Hi [[ session.user.profile.firstName ]]

Cybersecurity Effectiveness Podcast: Cloud Policy and Evolving Tools

A thorough understanding of the core fundamental principles is critical for those building a career in cybersecurity. Adam Fletcher, CISO at Blackstone, argues that cloud security now falls into that list -- developing a policy or translating a tool to cloud requires extensive knowledge, experience, and leadership skills. He and Brian discuss case-by-case scenarios and how to expand and develop your team given the industry-wide talent shortage.
Recorded Nov 5 2019 23 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adam Fletcher, CISO | Blackstone
Presentation preview: Cybersecurity Effectiveness Podcast: Cloud Policy and Evolving Tools

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How Continuous Validation Helps Protect the Supply Chain Sep 22 2020 3:00 pm UTC 60 mins
    Matt Shelton, Director, Technology Risk and Threat Intelligence, FireEye
    The Expanding Attack Surface: How Continuous Validation Helps Protect the Supply Chain

    Organizations are increasingly using third party providers to manage critical components of their infrastructure. The introduction of cloud services, managed service providers, and Software-as-a-Service (SaaS) has increased the size of an organization’s attack surface. A breach of proprietary and confidential information is just as impactful coming from the supply chain as it is from an organization’s infrastructure. Join Matt Shelton, Director, Technology Risk and Threat Intelligence, as he explains how intelligence-led validation can help tighten controls and reduce risk. In this webinar:

    -Hear about the realities of today’s threat landscape, sophisticated attackers and the implications on managing your security stack and processes
    -Learn how threat intelligence helps you take decisive action
    -Find out how continuous validation helps you understand the true measure of your security
    -Get insights into an actual use case where a company’s supply chain was breached to see how intelligence-led validation could have helped prevent it

    Register Now
  • Validating Helix Recorded: Jul 14 2020 52 mins
    Steve Lodin, Sr Director of Cybersecurity Operations for Sallie Mae & Brian Contos, VP, Technology Innovation for Mandiant
    Sallie Mae Sr. Director of Cybersecurity Operations Steve Lodin returns to the podcast to share his experiences introducing and maintaining cloud-based SIEM to existing infrastructure. He and Brian discuss the technicalities of transferring a mid-size financial organization to the cloud.
  • The Ultimate Pairing of Threat Intel and Validation Recorded: Jun 30 2020 30 mins
    Brian Contos, VP, Technology Innovation for Mandiant Security Validation & Sandra Joyce SVP, Global Intelligence for Mandiant
    Sandra Joyce, FireEye SVP & Head of Global Intelligence, returns to talk with Brian about recent infamous hacker groups’ exploitation of COVID-19, why having more security tools damages your chance of surviving a breach, and gives insight into findings from the Mandiant Validation Security Effectiveness Report.
  • Validate Security Performance to Rationalize Investments Recorded: Jun 11 2020 52 mins
    General Earl Matthews, VP of Strategy for Mandiant Security Validation
    Security assumptions do not equal security effectiveness. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. Only through security validation and continual measurement of security effectiveness across technology, people and processes can you rationalize cyber security investments and prove value to the C-suite.

    In this session, led by General Earl Matthews, VP of Strategy for Mandiant Security Validation, you can learn:

    - Best practices for investment prioritization when it comes to hiring, training and security solution procurement
    - How security validation testing can identify areas of overlap in capabilities, inefficiencies in product expectations, and gaps in overall security posture, and help you optimize performance and value
    - Steps to take to strengthen your security posture and minimize cyber risk in order to protect your brand reputation and economic value
  • Measure, improve & optimize your cybersecurity with Mandiant Security Validation Recorded: Jun 9 2020 54 mins
    Lluis Coma, EMEA Consulting Sales Engineer, FireEye
    Mandiant Security Validation allows you to accurately assess a company's security posture. We help our clients take a proactive approach to identifying and mitigating risks due to incorrect configurations, inefficiencies in products, and / or established security processes.

    Register for the webinar and find out how Mandiant Security Validation enables you to:

    • Evaluate your security posture in order to prioritize investments;
    • Optimize the configuration of your technologies to maximize the return on investment;
    • Compare your security with market standards such as MITRE ATT&CK Framework and others;
    • Test the correct operation of your DLP-type tools;
    • Measure the security of your security processes in the CLOUD;
    • Validate the correct operation of your Endpoint tools;
    • Confirm network segmentation in IT / OT / SCADA environments.

