Best Cyber Breach Protection: Certified NIST RMF Professionals
Dr. Ron Ross (NIST), Richard Spires (Learning Tree Int’l), and Dr. Victor Berlin (Mission Critical Institute) will discuss how hiring Certified NIST RMF Professionals can be your key to cybersecurity breach protection.
Dr. Ron Ross, Fellow, National Institute of Standards and Technology
Ron Ross is a Fellow at the National Institute of Standards and Technology. Dr. Ross leads the Federal Information Security Modernization Act (FISMA) Implementation Project, which includes the NIST Risk Management Framework.
Mr. Richard Spires, CEO, Learning Tree International (CIO, DHS, IRA ret.)
Richard Spires is CEO of Learning Tree International. Previously he has served as the U.S. Department of Homeland Security’s (DHS) Chief Information Officer (CIO) and IRS’s CIO. Spires also served as the Vice-Chairman of the Federal Government CIO Council and the Co-Chairman of the Committee for National Security Systems (CNSS).
Dr. V. N. Berlin, CEO, Mission Critical Institute
Victor Berlin is the CEO of Mission Critical Institute (MCI). MCI enables universities to graduate career-ready cybersecurity risk management professionals by utilizing MCI’s cutting-edge cybersecurity education system. Dr. Berlin has over 15 years of cybersecurity graduate level education experience which includes serving as the founding president of the first accredited cybersecurity graduate university, University of Fairfax.
RecordedDec 8 201764 mins
Your place is confirmed, we'll send you email reminders
Nancy Limauro, Deputy Branch Chief & Noel Kyle, Program Lead, Cybersecurity Education & Awareness Branch at DHS
The Nation has an ever-growing need for cybersecurity professionals who can protect our networks and infrastructure from increasing cyber threats and attacks. According to a study by the Center for Cyber Safety and Education, there will be a shortage of 1.8 million information security workers by 2022. Building a skilled and agile cybersecurity workforce to fill these positions is a national challenge.
To address the shortage of skilled workers, it is critical for all communities to work together to coordinate cybersecurity awareness, education, training, and workforce development efforts. Current initiatives across the Federal Government help advance the cybersecurity workforce, particularly through training and professional development. The Department of Homeland Security (DHS) is leading such efforts through its Cybersecurity Education and Awareness (CE&A) Branch.
We will also share information about our Stop. Think. Connect.™ campaign to help promote safe online behavior. Stop. Think. Connect.™ resources provide partnership opportunities to academic institutions, government agencies/departments, as well as non-profit organizations.
Join this webinar to learn:
1.How to find CE&A awareness, education, and workforce development resources
2.How to use National Cybersecurity Workforce Framework (NCWF) tools
3.How to partner with our Stop. Think. Connect.™ Campaign
This webinar is part of ISSA's Security Education and Awareness Special Interest Group Webinar Series.
Rebecca Herold, the Privacy Professor, AlienVault, Absolute Software, OneTrust
The GDPR is the most significant change in data privacy regulation in more than 20 years. It comes into force on 25 May 2018 and will impact all businesses that process personal data or businesses that process personal data of EU citizens even if they are not in the EU. Obligations for compliance will affect both controller and processors and regulators will get increased enforcement powers and the right to impose fines of up to 4% of global turnover for both data breaches and infringements of the law.
Attend this CPE accredited educational webinar with our panel of experts to learn what you need to know about the GDPR and how to remain compliant.
- Learn how to prepare for GDPR implementation
- Identify the real life challenges of compliance
- Learn about prioritizing plans and actions to effectively prepare for data protection
- Discover some of the benefits, approaches, and tools to comply with the GDPR
The board's involvement is absolutely crucial for communicating cybersecurity strategies and overall cybersecurity success.
When boards and CISOs successfully engage, organisations can take advantage of the opportunities presented by cyberspace, as well as address associated risks.
In this webinar, Steve Durbin, Managing Director at the ISF will discuss how the board of directors should lead collaboration and security awareness across the organisation, to help IT and security teams focus on what matters the most to the business, and ensure cybersecurity is embedded into the organisations business strategy.
About the presenter
Steve Durbin is Managing Director at the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
Moderated by Colin Whittaker. Panelists: Tim White, Qualys, Barracuda, and Cameron Jackson, Riskonnect.
