Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² EMEA Secure Webinars Channel. Sign up to join us for educational Security Briefings, ThinkTank Round Tables and eSymposiums aimed at all those vested in the world of information security. We welcome members and non members alike.
James Hanlon, Security Markets Director, Splunk, Adrian Davis, Managing Director, (ISC)² EMEA
Threat hunting is evolving. Many organizations still carry out threat hunting in an adhoc manner without a defined and repeatable process. Yet some organizations are now looking at new machine learning driven approaches to accelerate their maturity and success. This session will review the current approaches to threat hunting and explain how Splunk can support & accelerate your threat hunting maturity.
The new GDPR regulations are going to change how enterprises behave, and it's not just a matter for IT departments. So how do you get boards to listen? How do you make marketing care? How do you get finance's attention? Who else needs to know?
Six months after the publication of the GDPR and 20 months before it is implemented, what has been learnt and how can you take advantage of other people’s experience?
The team will talk and address these and other questions – less a seminar and more a round table discussion; come along with your questions ready for the team.
Join Nigel Hawthorn, Anthony Lee and Adrian Davis for a look at GDPR and leave with some answers to your questions.
The new EU regulation of the Privacy world (the GDPR) is rapidly approaching. This webinar will reveal a back to basics approach in relation to GDPR. Specifically, Jason Hart - Gemalto CTO will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.
Are you an (ISC)² member with questions about your certification? Would you like to hear more about member benefits and how (ISC)² can help you? Join the Guide to your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
•CPE opportunities, member benefits and getting involved
•Your membership requirements summarized
•Who are the (ISC)² EMEA team and how we can help you
Security threats continue to grow in sophistication and volume. With the emergence of the cognitive era, IBM Security is revolutionising the way security analysts work using Watson for Cyber Security as a trusted advisor leveraging threat research and gaining powerful insights from a plethora of structured and unstructured data.
Join this webinar to hear how Cognitive Security will be a game changer in the industry, enabling better human decision-making and reducing the cost and complexity of dealing with cybercrime.
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
Dr Gareth Owenson is the course leader for the Forensic Computing programme at the University of Portsmouth. He teaches extensively in forensics, cryptography and malware analysis. His research expertise is in darknets, where he is presenting working on alternative approaches that may lead to novel applications of the blockchain. Gareth also has a strong interest in Memory Forensics, and undertakes work into application-agnostic extraction of evidence by using program analysis.
Gareth has a PhD in Computer Science (2007) and has taught at several Universities throughout the UK.
Phishing and Spear Phishing attacks are the number one starting point for most large data breaches. However, no traditional security technology is currently able to mitigate the risks associated with these type of threats. Join this webinar to learn why phishing attacks are so successful, what capabilities organizations need to carry out a forensic investigation and what questions you need to be able to answer following an attack to respond effectively.
There is no such thing as a "secure" system - we do our level best to design them as well as we can, to put controls and measures in place - but, at the end of the day, things can and do go awry. Today we are going to talk about Forensics, and how it is the opposite side of the coin from security. What can we do in advance to aid in forensic investigation? What do we do at the point of a compromise to allow us to preserve as much evidence as is possible? And, ultimately, how to we take a forensic analysis and learn from it to create a better system the next time?
During the first half of 2016, encryption ransomware grew to become the most common type of malware used through soft-targeting and massively distributed attacks. Encryption ransomware now accounts for 50% of all malware delivery configurations, meaning that it is no longer considered simply a means for making a quick profit, but a permanent fixture on the threat landscape. Daily email-based attacks require an unattainable perfect response – every time. However, teams are constantly working within constraints and breaches continue to occur in record number. Technology has been introduced to help but has failed time and time again.
Join PhishMe’s Brendan Griffin and Will Galway to hear why it’s not all doom and gloom. In this session, you’ll learn about:
•Ransomware trends and monetization for the first half of 2016
•How simple attacks can still inflict massive damage
•How PhishMe Triage creates fast and effective phishing incident response process to combat email-based attacks
The new EU regulation of the Privacy world (the GDPR) is frequently portrayed as a scary and formidable piece of legislation that’s going to rock the online & off-line world. This webinar will explore what the implications really are. How much will change from the present regime? How difficult will it be to comply? Also is there an opportunity hidden in the challenge? And where will security and security professionals fit in the new picture?