<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

Higher Ed. Webcast: You CAN Get Quality Cyber Protection on a Shoe-String Budget

Styrofoam-Coffee-Timer

Community colleges and universities are the ultimate Bring Your Own Device disaster. Faculty, staff and students from all over the world converge on the same network storing sensitive data, all which must be protected to comply with HIPAA, FERPA and PCI.

Even more difficult: With tight funds and limited staff, it's a steep, uphill climb to protect these devices that can't even be modified or controlled. The typical approach to using threat intelligence requires spending hundreds of thousands of dollars on tools. (Plus large teams). The good news is that it doesn't have to be this way.

This talk will discuss what threats and unique risks are faced by community colleges and universities. Also, how operationalizing threat intelligence in an automated fashion can be cost-effective and provide broad protection for BYOD and IoT devices.

Main Takeaways:

  • What are the unique threats faced by higher education institutions?
  • How can threat intelligence be used to protect organizations?
  • How using ISACs and automation can provide protection on the network-level and still protect “uncontrollable” devices.

Webcast: Wednesday, August 1st. 10 - 11 AM PDT, 1 - 2 PM EDT.

Save Your Spot

 

About the Speaker:

johnspeaking

John Bambenek is the Vice President of Security, Research and Intelligence at ThreatSTOP, Lecturer in the Department of Computer Science at the University of Illinois at Urbana-Champaign and a handler with the SANS Internet Storm Center. He has over 18 years experience in information security and leads several international investigative efforts tracking cyber criminals, some of which have led to high profile arrests and legal action. He specializes in disruptive activities designed to greatly diminish the effectiveness of online criminal operations. He produces some of the largest bodies of open-source intelligence used by thousands of entities across the world.

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter