Hi [[ session.user.profile.firstName ]]

Evolution of the Threatscape

Like a bad penny, vulnerabilities and threats to your computer environment continue to turn up and put your firm's information at risk. And compounding the problem is the rate at which threats and vulnerabilities change and evolve every day.
Recorded Sep 23 2009 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brandon Dunlap, Mike Dausin, Ritchie Leslie & Rob Ayoub
Presentation preview: Evolution of the Threatscape

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Nice to Have or Have to Have? The Case for Cyber Insurance Oct 10 2019 5:00 pm UTC 60 mins
    John Smith, Prin. Sec. Engr, ExtraHop; Brandon Dunlap, Moderator
    More and more companies are offering cyber insurance policies to help mitigate the financial losses an organization might suffer from a cyber incident. With the increase in breaches, intrusions and ransomware incidents, cyber insurance could be right for your organization as a part of the risk mitigation strategy. But there’s a lot of confusion for organizations in determining what a company’s exposure is and what exceptions and exclusions might be in a policy. Organizations are almost forced to think like an underwriter to address these concerns. Join ExtraHop and (ISC)2 October 10, 2019 at 1PM Eastern for a discussion on cyber insurance, demystifying the current insurance landscape and what are the right questions to answer.
  • Bothersome Bots: Dealing with the Swarm Sep 26 2019 5:00 pm UTC 60 mins
    Joe Martin; Kevin McNamee; Xena Olsen; Brandon Dunlap (Moderator)
    Automation has brought great advances to computing. But automation has also brought forth the bot. While some bots are beneficial, being able to determine the difference between humans, good bots and bat bots has become extremely difficult. Bot creators are making their creations more sophisticated and with bots making up most of the traffic on the internet, the identification of malicious bots and the defense against them is becoming critical for organizations of all sizes. Join F5 and (ISC)2 on September 26, 2019 at 1:00PM Eastern for a discussion on the application threats driven by bots, how they infect an enterprise and the role an advanced web application firewall can play in defending an organization.
  • Hardening Office 365’s Email for Better Security & Availability Sep 19 2019 5:00 pm UTC 60 mins
    Matthew Gardiner, Dir. Enterprise Sec. Campaigns, Mimecast; Bruce Beam, CIO, (ISC)²; Brandon Dunlap, Moderator
    Organizations of all sizes are accelerating their move to the cloud and are shifting critical applications such as email to Office 365 as a first step. The security and resilience of such a critical application is paramount for an organization’s communications, data availability, and governance strategies. Organizations experience a significant productively hit when their email or email-based data becomes unavailable. And of course, there are no shortage of phishing attacks which leverage email and target Office 365. How can you ensure the security and availability of Office 365’s email and better defend against those threats that can bring it down? Join Mimecast and (ISC)2 on Thursday, September 19, 2019 at 1PM Eastern for a discussion on the topic of security and availability, as well as strategies for moving such applications to the cloud more easily and securely.
  • The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together Recorded: Aug 15 2019 59 mins
    Jason Bevis, VP Global Threat Hunting, Cylance; Alex Holden, CISO/Pres, Hold Security, Chip Wagner, Sec Analytics, IBM
    Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these threats. Automation (artificial intelligence or machine learning) can provide actionable intelligence quickly without being a resource drain. Pairing automation with a threat hunting framework like the MITRE ATT&CK can help to build an overarching strategy for addressing this critical area. Join BlackBerry Cylance and (ISC)² on August 15, 2019 at 1:00PM Eastern for a discussion on how to better and more quickly identify malicious behaviors and how a model of continuous improvement can benefit an organization.
  • Want to be a Better Blue Teamer? Think Like an Attacker! Recorded: Jul 25 2019 59 mins
    Tarik Saleh, DomainTools; Rob Armstrong, Mathan Cyber Security, LLC; Keith Young, Mont. Co., MD; Brandon Dunlap, Moderator
    “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”
    – Sun Tzu.

    The ability to understand your adversary is always a good skill for any security practitioner to have. But beyond understanding, one really needs to know how an attacker thinks. This enables better defense and cooperation between “Blue Teams” and “Red Teams”. Join DomainTools and (ISC)² on July 25, 2019 at 1:00PM Eastern for a discussion on defense and protection, how an attacker thinks and goes about breaching your enterprise, and the trend in “Purple Teaming”.
