Hi [[ session.user.profile.firstName ]]

Ethical Hackers: Redefining The Security Landscape

As security breaches and attacks become more sophisticated and complex, managing your vulnerabilities and gaining a human perspective on your security gaps is an effective way to protect your attack surface.

With 34% of ethical hackers and vulnerability researchers reporting that they have seen more bugs due to pandemic-driven Digital Transformation initiatives (HackerOne), now is the time to integrate a human element into your security controls.

In this episode of The (Security) Balancing Act we’ll deep dive into the threat landscape, looking at why the insights of an outsider might be just what your organization needs.

Join us as we discuss:

- The value ethical hackers and vulnerability researchers can bring to your organization
- Why ethical hackers and vulnerability researchers are more valuable now than ever before
- Considerations for crowdsourcing ethical hacking and penetration testing
- How bug bounty programs benefit companies and the research community
- What to know if you are thinking of launching a bug bounty program
- How ethical hackers and vulnerability researchers enhance vulnerability management
- The 2021 threat landscape
Recorded Jul 14 2021 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Diana Kelley, SecurityCurve | Jim Richberg, Fortinet | Nuno Almeida, BitSight | Luke Tucker, HackerOne |
Presentation preview: Ethical Hackers: Redefining The Security Landscape

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • New Horizons: Bringing Cloud-Native Security into the Data Center & Edge Oct 6 2021 3:00 pm UTC 45 mins
    Johna Till Johnson, Sameer Vasanthapuram, Aidan Walden
    In the previous episode, we explored designing for transparent cloud network security and how implementing solutions like a gateway load balancing tool can drive business results by enabling consistent performance and security. Building upon that discussion, the next question and focal point of this episode will explore why and how to extend cloud-native security into the cloud data center and edge.

    In this second episode in AWS & Fortinet’s series about next-gen cloud security capabilities, hear from our host Johna Till Johnson of Nemertes alongside speakers Sameer Vasanthapuram of AWS and Aidan Walden of Fortinet to learn best-in-class solutions for extended cloud-native security that help businesses safely enable better transparency for app developers and users. Key topics include:

    -Evolutions in cloud computing that have led to a greater need for cloud-native security solutions
    -Why cloud-native is now particularly relevant for the cloud data center and also computing edges
    -How AWS outposts are implementing cloud-native solution FortiGate and enabling high availability
    -Business outcomes of implementing cloud-native solutions
  • A New Approach to Cloud Security for Financial Services with Fortinet and AWS Recorded: Sep 23 2021 34 mins
    Diana Kelley, Jennifer Code and Jonathan Nguyen-Duy
    Many Financial Services organizations have kick-started their migration to the cloud. But how should you approach security and development to make the most of what cloud services can offer? Fortinet security solutions and Amazon Web Services (AWS) can help FinServ organizations enhance their security in the cloud.

    Fortinet’s partnership with AWS is a better-together combination that ensures your workloads on AWS are protected by best-in-class security solutions powered by comprehensive threat intelligence. In this conversation between Fortinet and AWS experts, learn how to:

    • Stay on top of emerging security threats
    • Ensure you’re meeting industry privacy and regulatory requirements
    • Better automate and gain visibility into your security data
    • Use AI to bolster security
    • Keep developers moving fast and secure

    Hear from:
    •Diana Kelley, CTO & Founding Partner, SecurityCurve
    •Jonathan Nguyen-Duy, Vice President, Field CISO Strategic Services, Fortinet
    •Jennifer Code, Sr. Manager – GFS CSM, Principal – FSI Cloud Governance, AWS
  • Cybersecurity in the C-Suite Recorded: Sep 15 2021 56 mins
    Diana Kelley, SecurityCurve | Richard Meeus, Akamai | John Jacobs, Fortinet | Mike Davis, ExactlyIT
    C-Level executives are increasingly being targeted by cyber criminals: according to an IBM survey, “64% of CFOs, CHROs and CMOs feel the least engaged in cybersecurity threat management activities, yet are the stewards of data most coveted by cybercriminals.” With cybersecurity no longer limited to the concerns of the IT department and the broader workforce, in 2021 the risk of breaches and attacks touch every part of the organisation.

