Hi [[ session.user.profile.firstName ]]

Risk Factory

  • Date
  • Rating
  • Views
  • Risk Factory: What is PCI? Risk Factory: What is PCI? Risk Factory Recorded: May 19 2016 2 mins
    Don't understand the PCI? Watch our video here for help.
  • Risk Factory: What is DPA Video? Risk Factory: What is DPA Video? Risk Factory Recorded: May 19 2016 2 mins
    Don't understand the DPA? Watch our video here for help.
  • Risk Factory: What is ISO-27001? Risk Factory: What is ISO-27001? Risk Factory Recorded: May 19 2016 2 mins
    Don't understand the ISO-27001 ISMS standard? Watch our video here for help.
  • Deep Threat: Security Lessons from the Online Adult Entertainment Industry Deep Threat: Security Lessons from the Online Adult Entertainment Industry Richard Hollis, Director, Risk Factory Recorded: Mar 15 2016 42 mins
    Gross revenues for the online adult entertainment industry exceeded $150 billion dollars last year from transactions conducted over more than 5 million websites offering adult content. Every second $3,075.64 is being spent on adult entertainment websites. The annual revenues from this industry alone exceed the top ten online companies in the world combined (Microsoft, Google, Amazon, E-Bay, Yahoo, Dell etc).

    This industry is credited for creating the very financial model used by virtually everyone doing business on the Internet today in addition to being primarily responsible for launching the very technologies we now come to expect from service providers from broadband to streaming media. This is an industry that understands the financial benefits of aligning their technology to their business objectives.

    The industry is also reputed to be the largest purveyor of SPAM, viruses, Trojans, worms, adware and spyware. This fact along with the product it sells and enormous revenue it generates make it an extremely high value target for crackers, fraudsters, organised crime and vigilante groups. And yet, we never hear about a breach to their systems do we? Why is that? What is their secret? What do they know about data security that other industries don’t?

    The presentation covers the statistics of the industry and then explains the ten basic information security principles that online adult entertainment providers implement to ensure the security integrity of their systems. The material is based upon actual case studies and interviews with Directors of online adult entertainment provider companies.
  • Designing a GRC Framework Designing a GRC Framework Richard Hollis, Director, Risk Factory Recorded: Feb 16 2016 43 mins
    What is the essence of information security governance, risk & compliance? How do you meet your governance, risk and compliance requirements and prevent a data breach? The key is to understand the spirit of risk management and create a customised information security management system (ISMS) for your business. This presentation details a practical, step-by-step guide for designing and implementing a cost-effective ISMS to minimise your risk of a breach and meet your Association’s legislative (Data Protection Act), regulatory (Payment Card Industry), or industry standard (ISO-27001) compliance requirements to include:

    · Practical ISMS documentation structure

    · Scope, objectives & risk strategy examples

    · Risk treatment plan, asset register & classification guide examples

    · Policy frameworks

    · Control objectives, evidence & policy examples

    · Audit & testing documentation examples
  • Big Daddy Loves Big Data Big Daddy Loves Big Data Richard Hollis, Director, Risk Factory Recorded: Jan 20 2016 35 mins
    Big Data has come from nowhere to become an integral part of our daily lives. It is a new and compelling way to see and understand the world we live in. Sadly, the information security industry has yet to harness the power of big data because we just don’t understand it.

    This presentation provides a clear, simple and useable perspective on big data to include:

    · Big data analytics

    · Where it came from

    · Where it is now

    · Where it’s going

    · Privacy issues

    · Potential data security uses