Hi [[ session.user.profile.firstName ]]

eSentire

  • Date
  • Rating
  • Views
  • Canadian cybersecurity regulations are not enough to protect firms from attack
    Canadian cybersecurity regulations are not enough to protect firms from attack Eldon Sprickerhoff Recorded: Aug 21 2018 51 mins
    One of the biggest business risks to the financial services industry is cybercrime, which has prompted global regulators to put a stronger focus on cybersecurity in 2018. This includes the Canadian federal government, who recently announced plans to invest more in cybersecurity. Unfortunately, current Canadian cybersecurity regulations are leaving investment firms exposed to advancing cyber threats. In this talk, we will explore global cyber-attack trends, best practices and proactive measures to reduce your cyber threat profile and mitigate risk to protect your firm today.

    During this webinar, you will learn:
    • Why global regulators are putting more focus on cybersecurity in 2018
    • How to incorporate cybersecurity into your business strategy
    • How to reduce your cyber threat profile and mitigate risk to protect your investment firm
  • Black Hat 2018: MDR vs. MSSP
    Black Hat 2018: MDR vs. MSSP Mark Sangster Recorded: Aug 10 2018 13 mins
    During Mark Sangster’s 10-min in-booth presentation at Black Hat USA 2018, he discusses how the disparity of services across providers can lead to confusion in the market about the key difference between MDR and MSSP, ultimately resulting in a heightened risk for potential clients. As the definition continues to evolve, we believe what distinguishes a true MDR provider from those that just claim to be are key detection and response capabilities.
  • Into the Mind of a Hacker: A Penetration Tester's Perspective
    Into the Mind of a Hacker: A Penetration Tester's Perspective Chuck Ben-Tzur and Mark Sangster Recorded: Aug 2 2018 62 mins
    Risk factors such as third-party access, limited IT and security resources and specific regulated guardrails for cybersecurity policies and procedures have a direct correlation of a company’s susceptibility to a cyber breach. While new vulnerabilities present new vectors to target, attack techniques remain fundamentally the same: discover, analyze, attack and exploit. Assuming attackers will continue to find a way through, the key to reducing risk is understanding how they target and execute their attacks.

    Join eSentire Penetration Tester, Chuck Ben-Tzur and Cybersecurity Evangelist, Mark Sangster as they share their experience on the current cybersecurity posture and conducting penetration tests to identify vulnerabilities and risk.

    In this presentation, you will learn:
    •Which industries are a prime target for cyber-attackers
    •The tools and fine-tuned attack vectors used by attackers
    •Common weaknesses and potential impacts
    •A real-life account of an attack on a law firm
    •Recommendations for strengthening your security posture


    Speakers
    Chuck Ben-Tzur - Information Security Consultant, eSentire
    Mark Sangster - Vice President, Industry Security Strategies, eSentire
  • Don’t Stop at HIPAA: HMOs and CCRCs Must Now Also Comply with NYCRR 500
    Don’t Stop at HIPAA: HMOs and CCRCs Must Now Also Comply with NYCRR 500 Mark Sangster, Vice President, Strategic Marketing | eSentire & Ken Rashbaum, Partner | Barton LLP Recorded: May 31 2018 60 mins
    The New York Department of Financial Services (NYS DFS) recently announced that its scope will now include Health Maintenance Organizations (HMOs) and Continuing Care Retirement Communities (CCRCs). As a result, cybersecurity compliance for these organizations is going to get a lot more complicated. HMOs and CCRCs will not only need to adhere to HIPAA requirements, but also to sections of NYCRR 500, including operating under the shadow of the 72-hour breach notification rules.

    During this panel webinar session, Mark Sangster, Vice President Strategic Marketing, and Ken Rashbaum, Partner at Barton LLP, will explore the impact of these new regulations on HMOs and CCRCs and lead a Q&A discussion on how you can prepare.

    In this webinar you will learn:
    • Recent changes to NYCRR 500 cybersecurity requirements
    • Recommendations for how HMOs and CCRCs can prepare for requirements
    • Trends, best practices and proactive measures to help mitigate risk and avoid regulatory investigations
  • Cybersecurity in 2018: The Toughest Year Yet for the Finance Industry
    Cybersecurity in 2018: The Toughest Year Yet for the Finance Industry Eldon Sprickerhoff, Founder & Chief Security Strategist | eSentire Recorded: Apr 13 2018 56 mins
    One of the biggest business risks to the financial service industry is cybercrime. Cybercriminals are after banking and financial credentials, trading and investor information or strategies, consumer data, business and tax filing, fraudulent redemptions and more. Breaches can result in financial loss, disruption of operation, compromised confidential information and reputational damage. This significant risk has prompted regulators to put a stronger focus on cybersecurity in 2018.
     
