BEGIN:VCALENDAR VERSION:2.0 PRODID:-//Security Boulevard - ECPv5.16.4//NONSGML v1.0//EN CALSCALE:GREGORIAN METHOD:PUBLISH X-WR-CALNAME:Security Boulevard X-ORIGINAL-URL:https://securityboulevard.com X-WR-CALDESC:Events for Security Boulevard BEGIN:VTIMEZONE TZID:America/New_York BEGIN:DAYLIGHT TZOFFSETFROM:-0500 TZOFFSETTO:-0400 TZNAME:EDT DTSTART:20240310T070000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:-0400 TZOFFSETTO:-0500 TZNAME:EST DTSTART:20241103T060000 END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;TZID=America/New_York:20240404T130000 DTEND;TZID=America/New_York:20240404T140000 DTSTAMP:20240401T022335 CREATED:20240227T230104Z LAST-MODIFIED:20240322T200435Z UID:2010036-1712235600-1712239200@securityboulevard.com SUMMARY:Government takedown of ransomware rings - What CISOs Need To Know DESCRIPTION:Recent collaborative actions by U.S. and international law enforcement against ransomware rings such as LockBit\, BlackCat\, and Ragnar Locker serve as a critical wake-up call for CISOs and security leaders. These operations highlight ransomware’s sophistication and pervasive nature\, emphasizing the need for robust incident response measures that may involve law enforcement. \nKey Takeaways for CISOs and Security Leaders:\nUnderstand the Evolving Threat Landscape: With authorities stepping up their efforts against ransomware gangs\, CISOs must stay informed about the latest cyber threats. The takedowns of Warezone RAT\, Hive\, LockBit\, and others have revealed ransomware operations’ complexity and global reach\, underscoring the importance of keeping abreast of cybercriminal tactics and law enforcement activities.\nFoster International Collaboration: The successful disruptions of ransomware networks have been significantly aided by international cooperation among law enforcement agencies. Security leaders should mirror this collaborative approach by engaging with global cybersecurity networks\, sharing intelligence\, and participating in collective defense initiatives.\nImplement Comprehensive Security Strategies: The detailed insights these takedowns provide into ransomware operations should inform your security strategies. Focus on strengthening your organization’s resilience against such attacks through advanced threat detection\, regular security audits\, employee training\, and the implementation of robust incident response plans.\nPrioritize Decryption and Recovery Solutions: The distribution of decryption tools by law enforcement to aid victims of ransomware attacks underscores the importance of effective data recovery solutions. Security leaders should prioritize developing and testing decryption capabilities and disaster recovery plans to minimize downtime and data loss in the event of an attack.\nEngage in Proactive Defense Measures: With the increasing efficacy of law enforcement in tackling ransomware\, cybercriminals may diversify their tactics. Security leaders must adopt a proactive stance\, leveraging threat intelligence\, employing advanced cybersecurity technologies\, and continuously evaluating the security posture of their organizations.\nLive Audience Participation – A Call to Action: This roundtable emphasizes the critical need for security professionals to participate actively in broader discussions on cybersecurity challenges and solutions. Engaging with peers\, law enforcement\, and cybersecurity experts through forums and discussions can provide deeper insights and foster a collective cybersecurity awareness and action culture. \nWho Should Attend: \nThis roundtable is designed for CISOs\, security leaders\, IT professionals and anyone involved in strategically planning and implementing cybersecurity measures within their organizations. It offers a unique opportunity to gain firsthand insights from the front lines of the global fight against ransomware\, informing strategies to protect against these pervasive threats. URL:https://securityboulevard.com/webinars/government-takedown-of-ransomware-rings-what-cisos-need-to-know/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2024/02/2024.04.04-CISO-LandingPage-1540x660-SB.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20240422T130000 DTEND;TZID=America/New_York:20240422T140000 DTSTAMP:20240401T022335 CREATED:20240215T175141Z LAST-MODIFIED:20240326T173440Z UID:2008947-1713790800-1713794400@securityboulevard.com SUMMARY:Overcoming Application Security (AppSec) Challenges DESCRIPTION:As application development practices modernize\, APIs are no longer a security afterthought; those days have come to an end. API security is now central to any approach to application security (AppSec). The challenge is setting up the workflows that enable cybersecurity teams to first discover APIs (using\, for example\, machine learning algorithms) and then working with application developers to remediate security issues all through the software supply chain. But as the rate at which APIs are being deployed in the enterprise is accelerating\, most cybersecurity teams are struggling to keep up\, especially faced with skills and talent shortages and new requirements (like SBOMs) to secure their software supply chains). In this panel discussion\, Techstrong Group Chief Content Officer Mike Vizard and API security and AppSec experts discuss these challenges and how to overcome them. URL:https://securityboulevard.com/webinars/overcoming-application-security-appsec-challenges/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2024/02/2024.04.22_SBRT_Webinar_SB-LandingPage-1540x660-1.