Past Meetings

Accelerating Security Response - How to Outpace the Noise

Tuesday, November 15, 2016 - 11:30am

Over 90% of security executives reported that manual and informal processes between Security & IT hindered their security incident response capabilities.  Come join your peers to discuss security incident response best practices and how response teams are optimizing their response practices to compress the time to identify and contain security incidents and vulnerabilities.

Privileged Accounts - Best Practices and Practical (phased) Approach for Success

Tuesday, October 18, 2016 - 11:30am

Most organizations will agree that privileged accounts and access are one of the most challenging and risky parts of all of IT Security still unmet even in mature security programs.  Privileged Access is not a new problem but rather a very old problem which many organizations struggle to fix based on complexity, legacy access and unknown impact of change. Many reports such as M-Trends and Verizon, highlight that these same privileged accounts, at some point in the attack cycle, are almost universally leveraged and misused in breaches around the world in all verticals.

Eliminating Operational Blindspots with Incident Exchange and Collaboration

Tuesday, September 20, 2016 - 11:30am
As cyber threats continue to outpace capabilities of security operators, companies are facing the reality of balancing their limited cyber resources with expanding digital footprints. Today’s enterprise security model is based on ever-evolving endpoint security and monitoring technologies that require security teams to sift through a myriad of data and alerts. While automated threat intelligence and security analytics solutions continue to come of age and most certainly have their place, incident information exchange and cross-organizational sharing seems to be stuck in 20th century. A growing number of security professionals agree that the most under utilized information in cyber security today is those about attacks that have already happened or are in progress. Outside of ad hoc efforts, companies rarely exchange this critical information with each other early enough for it to matter.

Known or Owned: Understanding Indicators of Compromise

Tuesday, August 16, 2016 - 11:30am

When it comes to detecting breaches, time is of the essence. The longer a threat actor persists in your environment, the more likely they are to establish a foothold, and walk away with your data. Many attackers will follow a similar attack methodology from target to target, or for every attack they carry out for years. This talk will discuss common indicators of compromise, the value of your own threat intelligence, and how you can spot the unusual behavior that your AV, firewall, or IDS can't.

The Art and Science of Deception

Tuesday, July 19, 2016 - 11:30am

Prevention, detection, and response are the core pillars for any company’s cybersecurity infrastructure. Always prevent what you can, but also have a solid plan for the real-time detection of an inside-the-network attacker and have the tools in place for post-compromise investigations and remediation. Deception is quickly becoming recognized as the most effective and efficient approach to detecting targeted, stolen credential, and ransomware attacks.