Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Basic Security with Cryptocurrencies
    Basic Security with Cryptocurrencies Travin Keith, Managing Director at Agavon, Co-Founder at SICOS, and Administrator at BitcoinMarkets Recorded: Mar 14 2018 56 mins
    With the burst of interest into cryptocurrencies, there have been a lot of new users into this innovative world. However, the rush into the space has caused many users to skip key steps in joining the cryptocurrency community, such as understanding what basic security practices they should follow in order to keep themselves and their money secure.

    While there are technical steps to take to secure one's funds, there's also a number of things to keep in mind while interacting with the community.

    This webinar discussion aims to give beginners in the world of cryptocurrencies tips to better protect themselves, their money, and their sanity.
  • [Ep.4] Ask the Expert: Getting Serious About Cybercrime
    [Ep.4] Ask the Expert: Getting Serious About Cybercrime Joseph Carson (Thycotic) | William Leichter (Virsec) | Chenxi Wang Recorded: Mar 7 2018 61 mins
    This webinar is part of BrightTALK’s "Ask the Expert" Series. As attacks increase and start to have a significant impact, not just on companies’ bottom lines, but on their ability to carry out everyday business, cybersecurity has become much more of a boardroom issue than ever before. Increasingly this is causing forward looking organizations of all sizes to examine how security can be better integrated into business as normal.

    No business is immune from cybercrime and the theft of personal information and intellectual property will increase as the ability to turn raw data into money-spinning opportunities increases. The response to cybercrime is a business decision – and is all about risk management. Between human error and malicious insiders, time has shown us the majority of data breaches originate inside company walls. Employees and negligence are the leading causes of security incidents but remain one of the least reported issues. The fightback starts not in the organization but with people and increasingly in the home. More and more security professionals need to be re-assessing the risks to company data at a personal level - mobile/consumer devices, internet connected devices, cloud access and storage both inside and outside the corporate environment.

    - Joseph Carson, Chief Security Scientist, Thycotic
    - William Leichter, VP Marketing, Virsec
    - Dr. Chenxi Wang, Founder of The Jane Bond Project & Vice Chair, Board of Directors, OWASP

    Audience members are encouraged to send questions to the expert, which will be answered during the live session.
  • Learn about Cybersecurity Training for Military Vets
    Learn about Cybersecurity Training for Military Vets Maxwell Shuftan-CyberTalent Program Director, SANS Institute and Jessica Gulick CEO of Katzcy Consulting Recorded: Mar 1 2018 61 mins
    Join the SANS Institute and Katzcy for an insightful presentation about the SANS CyberTalent Academy opportunities. This academy is designed to help qualified veterans in Maryland and Chicago - area receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in a matter of months, depending upon program selected. The program is at NO COST to the selected veterans who attend and includes training and certification.

    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • How this training academy and related certifications can help your career

    Speaker Bio:
    Maxwell Shuftan
    CyberTalent Program Director, SANS Institute

    Max leads the CyberTalent division of the SANS Institute, the most trusted and the largest provider of information security training and certification in the world. In this role, he directs business development and stakeholder engagement to support the various SANS CyberTalent programs and develop strategic partnerships. He also oversees CyberTalent program operations and staff management. SANS CyberTalent helps organizations address their cybersecurity workforce development needs through initiatives such as the VetSuccess and Women's Immersion Academies as well as the Assessment tools. Max has worked in the public affairs and stakeholder engagement arena of cybersecurity for the past eight years, working with Government, corporate, and not-for-profit organizations, most recently as a Vice President at Cambridge Global Advisors, a homeland security strategic advisory services firm.
  • GDPR and Security: De-Identifying Personal Data
    GDPR and Security: De-Identifying Personal Data Ashwin Chaudhary, President of Accedere Recorded: Mar 1 2018 49 mins
    Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.

    Join this webinar to learn the GDPR requirements for managing personal information and digital identity.
  • Tracking Hackers - AI cybersecurity for APIs
    Tracking Hackers - AI cybersecurity for APIs Bernard Harguindeguy, CEO, ElasticBeam Recorded: Feb 27 2018 49 mins
    What do oBike, a bicycle rental company, Instagram, and the IRS have in common? Answer -- hackers used APIs to access their customers sensitive information forcing these organizations to announce breaches. Although these API attacks were exposed, most API-based attacks go undetected these days – particularly attacks that used compromised credentials.

