Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² EMEA Secure Webinars Channel. Sign up to join us for educational Security Briefings, ThinkTank Round Tables and eSymposiums aimed at all those vested in the world of information security. We welcome members and non members alike.
Simon Biles, Digital Forensic Analyst, Forensic Equity Limited, Christopher Laing, (ISC)2 EMEA Advisory Board Member
There is no such thing as a "secure" system - we do our level best to design them as well as we can, to put controls and measures in place - but, at the end of the day, things can and do go awry. Today we are going to talk about Forensics, and how it is the opposite side of the coin from security. What can we do in advance to aid in forensic investigation? What do we do at the point of a compromise to allow us to preserve as much evidence as is possible? And, ultimately, how to we take a forensic analysis and learn from it to create a better system the next time?
During the first half of 2016, encryption ransomware grew to become the most common type of malware used through soft-targeting and massively distributed attacks. Encryption ransomware now accounts for 50% of all malware delivery configurations, meaning that it is no longer considered simply a means for making a quick profit, but a permanent fixture on the threat landscape. Daily email-based attacks require an unattainable perfect response – every time. However, teams are constantly working within constraints and breaches continue to occur in record number. Technology has been introduced to help but has failed time and time again.
Join PhishMe’s Brendan Griffin and Will Galway to hear why it’s not all doom and gloom. In this session, you’ll learn about:
•Ransomware trends and monetization for the first half of 2016
•How simple attacks can still inflict massive damage
•How PhishMe Triage creates fast and effective phishing incident response process to combat email-based attacks
The new EU regulation of the Privacy world (the GDPR) is frequently portrayed as a scary and formidable piece of legislation that’s going to rock the online & off-line world. This webinar will explore what the implications really are. How much will change from the present regime? How difficult will it be to comply? Also is there an opportunity hidden in the challenge? And where will security and security professionals fit in the new picture?
What can Space Invaders teach us about attack path analysis? Mario about defending your users that are the weakest link? Even Pac Man about focusing on the right goals? Join Gavin Millard, EMEA Technical Director, who will explore the lessons to be learned from the games many of us played years ago that are still valid in the reduction of security risks within all of our infrastructures. Key takeaways from the webinar include:
How to game the system to get a high score in security.
How to gain insight into the attack path used by hackers to gain access to your data.
What cheats can be used to reduce the risk of data loss.
The “(ISC)² EMEA reacts” are ad-hoc webinars scheduled in reaction to major Information security events and breaches. Here we bring together leading Industry experts to join Adrian Davis, Managing Director, (ISC)2 EMEA to explore the impact, potential responses, and implications for the future, offering professionals much-needed perspective as the dust settles.
Privilege is at the centre of the attack lifecycle, yet removing Windows users’ local administration rights has a negative impact on the user experience and creates a desktop support headache.
Join this webinar to learn how least privilege, combined with the right application control technologies, can enable you to remove local administrator rights to reduce your attack surface, while keeping your users and support teams happy. The session will cover the technologies required to achieve this and demonstrate how their unique combination can protect you from ransomware.
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
After years of talking about it, companies are finally ready to begin the process of replacing traditional antivirus software. Next-generation antivirus vendors claim to protect endpoints from modern threats like PowerShell attacks and obfuscated malware with much higher effectiveness. But what exactly makes an antivirus product “next-generation”?
This webcast led by John D Wood, Carbon Black Defense Regional Manager, will dive into the technology behind next-generation antivirus so that IT and security teams can cut through the noise and properly evaluate the next wave of solutions.
In this webcast you will learn:
•What distinguishes next-gen antivirus from traditional antivirus
•How technology behind next-gen antivirus works to stop modern threats
•How to overcome the challenges customers face replacing traditional antivirus
•Establishing a “side-by-side” strategy for moving to a next-generation antivirus solution
IOT & Blockchain are two technologies that have the potential to transform the future of connectivity and the way we manage transactions. This webinar will help you cut through the hype of IOT and Blockchain and will reveal what’s really important within these technologies and the opportunities they present for business.
To stay competitive in the market, businesses need to remain agile, minimize costs and maximize user productivity – all without compromising on security.
This webinar will help you justify a privileged account security project to business and executive management through demonstrated methods that streamline operations and simplify user processes all while improving the organization’s security posture. You’ll better understand how to maximize the value of a privileged account security investment, enable IT teams to do more with less and eliminate tedious manual processes.
We’ll use sample business case elements that address how organizations can:
•Reduce the attack surface and detect threats faster to minimize the potential damage
•Automate processes to save and time and money – and improve employee satisfaction
•Improve audit processes by centralizing audit data and protecting its integrity
Offering a preview of what to expect from Track 2 of Security Congress EMEA, this session brings together speakers that examine varied developments in the threat landscape. Tackling trends from the role of social engineering in Industry 4.0 to the latest Tactics and Drivers behind DDoS Attacks and the Casino-style tactics deployed by hackers, delegates will gain both an overarching view of current concerns from the front- lines of defence, and an opportunity to examine a few questions that are rattling the security industry today:
Is it time to accept breach as inevitable?
Are we prepared for the aftermath?
Should we welcome vulnerability disclosure?
Can we do a good job of sharing and warning each other?