In football, special teams - the groups that do field goals, kick-offs, etc. - don't spend a ton of time on the field. But they routinely win (or lose) games. For this reason, even though special teams is a part-time job for many of the players, they are nonetheless thoroughly conditioned, trained, briefed, and otherwise prepared for this crucial role.
Incident response (IR) teams serve a similar function for enterprise IT organizations. Many team members don't work full-time on IR. Yet when they are needed, the stakes couldn't be higher for the IT department. As such, it is absolutely crucial that the IR team is on top of its game.
This webinar will review the factors driving the ascendence of IR as the next crucial discipline for IT in general and the CIO / CSO in particular. It will then highlight the crucial components of an effective IR capability with particular emphasis on what leading organizations are doing to upgrade their IR function.
Our featured speakers for this timely webinar will be:
-Andrew Jaquith, Chief Technology Officer & SVP Cloud Strategy, SilverSky
-Ted Julian, Chief Markting Officer, Co3 Systems
How to Build Your Own Cyber Security Framework using a Balanced ScorecardEnergySec
Presented by: Russell Thomas, George Mason University
Abstract: Two aspects of cyber security that everyone struggles with are metrics and business impact. How do we measure it to improve and how do we make it meaningful to business decision makers? This gap appeared again recently in the NIST Cyber Security Framework (CSF) process RFI responses. But there is no need to wait for NIST CSF or anything else because there is a viable method available now that you can use to build your own CSF. Namely the “Balanced Scorecard” method.
The key idea is to focus on performance against measurable objectives in all critical dimensions that, taken together, will lead to better security, privacy, and resiliency outcomes, even in a dynamic and highly uncertain threat environment. In this presentation, we’ll explain the ten critical dimensions of cyber security performance, explain how they are interrelated and feed off each other, show how to create a performance index in each dimension, and describe how the balanced scorecard can be used to drive executive decisions. This presentation should be valuable to managers and executives in every type of organization in the energy sector, including the supply/service chain. Consultants, regulators, and academics should also find it interesting and useful.
Presented by: John Fleker, HP
Abstract: The cyber threat landscape is continually evolving. More and more, the critical infrastructure of our nation is at risk. Whether by nation-state actors, criminal organizations, hacktivists or any number of hackers looking to prove their skills, our safety and economic prosperity is threatened. There are four things that must be considered in order to address the evolving threats:
1- Becoming more proactive in our cyber defense efforts through intelligence
2- Better user behavior management
3- Assessing risk using meaningful metric
4- Resilience – operating through an intrusion
We need to look at the threat picture differently – in a proactive way – to ensure that CEO’s and CIO/CISO’s are on the same page regarding the threat, to allow those leaders to make better resourcing decisions and to be better prepared to mitigate adversaries when they arrive at the security perimeter. We need to integrate a wider set of intelligence into our thinking. This is critical to taking a more proactive stance in defending your networks. Combined with what you know of your own network, cyber intelligence strategically helps make solid resource planning decisions and functionally, helps your network operators better defend, mitigate and operate through cyber intrusions. The Operational Levels of Cyber Intelligence paper by the Intelligence and National Security Alliance details a better way of using intelligence.
www.insaonline.org/i/d/a/Resources/CyberIntel_WP.aspx
Additionally, we must increase info sharing across the board. Executive Order 13636 - Improving Critical Infrastructure Cybersecurity is leading critical infrastructure that direction.
Presented by Patrick Miller, The Anfield Group and Jason Ile, Tripwire
Abstract: This presentation emphasis the importance of building an environment where compliance is a natural byproduct of effective security controls. The presenters discuss how to establish info security controls that reinforce a culture of controls, by being plugged into the daily operational processes of IT operations, software and service development, project management and Internal audit.
Additional, the presenters explore the various benefits of continuous monitoring and how to achieve it through a step-by-step practice.
NESCO Town Hall Workforce Development PresentationEnergySec
Moderated and Presented by Andy Bochman
Discussion Topic: Workforce Development in the ICS WorkPlace
Discussion Abstract: Ask anyone working in the field at an electric utility about cybersecurity and the conversation will inevitably turn to the shortage of a qualified security staff with knowledge of our industry. The need to comply with NERC CIP standards, secure the rapidly proliferating smart grid technologies, and defend against the threat of cyber attacks targeting control systems, makes the short supply of cybersecurity talent is a critical issue.
Rapid Risk Assessment: A New Approach to Risk ManagementEnergySec
Presented by: Andrew Plato, Anitian
Abstract: Understanding, managing and responding to risk is one of the core functions of any information security program. However, for many organizations risk assessment is cumbersome and time consuming process. IT leaders, as well as security regulations, are demanding risk management practices that can deliver quick and actionable results.
Rapid Risk Assessment is a new approach to risk management that dramatically reduces the time, effort, and complexity for IT security risk assessment. Using the existing principles of risk management defined in NIST 800-30 documents, Rapid Risk Assessment can deliver more actionable and reliable results empowering business leaders to make sound decisions about risk. The key to this approach is a unique combination of skills, organization, and documentation that accelerates every aspect of the risk management process.
This presentation shows why current risk management tactics are failing and how Rapid Risk Assessment can correct those deficiencies.
Data integrity is integral to both effective incident management and to a successful integrated risk management process. As a former Unit Chief in the FBI Counterterrorism Division, Steve was responsible for managing the FBI Terrorist Watchlist and led efforts to resolve problems identified in several internal audits which ultimately updated and improved the accuracy of the database. In this presentation, learn how he leveraged his experience at the FBI to improve data integrity in his role at Discover Financial Services.
Integrating Cyber Security Alerts into the Operator DisplayEnergySec
Presented by: Michael Toecker, Digital Bond
Abstract: Control Systems are responsible for the safe and reliable governing of physical processes, and are designed to report conditions that could affect reliable operations to operators for action. These conditions may vary in their severity, from minor inconveniences to those that can bring the process to a full halt. While engineers have predicted certain events and consequences, others are “unknown unknowns”, and may only be detected due to variances from normal function.
Cyber security conditions are similar in nature. Cyber security conditions can vary in severity and cyber security professionals can classify and alert on some, but not all cyber security events. In this presentation, Michael Toecker will discuss cyber security conditions that are known, and that could be integrated into the operational display.
Treating cyber security events as analogous to control system events has many benefits and drawbacks, and Toecker will expand on criteria for determining what is appropriate for an operator display, and what is not. The purpose of this presentation is to demonstrate that cyber security can have a place in operational decisions, so long as conditions are carefully analyzed and response actions developed beforehand.
Incident Response: Don't Mess It Up, Here's How To Get It RightResilient Systems
According to Gartner "75% of CISOs who experience publicly disclosed security breaches and lack documented, tested response plans will be fired." According to Forrester, "You can't afford ineffective incident response." Despite these stakes, the incident response capability at most organizations is immature.
Based on an anonymized breach scenario, this webinar will define a framework for the broader incident response (IR) process. By highlighting IR components that were handled well, and a few that weren't, attendees will gain practical experience to help them better prepare for the inevitable.
Our featured speakers for this webinar will be:
- Jim Goddard, Managing Principal, Security Intelligence and Operations Consulting, HP Enterprise Security
- Ted Julian, Chief Marketing Officer, Co3 Systems. Serial security and compliance entrepreneur.
How to Build Your Own Cyber Security Framework using a Balanced ScorecardEnergySec
Presented by: Russell Thomas, George Mason University
Abstract: Two aspects of cyber security that everyone struggles with are metrics and business impact. How do we measure it to improve and how do we make it meaningful to business decision makers? This gap appeared again recently in the NIST Cyber Security Framework (CSF) process RFI responses. But there is no need to wait for NIST CSF or anything else because there is a viable method available now that you can use to build your own CSF. Namely the “Balanced Scorecard” method.
