Hi [[ session.user.profile.firstName ]]

ISCN - Information Security Careers Network

  • Date
  • Rating
  • Views
  • GDPR's influence on security
    GDPR's influence on security Rob Shapland Recorded: Feb 22 2018 43 mins
    Will GDPR have the desired effect? Will it increase security, or see companies regularly hit with catastrophic fines for poor compliance.
  • The Real Cybersecurity Threat - The GAP in Cybersecurity Talent
    The Real Cybersecurity Threat - The GAP in Cybersecurity Talent Dick Morrell, Barak Engel, David Morris Recorded: Feb 9 2018 64 mins
    This session will discuss the generational GAP in Cybersecurity Talent. One of the biggest challenges facing the Cybersecurity Community is filling the GAP as quickly as possible through mentoring and bright talent eager to enter the field with little or no cybersecurity background.
  • Hunting the Hunters or Can you cover your cyber tracks to avoid being caught?
    Hunting the Hunters or Can you cover your cyber tracks to avoid being caught? Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Jan 23 2018 35 mins
    While some hackers crave the attention of a high profile attack or data breach, others prefer to work in shadows either trying to hide their tracks or are indifferent all together.

    Regardless, accurately understanding where an attack comes from is very helpful in defending against future attacks. More importantly, when companies and key organizations work together it is possible to tie together a multitude of individual footprints into a single, conclusive trail back to the originator.

    This session will focus on the importance of attribution and includes a case study of how a major cyber criminal was taken down, from the lowest foot soldier to the kingpin himself.
  • Ep. 4 Performance Engineering Personnel Mining: Q&T SIG Talk
    Ep. 4 Performance Engineering Personnel Mining: Q&T SIG Talk Petar Puskarich Recorded: Jan 9 2018 27 mins
    Performance Engineering Personnel Mining

    How frustrating is it to find qualified and reliable performance engineering talent in today’s hiring market? This talk will cover some challenges and success strategies in hiring that basic scripter all the way up to the rare full stack performance engineering unicorn. What to look for, what to avoid, how to handle technology interview fraud.

    Join us for the next Quality & Testing SIG Talk on Tuesday, February 13, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1057043&group=.
  • Big Data Analytics vs Privacy: Risks and Opportunities
    Big Data Analytics vs Privacy: Risks and Opportunities Rob Anderson, Head of Field Operations (Privitar),Tim Hickman, Associate (White & Case) Recorded: Dec 14 2017 58 mins
    Today's modern businesses gain competitive edge and remain innovative by using advanced analytics and machine learning. Utilising big data can build customer loyalty by improving personalised marketing campaigns; optimises fraud detection; and improves products and services by advanced testing. However, the data sets required for advanced analytics are often sensitive, containing personal customer information, and therefore come with an inherent set of privacy risks and concerns.

    This roundtable will cover a few key questions on data utility and privacy:

    - In what ways advanced analytics help businesses gain competitive edge?

    - What is defined as sensitive data?

    - Will GDPR affect the way you're allowed to use customer data?

    - What opportunities are there to utilise sensitive data?

    Unlocking the data’s true value is a challenge, but there are a range of tools and techniques that can help. This live discussion will focus on the data analytics landscape; compliance considerations and opportunities for improving data utility in 2018 and beyond.

    Key takeaways:

    - A view of the data protection landscape

    - How to remaining compliant with GDPR when using customer data

    - Use cases for advanced analytics and machine learning

    - Opportunities for maximising data utility in 2018
  • The New Business Reality of GDPR with David Siegel and Michael Shea
    The New Business Reality of GDPR with David Siegel and Michael Shea David Siegel and Michael Shea (20|30) Recorded: Nov 30 2017 52 mins
    The new business reality of GDPR and how you use customer data is inexorably approaching, if you work in or are doing business with anyone in the EU you must deal with this regulation.

    With data protection, there are really only two options: protection of data through ever-more data centralization and security or turning the customer data paradigm on its head and decentralize the data.

    We have a new model: give your customers full control over their data, gain their trust, and lower your costs with the open-source Pillar Business Wallet. Join our conversation Thursday, 30th of November.
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018
    Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Jeffrey Ritter Recorded: Nov 21 2017 52 mins
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • Security Heretic: What got us here, won't get us there
    Security Heretic: What got us here, won't get us there Gary Marsden, Senior Director of Data Protection Solutions at Gemalto Recorded: Nov 16 2017 57 mins
    Cybersecurity is at a crossroads and requires a dramatic shift to adequately support the needs of business owners and security administrators as digital transformation challenges their needs and investments. Managing multiple cloud providers and dramatic increases in the number of endpoints generating data and the subsequent volume of data means enterprise security teams no longer have the requisite skills and bandwidth to deal with complicated security products. Building in security from the beginning quickly and cost-effectively is an industry game changer, especially with new growth markets like Big Data, Blockchain, Cloud Computing, Internet of Things and Digital Payments.

    Multi-cloud environments and government regulations and industry compliance add to the complexity of maintaining a manageable and effective data protection strategy. Transforming encryption and key management (data protection in general) into a click and deploy model reduces internal business barriers between security teams, DevOps and product teams and alleviates disparate security policies, so you know where your data is and that it is secure. The way people consume security is changing by taking an on-demand approach similar to the Netflix philosophy. In this webinar, we will discuss how cloud-based security is simplifying workflow processes, changing cost/benefit models to drive us towards a pervasiveness of encryption and key management that will de-risk data and connectivity in similar ways to anti-virus and firewalls.

    Join this interactive presentation to learn about:
    • The role of security in today's connected world
    • The drivers for and impact of simplifying security on business and workflow
    • How security is providing valuable business intelligence through connected systems and meeting compliance mandates
    • Gemalto’s solution to solving on-demand data protection
    • Upcoming cybersecurity trends and how to prepare
  • Delivering a Secure API layer with Open Banking
    Delivering a Secure API layer with Open Banking Louise Beaumont (Publicis.Sapient & techUK), Bernard Harguindeguy (Elastic Beam), Chris Ward (Mapa Research) Recorded: Nov 16 2017 61 mins
    This discussion focuses on delivering a secure API layer and how Open Banking will deliver a secure Open Future..

    Open Banking will affect every layer of the bank:
    -It will stretch and stress banks’ brands – resulting in both the potential for significantly increased reach, and reputational enhancement and risk
    -It will change and complicate how banks talk to consumers and SMEs – whether direct, intermediated, invisible, or all three simultaneously
    -The ecosystem environment will radically change how services are designed - with a flood of ideas and data available for those banks which successfully attract, seed and enrich the ecosystem within which they are a player
    -And the ecosystem environment will fundamentally change how these services are delivered – whether by companies with whom the bank has a partnership, or companies with whom the bank has absolutely no relationship
    -And finally, it also demands a rich, growing - and secure - API layer to enable the Open Future
  • Top cyber threats in the financial sector
    Top cyber threats in the financial sector Candid Wueest, Principal Threat Researcher, Symantec Recorded: Nov 16 2017 49 mins
    Financial institutions are increasingly facing attacks on multiple fronts.

    Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions. While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing new types of attacks in the form of large-scale financial heists.

    Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards. They are using living off the land and fileless attack tactics similar to APT groups. But also extortion with DDoS attacks or business email compromise (BEC) scams are increasingly bothering financial corporations.

    In this webcast on the current financial threat landscape, Symantec takes a look at the most prevalent and significant financial threats.

    In this webcast we will review:
    - The top threats facing financial institutions with statistics and examples
    - Explore the most common techniques employed in financial attacks
    - Provide case studies of the most high-profile financial attacks of the past 12 months

Embed in website or blog