility to phishing and other threats
    - Maximize user behavior change with a wide variety of content training modules, videos, games, and sketches
    - Enable your employees to report suspicious messages with a single mouse click and have malicious messages automatically identified and removed
  • Session 2 – From Security Liability to Asset: Develop Proactive and Resilient Us Recorded: Oct 8 2020 47 mins
    Susan Mackowiak & Mike Bailey. Proofpoint
    End users are the number one threat vector for any organization. They present the greatest risk to information security, data loss, and privacy compliance. But with the right knowledge, awareness, and tools, your users can become proactive defenders, alerting you to threats and taking action to help protect your organization. So how can you turn your users from a security liability to an asset?

    Join us as our experts examine a systematic approach based on proven strategies to help you develop proactive and resilient users. In this session, we'll discuss how to:
    - Assess the knowledge and awareness needs of the organization
    - Leverage best-practices to implement a sustainable, engaging and effective program
    - Identify high-risk users, roles, and departments
    - Obtain executive buy-in and support
    - Track, communicate metrics and reports to showcase results
  • Keynote – User Behavior: Why & How to Build a Security Culture Recorded: Oct 8 2020 45 mins
    Chris Borales, Dir. of Information Security Awareness at Discovery, Inc. Mark Guntrip, Group Product Marketing Director at P
    Security awareness training is more than a countermeasure to phishing and social engineering. It is the foundation for establishing people-centric security. The responsibilities of IT users continue to increase, and organizations need to infuse their cultures with security and privacy knowledge that yields risk reduction and operational improvements.

    Join our experts as they discuss the importance of building a security-aware culture and how it brings qualitative and quantitative improvements. In this session, you’ll learn how a culture of security awareness helps:
    - Build a security culture that reduces risk
    - Identify key metrics for your organization’s people-centric risk
    - Improve efficiency related to help desks, training administration, and incident response
    - Meet training requirements for privacy
  • Modernizing application access for a remote workforce Recorded: Oct 7 2020 60 mins
    Chinedu Egonu
    Remote work has become mainstream in a very short amount of time. Companies across multiple industries had to adjust very quickly with varying amounts of difficulty to this new normal where most of the employees are working remotely. This new normal also exacerbates existing administrative issues and presents new ones.

    Join us in this webinar as we discuss;
    •Steps companies took to achieve business continuity in a short time
    •Challenges faced by technologies chosen to facilitate remote work
    •Long term approaches available to better secure your remote workforce
  • How She Got There—Women in Health IT Recorded: Oct 6 2020 58 mins
    Moderator: Karen Diamond, Vice President of Strategic Accounts, pureIntegration
    Women are increasingly finding a career in healthcare IT. According to a recent article in Healthcare Finance News, women make up 66% of all entry-level healthcare employees and 30% of C-suite positions in healthcare IT.*

    Our panelists are challenging the ecosystem—transforming the information technology space in healthcare, driving improved patient care, and leading with a purpose.

    Join us for an open and honest hour-long conversation with influential women in healthcare information and technology who are leading the way to a more diverse and enriched community. Gain a better understanding of the challenges and opportunities that these female executives have experienced as they have navigated their careers. Learn from them how they are leading their organizations to digitally transform and serve their patients in more effective ways. Discover how they see the healthcare ecosystem evolving to achieve more diversity and balance in the workforce.

    Webinar host pureIntegration is an IT consulting services firm, led by a team of 53% women and minorities.

    *Reference: https://www.healthcarefinancenews.com/news/women-healthcare-hold-most-manager-positions-lack-minority-representation-persists
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security is the Ultimate Business Enabler
  • Live at: Oct 21 2020 5:00 pm
  • Presented by: Clarke Rodgers and Stephen Quigg
  • From:
Your email has been sent.
or close