2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...APNIC
APNIC Senior Security Specialist Adli Wahid presents on increasing cybersecurity preparedness for large-scale sporting events at the 2021 CNCERT International Partnership Conference, held online on 16 August 2021.
This in-depth understanding of your cyber terrain informs your defense, allowing you to lay traps and pitfalls for would-be attackers. Knowing what attackers are looking for and how they are going to try to move throughout your network provides you with a key advantage. With this knowledge, Deception technology becomes a powerful weapon in your defensive arsenal.
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
APNIC Senior Security Specialist Adli Wahid provides some useful findings of lessons learned from security incidents at the UMS Cybersecurity Awareness Seminar, held online on 25 October 2021.
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificAPNIC
APNIC Foundation Program Director Sylvia Cadena participated at the Stockholm Internet Forum from 15 to 18 May 2017 and presented an overview of APNIC's support for CERT development in the region to help ensure the Internet remains secure and stable.
While network security teams are starting to shift their focus from perimeter defense to post-breach detection, traditional detection tools fall short of the mark, either generating far too many false-positives or altogether failing to detect attacks in real time.
Modern Deception, which Gartner recently rated as a top security technology, changes the game. The goal of a deception defense is to lure attackers to ‘decoy’ assets that look and feel real but aren’t. By engaging with a deception environment that automatically updates to match the real network or cloud environment, attackers or malicious insiders essentially reveal themselves to the organization without knowing it.
Learn how your organization can use deception defenses to ensure an efficient and strong post-breach defense.
2021 CNCERT International Partnership Conference: Increasing cybersecurity pr...APNIC
APNIC Senior Security Specialist Adli Wahid presents on increasing cybersecurity preparedness for large-scale sporting events at the 2021 CNCERT International Partnership Conference, held online on 16 August 2021.
This in-depth understanding of your cyber terrain informs your defense, allowing you to lay traps and pitfalls for would-be attackers. Knowing what attackers are looking for and how they are going to try to move throughout your network provides you with a key advantage. With this knowledge, Deception technology becomes a powerful weapon in your defensive arsenal.
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
APNIC Senior Security Specialist Adli Wahid provides some useful findings of lessons learned from security incidents at the UMS Cybersecurity Awareness Seminar, held online on 25 October 2021.
Stockholm Internet Forum 2017: Development of CERTs in the Asia PacificAPNIC
APNIC Foundation Program Director Sylvia Cadena participated at the Stockholm Internet Forum from 15 to 18 May 2017 and presented an overview of APNIC's support for CERT development in the region to help ensure the Internet remains secure and stable.
While network security teams are starting to shift their focus from perimeter defense to post-breach detection, traditional detection tools fall short of the mark, either generating far too many false-positives or altogether failing to detect attacks in real time.
Modern Deception, which Gartner recently rated as a top security technology, changes the game. The goal of a deception defense is to lure attackers to ‘decoy’ assets that look and feel real but aren’t. By engaging with a deception environment that automatically updates to match the real network or cloud environment, attackers or malicious insiders essentially reveal themselves to the organization without knowing it.
Learn how your organization can use deception defenses to ensure an efficient and strong post-breach defense.
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryCR Group
The novel coronavirus (COVID-19) has changed the way human think and live. COVID-19 has forced people to embrace new practices such as social distancing and remote working.
Watch this recorded webinar to hear SANS Principal Instructor, Alissa Torres, Fidelis Chief Scientist, Dr. Abdul Rahman and Cyber Security expert, Tom Clare, discuss how organizations can evolve their approach to the fundamentals of a defensible security architecture toward a more robust strategy that is strong enough to defend organizations from the threats of today, and the zero-day threats of tomorrow.
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
When Edward Snowden leaked classified information to the mainstream media, it brought the dangers posed by insider threats to the forefront of public consciousness, and not without reason. Today’s agencies are drowning in fears surrounding sophisticated cyber-attacks but perhaps the most concerning type of attack out there – the insider threat. According to Forrester, abuse by malicious insiders makes up 25% of data breaches. Learn about the best practices and technologies you should be implementing now to avoid becoming the next victim of a high-profile attack.