    Integrating security controls at all business levels, sharing incident data and making cybersecurity an essential pillar of business considerations and training goes a long way to help CISOs and security leaders navigate the increasing threats and vulnerabilities.

    In this month’s episode of The (Security) Balancing Act we’ll be sharing how IT security leaders can ensure everyone - and every part - of the business is safe. Join as we evaluate:

    - To what extent cybersecurity should be a priority in the C-Suite
    - How C-Level execs should consider their role in relation to cybersecurity
    - How training and education can help CISOs navigate increased risk at all business levels
    - And more

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • The Advantages of Transparent Cloud Network Security Recorded: Sep 7 2021 36 mins
    Aidan Walden, Sameer Vasanthapuram, Johna Till Johnson
    Maintaining and enhancing cloud network visibility has never been more important for driving business results — and yet the challenges to enabling this necessary transparency are quickly evolving and increasingly complex, with 75% of organizations now in need of better network visibility. In a cloudscape of more insidious network threats and sophisticated attackers, how can businesses better protect their workload applications without compromising availability for both users and developers, which is imperative to their organization’s productivity and growth?

    In this inaugural episode in AWS & Fortinet’s series about next-gen cloud security capabilities, hear from our host and expert guest speakers to learn about best-in-class solutions for cloud network security that help businesses safely enable better transparency for app developers and users — ultimately, driving their organization’s bottom line. Key topics include:

    -Challenges to maintaining cloud network transparency — and why doing so is critical
    -Solutions for enabling network security transparency that doesn’t compromise security
    -Business outcomes of implementing the solutions

    Presented by Fortinet's Aidan Walden, Global Director of Public Cloud Architecture and Engineering; AWS's Sameer Vasanthapuram, Partner Solutions Architect; and Johna Till Johnson, CEO of Nemertes
  • Defend your High Performance Web Applications with Amazon and Fortinet Recorded: Sep 2 2021 49 mins
    Brian Schwarz, Application Security, Fortinet, Shawn Brady, Head of Global Partnerships, Edge Services, AWS
    Securing Your Entire Infrastructure with Amazon CloudFront and Fortinet Web Application and API Security Solutions You need applications to provide the scale and performance that your customers demand. Watch this webinar to learn how Fortinet Web Application and API Security Solutions for Amazon CloudFront: secure your entire infrastructure, protect against known and unknown vulnerabilities, and provide high availability and low latency for data, apps, and APIs
  • Getting Hybrid Clouds, Security and Networking Right Recorded: Aug 25 2021 32 mins
    Jonathan Nguyen-Duy, Vice President, Field CISO Team, Fortinet
    Rapid adoption of hybrid clouds means networks are now more distributed than ever before and business values are shifting toward agility, innovation and software, leading to the rise of the software-defined enterprise.

    Hybrid cloud adoption is also driving three strategic technology trends: zero trust, SD-WAN and SASE. Going forward, IT teams must grapple with these key trends, while managing a combination of in-house and service-provider solutions and balancing risk management with business objectives and customer experiences. How should we think about computing, networking, and security when enterprises own less infrastructure, platform and software?

    In this session, you’ll learn:
    - strategies to deploy adaptive cloud security, zero trust, SD-WAN and SASE in an integrated fashion;
    - practical strategies to secure hybrid clouds; and
    - how to deliver better outcomes and experiences.
  • SASE for the Hybrid Workforce Recorded: Aug 18 2021 62 mins
    Diana Kelley, Host | Jonathan Nguyen-Duy, Fortinet | Mark Guntrip, Menlo Security | Charles Kolodgy, Security Mindsets
    In the last year, the move to remote and hybrid working models - and newly distributed employees accessing data from distributed locations - has opened up a need for more stringent and secure network access security models.