    This webinar will discuss API cyberattack examples and the techniques used by hackers to breach APIs. It will also review how AI-based security ​solutions can effectively stop these attacks and provide deep visibility into your API sessions for forensic and compliance reporting. Topics covered in this webinar include:
    - API cyberattack trends
    - Review of recent API attacks
    - How to monitor and protect your API activity
    - How to detect and block API attacks on your data/apps (live demo)
    - How to deliver reports with detailed traffic insight for any API
    - Best practices for securing APIs
  • How to get started with Security Automation and Orchestration
    How to get started with Security Automation and Orchestration Kumar Saurabh, CEO & Co-founder of LogicHub Recorded: Feb 27 2018 47 mins
    Security Automation can significantly improve investigations, reduce tedious busy work, and strengthen defenses. However, it is not always clear where to start, and which use cases to apply automation to.

    In this webinar, we will provide a primer and discuss best practices. Topics discussed will include:
    - What is security automation and orchestration?
    - Different automation models
    - Examples of how automation has helped others
    - Assessing your automation readiness
    - Steps to get started - picking your first use cases

    The discussion will be led by Kumar Saurabh, a 15 year veteran of Security Operations, and CEO & Co-founder of LogicHub.
  • GDPR: Brace for Impact or Not?
    GDPR: Brace for Impact or Not? Lance James | Mark Rasch | Martyn Hope | David Morris Recorded: Feb 22 2018 64 mins
    The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?

    Join this panel of world-class experts:

    Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

    Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.

    Martyn Hope: Founder of the EU-GDPR Institute.

    In this session you will learn:
    - What will happen if I'm not Compliant by May 25, 2018
    - Where do I Begin to start my compliance effort
    - Who should I trust to advise me through my compliance program

    If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
  • Practical Approach to GDPR
    Practical Approach to GDPR Tarun Samtani, Group GDPR Lead for Vectura Group Plc, & SkyePharma Recorded: Feb 22 2018 51 mins
    We all know that the EU General Data Protection Regulation (GDPR) will bring a massive change in the way businesses operate and handle personal data. This short discussion will give you to tips to jumpstart your GDPR programme and some easy approaches to take to achieve success in a short space of time.

    1) GDPR short summary
    2) Focus on the goals not vendors
    3) ICO & Data subject expectations - May 2018 onwards
    4) GDPR practical approach
    5) Takeaways

    About the Presenter:
    Tarun Samtani is the Group GDPR Lead for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Telecommunications, ISP's, Financial Services, Gambling, Retail and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments. He has a wealth of experience in Cyber security & Data privacy and is passionate about securing business information landscape. During the course of his career Tarun has been involved in the strategy & planning, design, architecture and implementation of a significant number of information security programmes.
  • GDPR's influence on security
    GDPR's influence on security Rob Shapland Recorded: Feb 22 2018 43 mins
    Will GDPR have the desired effect? Will it increase security, or see companies regularly hit with catastrophic fines for poor compliance.
  • GDPR Is Coming - Is Your Organization Ready? Key Steps to Help You Prepare
    GDPR Is Coming - Is Your Organization Ready? Key Steps to Help You Prepare Amar Singh, Guy Cohen, Punit Bhatia, Mark Leiser, Dr. Rula Sayaf Recorded: Feb 21 2018 60 mins
    On May 25 the long-awaited General Data Protection Regulation (GDPR) will go into effect across Europe. GDPR is the biggest overhaul of data protection laws in more than two decades. How prepared is your organization for GDPR?

    Join this interactive panel of experts as they discuss:
    - What is GDPR?
    - Why should you be GDPR-compliant?
    - How to achieve compliance?
    - Steps your organization should take today to prepare for GDPR
    - Other GDPR considerations


    Amar Singh - CEO, Cyber Management Alliance Ltd
    Dr Rula Sayaf - PhD in privacy, security, and data science, GDPR Expert
    Punit Bhatia, DPO and author - be ready for GDPR.
    Guy Cohen, Strategy and Policy Lead, Privitar
    Mark Leiser - Lecturer in Law, University of Leicester

Embed in website or blog