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20240424T110000 DTEND;TZID=America/New_York:20240424T120000 DTSTAMP:20240401T022335 CREATED:20240315T191354Z LAST-MODIFIED:20240315T143751Z UID:2011869-1713956400-1713960000@securityboulevard.com SUMMARY:Securing modern application development: the CISOs’ and security team’s perspective DESCRIPTION:Application security has never been easy\, but more recently it’s gotten much more complicated. It used to be about finding vulnerabilities in code. But as applications have gotten more complex\, development teams have gotten bigger\, and business has gotten faster\, finding – and fixing – vulnerabilities in applications requires more from CISOs and security teams. URL:https://securityboulevard.com/webinars/securing-modern-application-development-the-cisos-and-security-teams-perspective/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2024/03/2024.04.24-CheckmarX-Email-1200x620-SB.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20240424T130000 DTEND;TZID=America/New_York:20240424T140000 DTSTAMP:20240401T022335 CREATED:20240302T224838Z LAST-MODIFIED:20240228T231105Z UID:2010411-1713963600-1713967200@securityboulevard.com SUMMARY:The 2024 Guide to Open Source Security and Risk DESCRIPTION:Securing your software supply chain begins with knowing what’s in your code. With AI-generated code and ubiquitous open source software use\, it’s never been more critical to understand what risks your software may contain. In fact\, last year alone we found that 84% of codebases contained at least one open source vulnerability. \nIn this Techstrong Learning Experience\, we’ll explore the findings from the Synopsys 2024 “Open Source Security and Risk Analysis” report. We’ll cover: \n• The state of open source software security\n• Tips for mitigating risks and keeping vulnerabilities out of your supply chain\n• How to protect against security and IP risks from AI coding tools URL:https://securityboulevard.com/webinars/the-2024-guide-to-open-source-security-and-risk/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2024/02/2024.04.24-Synopsys-LandingPage-1540x660-SB.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20240520T130000 DTEND;TZID=America/New_York:20240520T140000 DTSTAMP:20240401T022335 CREATED:20230809T084531Z LAST-MODIFIED:20231009T143530Z UID:1984020-1716210000-1716213600@securityboulevard.com SUMMARY:Zero-Trust DESCRIPTION:Zero trust approaches to cybersecurity are all the age these days as cyberattacks continue to increase in volume and sophistication. The challenge is zero-trust isn’t something that can be achieved by buying a platform off-the-shelf. Cybersecurity teams need to integrate multiple platforms and technologies to ensure zero-trust policies are enforced from the endpoint to the cloud and everywhere in between. URL:https://securityboulevard.com/webinars/zero-trust/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2023/08/2024.05.20-SBRT-Email-1200x600-.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT BEGIN:VEVENT DTSTART;TZID=America/New_York:20240625T130000 DTEND;TZID=America/New_York:20240625T140000 DTSTAMP:20240401T022335 CREATED:20240330T223112Z LAST-MODIFIED:20240328T223443Z UID:2013359-1719320400-1719324000@securityboulevard.com SUMMARY:How Many Types of SBOM Are There? DESCRIPTION:As far as the Cybersecurity and Infrastructure Security Agency (CISA) is concerned\, there are six types of SBOMs that can be created for a single application or piece of software; none of which will be identical. While CISA doesn’t have a favorite type of SBOM\, you may find that your organization\, vendors or customers prefer some over others. As such\, it’s important to understand what to expect from each type\, how to generate them and be prepared to reconcile the differences between them. \nIn this Techstrong Learning Experience\, experts from Synopsys will explore the six types of SBOMs\, how they differ\, the benefits and limitations of each and why you should choose one type over another. You’ll also learn the methods and tools needed to create them and more. \nJoin us to learn to:\nBecome familiar with the six types of SBOMs\nUnderstand the benefits and limitations of each type\nKnow the methods and tools required to generate each type URL:https://securityboulevard.com/webinars/how-many-types-of-sbom-are-there/ LOCATION:Live Webinar\, Boca Raton\, FL\, United States ATTACH;FMTTYPE=image/png:https://securityboulevard.com/wp-content/uploads/2024/03/2024.06.25-Synopsys-LandingPage-1540x660-SB.png ORGANIZER;CN="Security%20Boulevard":MAILTO:webinars@securityboulevard.com GEO:26.3683064;-80.1289321 END:VEVENT END:VCALENDAR