View our exclusive "Insights with Cyber Leaders Series" and webinars
Cyber Management Alliance presents an exciting series of interviews with International Cyber Security Leaders. Want to know what they look for when hiring for their teams? Want to know the secrets to their success and what keeps them awake at night? Theses exclusive interviews are presented by industry thought leader and Chair of ISACA's UK Security Advisory Group and Global CISO Amar Singh. Series but humours and light hearted interviews. See the leading figures in Cyber Security like you've never seen them before. From Eugene Kaspersky to CTO HP Enterprise and CTO of Intel Security we have an amazing line up. Subscribe for updates.
Following on from our successful webinar, Breaking PCI-DSS Applications, we bring you our next instalment - How to Create a Complex DDoS attack in 5 steps. Join Amar Singh, Karsten Dessler as they dive into
- The details, step-by-step, on planning a DDoS attack
- The prerequisites for this plan to succeed
- The different tools that can be used to launch such an attack.
Needless to say, we will share mitigating strategies and the technology configurations that you should use to protect your web products.
Amar Singh; Steve VickersRecorded: Nov 14 201847 mins
Are you open minded to saving money and ensuring that your business is better protected from cyber criminals at the same time? Join Amar Singh and Steve Vickers as they discuss a simple checklist for charities and small businesses. A non-technical discussion, we layout step by step guidance on what you can do:
- To save money on your current IT and security investments
- To ensure your third party is delivering the right level of security and service
- Increase your operational efficiency and lower total cost of operations.
Amar Singh, Aatish Pattni, Karsten DeslerRecorded: Oct 31 201858 mins
** Warning - This webinar is only for informational purposes. We do not condone or encourage any malicious activity. The knowledge you gain from this webinar should be used to protect your own infrastructure and web applications. **
PCI-DSS needs no introduction. The Payment Card Industry Data Security Standard applies to any organisation accepting credit card details in some way or the other. This webinar is going to share some of the latest techniques cyber criminals are using to break web applications.
Join us to learn how they are doing this and what you should do to protect your organisation and compliance status.
Amar Singh; Steve VickersRecorded: Oct 18 201861 mins
With the explosion of cloud-based cloud ready applications, many organisations struggle with optimising application performance for cloud or hybrid environments. The culprit, in many cases, is the connectivity from the offices to the cloud. The wide area network, (WAN) connecting offices to the Internet and to other offices, is still playing catchup. WAN technology is stuck in the old-age.
Think about this: Does your business, small or large, have two or more broadband connections, maybe a broadband and a dial up or some other form of Internet connectivity? Apart from the security risk of having too many Internet points of exit, your business is also wasting money and resources in managing these various connectivity channels.
In this webinar, Amar Singh and Steve Vickers explore the problems typically faced by organisations based on the latest research and show how organisations can create a seamless and secure SD-WAN infrastructure without having to manage multiple products.
Amar Singh Cyber Management AllianceRecorded: Sep 19 201812 mins
Amar Singh, CEO and co-founder of Cyber Management Alliance, recently had the pleasure to sit down with Ashish Khanna, information security officer at Dubai Health Authority, to briefly talk about what led Khanna to Dubai and to discuss some of the life lessons he learned along the way.
Amar Singh (Cyber Management Alliance)Recorded: Sep 18 201851 mins
We do two things in this webinar - review how the UK-GCHQ Certified Training course, Cyber Incident Planning & Response or CIPR has helped organisations like the NHS and BMJ and discuss how you too can create actionable playbooks.
This webinar will cover topics such as:
- CIPR review - how it has helped organisations
- How to create actionable incident response playbooks,
- The flow and logic behind creating playbooks that work.
- Example playbooks around GDPR and Malware
We also discuss management playbooks along with technical content and share insights into how you can automate your playbooks.
This playbook webinar is taken from our certified Cyber Incident Planning & Response (CIPR) workshop and we will have several past attendees sharing their experience about the workshop and how they implemented the lessons from this training.
Robin Smith - from the NHS
Aaron Townsend - from the BMJ
Visit https://www.cm-alliance.com/training/cipr-cyber-incident-planning-response/ for more information
Amar Singh and Ian GloverRecorded: Sep 4 201832 mins
CREST president Ian Glover sat down with Amar Singh, CEO and co-founder of Cyber Management Alliance, to talk about his career and pass on some of the insights he has gained over the course of his long and fruitful career in information technology.
Amar Singh, Chris PayneRecorded: Aug 16 201851 mins
In today’s privacy oriented and highly regulated world, it can be tough being a compliance officer or an IT security manager. Balancing mandated requirements with a finite budget and limited resources may come to define these very roles.
In this webinar, Amar Singh, Global CISO and CEO of Cyber Management Alliance; and Chris Payne, Managing Director at Advanced Cyber Solutions, will discuss how to get efficient when it comes to regulatory requirements and standards. By finding the commonalities between NIS, NIST, ISO 27001, GDPR and PCI-DSS, you can implement controls and solutions which kill multiple birds with one stone.
Amar Singh, CEO and co-founder of Cyber Management Alliance, had the pleasure of interviewing Sanjay Khanna, CIO at Rakbank in Dubai, as part of their informative Interview with Cyber Leaders series. Amar talked to Sanjay about a variety of topics, asking key questions about interview criteria, why it’s important to be prepared to take risks and step outside your comfort zone, and what excites him about the next 5 years.
Amar Singh, Chris PayneRecorded: Aug 9 201832 mins
“If you are not hardening your systems you deserve to be breached” Amar Singh.
It’s a chore but operating systems have to be hardened, secured and configured correctly to ensure they are not the “lowest hanging fruit” in the organisation. Furthermore, you can’t just harden your system once, you must continuously monitor and baseline it against common standards. The CIS or Centre for Internet Security is a leading non-profit organisation that provides a wide array of baseline guides for securing various systems.
Join Amar Singh, Chris Payne and other experts in this informative and interactive webinar where they discuss:
- How you can benchmark and configure a Windows Server 2016 OS
- Automate: The simple steps you can take to monitor and ensure consistency over the lifecycle of the system
- Create useful management friendly reports that demonstrate compliance and value
Register for this webinar today to see the live demo on how we baseline and configure a Windows Server 2016