July 17, 2018
11 AM EDT
The changing digital landscape of data and devices is creating a perfect storm of opportunity for cybercriminals. Enterprises today are prime targets, as more users access more data using more—and more varied—devices. In particular, enterprises today must contend with issues including ransomware, IoT security flaws, DDoS attacks and managing mobile devices on the corporate network.
In this webinar, we’ll take a look at the four current threats enterprises can’t ignore in maintaining a strong security posture and offer tips in alleviating the complexity of and frustration in addressing each threat. Our panel of industry experts also will provide some best practices in preparing now for the next generation of security threats.
Jeannie Warner, Security Manager,
Jeannie has worked in security since 2001, with detailed work in analysis and operations, product management, product marketing, senior operations management, and occasional forensics investigation and compliance. She is an advocate and evangelist for security process maturity, and finding integration points for application and network security as the “big picture” in managing risk.
Brandon Creighton, Research Architect, Veracode
Brandon Creighton is a Research Architect at Veracode. In this role, he’s working to make application security testing more accurate, scalable and effective. He also works with DevOps and security teams – both at Veracode and customer organizations -- to help them maximize the value gained from using application security testing services and tools. He has presented research on application, device and wireless security at conferences such as Black Hat, CanSecWest and Shmoocon.
Scott King (CISSP) - Sr. Director - Rapid7 Consulting
Scott has over 20 years of professional work experience in the IT and cybersecurity fields. He started his career as a network and systems engineer in the midst of the Silicon Valley dot com boom of the 90's. In 2001, Scott moved into an information assurance role supporting the Department of Defense, which kick started his career as a cybersecurity professional. Scott has worked for the DoD, state governments, large technology companies, mid-size manufacturing companies, and the spent significant time in the energy industry. Scott brings a unique mixture of hands-on experience in incident response, penetration testing, forensics, operations, architecture, engineering, and executive leadership as a former Chief Information Security Officer (CISO) to the Rapid7 Advisory team.