Through the installation of rogue software applications, to the privilege elevation of malware, a lack of oversight on administrative rights is undermining our best efforts to protect the enterprise. With increased audit scrutiny on administrative access, this problem has recently been brought to the forefront. How do you properly manage the rights of your infrastructure administrators? What about those end users that need "special privileges?"
RecordedOct 21 200954 mins
Your place is confirmed, we'll send you email reminders
Jadee Hanson, Dir of Security, Code 42; Joji Montelibano, Rockwell; Chris Walcutt, Black & Veatch; Brandon Dunlap (Moderator)
While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk. Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Join Code42 and (ISC)2 on March 16, 2017 at 1:00PM Eastern for a discussion on how to construct an effective insider threat program.
John Carnes, Anthem; Mat Gangwer, CTO, Rook Security; Erik Von Geldern, FXCM; Brandon Dunlap (Moderator)
There's an overwhelming amount of information that comes from the connected world. Information sources are endless, but their credibility can be questionable. Cyber security teams can often relate with an overload of threat data from a variety of sources. Building an effective threat intelligence capability requires drilling down through all of information to find the data that is most relevant to you. So where do you start? To avoid information overload, an organization needs to be selective about the sources that they need to stay ahead of the threats and exploits that can compromise them. Join (ISC)2 and our sponsor Recorded Future for a From the Trenches webcast on March 2, 2017 at 1:00 PM ET for a discussion on threat intelligence sources, what's available out there, and how to separate the signal from the noise so you can spend less time on data collection and more time on analysis.
Craig Sanderson, Sr. Dir. Prod Mktg, Infoblox; Dan York, Internet Society; Raghu Gadam, Security Analyst (ISC)2; B. Dunlap
Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
Threats. They are everywhere and one of those things that keep security practitioners awake at night. However, the exposure to and damage from the myriad threats out there can be mitigated via a number of steps. These include threat hunting and detection, investigation and timely and effective response. If your security is synchronized it can help to reduce the response times and the resources that are used. Join (ISC)2 and our sponsor Sophos for our first From the Trenches webcast of 2017 on January 26, 2017 at 1:00PM Eastern for a discussion about threats and how to cut the time in detecting and responding to them.
Jack Jones, Risk Lens; Cody Whelan, Risk Lens; Brandon Dunlap - Moderator
Quantitative risk analysis is achievable, can be pragmatic, and can actually out-perform qualitative risk analysis in the face of complex issues like intelligent adversaries. Join Jack Jones, the original author of the Factor Analysis of Information Risk (FAIR) framework and (ISC)2 to learn more about FAIR. Jack will highlight both the quantitative use-cases as well as the ways in which FAIR can be leveraged to improve qualitative risk analysis. This will be followed by a demonstration on how to quantify cyber risk with the RiskLens Cyber Risk Quantification software platform.
Cricket Liu, Exec VP, Infoblox; Dan York, CISSP, DNS Sec Prog Mgr, Internet Society;
You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
Michael Rodriguez, Digital Forensics/IR Consultant, Intel Security; Dominique Kilman, Crowdstrike; Dr, Lance Cottrell
Insiders. Targeted attacks. Bad actors. Malware. Organized crime. Ransomware. The threats to your IT infrastructure and organization are many and come from multiple vectors. Detecting, assessing and managing these threats are paramount to the well being of the organization. If the worse does happen and there is an incident, quick and efficient response is critical. Join Intel Security and (ISC)2 on December 20, 2016 at 1:00PM Eastern for our final ThinkTank roundtable of the year where we will discuss threats, threat management and incident response.
Mark Nunnikhoven, VP, Cloud Research; Trend Micro; Deidre Diamond, CEO, BrainBabe; Kevin Hutchison, Cerner Corp.
It's said that teamwork makes the dream work. And the dream is a secure organization. While you and the rest of your team works towards that, it takes everyone to achieve comprehensive and effective security. But achieving this degree of security thinking within in an organization is fraught with challenges - ensuring the consistent application of controls across the enterprise and across, to outside partners and vendors, the changing skill set and diversity of the workforce & security staff and the hiring of talent to maintain security. Join Trend Micro and (ISC)2 on December 15, 2016 at 1:00PM Eastern for a roundtable discussion as we examine this topic and how best to manage these issues.
Deepak Patel, Director of Product Marketing, Imperva; John Carnes, Anthem; Rob Ayoub, IDC; Brandon Dunlap, Moderator (ISC)2
If it bleeds, it leads and the headlines these days indicate that more and more companies are succumbing to ransomware. A user clicks the wrong link and the next thing you know, you’re your data is being held hostage...for a price. It leads to nonproductive downtime, tests the limits of your back-up strategy, and saps your bottom line. How do you combat a threat like ransomware? Do you pay up? Join Imperva and (ISC)2 on November 10, 2016 at 1:00PM Eastern for a discussion on ransomware, its impact and how organizations should respond.
Dr. Lance Cottrell, CISSP®, Chief Scientist, Ntrepid Corp.
While we will never see the end of generalized mass attacks, the real damage is being done through highly targeted attacks. In discussing why targeted attacks are so effective and economically advantageous to the attacker, we'll learn why that trend is likely to continue. Timely case studies of targeted and integrated attacks will contribute to understanding the trade-offs for the adversaries. Some suggestions for countermeasures against this strategy will be provided.
Jack Jones, CISSP, CRISC, CISM, CISA EVP R&D, RiskLens Inc.
