Hi [[ session.user.profile.firstName ]]

Live Webcam Panel: Operationalizing Cybersecurity

Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.

Join us for an interactive Q&A panel with security leaders to learn more about how to operationalize cybersecurity.

Topics up for discussion:
- Making information security relatable
- Building security programs
- Defining your cybersecurity strategy
- Translating your cybersecurity strategy into a risk management plan
- Operationalizing your cybersecurity strategy
- Using the maturity capability model for measuring success

Moderator:
Michelle Drolet, CEO, Towerwall
Panelists:
Amy McLaughlin, Director of Information Services, Oregon State University
Ariful Huq, Director of Product Management, Aporeto
Recorded Mar 19 2019 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michelle Drolet, Towerwal, Amy McLaughlin, Oregon State University and Ariful Huq, Aporeto
Presentation preview: Live Webcam Panel: Operationalizing Cybersecurity

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The next wave of Privacy, Security and Compliance - Integrated Risk Management Nov 5 2020 12:00 pm UTC 46 mins
    Keavy Murphy, Patty Patria, Deidre Diamond, Robert Pellerin
    Learn from our panel of experts as they discuss Privacy, Security and Compliance and how to effectively navigate the ever-evolving compliance mandates and regulations. - Learn how to make information security actionable.
  • Zero Trust Architectures Oct 29 2020 3:00 pm UTC 52 mins
    Michelle Drolet, Towerwall, Itay Nachum, Safe-T, Scott Tingley, Cogito Tom Ward, Qnext
    Data breaches are on the rise, highlighting no organization is safe from cyberattacks. One cause is that workforce mobility and cloud computing has placed most workloads beyond the shelter of corporate networks and traditional perimeter defenses. There are no perimeters.
    What are the issues, drivers and considerations for how Information Technology and Security organizations are applying Zero Trust Network Access (ZTNA) capabilities?
    In this BrightTalk you will learn about:

    1. Key ways that Zero Trust can simplify infosec implementation.
    2. Tips on how to communicate security risk, and the rewards of Zero Trust, to business owners.
    3. How inherent trust is the root of most pervasive issues facing IT today.
    4. Zero Trust adoption research findings: perceptions, progress, investments and initiatives
    • How zero trust facilitates a secure work from home world
    • The need for planning in order to pull it off right and securely (ie: these may no longer be endpoints you control)
  • Best Practice for Cloud Host-Based Forensics Oct 26 2020 11:00 am UTC 50 mins
    Michael Mimo, Copyright Clearance Center, Sr. Director of Information Technology
    Battle of Midway / Your strategy to Cloud Security: Using Battle of Midway board game to help build a better Cloud defense model. How Cloud host instance forensic acquisition presents certain challenges to your forensics teams. Talk about how traditional forensic methods are not effective in the cloud. Discussion on process and infrastructure required to do this level of inspection.
    By the end of this talk you will be able to apply these strategies to activities such as Threat Hunting.
    We do not guarantee you will be a better Battle of Midway game player but you will walk away with a Cloud defense strategy.
  • Best Practice for Cloud Host-Based Forensics Recorded: Oct 21 2020 51 mins
    Michael Mimo, Copyright Clearance Center, Sr. Director of Information Technology
    Battle of Midway / Your strategy to Cloud Security: Using Battle of Midway board game to help build a better Cloud defense model. How Cloud host instance forensic acquisition presents certain challenges to your forensics teams. Talk about how traditional forensic methods are not effective in the cloud. Discussion on process and infrastructure required to do this level of inspection.
    By the end of this talk you will be able to apply these strategies to activities such as Threat Hunting.
    We do not guarantee you will be a better Battle of Midway game player but you will walk away with a Cloud defense strategy.
  • Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19 Recorded: Oct 13 2020 48 mins
    Diana Kelley, Cybersecurity Field CTO, Microsoft, Michelle Drolet, CEO, Towerwall
    Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
    Wherever we turn it feels like the news is all COVID-19 all the time. Many of us are feeling stressed and overwhelmed and attackers know it. At Microsoft we've seen an increase in the success of phishing attacks, one of the common vectors for malware and ransomware infections. Rather than inventing entirely new exploits, attackers are pivoting their existing infrastructure for ransomware and other malware delivery tools to COVID-19 focused lures to get us to click. In this talk we'll share insights into how the attackers have shifted their lures and provide recommendations for improving detect and response times to reduce the likelihood these attacks will work.
  • Q&A Panel: How to Stay Cybersafe in 2020 Recorded: Oct 12 2020 56 mins
    Michelle Drolet & Arun Subramoniam Towerwall, Inc., Chris Chaves, Sophos
    Cyberthreats morph rapidly as they try to stay ahead of our defenses; wearing new disguises and breaking down virtual barriers in unique ways. As such, the answer to, "How do I remain secure?" changes as quickly as the cyberthreats we face.

