cancel
Showing results for 
Search instead for 
Did you mean: 

(ISC)² Updates

cancel
Showing results for 
Search instead for 
Did you mean: 

(ISC)² Updates

(ISC)² Team
(ISC)² Team
During the Aug 15, 2019 Think Tank webcast (The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together) the following question was asked of the audience - Is your organization using the MITRE ATT&CK Framework? The results A. Yes, we are curre... read more
0 Kudos
1 Comment
127 Views
(ISC)² Team
(ISC)² Team
The Power of 2: How Automated Threat Hunting & MITRE ATT&CK Framework Can Work Together Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these ... read more
0 Comments
153 Views
(ISC)² Team
(ISC)² Team
Today's Security Congress Preview webinar on Privacy (click here if you would like to view) included a polling question on the following: How many organizations already had or have added some form of Data Protection Officer (DPO) position following the in... read more
0 Kudos
2 Comments
182 Views
(ISC)² Team
(ISC)² Team
We recently held our (ISC)2 Security Congress Preview webcast focusing on the Cloud Security track. The webcast was well received (scoring a 4.50 rating out of a possible 5.00) and has had over 800 views in less than 48 hours. Travis Jeppson – Sr. Directo... read more
3 Comments
211 Views
(ISC)² Team
(ISC)² Team
(ISC)2 Think Tank Webinar Smelling the Roses at 100Gb - Security Tooling at the Speed of LifeFerris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” With complex data flows now reaching ... read more
0 Comments
163 Views
(ISC)² Team
(ISC)² Team
Upcoming (ISC)2 webinar. Earn 1 CPE. Detecting & Preventing Threat Evasions Techniques – 2019 And BeyondCyber-attacks and the threat actors behind them are becoming more and more sophisticated. Today’s attackers adopt existing techniques, modify them and ... read more
0 Comments
235 Views
(ISC)² Team
(ISC)² Team
Join Cofense and (ISC)2 for the first Think Tank webcast of the year on Thursday, Jan 17, 2019 at 1PM Eastern for "Employing Users as Your Quality Control". Process automation delivers a lot of promises. A car can be assembled in less than a day and veget... read more
0 Kudos
0 Comments
195 Views
(ISC)² Team
(ISC)² Team
Join (ISC)² on Thursday, Nov 8, 2018 at 1PM Eastern. Email and the Web – Defending Against Attackers’ Favorite Vectors According to the Verizon Data Breach Investigations Report 2018, 99% of malware, such as ransomware, trojans, and RATs, were delivered v... read more
0 Comments
213 Views
(ISC)² Team
(ISC)² Team
Security Briefings Webcast Someone in leadership always seems to ask the question “How can I tie my threat hunting activities to real impacts for the organization?” Threat hunting programs are encouraged as part of a mature and successful incident respons... read more
0 Kudos
0 Comments
195 Views
(ISC)² Team
(ISC)² Team
Imagine what a security analyst could deduce if they had visibility into all the common applications flowing through their network. They could optimize the data being sent to security tools, correlate information across the various protocols to determine ... read more
3 Comments
848 Views
(ISC)² Team
(ISC)² Team
(ISC)2 and CSA present Taming the Cloud Together - CCSP & CCSK Cloud Certification Synergy on Tuesday, June 12, 2018 at 1 PM Eastern. Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney... read more
0 Comments
341 Views
(ISC)² Team
(ISC)² Team
Webcast - Organizational Dynamics of Information Security Positioning Information Security within the enterprise presents its own set of challenges. Our recent survey data from hundreds of senior security and IT leaders like you uncovered a number of syst... read more
0 Kudos
0 Comments
227 Views
(ISC)² Team
(ISC)² Team
While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to enc... read more
0 Comments
227 Views
(ISC)² Team
(ISC)² Team
Join us for our next webcast November 16, 2017 at 12:00PM (Noon) Eastern - Exchanging Cyber Threat Intelligence: There has to be a Better Way. Today’s increasingly complex and stealthy threats are causing organizations difficultly in defending against the... read more
0 Comments
697 Views