Dark Reading Courses

Archived Tracks

Enterprise Defense Crash Course Thursday, September 22 - Thursday, October 27

Our Lecturer Chris Eng, VP Research, Veracode

Chris Eng (@chriseng) is vice president of research at Veracode. Throughout his career, he has led projects breaking, building, and defending software for some of the world's largest companies. He is an unabashed supporter of the Oxford comma and hates it when you use the word "ask" as a noun.

HIDE

Sep 22

1PM

Customer databases, ERP, Big Data  the keys to your enterprises kingdom lie in its applications. But application security is often overlooked, both by software makers and by internal development teams. What steps can your organization take to find and repair application vulnerabilities  before your attackers discover them? A top app security expert discusses key practices for scanning and securing applications.

Presenter: Rich Mogull, Analyst & CEO, Securosis

Sep 29

1PM

Cloud computing services and technology offer a level of efficiency and cost savings that most enterprises simply cant pass up. But does the growing use of cloud technology create a growing threat to enterprise data? How can IT organizations track and secure data as it travels through the cloud? In this session, a cloud security expert will discuss the key danger points in cloud computing and the latest technologies and practices for cloud security.

Oct 6

1PM

Most major data breaches start with the compromise of a single endpoint  a PC, a mobile device, a user who unwittingly gives up credentials. What can your organization to protect its endpoints? How can you create and enforce end user policies that protect your corporate data? In this session, a top expert discusses how endpoints and end users are most frequently compromised  and how to keep your end users from falling victim.

Presenter: Andrew Blaich, Security Researcher, Lookout

Oct 13

1PM

Everyone is saying that the introduction of mobile devices and bring-your-own-device (BYOD) policies is a security risk to the enterprise. But exactly where do those risks come from? In this session, a top expert will debunk some of the myths about mobile security while raising up some threats and vulnerabilities you may not know about.

Presenter: Randy Trzeciak, Director, Insider Threat Center, CERT

Oct 20

1PM

Major data leaks such as Edward Snowdens release of NSA data are only the tip of the insider threat iceberg. Every day, enterprises face the threat of losing insider information  not only through malicious leaks but through unintentional violations of security rules. How can organizations spot the signs of a data leak and stop it before it goes too far? How can IT help prevent accidental leaks of sensitive data? A top expert offers key advice on stopping data loss from within.

Presenter: Drew Vanover, Director of Technical Solutions, Blue Coat

Oct 27

1PM

As enterprises add new networking capabilities, SDN, and virtualized server environments, the risks they face are changing as well. In this informative session, a top expert on infrastructure security will discuss the latest threats to networks and servers and how your organization can mitigate them.

Enterprise Security Management Crash Course Thursday, January 12 - Thursday, February 2

Our Lecturer John Pironti, President, IP Architects

John P. Pironti is the President of IP Architects LLC. He has designed and implemented enterprise-wide electronic business solutions, information security and risk management strategies and programs, enterprise resilience capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 20 years. Mr. Pironti has a number of industry certifications including Certified in the Governance of Enterprise IT (CGEIT), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information System Control (CRISC), Information Systems Security Architecture Professional (ISSAP), and Information Systems Security Management Professional (ISSMP). He frequently provides briefings and acts as a trusted advisor to senior leaders of numerous organizations on information security and risk management and compliance topics and is also a member of a number of technical advisory boards for technology and services firms. He is also a published author and writer, highly quoted and often interviewed by global media, and an award-winning frequent speaker on electronic business and information security and risk management topics at domestic and international industry conferences.

HIDE

Presenter: John Pironti, President, IP Architects

Jan 12

1PM

For many organizations, making the right business decisions means making the right decisions about risk. But the risk of a cyber breach is one of the hardest variables to measure. In this session, you'll get insight on how to evaluate cyber risk, and how to perform "what if" scenarios to help your business decision makers arrive at the right choices.

Presenter: Tim Wilson, Editor in Chief, Dark Reading

Jan 19

1PM

Thanks to a plethora of major  and very public  data breaches, security has become one of the most critical issues in IT. What are the chief threats that security departments face, and what are they doing about them? What are today's top priorities for security professionals? This session will include data from two recent surveys of IT and security executives.

Presenter: Rafal Los, Managing Director, Solutions Research and Development, Optiv

Jan 26

1PM

Over the years, most enterprises have acquired a plethora of tools to detect and/or block security threats. But how can organizations monitor these tools to detect potential threats and measure the security posture of the enterprise? In this session, a top expert on security monitoring will offer some advice on how to monitor and report on an enterprise's security posture, and how to use the data from multiple security systems to track down sophisticated threats.

Presenter: David Bradford, Chief Strategy Officer and Director of Strategic Partnership Development, Advisen

Feb 2

1PM

One of the ways that today's enterprises are minimizing cyber security risk is by buying cyber insurance, which promises to pay them back for the costs of a major data security breach. But how much does cyber insurance cost? And what does it pay in the event of a major compromise? In this session, an expert on cyber insurance will discuss the strengths and weaknesses of cyber insurance policies  and the hidden costs that it may not cover.

