Hi [[ session.user.profile.firstName ]]

Cybersecurity Executive Order Challenges and Strategies

Federal agencies are moving rapidly to plan and implement programs to meet the aggressive schedule required by the Executive Order on Improving the Nation's Cybersecurity. Recent software supply chain attacks and multiple, large entity ransomware attacks show that Federal agencies are as exposed as commercial organizations—although Federal agencies’ technology complexities are unique and very challenging to rapidly evolve.

Join us to hear from experts who have helped Civilian and Defense agencies work through complex cybersecurity implementations. We’ll discuss how agencies can effectively implement near-term and longer-term answers to the new requirements on:
• Real-time Adaptive Access Management
• Critical Data Pseudonymization
• AI-driven Detect, Respond, Recover, and Protect
• User and Entity Risk Based Incident Detection
• Threat Information Sharing
• Software Supply Chain Security

About the speakers:
Mike Echols is a senior cybersecurity executive and critical infrastructure protection strategist working with corporations and the government to make the nation more resilient. He is leading a revolution to support Information Sharing and Analysis Organizations (ISAOs) and to harmonize cyberthreat information sharing.

Rod Wetsel serves as Booz Allen's Civil Cyber Cross-Cut FMT Lead for the FED market. He has led engagements spanning cybersecurity strategy and planning, security program development and improvement, risk management, security architecture and engineering, information assurance, CDM, and security and vulnerability risk assessments and technical testing.

Nickolous Ward leads a team of cybersecurity specialists providing services across DOJ, including continuous monitoring and diagnostics; security operations and incident response; security architecture; and identity and access management solutions. Previously, he served as CISO for Adient and as Assistant Director of Security Operations at DOJ.
Live online Jul 27 5:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nickolous Ward, Department of Justice, Rod Wetsel, Booz Allen & Michael Echols, Senior Cybersecurity Executive
Presentation preview: Cybersecurity Executive Order Challenges and Strategies

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • AppSec in a Cloud First Culture Aug 17 2021 3:00 pm UTC 60 mins
    Brent Jenkins, Director of Product Marketing, Fortify, CyberRes
    Many organizations have moved application build pipelines, source code, and hosting of their running apps entirely to cloud services—unlocking efficiencies and unleashing innovation faster than ever. However, with this acceleration comes new challenges for application security.

    In this webinar, we’ll explore deployment options to suit even the most resistant development teams and show you how the culture of the cloud can be harnessed for Fortify scans to bolster brand champions and secure your applications.

    We’ll cover such topics as:
    • Cloud transformation and what it means for AppSec
    • Enabling AppSec on multi-cloud
    • Workflows and solutions for AWS, Azure, and GCP

    Join us to discover how to keep your applications secure as you keep pace with innovation in a cloud-first world.
  • How to secure your IT systems when it comes to privileged access Aug 4 2021 3:00 pm UTC 60 mins
    Gautham Ananda, Senior Product Manager, CyberRes
    Are you struggling to protect your customers’ digital identities and private data? Join our webcast to find out how NetIQ solutions can help you deliver a secure experience that ensures the sensitive data in your environment is safe and secure.

    According to IT security experts, privileged credentials are dangerous when they end up in the wrong hands—which happens more often than you might think. Due to the inherent risks related to privileged credentials, today’s enterprises need strong controls, storage facilities, and processes to ensure equally strong security and adherence to compliance standards and company policies. The most crucial techniques for controlling privileged credentials are Least Privileged Access and Just-in-Time Access.

    Join us for this webinar to learn how these crucial techniques help:
    • Protect against the leading cause of breaches.
    • Deliver experiences that balance security with a frictionless experience for users.
    • Satisfy audit and compliance requirements around identity access.
    • And more…
  • 2021 State of Security Operations: Insights and Implications Aug 3 2021 3:00 pm UTC 60 mins
    Mark Fernandes, CyberRes Chief Technology Officer
    The upcoming “2021 State of Security Operations Report” from CyberRes, with insights collected from over 500 SecOps decision-makers (CISOs, SOC Directors, etc.) from across the globe, will offer a timely perspective into how security operations has changed in the past year and what these changes mean for security operations teams moving forward.

    Join us for this webinar with CyberRes Chief Technology Officer, Mark Fernandes, where we’ll discuss the results of the report and their implications, with a focus on people, processes, business perspective, and technology.

