Generating SSH keys is free, but poor SSH key practices expose businesses to costly risk. It takes just one SSH key for a cybercriminal to access an organization’s network and pivot to gain further access to the most sensitive systems and data.
The Silicon Valley Chapter ISSA will not be having a meeting in April due to the RSA Conference hosted in San Francisco
The Bay Area ISSA RSA Mixer 2018
Hello, ISSA friends and colleagues! We have managed to reserve a private room at Natoma Cabana (www.natomacabana.com) with seating limited to 40. Please RSVP at your earliest convenience!
Perfect protection is impossible. By now we all know that we can’t just buy one more silver bullet to fix our problems. Every organization manages something like 20 distinct security technologies, with enough staff and time to operate 5 of them well. We can’t just hire more professionals – the talent pool has been drained. So we have little choice – we need to get our existing security investments to work together. This talk will highlight the need for, and then show real examples of, inter-product and inter-vendor integrations that can automate workflows and produce tangible operation
Business leaders need to communicate powerfully under pressure, and nothing else raises the stakes (or the heart rate!) quite like public speaking. Whether you’re presenting to employees, board members, or external stakeholders, executive presentation coach Jennifer Hennings will help you speak with confidence when it matters most.
Let's celebrate with friends and colleagues with a docent-led tour at the Computer History Museum, followed by a three-course dinner at Cascal.
With all good things comes the dark -side. As the learning period has become shorter, and accessibility for everyone, cybercriminals, have also being leveraging to improve the effectiveness of their campaigns. Cyberthreat landscape is reaching an inflection point in the character of cyberattacks we are seeing, driven by structural changes in attacker platforms, changing motivations, ability to make profit and the changing attack surface.
For a technology to be “exponential,” the power and/or speed doubles each year, and/or the cost drops by half.
During May 2017, McAfee sponsored research on the approaches and best practices of threat hunters and Security Operations Centers (SOCs). Slicing the global research by maturity level revealed that leading SOCs use the same tools in very different ways to achieve much better results than beginners. A subset of this research was shared in a report released at Black Hat, providing just the highlights. However, the best practices of today’s leaders foreshadow tomorrow’s mainstream SOC, and the details can help practitioners and vendors chart a course through this fast-changing space.
Joint mixer by the San Francisco and Silicon Valley ISSA Chapters
Please Join Us for a Summer Mixer of Security Professionals from the Silicon Valley and San Francisco Chapters of ISSA. Beverages and Appetizers will be provided by local chapters and Accellion, our corporate sponsor.