Hi [[ session.user.profile.firstName ]]

Cyber Management Alliance

  • Date
  • Rating
  • Views
  • How the US Secret Service combats advanced ransomware
    How the US Secret Service combats advanced ransomware Amar Singh, Mark Grantz, Chris Payne, Brian Laing, Ronny Wolf Recorded: Oct 4 2017 60 mins
    Following on from our popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next", we bring to you our next special episode with US Secret Service Special Agent Mark Grantz.

    If you think criminals are bored of Ransomware, think again! The ransomware market is anything but boring. Criminals are continuing to flock to ransomware as the barriers to entry, RaaS or ransomware-as-a-service, make it easy for anyone to try their luck at digital extortion. The authors behind Cerber — currently the most prominent ransomware family — release updated variants every 8.4 days on average!

    Join Amar Singh, global CISO and CEO of Cyber Management Alliance and US Secret Service Special Agent Mark Grantz as they
     
    •Dig deep into the inner workings of advanced cyber criminal gangs
    •Share how law enforcement agents, like Mark Grantz, keep pace and take down these criminal outfits and police cyberspace.
    •Share best practice tips and strategies on securing your organisation.
     
    Joining Mark and Amar are Ronny Wolf from GFI, Brian Laing from Lastline and cyber and data privacy expert Chris Payne from Advanced Cyber Solutions.
  • Insights with Cyber Leaders - Adel Al Hosani CISO UAE Customs
    Insights with Cyber Leaders - Adel Al Hosani CISO UAE Customs Amar Singh CEO Cyber Management Alliance Recorded: Sep 27 2017 25 mins
    Amar Singh, CEO and co-founder of Cyber Management Alliance, took the opportunity to discuss cyber security and information management with Adel Al Hasani, CISO and Head of Information Security for the UAE Government.
  • Insights with Cyber Leaders - Taiye Lambo Former CISO of Atlanta City
    Insights with Cyber Leaders - Taiye Lambo Former CISO of Atlanta City Amar Singh CEO Cyber Management Alliance Recorded: Sep 27 2017 18 mins
    Cyber Management Alliance had the pleasure recently to talk to Taiye Lambo, former CISO for Atlanta, about his early career in IT, moving from Nigeria to London, and then onto Atlanta, and the way he has crossed over from full time positions to an entrepreneur, and back again. Taiye also gave us his views on certifications, why knowledge is important and his love of mentorship.
  • Insights with Cyber Leaders - Patrick Heuri
    Insights with Cyber Leaders - Patrick Heuri Amar Singh Cyber Management Alliance Recorded: Sep 22 2017 22 mins
    Insights with Cyber Leaders series brings you a fascinating Interview with Patrik Heuri former Global Head of Information Security Risk at HSBC Private Bank.

    Moving from an information security role into a cyber security role has been challenging. Patrik explains his thoughts in that when you think about information security, you think of it as a technical subject, and that’s correct. In fact, most project leads will, when they start as juniors, learn the necessary techniques and methodologies they will need to develop their expertise as an IT security officer. However, further down the line of their careers, Patrik believes that there is a requirement to better understand the legal aspects to cyber and information security, such as regulations and compliance, and the information production within the organisation. He adds that it will be of great benefit to anyone entering the information security/cyber security space to train and work with the legal teams on IT matters.
  • A Day in the Life of a Threat Analyst – A Technical Case Study on Attribution
    A Day in the Life of a Threat Analyst – A Technical Case Study on Attribution Amar Singh, Steve Miller (Anomali) Recorded: Sep 12 2017 60 mins
    Threat actors are devious and persistent to say the least. Consequently, the practice of threat analysis requires a similar mindset of unrelenting determination and doggedness. Join Steve Miller and Amar Singh as they share a glimpse of this exciting world and examine the various toolsets, methodologies and processes employed by threat analysts to ask and answer complicated questions about cyber threats. We will preview a day in the life of a threat intelligence analyst in the context of incident and malware attribution.

    This technical webinar will cover:

    * . Role of an intelligence analyst
    * . Typical challenges and questions
    * . Tools and processes used to find answers
    * . Case study on attributing an intrusion set

    Amar Singh is a globally recognised CISO and trusted advisor to FTSE 100 and other organisations. He also is the founder of Cyber Management Alliance Ltd, Give01Day and Wisdom of Crowds.

