We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Webinars 



August 13, 2018 | Threat Detection and Hunt Teaming
By John Strand, IANS Faculty,
     Jake Williams, IANS Faculty

 Hacking Back: A Double-Edged Sword

As online attacks continue to grow in frequency and ferocity, some in the security community are making the argument that the bad guys deserve a taste of their own medicine. Enter the notion of hacking back. The concept raises ethical questions, but some experts believe there are valid techniques that can and should be used to defend organizations. In this webinar, IANS Faculty John Strand and Jake Williams explore those techniques, address the ethical questions and help the audience find a happy medium.

Read More »


July 17, 2018 | Authentication
By Michael Pinch, IANS Faculty

 Blockchain as an Infosec Strength and Weakness

As crypto currency trading grows more popular, people are hearing a lot about how the Blockchain is key to making it all work. Meanwhile, security experts are talking more about the technology as a defensive asset and, if abused, a dangerous threat vector. In this webinar, IANS Faculty Michael Pinch walks through how Blockchain came about, how it works and how it’s central to managing digital currency transactions. He also reviews how it can be used to bolster security, how the bad guys can exploit it to launch attacks, and what organizations can do to protect themselves.

Read More »


June 15, 2018 | Regulations & Legislation
By Mark Clancy, IANS Faculty

 Tackling the New York State Department of Financial Services (NYDFS) Cybersecurity Requirements

While the bulk of the new NYDFS cybersecurity requirements took effect in March, rules on audit logging, application security, data retention and risk based monitoring for staff with access to nonpublic information come into effect this September. In this webinar, IANS Faculty Mark Clancy addresses some of the major pain points such as data-at-rest encryption, continuous monitoring, and notification of “events." He also details strategies for complying with the NYDFS requirements right now, in the coming months, and looking ahead to the implementation date for third parties.

Read More »


May 14, 2018 | Threat Detection and Hunt Teaming
By Dave Kennedy, IANS Faculty

 Threat Hunting: Why Proactive Matters

Attackers keep evolving their tactics, making it increasingly difficult for traditional forensic techniques to keep up. It’s time to get proactive – and that’s where threat hunting comes into play. In this webinar, IANS Faculty Dave Kennedy explains why threat hunting is important, and how hunt teams can directly increase the overall maturity (and ROI) of your monitoring and detection capabilities. He also details specific methods for detecting abnormal patterns of behavior and other tactics hunters can use to hone their craft.

Read More »


April 13, 2018 | Penetration Testing and Red Teaming
By Kevin Johnson, IANS Faculty

 I Am Not a Robot: Manual Pen-Testing Tips and Tricks

When it comes to web app penetration testing, automation can only get you so far. In this webinar, IANS Faculty Kevin Johnson explores how using manual testing techniques can augment the automation many DevOps shops use for security testing. In addition to providing examples of manual attacks used against modern sites, he offers tips for implementing this type of testing to ensure optimal web app security.

Read More »


March 21, 2018 | Authentication
By James Tarala, IANS Faculty

 An Enterprise Guide to Practical MFA

Multifactor authentication (MFA) provides a more robust solution than simple passwords, and while the latest offerings are more user-friendly and easier to deploy than ever before, selecting the right implementation and feature set is no easy feat. In this webinar, IANS Faculty James Tarala details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »


February 16, 2018 | Threat Intelligence and Modeling
By Adam Shostack, IANS Faculty

 Comprehensive, Structured and Systematic: Engineering for Security

The hardest part of security is going from random discovery of problems as you create new features to a systematic, comprehensive and structured approach to finding problems early. In this webinar, IANS Faculty Adam Shostack identifies ways to bring security engineering to the very earliest parts of product or service cycles, align with agile practices and reap the benefits that come from such efforts: faster, more predictable and more secure launches.

Read More »


February 5, 2018 | Regulations & Legislation
By George Gerchow, IANS Faculty

 5 Practical Steps to GDPR Success

With all the noise, panic and questions about the EU’s new General Data Protection Regulation (GDPR), it’s difficult to discern the right mix of policies, procedures and technologies to ensure compliance. In this webinar, IANS Faculty George Gerchow helps you prioritize the practical steps you can take today – and the tougher steps you can safely put off for tomorrow – to ensure your organization is fully prepared when the ruling comes into full force this May.

Read More »


January 10, 2018 | Malware and Advanced Threats
By Aaron Turner, IANS Faculty

 Information Security Trends for 2018

In 2017, we saw some of our most valued controls undermined and witnessed security incidents impacting businesses around the world.  What will 2018 bring? In this report and webinar, IANS Faculty Aaron Turner examines the major trends in store for IT security professionals in the coming year. From the new incidents we need to prepare for to the investments we need to make to keep up with attackers' capabilities, we have our work cut out for us..

Read More »


December 13, 2017 | IT Asset Disposal (ITAD)
By Chris Gonsalves, IANS Director of Technology Research

 Trash Talk: Addressing the Security Menace Lurking in Old IT Assets

Every IT department has a dirty little secret: closets filled with old, unused gear that pose significant risk to the organization. In this webinar, Chris Gonsalves looks at the perils and security implications of improperly disposing end-of-life IT assets and discusses responsible, appropriate methods of equipment wiping, destroying, recycling and repurposing with an eye toward reducing risk and ensuring data confidentiality and integrity.

Read More »