One of the most simple and practical yet dangerous self-defense ever known is Krav Maga, close-quarter hand-to-hand fighting combat by the Israel military force.
Applying the same concept in the Threat and Vulnerability Program (TVM), patching prioritization would be more easier and effective in eliminating security holes against targeted cyber threats and attacks.
With the combination of the Threat Intelligence program and Penetration Testing methodologies on the proactive discovery of the organization's digital risks, decision making for both the patch management and the TVM team would be faster. Hence, the justification of prioritizing remediation is easier with the backup of the threat's proof-of-concept.
This talk, aims to simplify the process of the TVM on patching prioritization through the practical and inexpensive implementation of the program.
1. Re-strategized the scope of the Threat Intelligence program by looking for exploitable tech-stacks that are relevant to the organization.
2. Effectively utilize the man-hour of either the internal or external Penetration Testers and even Red Teamers.
3. Practical and effective implementation of the CTI-driven TVM program.
7.45PM - 8.00PM - Registration and sign-in to webinar
8.00PM - 8:05PM - Intro by Exco host
8:05PM - 8:40PM - Applied 'Krav Maga' in Threat and Vulnerability Program (TVM) Program by Mr Mike Rebultan, MSc|GrDip-Forensics . EQUINIX
8:40PM - 9:00PM - Q&A
ABOUT THE SPEAKER
Mike Rebultan, MSc|GrDip-Forensics . EQUINIX
Mike Art Rebultan has more than 17 years of experience combined as an IT and OT professional with a background in PCI-DSS audit management, Unix/Linux server lockdown, and systems administration, R&D, VAPT, DFIR/CSIRT APAC lead, and currently leading the Global Cyber Threat Intelligence (CTI) platform in an ICS/OT company.
Holding a master's degree in IT with a concentration in E-Commerce security. He has also a professional graduate diploma in Digital Forensics and Cyber Security as continuing education.
Specializing in Computer Forensics, Network Intrusion, Data Breach, Cybercrime Investigation, Malware Analysis, and Reverse Engineering. Security blogger and vlogger as past time hobby and uncovered 7 zero-day malware.
For security reasons, instructions for joining the webinar will be sent to registrants one (1) day prior to the event. Please watch out for the webinar details. If in doubt, please email firstname.lastname@example.org.
This is a chapter professional development event thus 1 CPE hour will be available for your CPE submission. To facilitate submission of CPE points on your behalf by the local chapter - please identify yourself clearly by renaming yourself as <(ISC)2 membership number> + your full name when you sign in or after you've sign in. For example: '123456 Luke SkyWalker'.
Alternatively, please take screen shot of Event Code at the end of the talk as evidence.
Note: (ISC)2 members residing in Singapore who are not members of our local Chapter please signed up with us at www.isc2chapter.sg.
Join the community.
Professional Member: $50/- year
Associate Member (Non-credential holders): $30/- year
Student Member: $10/- year