Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Foolproof Digital Identity with Behavioral Biometrics
    Foolproof Digital Identity with Behavioral Biometrics
    Ehab Samy, VP Product Management, Plurilock Recorded: Nov 15 2018 59 mins
    Digital identity authentication can be challenging to do effectively. Join us to learn about the evolution of biometrics technologies, from those that determine who you ARE in the digital realm, to behavioral biometrics that determine your identity based upon what you DO and how you do it. Ehab Samy, Vice President of Product Management for Plurilock, will map which digital identity management mechanisms are best suited for particular environments including law enforcement, airport security, health care, and the workplace.
  • Privacy vs. Cybersecurity: Where the lines are drawn
    Privacy vs. Cybersecurity: Where the lines are drawn
    Raef Meeuwisse (Author, Cybersecurity for Beginners), Anthony Lee (DMH Stallard) & Ed Moyle (Prelude Institute) Recorded: Nov 15 2018 60 mins
    In this session we will look at where the line is drawn between data privacy and cybersecurity.
    - What are the primary cybersecurity responsibilities that support effective data privacy and what falls outside of the cyber remit?
    -When does a suspected breach become notifiable under regulations such as the European GDPR?
    - What are the key tips for managing data breaches?


    This session will feature a range of security and privacy experts, interactive audience voting and questions from the audience will be encouraged.
  • The Next Big Thing? Cross-Border Privacy Basics in the Asia-Pacific Region
    The Next Big Thing? Cross-Border Privacy Basics in the Asia-Pacific Region
    Jesse Woo, Associate, Aleada Consulting Recorded: Nov 15 2018 43 mins
    This webinar will explain the background of the Asia Pacific Economic Cooperation Cross-Border Privacy Rules ("APEC CBPR") framework, who is participating, and how it works, as well as how it hopes to improve privacy protections while facilitating cross-border data flows.

    Join this webinar to learn about the recent and possible future developments with cross-border trade and privacy in Asia, such as the Comprehensive Progressive Trans-Pacific Partnership ("CPTPP") and Regional Comprehensive Economic Partnership ("RCEP") free trade agreements, both of which have e-commerce provisions addressing cross-border data. It will also talk about what companies should do if they want to participate in and benefit from this framework.
  • How to turn customer experience into customer trust
    How to turn customer experience into customer trust
    Louise Thorpe, Chief Privacy Officer, American Express Recorded: Nov 13 2018 62 mins
    Forrester found that only 11 percent of companies are able to deliver a customer experience (CX) that sets them apart from their competition. Without a CX that elevates the brand, companies are at risk of being left behind while customers choose to spend their purchase dollars or business investments elsewhere.

    There are four key ways to ensure that your CX is flawless and your market share keeps growing. It starts from the inside out, with a unified vision of CX; a strategy to solve problems fast while offering self-help; continuous, ongoing iteration and improvement of best practices, and a consistent, personalized experience in every way.

    To learn more about why CX has to be the core of your company and how to launch the strategy that ensures your company maintains competitive advantage, don’t miss this VB Live event!

    Register here for free.

    Webinar attendees will learn:
    * How to build trust with increasingly savvy consumers
    * Why brand reputation is your most important calling card -- and how to protect it
    * The key qualities customers look for in a trusted brand
    * The secrets of the modern customer-focused organization

    Speakers:
    * Louise Thorpe, Chief Privacy Officer, American Express
    * Andrew Leede, Product Owner, Blinker
    * Ting Ting Luo, Senior Product Marketing Manager, Docusign
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Docusign
  • The State of Identity and Security in the Age of Cyber Attacks
    The State of Identity and Security in the Age of Cyber Attacks
    Sushila Nair (NTT DATA Services) | Derek Hanson (Yubico) | Ian Spanswick & Rebekah Moody(ThreatMetrix Inc LexisNexis Risk Co) Recorded: Nov 13 2018 48 mins
    Cyber attackers are becoming more sophisticated and data breaches are on the rise. According to a recent report, over 4.6 billion records were breached in the first half of 2018, showing a 133% increase compared to last year.

    With sensitive, personal and confidential data being at risk of ending up in the hands of cyber criminals, enterprises of all sizes are looking to strengthen their security in 2019.