    Topics will include:
    • Cloud migration
    • Threat intelligence
    • Cognitive technologies
    • Threat modelling frameworks (MITRE ATT&CK, etc.)
    • How COVID-19 has changed SecOps policy and administration
    • And more…

    We look forward to having you join us.
  • Cybersecurity Executive Order Challenges and Strategies Jul 27 2021 5:00 pm UTC 60 mins
    Nickolous Ward, Department of Justice, Rod Wetsel, Booz Allen & Michael Echols, Senior Cybersecurity Executive
    Federal agencies are moving rapidly to plan and implement programs to meet the aggressive schedule required by the Executive Order on Improving the Nation's Cybersecurity. Recent software supply chain attacks and multiple, large entity ransomware attacks show that Federal agencies are as exposed as commercial organizations—although Federal agencies’ technology complexities are unique and very challenging to rapidly evolve.

    Join us to hear from experts who have helped Civilian and Defense agencies work through complex cybersecurity implementations. We’ll discuss how agencies can effectively implement near-term and longer-term answers to the new requirements on:
    • Real-time Adaptive Access Management
    • Critical Data Pseudonymization
    • AI-driven Detect, Respond, Recover, and Protect
    • User and Entity Risk Based Incident Detection
    • Threat Information Sharing
    • Software Supply Chain Security

    About the speakers:
    Mike Echols is a senior cybersecurity executive and critical infrastructure protection strategist working with corporations and the government to make the nation more resilient. He is leading a revolution to support Information Sharing and Analysis Organizations (ISAOs) and to harmonize cyberthreat information sharing.

    Rod Wetsel serves as Booz Allen's Civil Cyber Cross-Cut FMT Lead for the FED market. He has led engagements spanning cybersecurity strategy and planning, security program development and improvement, risk management, security architecture and engineering, information assurance, CDM, and security and vulnerability risk assessments and technical testing.

    Nickolous Ward leads a team of cybersecurity specialists providing services across DOJ, including continuous monitoring and diagnostics; security operations and incident response; security architecture; and identity and access management solutions. Previously, he served as CISO for Adient and as Assistant Director of Security Operations at DOJ.
  • Snowflake + Voltage SecureData – The Solution to Secure Cloud Analytics Recorded: Jul 20 2021 50 mins
    Alistair Rigg, Sr Global Product Manager, Voltage, CyberRes and Vikas Jain, Sr. Product Manager, Security, Snowflake
    The Voltage Data Privacy & Protection team from CyberRes invites you to learn how to drive innovation and business value through the integration of Snowflake and Voltage SecureData.

    Remain in control of your data security while you run analytics at scale, employing persistent Format-Preserving Encryption and Anonymization techniques in conjunction with Snowflake’s native security provisions. Remove the obstacles to analytics on customer data. Benefit from referential integrity of protected data in multiple Snowflake accounts. Enable multi-cloud data portability and secure information sharing. Unleash the value of your data with privacy and security by default.

    We look forward to you joining us!

    About the speakers:
    Vikas Jain from Snowflake:
    Vikas is a security expert with over 20 years of experience working with various security and identity technologies, and he currently leads Security Product Management at Snowflake. Prior to joining Snowflake, Vikas held various leadership positions at VMware, Salesforce, Intel, and Oracle. At Salesforce, he was responsible for Salesforce Identity features. Most recently, Vikas worked at VMware leading Workspace ONE Identity Manager. Vikas earned his bachelor’s degree in electrical engineering from Birla Institute of Technology, India, and he is a named inventor on several patents.

    Alistair Rigg from CyberRes:
    Alistair has over 20 years of experience in software engineering and leadership roles spanning design, development, QA, sales, and services across industry and government. As a Senior Global Product Manager for Voltage Data Privacy and Protection at CyberRes, he focuses on applying innovations in data security to application dataflows and data warehouses on premises and in the cloud. He has two master’s degrees and a bachelor’s with honors, majoring in Computer Science, Finance, and Strategy.
  • The Road to Autonomous IAM Recorded: Jun 16 2021 45 mins
    Rick Wagner, Director, Product Management and Patrick Gookin, Sr. Product Manager, Micro Focus
    Identity and Access Management today is too hard. There are too many manual processes, too many poorly equipped decision makers, and too many resources required to create and maintain roles and policies. There has to be a better way.