    The results can be extremely interesting for managers of SOCs, CISOs and for the Board of Directors.
  • Security Validation - what is it and how can it improve security effectiveness? Recorded: Jun 9 2020 61 mins
    Mike Batten - VP Sales Engineering EMEA, FireEye
    In order to stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:

    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Mike Batten, VP Sales Engineering EMEA, for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk
    -View the results of a recent security effectiveness report, spanning the production environments of multiple industries and enterprises

    Register Now!
  • An Intelligence Driven Approach to Security Validation Recorded: Jun 9 2020 56 mins
    Shashwath Hegde, Solutions Architect, APAC
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This continues to be a growing problem in the cyber security industry as organizations struggle to justify the high-cost of their defences.
    We make significant investments to justify our methods of stopping evil. However, we rarely spend time in measuring our methods or investments. Instead, we rely on assumptions to guide our decisions and justify our judgements. In this session, we will explore real world data and dive deep into the performance of cybersecurity controls across enterprise networks; from email, endpoint, network to cloud-based controls and examine some alarming results. As organizations continue to struggle to justify the high-cost of their defences, Security Validation provides a solution to validate, consolidate, recoup and maximize the value from existing investments.
  • FireEye Chat | Front and Center: How to Empower. Evolve. Defend. Recorded: Jun 5 2020 28 mins
    Vasu Jakkal CMO; Major General Earl Matthews VP, Strategy, Mandiant Security Validation; Martin Holste Cloud CTO
    Cyber attackers never rest, but neither does FireEye. In our upcoming Virtual Summit on June 9-11, industry professionals will showcase best practices, research and strategies to empower organizations to evolve their cyber security solutions and better defend against attackers.

    In this latest episode of the quarterly talk show FireEye Chat, we dive deeper into two topics from the virtual summit: security effectiveness and cloud security. Watch now to hear from our experts who are front and center from their homes as they tackle these common questions:

    • How secure are you? And can we be sure we’re protected against the evolving threat landscape?
    • Are your cyber security products effective and working the way they should?
    • Do you know how to be secure in the cloud?
    • What should you consider when moving to the cloud?
  • 2020 Mandiant Security Effectiveness Report Findings Recorded: May 19 2020 60 mins
    Matt Hartley SVP Mandiant Strategy for FireEye Mandiant & Devon Goforth Sr Dir Security Instrumentation for FireEye Mandiant
    2020 Mandiant Security Effectiveness Report Findings: A deep dive into cyber reality

    Join our webinar to understand why a majority of tested attacks successfully infiltrate enterprise environments without detection – and why security validation is so critical.

    The Mandiant Security Effectiveness Report 2020 takes a deep dive look into cybersecurity performance across network, email, endpoint, and cloud-based security controls – and confirms the prevailing concern: security controls are not performing as expected. Alarmingly, thousands of tests performed by experts from the Mandiant Security Validation (previously known as Verodin) team show that for 53% of the environments tested, attacks were successful in bypassing controls without knowledge. This points to the need for continuous validation of security effectiveness based on four fundamental components.

    Register for our upcoming webinar to learn about the fundamentals of security validation and gain the knowledge to answer questions such as:

    - Do I have confidence in the effectiveness of my security controls?
    - Can I quickly assess the relevance of threat intelligence or exposure to the latest attack?
    - Am I stopping data leakage and protecting data integrity?
    - How can I simplify and standardize my security stack?
    - Do I have evidence to support communicating key metrics to executives?

    Register Now to Reserve Your Seat!
  • Validating Security Effectiveness with an Evidence-based Approach Recorded: May 14 2020 52 mins
    Brian Contos, VP Technology Innovation| FireEye Mandiant & Jeff Vinson, CISO & VP |Harris Health System
    Cybersecurity spending must be tied to business relevance - protecting business continuity, protecting critical assets, rationalizing investments, and demonstrating compliance with regulatory mandates. This is accomplished through an effective security validation program that utilizes automation and an intelligence-driven approach to mitigate risk, optimize controls, and communicate value.

    Join Brian Contos, VP Technology Innovation| FireEye Mandiant and Jeff Vinson, CISO & VP |Harris Health System as they discuss how Mandiant Security Validation (formerly Verodin) helps organizations automate real-time monitoring by leverage an intelligence-driven methodology to maximize the value and mitigate risk.

