Search for tag: "cybersecurity"
Cybersecurity Governance, Risk, & Compliance (GRC) – What is it, and why should I care?Cybersecurity Governance, Risk, and Compliance (GRC) is often the overlooked and misunderstood subset of cybersecurity. GRC is a way for organizations to meet compliance, manage risk, and provide…
From Laurel Belman
0 likes
47 plays
|
|
Easy wins in security for schools and small businessesWhat threats do school districts and small businesses face and how can they be prevented? Based on information gleaned from audits performed by UW—Whitewater on local K-12 schools, we’ll…
From Laurel Belman
0 likes
18 plays
|
|
Cybersecurity Awareness Training Case StudyThe University of Wisconsin System and University of Wisconsin-Madison will discuss the history of their training and implementation, as well as their use of phishing simulations. Presenters: Jim…
From Laurel Belman
0 likes
35 plays
|
|
Zero Trust: It's a concept, not a productWe have all been getting email from vendors selling the latest and greatest security product—Zero Trust. The problem is that you cannot buy zero trust, you have to build it. My talk will…
From Laurel Belman
0 likes
25 plays
0
|
|
“Better Cybersecurity Through Inclusive Language and Practices” presented by Amanda Thornton and Jason ErdmannLearn how terminology and practices in the cyber world are changing for the better by becoming more inclusive and respectful in this 10/27/2021 presentation by Amanda Thornton and Jason Erdmann.
From Laurel Belman
0 likes
15 plays
0
|
|
“Securing Your Home Work Environment” presented by Sean Bossinger and Jason ErdmannLearn how to keep your data protected whether you’re working at home or from the office in this 10-06-2021 presentation by Sean Bossinger and Jason Erdmann.
From Laurel Belman
0 likes
15 plays
0
|
|
Cybersecurity Forward 2021 Review/Networking with Tim BohnThe first 30 minutes of this session will highlight the key takeaways from this year’s Cybersecurity Forward technical, strategic, and practical presentations. Join us as we discuss…
From Laurel Belman
0 likes
10 plays
0
|
|
Shift Left- Automated Security Scanning Integration with Brian Hill, Tomomi Imamura, Benjamin Sousa, and Vanessa TaulbeeAlthough DevOps is quickly changing the way that organizations build and deploy web applications using technologies such as Docker containers, there are still the challenges of successfully…
From Laurel Belman
0 likes
14 plays
0
|
|
Adversary and Defender Techniques with Matthew Harvey, Nina Padavil, and Josh SutfinThis presentation will cover three threat intelligence trends pertaining to criminal cyber threat actors who target academic organizations and their associated tactics, techniques, & procedures.…
From Laurel Belman
0 likes
79 plays
0
|
|
AI In Cybersecurity: Machine Learning And Natural Language Processing To Augment Your Security Tools with Anthony DiDonatoThis session will provide a brief overview of what artificial intelligence (“AI”) is and how it can be used to augment your existing security tools. It will provide some background on AI,…
From Laurel Belman
0 likes
27 plays
0
|
|
The Mystery And Misinformation Behind Credit Card Theft with Kevin BongAlmost everyone deals with credit card fraud, whether as an individual having fraudulent charges show up on an account or as a business dealing with chargebacks or stolen card notifications. However,…
From Laurel Belman
0 likes
23 plays
0
|
|
What Is Zero Trust? The Role Of Continuously Assessing Device And Identity Health with Eric WingThe world is changing, and our traditional security models have failed to keep up. The Zero Trust model is unique because it requires verification of everyone either inside or outside your network,…
From Laurel Belman
0 likes
18 plays
0
|
|
Privacy...Friend, or Foe? with Ken RiesDuring this session, we will explore the roots of privacy in the United States and the rise of state-sponsored privacy legislation. We will also explore what the third-party problem is and…
From Laurel Belman
0 likes
13 plays
0
|
|
Break The Silos: Building A Unified Framework For Cybersecurity Ops with Praveen YeleswarapuTools are only as powerful as their ability to communicate with one another, and this is true for cybersecurity as well. It is time to empower people in Infosec and cybersec roles with data that…
From Laurel Belman
0 likes
17 plays
0
|
|
Prioritizing Enterprise Risks Using Data Normalization with Ken SquiresMany organizations have competing risk assessment remediation priorities with business objectives and regulatory requirements that are difficult to compare. Normalization techniques can collect and…
From Laurel Belman
0 likes
46 plays
0
|
|
"Credential Tiering" with Peter Vander VeldenHow can we help reduce the risk associated with privileged accounts? The concept of Credential Tiering can help. This presentation will provide an overview of Credential Tiering including…
From Laurel Belman
0 likes
64 plays
0
|