{"id":390,"date":"2020-04-24T11:52:39","date_gmt":"2020-04-24T18:52:39","guid":{"rendered":"https:\/\/kern.issa.org\/?page_id=390"},"modified":"2023-12-04T10:44:32","modified_gmt":"2023-12-04T18:44:32","slug":"past-meetings","status":"publish","type":"page","link":"https:\/\/kern.issa.org\/?page_id=390","title":{"rendered":"Past Meetings"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>General Meeting November 15th, 2023<\/strong><br>Presenter: Forta<\/p>\n\n\n\n<p><strong>Meeting Topic:\u00a0<\/strong> Planning for the Future State of Data Protection.\u00a0<\/p>\n\n\n\n<p>IT organizations today face three main challenges: migrating to the cloud, getting the most out of their cloud investment, and protecting their investment against threats of ransomware and downtime.<\/p>\n\n\n\n<p>Flexential and Fortra\u2019s Alert Logic discussed the important components of managing both while meeting today\u2019s budget challenges and organizational security requirements around data protection, detection and response.<\/p>\n\n\n\n<p>.\u00a0<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting June 7th, 2023<\/strong><br>Presenter: Proofpoint, ePlus<\/p>\n\n\n\n<p><strong>Meeting Topic:&nbsp;<\/strong>Threat landscape update with an emphasis on MFA evasion risk.&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting March 8th, 2023<\/strong><br>Presenter: Check Point<\/p>\n\n\n\n<p><strong>Meeting Topic:<\/strong>&nbsp; Check Point MDR specialists, with the assistance of Check Point field security engineering discussed the multitude of thoughts and ideas customers must consider when:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Building out their own fully functioning 7&#215;24 security operations<\/li>\n\n\n\n<li>Hiring out their \u201centire\u201d security operations<\/li>\n\n\n\n<li>Hiring a security operation service to fill their current security operations gap a client might have<br><\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting January 11th, 2023<\/strong><br>Presenter: Palo Alto Networks<\/p>\n\n\n\n<p><strong>Meeting Topic:<\/strong>&nbsp;Securing the Journey to the Cloud<\/p>\n\n\n\n<p>Cloud applications are at the heart of digital transformation. With their scalability, ease of operationalization, and better resource utilization, it\u2019s no wonder why researchers and IT departments are turning to the cloud. With all of the benefits of cloud computing come challenges and risks so it is critical to be able to secure the crown jewel, your data.<\/p>\n\n\n\n<p>Learned how you can ensure security and privacy of your organization&#8217;s cloud computing efforts using the cloud smart strategy and leveraging the low hanging fruit of cybersecurity best practices.<\/p>\n\n\n\n<p>This session demystified the cloud, paint the picture of the cloud journey, and armed attendees with best practices and strategies to secure your organization&#8217;s most sensitive assets and data in the cloud. <\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting September 14th, 2022<\/strong><br>Presenter: eSentire<\/p>\n\n\n\n<p><strong>Meeting Topic:<\/strong>&nbsp;Demystifying MDR<\/p>\n\n\n\n<p>In this presentation, Mike Sci, Senior Solutions Architect for eSentire, provided insight on how cybersecurity is really a big data problem and show you how to be an educated consumer of MDR (Managed Detection and Response) and managed security solutions. We learned to evaluate and define MDR solutions to separate fact from fiction in a rapidly growing security segment. He showed us how eSentire MDR provides full spectrum visibility, sorting through the tsunami of data, providing real time detection and embedded incident response.<\/p>\n\n\n\nngg_shortcode_0_placeholder\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting June 22, 2022<\/strong><br>Presenter: Red Canary<\/p>\n\n\n\n<p><strong>Speaker Bio:  <\/strong>Eleysia Friend (Customer Solutions Engineer&nbsp;with Red Canary&nbsp;) has lived in many places throughout the years but currently lives in Las Vegas, Nevada. She is a recent addition to Red Canary and brings with her solid experience in Incident Detection and Response as well as Enterprise Security Operations. Outside of work Eleysia&nbsp;enjoys hiking, river floating, kayaking, great food and travel.&nbsp;<\/p>\n\n\n\n<p>Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn\u2019t walk alone. It\u2019s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.<\/p>\n\n\n\n<p>In this talk, we\u2019ll extensively reference Red Canary\u2019s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.<\/p>\n\n\n\n<p>Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A better understanding of the threats and tools that commonly precede a ransomware infection<\/li>\n\n\n\n<li>Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware<\/li>\n\n\n\n<li>Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats<\/li>\n\n\n\n<li>Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team<\/li>\n<\/ul>\n\n\n\n<p><em>If you would like to learn more about Red Canary\u2019s 2022 Threat Detection Report, <a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__redcanary.com_threat-2Ddetection-2Dreport_&amp;d=DwMGaQ&amp;c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&amp;r=ONobyha7JCYERCuI-bBOHtrV4hpp7kx0-Uqz9fwx_Rc&amp;m=hsVhYXp-0oPwKFeLWvJLCppccgcET3ccCe76d7q1npo&amp;s=zqiC3fe2QVJqcHnMUKIvkA2SpXLZDh-PtimmsWCqsbo&amp;e=\" target=\"_blank\">check it out here<\/a>.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting April 13th, 2022<\/strong><br>Presenter: Grip Security<\/p>\n\n\n\n<p>Ken Granger discussed how the current SaaS Landscape is causing blind spots and unchecked risk, and innovative approaches that can help.