Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • Ransomware Wins! User Awareness Doesn't Work! What Do you Do?
    Ransomware Wins! User Awareness Doesn't Work! What Do you Do? Amar Singh & Industry Experts Recorded: Mar 30 2017 55 mins
    Nope this is NOT another webinar on How to Protect Against Ransomware.

    If you reckon that users (yes that includes you and me) are the first line of defence against ransomware! Sorry to break it to you but you are WRONG! We are all humans and we make mistakes and ransomware creators know that.

    You have a choice.Hope and or pray that your awareness training protects your employees and your business from becoming a ransomware victim OR attend this webinar and learn what you can do to protect your business.

    Note: This is not your typical webinar. Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
  • BrightTALK at RSA 2017 - Chris Pierson on Regulation, Cyber Warfare and IoT
    BrightTALK at RSA 2017 - Chris Pierson on Regulation, Cyber Warfare and IoT Josh Downs, Community Manager, BrightTALK & Chris Pierson, CSO, Viewpost Recorded: Mar 30 2017 16 mins
    BrightTALK caught up with Chris Pierson, CSO of Viewpost for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - Regulation and security for new IoT networks
    - Secure DevOps and building defenses in from the ground up
    - V2V (vehicle-to-vehicle) security and how we secure communications between vehicles as the technology kicks off
    - His view, in his role at Viewpost of the evolving threatscape
    - The influence of the alleged Russian meddling in the US presidential election and what it means for cyber warfare moving forwards

    About the Speaker:
    Dr. Chris Pierson is the EVP, Chief Security Officer & General Counsel for Viewpost - a Fintech payments company. He is a globally recognized cybersecurity expert and entrepreneur who holds several cybersecurity and technology patents. Dr. Pierson serves on the Department of Homeland Security’s Data Privacy and Integrity Advisory Committee and Cybersecurity Subcommittee and is a Distinguished Fellow of the Ponemon Institute. Previously, Chris was the first Chief Privacy Officer, SVP for the Royal Bank of Scotland’s U.S. banking operations leading its privacy and data protection program.
  • Detecting Network Threats: What Can Endpoint Data Tell You?
    Detecting Network Threats: What Can Endpoint Data Tell You? Greg Foss, Security Architect, LogRhythm & Chris Berninger, Senior Systems Engineer, Carbon Black Recorded: Mar 28 2017 60 mins
    Data-driven security is the future, but alarm fatigue and data overload continue to hold Security Operations teams back. Fortunately, there are some easy ways to organise and correlate data so you can simplify the threat hunting process and free up your resources to better detect, respond and neutralise advanced threats.

    In this webcast, Greg Foss, Security Architect at LogRhythm, and Chris Berninger, Senior Systems Engineer at Carbon Black, discuss how to proactively search for and detect threats in your network.

    You’ll learn:

    • To use endpoint data to gain visibility into your network and understand what’s really going on in your network
    • How LogRhythm SmartResponse can help orchestrate security operations
    • Threat hunting techniques using Carbon Black within LogRhythm

    Register now to discover how to use insights from endpoint data to best protect your organisation from advanced attacks.
  • BrightTALK at RSA 2017: Chenxi Wang on Diversity and the Future of Cyber Warfare
    BrightTALK at RSA 2017: Chenxi Wang on Diversity and the Future of Cyber Warfare Chenxi Wang, Founder of The Jane Bond Project & Josh Downs, Community Manager, BrightTALK Recorded: Mar 23 2017 11 mins
    BrightTALK caught up with Chenxi Wang, Founder of The Jane Project and Twistlock's Chief Strategy Officer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo Breach and some of her suspected reasons why
    - The influence of the supposed Russian US election hack and what it means for cyber warfare
    - Diversity in the cyber industry and how it can be improved
    - AI & Machine learning and use cases for security
    - The key vulnerabilities in IoT networks that we should be thinking about
  • BrightTALK at RSA 2017: Mark Weatherford on Ransomware, DDoS & Virtualization
    BrightTALK at RSA 2017: Mark Weatherford on Ransomware, DDoS & Virtualization Mark Weatherford, Chief Cybersecurity Strategist at vArmour and Josh Downs, Community Manager at BrightTALK Recorded: Mar 21 2017 10 mins
    BrightTALK caught up with vArmour's Chief Strategist, Mark Weatherford for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The rise of Ransomware and where companies are more vulnerable
    - DDoS and why it's still a key threat to businesses
    - The increased vulnerability of the IoT
    - Challenges for Donald Trump and his new cyber team
    - How to boost equality and diversity in the information security industry
    - How cloud and virtualization are changing the security game

