Hi [[ session.user.profile.firstName ]]

Leveraging an identity-centric Zero Trust model to plan your IAM strategy

The need to enable mass work from home has left many organizations looking for new approaches to IAM. Now is the time to assess how identity-centric Zero Trust models offer an effective strategic framework for transforming security schemes, and facilitating our users’ need for anywhere, anytime access to cloud applications and services.
During this session we’ll discuss:

• Limitations of existing perimeter security models
• The Zero Trust alternative:
• Benefits of Zero Trust
• How zero trust concepts can address the fast moving needs related to COVID, and the new ‘work from home’ normal
• The advantages of identity-centric zero trust for modernizing IAM schemes
Recorded Sep 28 2020 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
ISSA International
Presentation preview: Leveraging an identity-centric Zero Trust model to plan your IAM strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • User-Centric Privacy: Designing Effective Protections that Meet Users' Needs Dec 17 2020 6:00 pm UTC 60 mins
    Florian Schaub, CIPP/US, CIPT Assistant Professor, University of Michigan School of Information.
    Privacy engineering aims to respect and protect user privacy. In order to ensure that privacy protections actually meet people’s privacy needs it is important to understand those needs, concerns and expectations and build privacy into systems with a user-centric perspective. This session will draw on the speaker's research regarding privacy notices and controls online, on smartphones and with smart speakers to discuss how and why privacy controls are often misaligned with user needs and how we can design privacy for users instead of past them. It will also examine how user studies can inform the design of user-centric privacy protections to more effectively meet user needs, as well as benefit companies.
  • Reshaping Your SOC Team in the Wake of Remote Work Nov 19 2020 6:00 pm UTC 60 mins
    Jason Mical
    High-performing SOCs are aligned with organizational needs and deliver actionable business value, but leaders need to have sufficient talent, tools and technology in place to be successful. Analyst burnout continues to be a challenge in the industry. According to the Devo SOC Performance Report 78% of personnel say that working in the SOC is painful. CISOs have a responsibility to reduce the stress and pain that come with working in a SOC to ultimately improve retention and effectiveness.

    Join this webinar and hear industry experts discuss strategies to:
    •Identify common areas of analyst turnover and burnout
    •Share recommendations for improving the culture of the SOC
    •Learn measurements to validate improvements in SOC effectiveness
  • Why Securing Cloud Based Email Requires a Different Approach Nov 18 2020 4:00 pm UTC 41 mins
    Michael Landewe, Cofounder at Avanan
    The Evolution Beyond Secure Email Gateways - is here.

    Email gateways including Proofpoint, Mimecast, and Barracuda were designed to protect on-premises email servers, but when you moved your email to the cloud, it revealed five vulnerabilities that continue to expose your users to attacks.

    It's why companies are switching from gateway vendors. Come learn how the migration to Office 365 and Gmail necessitated an evolution in how to secure cloud email, and why Secure Email Gateways are not the right answer.
  • Deceiving the Attacker Nov 17 2020 5:00 pm UTC 60 mins
    Diana Kelley | Chris Roberts | Christina Fowler
    When it comes to deception technology, the industry is evolving beyond simple honeypots to a more automated, scalable, and effective approach.

    Join this episode of The (Security) Balancing Act to discover how deception technology can be used by organizations to detect, investigate and respond to malicious intruders. How does deceiving the attacker save your company and buy you time?

    During this episode, we'll go over:
    - What is deception technology and what does it help with?
    - How does it work? (e.g. Deception decoys, lures, honeytokens, traps, grids)
    - Is your organization ready to adopt deception?
    - What do you need to do before you buy the technology / build it in-house?
    - Key benefits of using deception for threat hunting
    - What else can deception be used for?
    - Deception use cases
    - The role of AI in deception (e.g. dynamic deception)

    Panelists:
    - Chris Roberts, vCISO, Researcher, Hacker, Consultant, Devils Advocate
    - Christina Fowler, Chief Cyber Intel Strategist at MITRE Corporation

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Supply Chain Fraud- A Critical Vector in Email Fraud Attacks Nov 11 2020 6:00 pm UTC 60 mins
    ISSA International
    Among various types of business email compromise (BEC) and email account compromise (EAC) attacks, supply chain fraud often accounts for the biggest financial losses. These types of threats leverage both impersonation and account compromise and are often used jointly in the same attack. So how can you better protect your company and your end users?