This is a CPE accredited webinar
Effectively managing risk is critical for the success of every organization. Cyber threats continue to increase in frequency and grow in complexity, and the volatility of risk is dramatically increasing. This makes it very difficult for organizations to adequately prepare for or respond to risk. In addition, many risks that organizations must contend with, such as Information security, are so complex and technical in nature that it is difficult for the organization’s leadership to get the necessary balanced insight into risk across the organization.
Join the panel discussion webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.
- Discover how to identify, catalog, and prioritize risks across the enterprise
- Find out how to quickly measure critical activities and address inherited risk
- Learn how to gain efficiency and effectiveness of current risk-management approaches
Susan Young, SVP & Advisor Marsh USA, Inc. E & O and Cyber Practice
New cyber risks and threats are emerging at a pace faster than ever before. How are cyber risks evolving, and which risks can be managed through cyber insurance?
We’ll address these questions – and dig a bit deeper into the state of the cyber insurance market and the role of cyber insurance in your overall cyber risk management strategy. Cyber risk can’t be eliminated – it must be managed.
About the Speaker:
Susan Young is a Senior Vice President and advisor with Marsh’s
national Cyber & E&O Practice (part of Marsh’s Financial & Professional Liability Practice, FINPRO) in the Seattle office. She is primarily focused on cyber /security & privacy risk, media liability, and technology errors and omissions.
This case study examines how a major NHS organisation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.
Join this webinar presentation to learn:
- Key lessons on the value of micro-marketing
- Lessons from cybernetics
- The value of cyber resilience in healthcare
About the Presenter:
Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.
Analyzing cyber-attacks from last year, this session will cover leading trends, and identify potential evolution both in the defensive and offensive fields going forward. As we do so, we will explore the increasing importance of automation and the diminishing role of the human professional in large scale networks.
About the Speaker:
Adi Ashkenazy is the VP Product for XM Cyber, an innovative cyber security start-up developing a revolutionary breach and attack simulation solution, capable of identifying critical attack paths towards key organizational assets, while providing actionable prioritized remediation. Prior to XM Cyber, Adi served as deputy director of an elite cyber technology department in the prime minister's office in Israel, leading Israel's finest engineers and security professionals through some of the most complex cyber security challenges in the world today.
Dan Paltiel (US Bank) | Matt Wolfe (Obsidian) | Roselle Safran (Rosint Labs)
Cybersecurity is a key priority for CISOs in 2018. What are the cyber threats CISOs should be aware of? How can we build more resilient enterprises in an age of relentless cyber attacks?
Join this interactive panel to learn more about:
- The latest cyber threats
- New attack trends
- Fighting cyber crime in an age of breaches and stolen personal information
- Understanding your cyber risk
- CISO priorities for 2018
This keynote talk by Raj Samani, Chief Scientist at McAfee, explores the recent campaigns against prominent journalists and politicians, particularly into their social media lives as a tool to support the political agendas of adversaries. Join this webinar to learn more about the steps that we as professionals must take to protect our own brands, and those of the organizations we work for.
About the Speaker:
Raj Samani is a McAfee Fellow and Chief Scientist at McAfee. His prior roles include VP and Chief Technology Officer, EMEA, at Intel Security/McAfee and Chief Information Security Officer for a large public-sector organization in the United Kingdom. A leading international cybercrime expert, Samani has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3/EUROPOL).
Samani volunteers as the Cloud Security Alliance EMEA Strategy Advisor, and is on the advisory councils for Infosecurity Europe and Infosecurity Magazine. Samani has published numerous security papers and is the author of 'Applied Cyber Security and the Smart Grid'. SC Magazine named Samani as one of the Top 10 Influencers in cyber security in 2016.
Dave Klein (GuardiCore) | Troy Vennon (Columbus Collaboratory)
Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.
Join this panel of experts as they discuss:
- The biggest trends in cyber crime
- Impact of Cryptocurrencies
- Breaches and preventing future fraud and cyber attacks
- Advancements in security technology
- Why security awareness training should be a key part of your overall data protection strategy
- Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
- Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory
The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.
With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?
In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.
