Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • [VIDEO] Cyber Security Lessons for the Financial Sector [VIDEO] Cyber Security Lessons for the Financial Sector Josh Downs, Community Manager, BrightTALK & Ian Glover, President, CREST Recorded: Feb 24 2017 11 mins
    BrightTALK will be broadcasting its in-depth interview with CREST President Ian Glover and Nettitude MD Rowland Johnson jointly in conversation.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • SECOPS Automation on the Rise: Challenges, Directions, Futures SECOPS Automation on the Rise: Challenges, Directions, Futures Tom Gorup, Director of Security Operations at Rook Security Recorded: Feb 23 2017 33 mins
    With the growing number of newly-released, longtime-funded automation tools and platforms, it’s clear that network security operations automation has reached an inflection point. While automation promises to provide significant value to security and network operations teams, along with hopes and promises comes concerns about limitations, potential failures, and critical oversights—especially when it comes to automating incident response. These limitations don’t stem from a lack of APIs, compute power, or the advancement of machine learning or artificial intelligence, but rather from the tools that are doing the detection, notification, and remediation.

    Security operations expert Tom Gorup addresses short- and long-term automation challenges and provides analysis on why investments should be focused on arming people with more assistive technology, rather than attempting to remove humans from the equation entirely.

    About the Presenter:
    As Director of Security Operations for Rook Security, Tom Gorup oversees Managed Security Services and develops proprietary security operations management tools and services for organizations ranging from Fortune 100 firms to fast-growing startups. Prior to joining Rook, Tom served 6 years in the U.S. Army. As an Infantry Squad Leader, Tom served two tours in Iraq and Afghanistan, where he received a Purple Heart alongside several other awards for actions on the battlefield. Tom is GCIA certified, a participant in the GIAC mentor program and advisory board, Indiana Infragard Sector Specialist, and on the NexTech advisory board.
  • The Promise and the Perils of Machine Learning and Automating Cybersecurity The Promise and the Perils of Machine Learning and Automating Cybersecurity John Bambenek, Threat Systems Manager, Fidelis Cybersecurity Recorded: Feb 23 2017 58 mins
    Those defending against cyberattacks are overwhelmed by the shear volume of incidents to respond to. It is so bad that it has been said there may be as many as 1 million unfilled cybersecurity jobs. Machine learning and automation is often heralded as a way to deal with this problem so that many incidents can be dealt with requiring pressing a button. While there is much promise is machine learning there are also many perils that need to be considered. Attackers know how we defend ourselves and they do use our defenses against us.

    This talk will cover some of the open-source tools and techniques available for organizations to use to defend themselves while keeping in mind how attackers could undermine our efforts.
  • [VIDEO Panel] Securing the Cloud and Driving Digital Transformation [VIDEO Panel] Securing the Cloud and Driving Digital Transformation Josh Downs, BrightTALK (moderator); Dan Webb, James Brown, Oliver Pinson-Roxburgh & David Howorth, Alert Logic Recorded: Feb 23 2017 57 mins
    Digital transformation is changing the business landscape for every organisation, with the way new technologies can unlock competitive advantage, enable efficiently, agility and enhance customer experiences. The cloud is where this innovation is happening and enabling this transformation, but when you take advantage of its possibilities, it’s crucial that you secure your cloud applications and workloads.

    If you’re building applications or migrating workloads to the cloud, you’re probably like most organisations – trying to determine what security controls are needed, and how to integrate workload security without slowing down innovation or needing to add dedicated security staff – which these days is harder to find and more expensive to keep.

    During this panel discussion you will hear from industry experts as they discuss what steps and considerations should be taken when moving to any cloud. Where are the responsibilities of security and how do you maintain visibility and control over your data, including:

    - Why when moving business critical applications to the cloud you require a different approach to security?
    - Best Practices for minimizing risk in your cloud adoption
    - Filling the Cloud Security IT Skills Gap
    - Managing the Challenges of the Cloud under EU GDPR
  • [VIDEO Interview] The Influence of The Russian Election Hack on Cyber Warfare [VIDEO Interview] The Influence of The Russian Election Hack on Cyber Warfare Josh Downs, Community Manager, BrightTALK & Raj Samani, EMEA CTO, Intel Security Recorded: Feb 23 2017 13 mins
    BrightTALK will be broadcasting an in-depth interview with Raj Samani, CTO EMEA, Intel Security and Josh Downs, Community Manager at BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • The Role of Orchestration in Incident Response The Role of Orchestration in Incident Response Ted Julian, VP of Product Management, IBM Resilient Recorded: Feb 23 2017 45 mins
    Faced with an avalanche of alerts, insufficient staffing, and a bewildering regulatory environment it's no wonder that most organizations struggle to respond effectively to cyber attacks. Successfully resolving attacks requires fast, intelligent, and decisive action - organizations need to have an orchestrated plan in place before an attack occurs. Indeed, the best organizations leverage an orchestrated response capability to achieve cyber resilience, the ability to weather the inevitable cyber attacks as just another part of doing business.

    Join IBM Resilient’s Ted Julian, VP of Product Management to explore the latest incident response methodology and technology. Can automation really save the day? Or are the naysayers correct that the automation cure is worse than the disease itself? From instant escalation, to automatic enrichment, to guided mitigation, Ted will explore the latest incident response techniques and share what works and what doesn't. Attendees will gain a framework for understanding their incident response capability and a maturity model for evaluating opportunities for orchestration / automation.
  • Protecting Your Data with Effective Incident Response, Monitoring & Threat Intel Protecting Your Data with Effective Incident Response, Monitoring & Threat Intel Stuart Davis, Director, Mandiant & David Grout, Systems Engineering Director, FireEye Recorded: Feb 23 2017 49 mins
    Protecting against data loss is a key focus of any organisation’s information security program. However it is not always that easy to put long term initiatives in place with consistent monitoring and response effectiveness to mitigate against advanced attacks where intellectual property may be the target.

    In this webinar Stuart and David will explain how effective incident response, long term monitoring and threat intelligence can help deal with data protection against advanced persistent threats (APTs) in this modern age of cyber warfare.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Recorded: Feb 23 2017 55 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Incident Response and GDPR. What You Need To Know. Incident Response and GDPR. What You Need To Know. Amar Singh Recorded: Feb 23 2017 60 mins
    Warning - this is not just another GDPR webinar. Join Amar Singh in his popular and interactive webinars and deep-dive into this special Cyber Incident Planning & Response webinar where we share and discuss the following:

    * - What are the key components to automate in incident management to enable GDPR compliance.

    * - Four important questions a CISO or Manager must ask to manage an incident successfully.

    * - Understand Process Automation for Incident Orchestration.

    * - How you can, using the technology and processes, build a lean, effective and knowledge Security team with or without a Security Operations Centre.

    * - Data Protection and Incident Response for the non-technical manager.

    * - How and why it's critical that middle and senior management, working with technical teams, get involved in delivering effective cyber incident planning & response.
  • Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks Simon Crosby, Co-Founder & CTO of Bromium Recorded: Feb 22 2017 52 mins
    You’ve heard a lot about using artificial intelligence and machine learning to change the odds in your favor in cyber-attacks. Unfortunately it turns out that the bad-guys have great AI too, and with each click they can stealthily adapt, morphing into a new hard-to-detect form. But what if we apply learning in real time, on every endpoint, and allow the endpoints to collaborate to identify the threat?

    In this talk Simon Crosby, co-founder and CTO of Bromium, will explore how this new approach can give defenders the edge in an era of targeted attacks.

    About the Presenter:
    Simon Crosby is a co-founder and CTO of Bromium Inc. – the pioneer of micro-virtualization, which enables PCs to defend themselves by design from all malware. Previously Simon was CTO, Data Center & Cloud at Citrix Systems, which acquired XenSource, where he was co-founder and CTO. He was formerly a Principal Engineer at Intel where he led strategic research on platform security and trust, and founder & CTO of CPlane Inc., a pioneer in Software Defined Networking. He was a faculty member in the Computer Laboratory at the University of Cambridge, UK from 1994-2000. He holds a PhD in Computer Science from the University of Cambridge, UK, and is author of more than 50 peer reviewed papers and patents.

Embed in website or blog