    This is balanced with the need for remote employees to have access to reliable, low-latency access and connectivity to cloud and data center applications. So what’s the solution? According to many, it’s SASE. SASE provides a flexible, simplistic no-fuss, secure access model and Gartner predicts that by 2024, at least 40% of enterprises will have explicit strategies to adopt SASE. But what is SASE and why is it being heralded as the future of network security?

    Join us in this episode of The (Security) Balancing Act as security experts discuss:

    - What exactly SASE offers that traditional network security controls don’t
    - How SASE adoption has been in part fuelled by the pandemic, and what this means moving forward into the ’new normal’
    - The future of secure access models, and what to expect over the next 12 months
    - And more
  • 2021 ‘Year of the Hybrid’ and How it Impacts Governments Recorded: Aug 10 2021 54 mins
    Jim Richberg, Federal CISO, Fortinet
    2021 will be a year of blended activity by organizations, employees, and threat actors alike. Work patterns and locations will continue to shift, process automation will affect how organizations operate and support their customers and citizens, and threat activity will evolve in terms of types of attack, tactics, and impact. We’ll discuss changing trends in federal, state and local governments and how this impacts their ability to protect their people, systems and data.

    Join us to hear:

    - What governments are doing in response to this changing dynamic
    - Lessons learned that can help public sector organizations in this hybrid mode
    - Recommendations on three specific areas your organization should focus on to expand your digital services efficiently and securely -- even if your security budgets are declining.
  • Protecting the Expanding Attack Surface of Line of Business Web Applications Recorded: Jul 27 2021 46 mins
    Zeus Kerravala, ZK Research, Brian Schwarz, Fortinet
    As Web applications, and the APIs that support them, increasingly become the front door to your most critical line of business applications, your security posture must evolve to cover the full attack surface. Basic NGFW and WAF controls aren’t enough - a comprehensive solution must extend to include advanced detection, bot mitigation, and API security controls. As we add these additional controls, however, you don’t always have the luxury of expanding your security team so you also need solutions that are easy to manage and deploy.

    Join us to learn how Fortinet delivers security solutions that follow your applications and data and deliver consistent, seamless security and streamlined operations across all clouds.

    What You Will Learn:
    * How a consistent Web Application and API security solution can enable line of business web applications
    * How increasing use of APIs changes the attack surface of your most critical Web applications
    * How to maintain a consistent security posture across all of the cloud providers you rely on
  • Ethical Hackers: Redefining The Security Landscape Recorded: Jul 14 2021 61 mins
    Diana Kelley, SecurityCurve | Jim Richberg, Fortinet | Nuno Almeida, BitSight | Luke Tucker, HackerOne |
    As security breaches and attacks become more sophisticated and complex, managing your vulnerabilities and gaining a human perspective on your security gaps is an effective way to protect your attack surface.

    With 34% of ethical hackers and vulnerability researchers reporting that they have seen more bugs due to pandemic-driven Digital Transformation initiatives (HackerOne), now is the time to integrate a human element into your security controls.

    In this episode of The (Security) Balancing Act we’ll deep dive into the threat landscape, looking at why the insights of an outsider might be just what your organization needs.

    Join us as we discuss:

    - The value ethical hackers and vulnerability researchers can bring to your organization
    - Why ethical hackers and vulnerability researchers are more valuable now than ever before
    - Considerations for crowdsourcing ethical hacking and penetration testing
    - How bug bounty programs benefit companies and the research community
    - What to know if you are thinking of launching a bug bounty program
    - How ethical hackers and vulnerability researchers enhance vulnerability management
    - The 2021 threat landscape
  • Practical Strategies for Getting Cloud, Security and Networking Right Recorded: Jun 22 2021 44 mins
    Jonathan Nguyen Duy, Cloud CISO, Fortinet
    Enterprise IT strategies are driving the dynamics of centralized and distributed computing. Indeed, one could say that networking and security always follow the compute. Rapid adoption of cloud means networks are now more distributed than ever before and business value is shifting to agility, innovation, and software - leading to the rise of the software defined enterprise. Cloud adoption is also driving three strategic technology trends: Zero Trust, SD-WAN, and SASE. Going forward, IT teams will have to grapple with these key trends.

