Difference between revisions of "ESWEpisode190"

From Security Weekly Wiki
Jump to navigationJump to search
(Added By Paul's Craptastic PPWorks Code)
(Added By Paul's Craptastic PPWorks Code)
Line 61: Line 61:
  
  
= 2. Interview - Living through a RANSOMWARE Attack - 01:00 PM  =
+
= 2. Interview - Segment Info Coming Soon - 01:00 PM-01:30 PM  =
 
<!--   
 
<!--   
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
 
************************* MAKE CHANGES IN THE TEMPLATES BELOW! ***************************
Line 70: Line 70:
 
=== Description ===
 
=== Description ===
  
Having helped organizations identify, assess, remediate and recover from a significant ransomware attack, Scott DeLong will describe the step by step process of events organizations will experience living through a ransomware attack and share some lessons learned for both dealing with an attack and for mitigating an organization&#39;s susceptibility to an attack .
+
Description TBD
  
  

Revision as of 19:36, 7 July 2020

Enterprise Security Weekly Episode #190 - July 08, 2020

Subscribe to all of our shows and mailing list by visiting: https://securityweekly.com/subscribe

1. News - Living through a Ransomware Attack - 12:30 PM-01:00 PM

Announcements

  • Join the Security Weekly Mailing List for webcast/virtual training announcements and to receive your personal invite to our Discord server by visiting securityweekly.com/subscribe and clicking the button to join the list!
  • With all the recent changes to BlackHat and DefCon, we realized we can keep doing what we do best - host virtual podcasts! I’m proud to announce Hacker Summer Camp 2020, a Security Weekly Virtual, Live-Stream Event, August 3 - August 6, 2020. To reserve your slot now, visit: securityweekly.com/summercamp2020

Description

Having helped organizations identify, assess, remediate and recover from a significant ransomware attack, Scott describes the step by step process of events organizations will experience living through a ransomware attack and share some lessons learned for both dealing with an attack and for mitigating an organization's susceptibility to an attack.



Guest(s)

Scott DeLong

Scott is a Chief Information Officer/ Sr. Technology & Security Officer with twenty-six years of Global Information Technology Experience in the following areas: Strategy, Roadmaps and Governance, Security & Compliance Frameworks and Solutions, Assessment, Architecture, Selection, Procurement, Design, Development, Implementation and Management, Business Engineering (BE), Transformation, Process Reengineering (BPR) and Process Management (BPM), Mergers, Acquisitions, Divestitures and Joint Ventures, Portfolio, Program and Project Management. His professional passion is to architect, develop, implement, manage and secure people-process-technology centric solutions to address business challenges and seize on opportunities.


Hosts

Matt Alderman's Content:

Articles

  1. ProtectedIT Expands its SOAR Market Reach by Partnering with ThreatConnect, Inc.
  2. IBM Amends Credit Arrangements, Secures New $2.5B Facility

Paul Asadoorian's Content:

Articles

  1. The Future of Zero Trust: Continuous Authentication - Signal Sciences
  2. Why You Need Recorded Futures Ultimate Security Intelligence Kit
  3. Exabeam and Armis Partner to Extend SIEM Visibility to Unmanaged and IoT Devices, Helping Security Teams Identify Malicious Activity Across All Devices
  4. Securing the Multi-Cloud Environment through CSPM and SSPM - CipherCloud
  5. Priorities in Agile Lead to Software Observability in Annual Agile Report
  6. CyberKnight joins forces with Armis to bring agentless EDR to OT, IoT and ICS environments - Intelligent Tech Channels
  7. Check Point Infinity SOC is launched
  8. Attivo Networks' enhanced EDN solution prevents attackers from seeing or exploiting production data - Help Net Security
  9. Vulcan Cyber now offers customizable vulnerability prioritization for efficient vulnerability remediation - Help Net Security
  10. Cyral ships zero trust data layer GA security platform - Help Net Security
  11. F5 Silverline Shape Defense: Protecting websites from the rising tide of fake internet traffic - Help Net Security


2. Interview - Segment Info Coming Soon - 01:00 PM-01:30 PM

Description

Description TBD


Hosts

3. Interview - Segment Info Coming Soon! - 01:30 PM

Description

Hosts