Splunk Users Group: Splunk Security Essentials and MITRE ATT&CK

In this meeting, on Tuesday, June 1, from 3:00 – 4:30 PM ET, of the RH-ISAC Splunk Users’ Group, we will provide a walkthrough for the Splunk Security Essentials App. As part of this walk through we will explore the security use cases, demonstrate how the app has the ability to identify gaps in defenses,…

Read More

Software Security Working Group: Building an Effective Security Champions Program

Join us on Wednesday, June 16, at 4:00 PM ET for our next Software Security Working Group discussion, where we’ll be talking about how to build an effective security champions program! Members can register on the community Member Exchange (log-in required). Eligibility: Eligible participants are information security practitioners from retail, restaurants, hotels, gaming casinos, food retailers,…

Read More

Third-Party Risk Management Working Group: Deconstructing Supply Chain Risk

Join us on Tuesday, June 15, at 2:00 PM ET when Associate Member RiskRecon will break down what you need to know about supply chain risk, as it relates to software and operations. Specifically, how organizations can use modernized TPRM techniques to identify and assess suppliers, and how to verify what vendors have elevated levels of privilege within your networks….

Read More

Security Awareness Working Group: Developing a Secure Code Training Program

Join us on Thursday, May 27, at 1 p.m. ET as Associate Member HackEDU will talk through some “Best Practices for Developing a Successful Secure Code Training Program.” You’ll also hear from Jim Weiler, who is leading the Secure Code Training Development efforts at Marriott. Even if you’re in the just-getting-started-boat, bring your questions to share with the…

Read More