Hi [[ session.user.profile.firstName ]]

Zero Trust and the New Normal of Cybersecurity

2020 was an eventful year for cybersecurity, with an unprecedented rise in cyberattacks. Many organizations were caught off guard as the pandemic accelerated and dictated the need for remote work and education. However, the accelerated move to everything cloud has left many wondering about the future, whether their on-premises investments have been rendered obsolete or if the “new normal” would only rely on cloud-only solutions.

The pandemic has also highlighted the need for fool-proof Zero Trust implementations to enhance the security of networks against modern cyberattacks, whether they are initiated from the outside or within. However, with most internet traffic encrypted, it is becoming increasingly difficult to effectively implement a Zero Trust approach.

In this webinar, we will discuss:
* What the “new normal” of cybersecurity might look like in a post-pandemic world
* What role will Zero Trust play in the future of cybersecurity
* Why effective decryption is essential for a fool-proof Zero Trust implementation
Recorded Jun 30 2021 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Doug McKillip, Solutions Architect, A10 Networks and Babur Nawaz Khan, Product Marketing, A10 Networks
Presentation preview: Zero Trust and the New Normal of Cybersecurity

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Is there a coming phishpocalypse? Dec 6 2021 6:00 pm UTC 60 mins
    Phil Syme, CTO and Co-Founder
    Is there a coming phishpocalypse? Generating (and detecting) phishing and spam emails with state-of-the-art language neural networks.

    Deep language-based neural networks are surprisingly good at generating and detecting text of all forms. Some AI labs have been hesitant to release the details of their models for fear that they would be used to spread fake news, spam, and disinformation. What if they were used to generate phishing campaigns, for example?

    This talk will dive into the details of how phishing and spam emails can be created with these novel text generation neural-networks. The talk will also explain how these kinds of emails can be identified and prevented.

    Join this talk to learn:
    • Background on neural networks in the security space
    • A primer on text generation using state-of-the-art neural networks
    • How phishing, spam, and malicious emails can be generated using these techniques.
    • Detection techniques for neural-network generated malicious emails
  • Pragmatic steps to reduce your software supply chain risk Dec 1 2021 6:00 pm UTC 60 mins
    Cindy Blake, Senior Security Evangelist at GitLab
    Recent supply chain attacks, along with the U.S. Executive Order on Cybersecurity, have raised the priority of software security. At the same time, security and compliance teams may feel that security risk is a bit out of control given the rapid evolution of DevOps. With all eyes on secure coding, how do you ensure proper depth and breadth of app sec testing? How do you meet development deadlines without slowing down for security? This talk will address how to best approach modern software security by automating your CI pipeline for simplicity, visibility, and control.
    You will learn:
    o What's changed that makes application security and compliance even more challenging?
    o Redefining the DevSecOps approach to meet these new challenges
    o 5 key requirements to achieve DevSecOps 2.0
  • Thoughts on operationalizing your threat intelligence capabilities Nov 18 2021 6:00 pm UTC 60 mins
    Ben Smith
    In this webinar, you’ll hear about some common challenges organizations face when putting their threat intelligence to work, whether it’s sourced internally or externally. Too many SOCs are drowning in data today, and there is almost always room to improve how you consume and apply your existing threat intelligence – as an example, many successful SOCs integrate their threat intelligence capability directly within their orchestration and automation solution (SOAR). You’ll hear some thoughts around how to make the most of your existing threat intelligence data, and you’ll leave the webinar with some actionable ideas to consider within your own environment.
  • Cloud Security: Locking down the Unintended Exposure of Sensitive Data Nov 17 2021 6:00 pm UTC 60 mins
    Kurt Van Etten, Chief Product Officer, RedSeal
    In a recent survey of over 100 IT/Security professionals nearly 2/3 reported that sensitive data has been exposed as a result of cloud misconfigurations. Additionally, 93% reported they are highly concerned about the potential impact of cloud misconfiguration. In this session the panel will discuss why unintentional exposure of sensitive data is so rampant, and how the industry is responding.
    We will discuss ways security teams can
    • Gain Visibility into their multi cloud and hybrid environments.
    • Best ways to leverage native CSP and Kubernetes security controls.
    • Recommended uses of third-party cloud security controls.
    • Steps to continuously monitor and prevent unintended exposure of sensitive data.
  • CISO 2.0 Security Eco-system for Dev, Multi-cloud, and Digital Transformation Nov 4 2021 5:00 pm UTC 60 mins
    Mary Gardner
    Women in Security Webinar
    CISO 2.0: Security Eco-system for Development, Multi-cloud, and Enterprise Digital Transformation

