Hi [[ session.user.profile.firstName ]]

Stack It Up – Threat Detection and Response

The cyber landscape is changing rapidly, so does the attack vectors and attack techniques. Organizations today rely mostly on Security Information and Event Management (SIEM) solution alone to help them detect and respond to cyber-attacks. Often there are blind spots in the sensor grid that let the advanced attacks slip through the cracks. Even though when an organization detects an attack, the response takes too long to protect the crown jewels.

In this session, you will learn about:

- Techniques used by advanced attackers
- Common pitfalls in threat detection and response
- Threat detection and response challenges
- Ways to improve an organization's threat detection and response capability
Recorded Apr 8 2020 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sunil Sharma, Chief Cyber Security Officer, National Security Services Group
Presentation preview: Stack It Up – Threat Detection and Response

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Evolution of Cyber Attacks in India: 2015-2020 Oct 12 2020 10:00 am UTC 45 mins
    Himanshu Dubey, Director of Security Labs and Kalpesh Mantri, Principal Security Researcher, Quick Heal Technologies Ltd.
    Cyber attackers are known to leverage global & local events to design their attacks. Whether it is a global phenomenon such as ongoing COVID-19 pandemic, or a sporting event such as cricket world cup, cyber attackers utilize interest in these events to propagate malware. In this presentation, we will discuss certain cyber-attack trends which coincided with major events in India over the last 5 years. We will also discuss advancements in security technologies to tackle the ever-evolving
    cyber-attack landscape.

    This webinar will cover:
    - India specific major events of last 5 years & evolution of Cyber Attacks around them
    - Contrast with global Cyber Attack trends during that time
    - Security approaches to protect against latest cyber-attack trends
  • Cybersecurity Attack Trends Influencing Society: WFH and The New Normal Oct 12 2020 8:00 am UTC 45 mins
    Jessica Robinson, CEO, PurePoint International
    This session will focus on global cyberattack trends in cybersecurity and its quickly evolving nature at the intersection of IOT, Privacy and regulatory environments. It will include trends involving the shared responsibility model between businesses and consumers as it relates to cybersecurity, the convergence of recent regulatory legislation as it relates to security, privacy and IOT, and impact of state sponsored cybersecurity attacks on society, businesses and individuals.

    Audience Takeaways:
    - Learn about future trends as it relates to cybersecurity attacks and the human impact
    - Understand the role of businesses on the front lines of cybersecurity (and WFH)
    - Find out what every leader needs to know about cybersecurity
  • Protecting Connected Devices from Cyber Threats Oct 7 2020 4:00 pm UTC 60 mins
    Rick Holland, Mark Lynd, Terence Jackson & Dirk Schrader
    The proliferation of connected devices at home and in the workplace has opened the door to attackers, who often find poorly protected IoT devices as easy targets and entry points.

    This panel of security experts and industry leaders will explore the security risks that connected devices pose for individuals and organizations in the U.S. and what can be done to secure devices, deter attackers and overall minimize the risk of breach.
    - How connected devices have changed the game from a cybersecurity perspective?
    - Why connected devices are easy targets for attackers
    - Other cyber threats to be aware of when it comes to connected devices
    - What you can do to secure your devices at home and at work
    - Understanding the risk of breach
    - Best practices & how to #BeCyberSmart

    This panel is part of National Cyber Security Awareness Month (NCSAM) 2020.

    We welcome and encourage audience participation and questions.

    Speakers:
    Terence Jackson, Chief Information Security Officer, Thycotic (Moderator)
    Rick Holland, CISO, Vice President of Strategy, Digital Shadows
    Mark Lynd, Head of Digital Business - CISSP, ISSAP & ISSMP, NETSYNC
    Dirk Schrader, Global VP of Product Marketing & Business Development, NNT
  • How She Got There—Women in Health IT Oct 6 2020 6:00 pm UTC 60 mins
    Moderator: Karen Diamond, Vice President of Strategic Accounts, pureIntegration
    Women are increasingly finding a career in healthcare IT. According to a recent article in Healthcare Finance News, women make up 66% of all entry-level healthcare employees and 30% of C-suite positions in healthcare IT.*

    Our panelists are challenging the ecosystem—transforming the information technology space in healthcare, driving improved patient care, and leading with a purpose.