- Become aware of the different types of insider threats, including their motives and methods of attack
- Understand why conventional security tools like firewalls, antivirus and IDS/IPS are powerless in the face of the insider threat
- Gain clarity on the various technologies, policies and best practices that should be put in place to help detect and thwart insider threats
- Discover how network logs, particularly NetFlow, can be used to cost-effectively monitor for suspicious insider behaviors that could indicate an attack
- Know about emerging attack methods such as muleware that could further escalate insider threats in the coming years
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield, Inc.
NormShield is at the forefront of orchestrated cyber security operations and reporting, a transformative new category that Gartner calls SOAR. The NormShield cloud platform automates finding vulnerabilities, prioritizes them and provides actionable intelligence. A key differentiation is the company’s combination of advanced automation and human intelligence for reliability unparalleled in the industry. NormShield CISOs receive letter-grade risk scorecards. Their teams manage risk, not data. The results are measurable: informed decisions and swift action that reduces risk as never before possible and at an affordable price.
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
This on-demand webcast shows you how you shield your organization from such attacks – as well as how to respond if ransomware does penetrate your organization. Baseline Technologies’ Mike Crowley gives you the inside track on how ransomware works and how to lower your risk of ransomware attacks.
Harness the power of security analytics to get continuous visibility of your attack surface, eliminate attack vectors and respond to security threats and incidents in minutes.
Harness the power of security analytics to get continuous visibility of your attack surface, eliminate attack vectors and respond to security threats and incidents in minutes.
Endpoint and Server: The belt and braces anti-malware strategyStephen Cobb
Slides prepared for the Federal IT expo: FOSE. Should help employees and managers understand why anti-malware protection is needed at all endpoints and on all serves.
3rd Party Cyber Security: Manage your ecosystem!NormShield, Inc.
Your partners, vendors and other key 3rd parties have access to your sensitive networks and data. How confident are you that they're managing their cyber security? This short presentation looks at why you need to view information security as an ecosystem and how you can get intelligence on the big picture.
Defense in Depth: Implementing a Layered Privileged Password Security Strategy BeyondTrust
Tune in to the full webinar recording here: https://www.beyondtrust.com/resources/webinar/defense-depth-implementing-layered-privileged-password-security-strategy/?access_code=eb6de71b465f16507cadfb2347a9d98f
In this presentation from the live webinar of security expert and TechVangelist Founder/Chief, Nick Cavalancia explores how to apply the defense-in-depth, layered security approach to enterprise password management. Also included in this webinar is an overview of BeyondTrust's PowerBroker Password Safe, the leading solution for enterprise password management.
Join Fidelis Threat Intelligence experts, Danny Pickens and Aamil Karimi for a live webinar as they present their findings from a series of data sets and dive into the implications for enterprise organizations, breaking down how security experts can apply threat intelligence insight to their real world defensible strategies.
Deploying datacenters with Puppet - PuppetCamp Europe 2010Puppet
Rafael Brito at PuppetCamp Europe 2010
"Deploying datacenters with Puppet."
Follow along with the Video at: https://www.youtube.com/watch?v=3DaWrKQ82j4
Puppet Camp Europe 2010: Ghent, Belgium
May 27-28, 2010
How COVID-19 Changed The Cyber Security Worldwide? — Cyberroot Risk AdvisoryCR Group
The novel coronavirus (COVID-19) has changed the way human think and live. COVID-19 has forced people to embrace new practices such as social distancing and remote working.
Watch this recorded webinar to hear SANS Principal Instructor, Alissa Torres, Fidelis Chief Scientist, Dr. Abdul Rahman and Cyber Security expert, Tom Clare, discuss how organizations can evolve their approach to the fundamentals of a defensible security architecture toward a more robust strategy that is strong enough to defend organizations from the threats of today, and the zero-day threats of tomorrow.
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
When Edward Snowden leaked classified information to the mainstream media, it brought the dangers posed by insider threats to the forefront of public consciousness, and not without reason. Today’s agencies are drowning in fears surrounding sophisticated cyber-attacks but perhaps the most concerning type of attack out there – the insider threat. According to Forrester, abuse by malicious insiders makes up 25% of data breaches. Learn about the best practices and technologies you should be implementing now to avoid becoming the next victim of a high-profile attack.
