Difference between revisions of "ESWEpisode190"

From Security Weekly Wiki
Jump to navigationJump to search
(Added By Paul's Craptastic PPWorks Code)
(Added By Paul's Craptastic PPWorks Code)
Line 10: Line 10:
 
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
 
************************* DO NOT EDIT THIS SECTION. THIS IS AUTO-GENERATED BY PPWORKS. YOUR CHANGES WILL BE LOST! ***************************
 
-->
 
-->
= 1. News - Enterprise News - 12:30 PM  =
+
= 1. News - Living through a Ransomware Attack - 12:30 PM-01:00 PM  =
 
<!--   
 
<!--   
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
Line 16: Line 16:
  
  
 +
 +
=== Announcements ===
 +
<ul style="margin-left: 50px;">
 +
 +
<li>Join the Security Weekly Mailing List for webcast/virtual training announcements and to receive your personal invite to our Discord server by visiting securityweekly.com/subscribe and clicking the button to join the list! </li>
 +
 +
<li>With all the recent changes to BlackHat and DefCon, we realized we can keep doing what we do best - host virtual podcasts!  I’m proud to announce Hacker Summer Camp 2020, a Security Weekly Virtual, Live-Stream Event, August 3 - August 6, 2020. To reserve your slot now, visit: securityweekly.com/summercamp2020</li>
 +
 +
</ul>
  
 
=== Description ===
 
=== Description ===
  
 +
Having helped organizations identify, assess, remediate and recover from a significant ransomware attack, Scott describes the step by step process of events organizations will experience living through a ransomware attack and share some lessons learned for both dealing with an attack and for mitigating an organization&#39;s susceptibility to an attack.
 +
 +
 +
 +
 +
==Guest(s)==
 +
 +
 +
===Scott DeLong===
 +
<gallery mode="nolines" widths=175px heights=175px>
 +
 +
Image:ScottDeLong-0.jpg|'''Scott DeLong''' is Chief Information Officer/ Sr. Technology &amp; Security Officer at Scott DeLong &amp; Associates<br>
 +
 +
</gallery>
 +
Scott is a Chief Information Officer/ Sr. Technology &amp; Security Officer with twenty-six years of Global Information Technology Experience in the following areas: Strategy, Roadmaps and Governance, Security &amp; Compliance Frameworks and Solutions, Assessment, Architecture, Selection, Procurement, Design, Development, Implementation and Management, Business Engineering (BE), Transformation, Process Reengineering (BPR) and Process Management (BPM), Mergers, Acquisitions, Divestitures and Joint Ventures, Portfolio, Program and Project Management. His professional passion is to architect, develop, implement, manage and secure people-process-technology centric solutions to address business challenges and seize on opportunities.<br>
  
  
 
==Hosts==
 
==Hosts==
  
 +
 +
==[https://twitter.com/@maldermania Matt Alderman]'s Content: ==
 +
<gallery mode="nolines" widths=150px heights=150px>
 +
Image:MattAlderman-0.png
 +
</gallery>
 +
{{Template:ESW190NewsMattAlderman}}
  
 
==[https://twitter.com/@securityweekly Paul Asadoorian]'s Content: ==
 
==[https://twitter.com/@securityweekly Paul Asadoorian]'s Content: ==

Revision as of 19:34, 7 July 2020

Enterprise Security Weekly Episode #190 - July 08, 2020

Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe

1. News - Living through a Ransomware Attack - 12:30 PM-01:00 PM

Announcements

  • Join the Security Weekly Mailing List for webcast/virtual training announcements and to receive your personal invite to our Discord server by visiting securityweekly.com/subscribe and clicking the button to join the list!
  • With all the recent changes to BlackHat and DefCon, we realized we can keep doing what we do best - host virtual podcasts! I’m proud to announce Hacker Summer Camp 2020, a Security Weekly Virtual, Live-Stream Event, August 3 - August 6, 2020. To reserve your slot now, visit: securityweekly.com/summercamp2020

Description

Having helped organizations identify, assess, remediate and recover from a significant ransomware attack, Scott describes the step by step process of events organizations will experience living through a ransomware attack and share some lessons learned for both dealing with an attack and for mitigating an organization's susceptibility to an attack.



Guest(s)

Scott DeLong

Scott is a Chief Information Officer/ Sr. Technology & Security Officer with twenty-six years of Global Information Technology Experience in the following areas: Strategy, Roadmaps and Governance, Security & Compliance Frameworks and Solutions, Assessment, Architecture, Selection, Procurement, Design, Development, Implementation and Management, Business Engineering (BE), Transformation, Process Reengineering (BPR) and Process Management (BPM), Mergers, Acquisitions, Divestitures and Joint Ventures, Portfolio, Program and Project Management. His professional passion is to architect, develop, implement, manage and secure people-process-technology centric solutions to address business challenges and seize on opportunities.


Hosts

Matt Alderman's Content:

Articles

  1. ProtectedIT Expands its SOAR Market Reach by Partnering with ThreatConnect, Inc.
  2. IBM Amends Credit Arrangements, Secures New $2.5B Facility

Paul Asadoorian's Content:

Articles

  1. The Future of Zero Trust: Continuous Authentication - Signal Sciences
  2. Why You Need Recorded Futures Ultimate Security Intelligence Kit
  3. Exabeam and Armis Partner to Extend SIEM Visibility to Unmanaged and IoT Devices, Helping Security Teams Identify Malicious Activity Across All Devices
  4. Securing the Multi-Cloud Environment through CSPM and SSPM - CipherCloud
  5. Priorities in Agile Lead to Software Observability in Annual Agile Report
  6. CyberKnight joins forces with Armis to bring agentless EDR to OT, IoT and ICS environments - Intelligent Tech Channels
  7. Check Point Infinity SOC is launched
  8. Attivo Networks' enhanced EDN solution prevents attackers from seeing or exploiting production data - Help Net Security
  9. Vulcan Cyber now offers customizable vulnerability prioritization for efficient vulnerability remediation - Help Net Security
  10. Cyral ships zero trust data layer GA security platform - Help Net Security
  11. F5 Silverline Shape Defense: Protecting websites from the rising tide of fake internet traffic - Help Net Security


2. Interview - Living through a RANSOMWARE Attack - 01:00 PM

Description

Having helped organizations identify, assess, remediate and recover from a significant ransomware attack, Scott DeLong will describe the step by step process of events organizations will experience living through a ransomware attack and share some lessons learned for both dealing with an attack and for mitigating an organization's susceptibility to an attack .


Hosts

3. Interview - Segment Info Coming Soon! - 01:30 PM

Description

Hosts