    Join our experts for a webinar on how to identify and gain visibility to these cyber threats to reduce your supply chain risk.

    In this session we'll talk about:
    •The BEC/EAC variants
    •Real life examples of supply chain fraud attacks
    •How to address email scams from supply chain
  • Ransomware Negotiation Do’s and Don’ts with an Expert Negotiator Nov 10 2020 8:00 pm UTC 43 mins
    Kurtis Minder, GroupSense and Jessica Gulick (Host), Katzcy
    No one ever expects it to happen to them. But with ransomware and cybercrime on the rise, it’s more likely than ever to discover that ransomware has locked down your system and cybercriminals are holding your data hostage. Kurtis Minder, an expert ransomware negotiator, advises executive teams when their worst cybersecurity nightmares come to life. Join us for an interview with Kurtis as we discuss:

    + What most people don’t realize about ransomware and the cybercriminals that run these exploits
    + Immediate do’s and don’t if your systems are being held captive
    + How to limit potential damage like data loss, overpaying threat actors, tarnished brand reputation, and compliance violations
    + Team Event: who to involve and when
  • Lessons from a global transformation initiative for emerging leaders Nov 5 2020 6:00 pm UTC 60 mins
    Wendy Ng. Head of IT Strategy at Experian
    In 2019 and 2020, Wendy Ng had the privilege of being a subject matter expert for Experian’s DevSecOps transformation program.

    DevSecOps describes a set of practices that speed up quality software development by encouraging collaboration between the previously separate disciplines of software development, security and IT operations. In this presentation, Wendy will share some of the lessons learned and behaviors that supported the transformation initiative, which may also help you in your leadership journey.
  • Using Jupyter Notebooks for Repeatable Investigation Automation Nov 4 2020 6:00 pm UTC 60 mins
    Chad Anderson, Senior Security Researcher, DomainTools
    Given the current economic climate and scrutinized security budgets as a result of COVID-19, security teams are finding it more difficult to fill gaps in their threat intelligence collection requirements, therefore limiting their potential effectiveness and efficiency.

    This leaves analysts asking themselves questions like: if I’m starting an investigation from a single or list of indicators, how can I move faster and act as a force multiplier on my team? The resounding answer from seasoned security professionals is automation. In this webinar, join subject matter experts to learn how to harness the power of automation, use open source tools and data sources to build Jupyter Notebook playbooks, and effectively collaborate with team members.

    In this webinar you will learn:
    •The value of using automation in your investigations
    •Practical strategies for collecting information on indicators
    •How to take advantage of pre-existing Jupyter Notebooks playbooks
  • Securing WhatsApp - What You Need to Know Today Recorded: Oct 28 2020 29 mins
    Cosimo Mortola, Senior Intelligence Analyst, GroupSense
    Already a popular platform, WhatsApp, the Facebook-owned smartphone instant messaging service, posted the biggest gains due to COVID-19 according to Tech Crunch. Learn why this ubiquitous messaging app could be a security risk and what you need to know to secure WhatsApp.
    In this session, you’ll discover:
    + How metadata and message data storage expose you to critical risk
    + Why the legal agreement should give you pause
    + Why WhatsApp is an effective platform for spreading disinformation
    + How the phones and humans using them increase your vulnerability
    + How to increase secure use of the app and mitigate your risk
    + Why WhatsApp leveraged by sophisticated threat actors