The key idea is to focus on performance against measurable objectives in all critical dimensions that, taken together, will lead to better security, privacy, and resiliency outcomes, even in a dynamic and highly uncertain threat environment. In this presentation, we’ll explain the ten critical dimensions of cyber security performance, explain how they are interrelated and feed off each other, show how to create a performance index in each dimension, and describe how the balanced scorecard can be used to drive executive decisions. This presentation should be valuable to managers and executives in every type of organization in the energy sector, including the supply/service chain. Consultants, regulators, and academics should also find it interesting and useful.
Presented by: John Fleker, HP
Abstract: The cyber threat landscape is continually evolving. More and more, the critical infrastructure of our nation is at risk. Whether by nation-state actors, criminal organizations, hacktivists or any number of hackers looking to prove their skills, our safety and economic prosperity is threatened. There are four things that must be considered in order to address the evolving threats:
1- Becoming more proactive in our cyber defense efforts through intelligence
2- Better user behavior management
3- Assessing risk using meaningful metric
4- Resilience – operating through an intrusion
We need to look at the threat picture differently – in a proactive way – to ensure that CEO’s and CIO/CISO’s are on the same page regarding the threat, to allow those leaders to make better resourcing decisions and to be better prepared to mitigate adversaries when they arrive at the security perimeter. We need to integrate a wider set of intelligence into our thinking. This is critical to taking a more proactive stance in defending your networks. Combined with what you know of your own network, cyber intelligence strategically helps make solid resource planning decisions and functionally, helps your network operators better defend, mitigate and operate through cyber intrusions. The Operational Levels of Cyber Intelligence paper by the Intelligence and National Security Alliance details a better way of using intelligence.
www.insaonline.org/i/d/a/Resources/CyberIntel_WP.aspx
Additionally, we must increase info sharing across the board. Executive Order 13636 - Improving Critical Infrastructure Cybersecurity is leading critical infrastructure that direction.
Presented by Patrick Miller, The Anfield Group and Jason Ile, Tripwire
Abstract: This presentation emphasis the importance of building an environment where compliance is a natural byproduct of effective security controls. The presenters discuss how to establish info security controls that reinforce a culture of controls, by being plugged into the daily operational processes of IT operations, software and service development, project management and Internal audit.
Additional, the presenters explore the various benefits of continuous monitoring and how to achieve it through a step-by-step practice.
NESCO Town Hall Workforce Development PresentationEnergySec
Moderated and Presented by Andy Bochman
Discussion Topic: Workforce Development in the ICS WorkPlace
Discussion Abstract: Ask anyone working in the field at an electric utility about cybersecurity and the conversation will inevitably turn to the shortage of a qualified security staff with knowledge of our industry. The need to comply with NERC CIP standards, secure the rapidly proliferating smart grid technologies, and defend against the threat of cyber attacks targeting control systems, makes the short supply of cybersecurity talent is a critical issue.
Rapid Risk Assessment: A New Approach to Risk ManagementEnergySec
Presented by: Andrew Plato, Anitian
Abstract: Understanding, managing and responding to risk is one of the core functions of any information security program. However, for many organizations risk assessment is cumbersome and time consuming process. IT leaders, as well as security regulations, are demanding risk management practices that can deliver quick and actionable results.
Rapid Risk Assessment is a new approach to risk management that dramatically reduces the time, effort, and complexity for IT security risk assessment. Using the existing principles of risk management defined in NIST 800-30 documents, Rapid Risk Assessment can deliver more actionable and reliable results empowering business leaders to make sound decisions about risk. The key to this approach is a unique combination of skills, organization, and documentation that accelerates every aspect of the risk management process.
This presentation shows why current risk management tactics are failing and how Rapid Risk Assessment can correct those deficiencies.
Data integrity is integral to both effective incident management and to a successful integrated risk management process. As a former Unit Chief in the FBI Counterterrorism Division, Steve was responsible for managing the FBI Terrorist Watchlist and led efforts to resolve problems identified in several internal audits which ultimately updated and improved the accuracy of the database. In this presentation, learn how he leveraged his experience at the FBI to improve data integrity in his role at Discover Financial Services.
Integrating Cyber Security Alerts into the Operator DisplayEnergySec
Presented by: Michael Toecker, Digital Bond
Abstract: Control Systems are responsible for the safe and reliable governing of physical processes, and are designed to report conditions that could affect reliable operations to operators for action. These conditions may vary in their severity, from minor inconveniences to those that can bring the process to a full halt. While engineers have predicted certain events and consequences, others are “unknown unknowns”, and may only be detected due to variances from normal function.
Cyber security conditions are similar in nature. Cyber security conditions can vary in severity and cyber security professionals can classify and alert on some, but not all cyber security events. In this presentation, Michael Toecker will discuss cyber security conditions that are known, and that could be integrated into the operational display.
Treating cyber security events as analogous to control system events has many benefits and drawbacks, and Toecker will expand on criteria for determining what is appropriate for an operator display, and what is not. The purpose of this presentation is to demonstrate that cyber security can have a place in operational decisions, so long as conditions are carefully analyzed and response actions developed beforehand.
Incident Response: Don't Mess It Up, Here's How To Get It RightResilient Systems
According to Gartner "75% of CISOs who experience publicly disclosed security breaches and lack documented, tested response plans will be fired." According to Forrester, "You can't afford ineffective incident response." Despite these stakes, the incident response capability at most organizations is immature.
Based on an anonymized breach scenario, this webinar will define a framework for the broader incident response (IR) process. By highlighting IR components that were handled well, and a few that weren't, attendees will gain practical experience to help them better prepare for the inevitable.
Our featured speakers for this webinar will be:
- Jim Goddard, Managing Principal, Security Intelligence and Operations Consulting, HP Enterprise Security
- Ted Julian, Chief Marketing Officer, Co3 Systems. Serial security and compliance entrepreneur.
Building Human Intelligence – Pun IntendedEnergySec
Presented by: Rohyt Belani, Phishme
Abstract: In the physical world, the human brain has evolved to avoid danger. The threat of physical pain triggers fear – and we have learned to avoid behavior that causes pain. In the electronic world of email, however, this concept doesn’t translate. Clicking on a malicious link or opening an attachment laced with malware doesn’t cause pain, and often a user won’t even notice anything is wrong after doing it. How then, can we teach fear perception in the electronic world? Is it even possible? In this presentation I’ll discuss how immersive training can key on psychological triggers to teach people to become skeptical email users who not only avoid undesired security behavior but can aid intrusion detection by reporting suspicious emails, helping to mitigate one of the most serious problems in security: slow incident detection times. According to reports from Mandiant and Verizon, average detection time for an incident is in the hundreds of days. A properly trained workforce is not only resilient to phishing attacks, but can improve detection times as well.
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatResilient Systems
As attacks on Sony and Target show, the impact of a breach can stretch for months. Knowing how to communicate to the various internal and external audiences is crucial to mitigating the trail of damage.
The webinar features Melanie Dougherty Thomas, a crisis expert with more than 20 years of experience in marketing and communications. Melanie is Managing Director of Inform – a top communications firm that serves Fortune 500s.
Melanie will outline strategies for:
·Incident investigation and assessment
·Public acknowledgement and media management
·Customer and social media responses
·Legal notifications and obligations
Our featured speakers for this webinar will be:
·Melanie Dougherty Thomas, Managing Director, Inform
·Ted Julian, CMO, Co3 Systems
Do you have an incident response plan to cover disasters, cyber-attacks, and other threats to your organization? How confident are you that it will work in a real-world situation? While simply having a plan will help you check the box on the audit, it doesn't guarantee effectiveness in a real situation. Assessing your incident response plans through fire drills, desk top exercises, functional scenarios, and full scale exercises will help your organization truly validate the effectiveness of the plan.