    Attend this webinar to learn how autonomous IAM will radically change how we do IAM. Autonomous IAM combines advanced analytics (including artificial intelligence and machine learning) with modern automation. You'll hear about the different stages in the autonomous IAM journey, including:

    • AI-based recommendations
    • Continuous access review and certification
    • Anomaly detection and automated remediation
    • Augmented identity lifecycle management
    • Intelligent IAM roles and access policies
    • Access discovery
  • What’s New in Fortify 21.1 Recorded: Jun 15 2021 42 mins
    Brent Jenkins, Director of Product Marketing and Dylan Thomas, Director of Product Management, Fortify
    The CyberRes Fortify on Premises 21.1 release provides a continued march towards the key strategic initiatives of the product suite. It features accelerated language support, known vulnerability detection, dynamic automation, and enterprise scale and stability. These initiatives and updates underscore why Fortify continues to be a leader in the application security industry.

    In this webinar, we will cover the newest features and capabilities of our on premises products: Fortify Software Security Center, Fortify Static Code Analyzer, and Fortify WebInspect.

    Register now to discover how Fortify helps build secure software fast.
  • Discover a secure and compliant approach to Test Data Management Recorded: Jun 9 2021 60 mins
    Ali ElKortobi, Director of Product Management and Eric Popiel, Chief Technologist for Cybersecurity, Micro Focus
    Data privacy laws have changed the landscape of test data generation and management. Companies using production data with personal and sensitive structured data in test/dev environments are NOT compliant with the GDPR , CCPA, KVKK, and other global data privacy regulations.

    Learn how Micro Focus Voltage provides a comprehensive solution to address your privacy governance needs with sensitive structured data. It automates data privacy and protection of sensitive, regulated production data for use in test development pipelines for functional app testing, training, QA, and related use cases. Voltage portfolio puts data at the center with continuous processes from data discovery to disposition.

    Please join Ali ElKortobi, Director of Product Management, and Eric Popiel, Chief Technologist for Cybersecurity from our Voltage portfolio, who will discuss these important features from the customer point of view:
    • Discover private data in databases
    • Ensure data privacy in non-production environments
    • Anonymize data for secure use whether for analytics, test, or other use cases
    • Shield real data sources with a protected Test Data Repository containing real fake data
    • Ensure that the real sensitive data is secure
  • Overflowing Data. A Perfect Storm. Flexible Log Management Provides Protection. Recorded: Jun 8 2021 51 mins
    Steve Maxwell, Solutions Enablement Specialist and Gamze Bingöl, Product Marketing Manager – SecOps, Micro Focus
    There’s a perfect storm brewing around cybersecurity. The amount of incoming data was already increasing, but now it is expected to grow 5 times over by 2025. With the volume of data overflowing, organizations must take additional proactive measures to protect themselves from known and unknown vulnerabilities.

    Using centralized, automated, intuitive dashboards for security log management is a SecOps best practice and is integral to achieving company-wide security event visibility and maintaining compliance. We understand your needs and have developed cloud-based security log management to bring simplicity and flexibility for company-wide monitoring, event visibility, and reporting.

    In this session, you’ll see ArcSight Recon in action and discover how your organization can leverage ArcSight Recon for continuous log management and ease the burden of compliance requirements from a security-specific perspective.
  • ArcSight SaaS: Integrated Threat Hunting and Behavioral Analytics Recorded: May 4 2021 57 mins
    Michael Mychalczuk, Product Management Director, Security Operations, Micro Focus
    Cloud-native and SaaS deployments of SIEM software are more important than ever if you want to reduce your hardware footprint. ArcSight SaaS delivers key components to help your organization achieve this outcome and become “security operations SaaS enabled.” With this new offering, ArcSight provides organizations with more complete and resilient security coverage.

    Join Michael Mychalczuk as he presents the importance of SaaS in your security toolkit, as well as the key features and benefits of ArcSight’s SaaS approach. He will provide insights into the evolution of ArcSight as it is being transformed, containerized, and SaaS-enabled to better serve your security operations needs.

    We look forward to having you join us.

    Note: Edits were applied to this webinar on 6/30/2021 to more accurately communicate ArcSight’s SaaS roadmap going forward.
  • What’s New in NetIQ Change Guardian 6.1 Recorded: Apr 29 2021 52 mins
    Anmol Rastogi, Product Management and Anandyita Sinha, Developer, Micro Focus
    Join us to learn how NetIQ Change Guardian from Micro Focus can help you monitor critical files, systems, and applications in real time across hybrid environments to detect unauthorized privileged activity.

