Hi [[ session.user.profile.firstName ]]

Ulf Mattsson CTO Atlantic BT Security

  • Date
  • Rating
  • Views
  • Cloud Security & Integration: Protecting your Applications & Data
    Cloud Security & Integration: Protecting your Applications & Data Ulf Mattsson, David Morris, Juanita Koilpillai Recorded: Oct 19 2017 62 mins
    Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?

    In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software-Defined Perimeter (SDP) as well as encryption and tokenization.

    Join Ulf Mattsson, CTO of Atlantic BT, and his special guests David Morris, Security Scorecard, and Juanita Koilpillai, CEO, Waverley Labs, in this dynamic panel discussion and live Q&A.
  • Controlling access to infrastructure and applications, in cloud and on-prem
    Controlling access to infrastructure and applications, in cloud and on-prem Ulf Mattsson, CTO at Atlantic BT. Alex Hanway, Product Marketing Manager at Gemalto, David Morris, Pioneer in Cybersecurity Recorded: Oct 17 2017 64 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
    This session will discuss Identity and Data Protection solutions for enterprise security, organizations can take a data-centric approach to their security posture, all while controlling access to the infrastructure and applications they rely upon — both on-premises, and in public and private clouds.
  • Fully Autonomous A.I. - Powered Cybersecurity System
    Fully Autonomous A.I. - Powered Cybersecurity System Ulf Mattsson and Richard Malinowski Recorded: Sep 27 2017 60 mins
    A Fully Autonomous A.I.- Powered Cybersecurity System can provide
    automated network protection, endpoint protection and incident management. We will discuss Regulatory Compliance - Supporting adherence to critical regulations.

    We will cover important regulations, including NISPOM, DSS, RMF, NIST 800-53 & 800-171, FFIEC, SOX, HIPPA, and PCI DSS.
    Viewers will learn:
    • Current trends in Cyber attacks
    • FFIEC Cyber Assessment Toolkit
    • NIST Cybersecurity Framework principles
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    Richard Malinowski is CEO of REMTCS including expertise in Cybersecurity & Artificial Intelligence:
    20 Years of experience in Cybersecurity & High Performance Computing
    10 Years of experience in Artificial Intelligence
    7 Patents in Next Generation Security Systems harnessing Artificial Intelligence and High Performance Computing
    Former Head of IT for Western Hemisphere for UBS, ran Crisis Management Team
    Former Head of IT for Citibank’s Money Market and Treasury Divisions
    Former Chief Architect for NASDAQ
  • Understanding Your Attack Surface and Detecting & Mitigating External Threats
    Understanding Your Attack Surface and Detecting & Mitigating External Threats Ulf Mattsson, CTO Atlantic BT. David Morris, Pioneer in Cybersecurity, Benjamin Powell, Technical Manager at RiskIQ Recorded: Sep 20 2017 62 mins
    Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there really is no perimeter. In this presentation, we'll discuss Digital Footprints in understanding your company’s external attack surface. We will discuss social, mobile, web attacks and analyze and review lessons learned recently publicized attacks (Polish banking institutions, Apache Struts Vulnerability or WannaCry ransomware. The speed of business and cybercrime isn't slowing down, so how can you be prepared to address and defend against these types of threats? Attend our session to find out how.
    Reducing Your Digital Attack Surface and Mitigating External Threats - What, Why, How:
    What is a Digital Footprint?
    Breakdown of External Threats (Social, Mobile, Web)
    What are blended attacks?
    What is actually being targeting at your company?
    How are your brands, customers, and employees being attack outside of your company?
    How to become proactive in threat monitoring on the internet?
    Considerations in External Threat solutions
    Threat correspondence tracking considerations
    Is legal cease and desist letters adequate in stopping attacks?
    Examination of a phishing attack campaign
    How phishing kits work
    Analysis and lesson learned from recent published attacks
    What are the most important capability in a digital risk monitoring solution?
  • 2017 Trends in IoT Cyber Attacks
    2017 Trends in IoT Cyber Attacks Ulf Mattsson, David Morris, Mandeep Khera, Juanita Koilpillai Recorded: Sep 13 2017 61 mins
    There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of about 30 billion objects by 2020. This session will discuss the key findings.
    Viewers will learn:
    • Current trends in Cyber attacks for IoT
    • Security Metrics for IoT
    • Oversight of third parties in IoT
    • How to measure cybersecurity preparedness for IoT
    • Automated approaches to integrate Security into IoT
  • Do You Have a Roadmap for EU GDPR Compliance?
    Do You Have a Roadmap for EU GDPR Compliance? Ulf Mattsson, David Morris, Ian West. and Khizar Sheikh Recorded: Aug 17 2017 60 mins
    The General Data Protection Regulation (GDPR) goes into effect in 2018 and it will affect any business that handles data, even if it's not based in the European Union.