IR assessments are meant to:
- Evaluate plans, policies, and procedures
- Find weaknesses in the plan and gaps in resources
- Improve coordination and communication internally and externally
- Define and validate roles and responsibilities
- Train personnel in their roles and responsibilities
This webinar will provide practical steps for assessing your organization's plans and demonstrate ways to improve them through a methodical and proven approach. After all, whether they're big or small, internal or external, in most any organization incidents occur. Complete plans that have been tested, backed by trained resources and thorough communication, are the proven recipe to minimize the impact of incidents when they occur.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Richard White, Security Intelligence and Operations Principal, HP Enterprise Security Products
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergySec
Presented by: Julie Soutuyo, Tennessee Valley Authority
Abstract: Over the past 40 years, the energy industry has evolved to a position of dependence upon information technology to accomplish its mission. Cyber attacks have become a “way of life”; as the Nation, industry, organizations, and individuals strive to operate safely and securely in cyberspace. Most rely on a compliance-based “whack-a-mole”; approach to cyber defense which presents multiple barriers to hackers, based on the last attack, with efforts to “hit” any that get inside the organization’s defenses. While still valid, this compliance-based approach has significant challenges: stopping intruders, mitigating the problems they create, and positioning an organization to achieve its mission under a cyber attack. Cyber experts across the Nation are increasingly turning to resiliency as a means for fighting through these attacks with the objective of meeting operational and mission requirements in spite of the attacks. This shift is driving organizations to rethink their organizational structures to achieve unity of effort and streamlined decision-making in the face of a fast paced set of operational demands. This presentation will highlight the strategies to promote a cyber resilient organization.
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
Doug Copley and John Kelley present advice for new CISOs, applying a framework model for assessment and measurement, establishing executive support and establishing a culture of security.
Marked by record-breaking data breaches and an explosion of increasingly complex, sophisticated attacks, 2014 was challenging year for security professionals. Can the industry find relief in 2015? Bruce Schneier & Jon Oltsik evaluate how we did in 2014 from an incident response perspective, as well as offer predictions for what lies ahead in 2015.
By Popular Demand: Co3's Latest and Greatest Features Resilient Systems
This year's data breaches make it clearer than ever – organizations are in desperate need of an effective, consistent, and compliant incident response (IR) process that stops attacks in their tracks.
To help companies like yours prepare for incidents, assess their impact, execute the response, and manage the process to closure, we made a bunch of enhancements to our platform this year. This webinar will feature some of the latest features, many of which came from customer requests, your peers in the industry:
-Integrated threat intelligence provides team members the information they need, when they need it.
-SIEM integrations and incident automation turbo-charge plan creation and execution.
-Easy customization yields a finely-tuned response process without requiring programming expertise.
Our featured speakers for this webinar will be:
- Tim Armstrong, Sales Engineering Manager, Co3 Systems
- Ted Julian, Chief Marketing Officer, Co3 Systems
Incident Response in the age of Nation State Cyber AttacksResilient Systems
One of the most important and yet least discussed aspects of any corporate structure is the incident response framework. As recent events have highlighted, the risk of intellectual property and critical infrastructure being the target of a cyber-attack is quite real. More than ever before, corporate preparation and response plans are necessary for any entity operating in the digital age.
This webinar will examine how an organization's incident response framework can help limit the exposure of intellectual property and critical infrastructure to outside, malicious parties. Our presenters will review how to construct corporate response plans that yield best-of-breed preparedness.
Our featured speakers for this timely webinar are:
-Mike Gibbons, Managing Director, Alvarez and Marsal, former FBI Special Agent as Unit Chief, overseeing all cyber crime investigations
-Art Ehuan, Managing Director, Alvarez and Marsal, former FBI Supervisory Special Agent assigned to the Computer Crimes Investigations Program
-Gant Redmon, Esq. CIPP/US General Counsel and Vice President of Business Development at Co3
Is your organization ready to respond to an incident? More specifically, do you have the people, process, and technology in place that is required to cope with today's threats?
This webinar will provide practical steps on how to assess your organization's risks, threats, and current capabilities through a methodical and proven approach. From there, it will detail the people, process, and technology considerations when standing up or revitalizing an incident response (IR) program.
Specifically it will cover the four pillars of a modern IR function:
- Identify what must be protected
- Scope potential breach impact to the organization
- Define IR management capabilities
- Determine likely threats and their potential impact
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Richard White, Solutions Principal, HP
Most organizations have made significant investments in security controls to enable prevention and detection. But when incidents occur, is your firm able to quickly mitigate them? The best security teams are. And as a result their organizations can learn from them and improve their performance next time.
This webinar will review critical components of proper incident mitigation including:
- Conducting post mortem and updating SOPs
- Evaluating historical response performance
- Generating reports for management, auditors, and authorities
Our featured speakers for this webinar will be:
- Stephen Brennan, Global Technical Consulting Lead - Managing Partner, CSC
- Ted Julian, Chief Marketing Officer, Co3 Systems
This presentation will contrast traditional risk assessment with some emerging techniques that use internal and market risk event (incident ) data to drive a more accurate risk model.
Learn from the experts! Tune into this webinar to hear Doug Copley, Deputy CISO/Security & Privacy Strategist for Forcepoint, talk about What It Takes to be a CISO in 2017: expectations, challenges, partnerships, the roadmap,critical activities and more.
Hexis Cyber Solutions: Rules of Engagement for Cyber Security Automationbarbara bogue
Just like soldiers have literal rules of engagement for warfare, cyber warfare can operate on policy-based methodologies and countermeasures which can empower and improve the efficiency of incident response.
Building Human Intelligence – Pun IntendedEnergySec
Presented by: Rohyt Belani, Phishme
Abstract: In the physical world, the human brain has evolved to avoid danger. The threat of physical pain triggers fear – and we have learned to avoid behavior that causes pain. In the electronic world of email, however, this concept doesn’t translate. Clicking on a malicious link or opening an attachment laced with malware doesn’t cause pain, and often a user won’t even notice anything is wrong after doing it. How then, can we teach fear perception in the electronic world? Is it even possible? In this presentation I’ll discuss how immersive training can key on psychological triggers to teach people to become skeptical email users who not only avoid undesired security behavior but can aid intrusion detection by reporting suspicious emails, helping to mitigate one of the most serious problems in security: slow incident detection times. According to reports from Mandiant and Verizon, average detection time for an incident is in the hundreds of days. A properly trained workforce is not only resilient to phishing attacks, but can improve detection times as well.
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatResilient Systems
As attacks on Sony and Target show, the impact of a breach can stretch for months. Knowing how to communicate to the various internal and external audiences is crucial to mitigating the trail of damage.
The webinar features Melanie Dougherty Thomas, a crisis expert with more than 20 years of experience in marketing and communications. Melanie is Managing Director of Inform – a top communications firm that serves Fortune 500s.
Melanie will outline strategies for:
·Incident investigation and assessment
·Public acknowledgement and media management
·Customer and social media responses
·Legal notifications and obligations
Our featured speakers for this webinar will be:
·Melanie Dougherty Thomas, Managing Director, Inform
·Ted Julian, CMO, Co3 Systems
Do you have an incident response plan to cover disasters, cyber-attacks, and other threats to your organization? How confident are you that it will work in a real-world situation? While simply having a plan will help you check the box on the audit, it doesn't guarantee effectiveness in a real situation. Assessing your incident response plans through fire drills, desk top exercises, functional scenarios, and full scale exercises will help your organization truly validate the effectiveness of the plan.
IR assessments are meant to:
- Evaluate plans, policies, and procedures
- Find weaknesses in the plan and gaps in resources
- Improve coordination and communication internally and externally
- Define and validate roles and responsibilities
- Train personnel in their roles and responsibilities
This webinar will provide practical steps for assessing your organization's plans and demonstrate ways to improve them through a methodical and proven approach. After all, whether they're big or small, internal or external, in most any organization incidents occur. Complete plans that have been tested, backed by trained resources and thorough communication, are the proven recipe to minimize the impact of incidents when they occur.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Richard White, Security Intelligence and Operations Principal, HP Enterprise Security Products
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergySec
Presented by: Julie Soutuyo, Tennessee Valley Authority
Abstract: Over the past 40 years, the energy industry has evolved to a position of dependence upon information technology to accomplish its mission. Cyber attacks have become a “way of life”; as the Nation, industry, organizations, and individuals strive to operate safely and securely in cyberspace. Most rely on a compliance-based “whack-a-mole”; approach to cyber defense which presents multiple barriers to hackers, based on the last attack, with efforts to “hit” any that get inside the organization’s defenses. While still valid, this compliance-based approach has significant challenges: stopping intruders, mitigating the problems they create, and positioning an organization to achieve its mission under a cyber attack. Cyber experts across the Nation are increasingly turning to resiliency as a means for fighting through these attacks with the objective of meeting operational and mission requirements in spite of the attacks. This shift is driving organizations to rethink their organizational structures to achieve unity of effort and streamlined decision-making in the face of a fast paced set of operational demands. This presentation will highlight the strategies to promote a cyber resilient organization.