    Speaker: Cosimo Mortola is a senior intelligence analyst at GroupSense. Cosimo previously tracked threat actors at MassMutual, and Russian disinformation and associated threat activity at FireEye. Cosimo is fluent in Russian, French, and Italian.
  • Understanding, assessing, and mitigating insider threats Recorded: Oct 27 2020 61 mins
    ISSA International
    Insider Threats are one of the top risks on many organizations list of top threats. They can be divided in three categories which require different view points for mitigating: malicious insiders, negligent insiders, and infiltrators. In this webinar, we look at all three and how organizations can assess and mitigate the risks of insider threats.
  • 2021 Cybersecurity Budget Must Haves for Every SMB Recorded: Oct 27 2020 26 mins
    Alex Nette, President & CEO, Hive Systems + Michael Cardman, CFO, Hive Systems
    The pressure is on to maximize - possibly reduce - your IT spend, but you know that cybersecurity is critical. As many as 60% of hacked small and medium-sized businesses go out of business after six months. But, how much is right to spend? This 30-minute live discussion between Alex Nette, one of the leading cybersecurity experts for small-medium businesses, and Michael Cardman, a results-oriented financial expert will help you determine:
    + What are the must-haves for your 2021 cybersecurity budget? How do you calculate what to spend?
    + Given your business and your systems, applications and software, what’s the right approach for you?
    + How do you do more with less?

    This webinar draws on years of experience in working with business and IT professionals to help them craft the right spend strategy. Both Alex and Michael will provide a number of best practices for you to consider, but also show you the behind the scenes tools they’ve used for years! See what happens when IT and cybersecurity gets real with a CFO.
  • The Life and Times of Cybersecurity Professionals 2020 and The Impact of COVID - Recorded: Oct 26 2020 60 mins
    Candy Alexander and Jon Oltsik
    Candy and Jon will walk you through the findings, provoking a discussion on what the data means to you. They will share ways to relate this information to your professional career and utilize the data within your organization. Further, they will provide insight into the future of cybersecurity as it relates to business strategy and mission during and post COVID-19.
  • Security is the Ultimate Business Enabler Recorded: Oct 21 2020 58 mins
    Clarke Rodgers and Stephen Quigg
    Strong security, risk, and compliance programs enable businesses to adapt to rapidly changing markets, focus on innovation, and take advantage of the many benefits of cloud computing architectures and supporting agile practices. The cloud gives customers access to the most flexible and secure computing environment available today. Building a solid foundation based on security best practices helps organizations be more agile, drive faster internal adoption and improve time-to-market.

    Join our panelists to learn how:
    - A strong security focus can be the ultimate business enabler.
    - Understanding how high performing organizations focus on security engineering.
    - Building reusable security patterns, to focus on automation, and securely enabling the larger organization’s success as part of digital transformation efforts.
  • Ransomware Negotiation Do’s and Don’ts with an Expert Negotiator Recorded: Oct 21 2020 44 mins
    Kurtis Minder, GroupSense and Jessica Gulick (Host), Katzcy
    No one ever expects it to happen to them. But with ransomware and cybercrime on the rise, it’s more likely than ever to discover that ransomware has locked down your system and cybercriminals are holding your data hostage. Kurtis Minder, an expert ransomware negotiator, advises executive teams when their worst cybersecurity nightmares come to life. Join us for an interview with Kurtis as we discuss:

    + What most people don’t realize about ransomware and the cybercriminals that run these exploits
    + Immediate do’s and don’t if your systems are being held captive
    + How to limit potential damage like data loss, overpaying threat actors, tarnished brand reputation, and compliance violations
    + Team Event: who to involve and when
  • Address the Hidden Risk in Cloud Infrastructure Recorded: Oct 14 2020 58 mins
    Arick Goomanovsky
    Address the Hidden Risk in Cloud Infrastructure: Misconfigured Identities, Access & Privileges

    In the public cloud, thousands of human and machine identities, roles, policies, entitlements and configurations determine what hackers can do if they gain a foothold in your environment. One excess permission or open port can make the difference between a failed breach attempt and devastating data loss. By 2023, Gartner predicts that 75% of cloud security failures will result from inadequate management of identities, access and privileges. First-generation cloud security solutions do not give you visibility into access entitlements and risks. And the complexity of cloud infrastructure and development velocity make it virtually impossible to analyze and remediate at scale.