You've Been Breached! Crash Course Thursday, November 10 - Thursday, December 22

Our Lecturer Zach Wikholm, Research Developer, Flashpoint

Zach Wikholm is a Research Developer at Flashpoint where he specializes in information security and Internet of Things (IoT) risk analysis. Driven by lifelong interests in cyber threat research, emergent malware, and all things open-source (especially Linux), Zach has built a career around designing custom systems to help organizations achieve the optimal balance between security and usability. Prior to Flashpoint, Zach's extensive experience in security engineering and IT consulting led to his role managing all internal security and network infrastructure operations as the Director of Security at CARI.net. He lives in San Diego with his wife and two dogs.

HIDE

Presenter: Peter Gregory, Executive Director, Executive Advisory, Office of the CISO, Optiv

Sponsor Speaker: Zach Wikholm, Research Developer, Flashpoint

Nov 10

1PM

As organizations such as Target have discovered, cyber attackers sometimes attack indirectly, through suppliers, contractors, and customers. But how can you ensure that third parties are keeping their own systems secure  and are not providing an avenue to compromise your data? How should you work with your partners in the event of a security incident? In this session, we discuss methods you can use to vet your suppliers security -- and how to work with your partners if a compromise is found.

Presenter: Adam Kujawa, Head of Malware Intelligence, Malwarebytes

Nov 17

1PM

Another key element in assessing risk is assessing your attractiveness as a target. Today's cyber attackers range from financially-motivated criminals to politically-motivated hacktivists to state-sponsored information-gathering hacker units. This session offers a look at the different types of cyber attackers, their methods, and their motivations.

Presenter: Chris Novak, Director, Global Investigative Response, Verizon

Dec 1

1PM

To understand the cyber risk your organization faces, you need to understand the likelihood of a breach  and its potential cost. In this session, a top expert discusses the many  and sometimes hidden  costs of a data breach, including its impact on customers and end users. You'll also get insight on the frequency of data breaches, and a better understanding of how likely it is to happen to you.

Presenter: Jerome Segura, Lead Malware Intelligence Analyst, Malwarebytes

Dec 8

1PM

In the past, most cyber attacks simply exploited the most vulnerable systems. Today, however, there is an increasing number of sophisticated attacks that target specific companies, data, or even employees. These attacks are well-disguised and may escape conventional security defenses. What tools and strategies are there to prevent these exploits? In this session, you will hear about the latest types of targeted attacks and what your enterprise can do to stop them.

Presenter: Bhaskar Karambelkar, Data Science Lead, ThreatConnect

Dec 15

1PM

The good news in IT security is that there is a growing list of resources and services that can inform you about the latest threats in cyber space. The bad news is that with so many sources and data, using threat intelligence to improve your cyber defenses can be a bewildering process. In this session, you'll get a look at some of the different types of threat intelligence data, and you'll get advice on how to choose the right ones  and integrate the information to improve your defenses.

Presenter: Andy Jordan, Security Associate, Bishop Fox

Dec 22

1PM

If your organization doesn't have a plan for handling a major data breach, you're already in trouble. In order to swiftly and effectively respond to a cyber compromise, you must develop a program for first response in the data center, and downstream response in the business units and in the public eye. This session offers some guidance on how to build an incident response plan, and how to test and practice that plan so that you're ready for the real thing.

Upcoming Webinars

Cyber Attackers' Favorite Exploits - And How To Stop Them

Date: Nov 12, 2020

View webinar

This virtual event offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You'll get a look at some of the latest exploits used by today's cybercriminals, as well as their methods for penetrating your defenses.



Nov 12, 2020

The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You

Date: Oct 20, 2020

View webinar

Dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about. Stop playing reactive defense. Go on the offensive! Use your existing data to craft a better malware defense today.



Oct 20, 2020

[Free Virtual Event] Managing Apps in a Multi-Cloud Environment

Date: Oct 15, 2020

View webinar

This event will offer proactive strategies for coordinating cloud environments and fostering more seamless integration between business apps and traditional IT systems, leading to improvements in cost management, security and compliance.



Oct 15, 2020

Automating Security Functions in Your Enterprise

Date: Oct 15, 2020

View webinar

A shortage of skilled IT security professionals has given rise to a whole new class of technology and practices designed to automate repetitive and time-consuming tasks in security operations. But which tasks can enterprises safely automate? In this webinar, top experts offer insights on how to make automation work for your security team.



Oct 15, 2020

Quantifying the Benefits of a DevOps Strategy

Date: Oct 14, 2020

View webinar

Digital transformation is no longer an option for most enterprises with leaders rapidly adopting DevOps practices for software delivery and security practices worldwide. While most recognize the value that DevOps can bring to the organization, quantifying the tangible benefits and results may be challenging. Our expert presenter will explore the various metrics for tracking the payback from a DevOps initiative.



Oct 14, 2020

Effective Cyber Risk Assessment and Measurement

Date: Oct 06, 2020

View webinar

Learn about the costs associated with today's threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to prioritize costs and defense strategies specifically for your environment.



Oct 06, 2020

Get Your Security Tools Talking for More Effective Incident Response

Date: Sep 24, 2020

View webinar

Join this webinar as we show you what and how to automate within incident response while also making your security toolset more effective.



Sep 24, 2020

Edge Computing: An IT Platform for the New Enterprise

Date: Sep 23, 2020

View webinar

Today, it's clear that the "edge" isn't just about technology but is a core strategy enterprise need to consider. The edge is about processing data where it makes sense and minimizing the burden on the enterprise network. This special report and webinar will highlight the potential benefits from edge and how enterprises can approach it.



Sep 23, 2020