    Steve Miller is an incident response professional and a threat intelligence analyst at Anomali. Steve came to Anomali from Mandiant, where he built security operations centers around the world, conducted hundreds of intrusion investigations and, of course, chased down a lot of evil – work that directly led to the discovery of tons of new zero-days, APT malware families, and targeted attack campaigns.

    Prior to joining Mandiant, Steve conducted research and special projects for federal government agencies the U.S. Department of Homeland Security and the U.S. Department of State.
  • The Second Coming of Ransomware - Insights into New Developments
    The Second Coming of Ransomware - Insights into New Developments Amar Singh Recorded: Sep 12 2017 54 mins
    We are excited to bring you an updated version of our hugely popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next". Traditional ransomware, for the want of a better word, is boring and truthfully a fairly opportunistic way to make money. Guess what, criminal gangs don't believe in opportunistic attacks that may make them money. They want a certain assurance of success and importantly, they want big bucks.

    Modern ransomware is going to be able to deliver this and more to anyone who can pay top dollar.

    Join global CISO and cybersecurity expert, Amar Singh, as he shares his insights and experience on the murky world of cyber crime and ransomware and how you can be better prepared to manage this growing threat.
  • The Imminent Smart Device Mutiny
    The Imminent Smart Device Mutiny Amar Singh & Chris Payne Recorded: Aug 16 2017 59 mins
    Are we filling our homes and carrying around in our pockets, our biggest cybersecurity vulnerabilities? Join us in a lively debate where we will discuss the increase in IoT and smart devices, some of the lesser talked about threats and what steps are being taken to reduce the risk to the imminent smart device mutiny of future.
  • Insights with Cyber Leaders - Tracy Andrew Former Infosec Manager at Freshfields
    Insights with Cyber Leaders - Tracy Andrew Former Infosec Manager at Freshfields Amar Singh CEO Cyber Management Alliance and Tracy Andrew CISO Freshfields Recorded: Jul 31 2017 21 mins
    As part of Cyber Management Alliance’s exclusive Insights With Cyber Leaders interview series, Amar Singh, CEO of Cyber Management Alliance, sat down with Tracy Andrew, former Information Security and Compliance Manager at one of the largest law firms in Europe - Fieldfisher, to gather fascinating insights into his career, his thoughts on qualifications and certifications, what attributes he looks for when recruiting, and whether, in his opinion, it is important to have a technical background to succeed in cyber security.
  • Wisdom of Crowds Virtual Roundtable - Data Security with RSA, Dell and more.
    Wisdom of Crowds Virtual Roundtable - Data Security with RSA, Dell and more. Rashmi Knowles, Charles Race,William Culbert, Paul Ferron,Jason Goode and Jackson Shaw Recorded: Jul 27 2017 20 mins
    Participants in the Roundtable: Rashmi Knowles from RSA, Charles Race from OneLogin, William Culbert from Bomgar, Paul Ferron from CA Technologies, Jason Goode from Ping Identity and Jackson Shaw from Dell Security

    How has the adoption of ‘cloud’, including SaaS applications, changed the security landscape?

    What are the benefits of an Identity Access Management solution, why should it be implemented, and would you recommend an on-premise, cloud or hybrid solution?

    How does a single sign-on policy help to improve productivity and save costs, and what are the principle differences between SSO and federated identity?

    How should businesses and organisations leverage provisioning and deprovisioning for cloud applications, and what impact will this have?
  • An Exciting Day in the Life of a Risk Manager! - Really!
    An Exciting Day in the Life of a Risk Manager! - Really! Amar Singh, Chris Payne, Dom Saunders Recorded: Jul 27 2017 50 mins
    Policy? We have a policy? Have you read the policy? Thats right...who actually reads company policies?

    Risk and compliance managers globally have lost the fight against user policy acceptance leading to increasing organisational risk and the decreased ability to stand up and demonstrate effective compliance to regulatory bodies.

    Does it have to be this way? In this webinar, we

    * Demo what we use to transform and make mainstream what is often boring and ignored.

    * Show how you can effectively measure (yes measure and report) on how effective your policy implementation is.

    * Better engage and enforce your policies with third parties.

Embed in website or blog