WISP+Dropbox - Information Security Incident Detection and Response
WISP+Dropbox - Information Security Incident Detection and Response Workshop
Women in Security and Privacy (WISP) and Dropbox would like to invite you to an interactive presentation on security incident detection and response. Our speakers will share their experience working in today's detection and response ecosystem and discuss topics such as why an incident response team is important, what an incident response team looks like, what types of things they work on, what an incident response (IR) plan is, and provide practical guidance how to conduct security tabletop exercises that you can take back to your team. The presentation will include an interactive discussion and will be followed by networking and sharing of best practices, including beverages and food provided by Dropbox.
5:30 - 6:00 pm - Registration and Networking
6:00 - 7:30 pm - Presentations and Practical Guidance
- Security Tabletop Exercises in Your Organization - Mel Masterson
- Incident Response Teams. What to Include and Avoid - Sean Coyne
- Building Detections. Getting the Data You Care About - Sarah Andrabi
- Security Log Pipelines and Chaos Engineering - Prima Virani
- Event Monitoring and Log Analysis - Patricia Joseph
- Collaborating for Incident Management - Allison Clayton
7:30 - 8:00 pm - Interactive Discussion Q&A
About the Speakers:
Mel Masterson - LendingClub
Mel Masterson has worked in the IT and Information Security space for 17 years. She is a Sr. Threat Response Engineer and focuses on threat detection, incident response and vulnerability management. She is passionate about advancing women in technology and is the Events Lead for Women in Security and Privacy where she organizes hands-on information security and data privacy workshops for women and men in the Bay Area.
Sean Coyne - Uber
Sean has spent more than 12 years in the IT security space. He has primarily worked in the national security space as a cleared government consultant supporting offensive and defensive operations. He has also working with telcomm's, financial groups, and trained federal law enforcement. He is currently the Intrusion Response manager at Uber.
Sarah Andrabi - Dropbox
Sarah is a Security Engineer in the Detection, Alerting, and Response (DART) Team at Dropbox. She has spent the last 2 years working on building detections, and monitoring solutions for cloud providers. She is passionate about scaling, and building intelligence into security monitoring, and response.
Prima Virani - Marqeta
Prima is an experienced Information Security professional who has worked in a variety of industries such as Oil & Gas, Media and Fintech. She is a Senior Security Engineer in the Detection & Response team at Marqeta where she enjoys creating automation tooling for Incident Response and occasionally dabbles in Security DevOps. She is very enthusiastic about encouraging more women to be in technical roles and was invited to speak at the prestigious Grace Hopper Conference last year on 'Security Engineering & The Right Tools'.
Patricia Joseph - Twitter
Trish is a Security Engineer at Twitter, where she focuses on Incident Response. Trish has a background in systems administration and spent the last six years in Security, starting out as a penetration tester and moving into blue teaming. Trish is currently working on her forensic certification with IACIS and is actively looking for a forensic study buddy.
Allison Clayton - Slack
With a security career spanning 16 years from the US Government to Disney and now to Slack, Ally has held a number of roles including researcher, foreign partnership liaison, leading blue and red teams, IR, and threat hunting. She now leads the fast-paced Detection and Response team at Slack and is passionate about getting more women involved in information security.
From time to time WISP uses photographs of its events in its promotional materials (e.g., the wisporg.com website). Unless this permission is revoked in writing to WISP, by virtue of their attendance, event attendees, volunteers, and speakers agree to the use of their likeness in such materials.