cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

Community Manager
Community Manager
Cyber Risks Are Rising as a Result of the Pandemic
The rush to set up employees to work from home as a result of the COVID-19 outbreak has increased data protection and privacy risks, according to 87% of IT leaders who participated in a recent poll. However, only about half of respondents (51%) say they a... read more
1 Comment
922 Views
Community Manager
Community Manager
Webinar: Cybersecurity Professionals Share COVID-19 Experiences
Cybersecurity professionals, you’re not alone. Working from home and facing new challenges and pressures due to COVID-19, remember your peers are going through the same thing. During the highly-attended webinar, “Gamechanger! What We’ve Learned (So Far) f... read more
1 Comment
1434 Views
(ISC)² Team
(ISC)² Team
During the Aug 15, 2019 Think Tank webcast (The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together) the following question was asked of the audience - Is your organization using the MITRE ATT&CK Framework? The results A. Yes, we are curre... read more
0 Kudos
1 Comment
514 Views
(ISC)² Team
(ISC)² Team
The Power of 2: How Automated Threat Hunting & MITRE ATT&CK Framework Can Work Together Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these ... read more
0 Comments
405 Views
(ISC)² Team
(ISC)² Team
Today's Security Congress Preview webinar on Privacy (click here if you would like to view) included a polling question on the following: How many organizations already had or have added some form of Data Protection Officer (DPO) position following the in... read more
0 Kudos
3 Comments
703 Views
(ISC)² Team
(ISC)² Team
(ISC)2 Think Tank Webinar Smelling the Roses at 100Gb - Security Tooling at the Speed of LifeFerris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” With complex data flows now reaching ... read more
0 Comments
308 Views
(ISC)² Team
(ISC)² Team
Upcoming (ISC)2 webinar. Earn 1 CPE. Detecting & Preventing Threat Evasions Techniques – 2019 And BeyondCyber-attacks and the threat actors behind them are becoming more and more sophisticated. Today’s attackers adopt existing techniques, modify them and ... read more
0 Comments
327 Views
(ISC)² Team
(ISC)² Team
Join Cofense and (ISC)2 for the first Think Tank webcast of the year on Thursday, Jan 17, 2019 at 1PM Eastern for "Employing Users as Your Quality Control". Process automation delivers a lot of promises. A car can be assembled in less than a day and veget... read more
0 Kudos
0 Comments
304 Views
(ISC)² Team
(ISC)² Team
Join (ISC)² on Thursday, Nov 8, 2018 at 1PM Eastern. Email and the Web – Defending Against Attackers’ Favorite Vectors According to the Verizon Data Breach Investigations Report 2018, 99% of malware, such as ransomware, trojans, and RATs, were delivered v... read more
0 Comments
344 Views
(ISC)² Team
(ISC)² Team
Security Briefings Webcast Someone in leadership always seems to ask the question “How can I tie my threat hunting activities to real impacts for the organization?” Threat hunting programs are encouraged as part of a mature and successful incident respons... read more
0 Kudos
0 Comments
337 Views
(ISC)² Team
(ISC)² Team
Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to determine ... read more
3 Comments
1100 Views
(ISC)² Team
(ISC)² Team
(ISC)2 and CSA present Taming the Cloud Together - CCSP & CCSK Cloud Certification Synergy on Tuesday, June 12, 2018 at 1 PM Eastern. Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney... read more
0 Comments
435 Views
(ISC)² Team
(ISC)² Team
Webcast - Organizational Dynamics of Information Security Positioning Information Security within the enterprise presents its own set of challenges. Our recent survey data from hundreds of senior security and IT leaders like you uncovered a number of syst... read more
0 Kudos
0 Comments
350 Views
(ISC)² Team
(ISC)² Team
While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to enc... read more
0 Comments
325 Views
(ISC)² Team
(ISC)² Team
Join us for our next webcast November 16, 2017 at 12:00PM (Noon) Eastern - Exchanging Cyber Threat Intelligence: There has to be a Better Way. Today’s increasingly complex and stealthy threats are causing organizations difficultly in defending against the... read more
0 Comments
825 Views