Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • The State of Cloud Security
    The State of Cloud Security Eric Hibbard, Hitachi Data Systems, Mark Carlson, Co-Chair SNIA Tech Council, Toshiba Recorded: Jul 20 2017 63 mins
    Standards organizations like SNIA are in the vanguard of describing cloud concepts and usage, and (as you might expect) are leading on how and where security fits in this new world of dispersed and publicly stored and managed data. In this webcast, SNIA experts Eric Hibbard and Mark Carlson will take us through a discussion of existing cloud and emerging technologies (such as the Internet of Things (IoT), Analytics & Big Data, and so on) – and explain how we’re describing and solving the significant security concerns these technologies are creating. They will discuss emerging ISO/IEC standards, SLA frameworks and security and privacy certifications. This webcast will be of interest to managers and acquirers of cloud storage (whether internal or external), and developers of private and public cloud solutions who want to know more about security and privacy in the cloud.

    Topics covered will include:

    Summary of the standards developing organization (SDO) activities:
    - Work on cloud concepts, CDMI, an SLA framework, and cloud security & privacy
    Securing the Cloud Supply Chain:
    - Outsourcing and cloud security; Cloud Certifications (FedRAMP, CSA STAR)
    Emerging & Related Technologies:
    - Virtualization/Containers, Federation, Big Data/Analytics in the Cloud, IoT and the Cloud
  • Digital Business is Here - Is your Trust Infrastructure Ready?
    Digital Business is Here - Is your Trust Infrastructure Ready? Mike Hathaway, Aaron Davis Recorded: Jul 20 2017 57 mins
    The move to digital business is exposing the limits of existing trust infrastructures. Rapid growth in the number of deployed certificate authorities (CAs). Increased burden on multiple PKI point solutions deployed to address specific problems. And while IT grapples to support tactical implementations of PKI, the demands of digital business overwhelmingly require a more strategic and holistic approach.

    What's required is a centralized yet agile overarching trust framework that can easily accommodate multiple use cases today and in the future.

    This webinar looks at the steps you can take to build an agile trust infrastructure with a centralized PKI deployment.

    * Digital Trust at Scale Learn how to build a PKI that supports endpoint diversity, evolving and multiple use cases and integration with complimentary solutions.
    * Streamline PKI Deployment Discover how a trust infrastructure can be deployed and managed across your organization to mete the requirements of today's dynamic and distributed business models
    * Simplify 3rd Party CA Key Migration Find out how you can migrate certificates from other vendor systems without having to distribute a new trust anchor and without the need to generate new keys and certificates.
  • NotPetya - 3 Steps to Prepare for the Next Ransomware Attack
    NotPetya - 3 Steps to Prepare for the Next Ransomware Attack Nadir Izrael, CTO & Co-Founder, Armis Recorded: Jul 17 2017 44 mins
    Much of the world was still scrambling to patch and clean up from WannaCry ransomware attack when the (not)Petya attack hit. While (not)Petya relied on Eternal Blue, just as WannaCry did, it had a few new tricks.
    - No Kill Switch – There doesn’t appear to be a kill switch URL, so (not)Petya can’t be shut down simply by purchasing a domain name.
    - Lateral Movement – The new attack includes additional exploits so it can move laterally through the network and infect other devices.
    - New Unmanaged Devices – Reports say the attack hit point of sale devices and ATMs, in addition to the laptops and desktops.

    Join Nadir Izrael, CTO of Armis, and former Captain in the Israel Intelligence 8200 Group, to discuss the 3 steps you should take to prepare for the next ransomware attack. And, why your weakest link now exposures your entire enterprise.