    In the session they will discuss:
    >> Delivering value for security teams and executives
    >> Leveraging automation, real-time monitoring and input from threat intelligence and incident response for an effective security program
    >> Managing the impacts of COVID-19 on your security team

    Register Now to Reserve Your Seat!
  • Security Effectiveness Strategies Recorded: May 13 2020 59 mins
    Major General Earl Matthews, VP of Strategy, Mandiant Security Validation& Jeff Compton, Global Head, Mandiant Threat Intel
    Security Effectiveness Strategies: How to Validate and Improve Your Security Posture

    To stay ahead of an evolving threat landscape, security teams must continuously improve their processes and technology. But even with their investments, security professionals still need answers to pressing questions:
    -Who are the attackers that target my industry and what techniques do they use?
    -Which alerts matter most and how do I respond?
    -Are my tools, controls, processes working as expected?
    -Where should I focus improvement efforts?

    Join Major General Earl Matthews USAF (Ret), VP of Strategy, Mandiant Solutions and Jeff Compton, Senior Manager, Global Head of Intelligence Consulting, FireEye Mandiant Threat Intelligence for our upcoming webinar to:

    -Learn how cyber threat intelligence can inform which attackers target your industry and understand the techniques they employ
    -Find out how continuous validation can pinpoint where you have gaps so you can target improvements where they are needed
    -Understand how validation technology powered by relevant intelligence can generate proof of effectiveness and reduce risk

    Register Now
  • 5 Steps to Security Validation Recorded: Apr 27 2020 61 mins
    Major General Earl Matthews (USAF)
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we believe that our security teams are well trained and practiced when everything goes wrong. These assumptions result in financial and operational inefficiencies, defensive regression and an inability to determine if we are investing in the right areas to communicate the state of our security effectiveness to stakeholders.

    Join this webinar to hear from Retired Major General Earl Matthews (USAF), as he discusses:

    • How to move beyond assumptions with automated and continuous security controls validation
    • Identify and measure vulnerability gaps
    • Manage and suggest remediation steps by arming security practitioners with meaningful evidence
    • Validate an organization's ability to defend itself by using real adversary behaviors

    Save your seat today!
  • Instrumenting Cloud Security to Validate Critical Controls Recorded: Apr 1 2020 60 mins
    Kimberly Underwood, Senior Editor | SIGNAL Media; Major General Earl Matthews, USAF (Ret), CSO | Verodin, now part of FireEye
    More and more organizations and government agencies are increasing the implementation of on-premises and public cloud infrastructure. Now that networks and workloads are more dynamic, moving across on-prem, edge, and multi-cloud environments, they are also more vulnerable. Most security issues – cloud and otherwise – happen because security professionals often do not have the means to confirm controls and strategies such as segmentation, are operating as intended.

    Security Instrumentation offers a way for security practitioners to continuously measure, manage and optimize cybersecurity effectiveness. One key to improving security in the cloud is continuous environmental drift validation – being able to validate that changes in cloud network layers and security controls do not have an unforeseen or negative impact on security.

    Join this webinar to learn how a proactive, repeatable and measurable approach with Security Instrumentation, can enable your organization to identify risks in your security controls before a breach occurs and orchestrate the processes needed to optimize defenses.
  • Building and Managing an Effective Security Operations Program Recorded: Mar 25 2020 60 mins
    Sara Peters, Senior Editor | Dark Reading & Colby DeRodeff, CTO | Verodin
    Whether you have a full-blown security operations center (SOC) or just a single security person, there are some functions that every organization must execute in order to keep their most sensitive data safe. In this instructive keynote address, top SOC experts discuss some of the key capabilities required for security operations, as well as essential tools, people, and practices for building out the security operations function in your organization.
  • The Case for Continuous Security Validation and Why it Matters to You Recorded: Feb 25 2020 29 mins
    Earl Matthews, Chief Strategy Officer, Verodin & Nathan Wenzler, Chief Security Strategist, Tenable
    Organizations make significant investments to ensure protection of critical assets, yet without data-driven evidence demonstrating security performance, companies operate on assumptions. This could put them at high risk of an attack.

    Until now, there was no way to prove and confidently report on which security controls were working and which were not. Yet the market has shifted to one in which Boards of Directors, CEOs, and leaders are demanding verifiable proof that their organizations are protected against the evolving threat landscape.

    Security validation enables organizations to achieve optimal cybersecurity performance by validating the effectiveness of people, processes and technology through ongoing assessment, optimization and rationalization. As a result, companies minimize cyber risk across the entire business while protecting their reputation and economic value.

