Hi [[ session.user.profile.firstName ]]

BT – Cyber Security

  • Date
  • Rating
  • Views
  • Securely manage multiple cloud providers and platforms
    Securely manage multiple cloud providers and platforms Paul Crichard, Security CTO, BT and Richard Baker, Futures Security Architect, BT Recorded: Jun 22 2018 40 mins
    77% of CISOs working with BT are actively moving to the cloud or planning to adopt cloud services. Of these, 71% said they have some policies, but 30% stated they don't understand what they are in reality.

    If you’re thinking about cloud or multi-cloud environments you will need to take a deeper look at your security. Yes, it’s quicker, and agile model and therefore cheaper but it does come with an extra level of risk that previous data centre options mitigated. You’ll need to validate your cloud vendor to make sure your company’s data is separated from other data, that you are getting the context rich information back and that the right people and devices are accessing it. The big thing is to put the necessary and sufficient security and compliance controls in place, and to keep checking that they’re appropriate, effective, and moving forward while you take up the cloud (and beyond).

    Join our live discussion with BT’s Security CTO to find out what’s required to identify, manage and control threats across your hybrid estate and multiple clouds. We’ll look at how to discover where your data is, who can see it or access it or process it, and how to avoid data sovereignty violations. The webinar will also cover how vital it is to know what we are all responsible for and how can you mitigate for the risks and new threats in order to stay secure..
  • Are you doing enough to protect your organisation and ensure compliance?
    Are you doing enough to protect your organisation and ensure compliance? Deborah Moir, Head of Security Consulting, BT & Alison Springate, Global Head of Security Enablement, BT Recorded: May 22 2018 18 mins
    With the launch of GDPR imminent, we wanted to take the opportunity to discuss how you can ensure you are doing enough to ensure compliance.

    Join our webinar to hear from our compliance expert Deborah Moir, Head of Security Consulting, where she will discuss the reality of GDPR compliance for large enterprises and what you should be doing to ensure you are in the best possible position to be ready and compliant.

    GDPR often means a huge overhaul of cyber security, network and processes and because failure to comply can result in a fine of up to four per cent of a company’s turnover or €20 million — whichever is higher you need to do everything you can to ensure you are on top of it.

    Adapting to GDPR means shifting how you view data protection and security. At its most basic, you need to know you have the right cyber security tools and processes in place to prevent the loss or theft of your customers’ data. And getting it right will open new doors.

    While data protection might be something you have to do, the new regulation should also be seen as an opportunity to redesign your security strategies in a way that builds a strong brand based on customer trust.
  • Using threat intelligence to stay one step ahead of the criminals
    Using threat intelligence to stay one step ahead of the criminals Melanie Johnstone, Head of Intelligence, BT Recorded: Mar 22 2018 34 mins
    Most organisations are too passive in their approach to security. The response to most breaches is passive defence. Battles can be won this way, but not the War.

    To stay ahead of the game, businesses need an effective digital/threat intelligence strategy. An approach that enables proactive threat hunting, pre-emptive control mitigation based on intelligence and process, visibility over an entire estate and the tools, people, and process to solve problems when they are discovered.

    We talk to customers often who pay for threat intelligence feeds only to realise that knowing a problem exists doesn’t mean the problem will be solved. Having the right teams and people in place are a lot harder than it sounds.

    Building a digital threat intelligence capability is about much more than collating technical information on the systems used to launch attacks.
    • You need to gather evidence-based information on potential attackers, the tools they use, their motivation and the vulnerabilities they exploit, and how understand how this interacts with your business.
    • Intelligence means improving your understanding and visibility of the risk context your business is in; getting to know your threat landscape better. Creating the perfect blend of people, process and technology for your business.
    • By sharing data, you can improve your own security and cut intelligence-gathering costs. All of this should be seen not only in the context of present but also future threat.
    •Sharing intelligence product throughout your business, in a way that everyone can understand.

    Basically, you need to be one step ahead of the criminals.
  • How do you implement digital transformation securely?
    How do you implement digital transformation securely? Mark Hughes Pres, Security BT, Martin Courtney, Principle Analyst, Tech Market View, & Danny Longbottom Dir Gov & Health, BT Recorded: Feb 8 2018 59 mins
    Security needs to be embedded in any digital transformation strategy. What are the fundamental things you need to get right for your organisation?

