Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • Challenges in Data Privacy
    Challenges in Data Privacy Craig Scoon, Consultant in the Risk Advisory Service at Deloitte Recorded: Sep 14 2017 40 mins
    There are many challenges for data privacy legislation within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem seems to constantly be playing catch-up.
    This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz),
  • State of Cloud Adoption in Asia Pacific (APAC)
    State of Cloud Adoption in Asia Pacific (APAC) Ekta Mishra, Research Analyst of CSA and David Siah, Country Manager of TrendMicro Singapore Recorded: Sep 13 2017 36 mins
    Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.

    During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.
  • Security Challenges of the IoT Within Healthcare
    Security Challenges of the IoT Within Healthcare Minatee Mishra, Software Architect & Lead of the Security Centre of Excellence, Philips HealthTech Recorded: Sep 13 2017 49 mins
    Healthcare industry would be one of the major adopters of IoT. What are the security challenges of healthcare industry? How does IoT change the security equation in healthcare?

    Presenter:

    Minatee leads the Security Center of Excellence (ScoE) in Philips HealthTech and has been instrumental in setting up the SCoE within Philips. The SCoE , which is a central organization responsible for doing cutting edge work in the field of security testing, doing secure code analysis , finding the vulnerable components within the software and more. Minatee has been in the field of software for 18 years right from designing and architecting systems to securing in systems, She has a bachelors in electrical engineering from NIT and Masters from IIT Kharagpur. She holds CISSP, GCIH, CEH certifications. She has been a speaker at various forums/conferences like RSA, RISC, NullCon, BPM etc.
  • IT is from Mercury, ICS is from Mars
    IT is from Mercury, ICS is from Mars Dick Bussiere, Technical Director, Tenable Network Security Recorded: Sep 13 2017 37 mins
    IT and ICS networks are as different as Mars is from Venus.

    This session will give the audience insight into the differences between IT environments and ICS environments, both from an operational and technical perspective.

    We will offer some ideas for how these critical networks should be monitored and secured.
  • An Elegant and Practical Model for Security Practitioners
    An Elegant and Practical Model for Security Practitioners Steve Ledzian, FireEye APAC Recorded: Sep 12 2017 48 mins
    "Prepare, Respond, Assess" … "Prevent, Detect, Respond" … Security professionals are awash in a myriad of buzzwords triads and theoretical frameworks.

    Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
  • The Second Coming of Ransomware - Insights into New Developments
    The Second Coming of Ransomware - Insights into New Developments Amar Singh Recorded: Sep 12 2017 54 mins
    We are excited to bring you an updated version of our hugely popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next". Traditional ransomware, for the want of a better word, is boring and truthfully a fairly opportunistic way to make money. Guess what, criminal gangs don't believe in opportunistic attacks that may make them money. They want a certain assurance of success and importantly, they want big bucks.

    Modern ransomware is going to be able to deliver this and more to anyone who can pay top dollar.

    Join global CISO and cybersecurity expert, Amar Singh, as he shares his insights and experience on the murky world of cyber crime and ransomware and how you can be better prepared to manage this growing threat.
  • Security According to Leafcutter Ants
    Security According to Leafcutter Ants Mike Chung, Drs. Ing. RE CISSP, Associate Partner at IBM Security Recorded: Aug 25 2017 49 mins
    Humans have been protecting our complex network infrastructures for decades with varying degrees of success, while eusocial insects such as ants are capable of withstanding countless attacks on their networks.

    This presentation is about what ants in general and Leafcutter Ants in particular approach security and how we can learn from these survivors of millions years of warfare.

    You will learn:
    -How social insects (ants) are dealing with predictive analysis
    -Applying the defense mechanism of ants on threat intelligence
    -How information sharing and communication can lead to better security
    -Data and Identity Management
  • Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR
    Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR Nicola Franchetto of ICT Legal Consulting Recorded: Aug 17 2017 60 mins
    Nicola Franchetto will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Franchetto will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
  • GDPR Privacy Impact and Risk Assessments
    GDPR Privacy Impact and Risk Assessments Ariel Evans, CEO, InnoSec Recorded: Aug 17 2017 49 mins
    - InnoSec is the winner of the EU commission Horizon 2020 grant based on its innovation in GDPR and cyber risk -

    GDPR is an urgent issue that has companies scrambling to be compliant by May of 2018. Any organization that processes EU citizen data is in scope and the penalties are severe.

    Alignment with the requirements can reduce the chances of triggering a Data Protection Authority (DPA) to investigate a company’s privacy practices after the GDPR takes effect in May 2018. DPAs can impose a fine on companies of up to 4% of annual global revenues for egregious violations of the GDPR. Member states can also add to these fines. The Netherlands, for instance, has more than doubled its own fining capacity to 10% of annual revenues. European privacy advocates are pressuring DPAs to fully exercise these new powers after May 2018.To manage this risk, multinationals should have a means to demonstrate alignment with the GDPR requirements and communication of this program with DPAs that have jurisdiction over their major European operations.

    InnoSec’s GDPR solution provides privacy impact and risk assessments which measure the confidentiality and integrity of the system and the risk associated to it meeting articles 1,2, 5, 32, 35 and 36. Additionally, we provide a readiness gap analysis for managing, planning and budgeting for GDPR.

    Most e-commerce, educational and multi-national organizations process EU citizen data and are in scope for GDPR. Moreover, most organizations are not ready according to Gartner and his means the race to the finish line requires as much automation as you can afford. InnoSec provides a means for companies to save money and time with their GDPR assessment and gap analysis offering.. Our GDPR offering automates the assessment process and provides a gap analysis readiness feature, that also ensures that organizations can plan, budget and manage their GDPR program.

    Come to this webinar to see how it is done.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018?
    BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Sian John, Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case Recorded: Aug 17 2017 63 mins
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.

Embed in website or blog