Hi [[ session.user.profile.firstName ]]

Web 2.0 and Beyond - Technology challenges, risks and rewards

A webinar to answer these questions: Where is your security perimeter when many endpoints are mobile handheld devices? How do you enable good governance whilst taking advantage of the cloud? What are the legal, confidentiality and availability issues in the cloud and in Web 2.0? What happens when your interaction with customers is immediate and intimate through Web 2.0?
Recorded Dec 15 2010 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Wood
Presentation preview: Web 2.0 and Beyond - Technology challenges, risks and rewards

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ransomware: All your files now belong to us Recorded: Jul 12 2016 49 mins
    Peter Wood
    Ransomware is dominating the headlines, and with good reason - it is one of the biggest threats to business in 2016. It has evolved into a self-replicating and network-aware criminal attack that can destroy smaller organisations and cause havoc in businesses of all sizes. Learn how ransomware is developing, the attack vectors and what you can do to minimise your exposure.
  • The Cyber Security Impact of the UK Leaving the EU Recorded: Jun 22 2016 301 mins
    Peter Wood
    What will be the impact on cybersecurity in the UK when Brexit becomes a reality? Cyber security professionals and UK government have voiced their opinions and Peter Wood has distilled the key arguments into this independent analysis.
  • You’re The One That They Want: Targeted Threats and You Recorded: Jun 15 2016 46 mins
    Don Smith, SecureWorks, Ian Glover, CREST & Peter Wood, First Base Technologies
    The rise in targeted threats means that security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.

    In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?

    Key themes:

    •The challenges faced by organisations from the rise in targeted threats
    •Limitations of security processes in protecting from targeted threats
    •How to gain early visibility into the threats targeting your particular organisation

    Don Smith leads the CTU™ Cyber Intelligence Cell: a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients. Don also leads the CTU research team in EMEA.

    Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA and building important relationships for SecureWorks in the region. His enthusiasm and threat expertise means that he regularly represents SecureWorks at industry events in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise, where he took a lead role in successfully integrating 14 acquisitions. He is a recognized subject-matter expert many areas of cybersecurity and advises SecureWorks and SecureWorks’ clients globally.
  • Infosecurity 2016: The Risk of the Human Factor when Protecting a Business Recorded: Jun 15 2016 6 mins
    Peter Wood, CEO & Founder, First Base Technologies & Josh Downs, Community Manager, BrightTALK
    - Infosecurity Europe 2016 -

    BrightTALK legend Peter Wood swung by the temporary studio to answer key questions on the information security landscape.

    Peter answered questions on topics such as the developments in the IoT and how network security will adapt to prevent vulnerabilities; risk management and the value of running a solid risk analysis focused on the threat actors; cyber security in the critical and national infrastructure space and the elements that he's optimistic about regarding the human factor.
  • Social Engineering: Is that a Pwn Plug in Your Pocket? Recorded: May 24 2016 44 mins
    Peter Wood
    Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
  • Top 5: Vulnerabilities Below Your Radar Recorded: Feb 10 2016 8 mins
    Peter Wood, CEO, First Base Technologies LLP
    Peter Wood, CEO of First Base Technologies, breaks down his Top 5 vulnerabilities that are flying below your radar.
  • Information Security: The Next Generation - Intelligence or guesswork? Recorded: Jan 19 2016 46 mins
    Peter Wood, CEO, First Base Technologies LLP
    Threat intelligence is a thorny subject. Vendors will tell you that it’s key to your defensive strategy, but is it a worthwhile investment and does it really help you protect your business?

    Understanding the threat actors who may be targeting you is definitely useful, as is identifying your critical information and your specific vulnerabilities. Would a threat intelligence feed really help you react and respond, or are you better investing your budget in staff education and technology?

    Peter Wood will discuss the pros and cons of ‘cyber clairvoyance’.
  • Penetration Testing – Keeping It Real Recorded: Dec 1 2015 47 mins
    Peter Wood, CEO, First Base Technologies LLP
    A traditional penetration test is a snapshot of vulnerabilities for an environment that is in constant flux. The snapshot may also be an incomplete picture, addressing only a portion of a more complex system. To give a view of real business risk, can we link the vulnerabilities to real-world threats and, more importantly, vice versa? Wouldn’t it be better to start with the threats and work forward down the kill chain to the target? How feasible is it to take up-to-date threat intelligence and use that to scope our penetration tests? Peter Wood will try to answer these questions and provide a strategy better suited to today’s attacks.
  • Risk-Based Security - Where Next? Recorded: Nov 4 2015 45 mins
    Peter Wood, CEO, First Base Technologies LLP
    We seem to be struggling to get to grips with risk-based security, especially where it concerns defensive strategy. Few if any organisations have sufficient budget to protect and test every part of the business, so how do we choose where to put our effort and money? The skills, knowledge and techniques needed to defend against an agile and devious attacker are available but infrequently deployed properly. In this webinar, Peter Wood will describe some case studies where risk-based security has made a real difference to organisations’ defences and response to cyber-attack.
  • Network Security - Real and Present Dangers Recorded: Sep 15 2015 45 mins
    Peter Wood, CEO, First Base Technologies LLP
    Peter Wood has analysed the results of all the network penetration tests conducted by the First Base team over the past year. This annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business.

    Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • Insider Threats – Real Problems and Real Solutions Recorded: Jul 8 2015 46 mins
    Peter Wood, CEO, First Base Technologies
    Malicious attacks and accidental breaches by insiders present a real threat to organisations of all types. Insiders are uniquely positioned with legitimate access to data, networks and premises, allowing them to effectively bypass firewalls and intrusion detection systems. Pete and his team have conducted hundreds of simulated insider attacks and have found common themes emerge, regardless of business sector or size of business. In this presentation, discover the critical weaknesses that insiders exploit and the key, practical steps to defending against the insider threat.
  • Infosecurity Europe 2015: Peter Wood, ISACA Recorded: Jun 12 2015 3 mins
    Peter Wood, Member of the ISACA London security Advisory Group & Joshua Downs, Senior Community Manager, BrightTALK
    Infosecurity Europe 2015: Peter Wood, ISACA
  • Panel: Leveraging Security Analytics in the Fight Against Cyber-Threats Recorded: Feb 17 2015 60 mins
    Peter Wood (moderator); Prof. John Walker, James Brown (Alert Logic), Bernd Jaeger (Cloud Security Alliance)
    Join this exciting panel session with some of the industry's leading thought leaders including:

    Peter Wood, CEO, First Base Technologies
    Prof. John Walker, Researcher, Feature Writer for SC Magazine UK & International Speaker
    James Brown, Director of Cloud Computing and Solution Architecture at Alert Logic
    Bernd Jaeger, Co-Chair to the Telecom Working Group at the Cloud Security Alliance

    The panelists will discuss topics ranging from predictive security, real-time threat intelligence, combining structured and unstructured data sources and more.
  • Risk-Based Security Testing Recorded: Jan 20 2015 47 mins
    Peter Wood, CEO, First Base Technologies
    Risk-based security is a popular concept, but what about applying it to penetration testing, reporting and remediation? Pete Wood and his team have been working on this concept. Blending threat and risk analysis with traditional penetration testing to produce techniques, results and guidance tailored to an individual organisation’s risk profile and attack surface. Learn more with case studies and real-world results.

    Peter is a world-renowned security evangelist, speaking at conferences and seminars on ethical hacking and social engineering. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
  • Advanced Threat Protection: Lessons from a Red Team Exercise Recorded: Sep 17 2014 47 mins
    Peter Wood, CEO, First Base Technologies
    Ethical hackers from First Base Technologies conduct red team tests to help organisations understand where they are vulnerable to advanced attacks. This presentation describes each step of a real-world exercise: planning and recon, spear phishing, telephone social engineering, building access, network exploitation and data exfiltration. As the story develops, you will discover how an attacker thinks, why they choose a particular strategy and what you can do to minimise your organisation’s vulnerability to advanced threats.
  • Pragmatic Network Security: Avoiding Real-World Vulnerabilities Recorded: Aug 12 2014 46 mins
    Peter Wood, CEO, First Base Technologies
    Peter Wood and his team analysed the results from a series of network penetration tests over the past two years, in a variety of sectors including banking, insurance and retail. They identified the most common vulnerabilities, how they can be exploited and the consequences for each business. This presentation demonstrates in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • An Ethical Hacker’s Casebook: Tips to Protect Your Organisation Recorded: Jun 18 2014 47 mins
    Peter Wood, CEO, First Base Technologies
    We spend millions every year on security products, but still we get hacked, have our critical intellectual property stolen, and suffer public embarrassment and loss of revenue. Pete will demonstrate how some fundamental issues continue to leave organisations vulnerable, using real case studies to illustrate the information security risks to your business. Using the same models that criminals use, he will illustrate how to minimise your vulnerabilities using pragmatic, people-focused solutions
  • 2 Minutes on BrightTALK: Understanding the Modern Range of Complex Threats Recorded: May 20 2014 2 mins
    Peter Wood, CEO, First Base Technologies
    Peter Wood highlights the need to keep on top of IT Security, and how the people in your organisation can really make the difference.
  • Cloud Security and Risks: An Ethical Hacker’s View Recorded: May 13 2014 46 mins
    Peter Wood, CEO, First Base Technologies
    Preventing loss and theft of data is key to corporate survival. Criminals and competitors don’t want your network - they want your data! Cloud provides them with unprecedented opportunities for theft and fraud. The gaps between partner organisations and the absence of any real possibility of audit and control, gives thieves potential access to corporate information and sensitive data. Peter Wood will show you some real-world threats posed by cloud and suggestions for mitigating the risk.
  • Risk-Based Security: An Ethical Hacker’s View Recorded: Jan 21 2014 46 mins
    Peter Wood, Partner & CEO, First Base Technologies
    Peter Wood will discuss the techniques he uses to identify the real threats to some of the largest and most agile organisations. His presentation will describe how risks can be identified and prioritised, how likelihood and impact affect decision making, and what skills are required to ensure a secure enterprise in 2014. Combining over 40 years of experience with cutting-edge techniques, Pete’s presentation will help you make the best risk-based decisions.
Webcasts from the leading cyber security firm
Ethical hacking case studies and real-world cyber security issues

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Web 2.0 and Beyond - Technology challenges, risks and rewards
  • Live at: Dec 15 2010 3:00 pm
  • Presented by: Peter Wood
  • From:
Your email has been sent.
or close