We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Insights Portal

\ Webinars


December 13, 2018 | Malware and Advanced Threats
By Bill Brenner, IANS Faculty,
     Dave Shackleford, IANS Faculty

 2018 in Review

In this webinar, IANS Research Director Bill Brenner and IANS Faculty Dave Shackleford look back at the biggest security news trends of 2018, what made them significant and what it all could mean for the year ahead.

Read More »

November 16, 2018 | Cloud Network and Host Controls
By Mike Rothman, IANS Faculty

 Developing a More Mature Cloud Security Model

Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. In this webinar, IANS Faculty Mike Rothman explains the Securosis/IANS Cloud Security Maturity Model, how serverless functions enable continuous cloud security, and how to secure the Continuous Deployment Pipeline.

Read More »

October 17, 2018 | Privacy
By George Gerchow, IANS Faculty

 GDPR 5 Months Later: Where You Should Be By Now

The deadline to comply with the European Union’s data protection regulation was May 25, but for many organizations the work is just beginning. Myriad questions remain for individual companies as to the size and scope of what they must do to be in compliance. In this webinar, IANS Faculty George Gerchow walks through where you should be and how to get there.

Read More »

September 18, 2018 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 IoT Risks and Rewards

Security experts have discussed the Internet of Things as a target for some time, but the 2016 coordinated assault against Dyn, one of several companies hosting the Domain Name System (DNS), brought the dangers into clearer focus. To better understand what we're dealing with, a deeper dive into the IoT is necessary. This live webinar with IANS Faculty Chris Poulin examines where the vulnerabilities are, and what can be done to improve the security behind the technology.

Read More »

August 13, 2018 | Threat Detection and Hunt Teaming
By John Strand, IANS Faculty,
     Jake Williams, IANS Faculty

 Hacking Back: A Double-Edged Sword

As online attacks continue to grow in frequency and ferocity, some in the security community are making the argument that the bad guys deserve a taste of their own medicine. Enter the notion of hacking back. The concept raises ethical questions, but some experts believe there are valid techniques that can and should be used to defend organizations. In this webinar, IANS Faculty John Strand and Jake Williams explore those techniques, address the ethical questions and help the audience find a happy medium.

Read More »

July 17, 2018 | Authentication
By Michael Pinch, IANS Faculty

 Blockchain as an Infosec Strength and Weakness

As crypto currency trading grows more popular, people are hearing a lot about how the Blockchain is key to making it all work. Meanwhile, security experts are talking more about the technology as a defensive asset and, if abused, a dangerous threat vector. In this webinar, IANS Faculty Michael Pinch walks through how Blockchain came about, how it works and how it’s central to managing digital currency transactions. He also reviews how it can be used to bolster security, how the bad guys can exploit it to launch attacks, and what organizations can do to protect themselves.

Read More »

June 15, 2018 | Regulations & Legislation
By Mark Clancy, IANS Faculty

 Tackling the New York State Department of Financial Services (NYDFS) Cybersecurity Requirements

While the bulk of the new NYDFS cybersecurity requirements took effect in March, rules on audit logging, application security, data retention and risk based monitoring for staff with access to nonpublic information come into effect this September. In this webinar, IANS Faculty Mark Clancy addresses some of the major pain points such as data-at-rest encryption, continuous monitoring, and notification of “events." He also details strategies for complying with the NYDFS requirements right now, in the coming months, and looking ahead to the implementation date for third parties.

Read More »

May 14, 2018 | Threat Detection and Hunt Teaming
By Dave Kennedy, IANS Faculty

 Threat Hunting: Why Proactive Matters

Attackers keep evolving their tactics, making it increasingly difficult for traditional forensic techniques to keep up. It’s time to get proactive – and that’s where threat hunting comes into play. In this webinar, IANS Faculty Dave Kennedy explains why threat hunting is important, and how hunt teams can directly increase the overall maturity (and ROI) of your monitoring and detection capabilities. He also details specific methods for detecting abnormal patterns of behavior and other tactics hunters can use to hone their craft.

Read More »

April 13, 2018 | Penetration Testing and Red Teaming
By Kevin Johnson, IANS Faculty

 I Am Not a Robot: Manual Pen-Testing Tips and Tricks

When it comes to web app penetration testing, automation can only get you so far. In this webinar, IANS Faculty Kevin Johnson explores how using manual testing techniques can augment the automation many DevOps shops use for security testing. In addition to providing examples of manual attacks used against modern sites, he offers tips for implementing this type of testing to ensure optimal web app security.

Read More »

March 21, 2018 | Authentication
By James Tarala, IANS Faculty

 An Enterprise Guide to Practical MFA

Multifactor authentication (MFA) provides a more robust solution than simple passwords, and while the latest offerings are more user-friendly and easier to deploy than ever before, selecting the right implementation and feature set is no easy feat. In this webinar, IANS Faculty James Tarala details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »