Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Digital GRC: Innovations for Early Identification and Management of Risk
    Digital GRC: Innovations for Early Identification and Management of Risk Moderated by Colin Whittaker; Yo Delmar, MetricStream; Jason Ford, Contegix; and Cameron Jackson, Riskonnect Recorded: Nov 16 2017 62 mins
    Attendees can earn 1 CPE credit on this session.

    Digitization has become deeply embedded in enterprise strategy, as nearly all businesses and activities have been slated for digital transformations. The significant advantages of digitization, with respect to customer experience, revenue, and cost, have become increasingly compelling, and we are starting to see digital transformations in risk create real business value by improving efficiency and the quality of risk decisions.

    The state of risk management at most global, multiregional, and regional banks is abundant with opportunity. Current processes are resource intensive and insufficiently effective, as indicated by average annual fines above $400 million for compliance risk activities alone. By improving the efficiency and effectiveness of current risk-management approaches, digital risk initiatives can reduce operating costs for risk activities by up to 30 percent, and a digitized risk function can provide better monitoring and control and more effective regulatory compliance. On this webinar our panel of experts will discuss digital innovations for risk management success.
  • Security Heretic: What got us here, won't get us there
    Security Heretic: What got us here, won't get us there Gary Marsden, Senior Director of Data Protection Solutions at Gemalto Recorded: Nov 16 2017 57 mins
    Cybersecurity is at a crossroads and requires a dramatic shift to adequately support the needs of business owners and security administrators as digital transformation challenges their needs and investments. Managing multiple cloud providers and dramatic increases in the number of endpoints generating data and the subsequent volume of data means enterprise security teams no longer have the requisite skills and bandwidth to deal with complicated security products. Building in security from the beginning quickly and cost-effectively is an industry game changer, especially with new growth markets like Big Data, Blockchain, Cloud Computing, Internet of Things and Digital Payments.

    Multi-cloud environments and government regulations and industry compliance add to the complexity of maintaining a manageable and effective data protection strategy. Transforming encryption and key management (data protection in general) into a click and deploy model reduces internal business barriers between security teams, DevOps and product teams and alleviates disparate security policies, so you know where your data is and that it is secure. The way people consume security is changing by taking an on-demand approach similar to the Netflix philosophy. In this webinar, we will discuss how cloud-based security is simplifying workflow processes, changing cost/benefit models to drive us towards a pervasiveness of encryption and key management that will de-risk data and connectivity in similar ways to anti-virus and firewalls.

    Join this interactive presentation to learn about:
    • The role of security in today's connected world
    • The drivers for and impact of simplifying security on business and workflow
    • How security is providing valuable business intelligence through connected systems and meeting compliance mandates
    • Gemalto’s solution to solving on-demand data protection
    • Upcoming cybersecurity trends and how to prepare
  • Stopping the Hack: Using Advanced Analytics to Detect and Respond to Attacks
    Stopping the Hack: Using Advanced Analytics to Detect and Respond to Attacks Christopher Camejo, Director of Product Management for Threat Intelligence at NTT Security Recorded: Nov 16 2017 59 mins
    Getting hacked is now a matter of “when”, not “if. As a result, the ability to detect and respond to attacks before significant damage is done has become one of the most important issues in information security.

    A wide variety of tools and services are available with new technologies and capabilities being introduced regularly.

    We will take a look at the important considerations for organizations seeking to monitor their network security via in-house resources, commercial tools, and/or managed security services. This will include important factors that will dictate the cost and effectiveness of security monitoring efforts.

    About the Presenter:
    Christopher Camejo has more than 18 years of security experience, and has been with NTT Security for over 15 years with experience in the Security Operation Center, developing and supporting a managed email security service, and implementing security solutions before moving on to start the US ethical hacking team and GRC practices. He has coordinated and conducted numerous large-scale, multi-discipline penetration tests and PCI assessments for NTT Security’s global clients.

    As part of NTT Security’s threat intelligence capabilities, Chris follows the latest tactics and techniques of attackers, coordinates NTT Security’s vulnerability identification and disclosure activities, and helps educate NTT Security’s clients, clients from various other NTT operating companies, and the public on how to address strategic information security risks. He has presented at RSA Conference, Infosec World, the ISSA Conference, Computerworld Expo, and at United States Secret Service Electronic Crimes Task Force meetings.
  • Top cyber threats in the financial sector
    Top cyber threats in the financial sector Candid Wueest, Principal Threat Researcher, Symantec Recorded: Nov 16 2017 49 mins
    Financial institutions are increasingly facing attacks on multiple fronts.

    Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions. While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing new types of attacks in the form of large-scale financial heists.

    Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards. They are using living off the land and fileless attack tactics similar to APT groups. But also extortion with DDoS attacks or business email compromise (BEC) scams are increasingly bothering financial corporations.

    In this webcast on the current financial threat landscape, Symantec takes a look at the most prevalent and significant financial threats.

    In this webcast we will review:
    - The top threats facing financial institutions with statistics and examples
    - Explore the most common techniques employed in financial attacks
    - Provide case studies of the most high-profile financial attacks of the past 12 months
  • Emerging Cyber Threats for 2018
    Emerging Cyber Threats for 2018 Steve Durbin, Managing Director, ISF Ltd Recorded: Nov 16 2017 47 mins
    While cyberspace continues to provide opportunities for organisations they risk becoming disorientated and losing their way in a maze of uncertainty, as they grapple with complex technology, proliferation of data and increased regulation.

