Battle of Midway / Your strategy to Cloud Security: Using Battle of Midway board game to help build a better Cloud defense model. How Cloud host instance forensic acquisition presents certain challenges to your forensics teams. Talk about how traditional forensic methods are not effective in the cloud. Discussion on process and infrastructure required to do this level of inspection.
By the end of this talk you will be able to apply these strategies to activities such as Threat Hunting.
We do not guarantee you will be a better Battle of Midway game player but you will walk away with a Cloud defense strategy.
RecordedOct 21 202051 mins
Your place is confirmed, we'll send you email reminders
Keavy Murphy, Patty Patria, Deidre Diamond, Robert Pellerin
Learn from our panel of experts as they discuss Privacy, Security and Compliance and how to effectively navigate the ever-evolving compliance mandates and regulations. - Learn how to make information security actionable.
Michelle Drolet, Towerwall, Itay Nachum, Safe-T, Scott Tingley, Cogito Tom Ward, Qnext
Data breaches are on the rise, highlighting no organization is safe from cyberattacks. One cause is that workforce mobility and cloud computing has placed most workloads beyond the shelter of corporate networks and traditional perimeter defenses. There are no perimeters.
What are the issues, drivers and considerations for how Information Technology and Security organizations are applying Zero Trust Network Access (ZTNA) capabilities?
In this BrightTalk you will learn about:
1. Key ways that Zero Trust can simplify infosec implementation.
2. Tips on how to communicate security risk, and the rewards of Zero Trust, to business owners.
3. How inherent trust is the root of most pervasive issues facing IT today.
4. Zero Trust adoption research findings: perceptions, progress, investments and initiatives
• How zero trust facilitates a secure work from home world
• The need for planning in order to pull it off right and securely (ie: these may no longer be endpoints you control)
Michael Mimo, Copyright Clearance Center, Sr. Director of Information Technology
Battle of Midway / Your strategy to Cloud Security: Using Battle of Midway board game to help build a better Cloud defense model. How Cloud host instance forensic acquisition presents certain challenges to your forensics teams. Talk about how traditional forensic methods are not effective in the cloud. Discussion on process and infrastructure required to do this level of inspection.
By the end of this talk you will be able to apply these strategies to activities such as Threat Hunting.
We do not guarantee you will be a better Battle of Midway game player but you will walk away with a Cloud defense strategy.
Michael Mimo, Copyright Clearance Center, Sr. Director of Information Technology
Battle of Midway / Your strategy to Cloud Security: Using Battle of Midway board game to help build a better Cloud defense model. How Cloud host instance forensic acquisition presents certain challenges to your forensics teams. Talk about how traditional forensic methods are not effective in the cloud. Discussion on process and infrastructure required to do this level of inspection.
By the end of this talk you will be able to apply these strategies to activities such as Threat Hunting.
We do not guarantee you will be a better Battle of Midway game player but you will walk away with a Cloud defense strategy.
Diana Kelley, Cybersecurity Field CTO, Microsoft, Michelle Drolet, CEO, Towerwall
Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
Wherever we turn it feels like the news is all COVID-19 all the time. Many of us are feeling stressed and overwhelmed and attackers know it. At Microsoft we've seen an increase in the success of phishing attacks, one of the common vectors for malware and ransomware infections. Rather than inventing entirely new exploits, attackers are pivoting their existing infrastructure for ransomware and other malware delivery tools to COVID-19 focused lures to get us to click. In this talk we'll share insights into how the attackers have shifted their lures and provide recommendations for improving detect and response times to reduce the likelihood these attacks will work.
Michelle Drolet & Arun Subramoniam Towerwall, Inc., Chris Chaves, Sophos
Cyberthreats morph rapidly as they try to stay ahead of our defenses; wearing new disguises and breaking down virtual barriers in unique ways. As such, the answer to, "How do I remain secure?" changes as quickly as the cyberthreats we face.
Join us for an interactive Q&A Panel with experts Chris Chaves of Sophos, and Michelle Drolet and Arun Subramoniam of Towerwall. Engage in a discussion on staying safe in the evolving threat landscape. They'll provide the multi-layered answer to, "How do I stay cybersafe in 2020?", including:
• What you can do today to remain secure
• The types of threats Sophos Labs is seeing recently
• What we know about COVID-19 scams
• How to correct your security posture
Michelle Drolet, Towerwall, Itay Nachum, Safe-T, Scott Tingley, Cogito Tom Ward, Qnext
Data breaches are on the rise, highlighting no organization is safe from cyberattacks. One cause is that workforce mobility and cloud computing has placed most workloads beyond the shelter of corporate networks and traditional perimeter defenses. There are no perimeters.
