Dark Reading Cyber Security Crash Courses

Curriculum Calendar

Download this to connect our Curriculum Calendar to your calendar application (Outlook, etc.)
All class times are listed in Eastern Time
University classes will consist of a 45 minute lecture and an interactive chat session
Registered users must login to participate and get credit for each course
Questions? Please contact us here.
Don't miss a class. Be sure to register for each course you want to attend by clicking 'Sign Me Up' to register.
Dark Reading Tracks

Enterprise Security Management Crash Course  

Thursday, January 26 - Thursday, February 2
Our Lecturer
X
John Pironti, President, IP Architects
John Pironti, President, IP Architects

John P. Pironti is the President of IP Architects LLC. He has designed and implemented enterprise-wide electronic business solutions, information security and risk management strategies and programs, enterprise resilience capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 20 years. Mr. Pironti has a number of industry certifications including Certified in the Governance of Enterprise IT (CGEIT), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information System Control (CRISC), Information Systems Security Architecture Professional (ISSAP), and Information Systems Security Management Professional (ISSMP). He frequently provides briefings and acts as a trusted advisor to senior leaders of numerous organizations on information security and risk management and compliance topics and is also a member of a number of technical advisory boards for technology and services firms. He is also a published author and writer, highly quoted and often interviewed by global media, and an award-winning frequent speaker on electronic business and information security and risk management topics at domestic and international industry conferences.


HIDE


Presenter: Rafal Los, Managing Director, Solutions Research and Development, Optiv
Jan 26 1PM
Over the years, most enterprises have acquired a plethora of tools to detect and/or block security threats. But how can organizations monitor these tools to detect potential threats and measure the security posture of the enterprise? In this session, a top expert on security monitoring will offer some advice on how to monitor and report on an enterprise's security posture, and how to use the data from multiple security systems to track down sophisticated threats.

Presenter: David Bradford, Chief Strategy Officer and Director of Strategic Partnership Development, Advisen
Feb 2 1PM
One of the ways that today's enterprises are minimizing cyber security risk is by buying cyber insurance, which promises to pay them back for the costs of a major data security breach. But how much does cyber insurance cost? And what does it pay in the event of a major compromise? In this session, an expert on cyber insurance will discuss the strengths and weaknesses of cyber insurance policies and the hidden costs that it may not cover.

Dark Reading Cyber Security Crash Course Archived Tracks

Enterprise Defense Crash Course  

Our Lecturer
X
Chris Eng, VP Research, Veracode
Chris Eng, VP Research, Veracode

Chris Eng (@chriseng) is vice president of research at Veracode. Throughout his career, he has led projects breaking, building, and defending software for some of the world's largest companies. He is an unabashed supporter of the Oxford comma and hates it when you use the word "ask" as a noun.


HIDE


Presenter: Chris Eng, VP Research, Veracode
Customer databases, ERP, Big Data the keys to your enterprises kingdom lie in its applications. But application security is often overlooked, both by software makers and by internal development teams. What steps can your organization take to find and repair application vulnerabilities before your attackers discover them? A top app security expert discusses key practices for scanning and securing applications.

Presenter: Rich Mogull, Analyst & CEO, Securosis
Cloud computing services and technology offer a level of efficiency and cost savings that most enterprises simply cant pass up. But does the growing use of cloud technology create a growing threat to enterprise data? How can IT organizations track and secure data as it travels through the cloud? In this session, a cloud security expert will discuss the key danger points in cloud computing and the latest technologies and practices for cloud security.

Presenter: Michele Fincher, COO and Chief Influencing Agent, Social-Engineer
Sponsor Speaker: Stu Sjouwerman, Founder and CEO, KnowBe4, LLC
Most major data breaches start with the compromise of a single endpoint a PC, a mobile device, a user who unwittingly gives up credentials. What can your organization to protect its endpoints? How can you create and enforce end user policies that protect your corporate data? In this session, a top expert discusses how endpoints and end users are most frequently compromised and how to keep your end users from falling victim.

Presenter: Andrew Blaich, Security Researcher, Lookout
Everyone is saying that the introduction of mobile devices and bring-your-own-device (BYOD) policies is a security risk to the enterprise. But exactly where do those risks come from? In this session, a top expert will debunk some of the myths about mobile security while raising up some threats and vulnerabilities you may not know about.

