Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² EMEA Secure Webinars Channel. Sign up to join us for educational Security Briefings, ThinkTank Round Tables and eSymposiums aimed at all those vested in the world of information security. We welcome members and non members alike.
Jorge Carillo, President of the (ISC)² Czech Chapter, Adrian Davis, Managing Director, (ISC)² EMEA
With the large possibility amount of personal data availably, Data protection impact assessments are crucial to identify, understand and address any privacy issues that might arise when developing new products and services or undertaking any other new activities that involve the processing of personal data.
The objective of this webinar is to provide a pragmatic approach to such type of assessments in the context of the GDPR and IoT.
Two themes emerge from 451 Research's recent study of the organizational dynamics of enterprise information security teams: that security teams are understaffed and potentially incorrectly positioned in organizations. Join us to review the the study's results based on more than 930 online surveys and 20 live interviews with enterprise security leaders.
Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session
Threat hunting is evolving. Many organizations still carry out threat hunting in an adhoc manner without a defined and repeatable process. Yet some organizations are now looking at new machine learning driven approaches to accelerate their maturity and success. This session will review the current approaches to threat hunting and explain how Splunk can support & accelerate your threat hunting maturity.
The new GDPR regulations are going to change how enterprises behave, and it's not just a matter for IT departments. So how do you get boards to listen? How do you make marketing care? How do you get finance's attention? Who else needs to know?
Six months after the publication of the GDPR and 20 months before it is implemented, what has been learnt and how can you take advantage of other people’s experience?
The team will talk and address these and other questions – less a seminar and more a round table discussion; come along with your questions ready for the team.
Join Nigel Hawthorn, Anthony Lee and Adrian Davis for a look at GDPR and leave with some answers to your questions.
The new EU regulation of the Privacy world (the GDPR) is rapidly approaching. This webinar will reveal a back to basics approach in relation to GDPR. Specifically, Jason Hart - Gemalto CTO will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.
Are you an (ISC)² member with questions about your certification? Would you like to hear more about member benefits and how (ISC)² can help you? Join the Guide to your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
•CPE opportunities, member benefits and getting involved
•Your membership requirements summarized
•Who are the (ISC)² EMEA team and how we can help you
Security threats continue to grow in sophistication and volume. With the emergence of the cognitive era, IBM Security is revolutionising the way security analysts work using Watson for Cyber Security as a trusted advisor leveraging threat research and gaining powerful insights from a plethora of structured and unstructured data.
Join this webinar to hear how Cognitive Security will be a game changer in the industry, enabling better human decision-making and reducing the cost and complexity of dealing with cybercrime.
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
Dr Gareth Owenson is the course leader for the Forensic Computing programme at the University of Portsmouth. He teaches extensively in forensics, cryptography and malware analysis. His research expertise is in darknets, where he is presenting working on alternative approaches that may lead to novel applications of the blockchain. Gareth also has a strong interest in Memory Forensics, and undertakes work into application-agnostic extraction of evidence by using program analysis.
Gareth has a PhD in Computer Science (2007) and has taught at several Universities throughout the UK.
Phishing and Spear Phishing attacks are the number one starting point for most large data breaches. However, no traditional security technology is currently able to mitigate the risks associated with these type of threats. Join this webinar to learn why phishing attacks are so successful, what capabilities organizations need to carry out a forensic investigation and what questions you need to be able to answer following an attack to respond effectively.