Security Curren'ts Vic Wheatman Speaks with Proofpoint's Kevin Epstein
More than 90 percent of enterprise security problems reportedly are caused by malicious email. It isn’t a matter of if an employee will click on that malicious email or voicemail but just a matter of when.
Blocking, detecting and responding to phishing, spear phishing and other email-based attacks is now a fundamental enterprise security requirement.
And looming large on the horizon are attacks launched via social media. In fact, according to security vendor Proofpoint, 1 out of every 5 large enterprise brands on Twitter last year did not actually belong to the brand.
In this sponsored podcast Epstein, VP of Advanced Security and Governance, talks about leveling the playing field to combat today’s advanced targeted attacks.
By Tim Kropp
If you have ever sat through an orchestral concert, you would hear the first chair oboe playing a single note for the rest of the fellow orchestral players to latch onto and begin the process of fine tuning.
At first, it is a single A440 resonating on stage, followed section by section, strings, brass, percussion, until a cacophony of sound begins to reverberate from all players.
They do this because they can. They do this because the lack of tonal harmony would result in a less than spectacular performance and likely some very unhappy customers and critics of music performance.
Your desired Cybersecurity practice can be your A440.
By Christine Vanderpool
It's no secret that I love Las Vegas and all it has to offer including gambling.
To me, this is a natural affection due to what I do in my day-to-day life. Isn't that what we as IT Security professionals do every day, gamble? But instead of gambling with our own money or chips, we are betting our company's money and name.
Gambling by someone who knows what they are doing is not a game of chance but a game of knowing and playing the odds. It is about taking the right calculated risk at the right time with of course a little bit of luck.
By David Sheidlower
A CISOs Guide to Principles of Data Privacy and Security examines the key issues surrounding data privacy and security.
In this eBook, Sheidlower, currently CISO of an international media and advertising firm, provides his perspective on topics, which include privacy policies, big data, consent, governance and security.
According to the author: “The fundamental principles of privacy and security continue to evolve. I’ve tried to look into each of them from the consent process, which most people find problematic, to the need for a framework for data protection, which is where an organization’s security program comes in.”
The eBook has been lauded by Sheidlower’s peers, with Larry Whiteside Jr., CISO of the Lower Colorado River Authority (LCRA), stating: “It provides thought provoking and actionable information on issues that are top of mind for us – data privacy and security. I highly recommend reading it.”
Chief Information Security Officers (CISOs) are dedicated to protecting enterprises and government organizations.
But with the drumbeat of attacks getting louder and more frequent and the number of security technology companies continuously increasing how do CISOs decide what to use?
This is a unique opportunity for security companies to present their technologies to accomplished security executives on the front line.
The security companies have the chance to convince the CISOs to select their technologies.
It's sink or swim.
Security Current's Vic Wheatman speaks with Jeff Hussey, founder and CEO of Tempered Networks, one of the participants in this sponsored podcast on why present in this forum.
A practitioners tips on being a successful leader
Sharing information on cyber threats
Are technical audits effective?
Vic Wheatman Speaks with Gartner's Dr. Anton Chuvakin
How big a market is Security Analytics? If you ask our guest, Gartner Research VP Dr. Anton Chuvakin you'll hear that there actually is no specific or defined market called Security Analytics. He says that while there are technology providers offering products or services so labeled they all do somewhat different things in different ways.
There are vendors who look at packets, others that look at logs or roles and those that look at malware among other things and they all carry a label of analytics but according to Dr. Chuvakin the fact that all of the vendors do different things in different ways indicates that there is no market that you can just go to and buy a security analytics product.
By Gary Hayslip
In this last discussion we will cover some educational sites and a couple of sites that have useful tools that I have used over the years to recertify or increase my knowledge of new technologies.
We will start with education sites. I am first going to list some adult education sites located here in San Diego as examples of schools where you can go to work on a certification or learn a new skill.
I have found many of these two-year colleges and adult education facilities to have excellent labs for working for example on Cisco certifications or the latest Network/Cloud Security certifications. So let’s take a look at a couple of such organizations in San Diego, and similar ones in your area and see what courses they offer.