Hi [[ session.user.profile.firstName ]]

Cyber Management Alliance

  • Date
  • Rating
  • Views
  • Updated - Creating Incident Response Playbooks and more
    Updated - Creating Incident Response Playbooks and more
    Amar Singh Recorded: Feb 20 2019 49 mins
    Wow - This is an exciting and busy webinar - with loads of templates and downloads too!

    * Live session on how we create an incident playbook from scratch!
    * Review of our playbook scratchpad - how we design the initial playbooks.
    * Automating incident response - some thoughts.
    * Exciting updates on the GCHQ-certified CIPR training

    This playbook webinar is taken from our certified Cyber Incident Planning & Response (CIPR) workshop and we will have several past attendees sharing their experience about the workshop and how they implemented the lessons from this training.
  • Morrisons Could Have Stopped the Breach - This is How
    Morrisons Could Have Stopped the Breach - This is How
    Amar Singh, Barnaby Davies, Jeremy Wittkop Recorded: Jan 29 2019 57 mins
    Morrisons, the fifth largest super market in UK, will go down in history for all the wrong reasons. The inability to not just prevent but detect a massive data leak has meant that its brand name is being dragged through the mud and dirt, not once, but many times over. Yes Morrisons could have done many things and this webinar is NOT about beating up the brand or pointing a finger.

    Experts in this webinar will discuss a better, simpler approach that may reduce or at least make these kind of incidents very difficult to materialise. Join Amar Singh, Barnaby Davies and Jeremy Wittkop as they take a positive and proactive approach to preventing brand-damaging data breaches.

    Background: The Court of Appeal (October 2018) upheld a decision of the High Court holding Morrisons vicariously liable for data breaches caused by the actions of its employee, even though the employee’s actions were specifically intended to harm Morrisons.

    Do Google: search for morrisons data leak court case for more information.
  • 5 Key Criteria for a Secure Cloud Storage & File Sharing Service
    5 Key Criteria for a Secure Cloud Storage & File Sharing Service
    Amar Singh and Istvan Lam Recorded: Jan 24 2019 59 mins
    File storage & sharing should not just be about the size but also privacy and most importantly about maximum security.

    * Is your data protected by default?
    * Who has access to your data?
    * Who can index your data?
    * Where is your data stored?

    These and many more questions will ensure you select the right type of service that offers NOT only you but your clients the assurance that you take privacy and security seriously - especially when it comes to the cloud.

    Join Amar Singh as he discusses the following with Istvan Lam, the founder and CEO of Tresorit:

    - How to design an intercept-proof file sync & sharing service?

    - What does End-To-End encryption service actually mean?

    - How to combine on premise equivalent security with consumer grade simplicity?

    - Where is your data actually stored and what would happen in case of a breach of those cloud servers?

    - What does ZERO-Knowledge mean in the real world?
  • Creating a Winning Security Strategy for 2019
    Creating a Winning Security Strategy for 2019
    Israel Barak, Cybereason | Dario Forte, DFLabs Recorded: Dec 5 2018 49 mins
    Cyber attacks on businesses, organizations and critical infrastructure becoming the norm in 2018. Massive breaches are constantly in the news and consumers are demanding stricter data and privacy protections. Cybersecurity has never been more important to organizations, and the investment in security technology has never been greater.

    CISOs are in the spotlight, and are looking to build the best strategy to secure their organizations, customers and users.

    Join top security experts for an interactive Q&A panel discussion on:
    - The key factors CISOs should consider for their cybersecurity strategy
    - The current and future threatscape
    - Platform Security for 2019
    - Technological solutions that make CISOs' lives easier
    - How organizations are coping with the shortage of qualified security workforce
    - How CISOs can better communicate their strategy to the board

    Panelists:
    Israel Barak,CSO, Cybereason
    Dario Forte, CEO, DFLabs

    Panel moderated by:
    Amar Singh, Founder & CEO, Cyber Management Alliance
  • 5 Absolute Must-Haves for a Secure File Sync & Sharing Service
    5 Absolute Must-Haves for a Secure File Sync & Sharing Service
    Amar Singh, Istvan Lam Recorded: Nov 28 2018 46 mins
    File storage & sharing should not just be about the size but also privacy and most importantly about maximum security.

    * Is your data protected by default?
    * Who has access to your data?
    * Who can index your data?
    * Where is your data stored?