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
Doug Copley and John Kelley present advice for new CISOs, applying a framework model for assessment and measurement, establishing executive support and establishing a culture of security.
Marked by record-breaking data breaches and an explosion of increasingly complex, sophisticated attacks, 2014 was challenging year for security professionals. Can the industry find relief in 2015? Bruce Schneier & Jon Oltsik evaluate how we did in 2014 from an incident response perspective, as well as offer predictions for what lies ahead in 2015.
By Popular Demand: Co3's Latest and Greatest Features Resilient Systems
This year's data breaches make it clearer than ever – organizations are in desperate need of an effective, consistent, and compliant incident response (IR) process that stops attacks in their tracks.
To help companies like yours prepare for incidents, assess their impact, execute the response, and manage the process to closure, we made a bunch of enhancements to our platform this year. This webinar will feature some of the latest features, many of which came from customer requests, your peers in the industry:
-Integrated threat intelligence provides team members the information they need, when they need it.
-SIEM integrations and incident automation turbo-charge plan creation and execution.
-Easy customization yields a finely-tuned response process without requiring programming expertise.
Our featured speakers for this webinar will be:
- Tim Armstrong, Sales Engineering Manager, Co3 Systems
- Ted Julian, Chief Marketing Officer, Co3 Systems
Incident Response in the age of Nation State Cyber AttacksResilient Systems
One of the most important and yet least discussed aspects of any corporate structure is the incident response framework. As recent events have highlighted, the risk of intellectual property and critical infrastructure being the target of a cyber-attack is quite real. More than ever before, corporate preparation and response plans are necessary for any entity operating in the digital age.
This webinar will examine how an organization's incident response framework can help limit the exposure of intellectual property and critical infrastructure to outside, malicious parties. Our presenters will review how to construct corporate response plans that yield best-of-breed preparedness.
Our featured speakers for this timely webinar are:
-Mike Gibbons, Managing Director, Alvarez and Marsal, former FBI Special Agent as Unit Chief, overseeing all cyber crime investigations
-Art Ehuan, Managing Director, Alvarez and Marsal, former FBI Supervisory Special Agent assigned to the Computer Crimes Investigations Program
-Gant Redmon, Esq. CIPP/US General Counsel and Vice President of Business Development at Co3
Is your organization ready to respond to an incident? More specifically, do you have the people, process, and technology in place that is required to cope with today's threats?
This webinar will provide practical steps on how to assess your organization's risks, threats, and current capabilities through a methodical and proven approach. From there, it will detail the people, process, and technology considerations when standing up or revitalizing an incident response (IR) program.
Specifically it will cover the four pillars of a modern IR function:
- Identify what must be protected
- Scope potential breach impact to the organization
- Define IR management capabilities
- Determine likely threats and their potential impact
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Richard White, Solutions Principal, HP
Most organizations have made significant investments in security controls to enable prevention and detection. But when incidents occur, is your firm able to quickly mitigate them? The best security teams are. And as a result their organizations can learn from them and improve their performance next time.
This webinar will review critical components of proper incident mitigation including:
- Conducting post mortem and updating SOPs
- Evaluating historical response performance
- Generating reports for management, auditors, and authorities
Our featured speakers for this webinar will be:
- Stephen Brennan, Global Technical Consulting Lead - Managing Partner, CSC
- Ted Julian, Chief Marketing Officer, Co3 Systems
This presentation will contrast traditional risk assessment with some emerging techniques that use internal and market risk event (incident ) data to drive a more accurate risk model.
Learn from the experts! Tune into this webinar to hear Doug Copley, Deputy CISO/Security & Privacy Strategist for Forcepoint, talk about What It Takes to be a CISO in 2017: expectations, challenges, partnerships, the roadmap,critical activities and more.
Hexis Cyber Solutions: Rules of Engagement for Cyber Security Automationbarbara bogue
Just like soldiers have literal rules of engagement for warfare, cyber warfare can operate on policy-based methodologies and countermeasures which can empower and improve the efficiency of incident response.
Growing cotton provides livelihoods for an estimated 100 million households in as many as 85 countries. But adverse global market conditions and reliance on large doses of water, fertilizer, and pesticides impose considerable social and environmental costs.
Although synthetic materials are making inroads, cotton remains by far the most important natural fiber for textiles. In 2013/14, an estimated 26.3 million tons of cotton were produced worldwide.
Several initiatives exist to improve the social and environmental conditions under which cotton is produced.
Raw water should be treated to make it potable/fit for drinking. So a line of treatments should be followed to treat the water. After Coagulation and sedimentation the process of filtration and disinfection are followed.
What to say and when to say it; the stakes don't get any higher than with public filings about cyber security risk and incidents. Learn what that SEC expects in the way of periodic filing disclosures, when you do and don't have to disclose a cyber incident, and how lawyers and security professionals can get on the same page so the right thing is disclosed at the right time.
Our featured speakers for this timely webinar will be:
-Rick Olin, CIPP/US; Counsel, GTC Law Group
-Gant Redmon, CIPP/US; General Counsel, Co3 Systems
Are you a CIPP holder? (CIPP/US, CIPP/C, CIPP/E, CIPP/G and CIPP/IT) Attend this webinar for CPE credit.
Türkiye’nin İlk ve Tek NLP Master Traineri – Siyasi Koç – Yazar ve NLP Uzmanları Dernek Başkanı Sayın Mustafa Kılınç tarafından “2005” yılında Türkiye’de İlk Kez başlatılan Başarı Koçluğu programının amacını, sınava girecek öğrenci ve ailelerinde oluşan STRES, BAŞARISIZLIK vb. gibi KAFA KARIŞIKLIĞINA sebep olan konuları NLP alanında bir OTORİTE konumunda bulunan Mustafa Kılınç’la sizler için konuştuk.
Mustafa Kılınç’a göre;
Değişen sınav sistemlerine uyum sağlamak, hedef belirlemek, Fark yaratmak ve Başarının hazzını yaşamak için BAŞARI KOÇLUĞU…
BAŞARIDA ETKİN ANAHTAR BEYİN KULLANIM KILAVUZU
“İNSAN DÜŞÜNDÜĞÜ KADAR GÜÇLÜ İNANDIĞI KADAR DEĞERLİDİR.” Düşüncelerinizi yönetmeye ancak beyninizin kullanım kılavuzuna sahip olduğunuz anda başlayabilirsiniz. Başarı Koçluğunun temelini etkin “Beyin Kullanımı” oluşturmaktadır. Ancak düşüncelerinizi, duygularınızı ve davranışlarınızı yönetmeye başladığınızda isteklerinizle sonuçlarınızın bütünleşmesi gerçekleşir.
Türkiye’de İLK KEZ “NLPDAP” Merkezi tarafından “Beyin Kullanım Kılavuzu” sunulmaya başlanmıştır. Farkı yaratan her zaman farktır. ÖSS, SBS, KPSS ve Yaşam Yolculuğundaki sınavlardan Başarıyla çıkmak, Performansımızı arttırmak, Etkin Birey olmak için “BAŞARI KOÇLUĞU” bir lüks değil gerekliliktir.
HEDEF BELİRLEME KRİTERLERİ
Hedef belirlemek görünmeyeni görünür yapmanın ilk adımıdır. Öğrencilerimizdeki en büyük eksiklik ne istediklerini bilmemeleridir. ÖSS – SBS sınavlarına girecek öğrencilerimiz Başarı Koçluğu kapsamında Ne istediğini bilen ve eyleme geçme dürtüsüyle bütünleşirler.
