Hi [[ session.user.profile.firstName ]]

Infosec Web Events

  • Date
  • Rating
  • Views
  • Data Breach Survival: How to Recover from a Crisis Without Causing a Catastrophe
    Data Breach Survival: How to Recover from a Crisis Without Causing a Catastrophe
    Paul Edon, International Services Director, Tripwire Recorded: Mar 7 2018 45 mins
    We as cybersecurity professionals have witnessed firsthand how a mishandled data breach can cause far more harm to an organisation than it otherwise should have. From financial losses to reputational damage, breaches can leave companies suffering for months, or even years, thereafter when not handled properly. This presentation will share real-world examples of how organisations can effectively recover from a security incident, while minimising potential damage and risk. Regardless of their industry, session attendees will learn best practices for restoring system trust, proving compliance, and communicating to key stakeholders.

    • Discover how to quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems
    • Learn how to use a systematic approach to restore trust in affected systems
    • Understand how to apply a “standard of due care” in order to prove compliance to regulatory agencies
    • Understand key information that needs to be communicated to various stakeholders in the event of a breach

    Paul Edon

    A senior level Information Technology professional with over 30 years of experience in management, consulting and service provision. Paul has been at Tripwire for 8 years and is the International Services Director.
  • Reducing data breaches by focusing on the people problem
    Reducing data breaches by focusing on the people problem
    Neil Larkins, Jeanette Garwood Recorded: Feb 27 2018 45 mins
    We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.

    However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.

    Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.

    During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:

    •Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
    •The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
    •The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
    •Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
    •Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face
  • A day in the life of a GDPR breach
    A day in the life of a GDPR breach
    Elizabeth Davies, Matthias Maier Recorded: Sep 20 2017 60 mins
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?

    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you will learn

    What breach response will look like under the GDPR
    What tools and processes a data privacy officer will rely on in case of a breach
    What departments and entities will be involved beyond IT
    What activities are currently happening within organizations to prepare for the GDPR
    What the consequences of the breach could be

Embed in website or blog