    Join us for an open and honest hour-long conversation with influential women in healthcare information and technology who are leading the way to a more diverse and enriched community. Gain a better understanding of the challenges and opportunities that these female executives have experienced as they have navigated their careers. Learn from them how they are leading their organizations to digitally transform and serve their patients in more effective ways. Discover how they see the healthcare ecosystem evolving to achieve more diversity and balance in the workforce.

    Webinar host pureIntegration is an IT consulting services firm, led by a team of 53% women and minorities.

    *Reference: https://www.healthcarefinancenews.com/news/women-healthcare-hold-most-manager-positions-lack-minority-representation-persists
  • The Evolution Beyond Secure Email Gateways Oct 6 2020 4:00 pm UTC 60 mins
    Michael Landewe, Cofounder at Avanan
    Why Securing Cloud-Based Email Requires a Different Approach

    Email gateways including Proofpoint, Mimecast, and Barracuda were designed to protect on-premises email servers, but when you moved your email to the cloud, it revealed five vulnerabilities that continue to expose your users to attacks.

    It's why companies are switching from gateway vendors. Come learn how the migration to Office 365 and Gmail necessitated an evolution in how to secure cloud email, and why Secure Email Gateways are not the right answer.
  • CISO Insights: How to Practice Cyber Hygiene & #BeCyberSmart Oct 5 2020 4:00 pm UTC 60 mins
    Dan Lohrmann | Earl Duby | Keith Hollender | Adam Ford
    By popular demand, the CISO Insights series is back in October for National Cyber Security Awareness Month with a new episode on securing connected devices.

    Join this interactive Q&A discussion with CISOs to learn more about:
    - Why connected devices are a popular target for attackers
    - Steps for easy cyber hygiene at home and at work
    - Building a security culture together
    - CISO recommendations & best practices

    Speakers:
    - Dan Lohrmann, CSO & Chief Strategist, Security Mentor, Inc.
    - Earl Duby, CISO, Lear Corporation
    - Keith Hollender, former CISO; Partner, Global Cybersecurity Practice Lead at MorganFranklin Consulting
    - Adam Ford, CISO of Illinois

    This panel is part of National Cyber Security Awareness Month (NCSAM) 2020.

    We welcome and encourage audience participation and questions.
  • 2020 Refreshed List - Top 10 API Security Threats Every DevSecOps Should Know Recorded: Sep 24 2020 38 mins
    Amit Jain, CTO and Co-Founder, Mesh7
    Today’s cloud-native workloads run as heterogeneous APIs and services in a highly distributed manner. As the infrastructure layer is getting more mature, hardened and robust, threats are moving deep into the application layer.

    This session goes through the updated Top 10 threats that are prevalent in the cloud-native environment, specifically as it relates to data in transit, and talks about mechanisms to detect and protect against them.
  • SECURITY UNDER A CLOUD Recorded: Sep 24 2020 38 mins
    Victor Monga Senior Network & Security TAM, VMware
    Cloud provider and/or Cloud consumer have to consider cloud security best practices. But with the rise of public clouds, we have started focusing on putting all eggs in one basket. In this session, we will discuss what are security hygiene tasks you should discuss as a cloud provider and/or consumer.
  • Dissecting Cybercrime – Mule Networks- unwitting accomplices in cyber crime Recorded: Sep 24 2020 59 mins
    Alex Holden
    Every year tens of thousands of individuals are getting recruited by cybercriminals for legitimately looking jobs of reshipping clerks, accounting specialists, and many other positions. This year, due to the pandemic, these work-from-home jobs got a new level of legitimacy and unprecidented demand. We will examine current schemes for stolen goods re-shipment, charity scheming, money laundering, and more. What your organization should be aware of, how you are impacted, what you should be doing to stay ahead of this ever-changing networks of money and goods mules.
  • 6 ways CISOs are securing and navigating the cloud Recorded: Sep 24 2020 61 mins
    Jo Peterson, Clarify 360; Brian ThompsonVP, Veeam Software; Michael Goldgof, Barracuda Networks; Carl Eberling, Forcepoint
    Cloud Adoption is on the rise again. According to IDG’s 2020 Cloud Computing Survey, 59 percent of respondents said their organizations would be mostly or all in the cloud within 18 months. Cloud changes our approach on so many levels—new technology, new shared responsibility model and new cybersecurity considerations

