Find out what's inside the December 2021 edition of the Journal & download a free copy of this month's featured article
Past Web ConferencesHome » ISSA Web Conferences bring together ISSA members from around the world to share leading industry presentations and answer members' questions. Each event is designed to address the timely needs of our members through a live, online event and a subsequent recorded version for on-demand viewing. All content is developed by the ISSA Web Conference Committee. CPE Credit Available: ISSA Members will be eligible for a certificate of attendance, after successful completion of a post-event quiz, to submit CPE credits for various certifications.
Today’s SOC teams are struggling to gain efficiencies that are grounded by the limitations of legacy, on-premise technologies. As a result, organizations are turning to cloud-based solutions to offer the flexibility and scalability they need to keep pace with the modern threat landscape.
Over the past few years, the focus has shifted from ‘does the code have vulnerabilities?' to issues of ‘could the code have vulnerabilities?' Of course, the later created the question – How would we know? Now, just when we thought we understood things, we realize that we are changing again. Not only is the code and its components are important, but so is the question of the development environment. This webinar will go over the state, changes, and new directions we are being faced with.
ith the return of innovation to the SIEM market, the definition of what comprises an effective solution has changed. Join Exabeam for an informative discussion on the ten essential features and capabilities for IT security decision-makers to look for when evaluating potential candidates.
A number of digital transformation initiatives are forcing businesses to rethink their enterprise security architecture. With breaches on the rise, users increasingly mobile, and data and applications moving to the cloud, businesses have to consider whether traditional perimeter-based security approaches are relevant.
2018 was worse than 2017 for cyber security. This year every month was filled with even more major breaches, hacks, and attacks surfacing then 2017. The nature and range of the attacks varied from email hacking to zero days, from minor incursions to (potentially) everyone’s data being stolen. 2018 will probably go down as the new worst year for Cyber Security with all the previous year’s events having been far surpassed. Even our doom and gloom or same old same old predictions of last year have been blown away. The question now, will 2019 bear the full weight and impact of the events of 2019, or will it have its own harrowing events. Will the growing impact and occurrences spotlight security and translate in terms of media and regulatory attention? What kinds of threats will dominate the 2019 landscape?
Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout. Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?
We surveyed more than 6,000 working adults across the US, UK, France, Germany, Italy, and Australia —about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying—but always enlightening.
What’s really on the 2019 cybersecurity horizon? Join renowned PKI and cybersecurity expert, Ted Shorter, for a look into the future as he covers the 2019 cybersecurity trends to watch: Quantum computing & the need for crypto-agility, the truth behind IoT
We as security professionals are faced with a multitude of dilemmas in the performance of our duties. These dilemmas range in nature including the following questions: what new technology do we need to protect against the latest threats, How much security do we put into our infrastructures and yet still not be obtrusive
Companies of all sizes are struggling to ensure their networks are secure using aging firewall security systems. Micro-segmentation, when implemented correctly, can offer the additional security they need and provide tremendous application visibility in the process.
Acronyms such as IOCs (indicators of compromise) and IOAs (indicators of attack) are ubiquitous in the security industry. But a recent SANS Institute survey revealed that a vast majority of security professionals don't even know how many indicators they receive or can use. Join DomainTools Sales Engineer, Taylor Wilkes-Pierce to learn how IOCs and IOAs can work in tandem to build your own threat intelligence, enrich your investigations and overall security strategy.
While we continue to spend an ungodly amount of money on securing our infrastructure and trying to staff up security responders and improve corporate expertise, we are still getting hacked. Given that we do not have an unlimited budget and the availability of security expertise is extremely scarce, how can we survive? This webinar will bring us back to the basics with Key Risk Indicators and provide a way to re-think how we monitor and analyze residual risk.