  • Let’s Work Together! How to Drive SecOps and NetOps Collaboration Recorded: Jul 18 2019 59 mins
    John Smith, Princ Sales Eng, ExtraHop; Caroline Saxon, Sr Advisor to CIO, TSYS; Glenn Leifheit, Microsoft; B. Dunlap
    The siloed, standalone operations of security operations (SecOps) and network operations (NetOps) resulted in teams with their own culture, technologies, processes, skillsets and lexicons. When SecOps and NetOps each have their own tools and workflows, this results in slower detection and response, higher costs and an ineffective use of cybersecurity personnel. Security has also become complex, fast moving and critical to all organizations and it no longer makes sense for the two functions to remain siloed. Join ExtraHop and (ISC)2 on July 18, 2019 at 1:00PM Eastern for a discussion on how to increase collaboration between SecOps and NetOps and the benefits derived from that.
  • Delivering Security Awareness That Works Recorded: Jun 20 2019 57 mins
    Matt Sitelman, Mimecast; Shayla Treadwell, ECS Federal; Ashley Schwartau, Sec. Awa. Co.; Brandon Dunlap
    All organizations wrestle with their security awareness programs. It is clear that users need to be part of the solution and not just part of the problem. Many users however see these programs as “gimmicks” and don’t take the training as seriously as the organization would like them to. Security managers are often putting out other fires and can’t devote the time they would like to ongoing awareness training. So what can be done to overcome these issues? Join Mimecast and (ISC)2 on June 20, 2019 at 1PM Eastern for a discussion on the do’s and don’ts of security awareness training and testing, why it’s important to customize training for different groups and how to truly engage your end-users to make them part of your security program. We will also provide tips for gaining management support and building a company-wide culture of security with training as a key component.
  • AI-Driven EDR - The Machine Age of Information Security Recorded: Jun 13 2019 59 mins
    Brian Robison, BlackBerry Cylance; Eric Walters, Burns & McDonnell; Travis Farral, CISO, LEO Cyber Security; B. Dunlap
    The historical evidence of rules-based solutions in the Endpoint Detection and Response (EDR) has proven that this approach is unable to keep up with the speed of the shifting threatscape. Join BlackBerry Cylance and (ISC)2 on June 13, 2019 at 1:00PM Eastern where we will explore how machine learning and artificial intelligence are closing the OODA (observe–orient–decide–act) loop on the attackers. We’ll also examine how you can gain an advantage over emerging threats, your time to respond and impact of artificial intelligence on security professionals.
  • A Day in the Life - Tips and Best Practices from 3 CISSPs Recorded: May 21 2019 60 mins
    James Packer, CISSP, London; Chuan-Wei Hoo, CISSP, Singapore; James R. McQuiggan, CISSP, United States; B. Dunlap (Moderator)
    More than 130,000 information security professionals have invested time, determination and resources to attain the CISSP certification. Join (ISC)² members from different regions on May 21, 2019 at 10:00AM Eastern as we discuss what pain points, issues and challenges they encounter in their day-to-day work life, as well as solutions, tips and best practices they have developed along the way. We’ll also examine how the CISSP certification has helped them with their job and career.
  • Insider Data Breach – Separating the Malicious from the Mistaken Recorded: May 9 2019 56 mins
    Sudeep Venkatesh, Chief Product Officer, Egress; Charles Moore, Opinions Matters; Spencer Wilcox, Brandon Dunlap (Moderator)
    According to a recent Ponemon Institute survey, the average data breach costs $3.8M, up 6.4% from 2017. When it comes to an insider data breach, 95% of IT leaders view this as a concern for their organization (statistic from 2019 Data Breach Survey from Egress Software and Opinions Matters). Employees can put sensitive data at risk by accessing or sharing without permission, just because they are “curious” or intrigued by the content. An insider data breach can be the most damaging, the most expensive and the most difficult to detect and stop. How can an organization deal with these insider data breaches? Join Egress Software and (ISC)² on May 9, 2019, at 1PM Eastern for a wide-ranging discussion on insider data breaches, the malicious and the accidental and what can be done to mitigate such occurrences.
