Hi [[ session.user.profile.firstName ]]

IT Security Guru

  • Date
  • Rating
  • Views
  • Operationalize a Global Identity Data Governance Policy
    Operationalize a Global Identity Data Governance Policy
    Martijn Loderus, VP, Solutions Engineering & Services, JAnrain Recorded: Oct 10 2018 65 mins
    Multinational brands must adhere to different data governance standards and regulations of the regions and countries they do business in. For brands that operate multiple websites, applications and other properties, having siloed data warehouses with disparate policies creates inefficiencies, poor user experiences and legal vulnerabilities.

    To tackle these challenges, leading brands are investing in a global data governance policy that centralizes customer identity data, universally manages personally identifiable information (PII) across applications, and creates a self-service workflow for data subjects to manage their communication preferences and data.

    Watch this webinar featuring Janrain VP of Solutions Engineering & Services, Martijn Loderus, who has supported leading brands in implementing global data governance policies with customer identity and access management (CIAM) at the core. He recently helped prepare clients for the Global Data Protection Regulation (GDPR) and will share case studies from those experiences

    What you’ll learn:
    The cross functional business impact of identity data governance in today’s landscape
    Best practices to retain seamless customer experiences while ensuring compliance
    How CIAM works in regards to policy management
    The short- and long-term benefits of a global identity data governance policy
    Who should attend?
    Business leaders from information security, IT, legal and marketing teams
  • Operationalize a Global Identity Data Governance Policy
    Operationalize a Global Identity Data Governance Policy
    Martijn Loderus, VP, Solutions Engineering & Services, JAnrain Recorded: Oct 9 2018 65 mins
    Multinational brands must adhere to different data governance standards and regulations of the regions and countries they do business in. For brands that operate multiple websites, applications and other properties, having siloed data warehouses with disparate policies creates inefficiencies, poor user experiences and legal vulnerabilities.

    To tackle these challenges, leading brands are investing in a global data governance policy that centralizes customer identity data, universally manages personally identifiable information (PII) across applications, and creates a self-service workflow for data subjects to manage their communication preferences and data.

    Watch this webinar featuring Janrain VP of Solutions Engineering & Services, Martijn Loderus, who has supported leading brands in implementing global data governance policies with customer identity and access management (CIAM) at the core. He recently helped prepare clients for the Global Data Protection Regulation (GDPR) and will share case studies from those experiences

    What you’ll learn:
    The cross functional business impact of identity data governance in today’s landscape
    Best practices to retain seamless customer experiences while ensuring compliance
    How CIAM works in regards to policy management
    The short- and long-term benefits of a global identity data governance policy
    Who should attend?
    Business leaders from information security, IT, legal and marketing teams
  • Neuro Diversity in the Cyber Security Industry
    Neuro Diversity in the Cyber Security Industry
    Brian Higgins, Business Development Manager at (ISC)² Recorded: Oct 6 2017 59 mins
    In this session, we’ll look at some of the characteristics that make a cyber-security personality – they don’t always need to follow convention. Brian Higgins from ISC2 will chair the event as we hear from the National Autistic Society, Thomas who is visually impaired and getting his start up off the ground and Tania a computing teacher for neuro diverse young people.

    Speakers include: Brian Higgins, Business Development Manager at (ISC)²; Cath Legget, National Autistic Society; Thomas Seidling, relationship manager at Cyber Smart and Tania Brooks, computing teacher.
  • Creative Employment in Cyber Security
    Creative Employment in Cyber Security
    Neil Stinchcombe, co-Founder, Security Serious Recorded: Oct 5 2017 67 mins
    session will look at how employers are going about recruiting people creatively and what they’re doing to find the right talent and what incentives they’re putting in place to retain and grow their current staff.

    Speakers include: Shan Lee, Information Security Officer at TransferWise, Vicki Gavin, Head of Business Continuity and Information Security at the Economist Group; Ryan Farmer, Delivery Manager, Acumin Consulting; Emily Swiatek, National Autistic Society and James Hadley, Founder/CEO of Immersive Labs.
  • Ransomware: How to strategically Fight it, Without Breaking the Bank
    Ransomware: How to strategically Fight it, Without Breaking the Bank
    John Cloonan, head of products at Lastline Recorded: Oct 4 2017 64 mins
    Ransomware presents some unique challenges to organizations, regardless of the size, industry or geography. However, it has very distinct behavior relative to other kinds of malware. It actually tells you that an attack has taken place. From a defender's point of view, being alerted to an attack is far better than having it stay undetected in your systems. During this presentation, John Cloonan, head of products at Lastline, will review:

