With all good things comes the dark -side. As the learning period has become shorter, and accessibility for everyone, cybercriminals, have also being leveraging to improve the effectiveness of their campaigns. Cyberthreat landscape is reaching an inflection point in the character of cyberattacks we are seeing, driven by structural changes in attacker platforms, changing motivations, ability to make profit and the changing attack surface.
For a technology to be “exponential,” the power and/or speed doubles each year, and/or the cost drops by half.
During May 2017, McAfee sponsored research on the approaches and best practices of threat hunters and Security Operations Centers (SOCs). Slicing the global research by maturity level revealed that leading SOCs use the same tools in very different ways to achieve much better results than beginners. A subset of this research was shared in a report released at Black Hat, providing just the highlights. However, the best practices of today’s leaders foreshadow tomorrow’s mainstream SOC, and the details can help practitioners and vendors chart a course through this fast-changing space.
Joint mixer by the San Francisco and Silicon Valley ISSA Chapters
Please Join Us for a Summer Mixer of Security Professionals from the Silicon Valley and San Francisco Chapters of ISSA. Beverages and Appetizers will be provided by local chapters and Accellion, our corporate sponsor.
Modernize your endpoint security – No silver bullets , you need an Arsenal !
The threat landscape is evolving at furious pace. One sinister attack after the other has wreaked havoc across businesses , governments , banks , hospitals & utilities…Is the worst over or is there more to come ?
Join Deepak Kolingivadi , Group Product Manager at Bitdefender to learn about
From ransomware to rootkits, old school security cannot keep pace with today’s advanced attacks. Learn why these threats work and how to protect against them.
Prevent: stop ransomware before it strikes by addressing the attack methods of attacks used by advanced persistent threats
Detect: quickly and easily detect and isolate attacks
Respond: laser in on critical alerts and address them with simple to understand security intelligence
Due to the Cornerstones of Trust conference, there will be no meeting in June.
The Cornerstones of Trust conference helps security leaders and security practitioners evaluate trends and develop responses to the challenges like increasing cost pressures, rising compliance complexity, changing threat landscape and emerging technology disruptors.
CORNERSTONES OF TRUST MISSION
Modern elastic cloud infrastructure is fundamentally breaking traditional security approaches. Public cloud has no natural perimeter and network segmentation leaving individual cloud servers exposed. In private cloud, malicious East-West traffic inside the network is a serious threat. As new workloads are added and retired dynamically, change control is difficult, and updating granular firewall rules and security policies becomes a risky, manual process. Join us and learn the 6 Critical Criteria to secure your public, private or hybrid cloud – on-demand, anywhere, at any scale.
DDoS, password policies, and spam: it's 2017 and they're still a thing, and still annoying. We'll be focusing on DDoS, examining what constitutes an effective attack today and what the industry is doing about it. Spam has by and large been relegated to an annoyance; will we ever get to that point with DDoS? Can we do better and actually eliminate some attack types such as volumetric? We'll take a closer look at some of the industry-wide collaboration that is underway to make DDoS as mundane as spam and as effective as Nigerian 419 scams.
Additional topics of discussion:
New Time, Location
|Date:||Tuesday, March 7, 2017|
|Time:||4:30-5:00 PM: Registration|
|5:00-6:15 PM Chapter meeting|
|6:15-7 PM Networking (appetizers & drinks)|
|7:15 PM: Actionable Detects: Blue Team Cyber Defense Tactics – Seth Misenar|
|Venue:||Crowne Plaza San Jose Silicon Valley
777 Bellew Drive
Milipitas, CA 95035