Brand Yourself for Success in Your Cybersecurity Career

Oct 27, 2023 10:35am ‐ Oct 27, 2023 11:35am

Credits: None available.

Learn how to build and manage a strong personal brand that helps you represent your true self while advancing your cybersecurity career. We’ll discuss how to stay relevant, authentic and effective in your personal branding efforts, ultimately helping you to achieve your professional goals. Get new strategies to showcase your personal brand to your network. You’ll learn how to effectively communicate your personal brand through various channels, and how to leverage your network to advance your career.

Learning Objectives:
  • Build and manage a strong personal brand to advance your cybersecurity career.
  • Communicate your personal brand through various channels.
  • Leverage your network to advance your career.

Managing Up: Communication Strategies for Effective Board Reporting

Oct 27, 2023 10:35am ‐ Oct 27, 2023 11:35am

Credits: None available.

What do Board directors really want to hear about technology and cybersecurity? How do you help the Board make good decisions that achieve organizational risk management goals with limited resources? This presenter will share insights from his real-life experience in reporting to and serving on corporate Boards and from his discussions with other Board directors. Learn what to lean into and what content to avoid to successfully communicate your message and ensure that the Board makes the best decisions.


WEBINAR: Using ChatGPT for Defensive Security Operations

Nov 29, 2023 10:00am ‐ Nov 29, 2023 11:00am

Credits: None available.

Learn how ChatGPT, a large language model developed by OpenAI, can be used in defensive security operations. Natural Language Processing (NLP) has proven to be a valuable tool in enhancing the effectiveness and efficiency of security operations. We’ll look at the potential use cases of ChatGPT in threat intelligence, security incident response and vulnerability management. You’ll learn about the integration of ChatGPT with existing security tools and workflows, as well as the benefits and challenges of utilizing NLP in security operations.

Learning Objectives:
  • Define the concept of Natural Language Processing and how it can be used in defensive security operations using ChatGPT.
  • Explain potential use cases of ChatGPT in defensive security operations, such as threat intelligence, incident response and vulnerability management.
  • Evaluate the benefits and challenges of using ChatGPT in security operations and explore ways to integrate it with existing tools and workflows.

WEBINAR: Hunting Cloud Supply Chain Threats Using Anomaly Detection

Jan 31, 2024 10:00am ‐ Jan 31, 2024 11:00am

Credits: None available.

Supply chain compromise is a black swan event in threat hunting and detection. While the impact can be practically unlimited, prevalence and frequency have, until recent years, been low enough that the threat model has often been considered unlikely or even theoretical. Hunting supply chain compromise is like cloud API threat hunting in that the difference between innocent and suspicious activity is a matter of nuance that cannot be expressed in simple query and/or search-based rules. It can be compared to insider threat hunting in that supply chain mechanisms and associated users may be inherently trusted, and any alerts may be dismissed. Anomaly detection and machine learning are becoming increasingly good tools for these kinds of hunts.

Learning Objectives:
  • Define patterns of credentialed access threat activity in cloud API logs.
  • Implement anomaly detection-based threat hunting techniques using cloud API logs.
  • Point out aspects of cloud supply chain risk that may be going unnoticed.