Log in


BLOG

<< First  < Prev   1   2   3   Next >  Last >> 
  • July 28, 2021 4:12 PM | Mangaya Sivagnanam (Administrator)

    We're exicted to welcome BlackBerry as a new chapter sponsor at the Gold level!


    At BlackBerry, we take a prevention-first and AI-driven approach to cybersecurity.  BlackBerry cybersecurity solutions use the 7th generation Cylance® AI engine, trained on a threat dataset numbering in the billions, to identify and prevent attacks.  The AI resides on the endpoint and in the cloud, offering holistic and multi-layered protection without requiring continuous Internet connectivity.

    BlackBerry Unified Endpoint Security: AI-driven cybersecurity that works smarter, not harder.
    Protects your organization with a modern Unified Endpoint Security (UES) solution. Our end-to-end approach to cybersecurity is deeply rooted in Cylance® artificial intelligence (AI) and machine learning (ML), providing enhanced visibility and protection against current and future cyberthreats.

    Critical Event Management: Respond smarter, faster and better.
    Emergencies and business disruptions happen. It’s how you prepare and respond to them that determines their impact. BlackBerry's critical event management solutions combine a secure emergency notification system with incident response tools and capabilities. So you can quickly deploy your response teams, enabling them to better prepare for, respond to and recover from critical events–faster.

    Internet of Things:
    BlackBerry's QNX protects the most critical systems—from medical devices to over 195 million vehicles. It delivers a time-tested real-time operating system (RTOS), hypervisor, and other embedded software to help make you successful. We are the embedded OS of choice for ventilators, train controls, factory automation systems, medical robots and more. Whether your priority is safety certification, security or performance, our software, tools and services can help you build more reliable products.

    Please take a few moments to review their website or approach them for a discussion at our next meeting. You could find something valuable to you or simply increase your knowledge about the latest trends, tools and techniques in our industry.

  • July 28, 2021 3:53 PM | Mangaya Sivagnanam (Administrator)

    We're exicted to welcome ProCircular as a new chapter sponsor at the Gold level!


    ProCircular is a cybersecurity and compliance firm providing realistic, actionable and expert guidance to organizations looking to improve their security readiness, meet regulatory commitments, and address the ever-changing landscape of cyber threats. ProCircular serve a variety of industries, including finance, education, healthcare, manufacturing, government, defense contractors, and more.

    No matter what your core business, your most valuable asset is your data and people. It’s the lifeblood of your organization. Each organization faces different challenges when it comes to protecting these treasured resources, so the approach taken to safeguard your information should be unique, too.

    It’s okay if you don’t know what you need, or aren’t sure where to start. ProCircular can find a solution that will work for you—when you’re ready—regardless of the obstacles you face, the budget you must adhere to, or the goals you want to achieve. There’s more than one way to tackle cybersecurity, and we want to do it right.

    Please take a few moments to review their website or approach them for a discussion at our next meeting. You could find something valuable to you or simply increase your knowledge about the latest trends, tools and techniques in our industry.


  • July 28, 2021 3:43 PM | Mangaya Sivagnanam (Administrator)

    We're exicted to welcome SentinelOne as a new chapter sponsor at the Gold level!


    The SentinelOne platform delivers the defenses you need to prevent, detect, and undo—known and unknown—threats. Proactively resolve threats in real-time at the site of the cybersecurity battle: the computing and cloud edge.

    SentinelOne Platform Componenets:

    •  EPP prevention is a AI-powered models identify malware and ransomware binaries before they detonate with high degrees of precision.
    •  ActiveEDR is build critical context for proactive real-time detection & response and long term threat hunting in a user-friendly fashion.
    •  IoT Component Ranger rogue device discovery provides visibility into all managed and unmanaged network devices and control over those devices
    •  Workloads component benefits your digital tranformation, complete protection, visibility, and control.

    SentinelOne Singularity unifies historically separate functions into a single agent and platform architecture.

    Please take a few moments to review their website or approach them for a discussion at our next meeting. You could find something valuable to you or simply increase your knowledge about the latest trends, tools and techniques in our industry.

  • July 26, 2021 2:47 PM | Mangaya Sivagnanam (Administrator)

    We're exicted to welcome Cofense as a new chapter sponsor at the Gold level!


    Cofense Phishing Detection and Response platform catches the phishing emails that your secure email gateway inevitably misses. They deliver the technology and insight needed to detect, analyze, and stop phishing attacks

    Human-vetted phishing intelligence from Cofense research analysts, 27 million strong global phish network and their PDC team provides easily-integrated (SIEM, mSOAR, TIP) full-spectrum intelligence and campaign identification for Triage and auto-quarantine capabilities in Vision.

