Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • How the Equifax Breach Impacts You and What To Do To Protect Yourself
    How the Equifax Breach Impacts You and What To Do To Protect Yourself Vince Tocce | Rob Graham | Ray Watson | Judy Towers Recorded: Sep 18 2017 61 mins
    The massive Equifax data breach may involve as many as 143 million US consumers whose personal information was accessed by hackers between May and July.

    Join this interactive discussion with security experts and researchers to find out how this breach impacts your life and potentially, your organization.
    - Timeline of Equifax and why this may be the worst hack yet
    - Has your data been exposed in the hack?
    - What should you do right away?
    - When to expect the scams and cyber attacks related to this hack?
    - Expert recommendations on how to stay safe online in the age of breaches and ransomware attacks.

    Speakers:
    - Vince Tocce, Vince in the Bay Podcast
    - Judy Towers, Cyber Intelligence Analyst, Private Company
    - Ray Watson, VP Global Technology, Masergy Communications
    - Rob Graham, a well-known cybersecurity expert, creator of BlackICE, sidejacking, and masscan
  • What the Equifax Breach Means for You and Your Business
    What the Equifax Breach Means for You and Your Business Dan Lohrmann (Security Mentor), John Bambenek (Fidelis), Nathan Wenzler (AsTech) Recorded: Sep 15 2017 63 mins
    Data breaches have become frequent and more impactful in the last couple of years, with the latest massive breach revealed by Equifax taking the cake. Equifax is one of three major credit reporting agencies, and this breach leaves pretty much everyone's financial data vulnerable to cyber criminals.

    Join this interactive panel and ask your most pressing questions, as well as learn about:
    - How this breach exposing personal data, including social-security numbers, for 143 million Americans will affect you and your business
    - What you can do today to minimize your data exposure and protect against cyber attacks
    - What to expect in the future
    - Expert recommendations on how to improve your personal cybersecurity and your company's security.

    Speakers:
    - Nathan Wenzler, Chief Security Strategist at AsTech Consulting
    - Dan Lohrmann, CSO & Chief Strategist for Security Mentor
    - John Bambenek, Threat Systems Manager at Fidelis
  • Impact of Equifax Data Breach on Consumers and Businesses
    Impact of Equifax Data Breach on Consumers and Businesses Dave Klein (GuardiCore), Dr. Al Hartmann (Ziften), Neill Feather (SiteLock), Patrick Bedwell (Lastline) Recorded: Sep 14 2017 50 mins
    Chances are, you and a lot of people you know could be a few of the 143 million consumers affected by the major data breach recently disclosed by Equifax.

    Join this interactive Q&A panel to discover how this breach impacts you and the steps you can take today to minimize the likelihood of a future cyber attack related to this breach:
    - How to discover if your personal information has been exposed in this breach
    - What is the impact on consumers and organizations of all sizes
    - What to expect in the future? Cyber threats related to the breach
    - How can to protect your data and secure your organization

    Speakers:
    - Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
    - Dr. Al Hartmann, Chief Scientist, Ziften
    - Neill Feather, President of SiteLock
    - Patrick Bedwell, Head of Product Marketing, Lastline
  • Challenges in Data Privacy
    Challenges in Data Privacy Craig Scoon, Consultant in the Risk Advisory Service at Deloitte Recorded: Sep 14 2017 40 mins
    There are many challenges for data privacy legislation within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem seems to constantly be playing catch-up.
    This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz),
  • Equifax Data Breach: Facts, Impact and Steps to Take Today
    Equifax Data Breach: Facts, Impact and Steps to Take Today Michael Davis (CounterTack), Corey Williams (Centrify), Elizabeth Zalman (strongDM) Recorded: Sep 13 2017 60 mins
    Equifax, a massive credit reporting agency, disclosed that a data breach it discovered on July 29 may have impacted up to 143 million consumers in the United States. That's almost half the country.

    Join this interactive Q&A panel to discover how this breach impacts you:
    - Who is a victim and what this breach means for consumers and businesses
    - What should Equifax customers do
    - How to protect against and detect breaches faster
    - How can we protect our data against future breaches

    Speakers:
    - Michael Davis, CTO of CounterTack
    - Corey Williams, Senior Director of Products & Marketing, Centrify
    - Elizabeth Zalman, Co-founder & CEO, strongDM
  • 2017 Trends in IoT Cyber Attacks
    2017 Trends in IoT Cyber Attacks Ulf Mattsson, David Morris, Mandeep Khera, Juanita Koilpillai Recorded: Sep 13 2017 61 mins
    There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of about 30 billion objects by 2020. This session will discuss the key findings.
    Viewers will learn:
    • Current trends in Cyber attacks for IoT
    • Security Metrics for IoT
    • Oversight of third parties in IoT
    • How to measure cybersecurity preparedness for IoT
    • Automated approaches to integrate Security into IoT
  • State of Cloud Adoption in Asia Pacific (APAC)
    State of Cloud Adoption in Asia Pacific (APAC) Ekta Mishra, Research Analyst of CSA and David Siah, Country Manager of TrendMicro Singapore Recorded: Sep 13 2017 36 mins
    Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.

    During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.
  • Security Challenges of the IoT Within Healthcare
    Security Challenges of the IoT Within Healthcare Minatee Mishra, Software Architect & Lead of the Security Centre of Excellence, Philips HealthTech Recorded: Sep 13 2017 49 mins
    Healthcare industry would be one of the major adopters of IoT. What are the security challenges of healthcare industry? How does IoT change the security equation in healthcare?

    Presenter:

    Minatee leads the Security Center of Excellence (ScoE) in Philips HealthTech and has been instrumental in setting up the SCoE within Philips. The SCoE , which is a central organization responsible for doing cutting edge work in the field of security testing, doing secure code analysis , finding the vulnerable components within the software and more. Minatee has been in the field of software for 18 years right from designing and architecting systems to securing in systems, She has a bachelors in electrical engineering from NIT and Masters from IIT Kharagpur. She holds CISSP, GCIH, CEH certifications. She has been a speaker at various forums/conferences like RSA, RISC, NullCon, BPM etc.
  • IT is from Mercury, ICS is from Mars
    IT is from Mercury, ICS is from Mars Dick Bussiere, Technical Director, Tenable Network Security Recorded: Sep 13 2017 37 mins
    IT and ICS networks are as different as Mars is from Venus.

    This session will give the audience insight into the differences between IT environments and ICS environments, both from an operational and technical perspective.

    We will offer some ideas for how these critical networks should be monitored and secured.
  • Hurricanes and Cyber Threats: What To Expect and How to Protect Against It
    Hurricanes and Cyber Threats: What To Expect and How to Protect Against It Chenxi Wang | Gaurav Banga | Oren Falkowitz | Ori Eisen Recorded: Sep 12 2017 50 mins
    In the aftermath of hurricanes Harvey and Irma, as businesses are trying to recover and people are scrambling to rebuild their lives or help others do so, we need to be mindful of the potential cyber threats that lurk after major natural disasters.

    Join this interactive panel to learn more about:
    - What to look out for when it comes to phishing or malicious campaigns related to Harvey, Irma
    - The risk of cyberattack on the US water infrastructure
    - Other cyber threats we should be aware of
    - Expert recommendations for improved cybersecurity across enterprises, small businesses and individuals

    Speakers:
    - Chenxi Wang (moderator)
    - Gaurav Banga, Founder of Balbix
    - Oren Falkowitz, CEO of Area1 Security
    - Ori Eisen, CEO of Trusona

Embed in website or blog