  • Going Off Script – Code Eats InfoSec Recorded: Apr 11 2019 58 mins
    Tarik Saleh, Snr Sec. Engr, DomainTools; Erik von Geldern, CISO, FXCM; Clinton Campbell, CEO & Prin. Consul., Quirktree, LLC
    Marc Andreessen famously said “Software is eating the world”, but what about in InfoSec? In the beginning, security practitioners depended on Excel and VB scripts to make sense of their data. Today, machine learning is aiding in the discovery and reporting of insights. As more and more cloud-forward companies are embracing an “infrastructure-as-code” model, what does this mean for the security leaders of tomorrow? Is automation important to your role and to the organization’s infosecurity posture? If so, join DomainTools and (ISC)2 on April 11, 2019 at 1:00PM for a discussion on security automation and how being fluent with programming languages and scripting can expand your knowledge and value to an organization, as well as strategizing for machines to work in harmony with the compliance and risk teams.
  • Smelling the Roses at 100Gb - Security Tooling at the Speed of Life Recorded: Mar 14 2019 56 mins
    Ron Nevo, CTO, cPacket Networks; John Carnes, Info Sec. Architect; Gordon Rudd, 3rd Party Risk Officer, Venminder, B. Dunlap
    Ferris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” With complex data flows now reaching speeds 100G, what are your security tools missing? Can they handle the increased volume of information that’s coming in? By making use of packet brokers, you can get the visibility you need and not miss out on life. Join cPacket Networks and (ISC)2 on March 14, 2019 at 1:00PM for a discussion on packet brokering visibility across the network, the need for pre-egress filtering and how the convergence of NetOps and SecOps can help protect your company’s top-line revenue and productivity.
  • Detecting & Preventing Threat Evasions Techniques – 2019 And Beyond Recorded: Feb 14 2019 59 mins
    Shimon Oren, Deep Instinct; Jared Peck, Financial Services; Rob Armstrong; Colossal Technologies, LLC; B. Dunlap (Moderator)
    Cyber-attacks and the threat actors behind them are becoming more and more sophisticated. Today’s attackers adopt existing techniques, modify them and develop new capabilities much faster than ever before. This translates not only to more attacks, but also to a bigger share of attacks which are highly evasive and stealthy, and inevitably more challenging to prevent or detect over-time. How does an organization stay up-to-speed with the varied attacks that are aimed at them? Join Deep Instinct and (ISC)2 on February 14, 2019 at 1:00PM Eastern when we’ll review several common and emerging evasion techniques in today’s threat-landscape and discuss the best avenues to counter them in terms of technology and cost-effectiveness.
  • Dangerous Documents – Attachments That Compromise Organizations Recorded: Jan 31 2019 58 mins
    Tarik Saleh, Snr Sec Engnr, DomainTools; John Carnes, Info Sec Healthcare; Aamir Lakhani, Sen Sec Strat & Rsrchr; Dr. Chaos
    Scam and Phishing emails continue to put organizations of all sizes at risk. A favored vector of attack is the use of a malicious Office document attachment or PDFs to gain a foothold into a targeted system. These types of threats can put account credentials, financial, healthcare information, and other highly sensitive data at risk. How can an organization defend against the onslaught of such attacks that continue to plague them unabated? Join DomainTools and (ISC)2 on January 31, 2019 at 1:00 PM Eastern for a roundtable discussion on mitigating the prevalence and distribution of malicious documents and their payload.
  • Employing Users as Your Quality Control Recorded: Jan 17 2019 58 mins
    Josh Bartolomie, Dir, Res & Dev, Cofense; Sharon Smith, Fndr, C-Suite Results; Theresa Frommel, Act Dep CISO, State of MO
    Process automation delivers a lot of promises. A car can be assembled in less than a day and vegetables can go from vine to can in hours. Sensors look for obvious flaws, but at points in the production process there is human oversight in the form of quality control. The same holds true for protecting against phishing threats. Automation can help weed out some of the bad stuff, but bad actors and new threats constantly outsmart the latest sensors. Join Cofense and (ISC)2 on January 17, 2019 at 1:00PM Eastern for a panel discussion examining strategies on how to enable your workforce to be quality control when it comes to malicious emails to know when something isn’t right and what to do when they see something.
