Cyber Threat Alliance
Cyber Threat Alliance
  • 46
  • 5 915
CTA Webinar - Collaborative Cybersecurity: Balancing Systemic Responses and Market Competition
Increased connectivity brings many benefits, from increasing a company’s customer base to providing citizen services more efficiently. However, this connectivity comes with a cost in the form of increased risk, whether due to malicious activity or accidents. This risk has both private and public components, and it is not distributed evenly across the digital ecosystem. As a result, managing cyber risks effectively have proven challenging for most societies. Cybersecurity providers have a unique role to play in managing the resulting systemic risk, whether individually or through organizations like CTA.
Join CTA President and CEO Michael Daniel, Derek Manky, VP Global Threat Intelligence, Fortinet; Matt Olney Senior Director of Threat intelligence and Interdiction, Cisco Systems; David Beabout, Global CISO, NTT Security Holdings; and Samantha Madrid, Cybersecurity Executive, as they explore how the cybersecurity industry can work together to make changes at the systemic level, while maintaining competitive relationships crucial to a market economy.
Переглядів: 122

Відео

CTA Webinar - The Cybersecurity Divide: Addressing the Cyber Poverty Line
Переглядів 3482 місяці тому
When Wendy Nather coined the term “cybersecurity poverty line,” the cybersecurity industry was not paying attention to how unevenly cybersecurity capabilities were distributed. This term provided a way to conceptualize the stark divide between the companies who could afford to invest in good cybersecurity and those who could not, and it sparked a discussion about how to help those entities oper...
CTA Webinar A Tangled Web - The Hard Problem of Complexity
Переглядів 4033 місяці тому
Complexity is the enemy of security, whether physical or virtual. Improving security usually requires reducing complexity, but in cyberspace, the opposite trend holds true - complexity is growing at an amazing rate. Not surprisingly, we struggle with deploying effective cybersecurity in this type of environment. Yet, there are reasons for optimism. We can combat complexity and improve the cyber...
CTA Webinar - Guardians of Good, Fortifying NGO Cyber Defenses
Переглядів 5565 місяців тому
In today’s digital age, NGOs face a unique and evolving set of cyber security threats that can jeopardize their missions and operations. This webinar, “Guardians of Good: Fortifying NGO Cyber Defenses,” will provide a comprehensive overview of the cyber threat landscape for NGOs, identify common vulnerabilities, and discuss effective strategies for mitigating those risks. The discussion will ex...
CTA Webinar - Don’t Get Zapped: Taking the Volt Typhoon Threat Seriously
Переглядів 7009 місяців тому
The US government has issued a warning that Chinese cyber actors are trying to gain access to US critical infrastructure networks. In most cases, access to these networks would not provide intelligence information; instead, the intent is to be able to hold US critical infrastructure at risk in the event of a conflict. The Volt Typhoon actors maintain strong operational discipline, leverage legi...
CTA Webinar Course Change or Course Correction
Переглядів 16410 місяців тому
Course Change or Course Correction? How governments are evolving their approach to cybersecurity The US government has adopted an array of new cyber policies and published a National Cybersecurity Strategy over the past few years. Collectively, these policies signal a significant shift in how the Federal government is approaching cybersecurity. Instead of relying primarily on individual organiz...
CTA Webinar - No bolt-ons or after thoughts: integrating security into emerging technologies
Переглядів 97Рік тому
Many emerging technologies, from artificial intelligence to quantum computing to synthetic biology, involve computational systems and are vulnerable to manipulation by malicious actors. Our experience with the IT and internet revolutions of the late 20th and early 21st centuries demonstrates that we need to integrate security into these technologies from the beginning, rather than trying to add...
CTA Webinar Is AI the Snake Oil for the 21st century
Переглядів 136Рік тому
Claims about AI tend toward the extremes. Either it’s the technology that will finally usher in the Golden Age of IT or it signals the end humanity and the rise of the machines. While neither extreme is likely, most organizations are grappling with this technology and the claims that the suppliers (and opponents) of this technology make. Join Steve Grobman from McAfee and Michael Daniel from th...
CTA Webinar Ransomware Beyond Encryption - Tackling Harassment and the Evolving Threat
Переглядів 75Рік тому
While down from its high-profile peak in 2021, ransomware remains a serious threat to businesses, non-profits, and governments. As organizations increase their resilience to ransomware attacks focused on data encryption, malicious actors are employing tactics like data dumping, harassment, denial of service attacks, and other techniques to get victims to pay. Even cyber insurance plays a role i...
CTA Webinar Metrics that Matter: Measuring and Communicating Progress in Cyber in 2023
Переглядів 161Рік тому
As the cybersecurity industry nears 30 years of mature existence, it’s still difficult to agree on the metrics most indicative of cyber health, and clearly communicate progress against those metrics to stakeholders with diverse interests and understanding of evolving threats. The Biden Administration’s new National Cybersecurity Strategy has placed a new focus on measurement and reporting again...