    Please take a few moments to review their website or approach them for a discussion at our next meeting. You could find something valuable to you or simply increase your knowledge about the latest trends, tools and techniques in our industry.

  • July 26, 2021 2:39 PM | Mangaya Sivagnanam (Administrator)

    We're exicted to welcome Arctic Wolf as a new chapter sponsor at the Gold level!


    VISION:
    Arctic Wolf envision a future without cyber risk. Every organization should be so effective at security operations that both the likelihood and impact of a cyber attack is minimized to the point where risk is essentially zero.

    MISSION: END CYBER RISK

    Please take a few moments to review their website or approach them for a discussion at our next meeting. You could find something valuable to you or simply increase your knowledge about the latest trends, tools and techniques in our industry.

  • June 23, 2021 7:28 PM | Mangaya Sivagnanam (Administrator)


    Axonius recently partnered with Enterprise Strategy Group (ESG) to explore how last year’s rapid shift to remote work impacted IT complexity and reshaped cybersecurity priorities.

    To better understand the pandemic's impact on IT complexity, the resulting visibility challenges, and changes in post-pandemic priorities, we put together a suite of content — including:

    • [REPORT] Cybersecurity Asset Management Trends 2021: How the Rapid Shift to Remote Work Impacted IT Complexity and Post-pandemic Security Priorities — annual global survey of IT and security professionals
    • [ON-DEMAND WEBINAR] New Research Reveals Post-Pandemic IT and Security Challenges
    • [BLOG] Report: 4 Key Factors Driving IT Complexity
    • [BLOG] Report: The Pandemic’s Impact on IT Complexity, Security Priorities
    • [VIDEO] How the Rapid Shift to Remote Work Impacted IT Complexity & Post-Pandemic Security Priorities
    • EXPLORE THE RESOURCE

  • June 23, 2021 7:20 PM | Mangaya Sivagnanam (Administrator)



    Learn more about "How Avant Mastered Cybersecurity Asset Management With Axonius"

    Rapid organizational growth often brings along operational challenges — especially when it comes to cybersecurity asset management.

    This was the case for the security team at Avant, a financial technology company that offers a full array of digital banking products to middle income U.S. consumers. As their business scaled, gaining visibility into a multitude of services and IT assets quickly became a challenge for Avant’s security team.

    As Jared Gray, senior manager of security operations at Avant, put it: the security team was “spending way too much time... gathering information, [and] understanding host information and user information.” 

    As Avant’s IT environment got more complex, the security team quickly realized:

    • Their existing manual processes for asset inventory couldn’t keep up
    • They lacked insight into where the gaps in their inventory and processes were
    • Actions like policy enforcement suffered from a data-poor, manual approach
    • It was hard to glean everything needed to aid incident response investigations

    • Gaining Visibility Into Assets With Axonius

      The immediate value-add that Axonius brought to the Avant team was simple: centralized, accurate, and comprehensive data on their environment. 

      The Axonius cybersecurity asset management platform offered an unprecedented amount of visibility into Avant’s services and IT assets, backed by unparalleled flexibility and service.

      Axonius enabled Avant to:

      At the same time, Gray’s team has carried the benefits of the Axonius cybersecurity asset management platform into unexpected areas, including compliance and PCI requirements, audit workflows, and more.

  • April 01, 2021 8:19 AM | Mangaya Sivagnanam (Administrator)

    One year ago, the world turned upside down. If anyone would have told us that everything around us was going to pivot and become 100 percent work from home overnight, we would never have believed it. People are resilient though. History has shown us that in tough times, often comes great innovation.

    As cybersecurity professionals, we do a lot of “thankless” work. When we are unsuccessful, we quickly become inundated with complaints, but when we’re successful, nobody around us thinks about what we do. To be healthy and successful in this industry, it is important for us to take opportunities like this to reflect on how much we achieved over the previous 12 months.

    One year ago, hundreds of millions of people around the world immediately and unexpectedly started working from home instead of their offices. This required a drastic change to account for all the transitions that resulted from that shift.

    •   Large quantities of data flowed in different directions
    •  Corporate VPNs needed to be upgraded
    •  Capital improvement projects at Company HQ's greatly slowed
    •  Priorities in IT infrastructure projects quickly changed
    •  Home routers became a larger consideration within corporate networks
    • Home Office setups for employees became larger considerations for workforce productivity goals
    •  Increased mitigation of new network threats that target remote workers

    For many of us, we also shifted away from networking events, client lunches, trade shows with expert speakers and booths giving away really cool branded socks, to Zoom Meetings and learning how to interact effectively in a virtual setting.