About the presenter:
Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
Travin Keith, Managing Director at Agavon, Co-Founder at SICOS, and Administrator at BitcoinMarkets
With the burst of interest into cryptocurrencies, there have been a lot of new users into this innovative world. However, the rush into the space has caused many users to skip key steps in joining the cryptocurrency community, such as understanding what basic security practices they should follow in order to keep themselves and their money secure.
While there are technical steps to take to secure one's funds, there's also a number of things to keep in mind while interacting with the community.
This webinar discussion aims to give beginners in the world of cryptocurrencies tips to better protect themselves, their money, and their sanity.
Maxwell Shuftan-CyberTalent Program Director, SANS Institute and Jessica Gulick CEO of Katzcy Consulting
Join the SANS Institute and Katzcy for an insightful presentation about the SANS CyberTalent Academy opportunities. This academy is designed to help qualified veterans in Maryland and Chicago - area receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in a matter of months, depending upon program selected. The program is at NO COST to the selected veterans who attend and includes training and certification.
Come listen to learn:
• What the selection process includes and important application tips
• Understand what kind of training is provided (length and format)
• How this training academy and related certifications can help your career
CyberTalent Program Director, SANS Institute
Max leads the CyberTalent division of the SANS Institute, the most trusted and the largest provider of information security training and certification in the world. In this role, he directs business development and stakeholder engagement to support the various SANS CyberTalent programs and develop strategic partnerships. He also oversees CyberTalent program operations and staff management. SANS CyberTalent helps organizations address their cybersecurity workforce development needs through initiatives such as the VetSuccess and Women's Immersion Academies as well as the Assessment tools. Max has worked in the public affairs and stakeholder engagement arena of cybersecurity for the past eight years, working with Government, corporate, and not-for-profit organizations, most recently as a Vice President at Cambridge Global Advisors, a homeland security strategic advisory services firm.
What do oBike, a bicycle rental company, Instagram, and the IRS have in common? Answer -- hackers used APIs to access their customers sensitive information forcing these organizations to announce breaches. Although these API attacks were exposed, most API-based attacks go undetected these days – particularly attacks that used compromised credentials.
This webinar will discuss API cyberattack examples and the techniques used by hackers to breach APIs. It will also review how AI-based security solutions can effectively stop these attacks and provide deep visibility into your API sessions for forensic and compliance reporting. Topics covered in this webinar include:
- API cyberattack trends
- Review of recent API attacks
- How to monitor and protect your API activity
- How to detect and block API attacks on your data/apps (live demo)
- How to deliver reports with detailed traffic insight for any API
- Best practices for securing APIs
Security Automation can significantly improve investigations, reduce tedious busy work, and strengthen defenses. However, it is not always clear where to start, and which use cases to apply automation to.
In this webinar, we will provide a primer and discuss best practices. Topics discussed will include:
- What is security automation and orchestration?
- Different automation models
- Examples of how automation has helped others
- Assessing your automation readiness
- Steps to get started - picking your first use cases
The discussion will be led by Kumar Saurabh, a 15 year veteran of Security Operations, and CEO & Co-founder of LogicHub.
Lance James | Mark Rasch | Martyn Hope | David Morris
The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?
Join this panel of world-class experts:
Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.
Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.
Martyn Hope: Founder of the EU-GDPR Institute.
In this session you will learn:
- What will happen if I'm not Compliant by May 25, 2018
- Where do I Begin to start my compliance effort
- Who should I trust to advise me through my compliance program
If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.
Join this webinar to learn the GDPR requirements for managing personal information and digital identity.
Tarun Samtani, Group GDPR Lead for Vectura Group Plc, & SkyePharma
We all know that the EU General Data Protection Regulation (GDPR) will bring a massive change in the way businesses operate and handle personal data. This short discussion will give you to tips to jumpstart your GDPR programme and some easy approaches to take to achieve success in a short space of time.
1) GDPR short summary
2) Focus on the goals not vendors
3) ICO & Data subject expectations - May 2018 onwards
4) GDPR practical approach
About the Presenter:
Tarun Samtani is the Group GDPR Lead for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Telecommunications, ISP's, Financial Services, Gambling, Retail and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments. He has a wealth of experience in Cyber security & Data privacy and is passionate about securing business information landscape. During the course of his career Tarun has been involved in the strategy & planning, design, architecture and implementation of a significant number of information security programmes.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.