Category: Presentations & Webinars

November 15th, 2024 by John

I was honored to be invited to give a presentation on November 14th in Rockford, IL for the Rock River Valley Section. The turnout was 30+ members and non-members. Click the image above for the PDF.

ABSTRACT Read More

Posted in Cybersecurity & Infosec, Emerging Technology, Ethics, Future Views, Presentations & Webinars Tagged with: , ,

December 2nd, 2022 by John

Cybersecurity practitioners, as defenders of information, benefit from the fact that they are, in some ways, one large team, and the sharing of information and best practices as an industry and a community elevates everyone’s ability to protect their data. The passing of experience and expertise among peers is important, but staying ahead of emerging cyber threats requires recruiting and training the next generation.

https://www.onshore.com/managed-security-services/onsecurity-building-the-cybersecurity-community-of-tomorrow/ Read More

Posted in Presentations & Webinars

May 4th, 2022 by John

Join our Quad Cities (ISC)2 Chapter leaders to chat about the strategies that chapters can use to increase vitality – May 18 @ 11 ET / 8 PT https://www.brighttalk.com/webcast/18958/541850

Posted in Presentations & Webinars

January 21st, 2022 by John

I was fortunate to be on a panel to discuss the Software Supply Chain with Richard Rushing, Bryan Hurd and Richard Greenberg (moderator) for the ISSA Los Angeles chapter on Wednesday (1/19/21). Click here to view the recording, https://www.youtube.com/watch?v=y3wqCc34tME.

Posted in Blog, Cybersecurity & Infosec, Presentations & Webinars, Resiliency, Risk Management, Supply Chain

February 22nd, 2019 by John

Posted in IoT, IIoT, ICS-SCADA, Presentations & Webinars

February 8th, 2019 by John

Will you be attending RSA Conference in March? I will be leading a Peer to Peer session and Birds of a Feather on Industrial IoT Cybersecurity. Please join me!

P2P2-W15 Wed Mar 6 4:10pm – Moscone South 306 Read More

Posted in Presentations & Webinars Tagged with: , , ,

October 16th, 2018 by John

I would like to encourage colleagues to join me for two exciting upcoming webinars, from Cybersecurity Collaborative:

  1. CISO Perspective – 36 Years in Information Security (RSVP)
    Howard Israel, CSO On-Demand, FireEye, Thursday, October 25th at 1pm ET. 
    Howard has an extensive cybersecurity background working with a range of organizations and industries such as the NSA, Telecom, Pharmaceutical, Finance and Consulting, from the product side, to the enterprise protection side. In this discussion, he will use his insights from these arenas to help strengthen you and your organization. Lastly, he will test your reaction IQ with real-life examples where Information Security was put to the test.
  2. Learn More About The Cybersecurity Collaborative and Why You Want to Join Us! (RSVP)
    Founding Members Discussion, Thursday, October 25th at 2:30pm ET.
    Learn why Cybersecurity Collaborative founders formed the organization and the actionable information they get from it on a daily basis. Ask questions about membership tiers, how you can benefit as a member and what sets this organization apart from others. Learn about the new Community Membership tier for smaller IT teams at a much smaller price point.

I met with Stuart Cohen (CEO) in September and I asked him to put together this founding member discussion webinar, because I believe in the mission and value of Cybersecurity Collaborative, and because colleagues have asked about the value proposition.

Why pay to be a member of a group, when you are already a member of other information sharing groups? Please join us on October 25th, and I think you will understand why I am a strong supporter. This group goes beyond a social network. You control what gets shared, you have access to member contact information, you decide what the roadmap should be, not a security vendor and not a logistics company like Gartner/CEB who want to sell to you or resell your intellectual property.

Founding members like Marc Varner, Steve Young, Tim Callahan, John Bingham, Malcolm Harkins and Jim O’Conner formed Cybersecurity Collaborative. One primary goal was to have this community be a  safe and secure, vendor-free/press-free enclave. These industry security leaders realized that they needed to deliver high quality and actionable content by CISO members, for CISO members.

Learn about the principles on which the Cybersecurity Collaborative is based.

Cybersecurity Collaborative Mission:

• Powered by passion to improve all CISOs
• A safe haven for all of our data
• A source of strength for the Cybersecurity community
• A confidential place where organizations can share skills and experiences
• A catalyst for peers of CISOs working with their peers in the community

The Collaborative is different from other organizations I have been a part of (Security Advisor Alliance, Gartner, CEB, FS-ISAC…) because members decide what is important and actively develop content that will immediately be valuable and actionable to other members. It actually executes on this, in a very intentional way. The CISO will not be the only individual to participate at an organization, while they are the point of contact and corporate member, they have the ability to delegate to team members who are subject matter experts when developing policies, playbooks and reports as a part of special Collaborative Task Forces, which the members will form to solve problems and address industry, technology and regulatory changes.

Cybersecurity Collaborative Deliverables:

• Public topical webinars
• Special member-only webinars
• Task forces to address industry, technology and regulatory changes led by SMEs
• Daily intelligence briefings
• Complementary Cybrary Training for you and your team
• Annual Meeting free and open to members and non-members
  Nov 7-8, 2018, Irvine CA (RSVP) Read More

Posted in Community, Cybersecurity & Infosec, Events, Presentations & Webinars

August 7th, 2018 by John

Black Hat Review Board Members give their picks for must see presentations this week at Black Hat USA 2018. They have broken down the 2018 cybersecurity exploit trends into 6 categories:

  1. Software Development
    1. Breaking Parser Logic, Lagoon JKL, WED 4PM
    2. AI & ML in Cybersecurity: Why Algorithms Are Dangerous, South Seas ABE, THU 11AM

    Policy

    1. Legal Liability for IoT Hacking, Lagoon JKL, THU 2:30PM

    Network Defenses

    1. ZEROing Trust: Do Zero Trust Models Provide Real Security, South Seas CDF, WED 4PM

    Hardware Platform Security

    1. Meltdown: Basics, Details, Consequences, South Pacific F, WED 2:40PM
    2. GOD Mode Unlocked: Hardware Backdoors in x86 CPUs, South Pacific F, THU 11AM

    Web Application Security

    1. Practical Web Cache Poisoning: Redefining ‘Unexploitable’, South Seas CDF, THU 3PM

    Human Factor

    1. Infosec Philosophies for a Corrupt Economy, Islander EI, WED 5:05PM
    2. Demystifying PTSD in the Cybersecurity Environment, South Seas ABE, THU 9AM

    For more details, visit the Black Hat Briefings 2018 agenda here: https://www.blackhat.com/us-18/briefings.html

Posted in Events, Exploits & Attacks, Hacking & Pen Testing, Presentations & Webinars