Perfect protection is impossible. By now we all know that we can’t just buy one more silver bullet to fix our problems. Every organization manages something like 20 distinct security technologies, with enough staff and time to operate 5 of them well. We can’t just hire more professionals – the talent pool has been drained. So we have little choice – we need to get our existing security investments to work together. This talk will highlight the need for, and then show real examples of, inter-product and inter-vendor integrations that can automate workflows and produce tangible operation
Business leaders need to communicate powerfully under pressure, and nothing else raises the stakes (or the heart rate!) quite like public speaking. Whether you’re presenting to employees, board members, or external stakeholders, executive presentation coach Jennifer Hennings will help you speak with confidence when it matters most.
Let's celebrate with friends and colleagues with a docent-led tour at the Computer History Museum, followed by a three-course dinner at Cascal.
With all good things comes the dark -side. As the learning period has become shorter, and accessibility for everyone, cybercriminals, have also being leveraging to improve the effectiveness of their campaigns. Cyberthreat landscape is reaching an inflection point in the character of cyberattacks we are seeing, driven by structural changes in attacker platforms, changing motivations, ability to make profit and the changing attack surface.
For a technology to be “exponential,” the power and/or speed doubles each year, and/or the cost drops by half.
During May 2017, McAfee sponsored research on the approaches and best practices of threat hunters and Security Operations Centers (SOCs). Slicing the global research by maturity level revealed that leading SOCs use the same tools in very different ways to achieve much better results than beginners. A subset of this research was shared in a report released at Black Hat, providing just the highlights. However, the best practices of today’s leaders foreshadow tomorrow’s mainstream SOC, and the details can help practitioners and vendors chart a course through this fast-changing space.
Joint mixer by the San Francisco and Silicon Valley ISSA Chapters
Please Join Us for a Summer Mixer of Security Professionals from the Silicon Valley and San Francisco Chapters of ISSA. Beverages and Appetizers will be provided by local chapters and Accellion, our corporate sponsor.
Modernize your endpoint security – No silver bullets , you need an Arsenal !
The threat landscape is evolving at furious pace. One sinister attack after the other has wreaked havoc across businesses , governments , banks , hospitals & utilities…Is the worst over or is there more to come ?
Join Deepak Kolingivadi , Group Product Manager at Bitdefender to learn about
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
Detect: quickly and easily detect and isolate attacks
Respond: laser in on critical alerts and address them with simple to understand security intelligence
Due to the Cornerstones of Trust conference, there will be no meeting in June.
The Cornerstones of Trust conference helps security leaders and security practitioners evaluate trends and develop responses to the challenges like increasing cost pressures, rising compliance complexity, changing threat landscape and emerging technology disruptors.
CORNERSTONES OF TRUST MISSION