    About the Presenter:
    As co-founder and CTO, Nadir Izrael guides the technology vision behind Armis to protect unmanaged and IoT devices. He co-founded the company in 2015 with its CEO, Yevgeny Dibrov. Prior to Armis, worked at Google as senior software engineer. Before Google, Nadir spent six years in the Israeli army, specifically in unit 8200, where he designed and programmed software projects and systems, served as team leader and did officer’s training attaining the rank of captain.
  • Impact of NotPetya & Top Recommendations for Defending Against the Next Big One
    Impact of NotPetya & Top Recommendations for Defending Against the Next Big One Greg Bell (Corelight), Stephen Boyer (BitSight), Michael Landewe (Avanan), Brian Robison (Cylance) Recorded: Jul 13 2017 62 mins
    In the aftermath of the recent NotPetya/ExPetr cyber attack that spread across Europe, Asia and the US in June, what are the lessons for enterprises and organizations? How should we improve our critical data security in an age of high-frequency and high-impact cyber attacks?

    Join this interactive Q&A panel session with security experts from Cylance, Corelight and BitSight as they discuss:
    - Trends in cyber attacks: NotPetya / Wannacry
    - The short-term and long-term impact
    - Tips for organizations on how to improve their security posture
    - Steps to take today and insights to guide your long-term security strategy

    Speakers:
    - Greg Bell, CEO of Corelight
    - Stephen Boyer, CTO & Co-founder of BitSight
    - Michael Landewe, Co-Founder of Avanan Cloud Security

    Moderator:
    - Brian Robison, Sr. Director of Technical Marketing, Cylance
  • Petya Ransomware Attacks: Autopsy and Lessons to Learn
    Petya Ransomware Attacks: Autopsy and Lessons to Learn Josh Downs, BrightTALK; Ben Bartle,Barracuda Networks & Amar Singh, Cyber Management Alliance Recorded: Jul 13 2017 55 mins
    The only thing that can stop the security world discussing WannaCry was another large ransomware attack; which is exactly what happened at the end of June in the shape of Petya / notPetya / Goldeneye.

    The attacks compromised several global organisations and hit the headlines worldwide.

    In this session the moderator and panelists will cover the following:

    Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune into this session to get the lowdown on where the attacks came from; who was behind them; what they mean for the cyber security industry and how you can improve the protection for your business the next time something similar rolls along.

    PANELISTS:


    - Josh Downs, Senior Community Manager, BrightTALK (moderator)
    - Ben Bartle, Technical Engineer, Barracuda Networks
    - Amar Singh, CEO & Founder, Cyber Management Alliance
  • NotPetya Attack - Cybercrime or Cyberwar?
    NotPetya Attack - Cybercrime or Cyberwar? Malcolm Harkins (Cylance), Erika Noerenberg (LogRhythm Labs), Nadir Izrael (Armis), Michael Landewe (Avanan) Recorded: Jul 12 2017 64 mins
    The NotPetya pandemic that started in late June and disrupted the operations across companies, utilities, government agencies across France, Russia, Spain, Ukraine and the United States, happened just weeks after the WannaCry ransomware attack. Was NotPetya a financially motivated ransomware attack or an act of cyberwar?

    Join this interactive Q&A session with industry experts and find out the answers to your Petya/NotPetya questions. The topics up for discussion will include:
    - Difference between cybercrime and cyberwar
    - Industries targeted in the NotPetya attack
    - Short-term and long-term impact of this attack
    - Requirements and recommendations for strengthening cyber defense

    Speakers:
    - Malcolm Harkins, CSO of Cylance
    - Erika Noerenberg, Threat Research Engineer, LogRhythm Labs
    - Nadir Izrael, CTO of Armis

    Moderator:
    - Michael Landewe, Co- Founder of Avanan Cloud Security
  • Building Breach Notification into your IR process post-GDPR
    Building Breach Notification into your IR process post-GDPR Jamie Cowper, Director, IBM Resilient, Jessica Cholerton, Product Specialist Recorded: Jul 12 2017 62 mins
    The rise in large scale data breaches has been accompanied by a growing number of data privacy reporting regulations across the world. The latest of these, the General Data Protection Regulation (GDPR) will require companies to notify the regulator of a serious incident within 72 hours.

