how to use automation and orchestration to …...how to use automation and orchestration to...

8
How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks ISMG SECURITY EXECUTIVE ROUNDTABLE sponsored by ServiceNow Agenda 12:00 – 12:15 p.m. Registration & Networking 12:15 – 12:30 p.m. Introductions and Opening Remarks • Nick Holland, Director, Banking and Payments, ISMG • Myke Lyons, Global Director of Security Transformation, ServiceNow 12:30 – 1:30 p.m. Roundtable Discussion 1:30 p.m. Program Concludes

Upload: others

Post on 14-Jul-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How to Use Automation and Orchestration to …...How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks ISMG SECURITY EXECUTIVE ROUNDTABLE sponsored by

How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks

ISMG SECURITY EXECUTIVE ROUNDTABLEsponsored by ServiceNow

Agenda12:00 – 12:15 p.m.

Registration & Networking

12:15 – 12:30 p.m.

Introductions and Opening Remarks

• Nick Holland, Director, Banking and Payments, ISMG• Myke Lyons, Global Director of Security Transformation, ServiceNow

12:30 – 1:30 p.m.

Roundtable Discussion

1:30 p.m.

Program Concludes

Page 2: How to Use Automation and Orchestration to …...How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks ISMG SECURITY EXECUTIVE ROUNDTABLE sponsored by

Introduction

Email fraud and phishing continue to be effective attack vectors

because they are relatively inexpensive and take advantage of

the weakest link in your security program: your users.

Increasingly, regulated industries are being forced to attest not only to their own cybersecurity

capabilities, but also to those of their third-party service providers – and their third parties’ third parties

as well.

Combatting these attacks is a slow, labor-intensive process because security analysts typically spend

hours trying to determine if an email and its contents are truly malicious. How can security analysts be

better equipped to deal with today’s threats?

If you’re looking for answers, then please join me for an exclusive executive roundtable: on How to Use

Automation and Orchestration to Effectively Respond to Phishing Attacks.

Guided by insight from Myke Lyons, global director of security transformation at event sponsor

ServiceNow, this invitation-only dinner will draw from the experiences of the attendees, who will share

their view on how they have been able to ensure that their security organizations play a productive role

in the future of secure email for both inbound and outbound communication.

Among the discussion topics:

• How has the email threat landscape evolved in the age of cloud computing?

• What do you identify as your greatest vulnerabilities today?

• How can security orchestration, automation and response help in the battle against cophisticated

phishing attacks?

You’ll have the opportunity to discuss effective strategies for fighting against phishing attacks with a

handful of senior executives in an informal, closed-door setting, from which you will emerge with new

strategies and solutions you can immediately put to work.

How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks 2

Page 3: How to Use Automation and Orchestration to …...How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks ISMG SECURITY EXECUTIVE ROUNDTABLE sponsored by

Discussion Points

Among the questions to be presented for open discourse:

• How has the email threat landscape evolved in the age of cloud computing?

• What do you identify as your greatest vulnerabilities today?

• Where are you today on the road to solving email vulnerabilities?

• How do you spot fake emails in an increasingly sophisticated threat landscape?

• Is a “carrot” or “stick” approach most effective for employee training around the email threat?

• What technologies look most promising today for solving phishing and other email based threats?

• How can security orchestration, automation and response help in the battle against sophisticated

phishing attacks?

• How can C-suite executives be encouraged to ”buy in” to greater security for the email channel?

How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks 3

Page 4: How to Use Automation and Orchestration to …...How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks ISMG SECURITY EXECUTIVE ROUNDTABLE sponsored by

About the ExpertJoining our discussion today to share the latest insights

and case studies is:

Myke Lyons

Global Director of Security TransformationServiceNow

Myke is the global director of security transformation for ServiceNow, he has been helping enterprises

better respond to imminent security events, quickly find indicators and observables of compromise,

and effectively remediate known vulnerabilities. Lyons has over 16 years experience in information

technology and security. Prior to moving to the security business unit, he led ServiceNow’s information

security group and was brought on board to help secure the cloud startup while creating a mantra of

transparency. He has also held senior security positions at WPP Group, Grey Global Group, Y&R, and GE.

About ServiceNow

Work matters. It’s where we spend a third of our lives. And ServiceNow (NYSE: NOW) is transforming old

manual ways of working into modern digital workflows that make work fast, simple, easy. ServiceNow is

the fastest-growing enterprise cloud software company in the world above $1 billion. Founded in 2004

with the goal of making work easier for people, ServiceNow is making the world of work work better for

people. Our cloud-based platform and solutions deliver digital workflows that create great experiences

and unlock productivity to approximately 5,400 enterprise customers worldwide, including almost 75

percent of the Fortune 500. For more information, visit: www.servicenow.com.

How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks 4

Page 5: How to Use Automation and Orchestration to …...How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks ISMG SECURITY EXECUTIVE ROUNDTABLE sponsored by

About the ModeratorLeading our discussion today is:

Nick Holland

Director, Banking and Payments Information Security Media Group

Holland, an experienced security analyst, has spent the last decade focusing on the intersection of

digital banking, payments and security technologies. He has spoken at a variety of conferences and

events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by

The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine,

The Economist and the Financial Times. He holds an MSc degree in information systems management

from the University of Stirling, Scotland.

About ISMG

Information Security Media Group (ISMG) is the world’s largest media organization devoted solely

to information security and risk management. Each of our 28 media properties provides education,

research and news that is specifically tailored to key vertical sectors including banking, healthcare

and the public sector; geographies from the North America to Southeast Asia; and topics such as

data breach prevention, cyber risk assessment and fraud. Our annual global summit series connects

senior security professionals with industry thought leaders to find actionable solutions for pressing

cybersecurity challenges.

How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks 5

Page 6: How to Use Automation and Orchestration to …...How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks ISMG SECURITY EXECUTIVE ROUNDTABLE sponsored by

Notes

How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks 6

Page 7: How to Use Automation and Orchestration to …...How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks ISMG SECURITY EXECUTIVE ROUNDTABLE sponsored by

Notes

How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks 7

Page 8: How to Use Automation and Orchestration to …...How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks ISMG SECURITY EXECUTIVE ROUNDTABLE sponsored by

902 Carnegie Center • Princeton, NJ • 08540 • www.ismg.io

About ISMG

Information Security Media Group (ISMG) is the world’s largest media organization devoted solely to information

security and risk management. Each of our 28 media properties provides education, research and news that is

specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from

North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud.

Our annual global Summit series connects senior security professionals with industry thought leaders to find

actionable solutions for pressing cybersecurity challenges.

Contact

(800) 944-0401 • [email protected]

CyberEd