Hi [[ session.user.profile.firstName ]]

Time for an Upgrade? What Next Generation IDS Can Bring to the Enterprise

Traditional Intrusion Detection Systems rely on brittle signatures, and can be a major resource drain. As the internet continues to evolve, so do the methods and tactics of the adversary. Attackers are now more focused on your users rather than system vulnerability exploits. A new approach is needed….one that encompasses machine learning anomaly detection, cross platform visibility and cloud ready. Join ExtraHop and (ISC)2 on March 11, 2021 at 1:00pm for a discussion on Next Generation IDS and how it can provide more than just a compliance check off and provide context to the alerts you receive.
Recorded Mar 11 2021 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Don Shin, Sr. PMM, ExtraHop; Matthew Waddell, Dir of DFIR, CBI; Brandon Dunlap, Moderator
Presentation preview: Time for an Upgrade? What Next Generation IDS Can Bring to the Enterprise

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Working with Law Enforcement and the FBI May 25 2021 5:00 pm UTC 60 mins
    Supervisory Special Agent (SSA) Paul Vitchock, FBI; Special Agent (SA) Andrew Sekela, FBI; Spencer Wilcox; Brandon Dunlap
    The frequency of Incidents and breaches of companies and critical infrastructure continues to increase. Often, law enforcement (local/state/federal) will need to be brought in. But how do you decide if it has risen to that level? Where do you start? Do you bring in local law enforcement or reach out to an organization like the FBI (Federal Bureau of Investigation)? When you do, how do you work with them, what steps do you need to take to protect your organization and the evidence? Join (ISC)2 and representatives from the FBI on May 25, 2021 at 1:00PM Eastern for a discussion on when to bring in law enforcement, how to work with them and how to make vital pre-incident connections. Learn from and about cybersecurity professionals at the FBI and how they help secure and defend the country.
  • Why Do We Victim Shame? The Post-Breach Finger Pointing Phenomenon Apr 29 2021 5:00 pm UTC 60 mins
    Erik von Geldern, CISO, FXCM; Spencer Wilcox, Chief Security Officer; Brandon Dunlap, Moderator
    It plays out over and over after a major cybersecurity breach makes headlines. Questions are asked: Why was the victim organization vulnerable? Could this have been avoided? What did they do wrong? What policies do they need to change? Who should be held responsible? In most cases, the spotlight only peripherally touches on the attacker. On April 29, 2021 at 1:00PM Eastern, (ISC)2 will bring together a panel of cybersecurity leaders to discuss why our first reaction is to blame the victim, rather than examining the threat ecosystem, how many attacks have already been thwarted and where the true blame should reside.
  • In the Bullseye: Healthcare and Email Threat Vectors Apr 27 2021 5:00 pm UTC 60 mins
    Ryan Witt, Proofpoint; John Carnes, Anthem; Shelly Epps, Duke Health; Brandon Dunlap, Moderator
    Threat actors are targeting individuals in the Healthcare industry and using email as their main entry point for cyber attacks. These attacks are aimed at specific people in an organization to steal money, data or sensitive healthcare information. Threat actors can gain access to legitimate mailboxes using tactics such as phishing, malware or social engineering to impersonate the victim. This leads to further infiltration into an enterprise system. What can those in the healthcare industry do to combat this targeting by cyber criminals? Join Proofpoint and (ISC)2 on April 27th at 1 pm ET / 10 am PT for a panel discussion focusing on email compromise/account takeovers and best practices for dealing with these threats in healthcare.
  • Measuring Cybersecurity: Metrics That Really Matter to the C-Suite and Beyond Recorded: Apr 1 2021 61 mins
    Lenny Zeltser, CISO, Axonious; Pete Lindstrom, VP, Sec Strategies, IDC; Gideon Rasmussen, vCISO; Brandon Dunlap, Moderator
    When it comes to security metrics, there are lots of variables. The company. The size and scale of that company. Measuring where things are at today and where you hope things will be in the future.
    There’s a lot at play, but one thing’s for certain: There’s a laundry list of security metrics you could be measuring. So how do you know where to start? And once you have your foundation, what’s next? On April 1, 2021 at 1:00PM Eastern, Axonious and (ISC)2 will host a webcast to examine:

    · Which security metrics are commonly used for executive-level reporting and to track progress across vulnerability management, security operations & incident response, and more
    · The foundational prerequisites to ensuring accuracy and context
    · How to evaluate vulnerability management, security operations, cloud security, and other programs.
  • SolarWinds Fallout Has Execs Asking: How Secure is Our Supply Chain? Recorded: Mar 30 2021 59 mins
    Thomas Scanlon, Carnegie Mellon Univ; Andrew Boyle, BAH; Shawn Harris, Starbucks; Brandon Dunlap, Moderator
    The ramifications of the SolarWinds incident continue to evolve as more details emerge about the impact it had on a wide range of organizations. A recent survey of more than 300 cybersecurity practitioners by (ISC)2reveals just how concerning the incident was and what these professionals recommend to shield organizations from similar supply chain threats. Join this panel discussion on March 30, 2021 at 1:00pm Eastern to hear anecdotes and best practices related to third-party technologies in the security stack, and how peers in cybersecurity leadership positions are future-proofing their defenses while planning for worst case scenario.
  • Time for an Upgrade? What Next Generation IDS Can Bring to the Enterprise Recorded: Mar 11 2021 60 mins
    Don Shin, Sr. PMM, ExtraHop; Matthew Waddell, Dir of DFIR, CBI; Brandon Dunlap, Moderator
    Traditional Intrusion Detection Systems rely on brittle signatures, and can be a major resource drain. As the internet continues to evolve, so do the methods and tactics of the adversary. Attackers are now more focused on your users rather than system vulnerability exploits. A new approach is needed….one that encompasses machine learning anomaly detection, cross platform visibility and cloud ready. Join ExtraHop and (ISC)2 on March 11, 2021 at 1:00pm for a discussion on Next Generation IDS and how it can provide more than just a compliance check off and provide context to the alerts you receive.
  • Celebrating International Women’s Day: Carving a Cybersecurity Career Path Recorded: Mar 8 2021 60 mins
    Clar Rosso, CEO, (ISC)2; Aanchal Gupta, CISSP, VP, Azure Security, Microsoft; Lori Ross O'Neil, CISSP; Megan Hargrove, CISSP
    To mark the 46th annual International Women’s Day on March 8, 2021, (ISC)2 is proud to present a panel of accomplished women in the field of cybersecurity for a webinar discussion at 11:00am Eastern. This group will come together to discuss data on the demographics that make up the workforce and how they are shifting. They will also outline their own journeys in the profession that led them to the leadership positions they now hold, including the challenges they encountered and strategies they employed to succeed. The discussion will also look ahead to the evolution of diverse cybersecurity teams and the principles that inform how they are being assembled today. Speakers include:
    Clar Rosso, CEO, (ISC)2

    Aanchal Gupta, CISSP, Vice President, Azure Security at Microsoft

    Lori Ross O’Neil, CISSP, Sr. ICS Cyber Researcher & Project Manager, Pacific Northwest National Laboratory; Vice Chairperson, 2021 (ISC)2 Board of Directors

    Megan Hargrove, CISSP, Cyber Security Incident Response Manager, Tech Data
  • The Daisy Chain of Risk – Examining the Links in Your Vendor Ecosystem Recorded: Mar 4 2021 59 mins
    Chad Anderson, Sr. Sec Res, DomainTools; Spencer Wilcox,SO;Dr. Thomas Scanlon,Cybersecurity Res Scientist; Brandon Dunalp,Mod
    All of our organizations are dependent on their supply chain and
    having a secure and uninterrupted ecosystem of vendors and partners is critical
    to smooth operations. Of course, if it is important to us, then it is a target,
    no matter the locale. The recent SolarWinds attack illustrated how a patient
    adversary can be successful as they work their way through multiple vendors in a
    supply chain to reach their desired target. This infiltration was difficult to
    spot and for many, even harder to respond to adequately. These types of attacks
    will continue and grow in sophistication. Organizations need to use OSINT and
    other vendor tools that can investigate their partners in the supply chain to
    gain insight into if they can trust what those applications are doing on their
    network. Join DomainTools Senior Security Researcher, Chad Anderson, and
    (ISC)2 on March 4, 2021 at 1:00 PM Eastern for a roundtable discussion on supply chain attacks and security,
    what tools work and can provide insight into your supply chain and partner’s
    infrastructure, and how a good security posture builds from knowing the
    inventory and behaviors of what’s running on your supply
    chain.
  • Approaches to Managing Insider Risk in a Work-from-Anywhere World Recorded: Feb 23 2021 60 mins
    Sai Chavali,Sr PMM,Proofpoint; Mirtha Collin,Ed Dir,(ISC)²; Spencer Wilcox,CSO, ED of Tech; Brandon Dunlap,Moderator
    With the massive shift to remote working in 2020, organizations are racing to rethink their security programs to both guard from external attacks as well as manage risk from insiders. Modern approaches to insider threat management must incorporate investments in People, Process, and Technology. This means formalized insider threat management programs; it means investment in insider threat management technologies; and it means building resilience into the fabric of your organization with training.

