Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • [Earn 1 CPE]  Critical Actions to Survive a Data Breach in 2019 and Beyond
    [Earn 1 CPE] Critical Actions to Survive a Data Breach in 2019 and Beyond
    Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace. Recorded: Jan 17 2019 65 mins
    With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.

    Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:

    - Implement security analytics for incident detection and response.
    - Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
    - Leverage AI to autonomously respond to emerging threats before they can do serious damage.
    - Understand key information that needs to be communicated to various stakeholders in the event of a breach.
    - Apply a “standard of due care” in order to prove compliance to regulatory agencies.
  • The Threats of 2019
    The Threats of 2019
    Bogdan Botezatu, Director of Threat Research and Reporting, Bitdefender Recorded: Jan 17 2019 49 mins
    What threats can we expect to see in 2019, and how do we make sure we're prepared?

    Join Bitdefender Director of Threat Research and Reporting, Bogdan Botezatu to discuss research-based predictions on the biggest threats of 2019. He'll walk through the future of cryptojacking, advanced persistent threats (APTs), network-level exploits, IoT attacks, and others and provide recommendations on the industry's best defenses against these threats.
  • Tackling Your Biggest Threat for Free: One Active Directory Policy
    Tackling Your Biggest Threat for Free: One Active Directory Policy
    Helen Oswell, Cyber Security Engineer Recorded: Jan 17 2019 32 mins
    The biggest threat to any organization is it’s own people, particularly when they have access to its most sensitive data. This talk is about limiting the internal threat through RBAC and segregation of duties, and how to implement these using Active Directory.

    Helen has a masters in electronic engineering, specializing in machine learning. She moved into Cyber Security at 10x Future Technologies, a fintech start up founded by the ex-CEO of Barclays Anthony Jenkins. She is now working with 6point6 to provide SME services to HM Government, designing and building a number of Cyber Security tools.
  • CISO Panel - Cybersecurity and the New CISO
    CISO Panel - Cybersecurity and the New CISO
    Gary Hayslip (Webroot) | Dan Lohrmann (Security Mentor) | Mark Weatherford (vArmour) | Amos Stern (Siemplify) Recorded: Jan 16 2019 59 mins
    Learn how the role of Chief Information Security Officer (CISO) has changed in the age of data breaches and high-profile cyber attacks.

    Join well-known CISOs at the top of their game for an interactive discussion on:
    - How the role of CISO has changed in the last few years
    - Hiring and retaining a CISO
    - Top challenges for CISOs
    - Dealing with stress & pressure associated with the role
    - How to keep your security team happy
    - Tools, technology and policies CISOs swear by
    - What keeps CISOs up at night
    - Why leadership buy-in is essential to boost cybersecurity
    - Future trends and predictions

    Speakers:
    - Gary Hayslip, CISO, Webroot
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Dan Lohrmann, Chief Strategist & CSO, Security Mentor
    - Amos Stern, CEO, Siemplify

    This exclusive CISO webinar originally aired during National Cyber Security Awareness Month (NCSAM).
  • Security Strategy & Influence
    Security Strategy & Influence
    Max Aulakh, CEO, Ignyte Assurance Platform Recorded: Jan 15 2019 38 mins
    Every organization has a strategy – sometimes this is explicitly stated within various organizational documents and other times the strategic objectives are held within the minds of executive leadership. CISOs today are struggling to find the right words and narrative to set the tone from the top. How do you properly extract the right type of information from your organization that will help you build a consensus and influence with your top-level management?

    As a CISOs, you need to acquire a new set of skills while maintaining your technical trench warfare knowledge (Frameworks, SIEMs, DLP, MDR, etc..). In this presentation, Max Aulakh (CEO) will present broad range of skills that are needed for the next CISO. We will also examine behaviors of some of the well known CISOs in our industry and how they interact & build influence to gain consensus.
  • Best Practices for Securing Your Organization in 2019
    Best Practices for Securing Your Organization in 2019
    Griff James (Damrod Analysis); Michelle Drolet (Towerwall), Liam Brown (Lockton) Recorded: Jan 15 2019 59 mins
    Data breaches are on the rise and getting their fair share of media attention. It is no longer a question of "if", but "when" an organization will get breached. So, how are organizations preparing for the inevitable?

