T.E.N. Knowledge Base

ISE® West 2019

Aruba Perspectives with Gartner Report "Seven Imperatives to Adopt a CARTA Approach"  > Download Whitepaper
Innovation is a core guiding principle in successful organizations. At Aruba, we are continually looking for better ways to deliver best-in-class networking and enterprise security. Whether it's improving on existing solutions like Network Access Control or bringing new technology like AI-based attack detection to address critical security challenges, we are committed to innovation in ways that matter.



APPLICATION SECURITY TESTING COVERAGE - Four Reasons the Time for Static Application Security Testing (SAST) Has Passed  > Download Whitepaper
Coverage is the most critical aspect of your application security strategy, but the word “coverage” itself needs to be unpacked. There are four dimensions of application security testing coverage that have to be considered, each of which is explained in greater detail in Figure 2.
1. Portfolio Coverage: Does your testing approach scale out effectively across your application portfolio?
2. Security Analysis Coverage: Is your testing robust enough to assess your applications for all the types of vulnerabilities you care about?
3. Code Coverage: Do you effectively test all of the executed code that is part of your applications?
4. Continuous Coverage: Does your security testing run continuously with development?

In this brief, we leverage this four-dimensional framework to provide a practical comparison between Contrast Assess and Static Application Security Testing tools and examine their respective abilities to deliver coverage.



What Drives the Need for SOC Maturity?  > Download Whitepaper
Digital Hands is an award-winning managed security services provider with a difference. We are AGILE, INNOVATIVE and PROACTIVE. Our adaptive security architecture is designed to prevent, detect and respond to cyber security threats with unparalleled velocity.

We are agile because in this business, we must be. We have nearly two decades of experience which allows us to predict where we need to go. We are continuously looking ahead and preparing for the next thing. The threat landscape demands that you move quickly and since our inception, we have risen to that challenge.



Smart Cloud Security  > Download Whitepaper
The cloud is transforming your organization. It’s changing how we work as everything is becoming more intuitive, connected, open, collaborative, and that change is rippling across SaaS, IaaS, and the web. This is great for productivity, but it’s resulting in new challenges and risks that legacy security vendors can’t address. At Netskope we believe security should be smart enough to solve these new challenges and risks. And that’s how we’ve built the Netskope Security Cloud from day one.



Cindy Carson

Cindy Carson
Sr. Director, Enterprise Security Operations
T-Mobile
Biography

Creating a Dynamic and Actionable Information Security Plan  > Summary
Even though the need is great for organizations to have an active and effective information security plan in place, few have taken the time to continuously adapt their plans to fit the company’s evolving business. However, in order for cyber risks to be monitored and managed, security teams need to be on the same page about how vulnerabilities in the system are assessed, how data assets are identified and managed, and what key business processes are crucial in case such processes are jeopardized or disrupted due to a cyber event. As enterprises continue moving to the cloud and instituting BYOD policies, an information security plan should also incorporate strict procedures and control protocols on third parties and the devices used within the business. This includes technology that will be able to monitor users, analyze activity in-house and remotely, and enact appropriate risk management tactics when necessary. Join our discussion to learn how, above all, a well-designed InfoSec plan will continue to stay up to date with the latest policy and compliance changes while also undergoing continuous cyber hygiene so data, hardware, and software remain current and secure.


Brett Cumming
Director, Information Security Officer
Skechers USA
ISE® West People's Choice Award Winner 2019
Biography

Protecting Your Online Identities: The Case for Digital Security  > Summary
The use of smartphones, social media, e-commerce, and other online profiles is not abating any time soon, making digital security a necessary part of our lives. As we continue to expand our digital footprints and form online identities, it can be easy to become lax in our security efforts, especially as more and more profiles and apps become interconnected. By accessing one digital app or service, hackers are more likely to gain access to all of your accounts that either use the same username and password or are linked together. With employees also accessing personal accounts on company-owned devices or via company networks, organizations are wrestling with who is responsible and accountable for their digital security. The obvious choice is the CISO, but with digital security crossing many aspects of enterprise transactions and departments, it calls into question how far-reaching business leaders expect the CISO’s role to be. Join our conversation as we discuss how security executives can approach digital security to protect our identities, uniting with business leaders to establish clear-cut security strategies and responsibilities.


Michael Dierickx

Michael Dierickx
Director PSIRT
Raytheon

Company Security Culture  > Summary
As numerous data breaches have placed organizations’ brands and CEOs’ jobs on the line, security is gradually becoming a priority for C-suite executives and board members alike to integrate into company culture on every level. When your organization moves beyond simply discussing security to taking actionable steps, you’ll know cybersecurity has become a priority within your company. To make that transition from “talking” to “doing,” C-suite members are responsible for convincing board members to adopt cybersecurity as a top-down initiative. The more support C-suite leaders can garner from the board, the more likely they can receive the support and funding for resources and the development of a security program. In addition, having business leaders embody a culture of security with actions as well as rhetoric can have a positive impact on employees, who often receive the brunt of training initiatives, email alerts, and security tests in an organization. Join our discussions as we learn how leadership promoting the positives of security while eliminating apathy, division, and self-interest from the culture will help ensure security behaviors change throughout the company for the better.


Kanwal_Shadaab

Shadaab Kanwal
Managing Director Digital, Data, and Analytics Transformation
Charles Schwab & Co.
Biography

Seeing the Bigger Picture with Big Data Security Analytics  > Summary
As organizations’ security perimeters continue to dissolve with the use of cloud and mobile services, many security executives are looking at Big Data Security Analytics (BDSA) for its potential to detect vulnerabilities. Early and thorough detection is crucial in a Prevent-Detect-Respond (PDR) paradigm, and BDSA can improve detection by analyzing large quantities of data in real time and identifying changed patterns in user behavior. In addition, BDSA can perform complex correlation algorithms across an organization’s various data sources. Doing so allows BDSA solutions to pinpoint and categorize only the most relevant security events, allowing even inexperienced security members to deal with them, while forensic experts can review details about the incident and compare them with past recorded anomalies. Despite BDSA solutions fostering a big-picture view of security, organizations have been slow to adopt BDSA to their security measures, even though its value is known. Join our discussions as we ask: What are the reasons for this adoption gap, and how can security executives bridge it?