Security Deterrence Through Security Awareness and Threat Intelligence
(ISC)² Long Island Presents, “Security Deterrence Through Security Awareness and Threat Intelligence”
Please join us for our November meeting featuring a in depth discussion on Security Awareness. We are continuing the return to in-person meetings. This will be a hybrid event and will include Teams access for remote attendees and presenters.
Additional details and registration information can be found at the “Register Now” link below. Members can invite one guest at no charge and get their promo codes by logging into the chapter website and going to their “My Page”. Sponsor promo codes have been previously distributed. Non-members can register for a nominal fee.
5:15 – 6:00 In-Person Registration and Networking
5:50 – 6:00 Remote attendees join via Teams
6:00 – 6:15 Welcome and chapter updates
6:15 – 7:05 Undermining Security Awareness
7:05 – 8:00 Overcoming Threat Intelligence Fatigue
8:05 Session Wrap-up
Session 1 – Undermining Security Awareness
Amy Dearwester is an Associate Director of Information Security Strategy & Innovation at S&P Global Ratings
Amy will share thoughts and challenges in relationship with Security Awareness.
About the Speaker(s):
Amy Dearwester is an Associate Director of Information Security Strategy & Innovation at S&P Global Ratings. She currently holds two GIAC certifications. In the course of her career, she has worked in Business Administration, IT, and Cyber Security roles. This diverse range of experiences, coupled with her keen interest in psychology, has uniquely positioned her to tackle the challenges of Human Risk in organizations. Her most current project is building a Security Champion program for her organization.
Session 2 – Overcoming Threat Intelligence Fatigue
Jason Mical is the Field CTO of Rapid7
He will share his knowledge around threat intelligence, the struggles surrounding threat intelligence, along with how teams are combating these struggles!
There’s no shortage of threat intelligence… In fact, there is often more than any organization can effectively manage. Despite this, most organizations are still unable to effectively track an attack lifecycle. Historically most cyber teams depended on IOCs for threat detection and hunting. Not only is this an overwhelming management task, it’s also no longer effective. Today you need an arsenal of analytics to protect your company, including; brand security monitoring, exploitable data monitoring, executive protection monitoring, data leakage monitoring, phishing campaign monitoring, and TTP analysis.
About the Speaker(s):
Jason has more than 30 years’ experience in telecommunications fraud prevention, physical security management and cyber security investigations. During his career, he developed and implemented overall cyber security, physical security, forensic investigation and fraud control programs for several global organizations and managed lawful interception operations to support federal agencies. He has developed security and fraud awareness training seminars for employees in private industry, as well as
federal, state and local law enforcement. He assists customers in such areas as electronic intercepts, intrusion analysis, malware eradication,forensic investigations, incident response, security standards and guidelines.
|| Onsite Registration ||
|| Remote Registration ||
- Cybersecurity In Transactions and Autonomous Aerial Drone Security
- Feb 28 2024
- 5:00 am - 8:10 pm