Hi [[ session.user.profile.firstName ]]

ITSPmagazine

  • Date
  • Rating
  • Views
  • [CPE Credit Panel] Emerging Threats & Cyber Defense
    [CPE Credit Panel] Emerging Threats & Cyber Defense Chris Roberts (Acalvio) | Nick Bilogorskiy (Juniper Networks) | Dan Lohrmann (Security Mentor) | Joseph Carson (Thycotic) Recorded: Apr 18 2018 52 mins
    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². Tune in for an in-depth look into the evolving cyber threat landscape with CISOs and top security experts. The panel will examine the latest cyber attack trends and provide recommendations for defending enterprises and SMBs.

    Join top cyber security experts for an interactive Q&A roundtable discussion on the biggest threats targeting organizations in 2018:
    - Lessons from recent cyber attacks and breaches
    - What keeps CISOs up at night
    - Biggest cyber security challenges and how to overcome them

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
    - Dan Lohrmann, Chief Strategist & Chief Security Officer, Security Mentor
    - Joseph Carson, Chief Security Scientist, Thycotic

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from San Francisco during RSAC week.
  • [CPE Credit Panel] Beyond the Breach
    [CPE Credit Panel] Beyond the Breach Sean Martin (ITSPmagazine) | Robert M. Lee (Dragos) | Dr. Bret Fund (SecureSet) | Bernard Harguindeguy (Elastic Beam) Recorded: Apr 18 2018 53 mins
    Massive data breaches are becoming more frequent. Personal customer data is often exposed to hackers, leaving companies and individuals to deal with the aftermath. What is the real cost of a breach and how can we prevent, detect and respond to breaches? What are some of the things to do post-breach to prevent future cyber attacks?

    Join security, risk and privacy experts for an interactive Q&A discussion on:
    - True cost of a breach
    - Preventing breaches with solutions, processes and employee training
    - How to detect attacks and breaches faster
    - Appropriate response to a breach
    - Post-breach attacks: Phishing, cyber fraud, account takeovers, cyber crime
    - Recommendations for improved security in 2018

    Speakers:
    - Sean Martin, Editor-in-Chief, ITSPmagazine
    - Robert M. Lee, CEO, Dragos
    - Dr. Bret Fund, CEO of SecureSet
    - Bernard Harguindeguy, Founder & CEO, Elastic Beam

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². This panel will be streamed LIVE from San Francisco during RSAC week.
  • [CPE Credit Panel] GDPR, Identity & Cybersecurity
    [CPE Credit Panel] GDPR, Identity & Cybersecurity Jeff Carpenter (Crossmatch) | Chris Pierson (Binary Sun Cyber) | Alex Horan (Onapsis) | Elena Elkina (Aleada) Recorded: Apr 17 2018 54 mins
    The General Data Protection Regulation (GDPR) is a European Union law, but it's going to impact businesses beyond the EU. Basically, any business that collects and processes personal data of EU individuals will need to achieve GDPR compliance by deadline day, May 25th, 2018.

    What are the privacy & security requirements for being GDPR compliant? -
    - Why we should think beyond GDPR when it comes to improving data security?
    - Are you compliant / ready when GDPR goes into effect next month?
    - What are some last-minute items to complete before the GDPR deadline?

    Join top experts for this interactive Q&A roundtable, streamed LIVE during RSAC week, as they discuss the implication of GDPR on managing digital identity, customer data, privacy and cyber security.

    Speakers:
    - Dr. Christopher Pierson, CEO, Binary Sun Cyber Risk Advisors
    - Jeff Carpenter, CISSP, CCSP, Crossmatch
    - Alex Horan, Director of Product Management, Onapsis
    - Elena Elkina, Partner, Aleada Consulting

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)².
  • [CPE Credit Panel] AI & Machine Learning in Cybersecurity
    [CPE Credit Panel] AI & Machine Learning in Cybersecurity Diana Kelley (Microsoft) | Mary Writz (Micro Focus) | Chris Morales (Vectra Networks) | Barbara Kay (ExtraHop) Recorded: Apr 17 2018 53 mins
    Artificial intelligence and machine learning can power cyber attacks and disrupt the operations of organizations on a global level. ML can also help organizations detect and analyze threats faster, as well as respond to attacks and security incidents. What are the latest advancements in AL & ML? How can we incorporate ML to improve our security posture and better protect our data?