- Become aware of the different types of insider threats, including their motives and methods of attack
- Understand why conventional security tools like firewalls, antivirus and IDS/IPS are powerless in the face of the insider threat
- Gain clarity on the various technologies, policies and best practices that should be put in place to help detect and thwart insider threats
- Discover how network logs, particularly NetFlow, can be used to cost-effectively monitor for suspicious insider behaviors that could indicate an attack
- Know about emerging attack methods such as muleware that could further escalate insider threats in the coming years
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield, Inc.
NormShield is at the forefront of orchestrated cyber security operations and reporting, a transformative new category that Gartner calls SOAR. The NormShield cloud platform automates finding vulnerabilities, prioritizes them and provides actionable intelligence. A key differentiation is the company’s combination of advanced automation and human intelligence for reliability unparalleled in the industry. NormShield CISOs receive letter-grade risk scorecards. Their teams manage risk, not data. The results are measurable: informed decisions and swift action that reduces risk as never before possible and at an affordable price.
The Cost of Doing Nothing: A Ransomware Backup StoryQuest
This on-demand webcast shows you how you shield your organization from such attacks – as well as how to respond if ransomware does penetrate your organization. Baseline Technologies’ Mike Crowley gives you the inside track on how ransomware works and how to lower your risk of ransomware attacks.
Harness the power of security analytics to get continuous visibility of your attack surface, eliminate attack vectors and respond to security threats and incidents in minutes.
Harness the power of security analytics to get continuous visibility of your attack surface, eliminate attack vectors and respond to security threats and incidents in minutes.
Endpoint and Server: The belt and braces anti-malware strategyStephen Cobb
Slides prepared for the Federal IT expo: FOSE. Should help employees and managers understand why anti-malware protection is needed at all endpoints and on all serves.
3rd Party Cyber Security: Manage your ecosystem!NormShield, Inc.
Your partners, vendors and other key 3rd parties have access to your sensitive networks and data. How confident are you that they're managing their cyber security? This short presentation looks at why you need to view information security as an ecosystem and how you can get intelligence on the big picture.
Defense in Depth: Implementing a Layered Privileged Password Security Strategy BeyondTrust
Tune in to the full webinar recording here: https://www.beyondtrust.com/resources/webinar/defense-depth-implementing-layered-privileged-password-security-strategy/?access_code=eb6de71b465f16507cadfb2347a9d98f
In this presentation from the live webinar of security expert and TechVangelist Founder/Chief, Nick Cavalancia explores how to apply the defense-in-depth, layered security approach to enterprise password management. Also included in this webinar is an overview of BeyondTrust's PowerBroker Password Safe, the leading solution for enterprise password management.
Join Fidelis Threat Intelligence experts, Danny Pickens and Aamil Karimi for a live webinar as they present their findings from a series of data sets and dive into the implications for enterprise organizations, breaking down how security experts can apply threat intelligence insight to their real world defensible strategies.
Deploying datacenters with Puppet - PuppetCamp Europe 2010Puppet
Rafael Brito at PuppetCamp Europe 2010
"Deploying datacenters with Puppet."
Follow along with the Video at: https://www.youtube.com/watch?v=3DaWrKQ82j4
Puppet Camp Europe 2010: Ghent, Belgium
May 27-28, 2010
Attend to learn from our experts about ways to improve you IT Operational Intelligence by using Splunk for troubleshooting, monitoring and service-level visibility. In this hands-on session we will cover recommended approaches for end-to-end troubleshooting and monitoring across applications, OSes, and devices to resolve problems faster, reduce downtime and improve user satisfaction and customer retention. Topics will include: monitoring critical services, using commonly deployed apps and TAs to gather data for IT infrastructure uses, and using of pre-made dashboard panels to quickly build dashboards for monitoring your environment.
This presentation introduces an innovative new service provided by Triumvirate Environmental: Red2Green. You will learn about the common issues associated with medical waste disposal today, how the plastic in your RMW can actually be recycled, and what the service adoption and benefits consist of.