Presenter: Randy Trzeciak, Director, Insider Threat Center, CERT
Major data leaks such as Edward Snowdens release of NSA data are only the tip of the insider threat iceberg. Every day, enterprises face the threat of losing insider information not only through malicious leaks but through unintentional violations of security rules. How can organizations spot the signs of a data leak and stop it before it goes too far? How can IT help prevent accidental leaks of sensitive data? A top expert offers key advice on stopping data loss from within.

Presenter: Drew Vanover, Director of Technical Solutions, Blue Coat
As enterprises add new networking capabilities, SDN, and virtualized server environments, the risks they face are changing as well. In this informative session, a top expert on infrastructure security will discuss the latest threats to networks and servers and how your organization can mitigate them.

Enterprise Security Management Crash Course  

Our Lecturer
X
John Pironti, President, IP Architects
John Pironti, President, IP Architects

John P. Pironti is the President of IP Architects LLC. He has designed and implemented enterprise-wide electronic business solutions, information security and risk management strategies and programs, enterprise resilience capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 20 years. Mr. Pironti has a number of industry certifications including Certified in the Governance of Enterprise IT (CGEIT), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information System Control (CRISC), Information Systems Security Architecture Professional (ISSAP), and Information Systems Security Management Professional (ISSMP). He frequently provides briefings and acts as a trusted advisor to senior leaders of numerous organizations on information security and risk management and compliance topics and is also a member of a number of technical advisory boards for technology and services firms. He is also a published author and writer, highly quoted and often interviewed by global media, and an award-winning frequent speaker on electronic business and information security and risk management topics at domestic and international industry conferences.


HIDE


Presenter: John Pironti, President, IP Architects
For many organizations, making the right business decisions means making the right decisions about risk. But the risk of a cyber breach is one of the hardest variables to measure. In this session, you'll get insight on how to evaluate cyber risk, and how to perform "what if" scenarios to help your business decision makers arrive at the right choices.

Presenters: Tim Wilson, Editor in Chief, Dark Reading; Sara Peters, Senior Editor, Dark Reading
Sponsor Speaker: Matthew Gardiner, Senior Product Marketing Manager, Mimecast
Thanks to a plethora of major and very public data breaches, security has become one of the most critical issues in IT. What are the chief threats that security departments face, and what are they doing about them? What are today's top priorities for security professionals? This session will include data from two recent surveys of IT and security executives.

Dark Reading E-Commerce Security University  

Lecturer: Bishop Fox Instructors & John H. Sawyer
Our Lecturer
X
Bishop Fox Instructors & John H. Sawyer
Bishop Fox Instructors & John H. Sawyer

John H Sawyer, Senior Security Analyst, InGuardians
John H Sawyer is a Senior Security Analyst with InGuardians, where he specializes in network, mobile, and web application penetration testing. John has an extensive background in intrusion analysis, forensics, and incident response. He has consulted with federal, state, and local law enforcement agencies on malware analysis, hacker attacks, and digital forensics. He is also a respected author and public speaker. John currently writes for Dark Reading and InformationWeek Magazine.

Bishop Fox Instructors
Bishop Fox is a global security consulting firm. We are the trusted advisors to the Fortune 1000, financial institutions, and high-tech startups – helping to secure their commerce, data, IT infrastructure, and intellectual property. Founded in 2005, our team is made up of dedicated individuals with a combined 400+ years of experience working in both corporate America and global security.

For more than a decade, Bishop Fox profes­sionals have been authoring best-selling secu­rity books, such as Web Application Security: A Beginners Guide, Hacking Exposed: Web Applications 3rd Edition, and Hacking Exposed: Wireless, 1st and 2nd Editions. Having actually "written the book" on many topics in our field, we consistently demonstrate that few others can truly claim subject matter expertise in the same way that we do.


HIDE


One of the greatest challenges in e-commerce is to build a website that is extremely easy for customers to access and use but extremely difficult for online criminals to attack. In this session, we offer an overview of defenses against Internet-based threats -- including DDoS attacks, DNS exploits, and cross-site scripting to help enterprises steel their sites against potential compromise.

