Hi [[ session.user.profile.firstName ]]

Ulf Mattsson CTO Atlantic BT Security

  • Date
  • Rating
  • Views
  • Learning from WannaCry and now 250 million PCs infected - Long-Term Implications
    Learning from WannaCry and now 250 million PCs infected - Long-Term Implications Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space Recorded: Jul 12 2017 61 mins
    The massive attack known as WannaCry struck over 900,000 computers worldwide, completely locking victims out of their PCs. The security firm Check Point has warned of a massive new outbreak: They count 250 million PCs infected with malicious code they've called Fireball, designed to hijack browsers to change the default search engine, and track their web traffic on behalf of a Beijing-based digital marketing firm called Rafotech. But more disturbingly, Check Point says it found that the malware also has the ability to remotely run any code on the victim's machine, or download new malicious files. It's potentially serious malware.
    What are the lessons we've learned from Wannacry and other similar attacks? What is the best defense against ransomware?
    In this session, Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space, will lay out common sense steps that organizations should take today to better protect themselves, as well as strategic security principles to guide you going forward.
  • The Myth behind Real Time Malware Detection
    The Myth behind Real Time Malware Detection Richard Malinowski, CEO at REMTCS, Ulf Mattsson, CTO at Atlantic BT Security Solutions, David Morris, Security Expert Recorded: Jun 16 2017 61 mins
    All UK submarines are running MS XP (not just UK Health System)! Updated as “MS War Whips” by Dec 2008. Impossible to change the OS.
    This session will cover the Myth behind Real-Time Malware detection and Mitigation. What does real-time mean? Is it achievable? What should a comprehensive malware solution and managed service look like?
  • Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
    Learning from Verizon 2017 Data Breach Investigations Report – The New Targets Ulf Mattsson, CTO Atlantic BT Security Recorded: Jun 13 2017 60 mins
    The Verizon 2017 Data Breach Investigations Report findings relate specifically to the occurrence (likelihood) of security breaches leading to data compromise. The information, provided in aggregate, is filtered in many ways to make it relevant to you (e.g., by industry, actor motive). It is a piece of the information security puzzle—an awesome corner piece that can get you started—but just a piece nonetheless. This session will discuss the new targets that are identified and some solutions
  • Google Docs and the Future of Phishing Scams
    Google Docs and the Future of Phishing Scams Vikram Thakur (Symantec), Limor Kessem (IBM), David Morris (Pioneer in Cyber security), Phil Richards (Ivanti) Recorded: Jun 8 2017 60 mins
    When the Google Docs phishing scam spread across the network in early May, it showed what a sophisticated phishing email looks like. It did not ask for a user's password and in some cases, it came from contacts the user already knew. What made this scam so hard to spot and what can we expect to see in the future when it comes to phishing attacks?

    Join this panel of experts to learn:
    - Latest trends in phishing scams
    - How to spot a phishing email from a mile away
    - Recommendations on how to avoid becoming a victim

    Moderator:
    - David Morris, Pioneer in Cyber security

    Speakers:
    - Limor Kessem, Global Executive Security Advisor at IBM
    - Phil Richards, CSO of Ivanti Software
    - Vikram Thakur, Technical Director, Security Response Team at Symantec
  • Learning from the RSA Conference 2017 - Uncover Data Security Blind Spots
    Learning from the RSA Conference 2017 - Uncover Data Security Blind Spots Ulf Mattsson, CTO Atlantic BT Security Recorded: May 25 2017 60 mins
    The RSA conference is a unique and valuable event for IT security experts from around the world. With cyber-attacks on the rise, securing your data is more imperative than ever. The RSA conference pointed out that revisions to PCI (Payment Card Industry) DSS (Data Security Standard) is increasingly focusing on Rugged DevOps or SecDevOps, and the different approach called DevSecOps, embracing the speed of DevOps and continuous delivery in a secure environment. DevOps does affect security, and you can use it to your advantage. As cloud, big data and DevOps disrupt traditional approaches to security, new capabilities emerge to automate and enhance security operations.
    Join this session and learn how to automatically address these data security blind spots and how security can be built into the development process and IT platforms. We will discuss how security can be built into Rugged DevOps,SecDevOps, DevSecOps, Scrum, SAFe, DAD and use in Large-scale Development.
  • Securing Fintech: Threats, Challenges & Best Practices
    Securing Fintech: Threats, Challenges & Best Practices Ulf Mattsson, CTO Security Solutions at Atlantic BT Recorded: May 18 2017 60 mins
    Cyber attacks have increased in frequency and severity, and financial institutions are particularly interesting targets to cyber criminals. Join this presentation to learn the latest cybersecurity threats and challenges plaguing the financial industry, and the policies and solutions your organization needs to have in place to protect against them.

