Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • A Data Breach Prevention, Detection & Response Strategy to Combat Todays Threats
    A Data Breach Prevention, Detection & Response Strategy to Combat Todays Threats Nick Frost, Principal Consultant, ISF LTD Recorded: Sep 18 2018 47 mins
    With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:

    ‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
    ‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
    ‒ end-to-end, covering the complete information life cycle.

    This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.

    In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
  • What Should SMEs be doing to mitigate against a Cyber Attack?
    What Should SMEs be doing to mitigate against a Cyber Attack? Danny Eastman, Cyber Security Specialist, Cyber Fortified Recorded: Sep 17 2018 40 mins
    With the change in the data protection laws, in the UK, SME businesses must start to embrace the need for a cyber security strategy. No longer is “cyber security” an elitist term that fills the corridors and board rooms of large enterprises.

    As part of BrightTALK's Data Breaches and Effective Response Summit, we will look to dispel this misconception and help SME business owners understand what they can do to begin to protect and help mitigate the risk of a Cyber Attack against them.

    This webinar will cover the following topics:
    - What are the fundamentals that SMEs should be putting in place
    - Case Studies: Learning from previous data breaches
    - Proportionately remediating against gaps in security
    - Taking some practical steps to get you started
  • The Real Cost to Business and Careers: How to Minimise the Impact
    The Real Cost to Business and Careers: How to Minimise the Impact Felicity March, Cyber Resilience Specialist, IBM Recorded: Sep 17 2018 39 mins
    During this presentation, Felicity will demonstrate how to mitigate the impact that data breaches has on affected businesses and individuals.

    Felicity has spent her life immersed in technology and is passionate about ensuring companies build Resilience right into the core of their strategy and architecture. She understands the importance of Transformation into the Digital World as well as the risks of not having services available.
    Felicity started her career as a hacker, and has worked for technology giants for over 25 years, in that time she has worked and advised Companies, Governments and Standards bodies on the emerging IT trends and ensuring integrity and sustainability is baked into the heart of IT.

    Felicity has a wealth of expertise and experience throughout her career and her insights and perspective are refreshing. She also is an advocate of driving STEM skills in to the younger generation and is an active mentor and coach to the next generation of technologists.

    Felicity lives in Winchester with her family, three dogs and not enough motorbikes.
  • CISSP Exam Prep Clinic #3: How to pass your CISSP the 1st Time Question Analysis
    CISSP Exam Prep Clinic #3: How to pass your CISSP the 1st Time Question Analysis Mission Critical Institute Recorded: Sep 15 2018 26 mins
    In Clinic #3, you will learn tactics for analyzing each exam question. Then, you receive tips on how use your analysis to select the best answer.

    If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    These five Clinics include tips for all 8 CISSP domains covered in the exam.

    Register today and move closer to your goal!

    SPONSORED BY: Mission Critical Institute
  • Privacy 101: Basic Overview and Tips for Organizations
    Privacy 101: Basic Overview and Tips for Organizations Elena Elkina (Aleada Consulting) | Bret Fund (SecureSet) | Dr. Pierre-Andre Maugis (Privitar) Recorded: Sep 13 2018 62 mins
    This webinar is part of BrightTALK's Privacy Insights Series.

    Join privacy and cyber security experts for an interactive discussion on:
    - What is Privacy and why should you care
    - Why all of a sudden everyone cares about Privacy
    - User/Customer expectations and reality
    - Data breaches prevention and notification
    - Crafting your Privacy Policy
    - Best recommendations for organizations

    Speakers:
    - Elena Elkina, Partner at Aleada Consulting
    - Bret Fund, CEO of SecureSet
    - Dr. Pierre-Andre Maugis, Data Scientist, Privitar

    Audience members are encouraged to send questions to the speakers to be answered during the live session.
  • Next-Generation Cybersecurity Architecture
    Next-Generation Cybersecurity Architecture Johna Till Johnson, CEO & Founder, Nemertes Research Recorded: Sep 13 2018 56 mins
    You've got firewalls, antimalware, next-generation endpoint security, and NAC. You're rolling out CASB and analytics, and extending protection to cloud, mobile, and IoT resources. But how does it all come together?

