Secure Video Conferencing - What to Train Your Workforce On | SANS@MIC Talk
With the rush for Working From Home, organizations are overwhelmed with employees using video conferencing technologies, from Slack, Skype and Discord to GoToMeeting, Zoom and Webex. The only thing more overwhelming is figuring out how to use them securely. What are your security teams supposed to tell and train your workforce on? How do you handle technology and vulnerabilities changing every week? In this webcast we cover the top tips to train your workforce on, how to communicate the tips, and provide technical examples of each of the tips and how they would apply to the most common technologies. Key things include:
1. How to make what you train simple so that it sticks.
2. Tips that are vendor neutral, so it does not matter what technology people use.
3. Tips that are relevant for years not weeks
4. Technical examples of each tip for some of the most common video conferencing solutions.
Speaker Bios
Lance Spitzner has over 20 years of security experience in cyber threat research, awareness and training. He invented the concept of honeynets, founded the Honeynet Project and published three security books. Lance has worked and consulted in over 25 countries and helped over 350 organizations plan, maintain and measure their security awareness programs. In addition, Lance is a member of the Board of Directors for the National Cyber Security Alliance, frequent presenter, serial tweeter (@lspitzner) and works on numerous community security projects. Before working in information security, Mr. Spitzner served as an armor officer in the Army's Rapid Deployment Force and earned his MBA from the University of Illinois.
Randy Marchany is the Chief Information Security Officer of Virginia Tech and the Director of Virginia Tech's IT Security Laboratory. He is a co-author of the original SANS Top 10 Internet Threats, the SANS Top 20 Internet Threats, the SANS Consensus Roadmap for Defeating DDoS Attacks, and the SANS Incident Response: Step-by-Step guides. He is a member of the Center for Internet Security development team that produced and tested the CIS Solaris, HPUX, AIX, Linux and Windows2000/XP security benchmarks and scoring tools. He was a member of the White House Partnership for Critical Infrastructure Security working group that developed a Consensus Roadmap for responding to the DDOS attacks of 2000.