Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Social Engineering - Are you the weakest link? Social Engineering - Are you the weakest link? Greg Iddon, Technologist, Sophos Recorded: Aug 30 2016 57 mins
    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
  • The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity The GRC Evolution of Digital Enterprises with Convergence of ERM & Cybersecurity Colin Whittaker, Informed Risk Decisions; Yo Delmar, MetricStream; Chris McClean, Forrester; Sanjay Agrawal, CIMCON Software Recorded: Aug 25 2016 62 mins
    Cybersecurity has jumped to the top of companies’ risk agenda after a number of high profile data breaches, and other hacks. In an increasingly digitized world, where data resides in the cloud, on mobiles and Internet of Things enabling multitude of connected devices, the threat vectors are multiplying, threatening the firms’ operations and future financial stability.

    Organizations with the ability to view cybersecurity breaches as a risk, with associated probabilities and impacts, can strike the right balance between resilience and protection. By bringing together leadership and capabilities across fraud, IT, cybersecurity and operational risk, organizations can connect the dots and manage their GRC program more effectively. Organizations need to employ a proactive approach to review their existing risk management processes, roles and responsibilities with respect to cybersecurity to re-align them into an overall ERM strategy with boardroom backing.

    Attend this panel webinar, as we discuss these issues and address ways to develop an evolving GRC program to cope with the growing threat landscape.
  • BrightTALK Network Security & Hacking Preview BrightTALK Network Security & Hacking Preview Various Recorded: Aug 24 2016 3 mins
    This September BrightTALK will be hosting some of the industry's leading cyber speakers as they discuss Network Security & Hacking.

    Click below to register for the Summit:

    https://www.brighttalk.com/summit/3453
  • Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Beyond the Sticker Price: Factors Impacting the Total Cost of Ownership of SIEM Michael Suby, Vice President of Research at Frost & Sullivan Recorded: Aug 24 2016 36 mins
    Unfortunately many organizations today are losing the race against the hacker community by a large margin. As noted in the Verizon 2016 Data Breach Investigation Report, the percent of compromises that transpired in “days or less” has risen from 67% to 84% over the last 10 years. Over this same time period, the percent of compromise discoveries that occurred in “days or less” also improved, but not enough to narrow the time gap between compromise and discovery. In other words, the bad guys are accelerating their exploits faster than the good guys are accelerating their ability to discover.

    The path to narrowing the time gap between compromise and discovery, and then neutralising business-impacting incidents, is through a comprehensive and mission-oriented Security Information and Event Management (SIEM). A well-designed SIEM not only advances security objectives, but it also works to direct personnel and process for maximum impact. With limited resources and a rising number of attacks, not all solutions are created equal. You need to ensure they are getting the best bang for your buck.

    In this webinar, Michael Suby, vice president of research at the global research and consulting organization Frost & Sullivan, will discuss the factors that contribute to SIEM’s total cost of ownership.

    You’ll learn:

    • How to calculate the total cost of ownership of a SIEM
    • The basic functionality that every SIEM should have to confidently breeze through preliminary activities
    • The SIEM attributes that will have a lasting impact on your organization’s cost efficiency in effectively managing risk

    Join us to learn the features that should be on the top of your scorecard when evaluating a SIEM for either first-time deployment or replacement.
  • Simplify Your Google Apps Collaboration and Management with IDaaS Simplify Your Google Apps Collaboration and Management with IDaaS Nathan Chan, Solutions Architect at OneLogin Recorded: Aug 18 2016 44 mins
    Google Apps for Work is a preferred solution for productivity and collaboration in the modern enterprise. But with a large suite of tools, proper provisioning and maintenance is anything but easy. Attempting to roll out Google Apps to the right users with the right access often results in over-extended IT resources, delayed employee on- and off-boarding, and misallocated access to key documents and data.

    It doesn’t have to be this way. Hundreds of organizations are using OneLogin’s best-in-class directory integrations to achieve faster Google Apps time-to-value and on-going application security and automation.

    Join OneLogin for an informative webinar designed to get you through the most complex of Google Apps deployments.
  • Gaining real-time threat intelligence through the Enterprise Immune System Gaining real-time threat intelligence through the Enterprise Immune System Andrew Tsonchev, Darktrace Principal Consultant Recorded: Aug 17 2016 31 mins
    · The sophistication of today’s threat landscape
    · Lessons learnt in government intelligence on defending against fast- moving adversaries
    · Using machine learning for automatic threat detection and efficient resource allocation
    · Gaining visibility into 100% network activity and mitigate problems early
  • When Bots Attack! Stopping OWASP’s New Top 20 Automated Threats When Bots Attack! Stopping OWASP’s New Top 20 Automated Threats Rami Essaid, Co-Founder Distil Networks Recorded: Aug 16 2016 38 mins
    The OWASP Top 10 Vulnerabilities, last published in 2013, has been a valuable list of criteria by which any Web Application Firewall (WAF) is evaluated, but has a glaring flaw, it only focuses on vulnerabilities in the code, and ignores automated threats. In late 2015, this flaw was addressed and OWASP released the first Automated Threat Handbook specifically to help organizations better understand and respond to the notable worldwide increase of automated threats from bots. This presentation discusses these new bot threats, bot evolution, and how to fight back.
    Keypoints:

    - How malicious bots attack and cause problems

    - Why homegrown IT solutions have troubles keeping up with bots, threats

    - See Distil Networks in action finding, fighting bots
  • Cyber Intelligence Exchange: It's Possible and Absolutely Necessary Cyber Intelligence Exchange: It's Possible and Absolutely Necessary Paul Kurtz, Co-Founder & CEO of TruSTAR Technology Recorded: Aug 10 2016 34 mins
    Despite the growing conversation around incident exchanges, few companies share broadly today. Join Paul Kurtz, Co-Founder and CEO of TruSTAR Technology to discuss:
    · Why it’s time for ‘good guys’ to embrace timely incident exchange,
    · The challenges of building effective intelligence exchange, and
    · How to design an intelligence exchange with broad participation and actionable reports.
  • User Behavior Analytics - A Game Changer in The Fight Against Cyber Attacks User Behavior Analytics - A Game Changer in The Fight Against Cyber Attacks Stephan Jou, CTO at Interset Recorded: Aug 10 2016 49 mins
    High-profile breaches are on the rise. Insurance companies, government organizations, power utilities, even online gaming and dating sites are increasingly becoming targets of sophisticated cyber attacks.

    With the ever-changing landscape of threats and advanced cyber-attacks showing no sign of slowing down, organizations need to be prepared. As the breadth of corporate information expands, IT security teams face the daunting task of effectively protecting intellectual property, PII data, and PHI data from internal and external threats.

    Enter machine learning and user behavior analytics. Can this technology detect and help stop cyber-attacks? Stephan Jou, CTO at Interset, will discuss the current threatscape and how user behavior analytics plays in the fight to stop cyber-attacks.
  • Current Cyber Attack Trends and Forecasts for the Financial Industry Current Cyber Attack Trends and Forecasts for the Financial Industry David Swan, EVP Defence Intelligence Group Recorded: Aug 10 2016 33 mins
    Cyber attacks are on the rise, and financial institutions are increasingly becoming targets of sophisticated attackers. Join this presentation and learn about the current cyber-attacks affecting the industry.
    David Swan, EVP of the Defense Intelligence Group will discuss current attacks, attack trends and forecasts what banks and other financial institutions can expect in the near to middle term.

Embed in website or blog