LegalSEC® - Cybersecurity

 View Only

2019 LegalSEC® Summit Audio Recordings and Session Materials are now available

By Online Services posted 06-07-2019 16:14

  

LSS-sq.pngSession recordings now available!


If you were unable to attend the 2019 LegalSEC Summit in DC this past week, or attended and had to choose between the great sessions being offered, we've now uploaded the recordings and presentation materials to the LegalSEC Resource Library under the 2019 LegalSEC Summit folder.  Please note that due to the nature of the content - the access to the materials and recordings will be restricted to members only so members must be logged in when clicking on the links below.

THE LIST OF SESSIONS (AND MATERIALS AS THEY BECOME AVAILABLE) FOR THIS YEAR ARE BELOW:

Welcome and Introduction to Incident Response
Incident Response Table-Top Exercise
Building an Incident Response Plan
Incident Handling Tips
Post-Incident Review
Q & A and Wrap-up (not recorded)

Keynote: William Evanina Discusses Cybersecurity, followed by Q&A
Growing Your Security Team
Leverage These Free Resources to Up Your Security and Governance Game
Mock a Hack by Using Social Engineering or the "Touchless Hack" (not recorded)
Tips & Tools in Malware Reverse Engineering
Developing a Culture of Security (not recorded)
DLP: What Is Everyone Doing?
Incident Response With Modest Resources
Microsoft Security Overview and Update
DevSecOps Deconstructed
Phishing and Beyond: Educating your Users with Impact
You Haven’t [yet] Implemented Need to Know Access? (not recorded)
Email Risks and Remedies in the Stack 2.0
Ethical Hacker Gives a Demo (not recorded)
Secure your Vendor: Must-Have Vendor Controls presented by the LS-ISAO (not recorded)
The Role and Importance MSSP's and Security Partnerships Play in Security Operations

Information Governance Roundtable
Take Away the Hackers' Advantage in Realtime!
The Micro-Perimeter / Micro-Segmentation
Threat Intelligence - Mining the Dark Web
Automating and Standardizing Client Audit Requests and RFP Responses on Information Security
How to Sell the Importance of Information Security and Governance to Your Organization
Strategies and Importance for Developing the Proper Data Classifications for Your Organization
Supporting Incident Response and Responding to Suspected Compromised Systems on your Network
Crawling Your Network to Auto-Classify Sensitive Data Subject to Regulatory Control
Implementing the First Five CIS Controls
Protecting Your Firm from Insider Threats
Security Audits: Lots of Pain. Any Gain?
Ethical Hacking Tools (Not recorded)
IT Leaders with Modest Resources Roundtable (not recorded)
Managing, Securing and Retaining Emails Was Hard Enough...
SOAR and Other Emerging Technologies
Wrap-Up




#LegalSEC
#LegalSECSummit
#Security
#ITLeaderswithModestResources
#LargeFirmSeniorManagement
#SecurityProfessionals
0 comments
357 views

Permalink