  • Halt! Who Goes There? Improving the Intersection of Identity & Security Recorded: Dec 6 2018 61 mins
    John MacInnis, Prd Mktg Mgr, IAMS, HID Global; Tariq Shaikh, Sr. Security Adv., IAM, Aetna; Erik Von Geldern, CISO, FXCM
    With the multiple points of access to an organization, both internal and external, as well as physical and electronic, identity and access control is a critical security concern. Practitioners need to constantly monitor and assess the organization’s security posture, access provisioning and even the on boarding of employees, partners and customers. Join HID Global and (ISC)2 at 1:00pm Eastern Thursday, December 6, 2018 for a discussion on why identity has become the center of security and how to better manage identity, access management and authentication in your enterprise.
  • Maintaining (and Improving) Security on your Journey to Cloud Recorded: Nov 29 2018 60 mins
    Jason Garbis, VP of Cyb. Products, Cyxtera; Mike Brannon, Dir. Infra. & Sec., National Gypsum; Spencer Wilcox, B. Dunlap
    Like a good rollercoaster, a journey to the cloud can be both exhilarating and terrifying. Unlike a rollercoaster, however, a cloud journey is a long-term commitment and requires thoughtful planning, especially the need to ensure security and compliance controls. Join Cyxtera and (ISC)2 on November 29, 2018 at 1:00PM Eastern for a discussion on making a secure journey to the Cloud and the benefits of a software-defined perimeter.
  • Email and the Web – Defending Against Attackers’ Favorite Vectors Recorded: Nov 8 2018 58 mins
    Matt Gardiner, Dir. Prd Mkg, Mimecast; Derrick Butts, CIO/CO, Truth Init.; Bruce Beam, Dir Infr & Sec (ISC)²; Brandon Dunlap
    According to the Verizon Data Breach Investigations Report 2018, 99% of malware, such as ransomware, trojans, and RATs, were delivered via malicious email attachments or via the web. With the vast majority of all security incidents and breaches using email and the web -- and the necessity of these services to your organization’s day-to-day operations -- how can you protect yourself? What are the best practices for defending against these types of threats? What are the best methods of acquiring, deploying and managing these protections? Join Mimecast and (ISC)2 on November 8, 2018 at 1:00PM Eastern for a discussion of these questions and the methods attackers are currently using to accomplish their goals, how attackers are using email and the web against organizations, why email and web security should be considered together and the benefits of cloud delivered security solutions, including improved security efficacy and reduction in overall costs.
  • The Golden Hour – Cutting the Time of Investigation and Response Recorded: Oct 25 2018 60 mins
    Jadee Hanson, CISO, Code42; Andrew Neal, Pres; InfoSec/Compliance, TransPerfect; Greg Braunton, Catholic Health Initiatives
    As the time and complexity associated with incident investigations increase, response times become more critical. The longer detection and remediation take, the higher the cost to the business and the greater the risk of a cyberattack expanding across the organization. Organizations have to react with speed and precision. How can an organization reduce the time and effort it takes to investigate and resolve an incident successfully? Join Code42 and (ISC)2 on October 25, 2018 at 1:00PM Eastern for a roundtable discussion on why time matters when conducting an investigation, where gaps may be in the incident response process and how to get the most out of your investigation and response efforts.
  • Sharpening Your Focus – Gaining Visibility & Managing the Insider Threat Recorded: Sep 13 2018 61 mins
    Mayank Choudhary, VP Products, ObserveIT; John Carnes, Spencer Wilcox, PMN Resources; Brandon Dunlap (Moderator)
    It’s no secret that limited visibility into user actions keeps cybersecurity professionals up at night. The right level of visibility into user action and access can produce positive insights that enable business results. Additionally, indicators of out of policy activities can stop an insider threat before it becomes a full-blown incident. Research from The Ponemon Institute showed that financial services institutions faced the highest insider threat costs of any other industry (at $12.05 million annually) -- a very concrete reason to address an otherwise invisible problem. Join ObserveIT and (ISC)2 on September 13, 2018 at 1:00PM Eastern for a roundtable discussion on insider threats including the most important components to gaining full cyber visibility: user activity, data activity, and analytics, best practices for managing insider threats and the key question organizations should be asking to mitigate insider threats.
Regular roundtable discussions on a variety of infosecurity topics.
(ISC)2 hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Evolution of the Threatscape
  • Live at: Sep 23 2009 4:00 pm
  • Presented by: Brandon Dunlap, Mike Dausin, Ritchie Leslie & Rob Ayoub
  • From:
Your email has been sent.
or close