Some people use the cloud. Others build one. This talk will be about building your own enteprise cloud.
When running a cloud 3 things are important: scaling, easy (cost effective) maintenance, and stability. These 3 points are very closely related through one subject: automation. Thanks to the easy automation tools like pxe boot (for booting a new setup) and puppet (for configuring a new system) setting up a new server was never this easy. But how can we use these tools to create a scalable infrastructure that is cost effective, stable and easy to maintain?
In this talk you will learn about how to design a scalable secure architecture and how to make the right tools work for you without going into to much detail.
Presented at the IT-faggruppen interest group of the The Danish Librarian (Workers) Union: http://blog.it-faggruppen.dk in Copenhagen, Denmark on March 15, 2010.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Amazon Web Services
Stephen Schmidt, AWS CISO and VP of Security Engineering, provides an overview of innovations in cloud security and the importance of security as an enabler for innovation in enterprises, but particularly in government and other highly regulated industries and segments.
Hard Lessons Learned from defending Adobe Creative Cloud on AWS! Insight into implementing a solid Security Architecture based on a mutual conversation between DevOps and SecOps!
Ransomware is the number one IT security challenge facing asset managers today, with resource-limited small and mid-size businesses the most likely targets. Don’t let malware attackers find and encrypt your most important data.
This webinar will explore the ways in which cybercriminals are exploiting a variety of threat vectors, including email, network traffic, user behavior, and application traffic. Don’t miss out on this important program. Financial institutions without a comprehensive strategy that secures all vectors are almost certain to become a victim. CIOs, web teams, data teams, and other decision makers within asset management and financial services will benefit from the following educational topics:
- Understanding the types of ransomware, malicious software, and phishing attacks
- Assessing the potential risks posed to financial firms
- Providing digital opportunities to shareholders while protecting data integrity
Learn how to overcome security challenges, such as: identity theft, spoofed transactions, DDoS business disruption, criminal extortion and more. You'll learn how a security strategy promotes confidence in the cloud.
ICANN 50: What’s New with the Global Domains DivisionICANN
This session provided an overview of the Global Domains Division (GDD) including its mission, structure and services. The overview was followed by a high-level update on the New gTLD Program, a wide range of domain name industry services and other high-interest topics. Time was allotted for questions and answers at the end of the session.
Yi-Lang Tsai - Cyber Security, Threat Hunting and Defence Challenge in Taiwan...REVULN
TWCSIRT is a full member of FIRST and mainly focuses on the protection of NARLabs, TANet and TWAREN. We are defense cyber-attack from internet and according to government policy to handling incident every day. I am a research fellow with National Center for High-performance Computing and lead cyber security team to operation security operation center to handling incident in Taiwan Academic Network.
In our research project from government, we are deployed the biggest honeynet in Taiwan and used over 6000 IP address to detection malicious network attack come from internet.
We have published our malware knowledge base to sharing malware samples and reports for many researchers, students, research center and sharing our data set for deep tracking about cyber security.
There are many new types of cyber-attack that’s is include ransomware, website mining, DDoS and hybrid malicious attack.
Main Points:
- What’s TWCSIRT Mission and Scope
- How to coordinate in National level with ISAC, CERT and SOC
- Cyber-attack and threat hunting in Taiwan Academic Network
- How to develop cyber security platform for incident handling
- How to do red team and blue team training by CDX
Save Your Network – Protecting Manufacturing Data from Deadly BreachesLancope, Inc.
As recent events have proven, manufacturing organizations are especially vulnerable to cyber-attacks due to the amount of valuable data they maintain. With advanced attacks becoming so ubiquitous, how can manufacturing organizations protect their data and avoid becoming the next high-profile victim in the headlines?
The answer lies in network visibility. Manufacturing providers and others are invited to join this complimentary webinar to learn how to:
- Cost-effectively transform their network into a sensor grid for detecting sophisticated attacks
- Quickly uncover suspicious behaviors associated with zero-day attacks, APTs, insider threats and other risks that frequently evade conventional defenses
- Protect their reputation by thwarting attacks before they lead to devastating data loss
ICANN Expected Standards of Behavior | FrenchICANN
Those who take part in ICANN's multistakeholder process, including Board, staff and all those involved in Supporting Organization and Advisory Committee councils undertake to...