    In this webcast you will learn the latest features available in NetIQ Change Guardian v6.1 that can enhance your ability to identify and thwart malicious activity faster. The latest version capabilities in NetIQ Change Guardian, include:

    • The ability to investigate security events using improved parameter details
    • The ability to centralize SSL-based LDAP connections from a central console
    • The ability to report agent information from multiple servers
    • The benefits of support for Hyper-V 2016 and 2019 virtual machine environments
  • Top Application Security Trends of 2021 Recorded: Apr 20 2021 34 mins
    Brent Jenkins, Director, Fortify Product Marketing and Harley Adams, Senior Product Marketing Manager, Micro Focus
    In any annual trend list, there are almost always a few surprises. After all, most trends are a continuation of what was important just a month or so ago. In addition to the latest trends, we on the Fortify team continue to focus on our holistic AppSec vision of delivering excellence on foundational elements as well. This includes broad and accurate language coverage, an integration ecosystem that creates as little friction as possible fitting AppSec into the tools our customers already use, and end-to-end application security that supports SaaS and on-premises deployments.

    Join us for this webinar where we’ll review the trends, features, and capabilities our customers are asking us to focus on and deliver this year and beyond.
  • Five Reasons Why API Security Needs Access Management Recorded: Apr 15 2021 47 mins
    Kent Purdy, Access Product Marketing Manager and Richard Cabana, Senior Solutions Architect, Micro Focus
    APIs are often used to act on behalf of users by inheriting their permissions for a variety of software tasks. To understand why APIs today present such unprecedented risk, in this webinar we’ll review historical and present-day practices that organizations use to implement them.

    We’ll cover:
    • Growing trends of where and how APIs are being consumed—both today and in the future.
    • The top five breach hazards that APIs are exposing within organizations.

    Because APIs provide discrete access to backend data that is often sensitive, the need to ensure the right level of security is as imperative as any other type of online access. In this context, we’ll discuss the latest access management technologies available to ensure reliable delivery of API services while protecting the organization from outsider threats and making them more cyber resilient.

    We look forward to having you join us.
  • Cloud Migration with Confidence—Securing Multi-cloud and Hybrid IT Recorded: Apr 13 2021 60 mins
    Carole Murphy, Micro Focus Voltage; Juan Asenjo and Jeff Kerpics, Entrust nCipher
    Market research indicates that the majority of enterprises have a multi-cloud and/or hybrid cloud strategy. Due to COVID, over half of enterprises now expect cloud usage to exceed prior plans. Recognizing the pressures of data breaches and regulatory compliance, cloud service providers have started to offer their own data security solutions—each with a different approach and a potentially confusing array of capabilities.

    Watch this webcast to discover:
    • Why multi-cloud and hybrid deployments present challenges for data protection and privacy
    • What solutions are available to ensure data privacy, no matter the deployment scenario
    • How to safely migrate to large-scale, cloud-based data analytics and other services

    We’ll also show you how to leverage Voltage SecureData enterprise-grade cryptographic services and stateless key management together with Entrust nShield hardware security models to establish a root of trust to support data privacy in enterprise hybrid, multi-cloud and cloud agnostic models.
  • Win the race! Preventing Configuration Drift with Policy Recorded: Apr 9 2021 58 mins
    Tim Sedlack, Director of product Management and Charles Davis, VP of Engineering, Micro Focus
    Configuration drift for user policies happens when user entitlements and access to resources change gradually over time. Within deeper levels of an organization’s applications and infrastructure, maintaining consistent security policy enforcement is critical.

    Attend this webcast if you're in charge of systems such as Microsoft Active Directory (AD) to learn how NetIQ Universal Policy Administration from Micro Focus can help you more easily manage Group Policy Objects in both on-prem and cloud-based environments.
  • Cyber Resilience Fireside Chat: Securing the Software Supply Chain Recorded: Apr 6 2021 60 mins
    Steve Lipner, SAFECode, John Pescatore, SANS Institute, Rob Aragao and Stan Wisseman, Micro Focus
    The need to ensure a secure software supply chain is nothing new, although recent events have shined a spotlight on the topic. Organizations are now looking to better understand what they should be doing to drive better security into their development pipelines.

    SAFECode and SANS have guidance intended to help developers achieve supply chain security, and to help customers gain confidence in the security of their supply chains.