    Join Proofpoint and (ISC)2 on February 23, 2021 at 1:00pm Eastern as we kick off the new year with a discussion about security awareness, education and insider threat management and how best to defend your organization and arm your users to mitigate an insider incident.
  • Doing XDR Right: What It Is and What it Can Do for Your Organization Recorded: Jan 28 2021 59 mins
    Chase Snyder Sr. Prod Mktg Mgr, ExtraHop; Raj Goel, Brainlink; Lloyd Diernisse; B. Dunlap, Moderator
    XDR (Extended Detection and Response) promises to unite and integrate such security tools as focused on threat protection, detection and response, creating a single megasolution. Such an approach could yield significant benefits for an organization, Join ExtraHop and (ISC)2 on January 28, 2021 at 1:00PM Eastern for an examination on the costs and benefits of this strategy, a discussion of use cases, as well as:

    • How to avoid vendor lock-in while still getting the best security tools available

    • What XDR is, and what it isn't, including which data sources and security tools are typically included in XDR offerings, and how they work together.

    • The advantages and disadvantages of Best of Breed vs. Single Vendor detection and response strategies.
  • The Infinite Variety of Phishing Attacks & the Security Controls to Address Them Recorded: Dec 15 2020 62 mins
    Brian Thornton, Enterprise Solution Engineer, Mimecast; Tim Campo, Director, Applications & Security, (ISC)2
    Every organization receives unwanted email and various forms of phishing on a daily basis. Most are common and some are quite unique. Protecting against malicious attachments and links on inbound email is now security table stakes. But with the continuous evolution of cybercriminals, what’s old is new and what’s new is new. They never stop recycling or reinventing. And the cybercrime-as-a-service ecosystem never stops making it easier and cheaper to setup and launch phishing-based campaigns to deliver ransomware, RATs, steal credentials, spread internally, impersonate your executives, or exploit your brand online. Mimecast and (ISC)2 will discuss both popular phishing related techniques as well as newly emerging ones on December 15, 2020 at 1:00pm Eastern. We’ll also discuss various types of defensive techniques, emerging analytics, and user training strategies that can be applied today to better protect your organization.
  • Technology Sprawl: The Hidden Disease of IT and What to do About it Recorded: Dec 3 2020 61 mins
    John Matthews, CIO, ExtraHop; Michael Weisberg, CISO, Garnet River; Eric Gauthier, VP, Technical Ops, Burning Glass, B Dunlap
    In most enterprises, you have the phenomenon of tool sprawl - the overlapping abundance of technology in which only 20-30% of a product’s functionality is being used. A product is acquired for a particular use case, then another use case and another, resulting in a potpourri of tools with overlapping capabilities and features. Whether its instances in the cloud, security tools, network management or even the proliferation of personal productivity and LOB SaaS applications, the consequence of technology sprawl is not only financial waste, but also user frustration, security risks, operational inefficiencies, technical debt and lack of visibility into the organization’s processes and functions. Join ExtraHop and (ISC)2 on December 3, 2020 at 1:00pm Eastern as a panel of IT and Security executives discuss the root causes of technology sprawl, a path out of this cycle and the benefits to be achieved.
  • Security Congress 2020 Preview Recorded: Nov 6 2020 25 mins
    Wesley Simpson; Sharon Smith; Brandon Dunlap; James McQuiggan
    A panel discussion about (ISC)2 Security Congress 2020
  • Don't Miss the BIGGEST (ISC)2 Security Congress Yet! Recorded: Nov 3 2020 1 min
    (ISC)2
    Join thousands of cybersecurity professionals at all levels for three days of industry discussion, continuing education and networking, November 16 – 18. Get your passes at: https://securitycongress.brighttalk.live/passes/
  • Your Data Held Hostage: Understanding the Extensive Ransomware Threat Recorded: Oct 29 2020 57 mins
    Tarik Saleh, Senior Security Engineer & Malware Researcher, Domain Tools; Spencer Wilcox; Brandon Dunlap, Moderator
    There can be many ramifications of a ransomware incident on an
    organization. Financial, reputational and downtime are just some of the more damaging effects a ransomware attack can have. Organizations need to have a plan to deal with such incidents and to understand the marketplaces, economics and latest trends to be prepared. How do you prepare for such an incident? Set aside some money to pay if it happens? Will accounting or even legal allow you to do that? Join DomainTools and (ISC)2 on Thursday, October 29, 2020 at 1:00 PM Eastern for a discussion on the current state of ransomware. We’ll examine traditional ransomware vs RaaS (Ransomware as a Service), how RaaS is being leveraged by threat actors, what Blue teams should know and what to consider about planning, response and cyber/business interruption insurance.
  • Improving Threat Detection & Data Protection in Public Clouds Recorded: Oct 1 2020 61 mins
    Itir Clarke, Sr. Product Mktg Mgr Proofpoint; John Yeoh, Global VP, CSA; Michael Weisberg, CISO Garnet Rive,
    Beyond just capturing “shadow IT” have you reached the full potential of your CASB? With a continuous stream of feature enhancements from User Entity Behavior Analysis to Data Loss Prevention, you may have more capabilities that are going untapped. Leveraging your CASBs to its fullest potential can result in a better security posture for your organization. Join Proofpoint and (ISC)2 on October 1, 2020 at 1:00 p.m. eastern for a discussion centered around CASBs, their potential for better security via threat protection and data protection.
  • Privacy's Increasing Role in Cybersecurity: A View from Spirion and the IAPP Recorded: Sep 30 2020 63 mins
    Bob Lewis, IAPP, Cathy Scerbo, IAPP, Scott Giordano, Spirion, Brandon Dunlap (Moderator)
    Every organization today is in some state of digital transformation. While the understanding of security needs in the digital age has matured significantly in the last 2 decades, the implication for data privacy and in particular, its interaction with security, are still not well understood. As data regulations and laws continue to evolve, here in the U.S. and globally, organizations require increased understanding of privacy requirements and their impact to technology solutions. Join IAPP and (ISC)2 on September 30, 2020 at 1:00 p.m. Eastern as Bob Lewis and Cathy Scerbo from IAPP, along with Scott Giordano from Spirion, will share the evolution of privacy, discuss key privacy topics like Privacy by Design and the NIST Privacy framework, share their perspectives of the overlap between Security and Privacy and highlight the criticality of understanding the current implications of data privacy today.
  • The Ripple Effect: Latent Vulnerabilities to Be Felt for Years to Come Recorded: Sep 17 2020 60 mins
    Matt Cauthorn, VP Sales Eng, ExtraHop; Kevin McNamee, Dir Threat Intel, Nokia; Graham Speake Sr. Sec Mgr, Brandon, Moderator
    Have you heard about Ripple20? It’s a series of 19 vulnerabilities detected in a widely used TCP/IP stack (Treck) could expose hundreds of millions of devices in healthcare and industrial settings to remote code execution and more. The Treck stack has been used in embedded devices for more than twenty years. These devices are hard to identify and more difficult to patch. Should you remove and/or replace these devices? That can get pricey. Join ExtraHop and (ISC)2 on September 17, 2020 at 1:00 p.m. Eastern as we explore the ramifications of this, how to detect vulnerable devices and determine if you should patch or replace.
  • The Ups and Downs of Cybersecurity Asset Management Recorded: Sep 3 2020 59 mins
    Lenny Zeltser, CISO, Axonius; Bruce Beam, CISO, (ISC)2; Spencer Wilcox, CSO, PNM Resources; Brandon Dunlap, Moderator
    As IT environments become increasingly complex, teams struggle to keep up and understand the asset management process and that can impact an organization’s cybersecurity posture. Companies spend millions on security solutions, but oftentimes cannot validate that they are deployed or preforming as they should. Join Axonius and (ISC)2 on September 3, 2020 at 1:00p.m. Eastern as we discuss the hurdles associated with implementing a cybersecurity asset management program at your company — and why it’s more important than ever to have a foundational understanding of the assets in your environment. We’ll look at:

    · The challenges that come along with implementing modern asset management for cybersecurity
    · Real-life stories that highlight the successes seen with cybersecurity asset management programs

    · The pitfalls, hurdles, and lessons learned about cybersecurity asset management from industry leaders and practitioners
  • Navigating the Career Maze—Where Do I Go Next? Recorded: Jul 21 2020 64 mins
    Rob Ayoub, Sharon Smith, Deidre Diamond, Erik Von Geldern, John Esparza
    This webinar will feature several industry professionals within the information security industry who've held a variety of roles ranging from security architect, consultant and sales engineer to marketer to recruiter and CISO. The panel will discuss career direction and offer attendees new ideas and provocative thoughts on the various roles available throughout a security career. Join (ISC)2 on July 21, 2020 at 1:00PM Eastern for a discussion of the daily tasks involved in each respective area, the joys and the pitfalls, the qualifications typically necessary, and ways to go about getting different positions.
Moderated roundtable discussions on a variety of infosecurity topics.
(ISC)² hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Time for an Upgrade? What Next Generation IDS Can Bring to the Enterprise
  • Live at: Mar 11 2021 6:00 pm
  • Presented by: Don Shin, Sr. PMM, ExtraHop; Matthew Waddell, Dir of DFIR, CBI; Brandon Dunlap, Moderator
  • From:
Your email has been sent.
or close