    Mary shares her story and passion, her career evolution and how she supports ever changing technology while also protecting the business eco-system: Multi-cloud, development, and enterprise digital evolution today; dealing with hackers, threats, bots and ransomware; leading a remote security function and staff; building your career beyond platforms, product lines and verticals; and successfully leading a security organization, including staffing and managing successful employees and the talent pipeline.
  • IT Budgeting for an Uncertain 2022 Nov 3 2021 5:00 pm UTC 60 mins
    Josh Aaron - Aiden, Keith Moss - PAAMCO Prisma, Bill Murphy - Cresting Wave, Tunde Oni-Daniel - OneMain Financial
    COVID-19 spikes are keeping employees virtual, ransomware is inevitable, and finding
    expert talent is proving difficult. If 2022 is anything like this year, preparing for disruptions
    now will set up organizations to be more successful. So how can you maximize your 2022 IT
    budget and stay secure, all while managing a “work from anywhere” chaotic environment?

    Join IT and Cybersecurity leaders as they discuss how you can optimize and promote your future budget
    in such an unstable atmosphere. The panel will give insights on:
    - What solutions should you be considering when preparing for a “Work from
    Anywhere” future?
    - What are some key takeaways from the 2021 budget cycle to take with you into
    - What are the foundational elements that you must fit into your IT budget? How can
    you balance them with all of your other priorities?
    - How can you more effectively sell to executive leadership the idea that we need to
    keep up with the industry, make changes, and take a fresh look at things?
    - How do you prepare different budgetary presentations for different audiences, and
    defend your plan against dissenting opinions?
  • Life of a CISO Nov 2 2021 4:00 pm UTC 60 mins
    Eric Cole, PhD, is an industry-recognized security expert with over 20 years of hands-on experience.
    In this podcast, Dr. Cole will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense. You’ll also get a prioritized checklist of actions that you can take right away to reduce the risk of an attack and mitigate one in progress..

    The constant barrage of security threats is not going to let up, and if you wait to respond, it will already be too late.
  • Cyber Insurance Oct 27 2021 5:00 pm UTC 60 mins
    Kathy Ahuja
    With identity-based ransomware attacks on the rise both in volume and dollar amount demanded, cyber insurance companies are starting to require security measures as a precondition for eligibility. Many cyber insurance firms are using cybersecurity tools to run an analysis of clients’ controls to make sure they are up to par. In the event where coverage is offered, many insurance providers are declining to take new clients or are capping amounts at about half of what they used to be for some clients.Join OneLogin’s Vice President of Global Compliance & IT on October 27, at 10am PT to learn more about

