Hi [[ session.user.profile.firstName ]]

Cybersecurity - The No Spin Zone

  • Date
  • Rating
  • Views
  • Advanced Cyber Security: Data-driven Defense - The CISO's Dilemma
    Advanced Cyber Security: Data-driven Defense - The CISO's Dilemma Ulf Mattsson, Lance James, Barak Engel Recorded: Jan 16 2018 58 mins
    This session will cover the various conflicting constituencies that CISO's deal with on a regular basis and future trends.

    If you are a CISO, Board Member, CEO, CIO, COO or just want to better understand the role and challenges that today’s CISO’s Face, this is a must attend session. We are at a crossroad, and the CISO is crucial to helping navigate the way, but are they being heard?

    Join this panel of experts for a highly controversial discussion:
    • What is the Role and Goal of the CISO and What should it be.
    • The Business of Being a CISO: It’s not just all about Technology
    • The CISO as part of the Marketing Team
    • The CISO vs. The Compliance Officer
    • The CISO as a Technocrat
    • It’s not all on the CISO: Do Boards bear some responsibility
    • In an always on, 24x7, I want it now world; How does the CISO Succeed
    • The CISO Reimagined

    About the Speakers:

    Barak Engel: Chief Geek at EAmmune, CISO at Amplitude Analytics. Decades in the information security field, and in CISO/ vCISO roles: WebEx, Loyalty Labs, MarketLive/Kibo, MuleSoft, Mashery/Intel, Wrap, Amplitude.

    Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

    Ulf Mattsson: Innovation Officer at TokenEX. Member of the PCI Security Standards Council, ISSA and ISACA lecturer and ISACA Journal Contributor. Encryption and Tokenization Expert with over three decades of experience in Cybersecurity with more than 55 patents.
  • Cloud and IOT Security: Considerations for securing data
    Cloud and IOT Security: Considerations for securing data Ulf Mattsson, David Morris, Juanita Koilpillai Recorded: Dec 13 2017 46 mins
    As the adoption of cloud computing and Iot increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your own on premise firewalls and other security products. This has the potential of creating data blind spots that can affect your overall security posture—both for your internal data and those of your customers and clients. To protect your business, you need a balanced approach to managing IoT and cloud risk and respective security controls—combining compliance, responsiveness, and engineering without sacrificing usability and agility. During this Webinar, we will walk through a check list of questions to ask your business units to ensure your cloud usage is not putting your enterprise at risk.

    Cloud Security Platforms can provide cost effective Ecommerce, mobile, payment security, fraud management, and secure file transfer as a flexible software as a service (SaaS). These solutions, operating on tightly controlled secure data centers, provide a cloud security solution that adapts and integrates with a variety of business processes and organizations.

    Join this presentation to learn how to reduce risk associated with moving to the cloud while maintaining simplicity and efficacy.

    - IT is all about the data - Do you know what data you have, where it is, and how is protected?
    - What are your security responsibilities for IoT and those of your cloud service provider?
    - What is your current risk register regarding use of the your cloud service provider (confidentiality, integrity and availability)?
    - How do you perform a risk assessment for your current and emerging cloud services and IoT?
  • Integrate Security into DevOps - SecDevOps
    Integrate Security into DevOps - SecDevOps Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space Recorded: Nov 16 2017 63 mins
    Topics:
    1.Security Controls Must Be Programmable and Automated Wherever Possible
    2.Implement a Simple Risk and Threat Model for All Applications
    3.Scan Custom Code, Applications and APIs
    4.Scan for OSS Issues in Development
    5.Treat Scripts/Recipes/Templates/Layers as Sensitive Code
    6.Measure System Integrity and Ensure Correct Configuration at Load
    7.Use Whitelisting on Production Systems, Including Container-Based Implementations
    8.Assume Compromise; Monitor Everything; Architect for Rapid Detection and Response
    9.Lock Down Production Infrastructure and Services
    10.If Containers Are Used, Acknowledge and Address the Security Limitations
  • 2018 - The New Targets and New Technologies
    2018 - The New Targets and New Technologies Ulf Mattsson, David Morris, Rich Morrell, Juanita Koilpillai Recorded: Nov 15 2017 64 mins
    2018 is bringing new Threats & Technologies.
    Viewers will learn:
    • Case studies and Current trends in Cyber attacks
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    Juanita Koilpillai is President at Digital Risk Management Institute. She
    Coauthored the Software Defined Perimeter Specification sponsored by the Cloud Security Alliance, Developed a Security Risk Index System adopted by NIST to calculate risk of moving applications to the cloud, She is a Key member of FEMA’s Enterprise Security Management Team: drafting U.S. Government’s initial Critical Infrastructure Protection Plan Led the team that developed the 1st security event & incident response system: sold to Symantec and Led the team that deployed the 1st modern Air Traffic Control System for the FAA.