MAZERET YOK ŞİFRESİ
TUTKU + İNANÇ = BAŞARI
Başarı ölçülebilen bir sonuçtur. Koçluk programının amacı; sınav kabusundaki öğrencilerin hiç başarısız olmamış başarı stratejileriyle bütünleşmesini sağlamaktır. Bu amaçla Başarısızlık yoktur. Sadece Geri Bildirim vardır.
BAŞARI KOÇLUĞUNDA HİPNOZ ve İLAÇ YOK
Ülkemizde ilk kez NLPDAP merkezi tarafından başlatılan Başarı Koçluğu programının uygulanması esnasında Hipnoz, Trans ve herhangi bir ilaç kullanımı yoktur. Başarı Koçluğu programı bir Terapi ve Telkin süreci olmayıp EĞİTİM sürecinden oluşuyor.
SINAV SENDROMLARINA SON
NLPDAP eğitim merkezinin hedefinin; “insanları değil insanların beyinlerini eğitmek” olduğunun altının çizen Mustafa Kılınç ülkemizdeki eğitim öğretimin tamamen doldurma sistemine göre yapıldığını oysaki eğitimin amacı ilerlemek ve ilerletmektir. Mustafa Kılınç çok çalışmanın başarıyı garanti etmediğini Akıllı çalışmakla istenilen başarılara ulaşılacağını söylüyor.
Duygular davranışlarımızın ön habercileridir ve Duygu gelmeden Davranış gelmez. Sınav öncesinde, esnasında ve sınav son
Oggi, grazie ai Social Networks, le distanze si sono notevolmente ridotte e i canali di comunicazione si sono ampliati e diversificati.
Nell’era della socialità la presenza sui Social Media è indispensabile per ogni azienda che voglia creare una relazione duratura nel tempo con i propri clienti, ampliare i propri contatti, avere informazioni di prima mano sulle opinioni relative ai servizi/prodotti e ottenere maggior visibilità.
Noi di Ulixe CRM oltre a proporre soluzioni di Social CRM, offriamo consulenze di Social Media Marketing. I nostri servizi vanno dalla proposizione di una strategia di Marketing all’attuazione di Viral Marketing; in particolare ci occupiamo di strutturare campagne mirate in base ad ogni contesto aziendale e settore merceologico, scegliendo insieme ai nostri clienti i canali di comunicazione più adatti alle loro esigenze.
Oggi, grazie ai Social Networks, le distanze si sono notevolmente ridotte e i canali di comunicazione si sono ampliati e diversificati.
Nell’era della socialità la presenza sui Social Media è indispensabile per ogni azienda che voglia creare una relazione duratura nel tempo con i propri clienti, ampliare i propri contatti, avere informazioni di prima mano sulle opinioni relative ai servizi/prodotti e ottenere maggior visibilità.
Noi di Ulixe CRM oltre a proporre soluzioni di Social CRM, offriamo consulenze di Social Media Marketing. I nostri servizi vanno dalla proposizione di una strategia di Marketing all’attuazione di Viral Marketing; in particolare ci occupiamo di strutturare campagne mirate in base ad ogni contesto aziendale e settore merceologico, scegliendo insieme ai nostri clienti i canali di comunicazione più adatti alle loro esigenze.
Breached! App Attacks, Application Protection and Incident ResponseResilient Systems
Software applications, like outward facing Web applications, are consistently ranked as one of the top threat vectors. For example, according to a recent report from Trustwave, SQL injection was the attack method for 26% of all reported breaches. Indeed despite being a decade-old, well understood vulnerability, SQL injection flaws remain present in 32% of applications.
This webinar will first explain software application vulnerabilities and define their various types. It will also present recent research findings about the prevalence of these vulnerabilities and their impact. From there it will discuss what organizations can do to harden their applications. Finally, the webinar will cover best practices for responding to a successful application attack.
Our featured speaker for this timely webinar is Chris Wysopal, Co-Founder, CTO & Chief Information Security Officer at Veracode.
IT has deployed the appropriate security controls. You've updated your policies and procedures and raised awareness. And you've got your incident response plan in place. What could possibly go wrong? The answer is: the plan itself. All the planning and preparation in the world won't protect your business from a data breach if the response plan doesn't work. It's necessary to ensure that your response plan stays current and functional.
This webinar will provide a checklist of items to review when auditing your response plan. It will also review how often you should audit, test, and update your plan.
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
Information Security
1.Why the need to think about it?
2.What exactly are we talking about?
3.How do we go about doing something about it?
4.Is there a one-size-fits-all framework?
This presentation from the NTXISSA June 2015 Lunch and Learn meeting covers: “Survival in an evolving threat landscape” and “How to talk security in the boardroom”
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
This presentation was given at CampIT. It motivated the need for a high level of maturity of the enterprise security program, by striving for cyber resiliency.
NIST Cybersecurity Framework is voluntary framework to support the emerging needs for having robust and effective cyber security practices across an enterprise. This presentation recaps the Framework 6 months into implementation and along with changes. Also, discusses the capabilities of TrustedAgent GRC to accelerate and strengthen the implementation of an effective cybersecurity program by automating or addressing many of the practices required by the framework.
How to Build a Successful Incident Response ProgramResilient Systems
Building an incident response program can be a cumbersome task when done manually. From identifying incident types and severity to creating a response plan for each incident type, Co3 provides an easy to use, customizable solution for quickly assessing, responding to, and driving incidents to closure. Co3 customer, USA Funds, manages incidents in one tenth of the time that it took previously.
This webinar will guide security practitioners through the process of creating a basic incident response process using Co3's Security Incident Response module. Based on a list of accumulated best practices, this webinar will give team members a good start on creating a successful incident response program to use at their organization.
Our featured speakers for this timely webinar will be:
-Ted Julian, Chief Marketing Officer, Co3 Systems
-Tim Armstrong, Security Incident Response Specialist, Co3 Systems
This webinar series is designed to help internal auditors looking to equip themselves with competencies and confidence to handle audit of IT controls and information security, and learn about the emerging technologies and their underlying risks
The series focuses on contemporary IT audit approaches relevant to Internal Auditors and the processes underlying risk based IT audits.
Session 7 of 10
This Webinar focuses on SEIM Log Analysis
• Logging Sources & Servers
• What is a SIEM?
• Advantages of a SIEM?
• Using SIEM
• Detection of outbound sensitive information
• Data Collection
• Aggrefation, Normalization and Enrichment
• Reporting and Forensics
• Challenges in log management
Since the spread of IT systems has made it a pre-requisite that auditors as well as management have the ability to examine high volumes of data and transaction in order to determine patterns and trends. In addition, the increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools.
While a variety of powerful tools are readily available today, the skills required to utilize such tools are not. Not only must the correct testing techniques be selected but the effective interpretation of outcomes presented by the software is essential in the drawing of appropriate conclusions based on the data analysis. This 6 webinar series, based on Richard Cascarino’s book “Data Analytics for Internal Auditors” covers these skills and techniques.
Webinar 2 in a 6 Webinar Series - Analytics in the Audit
Conducting the Audit
Obtaining Information from IT Systems for Analysis
Use of Computer Assisted Audit Techniques
Implementing a Security Management FrameworkJoseph Wynn
Given at the Pittsburgh ISSA April 2017 chapter meeting.
This presentation discussed how to improve the success of your information security program by organizing it using a security management framework.
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
Cyber attacks have increased in frequency and severity, and financial institutions are particularly interesting targets to cyber criminals. Join this presentation to learn the latest cybersecurity threats and challenges plaguing the financial industry, and the policies and solutions your organization needs to have in place to protect against them.
Viewers will learn:
• Current trends in Cyber attacks
• FFIEC Cyber Assessment Toolkit
• NIST Cybersecurity Framework principles
• Security Metrics
• Oversight of third parties
• How to measure cybersecurity preparedness
• Automated approaches to integrate Security into DevOps
About the Presenter:
Ulf Mattsson is the Chief Technology Officer of Security Solutions at Atlantic BT, and earlier at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity, He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM. Ulf is the inventor of more than 45 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention
Leveraging Your Security System to Impact Your Bottom lineguidepostsolutions
Guidepost Solutions, Nick Miller discusses “Leveraging your System to Operationalize your Business and Improve Processes to Impact Bottom Line” and is joined by Kurt Takahashi – AMAG, Andrew Campion – Comcast, Bret DuChateau – Northwest Mutual.