    Cyber insurance policy requirements
    Best practices to qualify for insurance and remain insured
    Features that provide protection mandated by insurance providers
  • Privacy SIG Series: Can I trust anyone to safeguard my privacy? Recorded: Oct 19 2021 60 mins
    Aaron Ferraiuolo
    Technology Service Providers are privacy caretakers due to the volume of information they must collect, process, and then pass on to their suppliers. Many of their suppliers in turn share data with affiliates who may or may not be subject to the same privacy and security standards or ethical use of information as the original customers specifics to the technology provider. The challenges and risks that technology providers have to balance when it comes to protecting privacy while also satisfying customer requirements are enormous, but using modern processes and technologies providers can reduce those privacy risks.
  • Always Aware: Continuing Your Cybersecurity Awareness Month Journey Recorded: Oct 13 2021 61 mins
    Robert Shields and Susan Mackowiak
    - October is Cyber Security Awareness Month (CSAM). But one month is only the beginning, and lasting change takes consistent programs and nudges to cultivate a strong security awareness 365-days of the year.
    - Join ISSA and Proofpoint as they discuss how to leverage CSAM to kick-start continuous programs to transform users from targets to defenders. In this session, our experts will cover:
    - How to leverage monthly nudges and campaigns
    - Extensive opportunities available by seasonal challenges and ‘domain days’
    - How pre-packaged campaigns utilizing micro-learnings can make this a reality
  • Innovating Your Career in the New Security and Privacy Frontier Recorded: Oct 7 2021 58 mins
    Juliet "Jules" Okafor, JD
    Juliet “Jules” Okafor, will describe her professional journey and offer perspectives for workplace leadership and career innovation, while recounting adventures along the way, as she navigated life beyond graduate school. Jules will share details regarding her post-graduate journeys and current positions, and where she the current focus of our fields of security and privacy. She will talk about career innovation for you and your staff, in challenging economic conditions, work-life balance, diversity in the workplace, and strategies for professional growth.
  • Life of a CISO Recorded: Oct 7 2021 55 mins
    Eric Cole, PhD, is an industry-recognized security expert with over 20 years of hands-on experience.
    In this podcast, Dr. Cole will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense. You’ll also get a prioritized checklist of actions that you can take right away to reduce the risk of an attack and mitigate one in progress..

    The constant barrage of security threats is not going to let up, and if you wait to respond, it will already be too late.
  • Creating a Successful Security Awareness Training Program Recorded: Sep 22 2021 60 mins
    Larry Cates and Suzanne Gorman
    Organizations historically have relied on their Cybersecurity, IT and their Networking teams to purchase
    technologies to provide defense-in-depth protection for their organizations. While this is necessary, most
    organizations never think that their biggest risk is actually their untrained employees.
    With the onslaught of phishing, malware, ransomware attacks and Business Email Compromise or CEO
    Fraud, we are at a critical point that each and every organization needs to have a successful training
    program in place to properly educate their employees on how to identify social engineering attempts, or
    they are almost guaranteed to fall short of its security objectives and they will become a victim of
    cybercrime, and in many cases this can be a very expensive lesson to be learned.
    Ninety percent of security breaches are caused by Human Error. A successful security awareness training
    program will not only educate your employees. A successful program will also empower them to make
    changes to their behavior and embrace a security minded culture, securing themselves and in turn,
    securing your organization.
    But how can organizations take the next step beyond training when changing human behavior is such a
    complex process. Traditional security awareness programs are not enough—you need to develop
    Security-Minded Employees and make it part of the corporate culture.
    In this webinar, Larry Cates, President and CEO, and Suzanne Gorman, Vice President, Information Security
    and Risk Management Evangelist with Global Learning Systems will discuss:
    ● Setting objectives to make your program successful
    ● Biggest risks to any organization
    ● Elements of a Successful Security Awareness Program
    ● Quantifying Your Success
  • Privacy SIG: A Delicate Balance: When Security and Privacy Want Opposite Things Recorded: Sep 21 2021 60 mins
    Daniel Ayala
    Usually, privacy and information security professionals have a shared mission to protect information. But what happens when their approaches and objectives conflict with each other or make it impossible for them to coexist within a specific use case? From the physical world to the technology realm, there has long been give-and-take necessary to find the right balance between privacy and security in protecting and defending. As privacy (or its more appropriate term, data protection) is about respecting the person, and their decisions around data use and depends heavily on security technologies to be effective, the importance of collaborating continues to increase but remains challenging. We will cover the history of these two worlds' relationship across the physical and technical domains. By reviewing cases, including the recent news that Apple will soon check for CSAM data on users' devices, we will discern how to discuss, understand and find the balance between security and privacy for different use cases, risk postures and constituencies.
  • Achieving Regulatory Compliance in the Microsoft Cloud Recorded: Sep 16 2021 60 mins
    Brendan Hoffman and Lisa Abshire
    Regardless of the industry, most organizations report to unique regulatory bodies with their own set of requirements– and meeting those requirements only becomes more complicated when data and applications are stored in the cloud. And on top of that, many companies find themselves lacking direction around Data Loss Prevention (DLP), legacy data archiving, data classification, document tagging, third party access, and other issues that can bring your organization out of good standing with those regulatory bodies.

