Rock Stars of Cybersecurity

Rock Stars of Cybersecurity
Tue, 1 December, 201504:24 PM, EDT (20:24, UTC)

The Rock Stars of Cybersecurity event in Austin drew nearly 200 attendees and 13 sponsors, and featured insightful presentations from more than a dozen speakers from government and industry amid a "rock star" atmosphere of music, food, exhibits, and collaboration. In the videos in this series, you will learn effective strategies for securing business operations, new and innovative approaches to responding to today's security threats, how government agencies are balancing cybersecurity threats and privacy, how to implement a secure enterprise architecture, big data's implications for security analytics, andfimplications of the cybersecurity skills shortage on the ability to respond to attacks.

This series is presented by the IEEE Computer Society. To learn more about Computer Society membership, please visit https://www.computer.org/web/membership

Panel: Is the Goal to Find a Cure, Prevention, or Both?

Panel: Is the Goal to Find a Cure, Prevention, or Both?01:08:25
0 views

Panel: Is the Goal to Find a Cure, Prevention, or Both?

The problems that have created the need for increased cybersecurity have often been compared to a chronic illness that continuously mutates as it plagues businesses and consumers alike. And like chronic illnesses of all kinds, the question of focusing on prevention or cure looms large in the debate about what to do about cybersecurity. This panel discusses what those two very different routes mean, as well as what consumers, businesses, Internet providers, and government and nongovernment agencies need to do to provide appropriate levels of safety and security at home and at work. Panelists: Joshua Greenbaum (moderator), Enterprise Applications Consulting; Tim Helming, DomainTools; Gus Hunt, CIA; Will Hurley, Chaotic Moon Studios; David Rockvam, Entrust

Security 2020: Predictable, Flexible, and Preemptive

Security 2020: Predictable, Flexible, and Preemptive00:42:14
0 views

Security 2020: Predictable, Flexible, and Preemptive

Hardly a day goes by without yet another report of a security breach or cyberattack. They�re increasing in frequency, ferocity, and stealth, and they can result in significant loss of revenues and reputation for organizations and even destabilize governments. Brett Wahlin, Chief Information Security Officer at HP, deconstructs the current security paradigm vis-a-vis today's business risk-centric environments, articulates the precept of a predictive behavior-based capability, and rounds it off with in-use discussion of HP's security solutions.

Building Security into Payment Systems and Applications

Building Security into Payment Systems and Applications00:30:20
0 views

Building Security into Payment Systems and Applications

Sarath Geethakumar, Senior Director of Global Information Security at VISA, explores how to build security into applications to ensure better, more reliable and scalable solutions. Rapid technology changes are forcing payment systems and solutions to constantly evolve. With global mobile adoption now at 91 percent, interconnected consumer devices and applications must perform faster and handle increasingly more complex and critical functionalities. This evolution not only paves the way for new and improved solutions, it also makes them lucrative and easy targets for attackers. Security as a development afterthought is not a scalable or secure approach for this rapidly evolving ecosystem. Building security into development methodologies ensures that even the weakest links can be secured in a timely and cost-effective manner.

Scaling a Software Security Initiative: Lessons from the BSIMM

Scaling a Software Security Initiative: Lessons from the BSIMM00:51:33
0 views

Scaling a Software Security Initiative: Lessons from the BSIMM

Learn important lessons in scaling software security touchpoints, and making them work efficiently and effectively in a global software security initiative. Gary McGraw, CTO at Cigital, focuses on the top three touchpoints�code review with a static analysis tool, architectural risk analysis, and penetration testing�discussing the tools, technologies, people, and processes for each. He addresses the issues head on, using examples from the 70+ Building Security in Maturity Model (BSIMM) firms and many years of real-world experience. (Firms in the BSIMM include Adobe, Aon, Bank of America, Box, Capital One, , EMC, Fannie Mae, Fidelity, Google, Intel, Intuit, JPMorgan Chase & Co., Microsoft, Nokia Siemens Networks, Qualcomm, Rackspace, Salesforce, Sallie Mae, SAP, Sony Mobile, Symantec, Telecom Italia, Thomson Reuters, Visa, VMware, and Wells Fargo.)

Strengthening the Security Ecosystem

Strengthening the Security Ecosystem00:55:05
0 views

Strengthening the Security Ecosystem

Strengthening the cyber ecosystem�s security and resilience requires a way to reduce the number of vulnerabilities as well as to automatically mitigate attack methodologies. Peter Fonash, CTO of the US Department of Homeland Security (DHS), describes DHS�s role in cybersecurity, summarizes existing programs to improve cybersecurity, discusses cybersecurity challenges, and presents initiatives to meet those challenges. The cybersecurity community has been forming a general consensus that defenses must be more automated, less reactive, more distributed, and better informed. Various ongoing activities are aimed at enabling automated collective action to strengthen the cyber ecosystem�s resilience and security in the face of advanced threats. These activities support a range of automated collective actions, including the sharing of indicators and information, the selection of courses of action, and the coordination of responses.

Security Frameworks, Strategies, & Mitigation Efforts

Security Frameworks, Strategies, & Mitigation Efforts00:47:45
0 views

Security Frameworks, Strategies, & Mitigation Efforts

Governments worldwide are looking to secure not only their environments but also critical infrastructures and the private-sector supply chains that keep government domains operating. Peter Allor, Cyber Security Strategist at IBM, discusses how security professionals can lead businesses to a more focused approach for securing these entities via risk-management processes for business operations. Moving IT away from traditional best-of-breed point product approaches, this non-regulatory approach differs from traditional compliance checklists and helps focus on the strategy of the business.

Rock Stars of Cybersecurity [6 Videos]

Rock Stars of CybersecurityThe Rock Stars of Cybersecurity event in Austin drew nearly 200 attendees and 13 sponsors, and featured insightful presentations from more than a dozen speakers from government and industry amid a "rock star" atmosphere of music, food, exhibits, and collaboration. In the videos in this series, you will learn?effective strategies for securing business operations, new and innovative approaches to responding to today's security threats, how government agencies are balancing cybersecurity threats and privacy, how to implement a secure enterprise architecture, big data's implications for security analytics, andfimplications of the cybersecurity skills shortage on the ability to respond to attacks.Included Videos