Developing the "Easy Button" for Security Services
Enterprise Security Front Office is the single point of entry for security-related questions or requests for service. A dedicated team is always ready to assist customers via an 800# or an internal request tool, making sure customers receive the best support. As the Front Office team is focused on providing a positive customer experience, they need to fully understand the request from potentially non-technical requestors.
During this webinar, Rhonda will be talking about Developing the “Easy Button” for Security Services. She will share her insights and experiences as an Optum employee, working with several security teams, system owners and end-users building the Front Office. She will review opportunities, networking challenges and lessons learned working to master a global support model for security in a matrixed corporate environment.
RecordedAug 5 202139 mins
Your place is confirmed, we'll send you email reminders
Join us on November 18th to learn how to avoid sophisticated targeted attacks that could cripple your business and inflict physical damage to your critical infrastructure. Using real-world examples of well-known organizations who have felt the significant business impacts from a cyberattack, this webinar will teach you:
When to treat cyber threat as part of your overall enterprise risk strategy.
Which cybersecurity framework best suits your organization.
How to develop a cybersecurity training and education plan.
See yourself as an influencer? Desire to further your influence? We bring unique experiences, perspectives and talent to our organizations, and we want to be heard! This session will explore influencing styles and ways to effectively adapt your influencing style while being authentic.
Pam Lindemoen, Stephen Jones, and Daniel DeSantis (Cisco)
It is Cisco’s purpose to power an inclusive future for all. This begins in the workplace with a culture that fosters diversity and inclusion. Join us on November 09, 2021, to hear about the role of male allies in helping to foster an environment of diversity and inclusion.
Alicen DiPiano Ella Daugherty, Stephanie Caru, Gyle dela Cruz, & Megan Roddie
Ever wondered what it takes to join a team of the world's leading hackers, vulnerability managers, and incident responders? Come hear from IBM's X-Force on how to break into (pun intended) cybersecurity, and what you can do to make yourself an ideal candidate for the job. Learn what a day in the life of an X-Force security professional looks like, and how you can be a part of the mission to secure everything.
The Cyber Table Top (CTT) process was developed in 2014 to support DoD customers who were overwhelmed by the sheer number of findings produced by traditional cybersecurity scanning tools and checklist processes. These tools and processes identify a very large number of possible vulnerabilities for a system but didn’t provide context for which vulnerabilities might truly lead to potential mission failure. Since budgets are limited, customers need methods of focusing on the most critical vulnerabilities which present the highest risk to their systems. The CTT process is focused on producing actionable cyber vulnerability data in an approachable risk matrix format to enable teams to focus resources. CTTs bring together system developers and maintainers, system users, and expert red teams to execute a multi-day wargame that focuses on the security evaluation of threats that would deny, degrade, disrupt or destroy a system and prohibit users from accomplishing their core mission. By assessing the potential mission impact of vulnerabilities as well as their likelihood/difficulty it provides a way to understand the relative risks of various vulnerabilities and focus the remediation efforts. The CTT process has been used to support DoD system cyber security evaluations in various lifecycle stages from design through long-term maintenance. It has been used to identify and mitigate threats that later were witnessed “in the wild” and caused significant negative impacts to other systems. It has become so popular that an official DoD Guidebook and training course was developed in 2018.
Simplifying and accelerating the path to a cybersecurity career for college students, Cyber FastTrack puts you on the quickest and most cost-effective path to a well-paid and in-demand career - whatever your starting point!
Come join Haya Arfat to find out how college students can earn up to 21K of free cybersecurity training and GIAC certifications, as well as scholarships for college tuition through Cyber FastTrack.
Diversity and inclusion in the technology industry and workforce do not happen overnight. Hear from trailblazer Michele Guel, who helped pave the way for future generations of women to get involved in technology and cybersecurity. Learn how Michele’s career began, what the technology culture and landscape were like when she started in her career (the hurdles, hoops, and wins); and how to start and stay in cybersecurity, including today’s challenges and career outlook for women in the technology industry.
Nazira Carlage, Aliia Sitdikova, Sarah Lackey and Lynn Simons (Salesforce)
Hear from members of Salesforce's Women in Security group about their traditional, and nontraditional, career paths into cybersecurity. Learn how to navigate the professional security landscape and ways that Salesforce is working to increase equality and representation in the industry.
The majority of breaches each year are caused by lost, stolen, or weak credentials, and that hasn’t changed in over a decade. Learn how cybersecurity professionals came up with a new sign-in standard and what it takes for people to shift to a passwordless experience.
Do you want to raise the bar on your team’s security culture, but you don’t hold a senior title? Want to help customers scale security at the organizational level, but they only have one security engineer? In this presentation, we will explore tangible ways that you can scale and enhance your team’s security through collaboration, automation, and escalation through technical and cultural frameworks. We will cover how individual contributors (IC) can utilize ownership and earning trust to make a positive and lasting impact on your organization’s and/or customer's security culture. Participants will leave with a sense of ownership and have a tangible understanding of how to implement security at scale and escalate appropriately.