    How can your company quickly adapt your cloud controls, standards, and processes to maintain compliance under changing conditions?

    In this webinar, our group of experts will provide guidance on tools and resources for your organization to develop a roadmap to better tackle your compliance needs in the Azure cloud.
  • Key challenges and requirements on network security in a remote world Recorded: Sep 15 2021 59 mins
    Ameet Naik, Product Marketing, Cloudflare
    The shift to cloud applications and remote work imposes fundamentally different requirements on network security. The Internet is your new corporate network and security needs to evolve from appliances and choke points to a ubiquitous cloud-based service. Join this webinar to learn how you can transform your security architecture and take advantage of cloud-native network security-as-a-service from Cloudflare.

    In this webinar you will learn about:
    - hybrid network architectures for the modern enterprise
    - the shifts in network security requirements driven by the cloud and remote work
    - how network security-as-a-service can help you maintain a consistent security posture in the hybrid work era
  • Venture Capital, Security and Influencing Your Own Success Recorded: Sep 2 2021 55 mins
    Bio Chenxi Wang
    Dr. Wang will share her own career success story, how she chose this profession, how she evolved to her successful role today. She will give us a view of venture capital in security today, and what venture capital funds look at when considering funding from emerging technologies and trends, and how security fits into that pipeline. Chenxi will give perspective on how we might aspire to this career path—or as an investor, within the Venture Capital field. This will include skillsets, experience, the persona that works best, how negotiations and power of influence come into play, the benefits of such a field, and where and why we may want to engage.
  • Cybersecurity Tips & Challenges in the Hybrid Work Era Recorded: Aug 25 2021 55 mins
    Darren Guccione, CEO and co-founder of Keeper Security
    Information security continues to evolve as the workplace goes hybrid

    67% of security personnel are concerned that remote employees’ use of personal devices to access their work systems have hurt their organizations’ security posture. As hybrid work conditions become the norm, companies must find a way to keep their systems safe from cyber-attacks while keeping employees connected. This webinar provides solutions to the most common challenges facing security teams in the hybrid work environment.

    • Learn about possible security issues stemming from remote work
    • Ways to keep networks secure with little business interruptions
    • Learn how password security can help protect networks
  • Latest DDoS Trends and the rise of ransom-driven attacks Recorded: Aug 18 2021 59 mins
    Vivek Ganti, Product Marketing Manager at Cloudflare
    DDoS attacks have dominated the charts in terms of frequency, sophistication, and geo-distribution over the last year. Ransom DDoS attacks are also surging, crippling organizations' network infrastructure and taking them offline while demanding ransom in bitcoin. Unlike ransomware attacks, these ransom DDoS attacks do not even require the hacker to access an organization’s internal systems before they can be carried out.

    There are no signs of DDoS attacks going away anytime soon. How do organizations ensure that their Internet assets are protected against threats of any size or kind?

    In this webinar, you’ll learn about:

    * Key Q2 2021 DDoS attack trends
    * Ransom DDoS threats — and what you can do if you are affected
    * Steps organizations can take to make the impact of DDoS attacks a thing of the past
  • How nascent privacy-tech supports operations while preserving confidentiality Recorded: Aug 17 2021 61 mins
    Brian Scriber, Vice President of Security Technologies
    How can technology help with global privacy regulation compliance, data analytics, and help us manage shared APIs, multiple companies, divisions, and departments with different data utilization strategies. How can differential privacy allow us to engage in meaningful research or demographic studies with detailed and privacy-protected datasets? Where are we now in the art of data management, software architecture, and where will we be in five years or ten years? How does self-sovereign identity play into this? Which historical experiences are analogous to our privacy and data protection work now and why is today’s IoT, video surveillance, facial recognition, artificial intelligence, and machine learning world different?
Developing and Connecting Cybersecurity Leaders Globally
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Zero Trust and the New Normal of Cybersecurity
  • Live at: Jun 30 2021 5:00 pm
  • Presented by: Doug McKillip, Solutions Architect, A10 Networks and Babur Nawaz Khan, Product Marketing, A10 Networks
  • From:
Your email has been sent.
or close