cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

Community Manager
Community Manager
Cyber Risks Are Rising as a Result of the Pandemic
The rush to set up employees to work from home as a result of the COVID-19 outbreak has increased data protection and privacy risks, according to 87% of IT leaders who participated in a recent poll. However, only about half of respondents (51%) say they a... view more
1 Comment
1107 Views
Community Manager
Community Manager
Webinar: Cybersecurity Professionals Share COVID-19 Experiences
Cybersecurity professionals, you’re not alone. Working from home and facing new challenges and pressures due to COVID-19, remember your peers are going through the same thing. During the highly-attended webinar, “Gamechanger! What We’ve Learned (So Far) f... view more
1 Comment
1654 Views
(ISC)² Team
(ISC)² Team
During the Aug 15, 2019 Think Tank webcast (The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together) the following question was asked of the audience - Is your organization using the MITRE ATT&CK Framework? The results A. Yes, we are curre... view more
0 Kudos
1 Comment
655 Views
(ISC)² Team
(ISC)² Team
The Power of 2: How Automated Threat Hunting & MITRE ATT&CK Framework Can Work Together Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these ... view more
0 Comments
488 Views
(ISC)² Team
(ISC)² Team
Today's Security Congress Preview webinar on Privacy (click here if you would like to view) included a polling question on the following: How many organizations already had or have added some form of Data Protection Officer (DPO) position following the in... view more
0 Kudos
3 Comments
897 Views
(ISC)² Team
(ISC)² Team
(ISC)2 Think Tank Webinar Smelling the Roses at 100Gb - Security Tooling at the Speed of Life Ferris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” With complex data flows now reaching... view more
0 Comments
343 Views
(ISC)² Team
(ISC)² Team
Upcoming (ISC)2 webinar. Earn 1 CPE. Detecting & Preventing Threat Evasions Techniques – 2019 And Beyond Cyber-attacks and the threat actors behind them are becoming more and more sophisticated. Today’s attackers adopt existing techniques, modify them and... view more
0 Comments
368 Views
(ISC)² Team
(ISC)² Team
Join Cofense and (ISC)2 for the first Think Tank webcast of the year on Thursday, Jan 17, 2019 at 1PM Eastern for "Employing Users as Your Quality Control". Process automation delivers a lot of promises. A car can be assembled in less than a day and veget... view more
0 Kudos
0 Comments
339 Views
(ISC)² Team
(ISC)² Team
Join (ISC)² on Thursday, Nov 8, 2018 at 1PM Eastern. Email and the Web – Defending Against Attackers’ Favorite Vectors According to the Verizon Data Breach Investigations Report 2018, 99% of malware, such as ransomware, trojans, and RATs, were delivered v... view more
0 Comments
382 Views
(ISC)² Team
(ISC)² Team
Security Briefings Webcast Someone in leadership always seems to ask the question “How can I tie my threat hunting activities to real impacts for the organization?” Threat hunting programs are encouraged as part of a mature and successful incident respons... view more
0 Kudos
0 Comments
383 Views
(ISC)² Team
(ISC)² Team
Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to determine ... view more
3 Comments
1189 Views
(ISC)² Team
(ISC)² Team
(ISC)2 and CSA present Taming the Cloud Together - CCSP & CCSK Cloud Certification Synergy on Tuesday, June 12, 2018 at 1 PM Eastern. Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney... view more
0 Comments
480 Views
(ISC)² Team
(ISC)² Team
Webcast - Organizational Dynamics of Information Security Positioning Information Security within the enterprise presents its own set of challenges. Our recent survey data from hundreds of senior security and IT leaders like you uncovered a number of syst... view more
0 Kudos
0 Comments
393 Views
(ISC)² Team
(ISC)² Team
While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to enc... view more
0 Comments
366 Views
(ISC)² Team
(ISC)² Team
Join us for our next webcast November 16, 2017 at 12:00PM (Noon) Eastern - Exchanging Cyber Threat Intelligence: There has to be a Better Way. Today’s increasingly complex and stealthy threats are causing organizations difficultly in defending against the... view more
0 Comments
875 Views