    We cover:
    - What are key issues you need to focus on?
    - What are the practical things you need to do to get your business case signed off?
    - How do you get ahead and stay ahead in this complex area?
  • The Five Steps to Cyber Maturity: how to avoid the dangerous traps
    The Five Steps to Cyber Maturity: how to avoid the dangerous traps Mark Lavender, Head of Threat Intelligence, BT Recorded: Jan 31 2018 30 mins
    The global scale of the recent ransomware attacks has shown the astonishing speed at which even the most unsophisticated of attacks can spread around the world. But how is it possible to spend millions on cyber security, and still get caught out? And what good are the latest solutions, if you haven’t fixed the basics?

    In ‘The cyber security journey — from denial to opportunity’, you’ll find out why reaching true cyber security requires a five-stage journey. There is no silver bullet when it comes to security and in order to avoid the dangerous traps along the way, don’t try to run before you can walk.
  • Are You Ready for GDPR? Key Things to Consider
    Are You Ready for GDPR? Key Things to Consider Deborah Moir, Head of UK Security Consulting - BT Recorded: Jan 25 2018 22 mins
    Are you faced with GDPR information overload? We've pulled together the key things you need to know to make sure you're prepared. We cover:
    - What is GDPR?
    - Why is this new regulation important for your organisation?
    - Are you ready for the change?
  • How to make security a key part of your future network strategy
    How to make security a key part of your future network strategy Paul Crichard, Security CTO, BT, and Martin Barnes, Head of Security Propositions, BT Recorded: Jan 24 2018 50 mins
    SD WAN offers some inherent advantages in terms of security and compliance but also introduces a number of new potential ‘attack surfaces’, which must be considered. Join our webcast where Paul Crichard, Security CTO, BT, and Martin Barnes, Head of Security Propositions, BT, will take you through a range of scenarios and show how security can be “built-in” as an inherent part of the overall design.
  • Geopolitical Cybersecurity panel session at WEF Davos 2018
    Geopolitical Cybersecurity panel session at WEF Davos 2018 Mark Hughes, CEO, Security, BT, Ciaran Martin, Chief Executive, NCSC , Jayne Plunkett, CEO Asia, Swiss Re Asia Ptd. Ltd Recorded: Jan 23 2018 61 mins
    With today’s global cyber threat as real as ever, there is still considerable work to be done in the area of threat awareness. At this year’s World Economic Forum in Davos a distinguished panel of experts discussed how to harness the power of threat information and data. Mark Hughes, Chief Executive Officer, Security, BT, demonstrated using the BT Cyber Platform how visual analytics and big data can help bring to life trends and geographic patterns and set them in a new context.

    Panelists Ciaran Martin, Chief Executive, National Cyber Security Centre (NCSC) and Jayne Plunkett, CEO Asia and Member of Group Executive Committee, Swiss Re Asia Ptd. Ltd., Young Global Leader, talked about the role that public and private partnerships can play and looked at the topic from a risk perspective. The session was moderated by Rob Wainwright, Director, Europol.

    The session was filmed live at WEF on 23rd Jan 2018. You can find out more about the full WEF programme here: https://www.weforum.org/events/world-economic-forum-annual-meeting-2018/programme
  • Is Quantum Key Distribution a business reality yet?
    Is Quantum Key Distribution a business reality yet? Professor Tim Spiller from York University and BT’s Andrew Lord Recorded: Dec 12 2017 45 mins
    Watch Professor Tim Spiller from York University and BT’s Andrew Lord talk about the latest developments in quantum key distribution.
  • The Role that Machine Assisted Detection and AI can play in your Defences
    The Role that Machine Assisted Detection and AI can play in your Defences Dr Ben Azvine - Head of Security Futures, BT & Dr Robert Ghanea-Hercock - Chief Researcher, BT Recorded: Dec 12 2017 35 mins
    Watch BT's Head of Security Futures Dr Ben Azvine and our Chief Researcher Dr Robert Ghanea-Hercock talk about cyber security and how threats to businesses like yours are constantly changing

    The evolving threat environment needs ever-evolving strategies to keep vital and highly confidential data secure.

    The traditional ways of preventing cyber attacks are being challenged by highly organised hackers on the one hand, and a rapidly changing technology landscape on the other.

    We need to complement our preventative approaches with machine-assisted detection and prediction.

    In this film, Ben and Robert explore and demonstrate some of the latest technologies we’ve developed to achieve better cyber defence.

Embed in website or blog