Building a Cybersecurity Architecture to Combat Today’s Risks

"Layered defense" has traditionally been the modus operandi of IT security, but this approach can't be counted on to stand up to today's threats and attacks. In addition, attack surfaces are growing every day as companies adopt technologies like cloud and the Internet of Things. We'll help you rethink IT security from a strategic, architectural perspective and outline ways to build a comprehensive set of defenses that can discourage and repel attackers.

Available:
On Demand
Duration:
1h 00min

Attend this webinar to:

  • Develop your security architecture framework towards a Zero Trust Strategy
  • Align IT security with business strategy and current threats
  • Adapt architecture to different environments, including on-premises, cloud and hybrid cloud environments

Featured Speakers

  • Gal  Shpantzer
    Gal Shpantzer
    Independent Security Consultant

    Gal Shpantzer has over 15 years of experience as an independent security professional and is a trusted advisor to CISOs of large corporations, technology and pharma startups, Ivy League universities and non-profits/NGOs. Since 2014, Gal has focused on emerging threats to availability as well as confidentiality (ransomware and destructive attacks). Gal has been involved in multiple SANS Institute projects since 2002, including co-editing the SANS Newsbites, revising the E-Warfare course and presenting on cyberstalking, CAPTCHAs, endpoint security and hardware roots of trust. In 2009, he founded and led the privacy subgroup of the NIST Smart Grid cybersecurity task group, resulting in the privacy chapter of NIST IR 7628. He is a co-author of the Managing Mobile Device Security chapter in the 6th ed. Vol 4 of the Information Security Management Handbook (2010) with the late Dr. Eugene Schultz, and is a technical editor of an upcoming O'Reilly book on defensive security (2017). Gal collaborated with Dr. Christophe Veltsos to present the ongoing Security Outliers project, focusing on the role of culture in risk management at RSA, CSI, BSides and Baythreat conferences. Most recently, he was involved as a subject matter expert in the development of the U.S. Department of Energy’s Electric Sector Cybersecurity Capability Maturity Model (ESC2M2) in 2012, and is launching the Incident Response Execution Standard project late 2016. Gal was also involved in the Infosec Burnout research project and co-presented on this topic at BSides-Las Vegas and RSA.

  • Erik  Bartholomy
    Erik Bartholomy
    Security Architect
    LogRhythm

    Erik Bartholomy brings more than 25 years of experience working in corporate IT security and consulting for several Fortune 500 companies. At LogRhythm, he develops and maintains the company's security architecture, governance models and risk strategies, and protects the confidentiality, integrity, and availability of information assets. The architecture and compliance program that he runs, governs the security posture and security architecture at LogRhythm based on industry standards (NIST, ISO 27001 and SOC 2).

    Prior to joining LogRhythm, Erik worked for EDS, where he was formally trained as a Systems Engineer and Architect. He spent the next 17 years working at IBM as an Architect, building out the company's internal e-Business and On Demand environments. He spent his last eight years at IBM working in security architecture, where he managed the CIO's global architectural strategy for internal core infrastructure services (DSN, Enterprise-wide Authentication, NTP, GSLB, Proxy Servers, FWs).

Sponsored By