Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² EMEA Secure Webinars Channel. Sign up to join us for educational Security Briefings, ThinkTank Round Tables and eSymposiums aimed at all those vested in the world of information security. We welcome members and non members alike.
Adrian Davis, Managing Director, (ISC)² EMEA, Q&A with Membership Services
Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session
In this webinar, presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) you will learn:
a. The background to the new General Data Protection Regulation
b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
c. A focus on the information security implications and considerations for meeting compliance
d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards
The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.
Learn how Imran Islam, leader of Cisco’s EMEA/APAC CSIRT team relies on Splunk to help his team drive best practices in threat assessment, mitigation planning, incident detection and response, incident trend analysis, and the development of future security architecture.
Join this webinar to hear Imran Islam discuss how Cisco drives CSIRT best practices:
- CSIRT playbooks and automation methods
- The importance of timely CSIRT data access, correlation & visualisation
- CSIRT staffing approaches
- CSIRT threat intelligence management
- Driving CSIRT operational efficiency
- The importance of CSIRT collaboration across the business during investigations
- How CSIRT functions can increase business relevance
- Learn about the importance of understanding your environment
- Learn about the importance of having the right data
- Learn the critical success factors for building a CSIRT Team and capabilities
- Learn how to enable your security team to scale its ability to handle incidents and quickly find, validate, and resolve issues
- Learn how to justify adding more resources to an incident response team
- Learn how to introduce consistency into your security team for approaching and solving security problems.
As the security industry has continued to under invest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s human assets. Empowering human assets to provide vetted intelligence into your incident response teams is often overlooked. Every organization has these human sensors, and there’s a natural desire for these employees to want to help.
In this presentation, Jim Hansen will discuss:
•Why the cyber security industry is broken
•How to reduce susceptibility to human-targeted attacks
•How to empower users to become human sensors to recognize and report suspected attacks
Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis. But what about the risks? Join me, Stephen McCormack from IBM MaaS360 as I take you step-by-step through the key challenges that mobile devices bring, and how you can easily act to ensure your organisation is protected.
Enterprises have generally responded to the security challenge, recognising that they cannot simply cross their fingers and hope to avoid a major cyber incident. Many have reached for the ‘big security technology catalogue’ and in the past couple of years we have seen increasing numbers of organisations setting out with the intention of deploying some form of SOC. While there is no getting away from the fact effectively deployed technologies and the integration of a well organised SOC can be part of the solution, very few organisations can actually set up and operate a form of SOC that will make a material difference. In this webinar, experts from Fujitsu will discuss the considerations that go into an effective SOC, identify common mistakes and recommend a SOC Strategy which is more likely to yield an improved security posture than blowing a massive budget on a ‘home-grown’ SOC.
This session is targeted at IT and security leaders and is designed to help them understand and address the unique challenges that enterprises typically face when they deploy their applications in the public cloud. It summarize the areas that the public cloud vendors typically take care of and highlights the areas that the enterprise and application owners are typically responsible for. With a focus on managing privileged accounts in the cloud environment the session addresses challenges and solutions for securing application to application sharing and communications, elastic, hybrid and DevOps environments. While the focus is on public cloud many of the best practices and learnings will also be applicable to private cloud environments.
In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
The security industry is witnessing a rapid evolution in attack techniques - including advanced polymorphic malware and file-less attacks. In fact, according to the 2016 Verizon Data Breach Report, the majority of breaches (53%) involve no malware.
Clearly, traditional antivirus (AV) solutions no longer stop advanced attacks. Modern attackers can easily get their hands on the static and highly predictable prevention models used by legacy AV vendors, which means they can reliably bypass them. Unfortunately, many emerging “next-gen” vendors are using approaches that fall victim to the same fundamental flaw.
In this webinar with guest speaker Chris Sherman, Senior Analyst at Forrester Research, we will discuss the latest trends in endpoint security, including results from The Forrester Wave™: Endpoint Security Suites, Q4 2016. Carbon Black's Paul Morville will talk about how to stop these pervasive attack techniques.
Topics Covered On the Webinar:
•Forrester analysis on new security threats and the need for a next-generation of endpoint security
•Forrester Endpoint Security Wave Report results
•How next-gen antivirus makes it harder for attackers to achieve their objectives
With over 4,000 new open source vulnerabilities discovered since 2014, developers need new tools in their arsenals to guide, enforce, and monitor their use of open source code throughout the SDLC.
Join Mike Pittenger, VP of Security Strategy at Black Duck Software, where he’ll discuss how your organization can:
· Automate identification of all open source you’re using and map against known and newly identified vulnerabilities
· Accelerate remediation
· Take action today to better enforce open source security without impacting an agile SDLC
With the large possibility amount of personal data availably, Data protection impact assessments are crucial to identify, understand and address any privacy issues that might arise when developing new products and services or undertaking any other new activities that involve the processing of personal data.
The objective of this webinar is to provide a pragmatic approach to such type of assessments in the context of the GDPR and IoT.