Business executives are unlikely to ever really understand risk statements like “High risk”, “Medium risk” and “Low risk”. As a result, they sometimes discount higher risk situations as “infosec conservatism.” Risk quantification can be a powerful tool to help them better understand and appropriately prioritize infosec risk scenarios. In this session, Jack will walk participants through an analysis of a specific cloud service leveraging the Factor Analysis of Information Risk (FAIR) framework. The analysis results will be described in business terms that any executive would understand. This session will demonstrate a pragmatic approach to quantifying cloud-related risk.
David Shearer, (ISC)2; Kevin Flanagan, RSA, Deidre Diamond, Cyber Security Network; Anne Saita (Moderator)
The shortage of information security professionals and high turnover can derail even the best security programs. This session will cover proven strategies for recruiting, retaining and building a team of top security professionals.
Victor Lee, CISSP, Intel Security; Mat Gangwer, Rook Security; Brandon Dunlap, Brightfly; Tim O'Brien
As a wise person once said, a man with one watch knows what time it is, a man with two isn't so sure. Despite the myriad of tools at our disposal in the SOC, how do you accurately identify and triage security Events, escalate those that need it to the status of Incident, and mange them through remediation or response effectively? Join Intel and (ISC)2 on September 29, 2016 at 1:00PM Eastern as we bring a panel of SOC operational experts to discuss strategies and opportunities to orchestrate SOC operations for peak performance.
Holger Schulze; Javvad Malik, Dan Waddell, Afir Agasi, Rich Campagna, Sami Laine, Patrick Pushor, Alvaro Vitta
Hear from a panel of experts including Afir Agasi, Rich Campagna, Sami Laine, Javvad Malik, Patrick Pushor, Alvaro Vitta and Dan Waddell as they review the results of the 2016 Cloud Security Spotlight Report. This report highlights cloud security concerns and what security best practices are evolving with the increasing adoption of cloud computing. Get the report here: cert.isc2.org/cloud-security-spotlight-report/
Mark Nunnikhoven, Trend Micro; Dave Lewis, Global Security Advocate, Akamai; Chris Nicodemo, Global Dir App Sec & Arch, Time
Moving and integrating multiple applications across both on-premise and into the cloud is a daunting task. Whether it is the "lift and shift" of existing workloads into IaaS or the federation of identities between your traditional enter isle and SaaS providers, the task is monumental. Join Trend Micro and (ISC)2 on August 11, 2016 at 1:00PM for a spirited roundtable webinar where we'll dig into the important security implications of your cloud strategy and how to ensure that you are considering all of the angles as you make the change.
Darrin Reynolds, Reynolds Privacy; Graham Jackson, General Counsel, (ISC)2; Harvey Nusz, CISO, 4IT Security
The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
John Carnes, Anthem; Terry Olaes; Rob Ayoub, IDC; Brandon Dunlap, Brightfly
Detecting and investigating malicious or unintentional activity is a time consuming effort and an inefficient use of our limited resources. All too frequently, we discover something is amiss and realize that problem has existed for a long time, yet it's just come to your attention. How can an organization increase the speed of detection of malicious activity? Can detection and investigation processes benefit from "hitting the afterburners"? Join RSA Security and (ISC)2 on June 30, 2016 at 1:00PM Eastern for a discussion on detection and investigation visibility and what to leverage to make threat detection effective.
Scott Montgomery, VP & CTO, Intel Security; Doug Cahill, Sr. Analyst, ESG; John Yeoh, Senior Research Analyst, CSA
IaaS, PaaS, SasS? Private, Public, Hybrid? Regardless of the deployment model, you likely have some key services and data spread across some combination of all of these, not to mention what is still on premises. How can your security team keep tabs on all of this? There needs to be uniform management, visibility and control of the various clouds or vulnerabilities and errors are going to put data at risk. Join Intel Security and (ISC)2 on June 16, 2016 at 1:00PM Eastern for a Roundtable discussion on this issue and how to manage your clouds.
Greg Mayfield, Director, Product Marketing, Blue Coat; Spencer Wilcox, Excelon; Sammy Basu, Warner Bros. Entertainment Group;
Starting in earnest after the "Snowden Revelations" 2013, more and more service providers such as Google, Yahoo and Amazon have been embracing SSL by default. Whether in search, cloud services or webmail access, these providers have been instrumental in their support of a more secure and obfuscated web. But what does that mean for the enterprise information security professional? While the providers have "seen the light", have we become blinded by it? To ensure the inspection and subsequent protection of data streams in and out of our organizations, we need the ability to inspect encrypted traffic for policy violations or other malicious activity while still ensuring multi- jurisdictional rights to privacy. Join Blue Coat and (ISC)2 on May 26, 2016 for a roundtable discussion exploring methods and mechanisms for addressing SSL inspections and the search for malicious activity.
Ted Sherrill, Oracle; Graham Jackson, (ISC)2; Harvey Nusz, 4IT Security
The General Data Protection Regulation (GDPR) is being instituted to improve data protection and privacy for individuals in the European Union (EU). Additionally, it addresses the export of data outside the EU, which will impact all multi-national businesses operating in the EU. Almost 3/4 of US Privacy professional believe that this is the most significate change to privacy regulations in the last 20 years. What should an organization be doing now to prepare for this new regulation to avoid non-compliance, fines and increased spending? Join Oracle and (ISC)2 on April 14, 2016 at 1:00PM Eastern for a discussion on this new regulation and how your organization could be impacted.