Hi [[ session.user.profile.firstName ]]

ISCN - Information Security Careers Network

  • Date
  • Rating
  • Views
  • The Cost of Insecure Endpoints – New Findings from Ponemon Institute
    The Cost of Insecure Endpoints – New Findings from Ponemon Institute Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute & Richard Henderson, Global Security Strategist, Absolute Recorded: Jul 27 2017 64 mins
    Just how dangerous, inefficient, and ineffective are the endpoint security solutions used in most organizations today? Ponemon Institute independently surveyed hundreds of IT security professionals to find out — and are ready to share the surprising results in this important webinar.

    On July 27th, join founder and chairman, Dr. Larry Ponemon, and Richard Henderson, global security strategist at Absolute, for an interactive webinar on the results, including:

    • Exposing the largest dangers and greatest inefficiencies with endpoint security management today
    • Average financial and productivity costs associated with insecure systems – and how to mitigate in your organization
    • Steps you can take now to prevent attacks and stay compliant
  • Digital Business is Here - Is your Trust Infrastructure Ready?
    Digital Business is Here - Is your Trust Infrastructure Ready? Mike Hathaway, Aaron Davis Recorded: Jul 20 2017 57 mins
    The move to digital business is exposing the limits of existing trust infrastructures. Rapid growth in the number of deployed certificate authorities (CAs). Increased burden on multiple PKI point solutions deployed to address specific problems. And while IT grapples to support tactical implementations of PKI, the demands of digital business overwhelmingly require a more strategic and holistic approach.

    What's required is a centralized yet agile overarching trust framework that can easily accommodate multiple use cases today and in the future.

    This webinar looks at the steps you can take to build an agile trust infrastructure with a centralized PKI deployment.

    * Digital Trust at Scale Learn how to build a PKI that supports endpoint diversity, evolving and multiple use cases and integration with complimentary solutions.
    * Streamline PKI Deployment Discover how a trust infrastructure can be deployed and managed across your organization to mete the requirements of today's dynamic and distributed business models
    * Simplify 3rd Party CA Key Migration Find out how you can migrate certificates from other vendor systems without having to distribute a new trust anchor and without the need to generate new keys and certificates.
  • Petya Ransomware Attacks: Autopsy and Lessons to Learn
    Petya Ransomware Attacks: Autopsy and Lessons to Learn Josh Downs, BrightTALK; Ben Bartle,Barracuda Networks & Amar Singh, Cyber Management Alliance Recorded: Jul 13 2017 55 mins
    The only thing that can stop the security world discussing WannaCry was another large ransomware attack; which is exactly what happened at the end of June in the shape of Petya / notPetya / Goldeneye.

    The attacks compromised several global organisations and hit the headlines worldwide.

    In this session the moderator and panelists will cover the following:

    Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune into this session to get the lowdown on where the attacks came from; who was behind them; what they mean for the cyber security industry and how you can improve the protection for your business the next time something similar rolls along.

    PANELISTS:


    - Josh Downs, Senior Community Manager, BrightTALK (moderator)
    - Ben Bartle, Technical Engineer, Barracuda Networks
    - Amar Singh, CEO & Founder, Cyber Management Alliance
  • Building Breach Notification into your IR process post-GDPR
    Building Breach Notification into your IR process post-GDPR Jamie Cowper, Director, IBM Resilient, Jessica Cholerton, Product Specialist Recorded: Jul 12 2017 62 mins
    The rise in large scale data breaches has been accompanied by a growing number of data privacy reporting regulations across the world. The latest of these, the General Data Protection Regulation (GDPR) will require companies to notify the regulator of a serious incident within 72 hours.

    Companies therefore need to look at their cybersecurity incident response plans and how technology can be leveraged to improve their ability to detect and respond to security incidents faster.

    Join IBM Resilient on July 12 at 2pm to review how organisations can build in data privacy reporting into their incident response strategy whilst using security automation and orchestration tools to enhance their IR processes.

    Attendees will learn:

    •The latest on breach notifications and GDPR; what actions are expected of organisations if data belonging to EU citizens is compromised.

    •How to operationalise GDPR using automation and orchestration to improve IR processes

    • A broader view of global and vertical data breach reporting requirements.

    •What benefits can be achieved through the deployment of an Incident Response Platform (IRP)
  • [Ask the Expert Q&A] McAfee's Raj Samani on the Petya Ransomware Attacks
    [Ask the Expert Q&A] McAfee's Raj Samani on the Petya Ransomware Attacks Raj Samani, Chief Scientist, McAfee Recorded: Jul 12 2017 45 mins
    - Interactive audience Q&A -

    Fresh of the heels of WannaCry this week has seen the Petya / notPetya / Goldeneye attacks strike many global organisations in a wave of devastating ransomware attacks.

