- This event has passed so registration is closed.
Overview
While we continue to spend an ungodly amount of money on securing our infrastructure and trying to staff up security responders and improve corporate expertise, we are still getting hacked. Given that we do not have an unlimited budget and the availability of security expertise is extremely scarce, how can we survive? This webinar will bring us back to the basics with Key Risk Indicators and provide a way to re-think how we monitor and analyze residual risk.
Moderator
Matt Mosley – Vice President of Products, Cyren
Matt Mosley is the VP of Products at Cyren, a leading email security and threat intelligence company. Matt is a recognized security expert and thought leader with more than 25 years of experience in numerous roles as a practitioner, consultant and software executive. Prior to joining Cyren, Matt was the VP of Products at Devo, where he lead product strategy for Devo’s cyber security business, and the Director of Product Management for Symantec’s MSSP business, where he helped to launch new products and services to enhance the security of some of the world’s largest organizations. Matt has also held senior leadership roles with leading security firms including NetIQ, Internet Security Systems, Intellitactics, and Brabeion Software. As the chief security officer at early Internet pioneer DIGEX, Matt defined and implemented the security controls and best practices for the world’s first web hosting business and was a founding member of the ISP Security Consortium. Matt holds the CISSP, CISM, and CISA designations, is a regular speaker at security conferences, and taught CISSP classes for ISSA-NOVA for nearly a decade
Speaker/s
Pete Lindstrom – Vice President of Research, IDC
Pete Lindstrom is Research Vice President for Security Strategies. His research is focused on digital security measurement and metrics, digital security economics, and digital security at scale. Mr. Lindstrom is responsible for driving the vision of enabling digital transformation through proper technology risk management that makes efficient and effective economic decisions supported by evidence and outcome analysis leading to a security model that aligns with the 3d platform. Prior to joining IDC in 2014, Mr. Lindstrom accumulated 25 years of industry experience as an IT auditor, IT security practitioner, and industry analyst. He has extensive and broad expertise with a variety of information security products, but is best known as an authority on cybersecurity economics issues, such as strategic security metrics, estimating risk and return, and measuring security programs. He has also focused on applying core risk management principles to new technologies, architectures, and systems, focusing on the use of virtualization, cloud security, and big data. He has developed the “Four Disciplines of Security Management” (a security operations model), and the “5 Immutable Laws of Virtualization Security,” which was integrated into guidance from the PCI Council. Mr. Lindstrom is a frequent contributor to popular business and trade publications. He is often quoted in USA Today, WSJ Online, Information Security Magazine, VAR Business, Searchsecurity.com, and CSO Magazine. His columns and articles have appeared in Information Security Magazine, Searchsecurity.com, ISSA Journal, and CSO Online. Additionally, Mr. Lindstrom is a popular speaker at the RSA Security Conference, InfoSec World, ISSA International Conference, and many regional conferences. In addition, to his extensive industry experience, Mr. Lindstrom served as an officer in the U.S. Marine Corps and received a bachelor’s degree in Business Administration (Finance) from the University of Notre Dame.
See Pete Lindstrom‘s full profile.
Michael F. Angelo – Chief Security Architect, Micro Focus | NetIQ
Michael F. Angelo has been in cyber security for over 3 decades. Michael has 66 granted US patents, with the majority being in the area of Cyber Security. Michael has served as a trusted security advisor and architect with a number of fortune 20 corporations. He has worked in the development of national and international standards. Currently he is an ISSA Fellow and is named on the ISSA Hall of FAME. His current day job requires him to define, track, drive and certify the Cyber Posture of software products.
Michael has presented at numerous International conferences and, in today’s world, web conferences.
Recent On-Demand Web Conferences
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.