    In this session we’ll discuss:
    •The hidden threats to AWS, Azure and Google Cloud Platform
    •The difference between managing human and machine identities
    •How identity and network configuration affect data security
    •Automating public cloud security throughout the software lifecycle
  • How She Got There—Women in Health IT Recorded: Oct 6 2020 58 mins
    Moderator: Karen Diamond, Vice President of Strategic Accounts, pureIntegration
    Women are increasingly finding a career in healthcare IT. According to a recent article in Healthcare Finance News, women make up 66% of all entry-level healthcare employees and 30% of C-suite positions in healthcare IT.*

    Our panelists are challenging the ecosystem—transforming the information technology space in healthcare, driving improved patient care, and leading with a purpose.

    Join us for an open and honest hour-long conversation with influential women in healthcare information and technology who are leading the way to a more diverse and enriched community. Gain a better understanding of the challenges and opportunities that these female executives have experienced as they have navigated their careers. Learn from them how they are leading their organizations to digitally transform and serve their patients in more effective ways. Discover how they see the healthcare ecosystem evolving to achieve more diversity and balance in the workforce.

    Webinar host pureIntegration is an IT consulting services firm, led by a team of 53% women and minorities.

    *Reference: https://www.healthcarefinancenews.com/news/women-healthcare-hold-most-manager-positions-lack-minority-representation-persists
  • The Evolution Beyond Secure Email Gateways Recorded: Oct 6 2020 42 mins
    Michael Landewe, Cofounder at Avanan
    Why Securing Cloud-Based Email Requires a Different Approach

    Email gateways including Proofpoint, Mimecast, and Barracuda were designed to protect on-premises email servers, but when you moved your email to the cloud, it revealed five vulnerabilities that continue to expose your users to attacks.

    It's why companies are switching from gateway vendors. Come learn how the migration to Office 365 and Gmail necessitated an evolution in how to secure cloud email, and why Secure Email Gateways are not the right answer.
  • Enhancing your Security Program for the Cloud Recorded: Sep 30 2020 61 mins
    Michael Coates, Flee Lee and Ben Hagen
    Business adoption of cloud technologies, such as SaaS and IaaS, provides huge productivity wins but also brings major impact to security programs. Learn from leading Silicon Valley CISOs on how their companies are rethinking their approaches and building security strategies to protect their most important assets, data, in cloud applications and systems.

    What we’ll cover:
    - How cloud architectures impact threat models
    - Why traditional controls are irrelevant and must be enhanced/replaced
    - Autonomous & scalable security at the speed of business
    - Tips you can use today
  • Leveraging an identity-centric Zero Trust model to plan your IAM strategy Recorded: Sep 28 2020 60 mins
    ISSA International
    The need to enable mass work from home has left many organizations looking for new approaches to IAM. Now is the time to assess how identity-centric Zero Trust models offer an effective strategic framework for transforming security schemes, and facilitating our users’ need for anywhere, anytime access to cloud applications and services.
    During this session we’ll discuss:

    • Limitations of existing perimeter security models
    • The Zero Trust alternative:
    • Benefits of Zero Trust
    • How zero trust concepts can address the fast moving needs related to COVID, and the new ‘work from home’ normal
    • The advantages of identity-centric zero trust for modernizing IAM schemes
  • How to Discover & Mitigate APTs in Enterprise Networks Recorded: Sep 24 2020 61 mins
    ISSA International
    This session is a high-level overview of the tools, tactics, thinking and analytical skills that are needed to discover, isolate and eliminate Advanced Persistent Threats (APT) in enterprise network environments. A focus of this session will be how to discover brand new APT malware when the existence of such malware is not known or suspected and when the malware is not detected by anti-virus software, Intrusion Detection Systems (IDS) and other traditional defenses.
Hear from Tech Experts, Executives, and CMOs
The Tech & Cyber Security Trends channel features experts and executives in and around the high tech, high growth sector to learn about new trends, market changes, and leadership tips. Join our channel.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Leveraging an identity-centric Zero Trust model to plan your IAM strategy
  • Live at: Sep 28 2020 5:00 pm
  • Presented by: ISSA International
  • From:
Your email has been sent.
or close