    About the Speaker:
    Mark Weatherford is Chief Cybersecurity Strategist at vArmour, the data center and cloud security company. He was formerly a Principal at the Chertoff Group, was Deputy Under Secretary for Cybersecurity at DHS, was Chief Security Officer at the North American Electric Reliability Corporation (NERC) and was the CISO for the states of California and Colorado. He also served as a cryptologic officer in the US Navy. Weatherford is a Director on the Boards of Coalfire, the Center for Cyber and Homeland Security (CCHS) at the George Washington University, and the National Cybersecurity Center (NCC) in Colorado Springs. He is also on the Advisory Board at both Cylance and AlertEnterprise.
  • GDPR: Ready or not, here it comes
    GDPR: Ready or not, here it comes Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Mar 16 2017 59 mins
    Europe’s General Data Protection Regulation (GDPR) will come into effect on 25th May 2018, leaving all organisations that process the data of EU residents with less than 18 months to meet the stringent requirements of the regulation. Organisations must implement a cloud security strategy that supports compliance and minimises their organisation’s exposure to the new breach notification requirements and financial penalties, as high as 20 million Euros or 4% of total annual turnover.

    Still figuring out how your organisation is going to comply? What actionable steps you should be taking today? Look no further. Join Oliver Pinson-Roxburgh, EMEA Technical Director from Alert Logic for an in-depth discussion about GDPR, highlights include:

    - Cutting through the ambiguity and focusing on the key cloud security considerations
    - Data breach responsibilities and what that means to your organisation
    - What is the role and expectation of your cloud provider when it comes to GDPR
    - Insight into real-life case studies

    Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
  • Operationalizing Threat Intelligence
    Operationalizing Threat Intelligence Igors Konovalovs, Sales Director, EMEA, FireEye iSIGHT Intelligence Recorded: Mar 16 2017 45 mins
    Learn how intelligence-led organizations globally apply threat intelligence to prioritize vulnerability patching, accelerate incident response, reveal strategic risks and plan cyber security investments.

    Amongst other things this webinar will provide insight into:
    1. Importance of visibility over an entire attack lifecycle
    2. How NATO military doctrine for intelligence collection & analysis can be applied in a commercial environment
    3. Key Threat Hunting skills and requirements
  • Cyber Attack Trends 2017 & Beyond: Protecting your business from cyber criminals
    Cyber Attack Trends 2017 & Beyond: Protecting your business from cyber criminals Steve Durbin, Managing Director, ISF Ltd Recorded: Mar 16 2017 47 mins
    As the scale and sophistication of cyber attacks increases, businesses need to manage risk in ways beyond those traditionally handled by the information security function.

    In this webinar, Steve Durbin, Managing Director, ISF will offer insights into how security and business teams across the organisation can work together to minimise the impact of cyber attacks on shareholder value and business reputation.
  • [Live Panel] Threat Hunters in Action
    [Live Panel] Threat Hunters in Action Josh Downs, BrightTALK (moderator), Jens Monrad, FireEye & Amar Singh, Cyber Management Alliance Recorded: Mar 16 2017 59 mins
    Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally by 2021, up from $3 trillion in 2015. Every industry and government is at risk, highlighting the need for stronger cyber defence.

    This live panel will focus on the tools and techniques threat hunters use to patrol your networks, mitigate threats and remove unwanted presence.
  • Jenny Radcliffe - Threat Hunters in Action - Social Engineering Inside Out
    Jenny Radcliffe - Threat Hunters in Action - Social Engineering Inside Out Jenny Radcliffe, Director, Jenny Radcliffe Training Recorded: Mar 16 2017 44 mins
    For the Threat Hunters in Action series, this webinar presents a guide to how social engineering forms a large part of insider threats within organisations.

    Learn how insider threats are created and manipulated by external parties as well as how organisations help create their own insider threats through cultural and behavioural factors.

    The webinar will give advice on how to spot individuals "within the family" who may have malicious intentions towards the business, and gives advice on how to manage the problem within an organisation.

Embed in website or blog