All episodes
-
De-Mystifying Generative AI
Byron McNaught, Principal Technical Mktg Mngr, F5; Brandon Dunlap, Moderator
Hey, LLM, How Much Trouble ?Are We In?
Is Generative AI simply the most modern of modern apps? Are we prepared as an industry to safely unlock its potential? Explore the promises and perils of GenAI, including key considerations for visibility and security across highly-connected ecosystems. Dive into real-world examples of how GenAI can go awry through analysis of recent vulnerabilities and attacks on AI-based applications.On January 25, 2024 at 1:00 p.m. Eastern/10:00 a.m. Pacific, join F5 and ISC2 to hear more about:
• The business and societal impacts of GenAI
• Important considerations for protecting the conduit to AI workloads: app and API interfaces
• Top security and safety risks including The OWASP Top 10 for Large Language Model Applications
(Disclaimer: this webinar is not generated by AI (but it could be)!) -
Prepare for the E-pocalypse: New Email Authentication Rules
Kevin San Diego, Sr. Director, Prod Management; Craig Temple, Sr. Prod Mktg Manager, ProofPoint; Brandon Dunlap, Moderator
To protect users from email fraud, Google, Yahoo and Apple are implementing new rules that could block all unauthenticated customer emails from the inbox or send them directly to the SPAM folder.
The requirements will take effect as early as February 2024. Are you ready?
Join Proofpoint and ISC2 on February 8, 2024 at 1:00 p.m. Eastern/10:00 a.m. Pacific to learn how to meet the new email authentication requirements, ensure the deliverability of your critical emails, and safeguard your brand and your business from email fraud.
-
Trends from Hyperproof's 2024 IT Risk and Compliance Benchmark Report
Kayne McGladrey, Field CISO, Hyperproof; Rishi Singh, Director, GRC, Publicly-Traded Company; Brandon Dunlap, Moderator
Is your IT risk and compliance program ready for 2024 and beyond?
For the last five years, Hyperproof has asked over 1,000 GRC professionals about their pain points, IT risk and compliance budgets, staffing, risk management best practices, and much more. We then compare results from the previous year, and provide an in-depth view of the market’s current state in our annual benchmark report. The 2024’s IT Risk and Compliance Benchmark report highlights a fascinating change in the overarching narrative of cybersecurity: respondents and key stakeholders from other departments are thinking about cybersecurity compliance as a key competitive differentiator rather than just a cost center.
Join Hyperproof and ISC2 April 9, 2024 at 1:00 p.m. Eastern/10:00 a.m. Pacific to learn:
-How unifying risk and compliance data affected survey respondents’ ability to mitigate risk, improve cybersecurity, and avoid breaches
-Key trends for cybersecurity in 2024
-How the market has responded to AI risks in 2023 and how cybersecurity professionals plan on leveraging AI in 2024
-Why cybersecurity decision-making is becoming more collaborative with an integrated view of risk and compliance data. -
Effectively Safeguarding Your APIs: From Discovery to Defense
Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai
Nearly one-third of web attacks targeted APIs in 2023. APIs are now vital for modern applications, enabling seamless communication and data exchange between systems. As their use grows across various industries to improve efficiency and customer experiences, APIs also become prime targets for attackers. Vulnerabilities in APIs can lead to data breaches and abuse of business logic, presenting major challenges to organizations.
On 23 April 2024 at 1:00 p.m. SGT join Akamai and ISC2 as we discuss findings from the State of the Internet (SOTI) report, Lurking in the Shadows: Attack Trends Shine Light on API Threats.
We will discuss:
-Latest API attack trends observed in Asia Pacific
-Top industry sectors being attacked
-Top cyber threats targeting APIs and their implications
-Best practices and practical strategies for fortifying your APIs against malicious activities
Presenter: Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai
Moderator: Emily Kong, CISSP, CCSP -
Catch 'Em All: Defeating Pikabot's Advanced Evasion Attempts
Emre Güler, Threat Researcher/VMRay; Brandon Dunlap, Moderator
Geared towards security leaders and threat analysts alike, this session focuses on the evolving threat landscape as exemplified by Pikabot – a malware/loader adept at circumventing the latest endpoint protection strategies. Our session will shed light on Pikabot's sophisticated use of indirect system calls and other evasion tactics that challenge traditional detection methods. Attendees will gain strategic insights into enhancing their security posture and staying ahead of similar threats. Commonly delivered via phishing, and used by threat actors like TA577 to provide initial access to ransomware groups, this specific malware family is worth peeling back the layers.
On 14 May 2024 at 1:00 p.m. BST, join VMRay and ISC2 to learn about:
-Pikabot’s Evasion Methods: Dive into how Pikabot’s use of obfuscation complicates detection, and what this means for ongoing security operations.
-Strategic Implications of Evasion Techniques: Understand the broader impact of Pikabot’s evasion tactics on organizational security strategies and how these can undermine significant investments in endpoint protection.
-Future-Proofing Your Security Measures: Explore how cutting-edge, behavior-based detection systems can provide a robust defense against sophisticated malware and discuss strategies for integrating these technologies into existing security frameworks.