Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Webinars 



April 13, 2018 | Penetration Testing and Red Teaming
By Kevin Johnson, IANS Faculty

 I Am Not a Robot: Manual Pen-Testing Tips and Tricks

When it comes to web app penetration testing, automation can only get you so far. In this webinar, IANS Faculty Kevin Johnson explores how using manual testing techniques can augment the automation many DevOps shops use for security testing. In addition to providing examples of manual attacks used against modern sites, he offers tips for implementing this type of testing to ensure optimal web app security.

Read More »


March 21, 2018 | Authentication
By James Tarala, IANS Faculty

 An Enterprise Guide to Practical MFA

Multifactor authentication (MFA) provides a more robust solution than simple passwords, and while the latest offerings are more user-friendly and easier to deploy than ever before, selecting the right implementation and feature set is no easy feat. In this webinar, IANS Faculty James Tarala details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »


February 16, 2018 | Threat Intelligence and Modeling
By Adam Shostack, IANS Faculty

 Comprehensive, Structured and Systematic: Engineering for Security

The hardest part of security is going from random discovery of problems as you create new features to a systematic, comprehensive and structured approach to finding problems early. In this webinar, IANS Faculty Adam Shostack identifies ways to bring security engineering to the very earliest parts of product or service cycles, align with agile practices and reap the benefits that come from such efforts: faster, more predictable and more secure launches.

Read More »


February 5, 2018 | Regulations & Legislation
By George Gerchow, IANS Faculty

 5 Practical Steps to GDPR Success

With all the noise, panic and questions about the EU’s new General Data Protection Regulation (GDPR), it’s difficult to discern the right mix of policies, procedures and technologies to ensure compliance. In this webinar, IANS Faculty George Gerchow helps you prioritize the practical steps you can take today – and the tougher steps you can safely put off for tomorrow – to ensure your organization is fully prepared when the ruling comes into full force this May.

Read More »


January 10, 2018 | Malware and Advanced Threats
By Aaron Turner, IANS Faculty

 Information Security Trends for 2018

In 2017, we saw some of our most valued controls undermined and witnessed security incidents impacting businesses around the world.  What will 2018 bring? In this report and webinar, IANS Faculty Aaron Turner examines the major trends in store for IT security professionals in the coming year. From the new incidents we need to prepare for to the investments we need to make to keep up with attackers' capabilities, we have our work cut out for us..

Read More »


December 13, 2017 | IT Asset Disposal (ITAD)
By Chris Gonsalves, IANS Director of Technology Research

 Trash Talk: Addressing the Security Menace Lurking in Old IT Assets

Every IT department has a dirty little secret: closets filled with old, unused gear that pose significant risk to the organization. In this webinar, Chris Gonsalves looks at the perils and security implications of improperly disposing end-of-life IT assets and discusses responsible, appropriate methods of equipment wiping, destroying, recycling and repurposing with an eye toward reducing risk and ensuring data confidentiality and integrity.

Read More »


November 14, 2017 | Recruiting, Hiring and Retention
By David Kolb, IANS Faculty

 Handling Chaos: Thriving When Policy and Business Priorities Clash

Information security professionals must be able to thrive in a turbulent environment where corporate policy, goals and priorities don’t always align across departments. In this webinar, IANS Faculty David Kolb discusses how to put multiple conflicting forces in perspective and better manage diverse demands by putting big ideas such as emotional intelligence, political intelligence and organizational intelligence into practice.

Read More »


October 16, 2017 | Security Information and Event Management (SIEM) and Log Management
By Raffy Marty, IANS Faculty

 Implementing Your Big Data and SIEM Plans: 10 Challenges to Solve First

SIEM deployments can be challenging for many reasons: scalability, visibility, insights, etc. But is the SIEM really to blame? In this webinar, IANS Faculty Raffy Marty explores some of the reasons why you might not be getting the full benefits from your SIEM and details some of the challenges around moving to an alternative big-data solution.

Read More »


September 18, 2017 | Risk Management
By Rich Guida, IANS Faculty

 Infosec Risk Management: How to Focus on the Business Units

Information security professionals spend a lot of time doing risk management, but how do we know what the enterprise’s biggest risks are? How did we determine them? In this webinar, IANS Faculty Rich Guida discusses ways to ensure that business units (and their executive leaders) can be brought to the table and contribute meaningfully in risk identification and ranking, so when you ask for money to mitigate those risks, you have confidence that leadership has bought in to them.

Read More »


August 14, 2017 | Embedded Systems and Internet of Things
By Aaron Turner, IANS Faculty

 The Internet of Criminal Things: How Technology Commoditization Has Driven Our Current IoT Nightmares

Just like all technologists, criminals have taken advantage of the low costs of high-performance components such as Bluetooth and cellular modems. In this webinar, IANS Faculty Aaron Turner discusses how enterprises can use a diverse set of technologies to monitor for the presence of “Criminal Things” and what kinds of controls are available to help solve the problem in the long term.

Read More »