Hi [[ session.user.profile.firstName ]]

A day in the life of a - Cyber Threat Analyst

Have you ever wanted to know what is involved in a particular Cybersecurity role? If yes then join us at the WSC for a conversation with a Cyber Threat intelligence analyst

Host: Connie Blaney

Guest: Rikki George
Rikki George is the Cyber Threat Intelligence thought leader responsible for Financial Services, Retail & Hospitality cyber threat expertise and strategic level analysis at iDefense, part of Accenture Security’s Cyber Defense practice. Rikki produces industry-focused content that educates senior decisionmakers on the current and emerging threats that affect the resilience of various critical infrastructure sectors. Rikki earned her B.A. in Communications summa cum laude from Drexel University, completing capstone research on social media-enabled cybercrime. She hold a number of industry certifications, completed the selective Pre-Law program at the University of Pennsylvania and Cybersecurity program at the Washington Center in D.C. In 2019, Rikki was selected as a Rising Star Award finalist for the Women in IT Awards - Silicon Valley
Recorded Mar 26 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Connie Blaney
Presentation preview: A day in the life of a - Cyber Threat Analyst

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • IT Budgeting for an Uncertain 2022 Nov 3 2021 5:00 pm UTC 60 mins
    Josh Aaron - Aiden, Keith Moss - PAAMCO Prisma, Bill Murphy - Cresting Wave, Tunde Oni-Daniel - OneMain Financial
    COVID-19 spikes are keeping employees virtual, ransomware is inevitable, and finding
    expert talent is proving difficult. If 2022 is anything like this year, preparing for disruptions
    now will set up organizations to be more successful. So how can you maximize your 2022 IT
    budget and stay secure, all while managing a “work from anywhere” chaotic environment?

    Join IT and Cybersecurity leaders as they discuss how you can optimize and promote your future budget
    in such an unstable atmosphere. The panel will give insights on:
    - What solutions should you be considering when preparing for a “Work from
    Anywhere” future?
    - What are some key takeaways from the 2021 budget cycle to take with you into
    2022?
    - What are the foundational elements that you must fit into your IT budget? How can
    you balance them with all of your other priorities?
    - How can you more effectively sell to executive leadership the idea that we need to
    keep up with the industry, make changes, and take a fresh look at things?
    - How do you prepare different budgetary presentations for different audiences, and
    defend your plan against dissenting opinions?
  • IT Budgeting for an Uncertain 2022 Recorded: Oct 14 2021 60 mins
    Josh Aaron - Aiden, Keith Moss - PAAMCO Prisma, Bill Murphy - Cresting Wave, Tunde Oni-Daniel - OneMain Financial
    COVID-19 spikes are keeping employees virtual, ransomware is inevitable, and finding expert talent is proving difficult. If 2022 is anything like this year, preparing for disruptions now will set up organizations to be more successful. So how can you maximize your 2022 IT budget and stay secure, all while managing a work from anywhere chaotic environment?

    Join IT and Cybersecurity leaders as they discuss how you can optimize your future budget in such an unstable atmosphere.

    The panel will give insights on:
    What solutions should you be considering when preparing for a “Work from Anywhere” future?
    What are some key takeaways from the 2021 cycle to take with you into the 2022 budget cycle?
    What are the foundational elements that you must fit into your IT budget? How can you balance them with all of your other priorities?
    How can you more effectively sell to executive leadership the idea that we need to keep up with the industry, make changes, and take a fresh look at things?
    How do you prepare different budgetary presentations for different audiences, and defend your plan against dissenting opinions?
  • Selling Your Business? Optimize Value & Stand Out in an Active Deal Market Recorded: Jul 7 2021 35 mins
    Marybeth Borgwing and Al Pearce; moderated by Jessica Gulick
    If you’re planning to sell your business or considering growth through acquisition or capital funding, then tune in to this dynamic discussion where our seasoned M&A advisors and financial experts will share insights on how to position your company in this complex marketplace.