What are the issues, drivers and considerations for how Information Technology and Security organizations are applying Zero Trust Network Access (ZTNA) capabilities?
In this BrightTalk you will learn about:
1. Key ways that Zero Trust can simplify infosec implementation.
2. Tips on how to communicate security risk, and the rewards of Zero Trust, to business owners.
3. How inherent trust is the root of most pervasive issues facing IT today.
4. Zero Trust adoption research findings: perceptions, progress, investments and initiatives
• How zero trust facilitates a secure work from home world
• The need for planning in order to pull it off right and securely (ie: these may no longer be endpoints you control)
Keavy Murphy, Patty Patria, Deidre Diamond, Robert Pellerin
Learn from our panel of experts as they discuss Privacy, Security and Compliance and how to effectively navigate the ever-evolving compliance mandates and regulations. - Learn how to make information security actionable.
Michelle Drolet, CEO, Towerwall, Bob Antia, Data Privacy Consultant, Bharath Vasudevan, Alert Logic, Blake Strozdas, Pcysys
As the average monetary cost of a malware attack continues to increase and currently costs an organization an average of $3.86 M, it is vital to be up to date on detection and prevention best practices. No level of investment prevents or blocks 100% of attacks. You will learn how to continuously identify and address breaches or gaps before they cause real damage. Join leading industry experts as they discuss the use of Deep Learning, AI and MDR solutions.
Michelle Drolet, CEO, Towerwall, Bob Antia, Data Privacy Consultant, Bharath Vasudevan, Alert Logic, Blake Strozdas, Pcysys
As the average monetary cost of a malware attack continues to increase and currently costs an organization an average of $3.86 M, it is vital to be up to date on detection and prevention best practices. No level of investment prevents or blocks 100% of attacks. You will learn how to continuously identify and address breaches or gaps before they cause real damage. Join leading industry experts as they discuss the use of Deep Learning, AI and MDR solutions.
Keavy Murphy, Patty Patria, Deidre Diamond, Robert Pellerin
Learn from our panel of experts as they discuss Privacy, Security and Compliance and how to effectively navigate the ever-evolving compliance mandates and regulations. - Learn how to make information security actionable.
Michelle Drolet, Michael Perkins, Jenny Holmes, John Kolar
Panel of experts will be be addressing and answering questions on what steps an organization can take to limit their exposure to cyber threats that continue to emerge.
Michelle Drolet, Towerwall, Itay Nachum, Safe-T, Scott Tingley, Cogito Tom Ward, Qnext
Data breaches are on the rise, highlighting no organization is safe from cyberattacks. One cause is that workforce mobility and cloud computing has placed most workloads beyond the shelter of corporate networks and traditional perimeter defenses. There are no perimeters.
What are the issues, drivers and considerations for how Information Technology and Security organizations are applying Zero Trust Network Access (ZTNA) capabilities?
In this BrightTalk you will learn about:
1. Key ways that Zero Trust can simplify infosec implementation.
2. Tips on how to communicate security risk, and the rewards of Zero Trust, to business owners.
3. How inherent trust is the root of most pervasive issues facing IT today.
4. Zero Trust adoption research findings: perceptions, progress, investments and initiatives
• How zero trust facilitates a secure work from home world
• The need for planning in order to pull it off right and securely (ie: these may no longer be endpoints you control)
Diana Kelley, Cybersecurity Field CTO, Microsoft, Michelle Drolet, CEO, Towerwall
Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
Wherever we turn it feels like the news is all COVID-19 all the time. Many of us are feeling stressed and overwhelmed and attackers know it. At Microsoft we've seen an increase in the success of phishing attacks, one of the common vectors for malware and ransomware infections. Rather than inventing entirely new exploits, attackers are pivoting their existing infrastructure for ransomware and other malware delivery tools to COVID-19 focused lures to get us to click. In this talk we'll share insights into how the attackers have shifted their lures and provide recommendations for improving detect and response times to reduce the likelihood these attacks will work.