    Companies therefore need to look at their cybersecurity incident response plans and how technology can be leveraged to improve their ability to detect and respond to security incidents faster.

    Join IBM Resilient on July 12 at 2pm to review how organisations can build in data privacy reporting into their incident response strategy whilst using security automation and orchestration tools to enhance their IR processes.

    Attendees will learn:

    •The latest on breach notifications and GDPR; what actions are expected of organisations if data belonging to EU citizens is compromised.

    •How to operationalise GDPR using automation and orchestration to improve IR processes

    • A broader view of global and vertical data breach reporting requirements.

    •What benefits can be achieved through the deployment of an Incident Response Platform (IRP)
  • [Ask the Expert Q&A] McAfee's Raj Samani on the Petya Ransomware Attacks
    [Ask the Expert Q&A] McAfee's Raj Samani on the Petya Ransomware Attacks Raj Samani, Chief Scientist, McAfee Recorded: Jul 12 2017 45 mins
    - Interactive audience Q&A -

    Fresh of the heels of WannaCry this week has seen the Petya / notPetya / Goldeneye attacks strike many global organisations in a wave of devastating ransomware attacks.

    Questions need to be raised though:

    - Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune in live to this interactive ask the expert webinar with McAfee Chief Scientist Raj Samani as he takes your questions on the attacks and suggests ways that you can defend yourself from similar variations in the future.
  • What You Need To Know About Petya/NotPetya & Cyber Attack Protection
    What You Need To Know About Petya/NotPetya & Cyber Attack Protection Eric Hanselman (451 Research), May Wang (ZingBox), Ted Harrington (ISE), Mike Ahmadi (Synopsys) Recorded: Jul 11 2017 59 mins
    Another widespread cyber attack in late June wreaked havoc across businesses, organizations, banks, government agencies, utility companies, shipping companies, and even power plants. Was this a ransomware attack or something more sinister?

    Join this panel of industry leaders and security experts for an interactive session on:
    - Why cybersecurity is a key focus for enterprises and organizations worldwide
    - Why ransomware protection is more crucial than ever
    - How to best prepare against future cyber attacks
    - Steps your organization should take today to ensure data security. Short term steps and long-term strategy

    Speakers:
    - May Wang, Co-founder & CTO of ZingBox
    - Ted Harrington, Executive Partner at Independent Security Evaluators
    - Mike Ahmadi, Director of Critical Systems Security, Synopsys Software Integrity Group

    Moderator:
    - Eric Hanselman, Chief Analyst at 451 Research
  • NotPetya: Ransomware Or a Cyber Attack in Disguise
    NotPetya: Ransomware Or a Cyber Attack in Disguise Scott Crawford (451 Research), Joseph Carson (Thycotic), Omri Moyal (Minerva), Dan Daggett (Phantom Cyber) Recorded: Jul 10 2017 58 mins
    The major ransomware attack that spread across the world in late June struck large pharmaceutical companies, Chernobyl radiation detection systems, the Kiev metro, an airport, banks, hospitals and government agencies. Was this a financially motivated cyber attack or something more sinister? Is the worst over or is there more to come?

    Join this panel of cybersecurity experts as they go over the details of this attack, what it means for organizations worldwide and how to better protect against ransomware.

    Topics up for discussion:
    - Detailed account of this cyber attack
    - What is NotPetya? How is it different from Petya and Wannacry?
    - What is the impact of this ransomware attack?
    - What you should do today to better protect your organization

    Speakers:
    - Joseph Carson, Chief Security Scientist at Thycotic
    - Omri Moyal, Co-Founder & Vice President of Research, Minerva
    - Dan Daggett, Security Solution Architect, Phantom Cyber

    Moderator:
    - Scott Crawford, Research Director, Information Security Channel at 451 Research

Embed in website or blog