PLAY RECORDING

Overview:

Security initiatives have historically been driven by compliance mandates and a healthy dose of fear. But as threats continue to become more sophisticated, so must our efforts in thwarting them. Organizations that used to think “we’re the small company, attackers go for the big organizations with more valuable data” have seen an increase in breaches as attackers shift their focus from the large, heavily secured organizations, to the often easier to breach small, mid, and emerging enterprise businesses.  Automation in attack techniques has made attack targeting more random and democratic, and less protected businesses are experiencing disproportionate impacts.  Shifting from compliance based security to aligning with best practices, specifically the Center for Internet Security (CIS) Top 20 Critical Security Controls, is a great way for an organization of any size to prioritize and progress their security posture.

Ransomware is on the rise and is a serious threat to all organizations. To avoid becoming a victim, businesses should take actions that include putting security processes in place to ensure their IT environment is fully protected. Leveraging the Center for Internet Security’s (CIS) Critical Security Controls (CSC) is a solid place to start. These same security processes will help protect your critical business environment from malware, which accounts for nearly 30% of all breaches.  Once in place, ensuring consistent application of these processes has a recurring benefit in terms of both protection and organizational awareness of security issues.

Join a panel of key thought leaders and practitioners assembled by The Knowledge Group as they delve into the latest data security cases with much consideration on current trends and developments. Speakers will also provide effective tips and strategies to help companies protect their data and secure their company’s most critical assets.

Key topics include:

  • Profile of the latest attacks geared towards small/mid/emerging enterprise sized organizations
  • Leveraging the CIS Controls as a guide for your security practice to prevent breaches
  • Effective strategies for gaining insight to what’s happening to your data
  • Key practices of a security operations center
  • 24/7 Visibility and the battle against drift, dwell time, and lateral spread
  • Likely evolutions in Ransomware and planning for continued protection success

Credit:

Course Level:

Intermediate

 

Advance Preparation:

Print and review course materials

 

Method of Presentation:

On-demand Webcast (CLE)

 

Prerequisite:

General knowledge of cybersecurity laws

 

Course Code:

148775

 

NY Category of CLE Credit:

Areas of Professional Practice

 

Total Credits:

2.0 CLE


How to Claim CLE Credits Per State:

https://knowledgewebcasts.com/how-to-claim-cle-credits-per-state/


CLE State Requirements:

https://knowledgewebcasts.com/cle-state-requirements/

Speaker Panel:

Katie McCullough, Chief Information Security Officer
OneNeck IT Solutions LLC

Katie McCullough is the Chief Information Security Officer at OneNeck IT Solutions and has direct responsibility for Information Security, Governance, Risk and Compliance (GRC). She also manages the company’s strategic IT security planning and compliance.

Katie validates that all OneNeck’s services are built and managed according to the foundational security principles of Confidentiality, Integrity and Availability (CIA), ensuring adherence to professional IT services based on industry best practice frameworks, such as ISO, ITIL and the National Institute of Standards and Technology (NIST) Cybersecurity Framework. She also oversees a team responsible for mitigating information security risks and maintaining oversight of the company’s compliance and certification portfolio.

Katie has been with OneNeck eight years and has more than 20 years of experience working with prominent managed IT security services providers.

Jessica Bartley, Director
IT Security & Business IntelligenceTDS

Jessica Bartley is responsible for leading a team of security professionals at TDS, a fortune 1000 company and owner of OneNeck IT Solutions.  She has spent the past seven years establishing an information security practice at TDS that focuses on securing information assets and company data, assessing risks of various threats to the environment, and preventing and detecting potential security breaches within various companies in the TDS organization.  Jessica has more than 12 years of IT security experience and more than 19 years of hands-on and leadership experience in a diverse set information technology areas including application design and support, server, network, and database administration.  Jessica is currently focused on leveraging analytics to enhance and improve security outcomes.

Jack Danahy, SVP, Strategy and Security
Alert Logic

Jack Danahy engages with customers and the industry on company product strategy. Danahy is an innovative security technology leader with proven success creating, delivering, and promoting new security technologies and practices to address critical needs. He has founded and co-founded three successful security companies, holding CEO and CTO roles. Most recently, he was CTO at Barkly and previously at Qiave Technologies (acquired by WatchGuard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). He is a frequent writer and speaker on security and security issues and has received multiple patents in a variety of security technologies. Prior to founding Barkly, Danahy was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.

Agenda:

Katie McCulloughChief Information Security Officer OneNeck IT Solutions LLC

AND

Jessica BartleyDirector IT Security & Business Intelligence TDS

  • Leveraging the CIS Controls as a guide for your security practice
  • Effective strategies for gaining insight to what’s happening to your data
  • Key practices of a security operations center

Jack DanahySVP, Strategy and Security Alert Logic

  • The growing emphasis on identify and credential theft as an attack motive
  • 24X7 monitoring and the need to decrease dwell time
  • Drift, and recommendations on avoiding it

Date & Time:

Thursday, January 09, 2020

12:00 pm to 2:00 pm (ET)

Materials:

Download Course Materials

Who Should Attend:

  • Chief Information Security Officers
  • Chief Information Officers
  • Chief Privacy Officers
  • Data Security Officers
  • IT Risk Analysts
  • IT Audit Officers
  • Fraud Monitoring Officers
  • Fraud Analysts
  • Privacy and Data Security Lawyers
  • Corporate Counsel
ImageNameCategory

SPEAKERS

Katie McCulloughChief Information Security Officer
OneNeck IT Solutions LLC
Jessica BartleyDirector
IT Security & Business IntelligenceTDS
Jack DanahySVP, Strategy and Security
Alert Logic

SUBSCRIPTION PACKAGES

ALL-ACCESS PASS

View Details

CLE LAW MONTHLY

View Details

CPE FINANCE MONTHLY

View Details

Join Over 150,000 Professionals Empowering Their Careers

Learn anywhere from over 1800+ live and recorded CLE CPE & Technology webcasts.