Broadcast Date: Wednesday, March 11, 2020
from 12:00 pm to 1:30 pm (ET)
Overview:
The intensity and volume of cyber threats and attacks have continuously increased over the past years. Businesses have become more prone to risks of cybersecurity breaches that management plans must not only be effective, but also aggressive.
To address this concern, it is imperative for businesses to have a solid foundation that will effectively secure and protect their network.
In this LIVE Webcast, cybersecurity experts Srikrupa Srivatsan (Infoblox) and Corey Maypray (Eli Lilly and Company) will provide the audience with an in-depth analysis of the fundamentals as well as recent developments concerning cyber threats and attacks. As experts, they will also provide practical tips and strategies in effectively handling this growing digital issue.
Key topics include:
- Cyber Threats: Trends Over the Past Years
- Common Risks and Challenges
- Effective Cyber Threat Solutions
- Practical Tips and Strategies
- Outlook
Credit:
Course Level:
Intermediate
Advance Preparation:
Print and review course materials
Method of Presentation:
On-demand Webcast (CLE)
Prerequisite:
General knowledge of cybersecurity
Course Code:
148593
NY Category of CLE Credit:
Law Practice Management
Total Credits:
1.5 CLE
How to Claim CLE Credits Per State:
https://knowledgewebcasts.com/how-to-claim-cle-credits-per-state/
CLE State Requirements:
https://knowledgewebcasts.com/cle-state-requirements/
CPE State Requirements:
Speaker Panel:
Srikrupa Srivatsan, Director, Product Marketing
Infoblox
Srikrupa has 20 years of experience in technology in various roles including software development, product management and product marketing. Currently, as Director of Product Marketing at Infoblox, she is responsible for messaging, positioning and bringing to market Infoblox’s security solutions that optimize security operations and provide foundational security against known and zero-day threats. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.
Corey Maypray, Advisor – Threat Intelligence and Detection Capabilities
Eli Lilly and Company
Corey currently acts as an Advisor-Threat Intelligence and Detection for Eli Lilly and Company. In this role he is responsible for developing and maturing Lilly’s Information Security Cyber Threat Intelligence program and driving the creation of better threat detection capabilities. Prior to joining Lilly, Corey served twelve years in the Army as an All Source Threat Analyst where he performed a variety of intelligence functions including collection management, threat/intelligence analysis, and operational assignments to support operations abroad. Corey has specialties in threat entity targeting, open source intelligence collection, and intelligence support to counter terrorism, weapons of mass destruction, geo-political tensions, and cyber based threats.
Agenda:
Srikrupa Srivatsan, Director, Product Marketing
Infoblox
Digital transformation and evolving IT architectures greatly impact security. While the threat landscape continues to change, so do the complexity of networks, where data is stored and how end users connect.
- Edge computing, multi-cloud, SD-WAN and IoT have caused an increase in risk to a company’s infrastructure, data and brand. Security approaches need to change to address these transformations.
- Learn how to improve the efficacy of your existing security investments by using foundational infrastructure as an enforcement point and integrating the silos of security tools.
- Use contextual data for more efficient SecOps and threat prioritization.
Corey Maypray, Advisor – Threat Intelligence and Detection Capabilities
Eli Lilly and Company
“If you know the enemy and yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” - Sun Tzu
- Know yourself: Learn your environment (people, processes, technology).
- Know your adversary: Learn your adversaries motivations (motive and targeted data) and capabilities (attack methods, TTP’S and resources).
- Prioritize protection of your most critical assets and operations.
- Cyber security resources remain limited. Organizations that attempt to broadly protect their data from all cyber threats tend to inefficiently invest these resources, making them slower to adapt to the changing trends and techniques of cyber threats. – Carnegie Mellon
Date & Time:
Wednesday, March 11, 2020
12:00 pm to 1:30 pm (ET)
Who Should Attend:
- Chief Information Officers
- Chief Information Security Officers
- Chief Technology Officers
- Network Engineers and Managers
- Cyber Security Professionals
- IT VPs and Directors
- Operations and Incident Response Teams
Join Over 150,000 Professionals Empowering Their Careers
Learn anywhere from over 1900+ live and recorded CLE, CPE & Technology Webcasts.