Speaker

Fletus Poston III

Fletus Poston III

Fletus Poston III, Sr Manager, Security Operation - CrashPlan

Charlotte, North Carolina, United States

Actions

Fletus is a seasoned IT and security professional, with a career spanning since the mid-2000s when he began as an IDS handler. Throughout the years, he has managed cybersecurity initiatives in various industries, including finance, utility, and software development. Fletus holds a Master of Science in Information Systems (M.S.I.S.) specializing in Information Assurance, along with a range of certifications such as CISSP, SSAP, GISF, GSEC, GCED, GPCS, GMON, GCCC, GSLC, GSOM and GCIL. He takes great pleasure in sharing his expertise and passion for cybersecurity with others.

https://www.giac.org/certified-professional/Carlton%20Fletus-Poston%20III/183722

Area of Expertise

  • Business & Management
  • Information & Communications Technology

Topics

  • Emerging Cybersecurity Topics
  • Cybersecurity Strategy
  • Cyber Security basics
  • Cybersecurity Threats and Trends
  • Cybersecurity Governance and Risk Management
  • Cloud Security Architecture
  • Security Architecture and Engineering

Building a Resilient Business: The Importance of Continuity and Resilience Planning

In today's rapidly changing and unpredictable business landscape, organizations face numerous challenges that can disrupt operations, threaten stability, and impact their ability to deliver products and services. To effectively navigate these challenges, it is crucial for businesses to not only have plans in place for continuity during disruptions but also build resilience to thrive and grow in the face of adversity.

In this presentation, we will explore the concepts of business continuity and resilience, highlighting their differences, importance, and how they complement each other in ensuring organizational success. We will discuss the key objectives and components of a robust business continuity plan, and examine the characteristics that define a resilient organization. Additionally, we will delve into the benefits that businesses can derive from implementing effective business continuity and resilience strategies.

Human Centric Security: The Missing Link

Within cybersecurity, the focus on technology often overshadows the critical role of human behavior in security breaches. This talk explores the often overlooked "miss link" between technology and human-centric security. By understanding human factors such as cognitive biases, social engineering, and the psychology of security decisions, we can bridge this gap and strengthen overall cybersecurity. Through real-world examples and actionable insights, this talk aims to empower organizations to adopt a holistic approach that integrates human-centric security practices into their cybersecurity strategies.

Data Resilience Through Cyber Best Practices

This presentation focuses on the essential best practices for achieving data resilience through effective cyber security.

With a comprehensive understanding of the key elements of data resilience, attendees will learn how to safeguard their organization's valuable assets and maintain trust with customers and stakeholders. By following these practical guidelines, businesses can minimize the risk of data breaches, ensure business continuity, and stay ahead of emerging threats.

Topics
- Understanding the importance of data resilience
- Implementing robust security controls to protect sensitive information
- Developing effective incident response plans to minimize downtime
- Prioritizing employee training to create a security-aware culture

Takeaways
- A clear understanding of data resilience and its benefits for business success
- Practical guidance on implementing essential cyber best practices

SecOps - The Missing Link In Security Awareness

Security Awareness Programs are an essential component of any organization's security strategy.

However, many organizations struggle to get the desired results from these programs. In this talk, I will discuss how Security Operations (SecOps) teams can add value to Security Awareness Programs and make them more effective.

Introduction
The Role of SecOps in Security Awareness Programs
SecOps as a bridge between Security and Operations teams
SecOps' unique perspective on security risks and threats
SecOps' expertise in identifying security weaknesses and vulnerabilities

III. How SecOps can add value to Security Awareness Programs
Identifying high-risk areas in the organization and creating targeted awareness campaigns
Providing real-world examples of security incidents and their impact on the organization
Creating training materials that are relevant and engaging for employees

Recap of key points
Importance of collaboration between Security and Operations teams
Recommendations for organizations looking to enhance their Security Awareness Programs

Attendees will learn how SecOps teams can play a vital role in making Security Awareness Programs more effective and will understand the unique perspective and expertise that SecOps teams bring to the table.

Creating a Strong Security Culture

It is crucial that organizations take steps to protect themselves from these threats, and one of the most important ways to do so is through building a strong security culture.

By building this culture you are educating employees on best practices for identifying and mitigating security risks, ultimately helping to create a #culture of #cybersecurity within the organization.

