• 2019 Webinar Jan Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • 2019 Seattle Symposium Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Portland Symposium Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 New York Symposium IAM Strategies that Work

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Washington DC Symposium Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Minneapolis Symposium IAM Strategies that Work

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Denver Symposium Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 San Francisco Symposium How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • 2019 Nashville Symposium Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Webinar Feb 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • 2019 Atlanta Symposium Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Charlotte Symposium Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Los Angeles Symposium Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Chicago Symposium Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Webinar March Vendor Optimization

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • 2019 Webinar March Using MITRE ATT&CK™

    , MITRE ATT&CK™

    The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It’s fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum will walk you though the framework’s components and how to put them to the best use when doing assessments in your organization.

  • 2019 Philadelphia Symposium Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • 2019 Boston Symposium IAM Strategies that Work

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Dallas Information Security Forum

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • 2019 Dallas Vendor Dinner

    , Dallas

    We invite you to continue your IANS Dallas Information Security Forum experience by attending a dinner event.

  • 2019 Webinar Jan Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • 2019 Seattle Symposium Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Portland Symposium Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 New York Symposium IAM Strategies that Work

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Washington DC Symposium Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Minneapolis Symposium IAM Strategies that Work

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Denver Symposium Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 San Francisco Symposium How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • 2019 Nashville Symposium Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Webinar Feb 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • 2019 Atlanta Symposium Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Charlotte Symposium Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Los Angeles Symposium Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Chicago Symposium Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Webinar March Vendor Optimization

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • 2019 Webinar March Using MITRE ATT&CK™

    , MITRE ATT&CK™

    The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It’s fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum will walk you though the framework’s components and how to put them to the best use when doing assessments in your organization.

  • 2019 Philadelphia Symposium Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • 2019 Boston Symposium IAM Strategies that Work

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Dallas Information Security Forum

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • 2019 Dallas Vendor Dinner

    , Dallas

    We invite you to continue your IANS Dallas Information Security Forum experience by attending a dinner event.

  • 2019 Webinar Jan Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • 2019 Seattle Symposium Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Portland Symposium Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 New York Symposium IAM Strategies that Work

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Washington DC Symposium Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Minneapolis Symposium IAM Strategies that Work

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Denver Symposium Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 San Francisco Symposium How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • 2019 Nashville Symposium Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Webinar Feb 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • 2019 Atlanta Symposium Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Charlotte Symposium Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Los Angeles Symposium Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Chicago Symposium Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Webinar March Vendor Optimization

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • 2019 Webinar March Using MITRE ATT&CK™

    , MITRE ATT&CK™

    The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It’s fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum will walk you though the framework’s components and how to put them to the best use when doing assessments in your organization.

  • 2019 Philadelphia Symposium Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • 2019 Boston Symposium IAM Strategies that Work

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Dallas Information Security Forum

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • 2019 Dallas Vendor Dinner

    , Dallas

    We invite you to continue your IANS Dallas Information Security Forum experience by attending a dinner event.

  • 2019 Webinar Jan Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • 2019 Seattle Symposium Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Portland Symposium Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 New York Symposium IAM Strategies that Work

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Washington DC Symposium Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Minneapolis Symposium IAM Strategies that Work

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Denver Symposium Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 San Francisco Symposium How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • 2019 Nashville Symposium Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Webinar Feb 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • 2019 Atlanta Symposium Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Charlotte Symposium Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Los Angeles Symposium Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Chicago Symposium Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Webinar March Vendor Optimization

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • 2019 Webinar March Using MITRE ATT&CK™

    , MITRE ATT&CK™

    The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It’s fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum will walk you though the framework’s components and how to put them to the best use when doing assessments in your organization.

  • 2019 Philadelphia Symposium Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • 2019 Boston Symposium IAM Strategies that Work

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Dallas Information Security Forum

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • 2019 Dallas Vendor Dinner

    , Dallas

    We invite you to continue your IANS Dallas Information Security Forum experience by attending a dinner event.

  • 2019 Webinar Jan Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • 2019 Seattle Symposium Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Portland Symposium Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 New York Symposium IAM Strategies that Work

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Washington DC Symposium Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Minneapolis Symposium IAM Strategies that Work

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Denver Symposium Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 San Francisco Symposium How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • 2019 Nashville Symposium Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Webinar Feb 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • 2019 Atlanta Symposium Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Charlotte Symposium Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Los Angeles Symposium Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Chicago Symposium Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Webinar March Vendor Optimization

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • 2019 Webinar March Using MITRE ATT&CK™

    , MITRE ATT&CK™

    The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It’s fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum will walk you though the framework’s components and how to put them to the best use when doing assessments in your organization.