Those who take part in ICANN's multistakeholder process, including Board, staff and all those involved in Supporting Organization and Advisory Committee councils undertake to...
ICANN Expected Standards of Behavior | RussianICANN
Those who take part in ICANN's multistakeholder process, including Board, staff and all those involved in Supporting Organization and Advisory Committee councils undertake to...
ICANN Expected Standards of Behavior | ArabicICANN
Those who take part in ICANN's multistakeholder process, including Board, staff and all those involved in Supporting Organization and Advisory Committee councils undertake to...
ICANN Expected Standards of Behavior | ChineseICANN
Those who take part in ICANN's multistakeholder process, including Board, staff and all those involved in Supporting Organization and Advisory Committee councils undertake to...
ICANN Expected Standards of Behavior | SpanishICANN
Those who take part in ICANN's multistakeholder process, including Board, staff and all those involved in Supporting Organization and Advisory Committee councils undertake to...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
6. TextTextText
#ICANN50
Our Remit
• Responsible for observing, assessing and improving
the SSR of the Internet’s Identifier Systems in close
collaboration with other ICANN departments and the
community at large.
• Remit achieved through a range of activities including:
o Risk awareness and preparedness
o Measurement and analysis of identifier systems behaviors or
performance
o Cooperative outreach that emphasizes coordination, capability
building and knowledge transfer
9. TextTextText
#ICANN50
Identifier Systems Threat Awareness
• Active (24x7) engagement with
global actors who monitor DNS
health or identify imminent threats
• Exchange of threat intelligence
relating to security events of global
nature involving identifier systems
• Participation in response to threats
or attacks against identifier systems
Threat Awareness
and Response
Threat Intelligence
• Trust networks
Coordinated
Response
• Vulnerability
Disclosure
• Facilitation
11. TextTextText
#ICANN50
Identifier SSR Analytics
• Develop metrics and analytics for
identifier systems, e.g.,
o Root system measurements, analysis
o Analysis of DNS or registration abuse
or misuse
o Creative uses of DNS data
Identifier SSR
Analytics
Metrics
• Root System
analytics
• Incidents
• Abuse/Misuse
13. TextTextText
#ICANN50
Trust-based Collaboration
• Global Cybersecurity cooperation
o Coordinate engagement and cybersecurity
through ICANN Global Stakeholder
Engagement
• Global Security & Operations
o Daily interaction on DNS abuse/misuse
matters with Public Safety Community
o Cooperation with DNS research activities
• Identify policies that have unintended
consequences that create opportunities
for misuse of DNS or registration
services
Trust-based
Collaboration
Global SecOps
• AntiPhishing
• Antispam
• Anticrime
• Operations
Research
Global CyberSec
• CCI
• OECD
• Many others
15. TextTextText
#ICANN50
Capability Building
• DNS Training
o Security, operations, and DNSSEC
deployment training for TLD registry
operators
o Boot camp for ICANN staff
o Information gathering to identify DNS
abuse/misuse
o Delivered by contracted parties, ICANN
staff (digital delivery under study)
• Knowledge Transfer
o Exchange of information gathering or
investigating techniques
Capability Building
DNS Training
• Security
• OAM
• Abuse/Misuse
Knowledge
Transfer
• Europol
• Interpol
• RIRs
17. TextTextText
#ICANN50
Want Training at Your Event?
• Speak to your ICANN Regional VP or SSR staff
for a full list of available training – the sooner
the better!
o Even if you don’t know exact dates, start the
conversation and let’s work on getting training at your
event
o Allows for better budgeting and planning for SSR
resources
18. TextTextText
#ICANN50
What Are We Missing?
What kinds of training is important to your
community that ICANN isn’t offering right now?
• SSR is working on a Gap Analysis to evaluate
current courses and trying to determine what we’re
missing
• Find Steve Conte this week and/or send and email
to steve.conte@icann.org
We want to know what you think!