Find out what's inside the January 2021 edition of the Journal & download a free copy of this month's featured article
Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization taking a people-centric approach to phishing prevention? Join this webinar for Proofpoint’s seventh annual State of the Phish report as it delivers critical, actionable insights into the current state of the phishing threat.
Our experts will deep dive into:
– The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses.
– The impacts infosec professionals are experiencing as a result of phishing attacks and the ways they’re attempting to combat these threats
– How organizations are delivering phishing awareness training, and the ways they measure program success
Ken Dunham brings more than 30 years of business, technical and leadership experience in cyber security, incident response and cyber threat intelligence. He is very active in his visionary and leadership roles with World Wide Technology, Optiv, 4D5A Security, and Rampart Research. Mr. Dunham has a long history of innovation and highly successful ventures related to anti-virus, incident response, forensics, Darknet intelligence operations, responsible disclosure, and cyber-threat intelligence. He is also proud to have served the USAF as a contractor for innovation of new training solutions for U-2, Warthog, and Predator programs for pilots and navigators. Mr. Dunham also authored the 2015 ISSA article of the year, “Troubling Trends of Espionage”, has authored multiple books and thousands of computer security articles.
Mr. Dunham founded the Boise ISSA chapter and has been an active officer of ISSA since 2001. The Boise ISSA chapter also orchestrates a very successful annual Information Security conference. Mr. Dunham also serves as an ISSA Journal mentor. Ken Dunham has also been instrumental in other cyber security groups of the industry as a founder of the Idaho InfraGard chapter (FBI) and member/officer of groups like HTCIA and ISACA.
Over the past 24 years, Steven Weil CISSP, CISA, CISM, CRISC, has worked as a systems engineer and security engineer for a major ISP, a network and security architect for a managed security services company, a senior security consultant and an information security manager. He has provided a wide variety of cyber security services to hospitals, universities, state government agencies, cities and large companies throughout the United States.
Mr. Weil has a strong understanding of and expertise in both the strategic and tactical aspects of cyber security, including data privacy. He has extensive expertise in developing security policies and standards, performing risk assessments, PCI DSS & HIPAA compliance and data privacy assessments.
Mr. Weil has a Master's degree in Information Science and has written several articles about cyber security for publications including ISSA Journal and SearchSecurity.com.
For over a decade, Kyle has worked for enterprises, hosting providers, the FBI, the Department of Energy, and the Department of Defense to analyze and improve their security posture. As co-founder of Savage Security, he focused on cutting through fear, uncertainty, and doubt (FUD) to help make defensive strategies cheaper and easier for customers. His company was later acquired by Threatcare, where Kyle served as the Director of Strategic Services and worked directly with the CEO. Kyle continues to develop practical defensive strategies, research security issues, and publish articles and presentations on improving the security industry.
Michael Bailey – Senior Product Marketing Manager, Proofpoint
Mike has worked in the B2B software technology sector for over 8 years and has been with the company for 6 years. When he joined Wombat in 2014 as the lone Digital Marketer he worked to successfully drive Wombat’s growth as a market leader in the space before the Proofpoint acquisition. Prior to Wombat, Mike worked at several early-stage technology startups in marketing roles. Mike has a bachelor’s degree in Business Communications from the University of Pittsburgh.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.