Hi [[ session.user.profile.firstName ]]

IT Security Guru

  • Date
  • Rating
  • Views
  • Why the Web Remains a Primary Ransomware Vector
    Why the Web Remains a Primary Ransomware Vector Greg Maudsley, Senior Director, Product Marketing at Menlo Security Recorded: Oct 13 2016 39 mins
    Ransomware attacks are globally pervasive, and only getting worse for retailers, hospitals and a number of other businesses. The number of strains of Ransomware is infinite, with more and more advanced versions coming to light every day, but the vectors through which attacks occur remain the same. 90% of malware is delivered via web and email, with dynamic web content dramatically increasing the risk to users. Of the top 50 most visited US sites in 2016, 42% were found to be running vulnerable versions of web-software code. Traditional approaches to cyber security are failing – distinguishing the good from the bad is no longer a reliable option and has a very costly impact on enterprises. One approach that has been developed to tackle the constantly evolving threat landscape is Isolation, which assumes that all active content poses a risk.

    Greg Maudsley, Senior Director, Product Marketing at Menlo Security will highlight the steps that must be taken to raise awareness of the reality of the Ransomware threat, and discuss the best ways in which to tackle this.
  • Using machines to combat criminals
    Using machines to combat criminals Lloyd Webb, Sales Engineering Director, Cylance Recorded: Oct 13 2016 39 mins
    2016 is turning out to be a landmark year in terms of Ransomware and there’s no sign of these threats slowing down any time soon. Ransomware is not new, it is just getting more sophisticated and is inflicting major damage to companies, organisations and individuals, shaping up to be a frighteningly lucrative year for cybercriminals, where any person with a computer can be exploited and used as a revenue source with the potential for vast profits.

    Learn how Cylance have revolutionized the industry by utilizing data science and security experts to provide a next-generation cybersecurity technology that proactively prevents, rather than detects the execution of advanced persistent threats and malware in real time before they ever cause harm.
  • Well, Your CMS Just Got Hacked!
    Well, Your CMS Just Got Hacked! Bryan Soltis, Technical Evangelist at Kentico Software Recorded: Oct 7 2016 39 mins
    Many enterprise applications run on a CMS platform to enable administrators and editors to build and update content quickly. While many of these systems have great built-in security features, there's a lot that can go wrong when a site is left vulnerable to attackers. In this webinar, Kentico Technical Evangelist Bryan Soltis will discuss many of the areas of your CMS that, when left unchecked, can expose your site to hackers, and what to do if you've already been hacked.
  • 7 Things You Didn't Know About GDPR But Were Afraid To Ask
    7 Things You Didn't Know About GDPR But Were Afraid To Ask Shadi Razak, CTO of CyNation Recorded: Oct 7 2016 43 mins
    The EU General Data Protection Regulation (GDPR) is the biggest change to data protection law in the world since the late 90’s. Every aspect of the old law has been overhauled and modernised. Businesses trading with the EU or handling EU citizens private data will need to comply with the GDPR come 25th May 2018. This mean almost all British organisations will have to adapt to the EU GDPR despite the latest Brexit vote. Accordingly, companies will be fully accountable for implementing a comprehensive data governance policy and appropriate security mechanisms. Non-compliance can result in fines of up to €20 million or 4% of a company's global annual turnover, whichever is greater.

    The adaption process to the EU GDPR won’t be simple and easy one. It will take time and energy from businesses, especially SMBs. During this webinar we give the chance to understand the biggest changes to the current law, and learn the essential steps business need to get in place to be ready come May 2018. With the webinar's open and live format, you will have ample opportunity to engage in Q&A with our data privacy and security experts.
  • Creating an environment for “Continuous Compliance” within Open Source Software
    Creating an environment for “Continuous Compliance” within Open Source Software Martin Callinan Recorded: Oct 7 2016 47 mins
    Open Source Software is now broadly used in the development of software applications. The ability to reuse components of code already created allows development teams to create more code, with more functionality, faster. It also promotes the adoption of standards and makes applications more interoperable.
    Although Open Source Software components typically require no licensing fee, it does come at a cost. This cost is uncertainty – or perceived uncertainty in many cases. Most software developers will be meticulous about what components they use from the perspective of functionality as they want to build code that works.

    However those Open Source Software components could have inherent business risks associated with them such as Legal/IP compliance, security vulnerabilities and operational risk. IP Investors, cyber insurance companies and business management are becoming aware of the need for demonstrable controls to be in place to mitigate these risks.

    This talk will discuss strategies organisations continuous compliance culture which will manage the risks without impacting technical innovation. These strategies can be leveraged by both organisations implementing open source based solutions or by technical organisations are creating open source based solutions
  • The Future of Cybercrime
    The Future of Cybercrime Greg Iddon, Security Specialist at Sophos Recorded: Oct 7 2016 43 mins
    As more and more internet-enabled devices hit the market, securing these devices and our personal data is becoming an increasingly difficult task. Additionally, as more and more businesses make use of cloud-based services, new opportunities for criminals to exploit these services are appearing at a rapid pace as cybercrime becomes one of the most lucrative forms of crime we have ever seen. What cyberthreats will we start to see more of in the coming years? And what tactics will start to disappear?

    In this webinar, Greg Iddon, Security Specialist at Sophos, will explore the future of cybercrime based upon the views and trends observed by members of Sophos and researchers at Sophos Labs, as well as how businesses and consumers can protect themselves from the threats and risks of tomorrow.
  • Security Without Complexity. How to Understand Security Solutions
    Security Without Complexity. How to Understand Security Solutions Jan Vekemans, CTO Criptyque Recorded: Oct 7 2016 36 mins
    Too often security has been hampered by complexity and incomprehensibility. What people don't understand they mistrust and when they become inconvenienced they look for alternatives or switch off. This webinar will explain the workings of complex security solutions in simple terms. It will help unravel the complexities and show how simple yet comprehensive, all-inclusive security systems are the key to a working solution!
  • The three principles of developing effective security products
    The three principles of developing effective security products Paul Williams, CIO, Cloudview Recorded: Oct 7 2016 25 mins
    In this webinar Paul Williams of Cloudview looks at the three principles of developing effective security products under the theme of mind, body and spirit. The webinar will cover:
    •Mind – why security needs to be at the heart of everything that a business does, and how to ensure that it is embedded in all aspects of product design
    •Body – ensuring that products fulfil user needs of usability and trustworthiness
    •Spirit – why simplicity is the key. This means understanding user needs, designing products to meet them and then getting out of the way i.e. avoiding overdesign or adding unnecessary features.
  • Small Fish, Big Pond: Why should Security Matter to Me?
    Small Fish, Big Pond: Why should Security Matter to Me? Tim Woods, VP of Customer Technology, Firemon Recorded: Oct 6 2016 43 mins
    With all of the hype around security of late, you’d be forgiven for thinking that you’re too small to matter in the grand scheme of cyber security. This complacency, however, is one of the major issues facing the safety of our businesses today. While companies should be responsible for the overall safety of employee and customer data, there are things you can and should be doing to help. When we’re all battling the same criminals with the same end goal, no one is too insignificant to matter.
  • Don’t Let Your Smart Home Turn Against You
    Don’t Let Your Smart Home Turn Against You Cesare Garlati, chief security strategist, prpl Foundation Recorded: Oct 6 2016 44 mins
    Cesare Garlati, chief security strategist for the prpl Foundation, will host a webinar discussing the security risks presented by today’s highly-connected smart home, why the IoT is so easy to exploit, and how consumers can protect themselves.

Embed in website or blog