    Join security experts, researchers and practitioners for an interactive Q&A roundtable discussion. Viewers will learn more about:
    - The latest AI/ML trends and applications in cyber security
    - ML tasks for better security
    - Threats, detection & response
    - Hype vs. reality
    - Recommendations for CISOs

    Speakers:
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Mary Writz, Director of Product Management, ArcSight, Micro Focus
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Barbara Kay, Sr. Director of Security, ExtraHop

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². This panel will be streamed LIVE from San Francisco during RSAC week.
  • [CPE Credit Panel] Securing the Cloud in 2018
    [CPE Credit Panel] Securing the Cloud in 2018 Sian John (Microsoft) | Mark Weatherford (vArmour) | Dan Hubbard (Lacework) | Lisa Green (ISE) Recorded: Apr 16 2018 52 mins
    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². Tune in for an in-depth look into how enterprises are ensuring a safe migration to the cloud, protecting our data and processes in the cloud, as well as staying up to date on the latest cyber threats.

    Join top cloud and security experts for this interactive Q&A discussion on:
    - The top cloud trends in 2018
    - Top threats to security
    - How to better safeguard our data in the cloud

    Speakers:
    - Sian John, Chief Security Advisor, Microsoft
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Dan Hubbard, Chief Security Architect, Lacework
    - Lisa Green, Director People Relations, Independent Security Evaluators

    The session is brought to you in partnership with ITSPmagazine and will be streamed LIVE from San Francisco during RSAC week.
  • Application Security in an Open Source World
    Application Security in an Open Source World Kunal Anand, Prevoty | Rob McCurdy, MSU | Nate Smolenski, New York Life | Andy Wickersham, Fortune 100 | Sean Martin, ITSP Recorded: Oct 4 2017 63 mins
    Thanks for your interest in our webcast where we will be discussing how to secure applications that rely on third-party and open source software.

    Aside from the data they collect, create, and store, applications can oftentimes be an organization's greatest digital asset. Building custom applications to match the customer and market demands mapped to revenue objectives and available resources can be tremendously rewarding, but also a potentially-huge undertaking.

    Ultimately, time to market is always a factor ... a requirement that almost always wins out over security. One way to tackle the time and effort to deliver more quickly is to leverage third party and open source components. But, do these elements save you in the long run - or do they introduce more risk in the form of potential vulnerabilities that are either not easily uncovered (at best) or not easily patched (if patchable at all)?

    To answer these questions and more, we've pulled together a group of experts that deal with these challenges on a daily basis. During their conversation, webinar attendees will learn:

    - What the value of open source software (OSS) is
    - What are some common cases where open source software is utilized in today's applications
    - What are the security risks and pitfalls when using OSS
    - A view into a few case studies for companies that have fallen victim to the risks of using OSS
    - How have companies identified and mitigated the risks associates with the OSS component, Struts
    - How to tune the secure software development lifecycle (SSDLC) to account for the use of open source software

    Remember, when you register for this expert webcast you will also receive a download link for a new white paper titled "Application Security in an Open Source World."

    Your Moderator:
    Sean Martin, Editor-in-Chief, ITSPmagazine

    Expert Panelists:
    Kunal Anand, Co-Founder and CTO, Prevoty
    Rob McCurdy, CIO, MSU
    Nate Smolenski, CVP, New York Life
    Andy Wickersham, AppSec Leader, Fortune 100 Co.
  • Beyond the Equifax Breach - Lessons and Actions to Take
    Beyond the Equifax Breach - Lessons and Actions to Take Dr. Chris Pierson (Viewpost), Sarah Squire (Engage Identity), Debra Farber (The Privacy Pact), Dr. Ravi Rajamiyer (Cavirin) Recorded: Sep 22 2017 64 mins
    The recent Equifax data breach, which may have jeopardized the personal information of 143 million U.S. consumers, will likely haunt us for years to come.