    Join this roundtable discussion with security experts to learn more about:
    - Trends in cyber attacks and breaches and what's at risk
    - Prevention best practices
    - Solution recommendations for breach detection and response
    - Key factors for CISO success
    - What's on the horizon for 2019

    Speakers:
    - Griff James, Director, Damrod Analysis Ltd.
    - Michelle Drolet, CEO, Towerwall
    - Liam Brown, Cyber Risk Specialist, Lockton Companies
  • Survival Skills for Cybersecurity Leaders
    Survival Skills for Cybersecurity Leaders
    Glenn Richardson, Executive Coach, LeaderSages Recorded: Jan 15 2019 60 mins
    Start the new year on the right foot by investing in yourself and improving your leadership skills. Join Glenn Richardson, coach and executive consultant, in this webinar that will explore the principles of leadership. We will review practical tips, supported by real-world examples, from an experienced, successful leader who specializes in coaching and developing new and emerging leaders. Gain confidence in your ability to learn and lead, and, if you’re already in a leadership role or approaching a new position with leadership expectations - congratulations! Join us on this webinar to develop a plan for continue learning, improvement and career advancement.
  • Understanding the Strategy of a Virtual CISO
    Understanding the Strategy of a Virtual CISO
    Peter Jones, Senior Information Security Consultant, 3B Data Security LLP Recorded: Jan 15 2019 49 mins
    Not every business can afford to employ a dedicated CISO and some businesses will assign the role of a CISO out to another member of management without any understanding of the role.

    Here comes the Virtual CISO, someone who spends time in your business from an externally business who manages your security and countless others all at the same time. Someone who takes feeds of information from real sources and has to process them to make sense of them then has to adapt this knowledge to each business they manage.
  • Beyond the Marriott Breach - What to Expect in 2019
    Beyond the Marriott Breach - What to Expect in 2019
    Speakers: Nir Gaist, CTO/Founder and Robert Zamani, Director of Solutions Architect. Moderator: Rene Kolga, Product Recorded: Dec 19 2018 64 mins
    What will 2019 bring for the security landscape? How many Marriott-like breaches should you expect? What new types of attacks are you likely to see, and what can you do now to prepare for them? Nyotron’s team of security experts will have the answers for you during our December 19th live webinar.

    Making informed predictions first requires thinking back on 2018 with a critical eye. We will review a few of the most significant vulnerabilities and data breaches that made national headlines, from the City of Atlanta to Meltdown and Spectre, to the Marriott debacle and why the healthcare industry appears unable to defend itself. Our panel will also discuss the issues and trends they expect will dominate 2019, including adversarial artificial intelligence (AI) and destructive attacks on ICS.

    We will wrap up with ideas on how you can make an effective case for additional security budget and how to educate yourself about the changing threat landscape (and to get those CPE’s before the year’s end).
  • Break the chains of legacy virtualization
    Break the chains of legacy virtualization
    Bhavani Yellapragada, AVP of DevOps, Nasdaq Recorded: Dec 19 2018 58 mins
    IT leaders look to technology as a business differentiator and rely on it to foster innovation. Enterprises have discovered that hyper-converged infrastructure (HCI) can be the foundation of a modern, cloud-like datacenter. But don’t stop there — going beyond HCI delivers more savings, increases IT agility, and supports multi-cloud goals when you add virtualization as an integral part of your stack.

    How do you harness the power of HCI and virtualization? Sure, there are a wide variety of tools on the market, but choosing the wrong HCI platform could limit your options in how you operate your datacenter or could impede cloud goals — including those associated with virtualization.

    To learn more about the power of HCI and virtualization, how virtualization can remove complexity and increase efficiency, and how to choose the right HCI tool, don’t miss this VB live event!

    Registration is free.

    Attend and learn:
    * How virtualization platform options on the market compare
    * Why to consider changing virtualization solutions
    * How to choose the right virtualization solution
    * How to save thousands in virtualization licensing costs

    Speakers:
    * Bhavani Yellapragada, AVP of DevOps, Nasdaq
    * Mike Wronski, Principal Marketing Manager, Nutanix
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Dilan Yuksel, Host, VentureBeat

    Sponsored by Nutanix

Embed in website or blog