Information technology is a complex business, at best. While IT can provide amazing benefits, it still requires vigilance and diligence to ensure it is running correctly and that it is secure. A security framework can be an excellent tool to evaluate what you might be missing and confirm that what you are already doing is spot-on correct. This session will discuss the importance of using security frameworks and walk attendees through the NIST Cyber Security Framework to review how the framework functions, how to use a framework, and most importantly, how the use of a framework can and will benefit their organization.
Similar to Incident Response: Security's Special Teams (20)
Are We Breached How to Effectively Assess and Manage Incidents Resilient Systems
Most organizations have made significant investments in security controls to enable prevention and detection. But when the inevitable alerts fire, what happens next? Is your firm able to quickly assess these events and, if necessary, manage them to closure? The best security teams do. And as a result their organizations manage incidents gracefully as just another part of doing business.
This webinar will review critical components of proper incident assessment and management including:
- Assessing events for severity and potential impact including triage
- Engaging the appropriate team members across the organization
- Choosing the optimal containment strategy for your business
Our featured speakers for this webinar will be:
- Stephen Brennan, Global Technical Consulting Lead - Managing Partner, CSC
- Ted Julian, Chief Marketing Officer, Co3 Systems
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Resilient Systems
The next round of HIPAA compliance audits will now include business associates as well as covered entities. Compliance with the Privacy Rule, the Security Rule, and the Breach Notification Rule are all in scope, so documentation will be a key factor.
This webinar will provide best practices for covered entities under the HIPAA compliance audit. Learn what your organization can do to best prepare for the next round.
Our featured speakers for this webinar will be:
- Amy Derlink, Chief Privacy Officer, IOD Incorporated
- Gant Redmon, CIPP/US General Counsel & VP of Business Development, Co3 Systems
Are you a CIPP holder (CIPP/US, CIPP/C, CIPP/E, CIPP/G and CIPP/IT)? Attend this webinar for CPE credit.
Encryption: Who, What, When, Where, and Why It's Not a PanaceaResilient Systems
Encryption is a crucial and powerful tool in any organization's data protection / privacy arsenal. But to be effective, it must be applied properly. And even then it's not a silver bullet, including from a privacy breach disclosure perspective.
This webinar will discuss:
- Encryption vs. hashing: what is it, and when might you want to use one over the other?
- Practical considerations: implementation options and their merits
- Legal considerations: encryption requirements, benefits and restrictions
- Legal limitations: situations in which encryption is not enough
Our featured speakers for this webinar will be:
- Suhna Pierce, Associate, Morrison Foerster
- Gant Redmon, Esq. CIPP/US, General Counsel & VP of Business Development, Co3 Systems
Are you a CIPP holder? (CIPP/US, CIPP/C, CIPP/E, CIPP/G and CIPP/IT) Attend this webinar for CPE credit.
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
Despite changing threats and the near certainty of compromise, most
IT security programs are much the same as they were a decade ago. How
have attacker motivations and tactics changed, and why? What does
this mean for IT security departments, and how must they adapt?
This webinar will detail the security challenges organizations face
today, the implications of changes in attacker tactics and
motivations, and what firms can do to better align their security
program with today's reality.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Colby Clark, Director of Incident Management, Fishnet Security
EU Cyber Attacks And The Incident Response ImperativeResilient Systems
Speaking at the recent Cyber Security Summit in London, Lee Miles, Deputy Head of the U.K. National Cyber Crime Unit said, "cybercrime is anonymous, sophisticated, and international." Gone are the days of hacking "to plant a flag for kudos... it's all about the money now," he said. Accounts like these highlight the inevitability of breaches and emphasize just how crucial a capable incident response capability is to survival.
This webinar will review the major components of a modern incident response function, highlighting what organizations can do to quickly improve their program. It will use the Co3 platform to demonstrate how firms can dramatically improve incident response without requiring a significant investment in staff, professional services, or infrastructure.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Tim Armstrong, Security Incident Response Specialist, Co3 Systems
Are you a CIPP holder? (CIPP/US, CIPP/C, CIPP/E, CIPP/G and CIPP/IT) Attend this webinar for CPE credit.
Boxing legend Joe Louis famously said, "Everyone has a plan... until they get hit." While grizzled incident response veterans can relate to this sentiment, they all know that thorough preparation is crucial to success. Response procedures that are so thoroughly ingrained that executing them is like muscle memory have a chance, even in the fog of battle.
Have you thoroughly prepared your organization to respond when the inevitable happens? How confident are you that it will work in a real-world situation? Proper incident response preparation is key to answering these questions and is frankly the foundation of any incident response capability.
This webinar will review critical components of IR preparation including:
- IR Underpinnings
- Flexible Frameworks
- Leadership Challenges
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Sean Mason, Global Incident Response Leader, CSC
You have probably heard of the major breach at the US retailer Target, in which 40m credit cards and their details were stolen. As with any incident of this magnitude, there are valuable lessons to be learned. One way to understand the breach more fully - to borrow a phrase from DeepThroat talking about the Watergate scandal in All The Presidents Men - is to follow the money.
This webinar will do just that. Using the Target breach as a real example, for which there is now much information in the public domain, we will detail what we know about how it happened. We will place particular emphasis on the money trail, not only in terms of how the bad guys turn the data into cash, but also who ends up footing the bill, the role insurance can play, and the resulting lawsuits and other repercussions (both the CEO and CIO of Target have resigned). As such, this webinar represents a powerful opportunity to learn first hand what really happens as a breach unwinds from a very respected professional who has been in the trenches for decades.
And here are three important take-aways from this highly informative webinar:
1. Why Chip and PIN is not foolproof
2. A detailed understanding of where the money goes post breach
3. Top tips for how firms must think differently about IR in the wake of Target-like incidents
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Mark Rasch, Chief Privacy Officer, SAIC
How To Turbo-Charge Incident Response With Threat IntelligenceResilient Systems
Minutes, hours, days - each one counts when responding to a security incident. Yet most firms have a lot of room for improvement.
According to the 2013 Verizon Data Breach Investigations Report, in 66% of cases (up from 56% last year), breaches remained undiscovered for years, and in 22% of cases, it took months to fully contain the incident.
This webinar will review the challenges firms face in trying to create a rapid and decisive incident response (IR) process. It will then highlight the crucial role that timely, contextual threat intelligence can play in turbo-charging incident response, particularly when tightly integrated with the broader IR discipline.
Our presenters will reveal the power of this approach by demonstrating Co3's integrated threat intelligence capabilities including intel from the cyber threat intelligence experts at iSIGHT Partners.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Tim Armstrong, Security Incident Response Specialist, Co3 Systems
- Matt Hartley, VP of Product Management, iSIGHT Partners
As a new CISO, you want to have an impact as quickly as possible - people will be watching and judging. But at the same time, you need to be practical about what's achievable in an organization that you're still getting to know. It's also important to consider the experience you bring to the role and how it applies - or doesn't - to your new job.
In this webinar, we'll discuss three fundamental differences you're likely to experience in your new job and offer recommendations on strategic activities you can focus on in your first 90 days. New CISOs will gain a framework for identifying these quick wins. Existing CISOs will get an opportunity to refresh and revitalize their security program.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Bill Campbell, IT Executive and Serial CISO
Are you a CIPP holder? (CIPP/US, CIPP/C, CIPP/E, CIPP/G and CIPP/IT) Attend this webinar for CPE credit.
We all know that Target-like breaches aren't completely preventable. But does that mean we're doomed and powerless? Not even close. A decisive response effort can dramatically reduce the impact of a breach, potentially stopping attacks in their tracks before sensitive data is lost.
This webinar will show you how. Using the Target breach as a case study, it will demonstrate how timely detection and threat intelligence integrated with incident response management could have stopped the attack cold.