    Join cybersecurity experts from Fortinet and Cybersecurity Insiders for this live webinar to explore:
    • Consideration for managing a combination of in-house and provider solutions and balancing risk management with business objectives and customer experiences.
    • How to think about computing, networking, and security when enterprises own less and less infrastructure, platform, and software?
    • Practical strategies for securing clouds while delivering better outcomes and experiences.
  • Zero Trust for the New Normal Recorded: Jun 16 2021 61 mins
    Diana Kelley, SecurityCurve| Mari Galloway, Women's Society of Cyberjutsu | Jonathan Nguyen Duy, Fortinet | Bob Rudis, Rapid7
    Working remotely has become the new normal. This, and many other changes organizations adopted last year in response to the pandemic are likely to stay for the long term. According to Gallup, about two-thirds of U.S. remote workers want to continue to work remotely. So, how can organizations continue to support their growing distributed workforce at a time where reports of security threats have increased by 400% compared to pre-pandemic levels? 

    Here is where the zero-trust approach to security comes into play. 

    Join this month's episode of The (Security) Balancing Act with Diana Kelley and guests as they discuss the emergence of zero trust (“Trust Nothing, Verify Everything”) and what it helps achieve for enterprises in the age of cloud and remote work.

    Viewers will learn about:
    - The evolution of the security perimeter and the shift to zero trust
    - Why zero trust is an approach and not a product
    - Zero Trust Network Access (ZTA) vs. corporate VPN
    - Real-world stories and practical hands-on guidance from people who have deployed a ZTA

    Speakers:
    - Mari Galloway, CEO, Women's Society of Cyberjutsu
    - Jonathan Nguyen Duy, Vice President, Global Field CISO Team, Fortinet
    - Bob Rudis, Chief Data Scientist, Rapid7

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Ransomware in the Remote Work Era Recorded: May 12 2021 61 mins
    Diana Kelley, SecurityCurve | Nicole Hoffman, GroupSense | Courtney Radke, Fortinet | Patrick Lee, Rapid7
    Phishing and ransomware attacks continue to rise, according to Proofpoint’s State of the Phish report for 2020. Organizations in the U.S. are at risk, the increase in remote work due to the pandemic has fueled a spike in attacks, and phishing attempts are up by 14 percent compared to the previous year.

    Email continues to be the number 1 delivery vehicle, but other social engineering schemes that rely on social media, voicemail (“vishing"), SMS phishing (“smishing”), and malicious USB drops are also of concern for organizations. Ransom demands are also on the rise, but according to the report, paying the ransom is not guaranteed to work as many companies that paid the ransom failed to receive a decryption key.

    Join this month's episode of The (Security) Balancing Act as Diana Kelley and guests discuss why ransomware is surging again, which sectors are most at risk, the threat to enterprises and how it is being used for more than just ransom (ex: distractionware, destructionware, etc).
    - The rise in ransomware under the cloak of the pandemic
    - Why email continues to be the channel of choice
    - The difference between fully automated and human-operated campaigns
    - How to decide whether or not to pay or not to pay the ransom
    - Why your backups may not be immune to ransomware
    - Addressing the threat with best practices

    Speakers
    - Nicole Hoffman, Intelligence Analyst, GroupSense
    - Courtney Radke, CISO for National Retail, Fortinet
    - Patrick Lee, Senior Incident Response Consultant, Rapid7

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Taking Down Nation State Botnets Recorded: Apr 14 2021 59 mins
    Diana Kelley, SecurityCurve | Johna Till Johnson, Nemertes Research | Craig Harber, Fidelis | Derek Manky, Fortinet
    This month's episode of The (Security) Balancing Act will focus on botnets as a growing threat to the enterprise, examples from the real world, and what enterprises can do to better protect against botnet-fueled state sponsored attacks.

