After the powerful launch of TigerTrax last week, we have put together a webinar for those folks looking to learn more about our TigerTrax™ services and offerings. If you want to hear more about social media code of conduct monitoring, passive analysis and assessments, investigation/forensics and threat intelligence enabled by the new platform, please RSVP.
Our webinar will cover why we built TigerTrax, what it does and how it can help you organization. We will discuss real life engagements using the TigerTrax platform across a variety of verticals and looking at social, technological and trust issues. From data mining threat actors to researching supply chain business partners and from helping pro-sports players defend themselves against accusations to monitoring social media content of key executives, the capabilities and examples are wide ranging and deeply compelling.
The webinar will be held Wednesday, March 12, 2014 at 3 PM Eastern time. Please RSVP for an invitation. Spots are limited, so please RSVP early.
As always, thanks for reading. And, if you would prefer a private briefing or discussion about TigerTrax, give us a call at (614) 351-1237 x206 and we will get a specialist together with you to help identify how MSI can help your organization.
Got an idea for a webinar you would like to see us tackle in 2014? If so, drop us a line via the comments or give me a shout on Twitter (@lbhuston) and share it with us. We are looking to build a set of monthly webinars and would love to hear what you want to hear more about.
Currently in the idea hopper are:
ICS/SCADA/Smart Grid security topics
Online crime trends
Use cases for HoneyPoint and ProtoPredator
Using free or low cost tools to increase your security team’s capability (Thanks @icxc)
Persistent Penetration Testing Strategies
Scoping and focusing penetration tests for real world business results
Ideas for security intelligence operations
Many, many more!
Drop me a line with a topic and I’ll enter you into a drawing to win a free copy of HoneyPoint Personal Edition!
Thanks for reading and for sharing your interests. We want to 2014 to be your most successful information security year to date!
MSI, along with the teams at NexDefense and Critical Intelligence, will be participating in an online webinar about ICS/SCADA Security. The date of the event is February, 6th and you can learn more about it here.
The event is free to attend, though registration is required. You can earn a CPE for participating!
We hope you will tune in and check us out!
Overview of the event:
Significant trends in the threat and vulnerability environment
Relevant trends in ICS technology
What proactive steps you can take
How to leverage security intelligence
ICS Cyber Security Intelligence Briefing, Michael Assante
ICS Threat Update, Brent Huston
How to Leverage Security Intelligence, Bob Huber
Who Should View?
Senior Information Security Leaders, CISOs and CTOs
Security and Risk Analysts
Control system security engineers
Security operation leads for ICS reliant organizations
Join the Business of Security to hear from Brent Huston, recent winner of (ISC)2 Information Security Leadership Award, who will lay out the need for and principles of performing detection in depth. Brent, CEO and Security Evangelist of MicroSolved, will share his research and hands-on experience that validates the leading approach for detecting threats against your most precious assets.
When: Wednesday, December 7th, Noon EDT Where: GoToWebinar Cost: Complimentary Register to attend live or to receive the event archive information for on-demand viewing at: http://www.businessofsecurity.com/
Huston’s postulate and why location matters
The detection in depth maturity model
The detection in depth focus model
Tools and approaches for doing detection in depth
Brent’s contribution to the community was recognized by (ISC)2 for employing the HoneyPoint Internet Threat Monitoring Environment (HITME) to alert critical infrastructure organizations whose machines are compromised. MSI provides pro-bono services to help them to mitigate the compromise and manage the threat.
Earn (1) CPE Group A credit for the CISSP and SSCP: This event meets the criteria for a Continuing Professional Education (CPE) activity for the Information Security and Risk Management domain.