Getting Ahead of Zero-Day Attacks & Preventing Data Breaches
(ISC)² Long Island Presents, “Getting Ahead of Zero-Day Attacks & Preventing Data Breaches”
On behalf of the board, please join us at our February meeting. This will be remote only and we expect to gradually return to hybrid meetings in March, details to follow. As a promotion, we encourage members to invite a guest at registration.
Additional details and registration information can be found at the “Register Now” link below. Members can get their promo codes by logging into the chapter website and going to their “My Page”. Sponsor promo codes have been previously distributed. Non-members can register for a nominal fee.
5:00 – 5:10 Welcome and Chapter Business
5:15 – 5:25 Sponsor Spotlight
5:25 – 6:15 Log4Shell, Novel 0-days and You
6:15 – 7:10 Stop the Daily Barrage of Data Breaches
7:10 Session Wrap-up
Session 1 – Log4Shell, Novel 0-days and You
With the impact of the recently disclosed Log4j vulnerability still being felt, join us for a discussion of the scope and impact of that vulnerability, how Arctic Wolf Networks helped our customers assess and remediate their vulnerability to the same, and some general guidance on how you can help secure your environment in the face of the next novel 0-day
About the Speaker:
Jonathan Rozinsky is a Sr. Systems Engineer at Arctic Wolf Networks, having previously worked in the Enterprise data infrastructure and disaster recovery/business continuity spaces with numerous Fortune 500 clients. He lives in Queens, NY with his wife Iris, cat Percy and dog Bruno.
Session 2 – A radical not-so-new idea to stop the daily barrage of data breaches
Today’s Bad guys already know how our security measures work, because they spend all day probing good guys and all night collaborating to improve the next day’s probes. When good guys keep it all secret, we only cripple ourselves. If we want to stop the daily barrage of data breaches, we need to get serious about collaborating. Embrace open. Subject our security measures to public scrutiny. Endure the embarrassment, improve, and repeat. This is a counter-intuitive proposal, but the debate is around 170 years old
About the Speaker:
D. Greg Scott helps the world’s largest open source software company support the world’s largest telecom companies. Nights and weekends, he works on novels and researches ways to mount cyberattacks, hijack trucks, and blow up buildings. Youtube taught him how to detonate bombs with a cell phone. That contributed to a Virus Bomb scene. Some of Greg’s friends tell him he’s probably on a number of government watch lists. If so, then Greg asks all the hard-working and dedicated professionals watching his internet movements to buy copies of his novels for themselves and everyone in their departments before it’s too late. Greg lives in Minnesota with his wife, daughter, two grandsons, three cats, one dog, and other creatures that come and go.
|| Remote Registration ||
- Artificial Intelligence (AI) and Machine Learning (ML) in Cyber Security & Today’s Networking Security Challenges
- Sep 28 2022
- 5:30 pm - 8:05 pm