Reacting to Cyber Threats
While businesses continue to pour their cybersecurity investments into an endless assortment of new tools, global breaches escalate year after year. It’s time for a more proactive, security operations-based approach to cybersecurity, that not only leverages technology, but also skilled security staff and strategic processes.
Tools are just a start; you also need security experts on your team 24x7 to not only monitor your network, but also go out and track down IOC’s (indicators of compromise) effectively, efficiently, and most importantly, quickly! Whether you build your own SOC or partner with an outside vendor is unique to each company, and there are many factors to consider.
We will cover the current state of the industry, challenges people face in each area of consideration, and the benefits of each model.
Join us at JK's for a discussion on the latest cyber security threats and what you can be doing today to stop them.
We have a door prize to raffle off this month. At the end of the meeting, we will draw one lucky winner for the Apple AirPods Max Headphones!
Lunch is sponsored by Artic Wolf.
West Wayne Street
Fort Wayne, IN
USA
Directions
No upcoming events planned at the moment. Subscribe to our mailing list to be notified as soon as we get something on the books.
Subscribe to our mailing listCyber Insurance Landscape
The AI Revolution
November ISSA Event
Cybersecurity Joint Meeting w REF CIO Forum and ISSA
State of Cybersecurity
Mobile Security
Reducing Microsoft 365 Risk
A Journey to the Cloud
Protecting Your Organization with MDR
Cyber Insurance Insights
Zero Trust Segmentation
2022 Year End Celebration
Cybersecurity Rants... And Other Topics of Interest
Healthcare Cybersecurity Summit
When It's OK to Lie: Not Your Father's Honeypot
Reacting to Cyber Threats
SOC - Buy vs Build
MSU Interdisciplinary Conference on Cybercrime
BSides Fort Wayne
Cybersecurity Alphabet Soup
Cyber Insurance in a Ransomware World
Are you out of your Trust but Verifying Mind
Solarwinds Breach
O365 Cloud Security
Anatomy of a Hack
Cloud Service Providers Webinar
COVID-19 Webinar
Cyber Wellness
NEIN-ISSA Holiday Networking Event
Rolling Cyber Security into Risk Management
IoT - from the Edge, through the Fog, and to the Cloud
Indiana InfraGard
Northeast IN Year End Celebration
Lifeline Data Center Tour
Social Gathering
Privileged Account Management: A Sprint Approach
Securing the Internet of Things
The who, what, where and why of SIEM
Northeast Indiana ISSA Holiday Celebration 2017
Understanding Penetration Testing
IT and Finance: Bridging the Knowledge Gap
ISSA NE IN - Social
Compliance and Regulations
Preventing Data Disasters
20 Critical Security Controls
Ransomware and Drinks
Meet the President of ISSA Int'l
Networking Event
Hyper Converged Solutions
3D Printing Demo
Ransomware Roundtable