Most attacks on retail and e-commerce websites are conducted by cyber criminals who want to steal large databases of personal information and credentials. In this session, we offer a closer look at the methods used to penetrate a retailers back-end systems including targeted attacks on databases, DDoS smokescreens used to obfuscate more sophisticated exploits -- and other surprises that can happen during a DDoS attack.

One of the great ironies of e-commerce is that online system security is usually at its weakest during the most critical time periods, such as the holiday shopping season. In this session, we provide counsel on the preventative and the operative measures that can be taken when traffic is at its highest and system and human resources are stretched to the maximum.

To develop an effective defense against online threats, an e-commerce company must understand its attackers and their methods. In this session, we outline the various types of attackers who target online commerce, including those who prey on the corporate website and those who prey upon the customers themselves.

Once an online business has shored up its defenses against new threats, it must develop an ongoing program for monitoring its systems for potential compromises and measuring the risk faced by the business. In this session, we offer tips for building systems and processes for tracking threat and fraud indicators, and for creating real metrics for benchmarking the current threat environment.

Dark Reading Cyber Security Crash Course Archived Tracks

You've Been Breached! Crash Course  

Our Lecturer
X
Zach Wikholm, Research Developer, Flashpoint
Zach Wikholm, Research Developer, Flashpoint

Zach Wikholm is a Research Developer at Flashpoint where he specializes in information security and Internet of Things (IoT) risk analysis. Driven by lifelong interests in cyber threat research, emergent malware, and all things open-source (especially Linux), Zach has built a career around designing custom systems to help organizations achieve the optimal balance between security and usability. Prior to Flashpoint, Zach's extensive experience in security engineering and IT consulting led to his role managing all internal security and network infrastructure operations as the Director of Security at CARI.net. He lives in San Diego with his wife and two dogs.


HIDE


Presenter: Peter Gregory, Executive Director, Executive Advisory, Office of the CISO, Optiv
Sponsor Speaker: Zach Wikholm, Research Developer, Flashpoint
As organizations such as Target have discovered, cyber attackers sometimes attack indirectly, through suppliers, contractors, and customers. But how can you ensure that third parties are keeping their own systems secure and are not providing an avenue to compromise your data? How should you work with your partners in the event of a security incident? In this session, we discuss methods you can use to vet your suppliers security -- and how to work with your partners if a compromise is found.

Presenter: Adam Kujawa, Head of Malware Intelligence, Malwarebytes
Another key element in assessing risk is assessing your attractiveness as a target. Today's cyber attackers range from financially-motivated criminals to politically-motivated hacktivists to state-sponsored information-gathering hacker units. This session offers a look at the different types of cyber attackers, their methods, and their motivations.

Presenter: Chris Novak, Director, Global Investigative Response, Verizon
To understand the cyber risk your organization faces, you need to understand the likelihood of a breach and its potential cost. In this session, a top expert discusses the many and sometimes hidden costs of a data breach, including its impact on customers and end users. You'll also get insight on the frequency of data breaches, and a better understanding of how likely it is to happen to you.

Presenter: Gunter Ollmann, CSO, Vectra Networks
Sponsor Speaker: Jerome Segura, Lead Malware Intelligence Analyst, Malwarebytes
In the past, most cyber attacks simply exploited the most vulnerable systems. Today, however, there is an increasing number of sophisticated attacks that target specific companies, data, or even employees. These attacks are well-disguised and may escape conventional security defenses. What tools and strategies are there to prevent these exploits? In this session, you will hear about the latest types of targeted attacks and what your enterprise can do to stop them.

Presenter: Bhaskar Karambelkar, Data Science Lead, ThreatConnect
The good news in IT security is that there is a growing list of resources and services that can inform you about the latest threats in cyber space. The bad news is that with so many sources and data, using threat intelligence to improve your cyber defenses can be a bewildering process. In this session, you'll get a look at some of the different types of threat intelligence data, and you'll get advice on how to choose the right ones and integrate the information to improve your defenses.

Presenter: Andy Jordan, Security Associate, Bishop Fox
If your organization doesn't have a plan for handling a major data breach, you're already in trouble. In order to swiftly and effectively respond to a cyber compromise, you must develop a program for first response in the data center, and downstream response in the business units and in the public eye. This session offers some guidance on how to build an incident response plan, and how to test and practice that plan so that you're ready for the real thing.