    Join us for an interactive Q&A Panel with experts Chris Chaves of Sophos, and Michelle Drolet and Arun Subramoniam of Towerwall. Engage in a discussion on staying safe in the evolving threat landscape. They'll provide the multi-layered answer to, "How do I stay cybersafe in 2020?", including:

    • What you can do today to remain secure
    • The types of threats Sophos Labs is seeing recently
    • What we know about COVID-19 scams
    • How to correct your security posture
  • Zero Trust Architectures Recorded: Oct 9 2020 52 mins
    Michelle Drolet, Towerwall, Itay Nachum, Safe-T, Scott Tingley, Cogito Tom Ward, Qnext
    Data breaches are on the rise, highlighting no organization is safe from cyberattacks. One cause is that workforce mobility and cloud computing has placed most workloads beyond the shelter of corporate networks and traditional perimeter defenses. There are no perimeters.
    What are the issues, drivers and considerations for how Information Technology and Security organizations are applying Zero Trust Network Access (ZTNA) capabilities?
    In this BrightTalk you will learn about:

    1. Key ways that Zero Trust can simplify infosec implementation.
    2. Tips on how to communicate security risk, and the rewards of Zero Trust, to business owners.
    3. How inherent trust is the root of most pervasive issues facing IT today.
    4. Zero Trust adoption research findings: perceptions, progress, investments and initiatives
    • How zero trust facilitates a secure work from home world
    • The need for planning in order to pull it off right and securely (ie: these may no longer be endpoints you control)
  • The next wave of Privacy, Security and Compliance - Integrated Risk Management Recorded: Oct 6 2020 46 mins
    Keavy Murphy, Patty Patria, Deidre Diamond, Robert Pellerin
    Learn from our panel of experts as they discuss Privacy, Security and Compliance and how to effectively navigate the ever-evolving compliance mandates and regulations. - Learn how to make information security actionable.
  • Managed Detection & Response: How does it play in your cyber security program? Recorded: Oct 5 2020 46 mins
    Michelle Drolet, CEO, Towerwall, Bob Antia, Data Privacy Consultant, Bharath Vasudevan, Alert Logic, Blake Strozdas, Pcysys
    As the average monetary cost of a malware attack continues to increase and currently costs an organization an average of $3.86 M, it is vital to be up to date on detection and prevention best practices. No level of investment prevents or blocks 100% of attacks. You will learn how to continuously identify and address breaches or gaps before they cause real damage. Join leading industry experts as they discuss the use of Deep Learning, AI and MDR solutions.
  • Managed Detection & Response: How does it play in your cyber security program? Recorded: Sep 10 2020 47 mins
    Michelle Drolet, CEO, Towerwall, Bob Antia, Data Privacy Consultant, Bharath Vasudevan, Alert Logic, Blake Strozdas, Pcysys
    As the average monetary cost of a malware attack continues to increase and currently costs an organization an average of $3.86 M, it is vital to be up to date on detection and prevention best practices. No level of investment prevents or blocks 100% of attacks. You will learn how to continuously identify and address breaches or gaps before they cause real damage. Join leading industry experts as they discuss the use of Deep Learning, AI and MDR solutions.
  • The next wave of Privacy, Security and Compliance - Integrated Risk Management Recorded: Aug 6 2020 47 mins
    Keavy Murphy, Patty Patria, Deidre Diamond, Robert Pellerin
    Learn from our panel of experts as they discuss Privacy, Security and Compliance and how to effectively navigate the ever-evolving compliance mandates and regulations. - Learn how to make information security actionable.
  • Cyber Threats: Protect Your Company's Human and Financial Capital Recorded: Jul 21 2020 41 mins
    Michelle Drolet, Michael Perkins, Jenny Holmes, John Kolar
    Panel of experts will be be addressing and answering questions on what steps an organization can take to limit their exposure to cyber threats that continue to emerge.
  • Zero Trust Architectures Recorded: Jul 2 2020 53 mins
    Michelle Drolet, Towerwall, Itay Nachum, Safe-T, Scott Tingley, Cogito Tom Ward, Qnext
    Data breaches are on the rise, highlighting no organization is safe from cyberattacks. One cause is that workforce mobility and cloud computing has placed most workloads beyond the shelter of corporate networks and traditional perimeter defenses. There are no perimeters.
    What are the issues, drivers and considerations for how Information Technology and Security organizations are applying Zero Trust Network Access (ZTNA) capabilities?
    In this BrightTalk you will learn about:

    1. Key ways that Zero Trust can simplify infosec implementation.
    2. Tips on how to communicate security risk, and the rewards of Zero Trust, to business owners.
    3. How inherent trust is the root of most pervasive issues facing IT today.
    4. Zero Trust adoption research findings: perceptions, progress, investments and initiatives
    • How zero trust facilitates a secure work from home world
    • The need for planning in order to pull it off right and securely (ie: these may no longer be endpoints you control)
  • Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19 Recorded: Jun 4 2020 49 mins
    Diana Kelley, Cybersecurity Field CTO, Microsoft, Michelle Drolet, CEO, Towerwall
    Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
    Wherever we turn it feels like the news is all COVID-19 all the time. Many of us are feeling stressed and overwhelmed and attackers know it. At Microsoft we've seen an increase in the success of phishing attacks, one of the common vectors for malware and ransomware infections. Rather than inventing entirely new exploits, attackers are pivoting their existing infrastructure for ransomware and other malware delivery tools to COVID-19 focused lures to get us to click. In this talk we'll share insights into how the attackers have shifted their lures and provide recommendations for improving detect and response times to reduce the likelihood these attacks will work.
  • Q&A Panel: How to Stay Cybersafe in 2020 Recorded: May 28 2020 57 mins
    Michelle Drolet & Arun Subramoniam Towerwall, Inc., Chris Chaves, Sophos
    Cyberthreats morph rapidly as they try to stay ahead of our defenses; wearing new disguises and breaking down virtual barriers in unique ways. As such, the answer to, "How do I remain secure?" changes as quickly as the cyberthreats we face.

    Join us for an interactive Q&A Panel with experts Chris Chaves of Sophos, and Michelle Drolet and Arun Subramoniam of Towerwall. Engage in a discussion on staying safe in the evolving threat landscape. They'll provide the multi-layered answer to, "How do I stay cybersafe in 2020?", including:

    • What you can do today to remain secure
    • The types of threats Sophos Labs is seeing recently
    • What we know about COVID-19 scams
    • How to correct your security posture
  • Zeroing in on Zero Trust Network Access – Everything You Need to Know Recorded: Nov 6 2019 33 mins
    Michelle Drolet, Tony Yodice
    In today’s modern enterprise, the use of legacy network access solutions has resulted in both an overly complex and inevitably vulnerable perimeter. Poor networking configuration and excess visibility into the perimeter leaves organizations open to both external attack and insider threat.

