SPEAKER:Matt Hollcraft, CISO of Hellman & Friedman, Hussein Syed CISO of RWJBarnabas Health, and Itai Tevet, CEO of Intezer

The “Shift Left” movement has redefined the roles and responsibilities of security teams, software development teams and infrastructure teams.

Has this enormous change positively or negatively impacted security teams? Is it possible that we have shifted too far left?

Join experts Matt Hollcraft, CISO of Hellman & Friedman, Hussein Syed CISO of RWJBarnabas Health, and Itai Tevet, CEO of Intezer in this webinar which will explore the DevOps/security relationship, discuss the need for creating independence and review potential solutions for security teams.

The webinar will be live online on June 10, 2020, 01:00 PM EST.

Register at https://zoom.us/webinar/register/WN_3qSpSoBNR-uslkPXvrCY6A

SPEAKER:Hussein Syed, CISO at RWJ Barnabas and Marcos Marrero, CISO at HIG Capital and Rich Campagna, CMO at Bitglass

Today’s CISOs face a number of challenges when it comes to securing the move into the cloud. From a lack of cyber security talent and budgetary concerns to countless number of vendors and numerous cloud applications being acquired, CISO's are under more pressure than ever before! 

Join our panel discussion with leading CISOs, Hussein Syed, from RWJ Barnabas Health, and Marcos Marrero, from HIG Capital, as they share their experiences with:

• How to address top CISO Challenges (Limited budget, hiring, protecting sensitive data, etc)
• How the cloud impacts the Infosec team's people, process, and tools
• How to plan for a rapidly growing and evolving cloud footprint
And more!

This is your chance to hear from your peers! RSVP Today!

The webinar will be live online on May 15, 10:00 am PST (60 mins).

Register at https://www.brighttalk.com/webcast/11129/354296?utm_source=SecurityCurrent%2C+Inc.&utm_medium=brighttalk&utm_campaign=354296

SPEAKER:Bob Turner, Chief Information Security Officer at University of Wisconsin-Madison Rich Campagna, SVP of Products at Bitglass

Public cloud apps like Office 365 and AWS can provide your organization with increased speed and agility, but also come with security & compliance challenges that only increase as your organization expands its cloud footprint. In this webinar, Bob Turner, Chief Information Security Officer at University of Wisconsin-Madison, and Rich Campagna, SVP of Products at Bitglass, will discuss how leading organizations protect data as their cloud presence expands. The webinar will focus on actionable insights that you can bring to your organization immediately.

The webinar will be on October 25, 2018 at 10am PT.

Register at  https://www.brighttalk.com/webcast/11129/337818?utm_source=SecurityCurrent%2C+Inc.&utm_medium=brighttalk&utm_campaign=33781

SPEAKER:Hussein Syed, CISO of RWJBarnabas Health Kevin McKenzie, CISO of The Dollar Tree Stephen Moore, Chief Security Strategist of Exabeam

Hussein Syed, CISO of RWJBarnabas Health, Kevin McKenzie, CISO of The Dollar Tree, and Stephen Moore, Chief Security Strategist of Exabeam and former Anthem Staff VP of Cybersecurity Analytics discussed world-class detection and response in a live webinar held August 22.

They talked about:

· How insider threat is changing -- but not in the way you might think
· How working backwards from a breach can help you preempt it, and
· How investments in identity management and data loss prevention are strengthened with complimentary technology and processes

Click on this link for the on-demand version of the webinar: https://www.exabeam.com/webinar/security-symptoms-vs-causes-how-leading-cisos-develop-world-class-detection-and-response/

SPEAKER:Mitchell Parker, Executive Director of Information Security and Compliance (CISO), Indiana University Health Salim Hafid, Product Marketing Manager, Bitglass

When: Watch now on-demand

The healthcare industry is adopting technologies that give care providers rapid access to sensitive patient information, when and where they need it. While productivity is enhanced with cloud computing, mobility, “BYOD” unmanaged personal devices, and hosted SaaS apps like Office 365, the CISO is concerned with resolving the inherent risk these technologies bring with them.

For the CISO, it’s important to look at everything, assess risk the right way, and have a practical mitigation plan to address issues that could lead to data loss or breaches, ransomware and other threats.

In this webinar led by Mitchell Parker, Executive Director of Information Security and Compliance (CISO) at Indiana University Health and Salim Hafid, Product Marketing Manager at Bitglass, you’ll learn how to resolve the risk of cloud applications and access via unmanaged devices, and how to apply appropriate controls that enable patient care in a seamless and secure manner.

Our experts will talk about the issues everyone is struggling with, and how cloud security is evolving to address them.

SPEAKER:Bob Turner, CISO, University of Wisconsin-Madison Tunde Oni-Daniel, Head of Information Security (CISO), Perdue Farms Tom Mulvehill, Program Director, IBM BigFix

When: Watch now on-demand

The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They increasingly require access to a wide variety of apps, cloud services, and new communication platforms.

The result is a much larger attack surface, one that is hard to protect with traditional approaches – and one that is growing faster than ever before as users adopt new types of devices, new applications, and new services.

At the same time, the potential threats that enterprises are facing have grown significantly in variety, capabilities, and size. With zero-days and other stealthy attacks, enterprises have less and less time to spot intrusions and take steps to contain them.

Endpoint devices are at the front line of attack. Traditional antivirus protections are no longer enough. Enterprises of all sizes, and all industry segments, are looking for better solutions.

