ossimUpdate

 

I'd certainly advise on ATTENDING and ACTIVELY PARTICIPATING in webinars, webcasts and conferences as one of the KEY COMPONENTS to anyone's professional development, i.e. life (as you can get in direct contact - or better said, INTERACTION with many valued experts / colleagues). After all, you might also get a few CPE points (usually 1 pt for each webinar attended)...

 

However, during the years I've attended and participated in many of those listed below (it's a never-ending list though!):

 

Amazon Web Services:

Masterclass: Advanced Security Best Practices with AWS webinar (Sep 22, 2015)

The Journey through the AWS Cloud: Digital Media (Nov 24, 2015)

Masterclass - Amazon EC2 (Jan 20, 2016 )

Security First in the Public Cloud - Agile, Innovative and Compliant with AWS (Computerwoche.de & AWS Germany)

Amazon EC2 for Microsoft Windows Server 8/27 (AWS - August 2015)

How To Get The Essential Visibility and Control You Need For AWS Security and Compliance (AlienVault - November 8, 2018)

 

BrightTALK:

How the GDPR Impacts Your Enterprise Mobility Management Practices
Magnus Mjøsund, Apperian Product Manager & Chris Marsh, 451 Research Director, Workforce Productivity & Compliance
Recorded: Sep 28 2017 57 mins

Malware of the Week | One-Two Punch
Proofpoint
Recorded: Jul 20 2018 10 mins

Der Faktor Mensch 2018 – aktuelle Proofpoint Forschungsergebnisse
Markus Grüneberg, Senior Cyber Security Strategist, Proofpoint
Recorded: Jun 5 2018 54 mins

Human Factor 2018 - Cryptocurrencies, Ransomware and Cloud Based Attacks
Adenike Cosgrove, Cybersecurity Strategist and Davide Canali, Senior Threat Analyst
Recorded: May 24 2018 44 mins

What Does “Next Generation Security” Mean To You?
Patrick Grillo, Senior Director, Security Solutions, Fortinet
Recorded: Jul 3 2018 31 mins

Identify and Stop Malware in the Quickest and Most Accurate Way Possible
Bob Honour - EMEA Marketing Director; John Aarsen - Solutions Architect
Recorded: Jun 21 2018 52 mins

How to Best Protect Your Data from Cyber Threats
John Aarsen - Solutions Architect – SonicWall, Florian Malecki – International Product Marketing Director - StorageCraft
Recorded: Jun 7 2018 69 mins

Data Breaches, Identity & Security
Amar Singh (CMA) | Barry Scott (Centrify) | Nick Bilogorskiy (Juniper Networks) | Raef Meeuwisse
Recorded: Jun 6 2018 45 mins

Advanced Endpoint Protection (AEP) 2.0 Group Test Results
Bhaarath Venkateswaran, Phuong Nguyen
Recorded: May 17 2018 50 mins

Advanced Endpoint Protection (AEP) 2.0 Group Test Results - SentinelOne
Mike Spanbauer - NSS Labs, Aviram Shmueli - Sentinel One & Gary Mello - SentinelOne
Recorded: May 24 2018 59 mins

How can you ensure that your logging infrastructure is GDPR compliant?
Istvan Molnar, John Murdoch
Recorded: May 17 2018 60 mins

Kerberoasting Attack Detection For SOC Analysts (Securonix - November 12, 2018)

Using Machine Learning to Detect Command Line Anomalies (Adobe - November 13, 2018)

Ready for Liftoff? Planning a Safe and Secure Cloud Migration (Cyxtera - November 20, 2018) 

Architecting a Sophisticated DDoS Attack in 5 steps (Link11 - November 22, 2018)

2018: The Year in Data Security (Code42 - December 12, 2018) 

 

 

Sophos:

 

Security SOS Week day 4 - privacy - can you have too much of a good thing? (July 2018)

Security SOS Week day 4 - trends in malware: first ransomware, now cryptojacking, what next? (July 2018)

Sophos Mobile Tips & Tricks: Attacks on Mobiles and How to Mitigate Them (June 2018)

EU GDPR: How Sophos can help you become compliant (May 2017)

Secure EU GDPR: Legal advice on what companies have to know to stay compliant (May 2017)

Sophos Central - an overview into Synchronized Security Management (June 2016)

Sophos Cloud Server Protection Advanced (Server Lockdown) (June 2016)

Security Heartbeat - Mehr Sicherheit für Ihre Kunden, mehr Umsatz für Sie (December 2015)

Enterprise Mobility Management (Sophos Mobile Control 5.0)  (April 2015)

Cybercriminals and Their New Weapons in 2019 – How to fight off EMOTET and other modern threats (January 22, 2019)

 

Tenable:

Understanding Cyber Exposure: Crucial for GDPR Compliance (May 2018)

13 Essential Steps to Address GDPR Security Requirements (September 2017)

Achieving Effective Cyber Hygiene with CIS Critical Security Controls 1-5 (March 2017)

Overcoming Security Threats in an Evolving IT Landscape (January 2017)

2017 Global Cybersecurity Assurance Report Card (January 2017)

Making Foundational Security Controls Work for Your Organization (November 2016)

 

Ultimate Windows Security:

1/12/2017 Understanding “Red Forest”: The 3-Tier Enhanced Security Admin Environment (ESAE) and Alternative Ways to Protect Privileged Credentials (Information Security - Active Directory)


7/24/2018 Using YARA to Describe, Classify and Search for Malware (Information Security - Security Log)


8/23/2018 How Attackers Exploit the Windows Registry for Persistence, Hiding File-less Malware, Privilege Elevation and More (Information Security - Windows Security)