    In today’s session, we’ll explore 6 ways CISOs are navigating the cloud:
    - Securing an extended perimeter
    - Upskilling the team
    - Balancing Risk Management in Third Party Relationships
    - Defining the Shared Roles in a Shared Responsibility Model
    - Enhancing Visibility
    - Taking Advantage of Automation

    Moderator:
    Jo Peterson, Vice President, Cloud and Security Services, Clarify360
    Speakers:
    Brian Campbell--VP, Cyber Security Architect, Veeam Software
    Mike Goldgof--Senior Director, Product Marketing at Barracuda
    Carl Eberling-- CIO/CISO- Forcepoint
  • Zero Trust Security: A Bridge to the Cloud Recorded: Sep 24 2020 40 mins
    Jason Garbis, Senior Vice President of Products, AppGate
    Zero Trust security represents a transformation of security principles, technology, and processes which can effectively address today’s IT and threat landscape, and help organizations securely embrace the cloud. Zero Trust not only overcomes the shortcomings of traditional security tools and technologies, it provides a unified policy model and set of enforcement points across a heterogeneous technology landscape.



    This is important, because cloud environments, for all their power and promise, do utilize a different set of security technologies, tools, and models compared with the traditional on-premises infrastructure. While there are often very compelling business and technology drivers to adopt the cloud, from a security perspective these changes bring with them a new set of challenges.



    The good news is that a Zero Trust approach – utilizing the open, modern Software-Defined Perimeter (SDP) security architecture – is entirely achievable, and brings enormous security and operational benefits. As such, not only can embracing Zero Trust improve enterprise security, it can act as a secure bridge to the cloud.



    In this session, we’ll define Zero Trust as a set of principles, and explain how the Software-Defined Perimeter - which verifies and secures all access to all resources, and strictly limits network access – avoids the limitations of traditional security



    We’ll explain how an SDP implementation delivers fine-grained network access control, in a way that’s tied to each user’s context, and is dynamically responsive to changes in Cloud environments. We’ll make this concrete with a customer case study, showing how one enterprise obtained technical, business, and compliance benefits from deploying this solution as part of their Cloud migration.
  • The Necessity for a Behavior Security Approach to Finding & Fixing Blindspots Recorded: Sep 24 2020 41 mins
    Pratik Roychowdhury, CPO, Mesh7
    So you've deployed your cloud-native application in production. And you've put in place network policies and security & compliance solutions to ensure that your applications are protected and compliant.

    What if I told you that your data might still be leaking out? What if your applications are still talking to unsanctioned domains and CnC sites? What if your use of cloud services are getting compromised? What if rogue insiders with access to credentials are misusing your environment or stealing info? What if I told you that you still have a number of risky security holes and blind-spots in your environment that you are not aware of?

    This session talks about the effective strategies -- of how to detect and mitigate against intrusions and risks from lateral breaches, egress breaches, cloud services breaches, in your environment and how to mitigate them -- so you can focus on productivity and business continuity.
  • Misconfigurations and You Recorded: Sep 23 2020 16 mins
    Dennis E. Leber, CISO, University of Tennessee Health and Science Center
    Misconfigurations are the leading cause of cloud breaches. As the Security Leader of your organization does your strategy properly address these challenges? Do you know what to discuss with the Senior leaders of you business? This presentation covers the considerations and some tips on how to relate these risks to the Leadership.

    Take aways:
    1. Considerations when selecting cloud solutions
    2. Tips on how to communicate with Leadership
    3. How to evaluate the shared security responsibilities that come with cloud solutions
  • Preventing & Detecting Cloud Security Incidents Recorded: Sep 23 2020 57 mins
    Jeff Foresman, VP of Security Operations & CISO, Digital Hands
    We have seen explosive growth in organizations moving applications, services and systems to the Cloud but unfortunately many do not understand how to secure these environments. Numerous IT and Security departments approach security in the cloud as they were securing individual servers in a data center and do not understand how to prevent data breaches or accidental data disclosers. Organizations are also struggling with how to effectively get full visibility into the cloud environment to monitor for malicious activity or configuration errors.

    This presentation will focus on how to prevent and detect cloud security incidents including:

    - Cloud Security Threats
    - Review of Cloud Data Breaches
    - How to Prevent Cloud Security Incidents
    - How to Detect Cloud Security Incidents

    Attendees to this discussion will come away with an understanding of the threats to cloud platforms and how an organization can develop solutions to effectively prevent and detect cloud data breaches. We will also provide best practices and native cloud solution recommendations to harden and monitor their applications, services and systems.
  • Battling Disinformation, Voter Suppression & Cyber Attacks Recorded: Sep 23 2020 61 mins
    David Morris | Lee Imrey | Mark Rasch
    This episode of the Election Hacking Original series will explore the impact of social media platforms on democratic elections, with a special focus on the 2020 U.S. presidential election.