In this discussion, leading security experts examine the new tools that they have at their disposal, including next generation endpoint management, protection and detection solutions. They discuss the business requirements that go into making their technology decisions and offer advice to other security executives facing similar problems.

During this live panel, Bob Turner, Chief Information Security Officer at the University of Wisconsin-Madison and the lead writer of the Security Current report CISOs Investigate: Endpoint Security, will moderate a discussion on the strategies and toolsets that CISOs need today to mitigate the risk of attacks originating at the endpoint.

Also on the panel are Tunde Oni-Daniel, Head of Information Security (CISO), Perdue Farms Inc. and a contributor to the CISOs Investigate: Endpoint Security report; and Tom Mulvehill, Program Director, IBM BigFix.

SPEAKER:Hussein Syed, CISO, RWJBarnabas Health Alex Fry, Application Security Expert Mike Schuricht, VP of Product Management, Bitglass

On Demand

Mobile computing and the use of cloud applications are touted as ways to help healthcare providers deliver better patient care. Clinicians carrying tablets or other devices to exam rooms and patients’ bedsides can quickly access and update patient data and other vital resources necessary for accurate and expeditious treatment.

No one disputes the value of “anytime, anywhere” computing in healthcare, but there is a concern about the risk associated with access to sensitive and regulated data via unmanaged devices and unsanctioned cloud applications.

In this CISO panel discussion moderated by Hussein Syed, CISO at RWJBarnabas Health, and joined by panelists Alex Fry, application security expert, and Mike Schuricht, VP of Product Management, Bitglass, you’ll learn about real-world approaches to some of the most vexing challenges of mobile and cloud computing.


SPEAKER:Bob Turner, CISO, University of Wisconsin-Madison Hussein Syed, CISO, RJWBarnabas Health Rick McElroy, Chief Security Strategist, Carbon Black

On Demand

With an increased opportunity for financial gain, cyber criminals are now willing to invest significant time and resources into creating advanced attacks that target enterprises. At the same time, enterprises often face a shortage of skilled security professionals who are dedicated to responding to such attacks.

During an attack and subsequent response scenario, every second counts. The longer it takes to address an issue, the more risk the business faces.

Criminals target enterprise endpoints as their point of entry because the overall attack surface is so large and inviting. New strategies and more advanced tools are necessary to stop attacks in their tracks when possible and to expedite information gathering and analysis so that security teams have everything they need to respond quickly and remediate attacks in progress.

During this live panel, Bob Turner, Chief Information Security Officer at the University of Wisconsin-Madison and the lead writer of the Security Current report CISOs Investigate: Endpoint Security, will moderate a discussion on the strategies and toolsets that CISOs need today to ensure their security team stays ahead of cyber adversaries.

Also on the panel are Hussein Syed, Chief Information Security Officer at RJWBarnabas Health, and Rick McElroy, Chief Security Strategist at Carbon Black.

Join this insightful discussion to learn how you can empower your security team with the strategies and tools to stop attacks and conduct a fast and effective investigations to shut down attacks in progress.

SPEAKER:Brian Lozada, Zocdoc CISO

On Demand

Driven by ease of deployment, cost effectiveness, and improved productivity among employees, many organizations have adopted cloud technology. Although there are significant benefits to cloud adoption, some organizations still face major challenges preventing their move to the cloud. From maintaining security and compliance to managing data on BYO devices, organizations have a unique set of data security requirements.
In this Bitglass-sponsored webinar, Brian Lozada, CISO of Zocdoc, and Karthik Venna, Product Manager at Bitglass, will discuss how to balance the benefits of moving to the cloud with implementing a security solution that protects data end-to-end.


  • Find out the benefits of moving to cloud apps
  • Understand how to maintain control of your data
  • Learn how to use your partner ecosystem to keep your data secure

​Register Now!

SPEAKER:Nikolay Chernavsky, SVP & CISO Financial Services


September 27th
11 AM Pacific (2 PM Eastern)

Hardly a week goes by without a major cyber security event affecting millions of users – and the financial industry is particularly vulnerable. The 2017 Verizon Data Breach Investigations Report identified “Insider and Privilege Misuse” as a major incident pattern resulting in confirmed data breaches. According to Verizon, 62% of all breaches featured hacking, and of those, 81% leveraged stolen and/or weak passwords—giving the attacker the same privileges as a trusted insider.

At the heart of the problem lies a simple fact that many organizations fail to follow the basic information security principle of Least Privilege with trusted insiders having access to both highly sensitive and mission-critical information. As a result, accidental or deliberate misuse of a credential can lead to a breach. Companies in the financial industry are prime targets for such attacks because of the large potential payout of critical information.

While many tools have been developed to address Least Privilege issues on Windows-based systems, Linux/Unix systems were largely neglected. Unix/Linux systems are serving critical roles for many financial organizations, from storing highly sensitive information to processing millions of transactions between institutions. Being able to tightly control access to these systems is a critical security need.

This webinar will provide CISOs in financial services and other sectors:

  • A CISO’s first-hand experiences regarding the challenges faced in securing access to critical Unix and Linux systems
  • Real-world insights on how Unix and Linux Privileged Access Management (PAM) helps CISOs bolster security with granular access controls while also meeting compliance requirements
  • Guidance on selecting technologies that enable CISOs to meet their business objectives while remaining nimble
  • An executive view on where the market is headed in relation to PA

Register Now!

1 2