    Rich Morrell is CTO and Managing Director of Falanx Group - Cyber Defence, CISO and Director of Cloud Security Alliance. Former Senior Security Strategist at Red Hat. Former CTO at Gartner Global Security Risk Practice. Founder and co-author of SmoothWall protecting over 200m networks globally since 2000.
  • EU GDPR Details
    EU GDPR Details Ulf Mattsson, Ian West, Martyn Hope, Denver Edwards Recorded: Oct 25 2017 64 mins
    Martyn Hope the founder of the GDPR Institute will talk about EU GDPR Details
  • Cloud Security - Protection Against Evolving Data Security Threats
    Cloud Security - Protection Against Evolving Data Security Threats Ulf Mattsson, David Morris, Rich Morrell, Juanita Koilpillai Recorded: Oct 24 2017 64 mins
    Cloud Security- Protection Against Evolving Security Threats
    Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?
    In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software Defined Perimeter (SDP) as well as encryption and tokenization.
  • Cloud Security & Integration: Protecting your Applications & Data
    Cloud Security & Integration: Protecting your Applications & Data Ulf Mattsson, David Morris, Juanita Koilpillai Recorded: Oct 19 2017 62 mins
    Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?

    In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software-Defined Perimeter (SDP) as well as encryption and tokenization.

    Join Ulf Mattsson, CTO of Atlantic BT, and his special guests David Morris, Security Scorecard, and Juanita Koilpillai, CEO, Waverley Labs, in this dynamic panel discussion and live Q&A.
  • Controlling access to infrastructure and applications, in cloud and on-prem
    Controlling access to infrastructure and applications, in cloud and on-prem Ulf Mattsson, CTO at Atlantic BT. Alex Hanway, Product Marketing Manager at Gemalto, David Morris, Pioneer in Cybersecurity Recorded: Oct 17 2017 64 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
    This session will discuss Identity and Data Protection solutions for enterprise security, organizations can take a data-centric approach to their security posture, all while controlling access to the infrastructure and applications they rely upon — both on-premises, and in public and private clouds.
  • Fully Autonomous A.I. - Powered Cybersecurity System
    Fully Autonomous A.I. - Powered Cybersecurity System Ulf Mattsson and Richard Malinowski Recorded: Sep 27 2017 60 mins
    A Fully Autonomous A.I.- Powered Cybersecurity System can provide
    automated network protection, endpoint protection and incident management. We will discuss Regulatory Compliance - Supporting adherence to critical regulations.

    We will cover important regulations, including NISPOM, DSS, RMF, NIST 800-53 & 800-171, FFIEC, SOX, HIPPA, and PCI DSS.
    Viewers will learn:
    • Current trends in Cyber attacks
    • FFIEC Cyber Assessment Toolkit
    • NIST Cybersecurity Framework principles
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    Richard Malinowski is CEO of REMTCS including expertise in Cybersecurity & Artificial Intelligence:
    20 Years of experience in Cybersecurity & High Performance Computing
    10 Years of experience in Artificial Intelligence
    7 Patents in Next Generation Security Systems harnessing Artificial Intelligence and High Performance Computing
    Former Head of IT for Western Hemisphere for UBS, ran Crisis Management Team
    Former Head of IT for Citibank’s Money Market and Treasury Divisions
    Former Chief Architect for NASDAQ

Embed in website or blog