    Join this panel to ask your questions and learn more about:
    - Has anything changed since 2016 and how
    - What can we learn from examples of other elections around the globe when it comes to the spread of disinformation
    - How has disinformation been used to suppress voting
    - What's new on the threat landscape for November
    - What is the likelihood of a cyber attack against elections

    Moderator: David Morris, Executive Director at Digital Risk Management Institute

    This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.
  • Identities, Privileged Access & Cloud Security Recorded: Sep 23 2020 59 mins
    Brandon S. Dunlap; Jeremy Snyder, Rapid 7; Morten Boel Sigurdsson, Omada; Corey Williams, CyberArk
    Securing the access to cloud data assets has never been more important. According to the latest Verizon DBIR, 73% of cloud breaches involved an email or web application server, while 77% of these cloud breaches also involved breached credentials. What does this mean for enterprise cloud security, especially in the time of COVID19 and remote working?

    Join this keynote panel to learn more about:
    - How the landscape has changed in 2020
    - Why attackers are focused on identities
    - Understanding privileged user behavior and securing identities
    - Discover how organizations are doing IAM, and what's needed for a more secure enterprise
    - Best practices and recommendations by the experts
  • CISO Strategies for the Cloud Recorded: Sep 23 2020 46 mins
    Graydon McKee, Willie Robinson & Vadapalli Sricharan Pyramid Consulting Solutions
    CISO Strategies for the Cloud: Key Factors to Consider when Building a Successful Cloud Strategy addresses the critical information security elements that every organization needs to consider as part of their Cloud Strategy. This presentation brings together experts in Information Security, Cloud Architecture, and Big Data Analytics to provide the attendee with the information they need to put a secure cloud strategy in place today.
  • CISO Journey to Cloud Recorded: Sep 22 2020 39 mins
    Park Foreman, Security and Compliance Architect, IBM Multicloud Management Platform
    Cloud adoption is becoming and essential part of an organization’s competitive survival. This talk will provide guidance for the CISO organization is what to expect and how to stay in step with an IT organization tasked with rapid cloud migration. It is a new landscape and new challenges to governance, risk and compliance. Be part of the cloud journey and not left behind.
  • Life on the Front Lines - Staying Sane in the SOC Recorded: Sep 16 2020 57 mins
    Diana Kelley, SecurityCurve | Vinay Pidathala, Menlo Security | Delyan Nestorov, Rapid7 | Charity Wright, Recorded Future
    Join this episode of The (Security) Balancing Act for an insider's view of life on the front lines of cybersecurity.

    This panel will look into what it's like to work in and manage a Security Operations Center (SOC), as well as share best practices for keeping your team of front-line defenders sane, empowered and happy, and your organization secure.

    The topics up for discussion during this episode include:
    - What kind of people are best suited for work in a SOC?
    - What kind of training / certifications / skills are needed to be successful?
    - How to handle alert fatigue and analyst overload?
    - Is automation (ML & AI) the answer?
    - What do you do when IOCs aren't enough?
    - Hunters vs. responders, what's the difference?
    - How the pandemic is impacting security operations?
    - Building a healthy team culture and managing self-care in the age of breaches
    - What's needed to make life easier for these front-line cyber defenders

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • CISO Strategies for the Cloud: Key Factors to Consider when Building a Successfu Recorded: Sep 11 2020 47 mins
    Graydon McKee, Willie Robinson & Vadapalli Sricharan Pyramid Consulting Solutions
    CISO Strategies for the Cloud: Key Factors to Consider when Building a Successful Cloud Strategy addresses the critical information security elements that every organization needs to consider as part of their Cloud Strategy. This presentation brings together experts in Information Security, Cloud Architecture, and Big Data Analytics to provide the attendee with the information they need to put a secure cloud strategy in place today.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Stack It Up – Threat Detection and Response
  • Live at: Apr 8 2020 10:00 am
  • Presented by: Sunil Sharma, Chief Cyber Security Officer, National Security Services Group
  • From:
Your email has been sent.
or close