    Viewers will learn:
    • Current trends in Cyber attacks
    • FFIEC Cyber Assessment Toolkit
    • NIST Cybersecurity Framework principles
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    About the Presenter:
    Ulf Mattsson is the Chief Technology Officer of Security Solutions at Atlantic BT, and earlier at Compliance Engineering. Ulf was the Chief Technology Officer and a founder of Protegrity, He invented the Protegrity Vaultless Tokenization, Data Type Preservation (DTP2) and created the initial architecture of Protegrity's database security technology. Prior to Protegrity, Ulf worked 20 years at IBM in software development and in IBM's Research organization, in the areas of IT Architecture and Security, and received a US Green Card of class ‘EB 11 – Individual of Extraordinary Ability’ after endorsement by IBM. Ulf is the inventor of more than 45 patents in the areas of Encryption, Policy Driven Data Encryption, Internal Threat Protection, Data Usage Control and Intrusion Prevention.
  • Uncover Data Security Blind Spots in your Cloud, Big Data & DevOps Environment
    Uncover Data Security Blind Spots in your Cloud, Big Data & DevOps Environment Ulf Mattsson, CTO of Security Solutions, Atlantic BT Recorded: Apr 18 2017 45 mins
    Revisions to PCI (Payment Card Industry) DSS (Data Security Standard) point toward the realization that security must be built into the development process and Cloud with SAAS computing.

    Medical software and hardware, mobile applications, IoT etc. will require a new approach. This is frequently referred to as Rugged DevOps or SecDevOps, and the different approach called DevSecOps, embracing the speed of DevOps and continuous delivery in a secure environment. DevOps does affect security, and you can use it to your advantage. As cloud, big data and DevOps disrupt traditional approaches to security, new capabilities emerge to automate and enhance security operations.

    Join this session and learn how to automatically address these data security blind spots and how security can be built into the development process and IT platforms. We will discuss how security can be built into Rugged DevOps,SecDevOps, DevSecOps, Scrum, SAFe, DAD and use in Large-scale Development.
  • Are Your Security Solutions Simple and Efficient to Use?
    Are Your Security Solutions Simple and Efficient to Use? David Morris, Ulf Mattsson and Alex Pezold Recorded: Mar 23 2017 57 mins
    As the adoption of cloud computing increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your firewall. This makes your data blind spots more dangerous than ever—both for your internal data and how customers and clients handle their vital information outside your cloud systems. To protect your business, you need a balanced approach to security—combining compliance, responsiveness, and engineering without sacrificing usability and agility.

    Join this presentation to learn how your security solutions measure up when it comes to simplicity and efficacy.
    - Do you know what data you have, where it is, and how to protect it?
    - Do your data security solutions work seamlessly inside your environment? Are you able to secure multiple business units, ERP’s, etc.?
    - Does it play nice with fraud prevention, analytics, data sharing, etc?
    - Does your data security solution achieve PCI compliance as promised?
    - Does your data security solution secure ALL data sets that are a threat to your organization?
  • Cyber Risk Management in 2017: Challenges & Recommendations
    Cyber Risk Management in 2017: Challenges & Recommendations Ulf Mattsson, CTO Security Solutions at Atlantic BT Recorded: Dec 7 2016 61 mins
    With cyber attacks on the rise, securing your data is more imperative than ever. In future, organizations will face severe penalties if their data isn’t robustly secured. This will have a far reaching impact for how businesses deal with security in terms of managing their cyber risk.

    Join this presentation to learn the cyber security controls prescribed by regulation, how this impacts compliance, and how cyber risk management helps CISOs understand the degree these controls are in place and where to prioritize their cyber dollars and ensure they are not at risk for fines.

    Viewers will learn:
    - The latest cybercrime trends and targets
    - Trends in board involvement in cybersecurity
    - How to effectively manage the full range of enterprise risks
    - How to protect against ransomware
    - Visibility into third party risk
    - Data security metrics
  • How Can I Automatically Find and Fix My Data Security Blind Spots?
    How Can I Automatically Find and Fix My Data Security Blind Spots? Ulf Mattsson, CTO at Compliance Engineering Recorded: Nov 8 2016 49 mins
    The need to detect data security blind spots is becoming more important every day. This includes sensitive data that was not found in the data discovery process, as well as failures of our deployed critical security control systems. Without formal and automated processes to detect and alert to new data discovery findings and critical security control failures as soon as possible, the window of time grows, allowing attackers to identify a way to compromise the systems and steal sensitive data. This can also impact our real compliance posture and compliance to PCI DSS 3.2.

    Revisions to PCI DSS point toward the realization that security must be built into the development process. This is frequently referred to as Rugged DevOps or SecDevOps, and is embracing the speed of DevOps and continuous delivery in a secure environment. DevOps does affect security, and you can use it to your advantage. As cloud, big data and DevOps disrupt traditional approaches to security, new capabilities emerge to automate and enhance security operations.

    Join this session and learn how to automatically report on these data security blind spots and how security can be built into the development process and platforms. Ulf Mattsson, CTO of Compliance Engineering will discuss how security can be built into Rugged DevOps,SecDevOps, DevSecOps, Scrum, SAFe, DAD and use in Large-scale Development.

Embed in website or blog