Our featured speakers for this webinar will be:
- Tim Armstrong, Security Incident Response Specialist, Co3 Systems
- Colin Henderson, Principal Consultant Security Intelligence & Operations, HP, Enterprise Security Products
veryone's heard about the Target breach at the end of last year; some of you may have been affected. One way to understand this breach - to borrow a phrase from Deep Throat talking about the Watergate Scandal in "All The President's Men" - is to follow the money.
This webinar will do that. It will detail what we know about the Target breach and how it happened. But it will place particular emphasis on the money trail - not only in terms of how the bad guys turn the data into cash, but also who ends up footing the bill, the role insurance can play, the likelihood of lawsuits, and so on. As such, this webinar represents a powerful opportunity to learn what really goes down as a breach unwinds from a respected professional who has been in the trenches for decades.
Our featured speakers for this webinar will be:
- Ted Julian, Chief Marketing Officer, Co3 Systems
- Mark Rasch, Chief Privacy Officer, SAIC
How'd we do in 2013 from a data breach perspective? As we close out the year, are the cupboards / budgets bare and will it be a lean holiday season? Or should we be budgeting a holiday celebration with all of the trappings and a sumptuous New Year?
Borrowing themes from the Charles Dickens holiday classic, this webinar will review industry statistics and other indicators to evaluate how we did in 2013 from a privacy breach and security incident response perspective. Will our mythical CSO and CPO get the Scrooge-like CFO to approve their budget increases? And what will 2014 hold from a security, privacy, and regulatory perspective? Register below to find out.
Our featured speakers for this Dickensian webinar will be:
- Ebenezer Scrooge, Chief Financial Officer, Acme Inc. played by Ted Julian, Chief Marketing Officer, Co3 Systems
- Bob Cratchit, Chief Privacy Officer, Acme Inc. played by Gant Redmon, General Counsel, Co3 Systems
- Tiny Tim, Chief Security Officer, Acme Inc. played by "Tiny" Tim Armstrong, Incident Response Specialist, Co3 Systems
Treat a Breach Like a Customer, Not a Compliance IssueResilient Systems
After a breach occurs, thoughts turn to technical remediation and regulatory compliance. Affected customers have often been viewed through a filter of breach notification laws. That thinking is changing. Now, privacy and breach response is as much a customer issue - not just a compliance issue. It's time to update core practices to be prepared for and mitigate the damage of an incident beyond just checking the compliance box.
Co3 and Experian are teaming up to provide clients with invaluable breach response techniques. This webinar will review the best practices to leverage during breach response to ensure continued customer satisfaction. Attendees will also get a sneak peek at the new Co3 Systems / Experian Data Breach Resolution incident response management product integration.
Our featured speakers for this timely webinar will be:
-Gant Redmon, Esq. CIPP/US, General Counsel & VP of Business Development, Co3 Systems
-Bob Krenek, Senior Director, Experian Data Breach Resolution
-Michael Bruemmer, Vice President, Experian Data Breach Resolution
You're Breached: Information Risk Analysis for Today's Threat LandscapeResilient Systems
If you would like a copy of the slide in the form of a self-playing PowerPoint Show, please contact jtroisi@co3sys.com
IT security executives have used information risk analysis for decades. From basic objectives such as ensuring critically sensitive data gets protection commensurate with its value, to more sophisticated uses such as determining when certain risks can be accepted, these risk management frameworks help align security with the business. Changes in the "threat landscape", which includes the technical operating environment, the motivation and capability of threats, and even business context can have dramatic implications on the application of analysis techniques. And in information technology, from BYOD, to cloud, to mobile, to state-sponsored actors; plenty has changed in the last 3 years alone.
This webinar will review the conceptual underpinnings of information risk analysis that remain widely used today. We will then examine important changes in the threat landscape over the last few years and assess their impact on risk assessment and its application in risk management. Finally, we will offer recommendations for how, in light of these changes, organizations should think differently about risk and as a result, their security program as a whole.
Our featured speakers for this timely webinar will be:
- Bill Campbell, CISSP, Director at i-fact@nalysis, former security executive at MITRE, Union Bank, Symantec and Fidelity Investments.
- Ted Julian, Chief Marketing Officer, Co3 Systems. Serial security and compliance entrepreneur.
Today's security and privacy professionals know that breaches are a fact of life. Yet their organizations are often not prepared to respond when the time comes. They're "overweight" on prevention and detection, but "underweight" on response.
Based on a decade-plus caseload of actual breach investigations across of range of different organizations, this webinar will examine an amalgamated, anonymized breach situation and review a play-by-play of how the response went: the good, the bad, and the ugly. Attendees will gain hard-earned, battle-tested insight on what to do, and what to avoid when it's their turn to respond to an incident.
Our featured speakers for this timely webinar will be:
- Don Ulsch, CEO, ZeroPoint Risk. Distinguished Fellow at the Ponemon Institute.
- Joseph DeSalvo, Managing Director, ZeroPoint Risk. Former CSO at Mylan and Iron Mountain.
- Ted Julian, Chief Marketing Officer, Co3 Systems. Serial security and compliance entrepreneur.
How To Turbo-Charge Incident Response With Threat IntelligenceResilient Systems
Minutes, hours, days - each one counts when responding to a security incident. Yet most firms have a lot of room for improvement. According to the 2013 Verizon Data Breach Investigations Report, in 66% of cases (up from 56% last year), breaches remained undiscovered for years, and in 22% of cases, it took months to fully contain the incident.
This webinar will review the challenges firms face in trying to create a rapid and decisive incident response (IR) process. It will then highlight the crucial role that timely, contextual threat intelligence can play in turbo-charging incident response, particularly when tightly integrated with the broader IR discipline. Finally, it will reveal the power of this approach by demonstrating Co3's integrated threat intelligence capabilities including intel from industry-leader iSIGHT Partners.
Deeper Security, Broader Privacy - how firms use the latest Co3 features to a...Resilient Systems
We've recently added quite a few new features to the Co3 platform, both in the Security module and the Privacy module. Since some of you have asked us to review these, we decided to run a webinar that highlights the new capabilities.
New Privacy Modules features: Co3 recently expanded its Privacy module to include breach notification requirements and guidelines from various countries in the EU. Adding the EU to our product was quite an interesting challenge for our team, primarily because of the difference in how Personally Identifiable Information is defined in Europe vs. the US, as well as the scope of applicability.
New Security Module features: The Security module has also been upgraded with some great new features targeting the needs of both the security incident manager as well as the incident responder. Improvements include everything from CISO dashboards to threat intelligence correlation.
This webinar will review the recent updates we've made to our product and show how firms are leveraging them to automate the breach response process. Features like these have helped Co3 customer USA Funds manage incidents in one tenth of the time that it took previously.
Our featured speakers for this timely webinar will be:
-Gant Redmon, Esq. CIPP/US, General Counsel, Co3 Systems
-Allen Rogers, VP of Engineering, Co3 Systems
The Patriot Act and Cloud Security - Busting the European FUDResilient Systems
In the wake of Edward Snowden's allegations of NSA cyber spying, we are honored to have a former General Counsel of the NSA as one of our panelists. This is sure to be an especially interesting webinar.
European hosting companies have cited the USA Patriot Act of 2001 as the boogieman that would leave information free for plunder by the dark and clandestine US Government. And NSA activity as described by Edward Snowden has provided a convenient, timely, and high profile case study. But are these concerns well founded? Learn more about the Patriot Act, ways other countries combat terrorism, and how these relate to privacy.
Our featured speakers for this timely webinar will be:
-Stewart Baker, Partner, Steptoe & Johnson LLP; Former Assistant Secretary for Policy at the Department of Homeland Security and General Counsel of the NSA
-Michael Vatis, Partner, Steptoe & Johnson LLP
-Gant Redmon, Esq. CIPP/US General Counsel, Co3 Systems
The trends continue to point upward for data incidents and 2013 is becoming a pace setter. The shifting regulatory landscape promises to add further complications for companies struggling to prepare for and respond to data privacy incidents.