    Join this interactive panel with experts from the cyber security, identity and privacy space to learn more about:
    - What we know occurred or is likely to have occurred
    - Data Breach Timeline - too slow or too fast
    - External communications - how has the breach been handled and communicated
    - Internal Actions - security remediation, work with law enforcement, root cause, incident response
    - External forces - lawsuits, media scrutiny, and customer communications

    Speakers:
    - Dr. Christopher Pierson, CSO, Viewpost
    - Sarah Squire, Founder and Principal Consultant, Engage Identity
    - Dr. Ravi Rajamiyer, VP of Engineering, Cavirin
    - Debra J. Farber Executive Privacy & Security Consultant, Cranium USA & Host of "The Privacy Pact," ITSPmagazine
  • GDPR Impact on Small- and Medium-Sized Businesses (Part 3 of 3)
    GDPR Impact on Small- and Medium-Sized Businesses (Part 3 of 3) Moderator: Sean Martin, ITSPmagazine | Panelists: Eoin Keary, Edgescan | Phil Lee, Fieldfisher | Chris Hurst, BT Recorded: Sep 13 2017 64 mins
    Is your company based in the US and also operating in the EU? There are things you MUST learn about the Global Data Protection Regulation (GDPR). This law, which goes into effect May 25, 2018, will have an impact on your business. This expert webinar will help you prepare for what's ahead.

    Here are some topics we will be exploring:
    - Why small and medium are required to meet GDPR just like big companies.
    - What can small- and medium-sized companies do to reduce their exposure?
    - Why is this a good thing for companies to adhere to in the long run?
    - What can mid-market companies do to streamline the process?
    - What is the role of outsourced services in this? What are they?
    - What areas of waste might exist that can be eliminated?

    Moderator:
    Sean Martin, ITSPmagazine

    Panelists:
    Eoin Keary, CEO, Edgescan
    Phil Lee, CIPP/E, Partner, Fieldfisher
    Chris Hurst, Virtual CISO, British Telecom
  • Recommended Steps to Reach GDPR Compliance (Part 2 of 3)
    Recommended Steps to Reach GDPR Compliance (Part 2 of 3) Sean Martin, ITSPmagazine | Kurt Hagerman, Armor | Mark Webber, Fieldfisher | Demetrios Lazarikos (Laz) | BlueLava Recorded: Aug 29 2017 62 mins
    Is your company based in the US and also operating in the EU? There are things you MUST learn about the Global Data Protection Regulation (GDPR). This law, which goes into effect May 25, 2018, will have an impact on your business. This expert webinar will help you prepare for what's ahead.

    Here are some topics we will be exploring:
    - GDPR program ownership - Is a DPO necessary?
    - What a risk-based regulation means to the business.
    - How to manage risk and reduce exposure.
    - Policy definition and control implementation requirements.
    - When something goes wrong, who do you bow down to? The EU or the US?

    Moderator:
    Sean Martin, Editor in Chief, ITSPmagazine

    Panelists:
    Kurt Hagerman, Chief Information Security Officer, Armor
    Mark Webber, US Managing Partner & Registered Foreign Legal Consultant, Fieldfisher
    Demetrios Lazarikos (Laz), InfoSec Thought Leader, BlueLava
  • How to Operate a GDPR-Compliant Business in the EU (Part 1 of 3)
    How to Operate a GDPR-Compliant Business in the EU (Part 1 of 3) Sean Martin, ITSPmagazine | Rob Clyde, ISACA | Fred Kost, HyTrust | Cody Wamsley, McDonald Hopkins Recorded: Aug 17 2017 62 mins
    Is your company based in the US and also operating in the EU? There are things you MUST learn about the Global Data Protection Regulation (GDPR). This law, which goes into effect May 25, 2018, will have an impact on your business. This expert webinar will help you prepare for what's ahead.

    The requirements that GDPR places on organizations are wide-ranging and will impact everything from the people in the organization, to the processes and policies guiding the organization, straight through to the technology running the business. But before you can even begin to address the GDPR you need to be able to control your data. The first step in this process is knowing precisely what data you have and putting processes and tools in place to help you expose the data you don’t know you have.

    The experts on this panel will discuss and explore the following points:
    - What is the Global Data Protection Regulation?
    - Who does it impact and why?
    - What do organizations need to be aware of as they approach their compliance program?
    - What are some of the common misconceptions organizations have?
    - What things are often forgotten when organizations put together their compliance program?

    Moderator
    Sean Martin, ITSPmagazine

    Panelists
    Rob Clyde, Vice Chair of the Board of Directors, ISACA
    Fred Kost, SVP Marketing, HyTrust
    Cody Wamsley, Data Privacy & Cybersecurity Attorney, McDonald Hopkins

Embed in website or blog