    In this moderated discussion, we will:
    • Help you decide if you’re a good candidate for funding
    • Guide you through the process of positioning your company for growth, acquisition or purchase
    • Discuss the pitfalls to avoid if choosing a partner to help you navigate the complex private equity marketplace
    • Explain how a data-driven narrative will pique investor interest
    • Help you understand the market and set your expectations for the road ahead

    Who Should Attend?
    • CEOs and Advisors of companies seeking B or C round funding
    • CEOs and Advisors of companies that want to be acquired by private equity
    • CEOs of companies with a focus on digital transformation as they position themselves for sale
  • Ransomware: When Prevention Fails, What Then? Recorded: Jun 24 2021 58 mins
    Ritesh Agrawal, Kurtis Minder, Austin Bockwinkel, Higinio Ochoa, and Jessica Gulick
    Ransomware is crippling governments, companies, and nonprofits around the world. Through a single device penetration, ransomware attacks can proliferate within trusted networks to threaten businesses into paying large sums of money.

    Join us to hear from a distinguished panel of experts in Ransomware Negotiations, Cyber Insurance, and Incident Response to learn how together they help ensure your data remains safe and your business operational. Specifically, we will address:
    · How Cyber Insurance plays a role and what you should be considering now before anything happens
    · What a ransomware attack looks like and the immediate operational actions key to reducing exposure
    · Why negotiations are a delicate but critical step regardless of whether to pay or not?
    · How can we be prepared for a ransomware incident now?
    · What are some things we can do right now to reduce our risk?
  • Partner Talk w/ VCSA Recorded: Jun 15 2021 24 mins
    Vonzell Mattocks, Northern Virginia Technology Council
    Come hear how partners of the Virginia Cyber Skills Academies can change your life and your career. While this program is for Virginians, the companies featured each month may have opportunities in other locations.

    https://www.nvtc.org/
  • Announcing the US Cyber Games: Info Session Recorded: May 18 2021 42 mins
    Jessica Gulick, US Cyber Games, David Raymond US Cyber Range, and Danielle Santos NIST NICE
    Join us for this informative webinar about an exciting new program - the US Cyber Games! We are bringing together talented cybersecurity athletes, coaches, and industry leaders to create the US Cyber Games.
    It all begins in May with a free US Cyber Open Summit and Capture-the-flag event. In July, the best competitors will be invited to take part in the US Cyber Combine. From here, we will select the Official US Cyber Team to represent the United States at the International Cyber Security Challenge (ICSC). Don’t miss our informational webinar about this fascinating program.
  • Love cyber games? Looking to enhance your cyber skills? Recorded: May 13 2021 3 mins
    Keenan Skelley, CEO at shyftED, Inc.
    Join us for an info session on Cyber KnockOut at RSAC 2021 (https://play.katzcy.com/cyber_knockout_rsac), a week-long virtual tournament designed for all skill levels. Learn about the game rules, how to win, and more.
  • Ransomware in the Remote Work Era Recorded: May 12 2021 61 mins
    Diana Kelley, SecurityCurve | Nicole Hoffman, GroupSense | Courtney Radke, Fortinet | Patrick Lee, Rapid7
    Phishing and ransomware attacks continue to rise, according to Proofpoint’s State of the Phish report for 2020. Organizations in the U.S. are at risk, the increase in remote work due to the pandemic has fueled a spike in attacks, and phishing attempts are up by 14 percent compared to the previous year.

    Email continues to be the number 1 delivery vehicle, but other social engineering schemes that rely on social media, voicemail (“vishing"), SMS phishing (“smishing”), and malicious USB drops are also of concern for organizations. Ransom demands are also on the rise, but according to the report, paying the ransom is not guaranteed to work as many companies that paid the ransom failed to receive a decryption key.

    Join this month's episode of The (Security) Balancing Act as Diana Kelley and guests discuss why ransomware is surging again, which sectors are most at risk, the threat to enterprises and how it is being used for more than just ransom (ex: distractionware, destructionware, etc).
    - The rise in ransomware under the cloak of the pandemic
    - Why email continues to be the channel of choice
    - The difference between fully automated and human-operated campaigns
    - How to decide whether or not to pay or not to pay the ransom
    - Why your backups may not be immune to ransomware
    - Addressing the threat with best practices

    Speakers
    - Nicole Hoffman, Intelligence Analyst, GroupSense
    - Courtney Radke, CISO for National Retail, Fortinet
    - Patrick Lee, Senior Incident Response Consultant, Rapid7

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Life of a CISO Recorded: May 11 2021 49 mins
    Eric Cole, PhD, is an industry-recognized security expert with over 20 years of hands-on experience.
    In this podcast, Dr. Cole will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense. You’ll also get a prioritized checklist of actions that you can take right away to reduce the risk of an attack and mitigate one in progress..

