Presidential Executive Order on America’s Cybersecurity Workforce - Enhancing Workforce Mobility and Supporting the Development of Cybersecurity Skills

NIST

On May 2, 2019, the President issued an Executive Order that recognized America’s cybersecurity workforce as a strategic asset that protects the American people, the homeland, and the American way of life.  The executive order further recognized the need to enhance workforce mobility to improve cybersecurity and the importance of supporting the development of cybersecurity skills.  This webinar will provide insights into the policy established through this executive order, the tasks and deliverables contained within it, and the consultative process to be used to execute recommendations from the 2017 Report to the President on Supporting the Growth and Sustainment of the Nation’s Cybersecurity Workforce.
Watch Now

Spotlight

Matters of cyber-(in)-security—though not always under this name—have been an issue in security politics for at least three decades (Dunn Cavelty 2008).1 As a result; the link between national security and cyberspace has become an uncontested, unshakable “truth” with budgetary and political consequences. However, this link is far more diverse as it is often assumed in the literature. The cyber security discourse is about more than one threat form: ranging from computer viruses and other malicious software to cyber-crime activity to the categories of cyber-terror and cyber-war. Each sub issue is represented and treated differently in the political process and at different points in time. Consequently, cyber-security policies contain an amalgam of countermeasures, tailored to meet different and at times conflicting security needs.

OTHER ON-DEMAND WEBINARS

The Power of AI to Disrupt Security Ops

GovInfoSecurity

Many of today's companies are hesitant to adopt new security technologies - particularly AI. The truth is AI is successfully disrupting many areas of security operations and shifting us away from the traditional SOC and man-led threat intelligence. In this webinar, Chris Calvert will introduce the concept of autonomous security driven by AI, probability theory and advanced algorithms. These new technologies apply reasoning, judgement and experience to identify threats and make decisions at the scale, speed and consistency no human can match, freeing up analysts for higher level investigation and response actions.
Watch Now

Six Inconvenient Truths About Data-Centric Security (And What to Do About Them)

Omnibus healthcare information security

Despite everything you've spent on data-centric security, there still is a security gap that is burgeoning at an alarming rate when it comes to protecting sensitive data. The growing complexity of users outside your organization, methods of sharing information, and the number of devices data reside on are continually changing and expanding. Rethink your data-centric security in 2019 with insights from IDC's Research Analyst, Rob Westervelt. This educational webcast will highlight how to: Leverage and extend the value of the Data-Centric Security solutions that you have in place. Identify and eliminate blind spots with current solutions such as DLP, Data Classification, and Rights Management to optimize your security.
Watch Now

Security Industry Financials – A Closer Look

Sia

Equities performed exceptionally well in 2017 on the back of strong corporate earnings, lax monetary policy, and the passing of major tax reforms. Notwithstanding the strength seen for a majority of the year, 2018 has been off to a rocky start, with volatility seen in both the debt and equity markets. Mack explained that where we are with tax reform and the strength in the economy that the security industry will continue to see reasonable growth in the equity capital markets over the next several years.
Watch Now

Not All Flaws Are Created Equal: The Difference Between a Flaw, a Vulnerability and an Exploit

Veracode

According to Gartner, the application layer contains 90% of all vulnerabilities. However, do security experts and developers know what’s happening underneath the application layer? Organizations are aware they cannot afford to let potential system flaws or weaknesses in applications be exploited, but knowing the distinctions between these weaknesses can make all the difference in removing them successfully. During this webinar, Jim Jastrzebski of CA Veracode will discuss how to identify risk factors within your application landscape and share his approach to helping security and development teams address them efficiently. Learn about the methods and solutions attackers typically rely on to perform application vulnerability discovery and compromise, and hear how organizations rely on application security technology and services to gain visibility into their overall landscape—and act upon it in the right way.
Watch Now

Spotlight

Matters of cyber-(in)-security—though not always under this name—have been an issue in security politics for at least three decades (Dunn Cavelty 2008).1 As a result; the link between national security and cyberspace has become an uncontested, unshakable “truth” with budgetary and political consequences. However, this link is far more diverse as it is often assumed in the literature. The cyber security discourse is about more than one threat form: ranging from computer viruses and other malicious software to cyber-crime activity to the categories of cyber-terror and cyber-war. Each sub issue is represented and treated differently in the political process and at different points in time. Consequently, cyber-security policies contain an amalgam of countermeasures, tailored to meet different and at times conflicting security needs.

resources