Security and fraud investigations often require sifting through many logs and transactions, yet typical search and dashboard tools feel closer to 1985 technology than 2045. This talk shares two technologies Graphistry has been developing to supercharge the investigation process. First, we show how GPU cloud streaming scales visual analytics, and especially so for link analysis.
Wednesday, August 29
St. John's Bar & Grill
510 Lawrence Expy #110, Sunnyvale, CA 94085, USA
Meet fellow chapter members
Please refer to the following link for details regarding SecureWorld Bay Area.
Brent Feller, Senior Solutions Engineer, eSentire
Brent is a security professional with over 15 years of experience in the field. Having worked with Lockheed Martin, McAfee, MBS and eSentire, Brent has a well-rounded background ranging from physical security to cyber hunting and detection. Brent has also consulted several companies and provided recommendations on cybersecurity best practices. He delivers real world experience and knowledge of defending and protecting your assets. Brent is a Cisco Security Specialist and a CISSP who has defended on the front lines against malware and ransomware threats.
Generating SSH keys is free, but poor SSH key practices expose businesses to costly risk. It takes just one SSH key for a cybercriminal to access an organization’s network and pivot to gain further access to the most sensitive systems and data.
The Silicon Valley Chapter ISSA will not be having a meeting in April due to the RSA Conference hosted in San Francisco
The Bay Area ISSA RSA Mixer 2018
Hello, ISSA friends and colleagues! We have managed to reserve a private room at Natoma Cabana (www.natomacabana.com) with seating limited to 40. Please RSVP at your earliest convenience!
Perfect protection is impossible. By now we all know that we can’t just buy one more silver bullet to fix our problems. Every organization manages something like 20 distinct security technologies, with enough staff and time to operate 5 of them well. We can’t just hire more professionals – the talent pool has been drained. So we have little choice – we need to get our existing security investments to work together. This talk will highlight the need for, and then show real examples of, inter-product and inter-vendor integrations that can automate workflows and produce tangible operation
Business leaders need to communicate powerfully under pressure, and nothing else raises the stakes (or the heart rate!) quite like public speaking. Whether you’re presenting to employees, board members, or external stakeholders, executive presentation coach Jennifer Hennings will help you speak with confidence when it matters most.
With all good things comes the dark -side. As the learning period has become shorter, and accessibility for everyone, cybercriminals, have also being leveraging to improve the effectiveness of their campaigns. Cyberthreat landscape is reaching an inflection point in the character of cyberattacks we are seeing, driven by structural changes in attacker platforms, changing motivations, ability to make profit and the changing attack surface.