    The constant barrage of security threats is not going to let up, and if you wait to respond, it will already be too late.
  • In Northern Virginia? Interested in a cyber career? Launch your career today Recorded: May 5 2021 16 mins
    Maureen Shrewsbury, Cyber Workforce Development Programs at SANS Institute
    Join us for a brief information session about the Virginia Cyber Skills Academies (vacyb erskills.com), providing world-class cyber training programs for candidates with no IT Experience and those currently in the cyber industry. Sponsored by the state of Virginia, the program is free to qualified applicants residing in Northern VA.
  • Digitally Evolving Credit Unions: A Business Case for Evolving Member Experience Recorded: Apr 14 2021 42 mins
    Elizabeth Kaspern, SVP at TruMark Financial Credit Union, Jay Levin, CRO at Relay Network & Karen Diamond, pureIntegration
    Today’s credit union members expect a consistent, personalized experience—no matter how or where they interact with you: in person, by telephone, through a smartphone application, or on your website. Join us to hear from industry leaders who will break down what it really means to evolve the member experience, how to plan your member’s digital journey, and how small changes make a big difference.
  • Life of a CISO Recorded: Apr 13 2021 60 mins
    Eric Cole, PhD, is an industry-recognized security expert with over 20 years of hands-on experience.
    In this podcast, Dr. Cole will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense. You’ll also get a prioritized checklist of actions that you can take right away to reduce the risk of an attack and mitigate one in progress.

    The constant barrage of security threats is not going to let up, and if you wait to respond, it will already be too late.
  • Leadership in Technology, Security and For-Profit Boards Recorded: Apr 1 2021 61 mins
    Julie Cullivan
    Julie will share what it takes to lead as CTO of a large organization supporting sales and technology in a fast moving world, and her advice for other women looking at different aspects of technology careers. Julie will also give insights on board and advisory roles with technology organizations in for-profit companies, the advantages of these roles, and what it takes to find such opportunities, and to meet the obligations of taking on these roles.
  • Digitally Evolving Credit Unions: A Business Case for Automation Recorded: Mar 25 2021 28 mins
    Ashwin Krishnamurthi, Large credit union and Karen Diamond, pureIntegration
    Credit unions that seek digital solutions to improve overall operating efficiency and member satisfaction will hear how a large credit union successfully implemented process automation to achieve significant business goals. We will discuss the lessons learned, as well as best and worst decisions made along the way. Join Ashwin Krishnamurthi, a Process and Automation Expert at a large credit union and Karen Diamond, VP of Enterprise Accounts at pureIntegration for this fascinating discussion.
  • ISO 27701 versus NIST Privacy Framework Recorded: Mar 16 2021 59 mins
    Scott Giordan, Spirion
    Two new standards were adopted around a year ago. In August of 2019, ISO published 27701 an extension to 27001 requirements and guidelines for privacy information management. In January of 2020, NIST published the Privacy Framework, a mirror of the Cybersecurity Framework, adopted five years prior. How are these two standards alike and how do they differ? Which is best for your organization? Learn more from two experts in the area.
  • Zero Trust & Data Protection Recorded: Mar 10 2021 60 mins
    Ashish Malpan, Senior Director of Solutions Marketing, Forcepoint
    As with businesses today, cybersecurity isn’t a static concept and to be effective it must continue to evolve with technological advances -- be it in mobility, digital transformation, Zero Trust, or the growing sophistication of attackers and their ability to steal what’s most valuable to the organization -- intellectual property.
    The traditional product-centric security paradigm is contributing to the near record number of infrastructure compromises and data breaches. Today’s distributed work environment requires modern cybersecurity that is proactive, risk-adaptive and delivered through a converged platform approach that understands users and data no matter where they are. Join us to learn more on moving your company left of breach utilizing an approach to security designed for today’s sophisticated threat landscape that provides a seamless path to grow your security capabilities when and where you need them.
    Attendees will learn…
    • How understanding human behavior underpins modern cybersecurity strategies to finally move left of compromise
    • Operational benefits driven through the power of proactive and adaptive security capabilities
    • Future-proofing your investment and the value proposition in a SASE converged security platform approach that removes operational complexities and lowers TCO
  • Life of a CISO Recorded: Mar 5 2021 64 mins
    Eric Cole, PhD, is an industry-recognized security expert with over 20 years of hands-on experience.
    In this podcast, Dr. Cole will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation for security is key, followed by proactive threat hunting and active defense. You’ll also get a prioritized checklist of actions that you can take right away to reduce the risk of an attack and mitigate one in progress.