    These and many more questions will ensure you select the right type of service that offers NOT only you but your clients the assurance that you take privacy and security seriously - especially when it comes to the cloud.

    Join Amar Singh as he discusses the following with Istvan Lam, the founder and CEO of Tresorit:

    - How to design an intercept-proof file sync & sharing service?
    - What does End-To-End encryption service actually mean?
    - How to combine on premise equivalent security with consumer grade simplicity?
    - Where is your data actually stored and what would happen in case of a breach of those cloud servers?
    - What does ZERO-Knowledge mean in the real world?
  • Architecting a Sophisticated DDoS Attack in 5 steps
    Architecting a Sophisticated DDoS Attack in 5 steps
    Amar Singh, Aatish Pattni, Karsten Desler Recorded: Nov 22 2018 58 mins
    --- This is a Technical Webinar **

    Following on from our successful webinar, Breaking PCI-DSS Applications, we bring you our next instalment - How to Create a Complex DDoS attack in 5 steps. Join Amar Singh, Karsten Dessler as they dive into

    - The details, step-by-step, on planning a DDoS attack
    - The prerequisites for this plan to succeed
    - The different tools that can be used to launch such an attack.

    Needless to say, we will share mitigating strategies and the technology configurations that you should use to protect your web products.
  • Saving Money and Stopping Cyber Attacks - 3 Simple Steps for the Small Business
    Saving Money and Stopping Cyber Attacks - 3 Simple Steps for the Small Business
    Amar Singh; Steve Vickers Recorded: Nov 14 2018 47 mins
    Are you open minded to saving money and ensuring that your business is better protected from cyber criminals at the same time? Join Amar Singh and Steve Vickers as they discuss a simple checklist for charities and small businesses. A non-technical discussion, we layout step by step guidance on what you can do:

    - To save money on your current IT and security investments
    - To ensure your third party is delivering the right level of security and service
    - Increase your operational efficiency and lower total cost of operations.
  • How to break a PCI Compliant Application
    How to break a PCI Compliant Application
    Amar Singh, Aatish Pattni, Karsten Desler Recorded: Oct 31 2018 58 mins
    ** Warning - This webinar is only for informational purposes. We do not condone or encourage any malicious activity. The knowledge you gain from this webinar should be used to protect your own infrastructure and web applications. **

    PCI-DSS needs no introduction. The Payment Card Industry Data Security Standard applies to any organisation accepting credit card details in some way or the other. This webinar is going to share some of the latest techniques cyber criminals are using to break web applications.

    Join us to learn how they are doing this and what you should do to protect your organisation and compliance status.
  • Five Absolute Must-Haves for AWS, Azure, Google Cloud and Others
    Five Absolute Must-Haves for AWS, Azure, Google Cloud and Others
    Anmol Anand Amar Singh, Chris Payne Recorded: Oct 22 2018 57 mins
    The great migration to the cloud is in full swing and almost every organisation is getting involved.

    Whether it be virtual infrastructure, email services or collaboration tools, the benefits of the cloud, such as better availability and lower costs are being embraced universally.

    But what about security?

    In this webinar, several experts, including Anmol Anand, Amar Singh and Chris Payne will discuss their absolute security must-haves for cloud adoption.

    Topics covered:

    - Secure configuration management and benchmarking.
    - File storage and data transfer.
    - Alerting and incident response.
    - Authentication and identity management.

    Don't miss this exciting and informative webinar!
  • Implementing a Cloud Ready Software Defined WAN - Challenges & Opportunities
    Implementing a Cloud Ready Software Defined WAN - Challenges & Opportunities
    Amar Singh; Steve Vickers Recorded: Oct 18 2018 61 mins
    With the explosion of cloud-based cloud ready applications, many organisations struggle with optimising application performance for cloud or hybrid environments. The culprit, in many cases, is the connectivity from the offices to the cloud. The wide area network, (WAN) connecting offices to the Internet and to other offices, is still playing catchup. WAN technology is stuck in the old-age.

    Think about this: Does your business, small or large, have two or more broadband connections, maybe a broadband and a dial up or some other form of Internet connectivity? Apart from the security risk of having too many Internet points of exit, your business is also wasting money and resources in managing these various connectivity channels.

    In this webinar, Amar Singh and Steve Vickers explore the problems typically faced by organisations based on the latest research and show how organisations can create a seamless and secure SD-WAN infrastructure without having to manage multiple products.

Embed in website or blog