This webinar will feature two leading data breach experts who have performed a two year trend analysis across hundreds of cases to offer a powerful and up-to-date perspective on what has happened and their predictions for the future. It will also cover how these factors are shaping regulations which are in turn influencing decision-making in the C-Suite.
Our featured speakers for this timely webinar will be:
-Bill Hardin, Director of Data Privacy Response & Investigations, Navigant
-Jennifer Coughlin, Privacy and Data Security Attorney, Nelson, Levine
-Gant Redmon, Esq. General Counsel and VP of Business Development, Co3 Systems
Introducing Co3's Security Incident Response ModuleResilient Systems
In response to customer demand, we recently added a security incident response module (S-IR) to Co3. This expands the scope of our solution beyond privacy breaches, to include all types of security incidents like system intrusions, malware outbreaks, and DDoS attacks. As a result Co3 can now automate incident response for all kinds of events, including of course, those that impact personally identifiable information.
As you know, we don't typically do product-oriented webinars. But since many of you have expressed interest in learning more about the S-IR module we are going to give it a try.
This webinar will demonstrate the new release of the Co3 platform, including the S-IR module. Privacy professionals will get a hot-off-the-presses look at this major update to our solution and will see how the S-IR module allows them to work more effectively with their counterparts in IT. Security professionals will get an introduction to a game-changing security product which Network World recently named, "One of the hottest products at RSA."
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Page 2
Introductions: Today’s Speakers
• Ted Julian, Chief Marketing Officer, Co3 Systems
• Ted is a serial entrepreneur who has launched four companies during
his ~20 years in the security / compliance industry.
• Andrew Jaquith, Chief Technology Officer & SVP
Cloud Strategy, SilverSky
• Andy is a thought-leader with ~20 years experience in the security
industry. He has helped shape the security industry as an
enterpreneur at SilverSky and @stake and as an industry analyst at
Forrester Research and Yankee Group.
3. Page 3
Agenda
• Introductions
• IR: The Next Security Discipline
• Enhancing Your IR Capability
• Technology
• People
• Process
• Final Thoughts / Recommendations
• Q&A
4. Page 4
Co3 Automates Incident Response
PREPARE
Improve Organizational
Readiness
• Assign response team
• Describe environment
• Simulate events and incidents
• Focus on organizational gaps
REPORT
Document Results and
Track Performance
• Document incident results
• Track historical performance
• Demonstrate organizational
preparedness
• Generate audit/compliance reports
ASSESS
Quantify Potential
Impact, Support Privacy
Impact Assessments
• Track events
• Scope regulatory requirements
• See $ exposure
• Send notice to team
• Generate Impact Assessments
MANAGE
Easily Generate Detailed
Incident Response Plans
• Escalate to complete IR plan
• Oversee the complete plan
• Assign tasks: who/what/when
• Notify regulators and clients
• Monitor progress to completion
5. Page 5
SilverSky simplifies how customers secure information
MANAGE
email, messaging
and collaboration
SECURE
data with our
security software
MONITOR
networks for
intrusions 24x7
Exchange
Lync
SharePoint
Email Security
Mobile device
management
Email DLP
Email Encryption
Email Archive
Email Continuity
Log management
Vulnerabiity
management
Brand protection
UTM management
Event monitoring
and response
Managed BlackBerry
By tirelessly safeguarding our customers’ most important information, SilverSky enables
growth-minded leaders to pursue their business ambitions without security worry.
SilverSky protects $525 billion in banking and credit union assets. Each month, we
analyze 15 billion raw security events and investigate 140,000 alerts.
6. Page 6
By Mike Kaplan [Public domain], via Wikimedia Commons
Offense
7. Page 7
By U.S. Navy photo by Mass Communication Specialist David P. Coleman [Public domain], via Wikimedia Commons
Defense
8. Page 8
By U.S. Navy photo by Lt. Cmdr. Scott Allen. [Public domain], via Wikimedia Commons
Special Teams
9. Page 9
Information security has three phases too
Prevention Detection Response
• Stop malicious threats
• Secure endpoints,
networks, and servers
• Maintain secure and
compliant
configurations
• Identify anomalous
behavior
• Detect compromises
• Discover data leaks &
potential breaches
• Have a plan
• Assess events
• Escalate to incidents
• Manage
• Report
10. Page 10
Why Incident Response Matters
Compromised
asset
No damage
Budget
IDS, AV or other control
repels an attack
Attacker infects a
workstation
Attacker “pivots” to
gains control over
sensitive systems
Analogy Damage
“Preventative
care”
“Infection”
“Disease”
millions
000s
0
0
000s
millions
Multiple compromised
assets
Chain of events
11. Page 11
Compromises are the new reality
SilverSky analyzed security
incidents based on data from 861
financial institutions for the second
half of 2012
We found:
• 1,628 likely and confirmed customer
compromises
• 441 institutions affected
• 51% of our financial customers
experienced at least one incident
SilverSky blocked 1/3 of incidents
Traffic analysis detected the rest
Size of
institution ($assets)
Average #
of incidents
Small (<$25 million) 3
Mid-sized (<$1 Bm) 4
Large (>$1 Bn) 7
Source: SilverSky 2012 2H Financial Institutions
Threat Report. (Base: 861 SilverSky customers)
12. Page 12
Guess where most IT security budgets go?
By victor vic (all in, tapis) [CC-BY-SA-2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons
14. Page 14
Public Domain Pictures.net - Eggs In The Grass by Ed Hoskins
There is a metaphor for this strategy…
15. Page 15
IR Demands Investment
“If you are going to invest in one thing - it should
be incident response.”
GARTNER – JUNE 2013
“You can’t afford ineffective incident response.”
FORRESTER – APRIL 2013
19. Page 19
The Incident Response Lifecycle
PREPARE
Improve Organizational
Readiness
• Assign response team
• Describe environment
• Simulate events and incidents
• Focus on organizational gaps
REPORT
Document Results and
Track Performance
• Document incident results
• Track historical performance
• Demonstrate organizational
preparedness
• Generate audit/compliance reports
ASSESS
Quantify Potential
Impact, Support Privacy
Impact Assessments
• Track events
• Scope regulatory requirements
• Calculate $ exposure
• Notify team
• Generate Impact Assessments
MANAGE
Easily Generate Detailed
Incident Response Plans
• Escalate to complete IR plan
• Oversee the complete plan
• Assign tasks: who/what/when
• Notify regulators and clients
• Monitor progress to completion
20. Page 20
IR Is More Than Just Forensics
Forensics
Security Tools
Threat Intelligence
Partners / Providers
Law Enforcement
IT / Security Controls
Service Providers
Law Enforcement
Partner
Perpetrator(s)
Internal Staff
Customers
Detection
Investigation
IT / Security Controls
Service Providers
Law Enforcement
Partners
Internal Staff
Response
IR
Team
29. One Alewife Center, Suite 450
Cambridge, MA 02140
PHONE 617.206.3900
WWW.CO3SYS.COM
Andrew Jaquith
Chief Technology Officer & SVP Cloud Strategy
SilverSky
ajaquith@silversky.com
www.silversky.com
“One of the most important startups in security…”
BUSINESS INSIDER – JANUARY 2013
“One of the hottest products at RSA…”
NETWORK WORLD – FEBRUARY 2013
“an invaluable weapon when responding to
security incidents.”
GOVERNMENT COMPUTER NEWS
“Co3 Systems makes the process of planning
for a nightmare scenario as painless as
possible, making it an Editors’ Choice.”
PC MAGAZINE, EDITOR’S CHOICE
Editor's Notes
http://en.wikipedia.org/wiki/File:Shea_Smith-edit1.jpgThis image or file is a work of a U.S. Air Force Airman or employee, taken or made during the course of the person's official duties. As a work of the U.S. federal government, the image or file is in the public domain.
http://en.wikipedia.org/wiki/File:2006_Pro_Bowl_tackle.jpgThis image is in the public domain because it contains materials that originally came from the United States Marine Corps. As a work of the U.S. federal government, the image is in the public domain.