8/28/2018 Office Macro Exploitation: Mitigating and Threat Hunting This Widely Exploited Vector (Information Security - Workstation Security)


9/13/2018 Which User and What Program Sent This Packet, and Should I be Concerned? Correlating Network Security Alerts with Host Logs for Full Traffic Attribution (Information Security - Security Log)


10/16/2018 Top 10 Steps to Hardening Linux Systems (Information Security - Network Security)

Checking your Application Against the OWASP Top 10 Security Risks (Rapid 7 - November 27, 2018)

Building MITRE ATT&CK Technique Detection into Your Security Monitoring Environment (LogRythm - December 18, 2018)

Closing the Loop: Detecting Vulnerabilities is Great but Risk Only Decreases After Remediation (Rapid 7 - January 29, 2019)

 

 

Others / Unsorted: 

Zscaler Internet Security and Compliance

Lokale Internet-Zugänge für jeden Standort - aber sicher und performant (Zscaler & Computerwoche - July 2015)

Advanced Persistent Threats (FireEye - October 2015)

The Malware Pitfall and the Human Factor (Proofpoint - October 2015)

Understanding Container Security

Introduction to Cloud Networking (Cisco Meraki - August 2015)

Data Security Requirements in the EU Data Protection Regulation (Balabit - February 2016)

Network Monitoring With Nagios 15 (Nagios - March 2016)

Assessing the Implications of the GDPR for your business (Balabit - October 2016)

Best Practice Privileged Access Management (Balabit - November 2016)

Span Data Protection Day Conference (Zagreb - November 22, 2016)

COMBIS, Veeam and VMware Workshop (Zagreb - December 13, 2016)

Sagena Security Day 10 (Sagena & McAfee - Zagreb - October 12, 2017)

Praxisleitfaden Datenverschlüsselung: Sicher, einfach und EU DSGVO-konform (Matrix42 - September 2018)

How to integrate GDPR with ISO 27001 (Advisera - September 26, 2018)

Sicherheit und Datenschutz für Public Clouds (Computerwoche / Rohde & Schwarz Cybersecurity - October 2, 2018)

The itsa 2018 IT Security Expo and Congress (Nuremberg, DE - October 10, 2018)

The State of Endpoint Security - How to Mitigate Endpoint Security Risk (Cybersecurity INSIDERS / the Ponemon Institute - October 25, 2018)

Automation: The Ultimate Enabler for Incident Detection & Response (Rapid7 - October 30, 2018)

Learn the Security and Privacy Best Practices to Manage the New California Privacy Regulations (IBM Security - November 1, 2018)

Cyber Threat Intelligence - Workshop (ENISA / CTI-EU - Brussels, BE - November 5-6, 2018)

Is your organization ready for automation? (Rapid7 - November 13, 2018)

Premium Webinar: Datenschleuse - Die intelligente Datenwaschanlage zum Schutz vor mobilen Datenträgern (EgoSecure - November 15, 2018)

Customer Training: How to Configure AlienVault HIDS (AlienVault - November 15, 2018)

The basics of risk assessment and treatment according to ISO 27001 (Advisera - November 21, 2018)

Cyberattacken – so funktioniert ganzheitlicher Schutz (IBM & Computerwoche - November 29, 2018)

Impact of GDPR to U.S. Companies (EUGDPR Academy - November 29, 2018)

Future-Ready Threat Detection & Response: SOC, SIEM or MDR? (Rapid7 - December 3, 2018)

Schluss mit Malware-Stress! Endpoint Security geht automatisiert (Matrix42 & enSilo - December 5, 2018) 

ISO 27001/ISO 22301: The certification process (Advisera - December 5, 2018)

The Pending Impact of Quantum Computing on Cybersecurity (IBM Security -  December 5, 2018) 

Building Better Security (Carbon Black & EY - December 5, 2018)

(JA)3 Reasons to Rethink Your Encrypted Traffic Analysis Strategies (SANS & Awake Security - December 5, 2018)

The Top Cyber Security Trends in 2018 and Predictions for the Year Ahead (IBM Resilient - December 6, 2018)

An Evaluator's Guide to Next-Generation SIEM (SANS Analyst Program & LogRythm - December 6, 2018)

Is your IT environment secure? – Find out where it leaks with Sophos attack simulation tools (Sophos - December 7, 2018)

Cyber Security Threat Predictions 2019 (Checkpoint & Forrester - December 11, 2018) 

Cybersecurity Trends in 2018 and Predictions for 2019 (HelpSystems - December 11, 2018)

Comparing Privacy Laws: GDPR v. CCPA (Future of Privacy Forum & DataGuidance - December 13, 2018) 

How to Mitigate Cyber Risk with Security Information and Event Management (SIEM) (HelpSystems & Cybersecurity Insiders - December 13, 2018)

2019 Security Predictions (Cybereason - December 19, 2018)

IT-Security: Prävention statt Schadensbegrenzung - Malware proaktiv stoppen, Einfallstore schließen (Computerwoche & Logicalis - January 31, 2019)

Achieving Office 365 Cyber Resilience (Conversational Geek - January 31, 2019)

Leveraging Your SIEM to Implement Security Best Practices (Rapid7 - February 5, 2019)

20 SIEM Use Cases in 40 Minutes: Which Ones Have You Mastered? ((ISC)2 & Splunk - February 12, 2019)

Vienna Cyber Security Week (WKO - Vienna, AT - March 11-15, 2019)

Stop the parasites on your network & regain control over your applications with Sophos XG Firewall (Sophos - March 18, 2019)

Albtraum Datenspionage - keine Chance für Datendiebe! (Matrix42 & Kingston - March 22, 2019)

Splunk 2019 Predictions (Splunk - March 28, 2019)

 


[TO BE CONTINUED...]