Cybersecurity Essentials (Technical)
Conducting a Phishing Awareness Program

Phishing simulations are shown to be effective tools to increase user awareness in information security issues. This session will convey experiences in setting up an automated phishing program and delivering game-based 15 minute training modules.

After completing this session, you will be able to:

  • How to effectively implement a Phishing Campaign
  • Metrics that can move a security program forward
  • Behavioral based techniques to reinforce learning
  • Develop a project plan to rollout phishing program
Speaker Information
Todd Fitzgerald  [ view bio ]
Your Responsibility in Cloud Security

Companies benefit from the security controls when they use a cloud service. However, CIOs, CISOs, and cloud users in general have to also understand their responsibilities in this new paradigm called “The Shared Responsibility Model”.

After completing this session, you will be able to:

  • Explain the different cloud computing models
  • Explain security controls in cloud services
  • Explain the shared responsibility model
  • Explain cloud security tools and best practices
Speaker Information
Nihat Guven  [ view bio ]
Cybersecurity Kill Chain

Based off military doctrine, Lockheed Martin’s Computer Incident Response Team has created an intelligence-driven defense process, Cyber Kill Chain® This session also reviews the contributions of ISACA CSX and ENISA Cybersecurity kill chains.

After completing this session, you will be able to:

  • Define an Advanced Persistent Threat (APT)
  • Identify the phases of a Cybersecurity kill chain
  • Identify attacks via the ENISA cyber kill chain.
  • Importance of breaking the kill chain for security
Speaker Information
William Crowe, CISA, CISM, CRISC  [ view bio ]
Prioritize Vulnerability Remediation

In this presentation, we will discuss a year-long study of exploits kits, attacks and vulnerability attributes and learn how to use them for prioritization. We will share best practices for improving remediation and reducing risk.

After completing this session, you will be able to:

  • Understand how attacks happen in real world
  • Understand Exploits and Vulnerabilities
  • Understand how to prioritize remediation.
  • Reduce overall risk.
Speaker Information
Amol Sarwate  [ view bio ]
Application Security & Why You Should Care

App vulnerabilities and insecure software are undermining our nation’s critical infrastructure. This presentation will explore the problem, offer some solutions, and will give a live demo that shows how vulnerabilities like SQL injection, etc. work.

After completing this session, you will be able to:

  • Understand the problem of insecure software
  • Identify common software vulnerabilities
  • Understand how common vulnerabilities work
  • Discuss mitigation of app security vulnerabilities
Speaker Information
Stuart Smith, CISM  [ view bio ]
Ashley Spangler, CISA, CISM, CRISC  [ view bio ]
Individual topic purchase: Selected
ISACA
Auditing: 6.00
Share This
Subscription
You must be logged in to access RTP Subscriptions.
77 To continue, you need to log in to Peach New Media. If you have any questions about your account please contact us at 1-866-702-3278.
Email256:
Password:
Products
On-Demand
RTP Price:$0.00