    Join this interactive roundtable discussion with security experts and industry leaders to learn more about:
    - How botnets have become a tool for cyber criminals and nation state actors
    - Real-world examples & known botnet attacks
    - Nation state ransomware attacks
    - DDoS attacks
    - Cyber espionage
    - ATPs
    - The trouble with attribution
    - What enterprises and governments can do to address the threat

    Panelists:
    - Johna Till Johnson, CEO and Founder of Nemertes Research
    - Derek Manky, Chief, Security Insights & Global Threat Alliances, Fortinet
    - Craig Harber, Chief Customer Success Officer, Fidelis

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • How to architect a security-driven networking strategy in the AWS Cloud Recorded: Mar 25 2021 61 mins
    Fortinet & AWS
    Architecting a security-driven network provides flexibility for highly dynamic environments, allowing organization-wide networks to scale and change without compromising security and performance. A security-driven network is stronger when created with a defense-in-depth approach through layered security tools, controls, and techniques.

    In this webinar, SANS and AWS Marketplace will discuss how to create a security-driven networking strategy for the AWS Cloud. They will cover technologies, processes, and policies that can be used to enhance the security of your environment, traffic, and network-accessible assets. This includes practical guidance to execute on this strategy and insights on how tools can work together to adapt to changing network infrastructures.

    Attendees of this webinar will learn how to:
    - Protect data without compromising network performance
    - Understand layered defense strategies that encompass perimeter protection, applications, and other security zones
    - Enhance visibility and control across complex networking environments
    - Implement network segmentation to prevent unauthorized east-west movement
    - Identify AWS Marketplace third-party solutions that can work together to enable a security-driven networking strategy
  • Cloud Security Best Practices Transforms Autodesk’s Cloud Environment Recorded: Mar 15 2021 50 mins
    Sameer Kumar Vasanthapuram, Vinod Sundarraj, and Anish John
    Autodesk had a goal to build a virtual data center on the cloud for core and security services. Though its customer-facing business was moving towards the cloud, Autodesk was previously running business-critical, back-office applications on premises. The global software company had to monitor and correlate logs in a time-consuming process. Autodesk also required that each of its Amazon Virtual Private Cloud (VPC) instances had its own firewall, which meant they had hundreds of VPCs in some regions, making this a large task that also led to latency issues.

    Join this webinar to hear how Fortinet's Virtual Next-Generation Firewall consistently manage its security posture across all of its Amazon VPCs. As a result, Autodesk now deploys firewalls that satisfy business requirements and, in the process, has minimized latency by 97%.

    In This Webinar, You'll Learn To:
    - Centrally manage, view, and control applications deployed across your Amazon Web Services (AWS) infrastructure
    - Address the most critical security challenges, whether in networked, application, cloud, or mobile environments
    - Save time and enable collaboration by leveraging automated security provisioning processes
    - Build scalable and resilient architecture with minimal latency while maintaining cloud application security
    - Improve your network management toolset by deploying virtual firewalls, erasing the need for manual updates

    Featured Speakers
    Sameer Kumar Vasanthapuram, Partner Solutions Architect, AWS
    Vinod Sundarraj, Sr. Director - Security Product Marketing, Fortinet
    Anish John, Cloud Network Architect, Autodesk
  • Fortinet Managed IPS Rules for AWS Network Firewall Service Recorded: Mar 11 2021 36 mins
    Vinod Sundarraj, Fortinet, Martiza Mills, AWS
    Join the cloud security experts from Fortinet and AWS to learn how to easily implement essential network security controls to protect the perimeter of your amazon VPCs. In a nutshell, AWS provides a flexible rules engine. Fortinet delivers the rules. These rules can be deployed in just a few clicks—significantly reducing the management complexity of your cloud operations.
  • Succeeding as a CISO in 2021 Recorded: Feb 17 2021 62 mins
    Diana Kelley, SecurityCurve | Patricia Titus, Markel Corp | Jonathan Nguyen-Duy, Fortinet | Gerald Mancini, Fidelis
    This month's episode of The (Security) Balancing Act will look at how the CISO role has evolved in the last few years, what today's expectations are and what it takes to succeed as a CISO.