    The constant barrage of security threats is not going to let up, and if you wait to respond, it will already be too late.
  • Cyber Security Job Market Today and Going Forward Recorded: Mar 4 2021 60 mins
    Kris Rides, CEO, Tiro Security and Kim Jones, Intuit Director of Security Operations
    Join us for a 2-person panel on job market for pay, skills, and the certifications in demand and those that are not. We will discuss how hot the security market really is and when people say they have a lot of openings they can't fill, what does that really mean. Overall, what does this look like today and going forward in the industry? Hear from our experts on how organizations and individuals should prepare.
  • The Steak and the Sizzle: Threat Intel, SecOps, and Cyber Fundamentals Recorded: Mar 3 2021 58 mins
    Brandon Hoffman, Head of Security Strategy & CISO
    Threat intelligence has always been a hot topic and remains to be so. Understanding how your organization can benefit from threat intelligence is the first step. The second step would be how to dissect the world of threat intelligence and build real requirements that can provide value. Once you set requirements for intelligence and obtain access to threat intelligence, it needs to be applied in an operational manner. Where it belongs in security operations and how it can impact the processes and tools in place can make a world of difference. Coming full circle, threat intelligence being a hot topic has people focused on other hot topics in security. Many of these new technologies and approaches are interesting and can provide value, but in many cases, fundamentals are left behind. Taking a risk-based approach and focusing efforts on the building block of a comprehensive cyber program often gets overshadowed by the allure of trendy and new solutions. Telling the difference between the steak and sizzle can mean a make or break for the security posture of your organization.
  • 5 pillars for creating your modern Unbound Enterprise with data-centric SASE Recorded: Feb 17 2021 58 mins
    Jim Fulton is Forcepoint’s director of SASE and Zero Trust solutions
    Even before 2020, we knew where digital transformation was taking us. But we had no idea how quickly it would arrive. Because of the pandemic, our journey in cloud migration happened almost overnight. As a result, businesses today are less constrained by traditional network infrastructure and designated worksites. And, while we’ve always had some agility to shift work between on-prem and remote, we’re seeing the beginning of the new age of the Unbound Enterprise in which people have the freedom to work anywhere and anytime.

    Join this discussion to see how the new ways that people are accessing and using data—in multiple locations, on different devices, over the internet, in public and private clouds—are greatly accelerating the need to replace siloed infrastructure that can’t keep up. We’ll connect the dots on how you can take a “human-centric” SASE approach that puts users and data at the center of cloud-based security to make your business more agile and safer, all while cutting complexity and cost.

    Takeaways:
    1. Make working anywhere seamless and easy to deploy
    2. Protect data everywhere with a single set of policies enforced uniformly from endpoints to the cloud
    3. Automatically personalize security based on people’s behavior and the risk they present
Hear from Tech Experts, Executives, and CMOs
The Tech & Cyber Security Trends channel features experts and executives in and around the high tech, high growth sector to learn about new trends, market changes, and leadership tips. Join our channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A day in the life of a - Cyber Threat Analyst
  • Live at: Mar 26 2020 12:00 am
  • Presented by: Connie Blaney
  • From:
Your email has been sent.
or close