    Hear about some of the work being done across the industry to support both suppliers looking to improve their supply chain security practices and customers seeking to evaluate and manage their own risks.

    We will cover:
    • Components of a software supply chain
    • Approaches to consider
    • Cultural changes needed
    • Open source impact
  • Managing Security in a Decentralized World Recorded: Mar 15 2021 61 mins
    Rob MacDonald, Director of Solutions Marketing, Micro Focus and Mike Raggio, CISSP, Cloud Security Expert, CloudKnox Security
    The COVID-19 pandemic has caused an extreme shift in the way organizations and their employees work. With many moving to a hybrid or fully remote workforce, identity and access management must be a key part of the security strategy—ensuring governance no matter where employees are located or what devices they’re using.

    In this panel webinar, we’ll take a closer look at what the pandemic has meant for IAM adoption, and will identify trends around IAM as technologies, such as IoT, single sign-on and biometrics, move deeper into the IT environment.
  • Protect Source Code with Behavioral Analytics Recorded: Mar 10 2021 52 mins
    Stephan Jou – CTO, Security Analytics, Micro Focus
    Did you know that what happens in your development environment can tell you a lot about how safe your intellectual property is? For example, engineers accessing source code is a normal activity. However, there might be abnormalities in terms of who accesses what, when it happens, how often it happens, etc. Spotting anomalies quickly is critical to mitigating threats to your assets. Given the tsunami of data, it hasn’t been easy until now. Find out how AI-powered behavioral analytics can help stop bad actors in their tracks.

    You will learn about:
    • How the SolarWinds event reminds us that protecting our build, deploy, and engineering infrastructure is critical
    • Real-world case studies in the use of AI to detect these classes of attacks
    • The underlying techniques, data science and mathematics used in those use cases
    • Pragmatic next steps to help harden your source code and other intellectual property repositories
  • Cyber Resilience: Building Intelligent (Business-Oriented) Threat Operations Recorded: Mar 9 2021 61 mins
    Craig Robinson, Program Dir, Security Services, IDC and Stan Wisseman, Head of NA CyberSecurity Strategist Team, Micro Focus
    Traditional Security Operations Centers have also focused on protecting the business but have not had a clear goal to enable the business. In today’s world enterprise resiliency is paramount for organizations to “Pivot to Prosper”. To drive accelerated growth during times of adversities, the goal of the modern CISO is to pivot the cyber resiliency capability to support business growth, transformation, and overall enterprise resiliency. Intelligent (Business Oriented) Threat Operations is the next-generation evolution of the traditional Security Operations Centre.

    During this session, Stan Wisseman (Head of North American CyberSecurity Strategist Team, Micro Focus) will have a discussion with Craig Robinson (Program Director, Security Services, IDC) on how SOCs need to evolve to support the business and how operations can be more business-centered to play a role in driving enterprise and cyber resiliency.
  • Securing the Value Chain with Cyber Resilience Recorded: Feb 25 2021 59 mins
    Curtis Price, Program VP, IDC and Satyavathi Divadari, Micro Focus
    As hyper scale digital transformation takes stage, organizations are exploring new and exciting ways to drive market growth and leadership by being more innovative. Covid-19 has moved most of the public and consumers over the digital fault line, where traditional physical channels are rapidly moving to digital channels.

    During this session, Satyavathi Divadari (Chief Cyber Security Architect, Micro Focus) will have a discussion with Curtis Price (Program Vice President, Infrastructure Services, IDC) on how organizations can secure their value chain and build trust in enabling technologies such as Cloud, Artificial Intelligence and Block Chain.
Succeed in the digital economy
CyberRes is a Micro Focus line of business. We bring the expertise of one of the world’s largest security portfolios to help our customers navigate the changing threat landscape by building both cyber and business resiliency within their teams and organizations. We are here to help enterprises accelerate trust, reliability, and survivability through times of adversity, crisis, and business volatility.

We are a part of a larger set of digital transformation solutions that fight adverse conditions so businesses can continue to run today, keep the lights on, and transform to grow and take advantage of tomorrow’s opportunities. Visit CyberRes at: https://www.cybrerres.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cybersecurity Executive Order Challenges and Strategies
  • Live at: Jul 27 2021 5:00 pm
  • Presented by: Nickolous Ward, Department of Justice, Rod Wetsel, Booz Allen & Michael Echols, Senior Cybersecurity Executive
  • From:
Your email has been sent.
or close