Hi [[ session.user.profile.firstName ]]

Cybersecurity - The No Spin Zone

  • Date
  • Rating
  • Views
  • Utilizing a Digital Risk Management Framework for Securing the Cloud
    Utilizing a Digital Risk Management Framework for Securing the Cloud
    Bob Liscouski, Juanita Koilpillai and David Morris Recorded: Feb 22 2019 60 mins
    How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.

    In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.
  • The Rise of Nation State Attacks and what you can do about it
    The Rise of Nation State Attacks and what you can do about it
    Ulf Mattsson, Mark Rasch and David Morris Recorded: Jan 30 2019 58 mins
    In this session you will lean what is a Nation-State attack, who are the primary perpetrators, technical controls, and what if any legal sanctions can be brought to bear
  • Data Privacy and California Consumer Privacy Act (CCPA)
    Data Privacy and California Consumer Privacy Act (CCPA)
    David Morris, Steven W. Teppler and Mark Rasch Recorded: Jan 28 2019 76 mins
    In this session, you will learn what the California Consumer Privacy Act (CCPA) is, what it means to your organization, how it differs from GDPR and lastly where do you start to become CCPA compliant.
  • Threat Hunting: A Live Demonstration
    Threat Hunting: A Live Demonstration
    David Morris, Andrew Johnston, Mark Rasch Recorded: Jan 24 2019 77 mins
    This session will feature a live demonstration of Threat Hunting by a former Federal law enforcement cyber threat hunter. In this session, you will see what a Threat Hunter actually does and how it is done.
  • 2019: A Cybersecurity Reality Check
    2019: A Cybersecurity Reality Check
    David Morris, Barak Engell and Mark Rasch Recorded: Dec 12 2018 66 mins
    Will 2019 bring any real transformative cybersecurity technology advancements that will have an impact? Tune into this controversial eye opening session on what's in store for 2019 in the cybersecurity space.
  • Self Sovereign Identity - Going Where No Identity Has Gone Before
    Self Sovereign Identity - Going Where No Identity Has Gone Before
    Ricardo Diaz, Blockchain CLT, Founder Managing Partner, Mike Lodder, Sovrin Foundation Security Maven Recorded: Nov 26 2018 59 mins
    Data privacy is dead. Social login is not the answer. Over thirty years of cyber security internal controls have fallen short of protecting our data. Traditional identity and access management (IAM) systems, aka Web 2.0 IAM, have evolved but only exacerbates the proliferation of centralized identity repositories. Centralized identity repositories that have for decades been the “Crown Jewels” of every malicious hacker or nation state bad actor to be the gateway to our personally identifiable information. A new paradigm shift in the identity management industry is here, Web 3.0 IAM. Blockchain identity management has many names. Decentralized identity. Self-Sovereign Identity. Multi-source identity. All define the same new IAM future. An identity management system powered by distributed ledger technology.
    We will cover the basics of what is Self-Sovereign Identity (SSI) and this evolution of the IAM space. The webcast will showcase how one of the SSI leaders in the blockchain identity space, Sovrin, works. Sovrin.org is the leading SSI public identity network solutions in the Blockchain world. It is an open source project managed by the Hyperledger Indy project within the Linux Foundation.
    Speakers
    Michael Lodder: Security Maven | Sovrin Foundation
    Mike currently works on all things security related to algorithms, protocols, and technology. I have worked in the identity and security space for many years.
    Ricardo Diaz: Founder | Managing Partner | Blockchain CLT
    Ricardo is the founder of Blockchain CLT, a DLT services and solution business based out of the Charlotte, NC. He is a serial entrepreneur, human rights advocate, social impact entrepreneur and has a passion for decentralized identity (SSI). An enterprise software executive, cyber security, identity management, cloud and decentralized computing professional with almost 25 years of working experience in engineering, consulting, sales, marketing and business development roles.
  • Encryption & Tokenization as Effective GDPR Best Practices
    Encryption & Tokenization as Effective GDPR Best Practices
    An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson Recorded: Oct 26 2018 63 mins
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
  • What is a Secure Enterprise Architecture Roadmap?
    What is a Secure Enterprise Architecture Roadmap?
    Juanita Koilpillai, Bob Flores, Mark Rasch, Ulf Mattsson, David Morris Recorded: Sep 20 2018 69 mins
    This session will cover the following topics:

    * What is a Secure Enterprise Architecture roadmap (SEA)?
    * Are there different Roadmaps for different industries?
    * How does compliance fit in with a SEA?
    * Does blockchain, GDPR, Cloud, and IoT conflict with compliance regulations complicating your SEA?
    * How will quantum computing impact SEA roadmap?
  • Threat Hunting - Hype or Substance
    Threat Hunting - Hype or Substance
    Roselle Safran, UJ Desai and David Morris Recorded: Sep 18 2018 65 mins
    This session will cover the practice of Threat Hunting, when to use it, where to use it, and the technical skills needed to effectively deliver value to an organization.
    You will learn:
    - The difference between Threat Intelligence and Threat Data
    - What is Threat Hunting in relation to Threat Intelligence and Threat Data
    - When and where to apply Threat Hunting
    - What you can reasonably expect to gain through the use of Threat Hunting
  • GDPR - A users perspective
    GDPR - A users perspective
    Mark Rasch and Ray Ford Recorded: Sep 12 2018 61 mins
    This session will cover GDPR from a users perspective, examining the trials and tribulations of working towards GDPR readiness.

Embed in website or blog