    Questions need to be raised though:

    - Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune in live to this interactive ask the expert webinar with McAfee Chief Scientist Raj Samani as he takes your questions on the attacks and suggests ways that you can defend yourself from similar variations in the future.
  • [VIDEO] CREST President Ian Glover on GDPR & May 2018
    [VIDEO] CREST President Ian Glover on GDPR & May 2018 Josh Downs, Senior Community Manager BrightTALK & Ian Glover, President, CREST Recorded: Jul 6 2017 12 mins
    BrightTALK caught up with CREST president Ian Glover for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - GDPR and the preparation that organisations need to implement to remain compliant

    - Steps that professionals can take to make sure that they're in-the-know and up-to-date with the legislation and changes that need to be made

    - The value of improving security culture in an organisation to increase security stature

    - Nationstate attacks and their influence on the cyber security industry

    - AI & machine learning systems and their applications to the security industry
  • [VIDEO] KPN Telecom's CISO Jaya Baloo on Ransomware, the IoT and 'Hacking Back'
    [VIDEO] KPN Telecom's CISO Jaya Baloo on Ransomware, the IoT and 'Hacking Back' Josh Downs, Senior Community Manager BrightTALK & Jaya Baloo, CISO, KPN Telecom Recorded: Jul 6 2017 13 mins
    BrightTALK caught up with KPN Telecom's Jaya Baloo for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry attacks and what it means for the ransomware landscape

    - 'Hacking back' and the ethical considerations that need to be taken

    - Nation state attacks and the future of cyber warfare

    - How to improve security culture amongst your troops on the ground

    - AI & machine learning and how effective the techniques can be when assessing big security data sets

    - The explosion of the IoT and how to protect connected devices and the overall network - from a telecoms standpoint
  • Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next
    Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next Amar Singh, CEO & Founder, Cyber Management Alliance Recorded: Jul 5 2017 54 mins
    Media hype, so called cyber experts and the rest of the delettantes are all out in force trying to decipher what just happened with Petya. Ransomware or not? Script kiddies? Cyber warfare?

    Let's dive into behind the scenes of what may just be the turning point in targeted malware (sorry ransomware) attacks.

    Tune into this session to get the lowdown on where the attacks came from; who was behind them; what they mean for the cyber security industry and how you can improve the protection for your business the next time something similar rolls along.

    You'll also have the chance to ask Amar your Petya or ransomware questions and to get the upper hand defending your organisation.

    -----------------

    Amar Singh:

    CEO & Founder: Cyber Management Alliance & Give01Day.com - Chair of ISACA's UK Security Advisory Group.

    Experienced cyber, information security & data privacy practitioner. Senior C Level Executive, Global Chief Information Security Officer, Expert in Information Risk Management

    UK Government GCHQ Certified Trainer and creator of APMG & GCHQ Certified course CSPE (Cyber Security & Privacy Essentials)

    Creator and trainer of business focused Cyber Incident Planning & Response Course for middle to senior executives. (CIPR)

    Mentor & Trusted Advisor to FTSE 100 Firms, Start-ups & Incubator Funds

    Board Member and Consultant: MBA in Cyber Security. Chair of ISACA Security Advisory Group.

    Author, writer, Industry speaker & presenter
  • Petrified by the Petya Ransomware? Live Q&A session with Pete Wood
    Petrified by the Petya Ransomware? Live Q&A session with Pete Wood Pete Wood, CEO, First Base Technologies LLP Recorded: Jul 5 2017 46 mins
    - Interactive audience Q&A -

    Fresh of the heels of WannaCry this week has seen the Petya / notPetya / Goldeneye attacks strike many global organisations in a wave of devastating ransomware attacks.

    Questions need to be raised though:

    - Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune in live to this interactive ask the expert webinar with First Base Technologies CEO Pete Wood as he takes your questions on the attacks and suggests ways that you can defend yourself from similar variations in the future.

    Tune in and ask away, we'd love to hear your questions!
  • [VIDEO] Why WannaCry Was so Successful
    [VIDEO] Why WannaCry Was so Successful Josh Downs, Senior Community Manager, BrightTALK & John Bambenek, Manager Threat Systems, Fidelis Cybersecurity Recorded: Jun 29 2017 10 mins
    BrightTALK caught up with Fidelis Security's John Bambenek for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry Ransomware and why it was so successful at breaching companies defences

    - Lessons that others businesses can take to prevent similar attacks happening in the future

    - The power and ethics of hacking back in today's cyber security world

    - The rapid growth of the IoT and the vulnerabilities that it faces as more and more devices join the network

Embed in website or blog