Michelle Drolet & Arun Subramoniam Towerwall, Inc., Chris Chaves, Sophos
Cyberthreats morph rapidly as they try to stay ahead of our defenses; wearing new disguises and breaking down virtual barriers in unique ways. As such, the answer to, "How do I remain secure?" changes as quickly as the cyberthreats we face.
Join us for an interactive Q&A Panel with experts Chris Chaves of Sophos, and Michelle Drolet and Arun Subramoniam of Towerwall. Engage in a discussion on staying safe in the evolving threat landscape. They'll provide the multi-layered answer to, "How do I stay cybersafe in 2020?", including:
• What you can do today to remain secure
• The types of threats Sophos Labs is seeing recently
• What we know about COVID-19 scams
• How to correct your security posture
In today’s modern enterprise, the use of legacy network access solutions has resulted in both an overly complex and inevitably vulnerable perimeter. Poor networking configuration and excess visibility into the perimeter leaves organizations open to both external attack and insider threat.
Join Michelle Drolet, CEO at Towerwall and Tony Yodice, Director of US Operations at Safe-T to learn:
-What is Zero Trust Network Access
-Why modern enterprises require access policies built with an identity centric approach
-How to protect your organization from the inside out
Dr. Christopher Pierson | Shahrokh Shahidzadeh | Michelle Drolet | George Wrenn
What's new in data privacy and security? Discover how the compliance landscape is changing in 2020 and what organizations are doing - or should be doing - to prepare.
Join this panel of experts for an interactive Q&A session to learn more about what's coming up on the horizon in 2020 regarding data privacy and security, and the steps you can take today.
Viewers will learn more about:
- Data regulations and deadline dates to be aware of
- Privacy in the cloud
- How to build trust through privacy
- Recommendations for 2020
- The CCPA checklist
Speakers:
- Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
- Shahrokh Shahidzadeh, CEO, Acceptto
- Michelle Drolet, CEO, Towerwall
- George Wrenn, CEO & Founder, CyberSaint Security
This Q&A panel is part of National Cyber Security Awareness Month.
#CyberAware #BeCyberSmart
Workloads in the public cloud are the new pot of gold for savvy cybercriminals. Often misconfigured and under-secured, they’re an easy way for hackers to steal data and take advantage of your processing power. If you use Amazon Web Services, Microsoft Azure, or Google Cloud Platform, or are thinking about migrating to any of these, this webinar will provide essential insight for you. We’ll cover:
- How public cloud security differs from traditional on-premises protection
-What you are (and aren’t) responsible for when using AWS, Azure, and GCP
-Seven practical steps that will help you stay secure and compliant
Michelle Drolet, Towerwal, Amy McLaughlin, Oregon State University and Ariful Huq, Aporeto
Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.
Join us for an interactive Q&A panel with security leaders to learn more about how to operationalize cybersecurity.
Topics up for discussion:
- Making information security relatable
- Building security programs
- Defining your cybersecurity strategy
- Translating your cybersecurity strategy into a risk management plan
- Operationalizing your cybersecurity strategy
- Using the maturity capability model for measuring success
Moderator:
Michelle Drolet, CEO, Towerwall
Panelists:
Amy McLaughlin, Director of Information Services, Oregon State University
Ariful Huq, Director of Product Management, Aporeto
Michelle Drolet (Towerwall), Michael Thelander (Venafi), William Peteroy (Gigamon), Kalani Enos (kenos)
Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?
Join this panel of security experts to learn more about:
- Trends in cybercrime and lessons learned in 2018
- The cost of data breaches
- Rise of cryptojacking and ransomware
- Who are the players who make up the world of cybercrime (e.g. programmers, distributors, fraudsters, etc.)
- The CISO vs the cybercriminal
- Best practices for protecting your business
Speakers:
- Michelle Drolet, CEO, Towerwall
- Michael Thelander, Director of Product Marketing, Venafi
- William Peteroy, Security CTO, Gigamon
- Kalani Enos, Founder & CEO, kenos Technologies (Moderator)
Towerwall is a woman-owned information security company offering a comprehensive suite of security services and solutions using best-of-breed tools and information security services. Our time-tested methodologies provide a consistent, repeatable, and measurable approach to information security; ranging from auditing and profiling to design and implementation. Towerwall’s 4E methodology, Evaluate Establish Educate Enforce, is time-tested, and provides a consistent, repeatable, and measurable approach to information security.
Best Practice for Cloud Host-Based ForensicsMichael Mimo, Copyright Clearance Center, Sr. Director of Information Technology[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]51 mins