    In this talk, we will discuss how alternative investment firms can navigate regulations and explore cyber-attack trends, best practices, and proactive measures to reduce your cyber threat profile, mitigate risk, and avoiding regulatory investigations and investor disclosures.

    Join Eldon Sprickerhoff, Founder and Chief Security Strategist at eSentire, as he shares:

    • Why regulators are putting a focus on cybersecurity in 2018
    • New SEC cybersecurity guidance and what it means for alternative
    investment firms
  • Cyber Risk at the C-Level
    Cyber Risk at the C-Level Mark Sangster, Vice President, Strategic Marketing | eSentire Recorded: Apr 6 2018 59 mins
    C-level executives must consider cyber risk as a core tenant of their responsibilities, as well as their mission to drive sustainable healthcare services. In this talk, we’ll explore attack trends and share best practices and preventative measures to help you reduce risk and avoid investigations.

    Learning Objectives:
    •The importance of incorporating cybersecurity into your business strategy
    •Office of Civil Rights (OCR) enforcements and key components of an OCR Correct Action Plan (CAP)
    •A real-life example of one healthcare organization’s CAP
    •Trends, best practices and proactive measures to help you mitigate risk and avoid regulatory investigations
  • Into the Mind of a Healthcare Hacker: A Penetration Tester's Perspective
    Into the Mind of a Healthcare Hacker: A Penetration Tester's Perspective Chuck Ben-Tzur, Information Security Consultant | eSentire Recorded: Mar 22 2018 61 mins
    The healthcare industry continues to be one of the most exploited industries. Risk factors such as third party access, high volume of staff-patient interaction and an investment imbalance when it comes to protecting a patient’s health vs. their personal information leaves healthcare organizations susceptible to attack. While new vulnerabilities present new vectors to exploit, attack techniques remain fundamentally the same: discover, analyze, attack and exploit. Assuming attackers will continue to find a way through, the key to reducing risk is understanding how they target and execute their attacks.

    Join eSentire Penetration Tester, Chuck Ben-Tzur, as he shares his experience conducting penetration tests against healthcare organizations.

    Chuck will cover the following topics:

    • Why healthcare organizations are a prime target for cyber-attackers
    • The tools and fine-tuned attack vectors used by attackers
    • Common weaknesses and potential impacts
    • A real-life account of an attack on a healthcare organization
    • Recommendations for strengthening your security posture
  • Build vs. Buy: Which SOC Solution is Right for You?
    Build vs. Buy: Which SOC Solution is Right for You? Rick McElroy, Security Strategist | Carbon Black & Sean Blenkhorn, VP of Solutions Engineering & Advisory Services | eSentire Recorded: Mar 8 2018 63 mins
    As cyberattacks become more frequent and more devastating, many organizations are quickly devising plans to protect against inevitable threats that could jeopardize their business. While larger organizations might have the resources to manage cybersecurity in-house, small and mid-sized organizations are increasingly faced with the dilemma of scaling up their own efforts or looking to a vendor to help them develop and execute a cybersecurity strategy.

    Rick and Sean will walk you through:
    •The core functions of a high-speed security operations center (SOC)
    •How building a high-speed SOC can make your team more effective
    •How to enlist the help of a Managed Detection & Response partner
    •How to evaluate if a hybrid model is right for you
  • Who Chaperones the Chaperone?
    Who Chaperones the Chaperone? Mark Sangster, Vice President, Strategic Marketing | eSentire Recorded: Mar 1 2018 35 mins
    Today’s risk and compliance regulations make it essential that companies build in policies and procedures to ensure that security and privacy is maintained throughout the supply chain. But what happens when the people who are designated to ensure compliance and privacy are maintained are the same ones who are responsible for the resulting vulnerabilities and potential breaches? This has become more common as the perimeter has given way to partner portals, shared data and multi-tenant cloud environments where the traditional moat and firewall no longer exist
  • Protect the Client, Protect the Firm: How Cybersecurity Affects the Bottom Line
    Protect the Client, Protect the Firm: How Cybersecurity Affects the Bottom Line Mark Sangster, Vice President, Strategic Marketing | eSentire Recorded: Feb 28 2018 28 mins
    Nothing affects a law firm’s bottom line more than lost billable hours. Yet, as firms continue to focus on defending their clients in the court room, protecting client data often takes a back seat. By investing in cyber protection, firms can avoid the financial, reputational and regulatory implications of an inevitable cyber breach.

    In this webinar series, ILTA Council Member, Mark Sangster will focus on:

    •Why law firms? Means, motive, opportunity for attackers
    •The unique threat landscape and the risk it presents
    •The evolution of client requirements and alignment to compliance mandates
    •Why it happens: examples and the resulting implications
    •How to demonstrate your security posture and the path to lowering risk

Embed in website or blog