- This event has passed so registration is closed.
In this session, Thom Bailey, senior director of product strategy at Mimecast, will explore the benefits of a consolidated cyber resilience platform to layer security, enhance visibility, and more effectively reduce mean time to remediate (MTTR). Attendees can expect to learn how to leverage an open API platform that uses shared threat intelligence to integrate with prevention, detection, and response technologies, and identify phishing emails with machine learning using real-life attacks to train and educate end users. With this knowledge session, attendees will gain an understanding of business risk with a Risk Score, comprised of aggregated data, to better gauge their organization’s security posture.
5 Benefits of Attending Session:
• Learn the benefits of a consolidated cyber resilience platform to layer your security, enhance visibility, and more effectively reduce time to respond/remediate (MTTR)
• Leverage an open API platform that uses shared Threat Intelligence to integrate with the prevention, detection, and response technologies
• Identify phishing emails with Machine Learning – and use real-life de-weaponized phishing attacks to both train and educate end-users
• Understand and manage business risk with a Risk Score comprised of aggregated data to gauge the organization’s security posture
Jorge Orchilles – Chief Technology Officer, SCYTHE
Jorge Orchilles is the Chief Technology Officer of SCYTHE and co-creator of the C2 Matrix project. He is a SANS Certified Instructor and the author of Security 564: Red Team Exercises and Adversary Emulation. He was a founding member of MITRE Engenuity Center of Threat-Informed Defense. He is a Fellow at the Information Systems Security Association (ISSA) and National Security Institute. Prior, Jorge led the offensive security team at Citi for over 10 years.
He also co-authored Common Vulnerability Scoring System (CVSS)and A Framework for the Regulatory Use of Penetration Testing in the Financial Services Industry, and author of Microsoft Windows 7 Administrator’s Reference. Jorge holds post-graduate degrees from Stanford and Florida International University in Advanced Computer Security & Master of Science. Jorge speaks English, Spanish
Thom Bailey – Senior Director of Product Strategy, Mimecast
Thom Bailey joined Mimecast as the Sr. Director of Product Marketing in 2019. With over 20+ years in product marketing and product management roles, Thom’s passion has been one of
understanding the intersection of IT Operations and Security. A frequent speaker and security evangelist, Thom is responsible for the product marketing of Mimecast’s Email Security 3.0,
Awareness Training, Threat Intelligence, Ecosystem Integration, and the overall Suite strategy.
See Thom Bailey‘s full profile.
Kyriakos “Rock” Lambros – CEO and Founder, RockCyber
Kyriakos “Rock” Lambros is the CEO and Founder of RockCyber, LLC. He is a seasoned Cybersecurity and Information Technology executive with expertise in aligning Cybersecurity and technology strategy with enterprise business goals in order to reduce the risk of revenue to the organization. This includes building security programs, architecture, operations, threat intelligence, governance, risk management, compliance and incident response for (multi-billion dollar) global organizations with exceptional security requirements. Rock’s enterprise experience has spanned industries with vastly differing security and privacy requirements including energy, eCommerce, government, banking, and manufacturing.
Rock has served in several senior Cybersecurity and technology roles for global, multi-billion-dollar companies such as MPLX (a subsidiary of Marathon Petroleum Corporation) eBay, Honeywell, General Dynamics Information Technology, Wells Fargo and Agilent Technologies. He built security programs from the ground up on multiple occasions and was a key contributor to M&A activities at multiple companies, including Marathon Petroleum Corporation’s acquisition of MarkWest Energy Partners. Rock oversaw multi-million dollar budgets, led successful defenses against highly-publicized denial-of-service attacks and built and managed large Security and Network Operations Centers.
Rock serves on the board of several stealth-mode startups as a corporate strategy and Cybersecurity advisor. He also co-chaired the Rocky Mountain Information Security Conference from 2015 to 2017,
A sought-after speaker, Rock has spoken at the annual RSA Conference, the largest cybersecurity conference in the world, and the Rocky Mountain Information Security Conference. He has also appeared on panels at the CIO Energy Summit, the Future of Data Security webinar, and for events hosted by the American Council for Technology. He has also spoken for the ISSA CISO Mentorship series and at industry association local chapter meetings.
Rock is a member of ISSA, ISC2, the Cloud Security Alliance and OWASP. He graduated with an MBA in Finance and Entrepreneurship from Arizona State University and received his B.S. in Management Information Systems from the University of Nevada Las Vegas.
See Kyriakos “Rock” Lambros‘s full profile.
Steve Cobb – CISO, One Source
Steve Cobb is One Source’s Chief Information Security Officer (CISO) bringing more than 25 years of leadership consulting surrounding IT infrastructure, cybersecurity, incident response, and cyber threat intelligence. Since joining One Source in 2015, Steve has been responsible for providing strategic IT consulting, delivering an increased organization efficiency and security for our customers. Prior to One Source, he was a Senior Security Engineer with Verizon Managed Security and a Senior Escalation Engineer with Microsoft. Steve serves on several CISO boards and a frequent presenter at conferences such as InfoSecCon, Cyber Defense Summit, and others. Steve attended UNC-CH, but left early to start his own IT company, and ultimately received his degree in Business from East Carolina University. Steve and his wife have two daughters and a son.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.