Search for tag: "cybersecurity forward"

Cybersecurity Forward 2021 Review/Networking with Tim Bohn

The first 30 minutes of this session will highlight the key takeaways from this year’s Cybersecurity Forward technical, strategic, and practical presentations. Join us as we discuss…

From  Laurel Belman on October 4th, 2021 0 likes 2 plays 0  

Shift Left- Automated Security Scanning Integration with Brian Hill, Tomomi Imamura, Benjamin Sousa, and Vanessa Taulbee

Although DevOps is quickly changing the way that organizations build and deploy web applications using technologies such as Docker containers, there are still the challenges of successfully…

From  Laurel Belman on September 29th, 2021 0 likes 3 plays 0  

Adversary and Defender Techniques with Matthew Harvey, Nina Padavil, and Josh Sutfin

This presentation will cover three threat intelligence trends pertaining to criminal cyber threat actors who target academic organizations and their associated tactics, techniques, & procedures.…

From  Laurel Belman on September 21st, 2021 0 likes 47 plays 0  

AI In Cybersecurity: Machine Learning And Natural Language Processing To Augment Your Security Tools with Anthony DiDonato

This session will provide a brief overview of what artificial intelligence (“AI”) is and how it can be used to augment your existing security tools. It will provide some background on AI,…

From  Laurel Belman on September 13th, 2021 0 likes 15 plays 0  

The Mystery And Misinformation Behind Credit Card Theft with Kevin Bong

Almost everyone deals with credit card fraud, whether as an individual having fraudulent charges show up on an account or as a business dealing with chargebacks or stolen card notifications. However,…

From  Laurel Belman on September 8th, 2021 0 likes 5 plays 0  

What Is Zero Trust? The Role Of Continuously Assessing Device And Identity Health with Eric Wing

The world is changing, and our traditional security models have failed to keep up. The Zero Trust model is unique because it requires verification of everyone either inside or outside your network,…

From  Laurel Belman on August 17th, 2021 0 likes 11 plays 0  

Privacy...Friend, or Foe? with Ken Ries

During this session, we will explore the roots of privacy in the United States and the rise of state-sponsored privacy legislation. We will also explore what the third-party problem is and…

From  Laurel Belman on August 10th, 2021 0 likes 11 plays 0  

Break The Silos: Building A Unified Framework For Cybersecurity Ops with Praveen Yeleswarapu

Tools are only as powerful as their ability to communicate with one another, and this is true for cybersecurity as well. It is time to empower people in Infosec and cybersec roles with data that…

From  Laurel Belman on August 2nd, 2021 0 likes 13 plays 0  

Prioritizing Enterprise Risks Using Data Normalization with Ken Squires

Many organizations have competing risk assessment remediation priorities with business objectives and regulatory requirements that are difficult to compare. Normalization techniques can collect and…

From  Laurel Belman on July 21st, 2021 0 likes 24 plays 0  

"Credential Tiering" with Peter Vander Velden

How can we help reduce the risk associated with privileged accounts? The concept of Credential Tiering can help. This presentation will provide an overview of Credential Tiering including…

From  Laurel Belman on July 19th, 2021 0 likes 13 plays 0  

Cybersecurity Forward- Backward and Forward

What threads tie this year’s Cybersecurity Forward lectures together? What ideas and themes were explored? What might be in store for Cybersecurity Forward 2021 and what’s planned for…

From  Laurel Belman on October 16th, 2020 0 likes 6 plays 0  

Breaking In, Taking Action Women of Cybersecurity

Join us for an engaging panel of six women, each at various stages in their careers from UW–Madison, the University of Indiana and the Wisconsin Department of Public Instruction, where they…

From  Laurel Belman on October 8th, 2020 0 likes 35 plays 0  

Modern Penetration Testing - Common Intrusion Methods

Learn how the modern approaches to penetration testing are discovering new-age (and old-age) problems with IT systems. Offensive testing techniques are evolving. DevOps, cloud environments, and…

From  Laurel Belman on September 24th, 2020 0 likes 34 plays 0  

The FitBit Economy MicroLearning and Culture Change

The time for effective cybersecurity education has never been more critical to the safety of many organizations, but the traditional model of cybersecurity education has become less effective.…

From  Laurel Belman on September 17th, 2020 0 likes 25 plays 0  

You Have Been Hit By a Cyber Attack: What do you do?

What can you do if your organization is the victim of a cyber attack? Join this interactive conversation with Bill Nash, WI Chief Information Security Officer, and Annette Smith, WI DPI Director of…

From  Laurel Belman on September 10th, 2020 0 likes 46 plays 0  

Your Fusion Center and You

Cybersecurity is often described as a “team sport”, requiring the efforts of many team members to move forward. This session will discuss the Wisconsin Statewide Intelligence…

From  Laurel Belman on September 4th, 2020 0 likes 32 plays 0