While businesses continue to pour their cybersecurity investments into an endless assortment of new tools, global breaches escalate year after year. It’s time for a more proactive, security operations-based approach to cybersecurity, that not only leverages technology, but also skilled security staff and strategic processes.
Tools are just a start; you also need security experts on your team 24x7 to not only monitor your network, but also go out and track down IOC’s (indicators of compromise) effectively, efficiently, and most importantly, quickly! Whether you build your own SOC or partner with an outside vendor is unique to each company, and there are many factors to consider.
We will cover the current state of the industry, challenges people face in each area of consideration, and the benefits of each model.
Join us at JK's for a discussion on the latest cyber security threats and what you can be doing today to stop them.
We have a door prize to raffle off this month. At the end of the meeting, we will draw one lucky winner for the Apple AirPods Max Headphones!
Lunch is sponsored by Artic Wolf.
SOC - Buy vs Build
MSU Interdisciplinary Conference on Cybercrime
BSides Fort Wayne
Cybersecurity Alphabet Soup
Cyber Insurance in a Ransomware World
Are you out of your Trust but Verifying Mind
O365 Cloud Security
Anatomy of a Hack
Cloud Service Providers Webinar
NEIN-ISSA Holiday Networking Event
Rolling Cyber Security into Risk Management
IoT - from the Edge, through the Fog, and to the Cloud
Northeast IN Year End Celebration
Lifeline Data Center Tour
Privileged Account Management: A Sprint Approach
Securing the Internet of Things
The who, what, where and why of SIEM
Northeast Indiana ISSA Holiday Celebration 2017
Understanding Penetration Testing
IT and Finance: Bridging the Knowledge Gap
ISSA NE IN - Social
Compliance and Regulations
Preventing Data Disasters
20 Critical Security Controls
Ransomware and Drinks
Meet the President of ISSA Int'l
Hyper Converged Solutions
3D Printing Demo