Five Essential Steps to Secure a Network and Incident Management Preparation You’ll Wish You Did
(ISC)² Long Island Presents, “Five Essential Steps to Secure a Network and Incident Management Preparation You’ll Wish You Did”
Please join us for our February meeting featuring an in depth discussion on Securing Networks and Incident Management. We are continuing the return to in-person meetings. This will be a hybrid event and will include Teams access for remote attendees and presenters.
Members can invite one guest at no charge and get their promo codes by logging into the chapter website and going to their “My Page”. Sponsor promo codes have been previously distributed. Non-members can register for a nominal fee.
5:15 – 6:00 In-Person Registration and Networking
5:50 – 6:00 Remote attendees join via Teams
6:00 – 6:15 Welcome and chapter updates
6:15 – 7:05 Tenable: Five Essential Steps to a Secure Network
7:05 – 8:00 Verizon: Incident Management – The Preparation You’ll Wish You Did
8:05 Session Wrap-up
Session 1 – Five Essential Steps to a Secure Network
To achieve optimal network security, you must implement a proactive and comprehensive approach to make your network a “hard target” able to resist damaging cyber attacks. In this presentation, we will address five essential parts of an effective proactive and comprehensive network cybersecurity program. These include:
1. Know your entire network – you cannot protect it if you don’t know it is there
2. Use dynamic assessment methods that incorporate real-time threat intelligence to manage cyber risk in a dynamic network environment
3. Choose the right security tools and use them for their intended purposes
4. Look at your network from the attacker’s perspective
5. Secure and proactively monitor your Active Directory to enable timely incident response and minimize damage in the event of a cyber attack.
Three (3) Session Objectives:
1. Attendees will learn that CVSS is not a measure of risk, and that an effective basis for vulnerability prioritization must be dynamic and incorporate threat intelligence;
2. Attendees will learn that an external view of their network is required to eliminate dangerous blind spots in identifying internet-facing assets;
3. Attendees will learn that Active Directory is the default path for ransomware attacks, and that continuous monitoring of that environment is essential to block attackers from achieving their objectives.
About the Speaker(s):
Chris Jensen is the Public Sector Business Development Executive at Tenable, where he develops strategic cybersecurity initiatives and supports programs in federal, state, and local markets. Prior to joining Tenable in 2017, Chris served in a broad range of leadership roles in Public Sector IT contracting, including business operations, contract and program management, and business development. Chris began his professional career as an officer in the U.S. Navy. After leaving active service, he continued to serve in the U.S. Navy Reserve, retiring at the rank of Captain. A graduate of the U.S. Naval Academy, Chris also holds a J.D. from The George Washington University Law School.
Session 2 – Incident Management: The preparation you’ll wish you did
Many organizations take a technical view of Incident Response and build their Incident Management Program from just that perspective. Experienced leaders know that success in cybersecurity relies on support systems, relationships, and teamwork just as much as technical preparation and expertise.
In this presentation we examine what management needs to do to enable their Incident Handlers to be successful. We uncover some of the areas that are highly impactful to the outcome, but commonly missed by many organizations. We also discuss ways to prioritize and incorporate them into your current Incident Response Plan.
About the Speaker(s):
Charles Brodsky is the Chief Security Architect for Verizon’s “Security Operations Advisory Group” that focuses on helping client’s mature and enhance their cybersecurity monitoring programs. He has 25 years experience in cybersecurity/IT, and holds multiple certifications from ISC2, ISACA, CompTIA, SANS/GIAC, and several vendors. He is also a member of the SANS Advisory Board, and a founding SME for CompTIA’s Information Sharing and Analysis Organization (ISAO).