<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><span>Community colleges and universities are the ultimate Bring Your Own Device disaster. Faculty, staff and students from all over the world converge on the same network storing sensitive data, all which <em>mu</em></span><em style="background-color: transparent;">st</em><span style="background-color: transparent;"> be protected to comply with HIPAA, FER</span><span style="background-color: transparent;">PA and PCI.</span><span style="background-color: transparent;"></span></p> <!--more--><p><span style="font-size: 16px; color: #000000;"><span style="background-color: transparent;">Even more difficult: With tight funds and limited staff, it's a steep, uphill climb to protect these devices that can't even be modified or controlled. The typical approach to</span><span style="background-color: transparent;"> </span><span class="details" style="background-color: transparent;"> using threat intelligence requires spending hundreds of thousands of dollars on tools. (Plus large teams). The good news is that it doesn't have to be this way.</span></span><span class="details" style="color: #545454; font-size: 12.1612px; background-color: transparent;"></span><span class="details" style="color: #545454; font-size: 12.1612px; background-color: transparent;"></span><span style="font-size: 16px; color: #000000;"><span class="details" style="background-color: transparent;"></span></span></p> <p>&nbsp;</p> <div> <p><span class="details">This talk will discuss what threats and unique risks are faced by community colleges and universities. Also, how operationalizing threat intelligence in an automated fashion can be cost-effective and provide broad protection for BYOD and IoT devices. </span></p> <p><strong><span class="details">Main Takeaways:</span></strong></p> <ul> <li><span class="details">What are the unique threats faced by higher education institutions?</span></li> <li>How can threat intelligence be used to protect organizations?</li> <li>How using ISACs and automation can provide protection on the network-level and still protect “uncontrollable” devices.</li> </ul> <p style="text-align: center;"><strong>Webcast: Wednesday, August 1st. 10 - 11 AM PDT, 1 - 2 PM EDT.</strong></p> <p style="text-align: center;"></p> <p style="text-align: center;">&nbsp;</p> <p style="text-align: center;"><strong><span class="details">About the Speaker: </span></strong></p> <p><span class="details"><img src="https://info.threatstop.com/hubfs/johnspeaking.jpg" alt="johnspeaking" width="151" style="width: 151px; float: left; margin: 0px 10px 10px 0px;"></span></p> <p><span class="details">John Bambenek is the Vice President of Security, Research and Intelligence at ThreatSTOP, Lecturer in the Department of Computer Science at the University of Illinois at Urbana-Champaign and a handler with the SANS Internet Storm Center. He has over 18 years experience in information security and leads several international investigative efforts tracking cyber criminals, some of which have led to high profile arrests and legal action. He specializes in disruptive activities designed to greatly diminish the effectiveness of online criminal operations. He produces some of the largest bodies of open-source intelligence used by thousands of entities across the world.</span></p> </div></span>