PLAY RECORDING
  • Sale!

Overview:

The intensity and volume of cyber threats and attacks have continuously increased over the past years. Businesses have become more prone to risks of cybersecurity breaches that management plans must not only be effective, but also aggressive.

To address this concern, it is imperative for businesses to have a solid foundation that will effectively secure and protect their network.

In this LIVE Webcast, cybersecurity experts Srikrupa Srivatsan (Infoblox) and Corey Maypray (Eli Lilly and Company) will provide the audience with an in-depth analysis of the fundamentals as well as recent developments concerning cyber threats and attacks. As experts, they will also provide practical tips and strategies in effectively handling this growing digital issue.

Key topics include:

  • Cyber Threats: Trends Over the Past Years
  • Common Risks and Challenges
  • Effective Cyber Threat Solutions
  • Practical Tips and Strategies
  • Outlook

Credit:

Course Level:

Intermediate

 

Advance Preparation:

Print and review course materials

 

Method of Presentation:

On-demand Webcast (CLE)

 

Prerequisite:

General knowledge of cybersecurity

 

Course Code:

148593

 

NY Category of CLE Credit:

Law Practice Management

 

Total Credits:

1.5 CLE

Speaker Panel:

Srikrupa Srivatsan, Director, Product Marketing
Infoblox

Srikrupa has 20 years of experience in technology in various roles including software development, product management and product marketing. Currently, as Director of Product Marketing at Infoblox, she is responsible for messaging, positioning and bringing to market Infoblox’s security solutions that optimize security operations and provide foundational security against known and zero-day threats. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.

Corey Maypray, Advisor – Threat Intelligence and Detection Capabilities
Eli Lilly and Company

Corey currently acts as an Advisor-Threat Intelligence and Detection for Eli Lilly and Company.  In this role he is responsible for developing and maturing Lilly’s Information Security Cyber Threat Intelligence program and driving the creation of better threat detection capabilities. Prior to joining Lilly, Corey served twelve years in the Army as an All Source Threat Analyst where he performed a variety of intelligence functions including collection management, threat/intelligence analysis, and operational assignments to support operations abroad. Corey has specialties in threat entity targeting, open source intelligence collection, and intelligence support to counter terrorism, weapons of mass destruction, geo-political tensions, and cyber based threats.

Agenda:

Srikrupa SrivatsanDirector, Product Marketing Infoblox

Digital transformation and evolving IT architectures greatly impact security. While the threat landscape continues to change, so do the complexity of networks, where data is stored and how end users connect.

  • Edge computing, multi-cloud, SD-WAN and IoT have caused an increase in risk to a company’s infrastructure, data and brand. Security approaches need to change to address these transformations.
  • Learn how to improve the efficacy of your existing security investments by using foundational infrastructure as an enforcement point and integrating the silos of security tools.
  • Use contextual data for more efficient SecOps and threat prioritization.

Corey MayprayAdvisor – Threat Intelligence and Detection Capabilities Eli Lilly and Company

“If you know the enemy and yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” - Sun Tzu

  1. Know yourself: Learn your environment (people, processes, technology).
  2. Know your adversary: Learn your adversaries motivations (motive and targeted data) and capabilities (attack methods, TTP’S and resources).
  3. Prioritize protection of your most critical assets and operations.
  1. Cyber security resources remain limited. Organizations that attempt to broadly protect their data from all cyber threats tend to inefficiently invest these resources, making them slower to adapt to the changing trends and techniques of cyber threats. – Carnegie Mellon

Date & Time:

Wednesday, March 11, 2020

12:00 pm to 1:30 pm (ET)

Materials:

Download Course Materials

Who Should Attend:

  • Chief Information Officers
  • Chief Information Security Officers
  • Chief Technology Officers
  • Network Engineers and Managers
  • Cyber Security Professionals
  • IT VPs and Directors
  • Operations and Incident Response Teams

SPEAKERS

Srikrupa SrivatsanDirector, Product Marketing
Infoblox
Corey MayprayAdvisor – Threat Intelligence and Detection Capabilities
Eli Lilly and Company

RELATED WEBCASTS

SUBSCRIPTION PACKAGES

ALL-ACCESS PASS

View Details

CLE LAW MONTHLY

View Details

CPE FINANCE MONTHLY

View Details

Join Over 150,000 Professionals Empowering Their Careers

Learn anywhere from over 1800+ live and recorded CLE CPE & Technology webcasts.