Loading Events

Shrink the Attack Surface

Home » Events » Shrink the Attack Surface

  • This event has passed so registration is closed.

Sponsor

Details

Date and Time

November 2, 2022 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference

Organizer

Amelia Ghidotti

Contact

Lisa O'Connell

Overview

Discovering all of your assets — devices, cloud services, software and users — is essential to secure your organization's environment. But it can be a struggle to identify, manage, and control the complexity that comes with these environments. Without understanding what's happening and knowing what you assets you have, there's the potential risks with external threats, vulnerabilities, shadow IT, and cloud misconfigurations.

So how can you can practice Attack Surface Management, while you stay proactive? Join this session for a new perspective on:

  • How your existing technology can work together to discover all of your digital assets
  • What techniques you can use for identifying, categorizing, and normalizing digital assets
  • How you can use an asset inventory to identify external threats, misconfigurations, shadow IT, and policy violations
  • Where to use automation to continuously assess your assets for threats

Moderator

Dr. Curtis Campbell – Vice President and Manager of IT Governance, SouthState Bank

Dr. Curtis Campbell serves as Director on the International Board of Information Systems Security Association (ISSA). She holds Bachelor and Master of Science degrees from the University of TN and a PhD in Organizational Leadership/ Information Systems.

Dr. Campbell, a 25-year cybersecurity professional, holds the designations of Chief Information Security Officer (C|CISO) and Certified Information Privacy Manager (CIPM). Her experience includes cybersecurity leadership, governance, risk, and compliance, third party risk and IT audits in regulatory environments.

Dr. Campbell serves as VP, Manager of Information Security Governance at SouthState Bank, a subsidiary of SouthState Corporation where she works with executive leadership to mitigate risk and develop strategic improvements related to policies and standards.

As ISSA Fellow, she is recognized for significant contributions to the cyber community, cyber profession, ISSA leadership and sustained ISSA membership. The elite status of ISSA Fellow designation belongs to only 2% of ISSA membership. As an ISSA Fellow, Curtis has 11+ years of association membership with over 20+ years of relevant professional experience speaking at local and national conferences and participating on cybersecurity panels.

As a current Director on the Board, she consistently moderates industry webinars, contributes to Board strategies for growth and continuous programs to benefit ISSA, and is a regular columnist for the ISSA Journal, with Women in Cybersecurity, championing women of all stages in their career.

Dr. Campbell is a thought leader and author on cybersecurity topics and the human connection between trust and unintentional insider threats in an ever-changing cybersecurity footprint. She has published over 30 research and peer-reviewed journal articles on cybersecurity including: “Solutions for Counteracting Human Deception in Social Engineering Attacks”; “Securing the Remote Employee: Protecting the Human Endpoint in the Cybersecurity Environment”; and “Securing the Vendor: Changing the Dynamic of the Infosec Relationship”, “Understanding and Incorporating Cybersecurity Ethics”, Existential Risk: Women Fighting for the Future”, and Inspiring and Preparing the Next Generation of Cybersecurity Professionals”.

See Dr. Curtis Campbell‘s full profile.

Speaker/s

Katie Teitler – Senior Cybersecurity Strategist, Axonius

Katie Teitler is a Senior Cybersecurity Strategist at Axonius where she is responsible for the company's cybersecurity asset management product messaging. She is also a co-host on the popular podcast, Enterprise Security Weekly. 

See Katie Teitler‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top