article thumbnail

Combined SOC Webinar Q&A: From EDR to ITDR and ASO … and ChatGPT

Anton on Security

In recent weeks, I did two fun webinars related to Security Operations, and there was a lot of fun Q&A. For extra fun, I had ChatGPT answer some of them, to see if it can replace me :-) So, first, ISACA webinar “Modernize Your SOC for the Future” focused on our Autonomic Security Operations vision. with the SOC?

article thumbnail

SEC Cybersecurity Rules

Adam Shostack

Fifteen years ago, Andrew Stewart and I published The New School of Information Security , in which we called for greater disclosure of cyber incidents and learning more from them. At the time, it was a controversial position, and Im glad to see it broadly coming to pass in the United States.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BSides Berlin 2021 – Michal Ogorzalek’s ‘How Secure Are Webinar Platforms?’

Security Boulevard

The post BSides Berlin 2021 – Michal Ogorzalek’s ‘How Secure Are Webinar Platforms?’ ’ appeared first on Security Boulevard. Our thanks to BSides Berlin for publishing their tremendous videos from the BSides Berlin 2021 Conference on the organization’s’ YouTube channel.

article thumbnail

Webinar and eBook: The Dark Side of EDR. Are You Prepared?

The Hacker News

Endpoint Detection and Response (EDR) platforms have received incredible attention as the platform for security teams. It's important to understand that each

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Fasten your seatbelts and enjoy the Top 5 list of Thales webinars for 2022. Trends in Cloud Security: Key Findings from the 2022 Cloud Security Study. Thu, 01/12/2023 - 05:54.

article thumbnail

Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Anton on Security

Many organizations are looking for trusted advisors , and this applies to our beloved domain of cyber/information security. Bridging the Trust Gap The key to safely using LLM-powered “untrusted security advisor” for more use cases is to maintain a clear separation between their (untrusted) outputs and your (trusted) critical systems.

article thumbnail

The University of Queensland’s Webinar: ‘Cyber Security – Is A Secure Future Possible?’

Security Boulevard

The post The University of Queensland’s Webinar: ‘Cyber Security – Is A Secure Future Possible?’ ’ appeared first on Security Boulevard.