Hi [[ session.user.profile.firstName ]]

(ISC)² EMEA Secure Webinars

  • Date
  • Rating
  • Views
  • Change Liability for Accountability - GDPR with Cyber Security Risk Measurement
    Change Liability for Accountability - GDPR with Cyber Security Risk Measurement Christopher Strand, Carbon Black, Andrew Barratt, Coalfire, Adrian Davis, (ISC)² EMEA Recorded: Jun 22 2017 63 mins
    This webcast will introduce a discussion of several threat models that help to illustrate how organizations can look to strengthen their security posture while supporting their GDPR strategy. Areas of concentration will include:

    • How to reduce the potential risk and liability associated with the GDPR data residency and data protection accountability requirements.
    • Focus on specific controls used to provide clarity and measure to any GDPR strategy within the enterprise.
    • An introduction of cybersecurity control measure that can help reduce threats to the enterprise, while ensuring acceleration of data and security regulatory accountability for any GDPR program.

    Session attendees will take away many practical examples, solutions, and anecdotes on how their businesses can alleviate the pressures of balancing the confluence of security risks and the GDPR mandate. They will have some starting points on how they can create a plan to step beyond static regulatory alignment and apply collective intelligence, industry baseline initiatives and mandates, as well as shared industry intelligence, to better measure what’s most important to their cyber policy and regulatory GDPR requirements.
  • Investigation or Exasperation? The State of Security Operations
    Investigation or Exasperation? The State of Security Operations Duncan Brown, IDC, Matthias Maier, Splunk, Nathaniel Ford, (ISC)² EMEA Recorded: Jun 20 2017 58 mins
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:

    ●The time and associated cost security teams spend on incident response and how you compare to your peers
    ●How organizations are coping with an average of 40 actionable security incidents per week
    ●Where teams are focusing their security efforts
    ●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • Attribution: When Technical Information is Not Enough
    Attribution: When Technical Information is Not Enough Ross Rustici, Senior Manager, Cybereason, Nathaniel Ford, (ISC)² EMEA Recorded: Jun 13 2017 57 mins
    After every major data breach, the security community engages in a game of whodunit. It's human nature to want a resolution and to see the perpetrators brought to justice. The problems with attribution are starting to be discussed more openly within the security community, with many firms questioning the utility of technical attribution. At the same time, all are in agreement that the model they continue to use is failing.

    Recent research proves that threat actors use a variety of techniques to create misattribution of the attacks. In our upcoming webinar, Cybereason's Ross Rustici, Sr. Manager Threat Intel, will discuss examples of attack misattribution and discuss whether correct attribution is still possible.

    Join us to learn:
    • Why attack attribution is a complex mission
    • The variety of techniques used by nation-state and criminal actors to disguise their involvement
    • An approach to help organizations better harness the power of attribution
  • Latest Malware Trends & Attack Vectors
    Latest Malware Trends & Attack Vectors Richard Cassidy, Technical Director EMEA, Cybereason, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Jun 2 2017 62 mins
    In this webinar, Richard Cassidy, Technical Director EMEA, and (ISC)² EMEA Managing Director, Adrian Davis will discuss the latest malware trends and attack vectors. The most reported cyber-criminal groups, the latest attack trends (like WannaCry), and best practices for fighting the adversary will be explored. Join us for an up-to-date deep dive into adversary TTPS and how to prevent and respond to attacks using techniques like proactive hunting and SOC analysis and response.
  • NORDICS 2017 Privacy and Internet of Things: Don’t Spook Your Customers
    NORDICS 2017 Privacy and Internet of Things: Don’t Spook Your Customers Jan-Jan Lowijs, Privacy Expert, Deloitte Recorded: Jun 1 2017 46 mins
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • NORDICS 2017 Same Security, Different Dilemmas: Addressing  Cyber Challenges
    NORDICS 2017 Same Security, Different Dilemmas: Addressing Cyber Challenges Moderators: Rodney Cornelius, Hans Darenberg, Speakers: Dr. Ciarán Mc Mahon, David Darnell, Björn Sjöholm Recorded: Jun 1 2017 51 mins
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • NORDICS 2017 Do the Basics – Real Life Story of a Corporate Ransomware Incident
    NORDICS 2017 Do the Basics – Real Life Story of a Corporate Ransomware Incident Antti Nuopponen, Head of Cyber Defense, Nixu Recorded: Jun 1 2017 24 mins
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • NORDICS 2017 Managing Modern Cybersecurity Threats in a Regulated Digital World
    NORDICS 2017 Managing Modern Cybersecurity Threats in a Regulated Digital World Björn Sjöholm, Head of Sweden Market, Nixu Recorded: Jun 1 2017 16 mins
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • NORDICS 2017 Cyber Crime & Terrorism - What are the Threats & Vulnerabilities?
    NORDICS 2017 Cyber Crime & Terrorism - What are the Threats & Vulnerabilities? David Darnell, CEO, Systrends Recorded: Jun 1 2017 35 mins
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.
  • NORDICS 2017 Panel Discussion: “Today’s Hot Topics and Burning Questions”
    NORDICS 2017 Panel Discussion: “Today’s Hot Topics and Burning Questions” Moderator: Adrian Davis, Speakers: David Jacoby, Markus Kluge, Jan-Jan Lowijs and David Darnell Recorded: May 31 2017 43 mins
    Following the success of the one-day Secure Events and Security Congress in EMEA, (ISC)² is bringing its acclaimed conferences to a new level. 2017 will feature five two-day regional events to serve the entire (ISC)² EMEA professional community and enable delegates to drive the thinking around the issues and concerns professionals are facing today.
    (ISC)² Secure Summits brings multi-subject sessions from hands on practical workshops to keynotes and panel discussions featuring local and international industry experts to maximize the learning experience and CPE opportunity. Our summits offer a wealth of educational value, networking opportunities, and a community forum for likeminded professionals, all of which are FREE to (ISC)² members & (ISC)² Chapter members.

Embed in website or blog