News at the intersection of IT security and society | June 23rd, 2018
This newsletter is sponsored by:
“I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We’ve created life in our own image.”
– Stephen Hawking
Las Vegas... Here We Come!
We added one more event to cover "HACKING DIVERSITY"
Follow us on the road again, this time to Las Vegas, Nevada where we will be covering:
Black Hat USA 2018 (August 4-9)
DEFCON 26 and Hacking Diversity (August 9-12)
WHAT WE'LL BE DOING AS PART OF OUR COVERAGE
Chats on the Road to Las Vegas
A variety of Podcast and Webcast Conversations
Multiple ITSPmagazine Talk Shows
Live Expert Panels with BrightTALK
Check the page, it has been updated with live panels and Talk Show topics...
plus more stuff!
In this third and final episode, W Risk Group founder Karen Worstell chats with ITSPmagazine’s Selena Templeton about the stresses, frustrations and victories along her journey as she got into, dropped out of, and then returned to an InfoSec life. Spoiler alert – it has a happy ending!
In today's episode, Sean Martin digs deeper into the idea that risk and security management for SMBs is possible. Sean gets some tremendous insights from Monica Bush who shares how she joined Nintex to help bootstrap their risk, security and compliance program, taking it from its infancy stage to one of growth and continued improvement.
Small & Medium Business Cybersecurity Education
Webcast Series
We just recorded Episode VI of the series and it should be ready to watch and listen to soon. Get caught up by watching the full series.
Yes! You can earn 1 CPE credit for each SMB webcast you watch on ITSPmagazine!
Sponsored Content
Join Gigamon and (ISC)² for a discussion on how visibility into your application traffic is elemental to security, how application metadata can provide the context of potential threat events and to more easily enforce corporate compliance.
With the GDPR having begun its reign as the most comprehensive digital privacy legislation that the world has ever seen, we’ve officially entered a new era of data privacy rights and regulations. But it’s also a compliance burden to many businesses. Here are the four biggest rewards that businesses can reap by complying with privacy regulations like the GDPR – even if they don’t need to. | by KJ Dearie
Organizations of all sizes are vulnerable to cybersecurity threats, and they need to be able to detect indicators of compromise in order to address risks and respond to attacks. Integrating SIEM and SOAR combines the power of each to create a more robust, efficient and responsive security program – which ultimately allows security teams to avoid alert fatigue. | by Dario Forte
Enterprises are struggling to find secure ways to allow trusted users access sensitive data. Traditional security models designed to protect limited entry points to the data are no longer viable. These best practices, presented by Gurucul’s CEO, Saryu Nayyar, can help address the challenges. | by Saryu Nayyar
Lots Of Ways To Earn Continuing Professional Education Credits!