  • 2019 Philadelphia Symposium Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • 2019 Boston Symposium IAM Strategies that Work

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Dallas Information Security Forum

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • 2019 Dallas Vendor Dinner

    , Dallas

    We invite you to continue your IANS Dallas Information Security Forum experience by attending a dinner event.

  • 2019 Webinar Jan Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • 2019 Seattle Symposium Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Portland Symposium Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 New York Symposium IAM Strategies that Work

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Washington DC Symposium Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Minneapolis Symposium IAM Strategies that Work

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Denver Symposium Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 San Francisco Symposium How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • 2019 Nashville Symposium Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Webinar Feb 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • 2019 Atlanta Symposium Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Charlotte Symposium Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Los Angeles Symposium Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Chicago Symposium Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Webinar March Vendor Optimization

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • 2019 Webinar March Using MITRE ATT&CK™

    , MITRE ATT&CK™

    The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It’s fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum will walk you though the framework’s components and how to put them to the best use when doing assessments in your organization.

  • 2019 Philadelphia Symposium Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • 2019 Boston Symposium IAM Strategies that Work

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Dallas Information Security Forum

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • 2019 Dallas Vendor Dinner

    , Dallas

    We invite you to continue your IANS Dallas Information Security Forum experience by attending a dinner event.

  • 2019 Webinar Jan Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • 2019 Seattle Symposium Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Portland Symposium Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 New York Symposium IAM Strategies that Work

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Washington DC Symposium Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Minneapolis Symposium IAM Strategies that Work

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Denver Symposium Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 San Francisco Symposium How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • 2019 Nashville Symposium Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Webinar Feb 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • 2019 Atlanta Symposium Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Charlotte Symposium Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Los Angeles Symposium Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Chicago Symposium Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Webinar March Vendor Optimization

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • 2019 Webinar March Using MITRE ATT&CK™

    , MITRE ATT&CK™

    The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It’s fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum will walk you though the framework’s components and how to put them to the best use when doing assessments in your organization.

  • 2019 Philadelphia Symposium Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • 2019 Boston Symposium IAM Strategies that Work

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Dallas Information Security Forum

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • 2019 Dallas Vendor Dinner

    , Dallas

    We invite you to continue your IANS Dallas Information Security Forum experience by attending a dinner event.

  • 2019 Webinar Jan Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • 2019 Seattle Symposium Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Portland Symposium Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 New York Symposium IAM Strategies that Work

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Washington DC Symposium Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Minneapolis Symposium IAM Strategies that Work

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Denver Symposium Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 San Francisco Symposium How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • 2019 Nashville Symposium Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Webinar Feb 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • 2019 Atlanta Symposium Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Charlotte Symposium Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Los Angeles Symposium Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Chicago Symposium Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Webinar March Vendor Optimization

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • 2019 Webinar March Using MITRE ATT&CK™

    , MITRE ATT&CK™

    The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It’s fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum will walk you though the framework’s components and how to put them to the best use when doing assessments in your organization.

  • 2019 Philadelphia Symposium Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • 2019 Boston Symposium IAM Strategies that Work

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Dallas Information Security Forum

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • 2019 Dallas Vendor Dinner

    , Dallas

    We invite you to continue your IANS Dallas Information Security Forum experience by attending a dinner event.

  • 2019 Webinar Jan Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • 2019 Seattle Symposium Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Portland Symposium Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 New York Symposium IAM Strategies that Work

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Washington DC Symposium Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Minneapolis Symposium IAM Strategies that Work

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Denver Symposium Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 San Francisco Symposium How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • 2019 Nashville Symposium Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Webinar Feb 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • 2019 Atlanta Symposium Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Charlotte Symposium Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • 2019 Los Angeles Symposium Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Chicago Symposium Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • 2019 Webinar March Vendor Optimization

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • 2019 Webinar March Using MITRE ATT&CK™

    , MITRE ATT&CK™

    The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) Framework is “a globally-accessible knowledge base of adversary tactics and techniques” that is “open and available to any person or organization for use at no charge.” It’s fast becoming the go-to model for known cyber adversary behavior, reflecting the phases of the attack lifecycle as well as commonly targeted platforms. In this webinar, TrustedSec CSO Practice Lead Rockie Brockway and TrustedSec Senior Consultant Rick Yocum will walk you though the framework’s components and how to put them to the best use when doing assessments in your organization.

  • 2019 Philadelphia Symposium Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • 2019 Boston Symposium IAM Strategies that Work

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • 2019 Dallas Information Security Forum

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • 2019 Dallas Vendor Dinner

    , Dallas

    We invite you to continue your IANS Dallas Information Security Forum experience by attending a dinner event.

Check out IANS other upcoming events