CTA Webinar Stronger Together: From Slogan to Action
Переглядів 100Рік тому
On the surface, Stronger Together seems like a no-brainer. No one would argue that we are “Weaker Together” or “Stronger Alone.” Yet, the community does not always act like this statement is true; instead, we sometimes turn on each other more aggressively than any adversary. How do we transform Stronger Together from a platitude to an actionable concept, while maintaining the competition that d...
CTA Webinar Solving Actionable Intelligence Through a Diverse Ecosystem
Переглядів 92Рік тому
For decades we have been faced with the classic ‘last mile’ challenge when it comes to information sharing and threat intelligence. Often times an end user’s use case simply does not fit with what is being offered through the threat intelligence platform. And so it becomes a case of putting a square peg in a round hole. For example, you can have lots of great information in a machine formatted ...
CTA Webinar This Shouldn't Be So Hard: : making cybersecurity more effective for everyone
Переглядів 83Рік тому
Mention cybersecurity to most people and the reaction is rarely, “Oh, I understand what that’s about.” Instead, most people think of it as a mystic art, understood only by a few (nerdy) hacker-types (in hoodies). Yet, cybersecurity is now critical to almost every economic, social, and public safety function in society. As an industry and discipline, we need to make cybersecurity more accessible...
Mandatory Cyber Incident Reporting Requirements are Good for Business
Переглядів 143Рік тому
Many countries are implementing mandatory cyber incident reporting requirements, including the US, EU, Australia, and India. While the typical private sector instinct might be to oppose such rules, properly drafted reporting requirements will ultimately benefit the business community. Governments and cybersecurity providers can use the resulting information to provide tailored assistance, gener...
CTA Webinar: When What Didn't Happen is More Interesting
Переглядів 61Рік тому
2022 was the year when what didn’t happen was more interesting than what did happen. Despite the Russian invasion of Ukraine, widespread cyber attacks outside of the immediate combat zone did not materialize. Although Log4j was a serious vulnerability, few intrusions or attacks have been blamed on it. High profile ransomware events were fewer than in 2021, and the US midterm elections were quie...
CTA Webinar - Adapt your defenses: there are enough DDoS attack vectors to fill a Periodic Table
Переглядів 602 роки тому
CTA Webinar - Adapt your defenses: there are enough DDoS attack vectors to fill a Periodic Table
CTA Webinar In the Crosshairs - How Geopolitics Can Increase Your DDOS Risk
Переглядів 1782 роки тому
CTA Webinar In the Crosshairs - How Geopolitics Can Increase Your DDOS Risk
The NTT 2022 Global Threat Intelligence Report: A year of more sophisticated and substantial threats
Переглядів 1682 роки тому
The NTT 2022 Global Threat Intelligence Report: A year of more sophisticated and substantial threats
The Cyber Threat Landscape: 2021 Was a Hell of a Ride - 2022 Isn’t Shaping Up Any Better
Переглядів 1512 роки тому
The Cyber Threat Landscape: 2021 Was a Hell of a Ride - 2022 Isn’t Shaping Up Any Better
CTA Webinar - SonicWall Capture Labs Perspective on 2021 Threat Landscape
Переглядів 512 роки тому
CTA Webinar - SonicWall Capture Labs Perspective on 2021 Threat Landscape
CTA Webinar - What are the chances? A new metric for cybersecurity decisions
Переглядів 952 роки тому
CTA Webinar - What are the chances? A new metric for cybersecurity decisions
CTA Webinar - Talos Incident Response Year-in-Review for 2021
Переглядів 472 роки тому
CTA Webinar - Talos Incident Response Year-in-Review for 2021
CTA Webinar - Sharing Over the Long Run: Celebrating 5 Years of Enduring Collaboration
Переглядів 1782 роки тому
CTA Webinar - Sharing Over the Long Run: Celebrating 5 Years of Enduring Collaboration
Celebrating Five Years of the CTA
Переглядів 2182 роки тому
Celebrating Five Years of the CTA
CTA Webinar Sophos 2022 Threat Report: Interrelated Threats Target an Interdependent World
Переглядів 703 роки тому
CTA Webinar Sophos 2022 Threat Report: Interrelated Threats Target an Interdependent World
CTA Webinar Understanding cloud native supply chain attacks to defend against them
Переглядів 513 роки тому
CTA Webinar Understanding cloud native supply chain attacks to defend against them
CTA Webinar Mind the Gap Concept vs Reality in Cybersecurity
Переглядів 803 роки тому
CTA Webinar Mind the Gap Concept vs Reality in Cybersecurity
CTA Webinar - Examining Public ICS/OT Exploits for Vulnerability Priortization
Переглядів 443 роки тому
CTA Webinar - Examining Public ICS/OT Exploits for Vulnerability Priortization
CTA Webinar :: Combating Botnets through Consumer IoT Cybersecurity Labeling
Переглядів 1393 роки тому
CTA Webinar :: Combating Botnets through Consumer IoT Cybersecurity Labeling
CTA Webinar NTT Global Threat Intelligence Report
Переглядів 593 роки тому
CTA Webinar NTT Global Threat Intelligence Report