We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Webinars

 


October 17, 2018 | Privacy
By George Gerchow, IANS Faculty

 GDPR 5 Months Later: Where You Should Be By Now

The deadline to comply with the European Union’s data protection regulation was May 25, but for many organizations the work is just beginning. Myriad questions remain for individual companies as to the size and scope of what they must do to be in compliance. In this webinar, IANS Faculty George Gerchow walks through where you should be and how to get there.

Read More »


September 18, 2018 | Embedded Systems and Internet of Things
By Chris Poulin, IANS Faculty

 IoT Risks and Rewards

Security experts have discussed the Internet of Things as a target for some time, but the 2016 coordinated assault against Dyn, one of several companies hosting the Domain Name System (DNS), brought the dangers into clearer focus. To better understand what we're dealing with, a deeper dive into the IoT is necessary. This live webinar with IANS Faculty Chris Poulin examines where the vulnerabilities are, and what can be done to improve the security behind the technology.

Read More »


August 13, 2018 | Threat Detection and Hunt Teaming
By John Strand, IANS Faculty,
     Jake Williams, IANS Faculty

 Hacking Back: A Double-Edged Sword

As online attacks continue to grow in frequency and ferocity, some in the security community are making the argument that the bad guys deserve a taste of their own medicine. Enter the notion of hacking back. The concept raises ethical questions, but some experts believe there are valid techniques that can and should be used to defend organizations. In this webinar, IANS Faculty John Strand and Jake Williams explore those techniques, address the ethical questions and help the audience find a happy medium.

Read More »


July 17, 2018 | Authentication
By Michael Pinch, IANS Faculty

 Blockchain as an Infosec Strength and Weakness

As crypto currency trading grows more popular, people are hearing a lot about how the Blockchain is key to making it all work. Meanwhile, security experts are talking more about the technology as a defensive asset and, if abused, a dangerous threat vector. In this webinar, IANS Faculty Michael Pinch walks through how Blockchain came about, how it works and how it’s central to managing digital currency transactions. He also reviews how it can be used to bolster security, how the bad guys can exploit it to launch attacks, and what organizations can do to protect themselves.

Read More »


June 15, 2018 | Regulations & Legislation
By Mark Clancy, IANS Faculty

 Tackling the New York State Department of Financial Services (NYDFS) Cybersecurity Requirements

While the bulk of the new NYDFS cybersecurity requirements took effect in March, rules on audit logging, application security, data retention and risk based monitoring for staff with access to nonpublic information come into effect this September. In this webinar, IANS Faculty Mark Clancy addresses some of the major pain points such as data-at-rest encryption, continuous monitoring, and notification of “events." He also details strategies for complying with the NYDFS requirements right now, in the coming months, and looking ahead to the implementation date for third parties.

Read More »


May 14, 2018 | Threat Detection and Hunt Teaming
By Dave Kennedy, IANS Faculty

 Threat Hunting: Why Proactive Matters

Attackers keep evolving their tactics, making it increasingly difficult for traditional forensic techniques to keep up. It’s time to get proactive – and that’s where threat hunting comes into play. In this webinar, IANS Faculty Dave Kennedy explains why threat hunting is important, and how hunt teams can directly increase the overall maturity (and ROI) of your monitoring and detection capabilities. He also details specific methods for detecting abnormal patterns of behavior and other tactics hunters can use to hone their craft.

Read More »


April 13, 2018 | Penetration Testing and Red Teaming
By Kevin Johnson, IANS Faculty

 I Am Not a Robot: Manual Pen-Testing Tips and Tricks

When it comes to web app penetration testing, automation can only get you so far. In this webinar, IANS Faculty Kevin Johnson explores how using manual testing techniques can augment the automation many DevOps shops use for security testing. In addition to providing examples of manual attacks used against modern sites, he offers tips for implementing this type of testing to ensure optimal web app security.

Read More »


March 21, 2018 | Authentication
By James Tarala, IANS Faculty

 An Enterprise Guide to Practical MFA

Multifactor authentication (MFA) provides a more robust solution than simple passwords, and while the latest offerings are more user-friendly and easier to deploy than ever before, selecting the right implementation and feature set is no easy feat. In this webinar, IANS Faculty James Tarala details the practical steps for choosing and implementing an enterprise-class MFA solution that helps meet regulatory requirements, facilitate realistic business operations and actually stop attacks.

Read More »


February 16, 2018 | Threat Intelligence and Modeling
By Adam Shostack, IANS Faculty

 Comprehensive, Structured and Systematic: Engineering for Security

The hardest part of security is going from random discovery of problems as you create new features to a systematic, comprehensive and structured approach to finding problems early. In this webinar, IANS Faculty Adam Shostack identifies ways to bring security engineering to the very earliest parts of product or service cycles, align with agile practices and reap the benefits that come from such efforts: faster, more predictable and more secure launches.

Read More »


February 5, 2018 | Regulations & Legislation
By George Gerchow, IANS Faculty

 5 Practical Steps to GDPR Success

With all the noise, panic and questions about the EU’s new General Data Protection Regulation (GDPR), it’s difficult to discern the right mix of policies, procedures and technologies to ensure compliance. In this webinar, IANS Faculty George Gerchow helps you prioritize the practical steps you can take today – and the tougher steps you can safely put off for tomorrow – to ensure your organization is fully prepared when the ruling comes into full force this May.

Read More »