<\/p>\n\n\n\n<p><strong>Speaker Bio:<\/strong>&nbsp;Ken Granger, Director of Solution Engineering, US West<\/p>\n\n\n\nngg_shortcode_1_placeholder\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting December 1st, 2021<\/strong><br>Presenter: Palo Alto<\/p>\n\n\n\n<p>Zero Trust experts explained the critical connection between Zero Trust and identity best practices and speeding your Zero Trust journey.  A Zero Trust approach to network security is critical for safeguarding productivity in this new era of accelerated digital transformation, expanded hybrid work, and increased migration of apps and data to the cloud.<\/p>\n\n\n\n<p>What we covered:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What it means to be a Zero Trust enterprise<\/li>\n\n\n\n<li>How identity is foundational to a Zero Trust approach<\/li>\n\n\n\n<li>How to integrate strong identity best practices to fuel your Zero Trust journey<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting June 2nd, 2021<\/strong><br>Presenter: iPRESIDIUM<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Current Threat Landscape and the Risks Organizations Face<\/li>\n\n\n\n<li>Discuss Proactive Threat Hunting on an organization\u2019s endpoints<\/li>\n\n\n\n<li>Best practices\/Framework<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting March 3rd, 2021<\/strong><br>Presenter: Sophos<\/p>\n\n\n\n<p class=\"has-text-align-left\">Cyber Security Threats and Sophos MTR<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting January 22, 2021<\/strong><br>Presenter: Palo Alto Networks<\/p>\n\n\n\n<p class=\"has-text-align-left\">Palo Alto Networks Presents: Crypsis Overview<br>The Ultimate Test Drive where we got hands-on experience with Palo Alto Networks Cloud-Delivered Security Services. In this free workshop we learned the value of preventing and detecting unknown malware, zero-day exploits, APTs, and other advanced cyber attacks and how to tie them to specific users and devices so they can be stopped efficiently.<\/p>\n\n\n\n<p>We also learned how to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Go beyond traditional IPS to prevent all known threats across all traffic in a single pass<\/li>\n\n\n\n<li>Modern malware protection with ML-powered Analysis<\/li>\n\n\n\n<li>Use predictive analytics to disrupt attacks that use DNS<\/li>\n\n\n\n<li>Enable safe access to the internet for users in any location by preventing known and new malicious websites<\/li>\n\n\n\n<li>Rapidly identify and protect all unmanaged IoT and OT devices with a machine-learning-based, signature-less approach<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting September 30th, 2020<\/strong><br>Presenter: Crowdstrike<\/p>\n\n\n\n<p>It\u2019s clear that cyber crime and cyber criminals are not abating during the global upheaval caused by COVID-19. We recognize that remote work is still the norm for many organizations, especially as some states loosen\/tighten restrictions. This situation begs important questions: Is your organization prepared to detect, respond and recover from a cyber incident during this time? Has the move to remote working negatively impacted your security operations and your ability to protect your customers, employees, and environment?<br><br><strong><u>In this session, we learned:<\/u><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How the team gains visibility into endpoints and is able to contain systems outside the corporate network<\/li>\n\n\n\n<li>The advantages of using Real Time Response to remotely remove malware without the need to rebuild systems<\/li>\n\n\n\n<li>How you can recover your environment from advanced threats and attacks and establish a maximized security posture<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting June 3rd, 2020<\/strong><br>Presenter: Juniper \u2013 Dwann Hall and Jeff Bird<\/p>\n\n\n\n<p>Today\u2019s rapidly evolving threat landscape is outpacing the efficiency of many current security solutions. Currently, about 80% of all Web traffic is encrypted. Without any insight into what the encrypted Web traffic is doing, it leaves a major attack vector for criminals to exploit your network. New Zero-Day malware variants are launched every day. NGFW features &amp; Anti-Virus Signatures cannot see threats hidden in https encrypted Web traffic. Attacks are more prevalent in encrypted Web traffic these days. Encrypted Web traffic attacks can affect your business at any moment in time. <\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>General Meeting March 4th, 2020<\/strong><br>Presenter: Mike Neary<br>Special Speakers: Local FBI Agent<\/p>\n\n\n\nngg_shortcode_2_placeholder\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>General Meeting November 15th, 2023Presenter: Forta Meeting Topic:\u00a0 Planning for the Future State of Data Protection.\u00a0 IT organizations today face three main challenges: migrating to <a class=\"mh-excerpt-more\" href=\"https:\/\/kern.issa.org\/?page_id=390\" title=\"Past Meetings\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":12,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-390","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/kern.issa.org\/index.php?rest_route=\/wp\/v2\/pages\/390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kern.issa.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kern.issa.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kern.issa.org\/index.php?rest_route=\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kern.issa.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=390"}],"version-history":[{"count":26,"href":"https:\/\/kern.issa.org\/index.php?rest_route=\/wp\/v2\/pages\/390\/revisions"}],"predecessor-version":[{"id":632,"href":"https:\/\/kern.issa.org\/index.php?rest_route=\/wp\/v2\/pages\/390\/revisions\/632"}],"wp:attachment":[{"href":"https:\/\/kern.issa.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}