    Join this exclusive keynote panel of industry experts as they discuss:
    - Trends in cyber attacks and breaches
    - Who is at risk
    - How to prevent breaches, data theft and future cyber crime
    - Advances in authentication
    - New in identity and access management
    - Security awareness and training
    - Best practices for securing the enterprise

    Speakers:
    - Sushila Nair, Sr. Director Security Portfolio, NTT DATA Services
    - Derek Hanson, Sr. Director Solutions Architecture & Standards, Yubico
    -Rebekah Moody, Fraud & Identity Director, ThreatMetrix
    -Ian Spanswick, VP Professional Services EMEA,ThreatMetrix
  • Gaining the Upper Hand on Network Vulnerabilities
    Gaining the Upper Hand on Network Vulnerabilities
    Nathan Vega, VP Product, Columbus Collaboratory Recorded: Nov 8 2018 60 mins
    Join security experts from Columbus Collaboratory to learn how to elevate your network’s cybersecurity defenses by identifying and remediating the most critical vulnerabilities. We will discuss best practices for vulnerability scanning, managing the seemingly overwhelming volume of scan data, data visualization techniques, and how combining vulnerability data, threat data and asset classification is critical to prioritizing your remediation efforts when resources are scarce and time is of the essence.
  • CIO Considerations: The Impact of Platformification in Bank Risk and Compliance
    CIO Considerations: The Impact of Platformification in Bank Risk and Compliance
    Rupert Nicolay - Microsoft, Zannettos Zannettou - Finastra Recorded: Nov 1 2018 9 mins
    Risk management in banks has gone through a silent revolution. Banks had to solve the problems and questions asked post-crisis and then rationalize and move to more enterprise wide models. Today, a three pronged revolution of regulation, technology and new sources of risk mean banks must re-imagine risk and compliance. With platformification, increases in computing power and cloud come the opportunities to deliver more agile processes, more real-time insights and more accurate predictions. But data quality remains king. What are CIOs top considerations when deploying more open api driven risk platforms? Can risk management securely live in the cloud? How can banks move the needle by collaborating with the fintech ecosystem?

    Rupert Nicolay, Worldwide Services Architect, Microsoft
    Zannettos Zannettou, Principal Technology Consultant, Finastra
  • How to break a PCI Compliant Application
    How to break a PCI Compliant Application
    Amar Singh, Aatish Pattni, Karsten Desler Recorded: Oct 31 2018 58 mins
    ** Warning - This webinar is only for informational purposes. We do not condone or encourage any malicious activity. The knowledge you gain from this webinar should be used to protect your own infrastructure and web applications. **

    PCI-DSS needs no introduction. The Payment Card Industry Data Security Standard applies to any organisation accepting credit card details in some way or the other. This webinar is going to share some of the latest techniques cyber criminals are using to break web applications.

    Join us to learn how they are doing this and what you should do to protect your organisation and compliance status.
  • CISO Panel - Protecting Critical Infrastructure in the Age of Threats
    CISO Panel - Protecting Critical Infrastructure in the Age of Threats
    Dan Lohrmann (Security Mentor) | Chris Morales (Vectra) | Dave Klein (GuardiCore) Recorded: Oct 30 2018 60 mins
    This webinar is part of BrightTALK's coverage of the 15th National Cyber Security Awareness Month (NCSAM).

    Join CISOs and other security leaders for an interactive discussion on how to better secure our critical infrastructure:
    - Top threats on the horizon and what's at risk
    - Key vulnerabilities & how advancements in technology have changed the game
    - Threat intelligence & what needs to be improved now
    - What government agencies can learn from the private sector about cybersecurity
    - Recommendations for protecting critical infrastructure from attacks and subversion by online adversaries
    - What to expect in 2019

    Speakers:
    - Dan Lohrmann, Chief Strategist & Chief Security Officer (CSO), Security Mentor
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Dave Klein, Sr. Director, Engineering & Architecture, GuardiCore
  • CISO Panel - Cybersecurity and the New CISO [NCSAM]
    CISO Panel - Cybersecurity and the New CISO [NCSAM]
    Gary Hayslip (Webroot) | Dan Lohrmann (Security Mentor) | Mark Weatherford (vArmour) | Amos Stern (Siemplify) Recorded: Oct 29 2018 59 mins
    This webinar is part of BrightTALK's coverage of the 15th National Cyber Security Awareness Month (NCSAM).

    Learn how the role of Chief Information Security Officer (CISO) has changed in the age of data breaches and high-profile cyber attacks.

    Join well-known CISOs at the top of their game for an interactive discussion on:
    - How the role of CISO has changed in the last few years
    - Hiring and retaining a CISO
    - Top challenges for CISOs
    - Dealing with stress & pressure associated with the role
    - How to keep your security team happy
    - Tools, technology and policies CISOs swear by
    - What keeps CISOs up at night
    - Why leadership buy-in is essential to boost cybersecurity
    - Future trends and predictions

    Speakers:
    - Gary Hayslip, CISO, Webroot
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Dan Lohrmann, Chief Strategist & CSO, Security Mentor
    - Amos Stern, CEO, Siemplify

Embed in website or blog