Endpoint Backup and Recovery Software The Cornerstone of Comprehensive CTI

Endpoint backup and recovery software plays a critical role in a comprehensive Cyber Threat Intelligence (CTI) program. It serves as a foundation for effective incident response, threat hunting, and compliance efforts.

Protecting Your Organization from Supply Chain Attacks

Supply chain attacks are a growing threat to businesses of all sizes. By targeting third-party vendors or suppliers, attackers can gain access to sensitive information and disrupt operations.

The Importance of Mentorship in Cybersecurity

In the rapidly evolving world of cybersecurity, one factor stands out as a key driver of success: mentorship.

As the threat landscape continues to shift and new technologies emerge, professionals in this field face an ongoing challenge: staying ahead of the curve.

This requires not only technical expertise but also guidance from experienced mentors who can share their knowledge, insights, and industry connections.

Mentorship is more important than ever. By investing time and resources into mentorship programs, organizations can develop the skills and expertise needed to stay ahead of the curve.

Cyber Threat Intelligence - What it means to YOU

Let's dive into the fundamental concepts and principles that govern CTI field. We will focus on understanding the complexities of cyber threats, the tools and techniques used by attackers, and the strategies employed by
defenders to protect against these threats.

Key terms:

-Threat actors: Who are the individuals, groups, or nation-states behind cyber attacks?
- Indicators of compromise (IOCs): How do attackers leave digital footprints that can be detected and analyzed?
- TTPs ( Tactics, Techniques, and Procedures): What methods do attackers use to breach systems and steal data?

This goal is to help you gain a deeper understanding of the CTI process and its importance in cybersecurity. By the end of this lecture, you'll be equipped with the knowledge to make informed decisions about your own online security and that of others.

Risk vs Vulnerability: Understanding the Difference

This presentation emphasizes that having a vulnerability doesn't necessarily mean you have a high-risk situation, it's the probability of an attacker taking advantage of that vulnerability that matters.

Presentation illustrates the difference between risk and vulnerability in your presentation, for example:

* Vulnerability: A known flaw or weakness in a system
* Risk: The likelihood of an attacker exploiting that vulnerability to cause harm

This distinction is crucial in understanding the concept of risk management, and can be used to justify investment in mitigating vulnerabilities before they become actual risks.

Do you know the difference between Incident Response vs Incident Management

Effective incident management requires a comprehensive understanding of both Incident Response and Incident Management. By grasping the nuances between these two concepts, organizations can develop robust plans to mitigate the impact of security incidents, protect their assets, and maintain continuity in the face of adversity.

Data Resilience Through Cyber Best Practices

This presentation focuses on the essential best practices for achieving data resilience through effective cyber security.

With a comprehensive understanding of the key elements of data resilience, attendees will learn how to safeguard their organization's valuable assets and maintain trust with customers and stakeholders. By following these practical guidelines, businesses can minimize the risk of data breaches, ensure business continuity, and stay ahead of emerging threats.

Topics
- Understanding the importance of data resilience
- Implementing robust security controls to protect sensitive information
- Developing effective incident response plans to minimize downtime
- Prioritizing employee training to create a security-aware culture

Takeaways
- A clear understanding of data resilience and its benefits for business success
- Practical guidance on implementing essential cyber best practices

People, Process and Technology - Creating a Strong Security Culture

It is crucial that organizations take steps to protect themselves from these threats, and one of the most important ways to do so is through building a strong #securityculture.

By building this culture you are educating employees on best practices for identifying and mitigating security risks, ultimately helping to create a #culture of #cybersecurity within the organization.

Protecting Your Organization from Supply Chain Attacks

Supply chain attacks are a growing threat to businesses of all sizes. By targeting third-party vendors or suppliers, attackers can gain access to sensitive information and disrupt operations. Make sure you are properly taking precautions to protect your organizations, employees and partners.

Endpoint Backup and Recovery Software - The Cornerstone of Comprehensive CTI

Endpoint backup and recovery software plays a critical role in a comprehensive Cyber Threat Intelligence (CTI) program. It serves as a foundation for effective incident response, threat hunting, and compliance efforts.

Simply Cyber Con '24 Sessionize Event

November 2024 Charleston, South Carolina, United States

Fletus Poston III

Fletus Poston III, Sr Manager, Security Operation - CrashPlan

Charlotte, North Carolina, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top