Hi [[ session.user.profile.firstName ]]

UKI IT & Information Security

  • Date
  • Rating
  • Views
  • What does your Business need to know about Encryption?
    What does your Business need to know about Encryption?
    Stephen Cobb, Senior Security Researcher, ESET Recorded: Mar 19 2014 59 mins
    With confidential data under attack on many fronts, it is time to look at how encryption can protect data access and what your business could be doing to employ encryption, from servers to endpoints to removable media.
  • Payment Industry Data Breaches
    Payment Industry Data Breaches
    Nicholas J. Percoco, Director – Information Protection, KPMG Recorded: Mar 18 2014 49 mins
    This presentation will take a look at the current state of the payment industry and provide experienced-based insight into why this industry continues to become a victim of data breaches. We’ll discuss short comings associated with the current controls employees by many merchants and payment processors and what new tactics can be applied to provide attack mitigations.
  • Using Hackers' Own Methods & Tools to Defeat Persistent Threats
    Using Hackers' Own Methods & Tools to Defeat Persistent Threats
    Michael Davis, CTO, CounterTack Recorded: Mar 12 2014 40 mins
    In today’s world of advanced persistent threats, security professionals need to implement new methods and strategies to gain the upper hand in protecting their business. Thinking like an attacker isn't really good enough. However, incorporating hacker methodologies & tools will give security teams the situational awareness and intelligence needed to respond quickly to new & previously unknown threats.

    Thinking like an attacker isn't good enough, nor are traditional solutions, as smart adversaries already know which technologies they'll disable on your system. However, incorporating the right hacker-like methods and tools can give security teams a new level of situational awareness and context needed to respond quickly to targeted, persistent threats.

    Attendees will learn a new approach consisting of four fundamentals: Detect, Remediate, Analyze and Resist. The presentation will provide detailed information including how to:

    • Use attacker technology and tools against adversaries to detect their presence on all endpoints
    • Incorporate the same stealth techniques that attackers use to remain hidden from you - so you can monitor them
    • Leverage forensics at the point of attack to better understand the overall threat
    • Use big data analytics to collect and analyze behavioral data across the enterprise
  • Defending the Enterprise: Staying Secure in the Face of New Threats
    Defending the Enterprise: Staying Secure in the Face of New Threats
    Rocky DeStefano, VP Strategy and Technology, Click Security Recorded: Mar 12 2014 48 mins
    Advanced adversaries refining techniques hourly against a highly complex and constantly evolving enterprises with a Security team that is overwhelmed at a disadvantage immediately causes a chasm in overall Risk for most organizations. Learn how the best teams create more defensible state through enhanced visibility and advanced analytics in order to reduce the risk gap and quickly close any window of opportunity for an attacker.
  • 2014 – the Year of Data Encryption and Data Protection
    2014 – the Year of Data Encryption and Data Protection
    Jay SCARAMAZZO, CIPM, CIPP/E, CIPP/US, CIA, CISA, CRISC, CRMA, ACDA, CSPO, CIFE, MBA Recorded: Mar 11 2014 40 mins
    Data Encryption has been spoken about for years, but finally ENCRYPTION importance has come front-page. From the recent Snowden NSA Affair to major data breaches at Target, companies now have no choice but to consider securing their data at the source.

    This presentation will introduce you to your responsibilities in providing your customers with the Due Diligence (Risk Control and Executive Management Oversight) and Due Care (Continuous Monitoring through Security Practices, Procedures, Policies, Processes and Standards) that their personal data deserves.
  • HIMSS 2014 recap:  Latest trends seen at HIMSS
    HIMSS 2014 recap: Latest trends seen at HIMSS
    Lysa Myers, Security Researcher at ESET Recorded: Mar 5 2014 55 mins
    ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy.
  • Institutionalizing Cyber Protection for Critical Assets
    Institutionalizing Cyber Protection for Critical Assets
    Dr. Ron Ross, Computer Security Division, Information Technology Laboratory Recorded: Feb 26 2014 35 mins
    In this webinar, Ron answers the question, "how do we provide for the common defense in the digital age?" With continuous advances in technology, this question can pose a big problem for organizations developing or modifying a security strategy.

    Join Ron as he covers the basics of defense against the most problematic vulnerabilities, the tools at your disposal to fight them, and a T.A.C.I.T security strategy that you can implement today in your organization.
  • Redefine Threat and RIsk Management
    Redefine Threat and RIsk Management
    Davi Ottenheimer, Senior Director of Trust, EMC Corporation Recorded: Feb 20 2014 48 mins
    The rising scale and complexity of IT has opened more opportunities than ever for abuse and attack. Can our latest advances in data science and software-based environments also redefine threat and risk management options? This presentation highlights examples of new and innovative approaches that successfully have reduced risk even across different-sized organizations.
  • Privacy as a Disruptive Force: Presenting New Risks and Opportunities
    Privacy as a Disruptive Force: Presenting New Risks and Opportunities
    Jeff Northrop Recorded: Feb 19 2014 32 mins
    Privacy risk mitigation is not just regulatory compliance. The public is setting the tone for what is appropriate for information that is not yet regulated. And it is within that space, the unregulated space, where the big risks and career opportunities lay. Tune in to hear how privacy is an emerging disruptive force in infosec.
  • The Anatomy of iOS and Android Attacks and How to Stop Them
    The Anatomy of iOS and Android Attacks and How to Stop Them
    Michael Shaulov, co-founder and CEO of Lacoon Mobile Security Recorded: Feb 19 2014 49 mins
    Hear from mobile security experts how mobile attacks are perpetrated and what can be done to stop them. Michael Shaulov, co-founder and CEO of Lacoon Mobile Security, will discuss the current mobile threat landscape and the anatomy of emerging iOS and Android attacks. He will explain why existing security solutions are simply not equipped to protect enterprises from the emerging advanced mobile threats facing most enterprises today. Shaulov will also provide the new requirements for security in this mobile age and detail the capabilities needed to effectively detect and mitigate the wide variety of mobile threat vectors. Attendees should walk away from this presentation with a clear understanding of the risks they are facing and how they can effectively manage and embrace mobility, without fear.

Embed in website or blog