    This webinar reveals what a next-generation security architecture looks like--and which technologies, and vendors, should be part of it.
  • What Your Security Team Needs to Know about GDPR
    What Your Security Team Needs to Know about GDPR Richard Stiennon from IT-Harvest & Interfocus Technologies Recorded: Sep 12 2018 41 mins
    The scope of the 435 pages of the EU’s General Data Protection Regulation (GDPR) is vast and has raised the specter of excessive, unforeseen and unintended compliance consequences for companies around the world. In order to ensure individual privacy in the digital realm, there are numerous enterprise security requirements imposed by these regulations with significant compliance concerns, notification requirements and the potential for excessive penalties for non-compliance. Join Interfocus Technologies and security expert Richard Stiennon from IT-Harvest for an overview of GDPR’s implications on your security practices from a people, process and technology point of view. We will review the requirements for and processes to secure your endpoints, monitor and report on malicious user activity, and identify and trace where personal data resides in your network.
  • A Deep Dive into the 2018 State of IoT Security Report
    A Deep Dive into the 2018 State of IoT Security Report Vince Crisler, CEO of Dark Cubed Recorded: Sep 12 2018 33 mins
    Dark Cubed conducted extensive testing and determined that many IoT “smart home” device manufacturers have failed to implement basic security protections in the design, development, and production of their products such as electrical plugs, light bulbs and security cameras.

    Join CEO Vince Crisler for a live webcast as he discusses:

    · The creation and operation of the closed testing environment to simulate smart devices in a real-world home

    · The integration of Dark Cubed’s platform to capture and examine traffic patterns and message contents between each device, its back-end infrastructure and its Android app

    · Detailed port communications profiles, Nmap scan findings, infrastructure port reviews, man-in-the-middle assessments, Android app permissions and profiles, and privacy policy reviews for these light bulbs, cameras, and electrical outlets

    Learn more here: www.thestateofiotsecurity.com
  • CISSP Exam Prep Clinic # 2: How to pass your CISSP the 1st Time, Hands-On Labs
    CISSP Exam Prep Clinic # 2: How to pass your CISSP the 1st Time, Hands-On Labs Senior Cybersecurity Solutions Architect | Booz Allen and Hamilton Recorded: Sep 8 2018 30 mins
    In Clinic #2 you will learn how to integrate labs into your CISSP study plan.

    If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    These five Clinics include tips for all 8 CISSP domains covered in the exam.

    Register today and move closer to your goal!

    SPONSORED BY: Mission Critical Institute
  • (CPE Webinar) GDPR 101: Monitoring & Maintaining Compliance After the Deadline
    (CPE Webinar) GDPR 101: Monitoring & Maintaining Compliance After the Deadline Dr. Branden Williams, Union Bank; Janalyn Schreiber, TrustArc; Eugene Tyrrell, Online; Chris DePippo, DXC; Tim White, Qualys Recorded: Aug 28 2018 77 mins
    *All attendees stand a chance of winning a $100 Amazon Gift Card by attending this webinar.

    Achieving and maintaining GDPR compliance is a complex and expensive initiative for companies of all sizes, across all geographies and industries, and tech giants have already been sued for violating the terms, while major newspapers have been forced to restrict EU access to their websites for fear of noncompliance.

    In June 2018, Dimensional Research on behalf of TrustArc surveyed 600 legal, information technology and privacy professionals, and found that 20% of companies surveyed believe they now are GDPR compliant, while 53% are in the implementation phase and 27% have not yet started their implementation. Now three months after deadline, it's clear that there is a lot work yet to be done in order for all companies to achieve full GDPR compliance.

    In this CPE accredited webinar, our panel of experts will discuss the main issues and attendees will learn:

    - The latest techniques to protect data and remediate breaches.
    - How GDPR can support your corporate values and drive business value for customers and partners.
    - What your organization needs to uncover data risks and avoid fines.
    - How technology can enable continuous monitoring, maintenance, and demonstration of GDPR compliance, in an ongoing and efficient manner.

Embed in website or blog