    Some of the topics to be covered during this roundtable discussion with security and tech leaders include:
    - How has the CISO role evolved over the last few years and what is expected of CISOs in 2021?
    - CISO vs BISO
    - How to see ROI on your cybersecurity investment?
    - How to get the business to understand risk and care about security?
    - How to keep cyber employees happy. The churn is exhausting and costly for companies, and it’s exacerbated by employee burnout and a “grass is greener” approach.

    Panelists
    - Patricia Titus, Chief Privacy and Information Security Officer, Markel Corporation
    - Jonathan Nguyen-Duy, Vice President, Global Field CISO Team at Fortinet
    - Gerald Mancini, Chief Operating Officer of Fidelis Security

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Security Operations in the Cloud Recorded: Feb 11 2021 60 mins
    AWS & Fortinet
    Amazon Web Services (AWS) and the SANS Institute* help security practitioners understand their options across key cybersecurity domains using a familiar operational language: The NIST Cybersecurity Framework (CSF).

    In this webinar, SANS Director of Emerging Technologies John Pescatore will show how to use the NIST CSF to make the leap to securing infrastructure-as-a-service (IAAS) and hybrid cloud implementations by selecting and integrating the most effective and efficient security services, including both native cloud security services and third-party controls.

    This webinar provides practical education to help you quickly identify the right use cases to prioritize for cloud security operations, as well as determine which specific technologies are needed to execute your security mission in the AWS cloud. In addition, the webinar includes SANS-led training on key cloud security operations, and how they align with the NIST CSF core to help you employ automated, innovative, and secure solutions to strengthen your cybersecurity posture.

    Attendees will learn:
    - What is different about security for cloud workloads
    - Why using a framework to organize efforts is effective
    - How to implement controls at the perimeter, host and data boundaries
    - What best practices organizations should implement
    - How to deploy secure IAAS and hybrid cloud implementations
  • Seamlessly Scale Security on AWS with Fortinet Recorded: Feb 4 2021 45 mins
    Vinod Sundarraj, FortinetSameer Vasanthapuram, AWS
    In this webinar, we will discuss an exciting new architecture for scaling network security on AWS. Join us to understand how FortiGate-VM integration with the AWS Gateway Load Balancer enables easy deployment, management, and scaling of a next-generation firewall on AWS with:

    - High availability
    - Scaling and load balancing
    - Advanced security controls
Dynamic Cloud Security for AWS: Consistent multi-layered security
Fortinet Solutions for AWS Security
Many enterprises are turning to AWS to build new applications, extend internal data centers, and ultimately take advantage of the elasticity of the public cloud. While AWS security covers its infrastructure, customers are responsible for protecting everything they build and store within it.

Fortinet accelerates the journey to AWS with purpose-built cloud security. Fortinet dynamic cloud security solutions protect workloads and business applications across on-premises data centers and cloud environments—with multilayer security for cloud-based applications. Organizations can achieve: a consolidated view of their security posture, a single console for policy management and governance reporting, and event monitoring regardless of physical, virtual, or cloud infrastructure, and across private, public, and hybrid clouds.

Fortinet offers Software-as-a-Service (SaaS), virtual machine (VM), container, and API-based protection that delivers natively integrated security functionality that complements AWS services such as GuardDuty, Security Hub, and AWS Outposts. Supporting the broadest set of use cases, Fortinet products offer comprehensive security for AWS workloads including firewall, security gateway, intrusion prevention, and web application security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ethical Hackers: Redefining The Security Landscape
  • Live at: Jul 14 2021 4:00 pm
  • Presented by: Diana Kelley, SecurityCurve | Jim Richberg, Fortinet | Nuno Almeida, BitSight | Luke Tucker, HackerOne |
  • From:
Your email has been sent.
or close