    Join Michelle Drolet, CEO at Towerwall and Tony Yodice, Director of US Operations at Safe-T to learn:

    -What is Zero Trust Network Access
    -Why modern enterprises require access policies built with an identity centric approach
    -How to protect your organization from the inside out
  • Data Protection & Privacy in 2020 Recorded: Oct 1 2019 57 mins
    Dr. Christopher Pierson | Shahrokh Shahidzadeh | Michelle Drolet | George Wrenn
    What's new in data privacy and security? Discover how the compliance landscape is changing in 2020 and what organizations are doing - or should be doing - to prepare.

    Join this panel of experts for an interactive Q&A session to learn more about what's coming up on the horizon in 2020 regarding data privacy and security, and the steps you can take today.

    Viewers will learn more about:
    - Data regulations and deadline dates to be aware of
    - Privacy in the cloud
    - How to build trust through privacy
    - Recommendations for 2020
    - The CCPA checklist

    Speakers:
    - Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
    - Shahrokh Shahidzadeh, CEO, Acceptto
    - Michelle Drolet, CEO, Towerwall
    - George Wrenn, CEO & Founder, CyberSaint Security

    This Q&A panel is part of National Cyber Security Awareness Month.
    #CyberAware #BeCyberSmart
  • 7 Best Practices for Securing the Public Cloud Recorded: Sep 17 2019 52 mins
    Michelle Drolet and Byron Watson
    Workloads in the public cloud are the new pot of gold for savvy cybercriminals. Often misconfigured and under-secured, they’re an easy way for hackers to steal data and take advantage of your processing power. If you use Amazon Web Services, Microsoft Azure, or Google Cloud Platform, or are thinking about migrating to any of these, this webinar will provide essential insight for you. We’ll cover:

    - How public cloud security differs from traditional on-premises protection
    -What you are (and aren’t) responsible for when using AWS, Azure, and GCP
    -Seven practical steps that will help you stay secure and compliant
  • Live Webcam Panel: Operationalizing Cybersecurity Recorded: Mar 19 2019 56 mins
    Michelle Drolet, Towerwal, Amy McLaughlin, Oregon State University and Ariful Huq, Aporeto
    Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.

    Join us for an interactive Q&A panel with security leaders to learn more about how to operationalize cybersecurity.

    Topics up for discussion:
    - Making information security relatable
    - Building security programs
    - Defining your cybersecurity strategy
    - Translating your cybersecurity strategy into a risk management plan
    - Operationalizing your cybersecurity strategy
    - Using the maturity capability model for measuring success

    Moderator:
    Michelle Drolet, CEO, Towerwall
    Panelists:
    Amy McLaughlin, Director of Information Services, Oregon State University
    Ariful Huq, Director of Product Management, Aporeto
  • Best Practices for Protecting Your Business from Cybercrime Recorded: Feb 19 2019 62 mins
    Michelle Drolet (Towerwall), Michael Thelander (Venafi), William Peteroy (Gigamon), Kalani Enos (kenos)
    Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

    Join this panel of security experts to learn more about:
    - Trends in cybercrime and lessons learned in 2018
    - The cost of data breaches
    - Rise of cryptojacking and ransomware
    - Who are the players who make up the world of cybercrime (e.g. programmers, distributors, fraudsters, etc.)
    - The CISO vs the cybercriminal
    - Best practices for protecting your business

    Speakers:
    - Michelle Drolet, CEO, Towerwall
    - Michael Thelander, Director of Product Marketing, Venafi
    - William Peteroy, Security CTO, Gigamon
    - Kalani Enos, Founder & CEO, kenos Technologies (Moderator)
Information Security
Towerwall is a woman-owned information security company offering a comprehensive suite of security services and solutions using best-of-breed tools and information security services. Our time-tested methodologies provide a consistent, repeatable, and measurable approach to information security; ranging from auditing and profiling to design and implementation. Towerwall’s 4E methodology, Evaluate Establish Educate Enforce, is time-tested, and provides a consistent, repeatable, and measurable approach to information security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live Webcam Panel: Operationalizing Cybersecurity
  • Live at: Mar 19 2019 3:00 pm
  • Presented by: Michelle Drolet, Towerwal, Amy McLaughlin, Oregon State University and Ariful Huq, Aporeto
  • From:
Your email has been sent.
or close