Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • [VIDEO] Cyber Security Lessons for the Financial Sector
    [VIDEO] Cyber Security Lessons for the Financial Sector Josh Downs, Community Manager, BrightTALK & Ian Glover, President, CREST Recorded: Feb 24 2017 11 mins
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • The Future of Machine-Based Penetration Testing
    The Future of Machine-Based Penetration Testing Sion Retzkin - Cronus Cyber Technologies Recorded: Feb 7 2017 34 mins
    The majority of internal and external cyber-attacks begin with exploiting vulnerabilities in the network and targeted applications. Over 99% of actual attacks exploit known vulnerabilities listed as known Common Vulnerabilities and Exposures (CVEs). The traditional defence is to probe the system using manual or automatic vulnerability scanning techniques; but this produces a lot of redundant and irrelevant information that does not shed any light as to whether a hacker can use the vulnerability to reach a critical asset. The only solution today is human penetration testing, but infrequent testing does not reflect the network's dynamic nature, especially in today's virtual and cloud based environments.
    A fresh approach to support manual penetration testing and enhance cyber resilience is to continuously and automatically test the network, applications and databases by using penetration testing techniques to expose vulnerabilities, establish complex attack path scenarios in real time and provide security and business insights to act on.
    This presentation will look at the technology and role of machine-based penetration testing.
  • Auditing Neglected Critical Infrastructure
    Auditing Neglected Critical Infrastructure Ian Whiting - CEO Titania Group Recorded: Jan 18 2017 33 mins
    Key network infrastructure devices are overlooked yet they provide critical functionality. Exploiting web application weaknesses and service buffer overflows is exciting, but the housekeeping of network infrastructure is not. Issues in network infrastructure devices can lead to network wide problems that would cause system admininstration nightmares. This presentation provides a review of key security devices, often side-lined when looking at security. It covers the value of these devices to "Blue Teams", issues "Red Teams" can highlight, desired outcomes and auditing practices.
  • [Video Interview] The Cyber Year in Review: Ian Glover, President, CREST
    [Video Interview] The Cyber Year in Review: Ian Glover, President, CREST Ian Glover, President, CREST & Josh Downs, Information Security Community Manager, BrightTALK Recorded: Dec 6 2016 28 mins
    Join this engaging session as BrightTALK conducts an in-depth interview with Ian Glover, President of CREST.

    It's been a crucial year for cyber security with big breaches and newsworthy hacks. BrightTALK's Information Security Community Manager Josh Downs will be quizzing Ian for his thoughts on the cyber security industry and in particular:

    - The big breaches of 2016 and lessons to be learnt
    - The current threatscape
    - The big vulnerabilities on the horizon
    - Ian's insights into how to keep your company secure in 2017

    We look forward to you joining us for the session.
  • Network security, seriously? 2016 Network Penetration Tests
    Network security, seriously? 2016 Network Penetration Tests Peter Wood Recorded: Sep 7 2016 46 mins
    The results of all the network penetration tests conducted by the First Base team over the past year have been analysed by Peter Wood. The annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business. Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • The Next Generation of Cyber Crime is here
    The Next Generation of Cyber Crime is here Rob Coderre Recorded: Aug 9 2016 47 mins
    Evolving tactics, techniques and procedures (TTPs) of online criminal actors have left a number of notable victim organizations in their wake and raised the bar for the security teams and law enforcement agencies that have sworn to protect them. From the migration of online criminal markets to an even deeper underground, to online extortion making a big comeback in novel ways, to increasingly effective malware crafted to steal more money and private information, if you are a potential target for online criminals, you are up against a greater cyber criminal threat than in years past.
  • Infosecurity 2016: Cyber Security in the Financial Sector
    Infosecurity 2016: Cyber Security in the Financial Sector Ian Glover, President, CREST & Josh Downs, Community Manager, BrightTALK Recorded: Jun 15 2016 7 mins
    - BrightTALK at Infosecurity Europe 2016 -

    BrightTALK were delighted to be joined by President of CREST and Industry-leading thinker Ian Glover in London at Infosecurity Europe.

    Ian covered key information security topics such as the notable recent breaches in the financial world and why the banks keep getting hacked; the principal threat actors and attack vectors; the main vulnerabilities to critical infrastructure; the enduring benefit of pentesting and cyber security is such an attractive career choice.
  • You’re The One That They Want: Targeted Threats and You
    You’re The One That They Want: Targeted Threats and You Don Smith, SecureWorks, Ian Glover, CREST & Peter Wood, First Base Technologies Recorded: Jun 15 2016 46 mins
    The rise in targeted threats means that security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.

    In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?

    Key themes:

    •The challenges faced by organisations from the rise in targeted threats
    •Limitations of security processes in protecting from targeted threats
    •How to gain early visibility into the threats targeting your particular organisation

    Don Smith leads the CTU™ Cyber Intelligence Cell: a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients. Don also leads the CTU research team in EMEA.

    Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA and building important relationships for SecureWorks in the region. His enthusiasm and threat expertise means that he regularly represents SecureWorks at industry events in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise, where he took a lead role in successfully integrating 14 acquisitions. He is a recognized subject-matter expert many areas of cybersecurity and advises SecureWorks and SecureWorks’ clients globally.
  • Risk-based Security - Fighting Unlimited Threats with Limited Resources
    Risk-based Security - Fighting Unlimited Threats with Limited Resources Irene Michlin, Managing Security Consultant, NCC Group Recorded: May 10 2016 37 mins
    Even the most security-minded organisation has limited budget and staff. How to decide where to spend these resources to provide maximum benefit to your organisation?

    In this webinar Irene Michlin will discuss how your organisation can establish a repeatable process for decision making in such areas as:
    •What and when to test
    •Which threats urgently require mitigation
    •What security training your staff needs
  • Using Targeted Intelligence to Direct Your Technology Policy
    Using Targeted Intelligence to Direct Your Technology Policy Jules Pagna Disso, Head of Research and Development, Nettitude Recorded: Feb 16 2016 49 mins
    The success of cyber threat intelligence is measured by its effectiveness in reducing the impact of malicious actors. It is therefore important to understand the economy of malware in order to break the chains of success of such economy. Such success needs to be materialised by a change in attitude, policies and configurations.

    Whilst applicable to most organisations, most examples used during this seminar will feature the financial sector and aim to:

    · Analyse the core components of the economy of malware

    · Analyse how to gather intelligence to reduce the impact of malicious actors

    · Show how to use the intelligence gathered to improve the security posture of the organisation

Embed in website or blog