The pace of emerging technologies has increased significantly, challenging individuals to maintain knowledge of relevant skills and Business Areas to staff programs with the appropriate level of engineering skills needed for optimum performance on contract in a timely manner. Develop strategies that enable a proactive rather than reactive approach, allowing engineers and organizations to stay ahead of the curve to optimize on contract performance and be prepared for future work. Learn about different engineering shapes to determine which shape is most appropriate for you and /or your organization. Broaden your horizons and explore available options that can be used to develop a Personal Development Plan that includes learning new skills and gaining experience using these skills. Don’t miss opportunities – stay ahead of the curve!
Pam Sheary is a Lockheed Martin Fellow with 30+ years of software and systems engineering experience in the Department of Defense (DoD) industry, including 12 years managing International software development efforts. She continues to serve as the Chief Software Engineer on very large government contracts. Pam is a recognized technical leader within Agile / DevSecOps, Quantitative Management, and Risk and Opportunity Management. Pam’s work to establish Enterprise-level Code Quality has been leveraged across various government agencies. Prior to joining Lockheed Martin, Pam served in various Software and Systems engineering roles developing and testing software embedded systems and application development tools with geographically dispersed teams. Pam earned a bachelor’s degree in Computer Science & Mathematics from the University of Pittsburgh with continued graduate studies in Computer Engineering and Web Design /Accessibility. She holds several certifications, including the Scaled Agile Framework (SAFe®) and SAFe® for Government.
Alexis Robinson, Olivia Liddell, Janeen Morehead and Nafi Diallo (AWS)
Imposter syndrome often involves experiencing feelings of inadequacy and insecurity, particularly in the workplace. In this session, you will learn about imposter syndrome from the perspectives of four Black women in tech. This includes how to recognize imposter syndrome and actionable strategies that you can take to help you overcome it.
Do you ever feel like someone is watching you? Do you sense someone is monitoring your every "like" or "dislike?" Do you suspect someone is listening to your conversation? Join in to learn how to increase your online privacy and insights into your privacy rights.
Cloud is where our data lives, is where code resides, applications run, and decisions are made. With this huge responsibility placed on Cloud, it becomes a rich target for attackers to mime private data, insert malware into code or applications, as well as influence the decisions. This talk will provide an overview of cloud security, with an emphasis on secure design leaning on core building blocks such as Identity Management, storage security, key management.
Marisa Midler, Chesleah Kribs, and Destiney Plaza ( Carnegie Mellon University Software Engineering Institute)
Have you ever wondered how a hacker can crack your password? Learn from Penetration Testers as they demonstrate password cracking. During this talk you will learn: how to crack a password yourself, what are common mistakes we humans make, and how to protect yourself from becoming an easy target.
From years ago to today, the challenges for women in security industries have evolved but do not completely disappear. What can we expect from our colleagues today and how do we overcome these challenges? With a real-life case study from SentinelOne, a Cyber Security solution provider, we see how a corporate culture of diversity and innovation crashed the glass ceiling and enabled risk-taking that led to product enhancements.
5G IoT is the latest in the IoT World. This next generation of mobile technology, with features such as Enhanced Mobile Broadband, Ultra-Reliable Low Latency Communication, and Massive IoT, is set to radically re-shape today’s mobile networks. This webinar aims at depicting the high-level composition of the end-to-end 5G network architecture termed as 5GS (5G System) and Security in this space.
Cybersecurity incidents and failures impact critical public infrastructure, national defense, corporate economic interests, and personal privacy. As the magnitude and frequency of cyber events continues to escalate, vendors and agencies are desperately seeking solutions to solve this issue once and for all. In the 1980’s the software development industry was facing similar challenges. That crisis prompted Frederick Brooks to write his iconic paper “No Silver Bullet – Essence and Accident in Software Engineering.” The solutions and technologies detailed in that paper are eerily similar to the “breakthrough” solutions currently proposed for cyber. This presentation examines the “Silver Bullets” of cybersecurity, lessons we can learn from that parallel history, and the essence of challenges that confront modern security practitioners.
Teresa Merklin is a Fellow at Lockheed Martin where she specializes in Cyber Risk Assessment and Engineering for Cyber Resiliency. She is currently attached to the Aeronautics Cyber Range which performs cyber assessment and penetration testing across the complete portfolio of Lockheed Martin aircraft and related systems. She has 30+ years of career experience starting out in embedded software development which slowly morphed into cybersecurity over time. Teresa holds a BSEE from Oklahoma State University, a Masters of Software Engineering from Texas Christian University, and an MBA from the University of Dallas. She holds the CISSP and CSSLP certifications.
5G brings the power to connect billions of new devices and enable their use in new ways. With that comes significant risk. What types of threats does 5G introduce and what should we consider as we start incorporating 5G into our products?
Katie Grzywacz is a Lockheed Martin Associate Fellow and is the chief cyber architect for the LM Space Centers of Excellence. She has 16+ years of experience that includes security engineering and offensive security testing. She is currently researching cyber threat scenarios that apply to a multitude of 5G use cases.
Are you curious about different paths within the Security Industry? Are you working on your resume and looking to learn best practices for applying to roles? If so, join us in this webinar to hear from Google Security Engineers and our recruiting team on their career journeys, how to navigate the complexity of a rapidly expanding industry and how to best present yourself for interviews.
Advancing the mission of diversity in the cybersecurity workforce
Addressing diversity and talent shortages in cybersecurity through recruiting, retaining and advancing women in the field of cybersecurity, and improving on the very low 20-24% statistic of women in cybersecurity jobs.