    Then we learned about Zoom Bombing and everyone, especially in security circles, got a quick lesson in virtual platform security. Zoom had to rapidly fix the problem or lose out on the golden opportunity of this moment. Microsoft Teams rapidly developed new features and integrations, Google scrambled to make its Meet platform robust enough to share the public load. Several other players in the video streaming business also reached to secure market share. All of this so we could keep doing meetings with our coworkers, clients and prospects.

    We all tried our best to do everything we’d been doing before, but we quickly learned that “Zoom fatigue” and pandemic fatigue are very real things. So as organizations, we adjusted yet again, we shortened our events and tried to come up with new and engaging ways to use technology to stay both relevant, creative, and secure.

    It’s the people in our field who helped make that possible. We helped people successfully transition into entirely new methods of work, learn and implement new software, and feel less anxious about all the changes going on in their lives. Many of us worked on entirely new projects and initiatives we had never worked on before and were asked to be successful within unprecedented timelines.

    People are resilient, and it has never been on more wide-scale display than over the past year. Watching thousands of people across the country shift to remote-work environments, and helping them quickly adapt to the need for relevant security training and content, has emphasized the collective strength of our industry.

    Yes, there were extra hours, extra stress, and extra challenging demands, but we rose to meet them, and we showed our best. When looking back over the last 12 months, we can all be proud of the quick adjustments made throughout our industry. We have found new and creative ways to stay engaged and productive, and because of our own resilience, hundreds of millions of others are more secure. Together we are poised to thrive in the year ahead. 

    Tyler Olson, Founder of SHYLD Cybersecurity Academy and Professional Speaker, is an award-winning serial entrepreneur in several technology fields. He not only brings well-rounded exposure from all sectors of technology including Cyber Security, Social Media, and Data Analytics, but his deep passion for helping people learn and interactive speaking style ensures audiences of any level leave his presentations with new insights

                             

       

    Tyler Olson, Founder of SHYLD Cybersecurity Academy and Professional Speaker, is an award-winning serial entrepreneur in several technology fields. He not only brings well-rounded exposure from all sectors of technology including Cyber Security, Social Media, and Data Analytics, but his deep passion for helping people learn and interactive speaking style ensures audiences of any level leave his presentations with new insights

    Tim Herman is a Cyber Security Outreach Advisor for Norwich University Applied Research Institutes (NUARI) helping  companies and organizations build resiliency in Cyber Security and Emergency Preparedness through customized table top to full scale exercises. Tim serves on the CSS 2021 Think Tank, Serves as Event Director and Sponsorship Coordinator on the Board of MNISSA.org, and Board Member and Program Chair of InfraGard MN.


  • October 16, 2020 11:00 AM | Mangaya Sivagnanam (Administrator)



    MNISSA Sponsor Event

    Zero Visibility. Even Less Control

    A discussion on how to deal with the challenges of managing third-party vendor cyber risk.

    No business leaves the back door open at night. Yet companies often use third-party service providers without checking their security and privacy measures. And when these providers have their own third-party service providers, risk multiplies.

    So, even if you have robust security measures across your network and systems, your assets – trade secrets, IP, personal data, business data, reputation, even – can be low-hanging fruit for a cyber-attack. Join us for a conversation on the challenges and strategies of managing supply chain and third-party vendor risks, including:

    • Defining a comprehensive approach to addressing and managing a sustainable vendor risk program
    • Typical issues such as inconsistent ongoing monitoring of vendors, security and risk considered too late in procurement process, lack of risk visibility across vendor landscape, and communication to the C-suite and Board 
    This expert panel of security and risk specialists will be moderated by Graeme Payne, former Senior Vice President and CIO of Global Corporate Platforms at Equifax and author of The New Era of Cybersecurity Breaches available on Amazon. Click here to learn more about Graeme and his 30+ years of consulting and management experience. NOTE: we are offering attendees a free 2-hour Vendor Risk Consulting Workshop (a $1,600 value) with our experts to discuss ways to optimize your current vendor cyber risk process.

    Register now to reserve your spot!

  • November 19, 2019 12:16 PM | Ryan Sather (Administrator)

    In support of Cyber Security Awareness month we have a special discount for you to join or renew your membership in ISSA!

    Click on the applicable button below and put code CYB$30 in the Lead Source field.  Be sure to select the Minnesota Chapter when joining.  This should bring your total annual membership cost down to $85 (ISSA and Chapter dues are normally $115 combined).

    This offer expires October 31st, 2019 so don’t delay!

    Renewals will simply add 12 months to the end of your membership term, so if you’re only partway into your year, take advantage of this offer!

    If you have any issues please reach out to Ranae Moore via email at vp@mnissa.org or feel free to stop by our booth next week at the Cyber Security Summit!

<< First  < Prev   1   2   3   Next >  Last >> 


2002, 2016, 2019 Chapter of the Year

© Minnesota Chapter of ISSA International

Powered by Wild Apricot Membership Software