    Are you looking to move and host data for EU citizens? Do you have a roadmap and associated estimated costs for EU GDPR compliance?

    Join this webinar to learn:
    • Case study and legal/regulatory impact to GDPR
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps
  • Learning from WannaCry and now 250 million PCs infected - Long-Term Implications
    Learning from WannaCry and now 250 million PCs infected - Long-Term Implications Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space Recorded: Jul 12 2017 61 mins
    The massive attack known as WannaCry struck over 900,000 computers worldwide, completely locking victims out of their PCs. The security firm Check Point has warned of a massive new outbreak: They count 250 million PCs infected with malicious code they've called Fireball, designed to hijack browsers to change the default search engine, and track their web traffic on behalf of a Beijing-based digital marketing firm called Rafotech. But more disturbingly, Check Point says it found that the malware also has the ability to remotely run any code on the victim's machine, or download new malicious files. It's potentially serious malware.
    What are the lessons we've learned from Wannacry and other similar attacks? What is the best defense against ransomware?
    In this session, Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space, will lay out common sense steps that organizations should take today to better protect themselves, as well as strategic security principles to guide you going forward.
  • The Myth behind Real Time Malware Detection
    The Myth behind Real Time Malware Detection Richard Malinowski, CEO at REMTCS, Ulf Mattsson, CTO at Atlantic BT Security Solutions, David Morris, Security Expert Recorded: Jun 16 2017 61 mins
    All UK submarines are running MS XP (not just UK Health System)! Updated as “MS War Whips” by Dec 2008. Impossible to change the OS.
    This session will cover the Myth behind Real-Time Malware detection and Mitigation. What does real-time mean? Is it achievable? What should a comprehensive malware solution and managed service look like?
  • Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
    Learning from Verizon 2017 Data Breach Investigations Report – The New Targets Ulf Mattsson, CTO Atlantic BT Security Recorded: Jun 13 2017 60 mins
    The Verizon 2017 Data Breach Investigations Report findings relate specifically to the occurrence (likelihood) of security breaches leading to data compromise. The information, provided in aggregate, is filtered in many ways to make it relevant to you (e.g., by industry, actor motive). It is a piece of the information security puzzle—an awesome corner piece that can get you started—but just a piece nonetheless. This session will discuss the new targets that are identified and some solutions
  • Google Docs and the Future of Phishing Scams
    Google Docs and the Future of Phishing Scams Vikram Thakur (Symantec), Limor Kessem (IBM), David Morris (Pioneer in Cyber security), Phil Richards (Ivanti) Recorded: Jun 8 2017 60 mins
    When the Google Docs phishing scam spread across the network in early May, it showed what a sophisticated phishing email looks like. It did not ask for a user's password and in some cases, it came from contacts the user already knew. What made this scam so hard to spot and what can we expect to see in the future when it comes to phishing attacks?

    Join this panel of experts to learn:
    - Latest trends in phishing scams
    - How to spot a phishing email from a mile away
    - Recommendations on how to avoid becoming a victim

    Moderator:
    - David Morris, Pioneer in Cyber security

    Speakers:
    - Limor Kessem, Global Executive Security Advisor at IBM
    - Phil Richards, CSO of Ivanti Software
    - Vikram Thakur, Technical Director, Security Response Team at Symantec

Embed in website or blog