    In this webinar Steve Durbin, Managing Director, ISF, discusses the threats organisations will be facing in 2018 and offers insights into how to address them.
  • 2018 - The New Targets and New Technologies
    2018 - The New Targets and New Technologies Ulf Mattsson, David Morris, Rich Morrell, Juanita Koilpillai Recorded: Nov 15 2017 64 mins
    2018 is bringing new Threats & Technologies.
    Viewers will learn:
    • Case studies and Current trends in Cyber attacks
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    Juanita Koilpillai is President at Digital Risk Management Institute. She
    Coauthored the Software Defined Perimeter Specification sponsored by the Cloud Security Alliance, Developed a Security Risk Index System adopted by NIST to calculate risk of moving applications to the cloud, She is a Key member of FEMA’s Enterprise Security Management Team: drafting U.S. Government’s initial Critical Infrastructure Protection Plan Led the team that developed the 1st security event & incident response system: sold to Symantec and Led the team that deployed the 1st modern Air Traffic Control System for the FAA.

    Rich Morrell is CTO and Managing Director of Falanx Group - Cyber Defence, CISO and Director of Cloud Security Alliance. Former Senior Security Strategist at Red Hat. Former CTO at Gartner Global Security Risk Practice. Founder and co-author of SmoothWall protecting over 200m networks globally since 2000.
  • Tackling the f-word: The smarter approach to ad fraud
    Tackling the f-word: The smarter approach to ad fraud Emily Storino, Network Strategy Lead, Electronic Arts (EA) Recorded: Nov 15 2017 61 mins
    Ad fraud isn’t becoming more prevalent -- the fraudsters are just getting slicker. From bot nets to device ID spoofing, the tricks are getting more sophisticated, and raking in more and more cash for the swindlers.

    Staying ahead of the fraudster’s learning curve is the key — and collaboration is the crucial element. While vendors and advertisers are directly impacted by fraud, tracking partners provide the technology to help fight fraud – all three players have to work together to circle the wagons.

    Making a game plan can be complex, when there are no clear benchmarks for defining or measuring fraud, as each player defines it differently and different benchmarks are needed for each app type, geo, traffic source, and so on.

    Join this VB Live event to learn how to tackle that complexity, how to define benchmarks, detect and manage fraud, and work with your partners to circle the wagons against the fraudsters.

    Register for free!

    You’ll learn:
    * Who the stakeholders are, plus why and how is each is affected
    * The MMPs’ role in this ecosystem
    * What fraud is and what benchmarks should be used for defining it
    * How to collaborate to detect and manage fraud on an ongoing basis
    * What tools are out there to fight fraud

    Speakers:
    * Emily Storino, Network Strategy Lead, Electronic Arts (EA)
    * Grant Simmons, Head of Client Analytics, Kochava
    * Tal Nissenson VP Client Success US, Taptica
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by: Taptica
  • How to Fix Cybersecurity - From Patching Leaks to Building Better Dams
    How to Fix Cybersecurity - From Patching Leaks to Building Better Dams Tatu Ylonen, Founder & SSH Fellow, SSH Communications Security, Inc. Recorded: Nov 15 2017 60 mins
    This talk will address how we need to develop and configure systems and software to eliminate common forms of malware and exploits. It is an engineering challenge that requires substantial change in tools and how we write applications and operating systems and how we design hardware. None of it is rocket science, but the pieces must be put together.

    Viewers will learn about:
    - Attack vectors and hidden risks
    - How to build better dams, rather than trying to patch every leak and crack

    Do we want our dams to be strong and safe, or is it more important to ensure that we can easily blow up the dams of any opponents, even if ours will break too? As a society increasingly living downstream of the dams, building better dams is a matter of survival.

    Presented by a 20+ year security pioneer and inventor of SSH (Secure Shell, the de facto standard for system administration) and the principal author of NIST IR 7966 (guidelines for managing SSH access).
  • Achieving Digital Trust: Turning New Threats into Customer Loyalty
    Achieving Digital Trust: Turning New Threats into Customer Loyalty Jeffrey Ritter Recorded: Nov 15 2017 43 mins
    Dynamic, volatile, innovative. Cloud security is all of these and more. Join this webinar to learn more about:
    - How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty?
    - How can customers gain trust in their service vendors despite the parade?
  • 2018 Critical Infrastructure Vulnerabilities Forecast
    2018 Critical Infrastructure Vulnerabilities Forecast Nicholas Andersen (Invictus International Consulting) | Dan Paltiel (US Bank) | Sean Plankey (BP) | Sean McAfee (DHS) Recorded: Nov 15 2017 64 mins
    Join experts from the financial services and energy industries alongside government experts as they:
    - Recap some of the most notable threats and breaches in their industries from 2017
    - Discuss lessons learned
    - Forecast emerging threats and key vulnerabilities to watch for in 2018.

    This interactive discussion will also focus on what critical infrastructure owners and operators can do minimize breaches in 2018.

    Speakers:
    - Nicholas Andersen, VP for Corporate Strategy, Invictus International Consulting (moderator)
    - Dan Paltiel, Sr. Strategic & Geo-Political Intelligence Researcher at U.S. Bank
    - Sean Plankey, Cyber Intelligence Advisor at BP
    - Sean McAfee, Department of Homeland Security (DHS), National Cybersecurity and Communications Integration Center (NCCIC)

    About the Host:
    Invictus International, Service-Disabled Veteran-Owned Small Business (SDVOSB), is a premier solutions provider to the National Security and Defense Communities world-wide.
    Invictus provides technology solutions coupled with professional services to key components of the Intelligence, National Security and Homeland Security communities. Customers include both commercial companies and government clients. Invictus leverages extensive national security experience and critical talent to conduct mission-oriented strategic consulting and planning, information technology services, and analysis, training, technology insertion, and strategic and operational mission analysis, planning and assessments

Embed in website or blog