    Join this exclusive video interview with Earl Matthews, Chief Strategy Officer at Verodin to learn more about:
    - What security validation is and how it is different from breach and attack simulation
    - Why is security validation so important now, in 2020
    - The security risk with cloud migration
    - How does cyber risk translate to real dollars
  • Addressing Cyber Risk and Security Effectiveness in the Digital Age Recorded: Dec 19 2019 87 mins
    Brian Contos, CISO - Verodin and Ryan Dodd, Founder and CEO - Cyberhedge
    Digital transformation is sweeping the modern world of business as organizations become increasingly cloud-based, automated, and global. Even companies not historically associated with technology, such as industry and manufacturing, are implementing digital transformation strategies. As they do so, they must choose between top-line growth, cost-savings, and cybersecurity. Too often, organizations choose to prioritize growth and cost efficiencies over security, ultimately leaving their valuable digital assets unprotected

    Join experts from Verodin, now a part of FireEye, and Cyberhedge, a financial services firm specializing in managing technology risk, for the webinar: Addressing Cyber Risk and Security Effectiveness in the Digital Age scheduled for Thursday, December 19th at 1:00pm ET.

    The online event featuring Brian Contos, CISO - Verodin and Ryan Dodd, Founder and CEO – Cyberhedge will discuss:

    - The changing threat landscape
    - The evolution of assumption based versus evidence based cybersecurity tools
    - The concept of validating and measuring security effectiveness
    - The need for companies and investors to understand and manage the associated risks of digital transformation
  • Cybersecurity Effectiveness Podcast: Cloud Policy and Evolving Tools Recorded: Nov 5 2019 23 mins
    Adam Fletcher, CISO | Blackstone
    A thorough understanding of the core fundamental principles is critical for those building a career in cybersecurity. Adam Fletcher, CISO at Blackstone, argues that cloud security now falls into that list -- developing a policy or translating a tool to cloud requires extensive knowledge, experience, and leadership skills. He and Brian discuss case-by-case scenarios and how to expand and develop your team given the industry-wide talent shortage.
  • Cybersecurity Effectiveness Podcast: Cloud Migration: The Golden Rules Recorded: Nov 5 2019 24 mins
    Steve Lodin, Sr Dir. Cyber Security Operations | Sallie Mae
    Cloud security continues to attract more organizations seeking for better storage, but the prospect of data leakage hold some back from joining the bandwagon. Steve Lodin, Sr. Director of Cyber Operations at Sallie Mae, shares his “golden rules” for introducing it to your organization, advice for a bullet-proof migration, and lessons learned from decades of working in corporate security.
  • Cybersecurity Effectiveness Podcast: Teen’s Guide to Building Smart Cyber Habits Recorded: Oct 7 2019 10 mins
    Athena Contos, 7th grader
    Today’s teens interact daily with technology more than ever before. Ease of access to the online world for things such as streaming, social media, and shopping comes with the big responsibility to develop smart computer habits early in life. This episode features the series’ youngest guest to date: seventh grader Athena Contos, who shares personal examples of cyber carelessness, foundational tips for building good habits, and more.

    For more commentary and insight from the best and brightest in our industry, visit the Cybersecurity Effectiveness Podcast at https://www.verodin.com/podcast.
  • Cybersecurity Effectiveness Podcast: If Not You, Then Who? Recorded: Oct 3 2019 18 mins
    Parry Aftab, digital privacy lawyer & policy advisor
    In many ways, cybersecurity is the same way it once was over 20 years ago in terms of risk, only with different devices, activities, and added ways of access. Parry Aftab, who was one of the world’s first cyber lawyers back in the early 90s, shares her work with multiple cyber safety organizations, tips on supporting kids who fall victim to cyberbullying, and being featured in a custom cyber safety Marvel comic.
Insight on validating the effectiveness of cybersecurity controls
Verodin, now part of FireEye, has made it possible for organizations to validate the effectiveness of cyber security controls, thereby protecting their reputation and economic value. By measuring and testing security environments against both known and newly discovered threats, organizations can identify risks in security controls before a breach occurs and permits companies to rapidly adapt their defenses to the evolving threat landscape.
Cybersecurity experts from around the globe share experiences about their journey to increase security effectiveness.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybersecurity Effectiveness Podcast: Cloud Policy and Evolving Tools
  • Live at: Nov 5 2019 10:05 pm
  • Presented by: Adam Fletcher, CISO | Blackstone
  • From:
Your email has been sent.
or close