During the Aug 15, 2019 Think Tank webcast (The Power of 2: How
Automated Threat Hunting & ATT&CK Can Work Together) the following
question was asked of the audience - Is your organization using the
MITRE ATT&CK Framework? The results A. Yes, we are curre...
The Power of 2: How Automated Threat Hunting & MITRE ATT&CK Framework
Can Work Together Many organizations are so busy responding to and
remediating indents that they don’t have the time, resources or
framework for being proactive and searching for these ...
Today's Security Congress Preview webinar on Privacy (click here if you
would like to view) included a polling question on the following: How
many organizations already had or have added some form of Data
Protection Officer (DPO) position following the in...
We recently held our (ISC)2 Security Congress Preview webcast focusing
on the Cloud Security track. The webcast was well received (scoring a
4.50 rating out of a possible 5.00) and has had over 800 views in less
than 48 hours. Travis Jeppson – Sr. Directo...
(ISC)2 Think Tank Webinar Smelling the Roses at 100Gb - Security Tooling
at the Speed of LifeFerris Bueller famously said, “Life moves pretty
fast. If you don’t stop to look around once in a while, you could miss
it.” With complex data flows now reaching ...
Upcoming (ISC)2 webinar. Earn 1 CPE. Detecting & Preventing Threat
Evasions Techniques – 2019 And BeyondCyber-attacks and the threat actors
behind them are becoming more and more sophisticated. Today’s attackers
adopt existing techniques, modify them and ...
Join Cofense and (ISC)2 for the first Think Tank webcast of the year on
Thursday, Jan 17, 2019 at 1PM Eastern for "Employing Users as Your
Quality Control". Process automation delivers a lot of promises. A car
can be assembled in less than a day and veget...
Join (ISC)² on Thursday, Nov 8, 2018 at 1PM Eastern. Email and the Web –
Defending Against Attackers’ Favorite Vectors According to the Verizon
Data Breach Investigations Report 2018, 99% of malware, such as
ransomware, trojans, and RATs, were delivered v...
Security Briefings Webcast Someone in leadership always seems to ask the
question “How can I tie my threat hunting activities to real impacts for
the organization?” Threat hunting programs are encouraged as part of a
mature and successful incident respons...
Imagine what a security analyst could deduce if they had visibility into
all the common applications flowing through their network. They could
optimize the data being sent to security tools, correlate information
across the various protocols to determine ...
(ISC)2 and CSA present Taming the Cloud Together - CCSP & CCSK Cloud
Certification Synergy on Tuesday, June 12, 2018 at 1 PM Eastern. Certain
things go together to make the sum of their parts that much better.
Peanut Butter and Jelly. Lennon and McCartney...
Webcast - Organizational Dynamics of Information Security Positioning
Information Security within the enterprise presents its own set of
challenges. Our recent survey data from hundreds of senior security and
IT leaders like you uncovered a number of syst...
While TLS (formerly known as SSL) has become the de facto way of
encrypting data in motion on networks, it can also hide threats from
your InfoSec team. As the volume of encrypted traffic continues to grow,
organizations become even more vulnerable to enc...
Join us for our next webcast November 16, 2017 at 12:00PM (Noon) Eastern
- Exchanging Cyber Threat Intelligence: There has to be a Better Way.
Today’s increasingly complex and stealthy threats are causing
organizations difficultly in defending against the...