    - Common elements of today's malware strains
    - Effective strategies for combatting ransomware
    - What malware defenders can learn from ransomware
  • Artificial Intelligence - how could it potentially help bridge the Cyber-skills
    Artificial Intelligence - how could it potentially help bridge the Cyber-skills
    Pete Warren, Chairman at Cyber Security Research Institute Recorded: Oct 4 2017 76 mins
    How could AI potentially save the cyber-security industry – Peter Warren, journalist and thought leader on AI, will chair this session on how AI should be in the interest and control of the people for the people – and how it will impact on businesses from a legal perspective.

    Speakers include: Pete Warren, Chairman at Cyber Security Research Institute and Andrew Jones, Professor of Cyber Security at University of Hertfordshire.
  • Incentives to make the UK a hub for cyber-security companies
    Incentives to make the UK a hub for cyber-security companies
    Sarb Sembhi, CTO, CISO & DPO, Virtually Informed Recorded: Oct 3 2017 61 mins
    This session will look at what is available to make the UK an attractive place to start-up and grow a successful cyber-security company. It will look at regional development grants for areas such as Wales, Bristol and Ireland as well as grants, accelerator programmes and other incentives available.Speakers include: Shane Wickramasuriya, Operations Manager, CyLon; David Howorth, Head of EMEA, AlertLogic; Andrew Mulvenna, founder of Brightpearl and Mike Spain, Operations Director, Cyber Growth Partnership.
  • The Cyber Skills Gap – The Challenge – Setting the Scene
    The Cyber Skills Gap – The Challenge – Setting the Scene
    Warwick Ashford, Security Editor at Computer Weekly Recorded: Oct 2 2017 70 mins
    This first session will be based around the Global Workforce Study which shows the real numbers that expose the challenges facing UK companies in the wake of a global cyber-security shortfall. How can the UK become a haven for cyber-security and compete against the rest of the world for the best talent? What are the answers to building a viable, strong and competent cyber-security team? Is there enough being done to home-grow our own cyber-security workforce or will we need to talent from overseas and is that even possible with the challenges Brexit will bring?

    Speakers include: Adrian Davis Managing Director, EMEA at (ISC)²; Ian Glover, President at CREST; Quentyn Taylor, Director of Information Security at Canon for Europe, Warwick Ashford, Security Editor at Computer Weekly.
  • Why the Web Remains a Primary Ransomware Vector
    Why the Web Remains a Primary Ransomware Vector
    Greg Maudsley, Senior Director, Product Marketing at Menlo Security Recorded: Oct 13 2016 39 mins
    Ransomware attacks are globally pervasive, and only getting worse for retailers, hospitals and a number of other businesses. The number of strains of Ransomware is infinite, with more and more advanced versions coming to light every day, but the vectors through which attacks occur remain the same. 90% of malware is delivered via web and email, with dynamic web content dramatically increasing the risk to users. Of the top 50 most visited US sites in 2016, 42% were found to be running vulnerable versions of web-software code. Traditional approaches to cyber security are failing – distinguishing the good from the bad is no longer a reliable option and has a very costly impact on enterprises. One approach that has been developed to tackle the constantly evolving threat landscape is Isolation, which assumes that all active content poses a risk.

    Greg Maudsley, Senior Director, Product Marketing at Menlo Security will highlight the steps that must be taken to raise awareness of the reality of the Ransomware threat, and discuss the best ways in which to tackle this.
  • Using machines to combat criminals
    Using machines to combat criminals
    Lloyd Webb, Sales Engineering Director, Cylance Recorded: Oct 13 2016 39 mins
    2016 is turning out to be a landmark year in terms of Ransomware and there’s no sign of these threats slowing down any time soon. Ransomware is not new, it is just getting more sophisticated and is inflicting major damage to companies, organisations and individuals, shaping up to be a frighteningly lucrative year for cybercriminals, where any person with a computer can be exploited and used as a revenue source with the potential for vast profits.

    Learn how Cylance have revolutionized the industry by utilizing data science and security experts to provide a next-generation cybersecurity technology that proactively prevents, rather than detects the execution of advanced persistent threats and malware in real time before they ever cause harm.

Embed in website or blog