Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • GDPR: Cutting Through the Noise
    GDPR: Cutting Through the Noise Alex Jordan, Senior Analyst, ISF LTD Recorded: May 24 2018 47 mins
    Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

    So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

    Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

    -The ISF’s phased approach to GDPR implementation
    -Ways to determine the criticality of data and how to protect it appropriately
    -The urgent actions that a business can take to get GDPR compliance started
    -Common myths surrounding the GDPR, and guidance on cutting through the noise.
  • The Board's Role in Balancing Risk & Reward
    The Board's Role in Balancing Risk & Reward Steve Durbin, Managing Director, ISF LTD Recorded: Apr 26 2018 46 mins
    Cyber has become a strategic issue and for many companies is now a business enabler and increasingly a form of competitive advantage. However it is clear that it remains difficult for Board's to get the “right” management information to support their cyber risk discussions and decision making.

    So how can Board's ensure that they are asking the right questions when it comes to an organisation’s cyber posture and how can CISOs maintain and improve the Board’s attention in this fast-moving space? This webinar will look at the challenges faced by CISOs and Board members and offer insights into how to successfully approach cyber security at Board level.

    About the presenter:
    Steve Durbin is Managing Director at the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • The hackers are winning: Deploy your secret weapon
    The hackers are winning: Deploy your secret weapon Rob Shapland, Principal Cyber Security Consultant, First Base Technologies Recorded: Apr 26 2018 46 mins
    How to make your staff your first and last line of defence.

    Learn how to:
    •Identify your enemy and their tactics
    •Discover why technological defences will lose to hackers
    •Learn how to make staff genuinely care about security

    About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies

    Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
    He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
    He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
  • The Rise and Rise of Ransomware: Prepare and Protect
    The Rise and Rise of Ransomware: Prepare and Protect Nick Frost, Principal Consultant, ISF Recorded: Mar 20 2018 49 mins
    The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

    With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

    In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

    About the presenter:

    Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
  • SD-WAN is Dead. Long Live Secure SD-WAN!
    SD-WAN is Dead. Long Live Secure SD-WAN! Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: Mar 20 2018 46 mins
    In the age of Digital Transformation, SD-WAN is on the lips of all enterprises and service providers. While the operational and commercial benefits of SD-WAN are clear, the focus on these as THE consideration is dangerous, as along its benefits comes a greater cyber security risk.

    This session will focus on Secure SD-WAN and the built-in benefits it provides, from both the operational and security points of view.
  • Risk-Centric Security in a World of Innovation
    Risk-Centric Security in a World of Innovation Lee Waskevich, VP, Security Solutions, ePlus; Mitchell Bezzina, Security Evangelist, SecDo Recorded: Mar 15 2018 62 mins
    This webinar will detail how to apply AI and automation to assist security team members, from CISOs to SOC/IR operators, allowing the team to become proactive in defense and best serve the new needs of innovative companies. We will cover:

    o Considerations of implementing automation without an increase in workload

    o How to reduce risk by 98% with current staff and no longer "overlooking" a de-prioritized or quarantined alert

    o What it takes to go from alert triage to incident response and remediation in less than 10 minutes

    o How to become proactive in defense by utilizing knowledge from investigations to increase network defense

    o An ROI template allowing you to justify costs for new budget
  • Basic Security with Cryptocurrencies
    Basic Security with Cryptocurrencies Travin Keith, Managing Director at Agavon, Co-Founder at SICOS, and Administrator at BitcoinMarkets Recorded: Mar 14 2018 56 mins
    With the burst of interest into cryptocurrencies, there have been a lot of new users into this innovative world. However, the rush into the space has caused many users to skip key steps in joining the cryptocurrency community, such as understanding what basic security practices they should follow in order to keep themselves and their money secure.

    While there are technical steps to take to secure one's funds, there's also a number of things to keep in mind while interacting with the community.

    This webinar discussion aims to give beginners in the world of cryptocurrencies tips to better protect themselves, their money, and their sanity.
  • GDPR's influence on security
    GDPR's influence on security Rob Shapland Recorded: Feb 22 2018 43 mins
    Will GDPR have the desired effect? Will it increase security, or see companies regularly hit with catastrophic fines for poor compliance.
  • Protect, Detect, Respond and Recover: Strategies to mitigate Security risks
    Protect, Detect, Respond and Recover: Strategies to mitigate Security risks Kevin King Recorded: Feb 12 2018 58 mins
    As more of our physical world becomes digital, from thousands of websites sites being hacked, to malware attacks, 2017 saw a myriad of devastating cyber-attacks and hacks. Given this, you can’t help but wonder if you are at risk and if you are really prepared?

    Organizations today are becoming increasingly concerned about the accelerating pace of change — and also, sophistication — in the global cyber threat landscape.

    Join us for this webinar as we explore ways to more effectively mitigate risks, respond to attacks, and recover. Key Takeaways include:

    - How to Predict, Prevent, detect & Respond to sophisticated threats including Ransomware

    - Key Elements of a Risk-Based IT Security Strategy

    - Best Practices and Proactive Strategies to Mitigate Cyber threats
  • Cyber security Skills Gap: How modern attack vectors affect the cyber workforce
    Cyber security Skills Gap: How modern attack vectors affect the cyber workforce Regine Bonneau Recorded: Jan 25 2018 46 mins
    Cybersecurity Skills Are in High Demand, Yet in Short Supply. The growing number of recent cybersecurity attacks highlights a shortage of skilled workforce in the cybersecurity industry, predicted to reach around 1.8 million workers by 2022. These challenges will also be impacted by evolution of IoT/ IoE and Artificial intelligence, which represents an unprecedented opportunity to connect people, processes, data, and things.


    Key Takeaways include:

    - Is Automation an answer to the skill gap?

    - Maintaining security in the face of growing cyber risks and threats

    - How the arrival of AI & IoT in both our personal and business lives will create a skills gap that will require both the retooling of people’s existing skillsets and the wide-scale hiring of new workers

Embed in website or blog