Web 2.0 and Beyond - Technology challenges, risks and rewards

Manage webcast
Peter Wood
A webinar to answer these questions: Where is your security perimeter when many endpoints are mobile handheld devices? How do you enable good governance whilst taking advantage of the cloud? What are the legal, confidentiality and availability issues in the cloud and in Web 2.0? What happens when your interaction with customers is immediate and intimate through Web 2.0?
Dec 15 2010
61 mins
Web 2.0 and Beyond - Technology challenges, risks and rewards
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3733)
  • Upcoming (81)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • Insider Threats – Real Problems and Real Solutions Recorded: Jul 8 2015 46 mins
    Peter Wood, CEO, First Base Technologies
    Malicious attacks and accidental breaches by insiders present a real threat to organisations of all types. Insiders are uniquely positioned with legitimate access to data, networks and premises, allowing them to effectively bypass firewalls and intrusion detection systems. Pete and his team have conducted hundreds of simulated insider attacks and have found common themes emerge, regardless of business sector or size of business. In this presentation, discover the critical weaknesses that insiders exploit and the key, practical steps to defending against the insider threat.
  • Infosecurity Europe 2015: Peter Wood, ISACA Recorded: Jun 12 2015 3 mins
    Peter Wood, Member of the ISACA London security Advisory Group & Joshua Downs, Senior Community Manager, BrightTALK
    Infosecurity Europe 2015: Peter Wood, ISACA
  • Panel: Leveraging Security Analytics in the Fight Against Cyber-Threats Recorded: Feb 17 2015 60 mins
    Peter Wood (moderator); Prof. John Walker, James Brown (Alert Logic), Bernd Jaeger (Cloud Security Alliance)
    Join this exciting panel session with some of the industry's leading thought leaders including:

    Peter Wood, CEO, First Base Technologies
    Prof. John Walker, Researcher, Feature Writer for SC Magazine UK & International Speaker
    James Brown, Director of Cloud Computing and Solution Architecture at Alert Logic
    Bernd Jaeger, Co-Chair to the Telecom Working Group at the Cloud Security Alliance

    The panelists will discuss topics ranging from predictive security, real-time threat intelligence, combining structured and unstructured data sources and more.
  • Risk-Based Security Testing Recorded: Jan 20 2015 47 mins
    Peter Wood, CEO, First Base Technologies
    Risk-based security is a popular concept, but what about applying it to penetration testing, reporting and remediation? Pete Wood and his team have been working on this concept. Blending threat and risk analysis with traditional penetration testing to produce techniques, results and guidance tailored to an individual organisation’s risk profile and attack surface. Learn more with case studies and real-world results.

    Peter is a world-renowned security evangelist, speaking at conferences and seminars on ethical hacking and social engineering. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
  • Advanced Threat Protection: Lessons from a Red Team Exercise Recorded: Sep 17 2014 47 mins
    Peter Wood, CEO, First Base Technologies
    Ethical hackers from First Base Technologies conduct red team tests to help organisations understand where they are vulnerable to advanced attacks. This presentation describes each step of a real-world exercise: planning and recon, spear phishing, telephone social engineering, building access, network exploitation and data exfiltration. As the story develops, you will discover how an attacker thinks, why they choose a particular strategy and what you can do to minimise your organisation’s vulnerability to advanced threats.
  • Pragmatic Network Security: Avoiding Real-World Vulnerabilities Recorded: Aug 12 2014 46 mins
    Peter Wood, CEO, First Base Technologies
    Peter Wood and his team analysed the results from a series of network penetration tests over the past two years, in a variety of sectors including banking, insurance and retail. They identified the most common vulnerabilities, how they can be exploited and the consequences for each business. This presentation demonstrates in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • An Ethical Hacker’s Casebook: Tips to Protect Your Organisation Recorded: Jun 18 2014 47 mins
    Peter Wood, CEO, First Base Technologies
    We spend millions every year on security products, but still we get hacked, have our critical intellectual property stolen, and suffer public embarrassment and loss of revenue. Pete will demonstrate how some fundamental issues continue to leave organisations vulnerable, using real case studies to illustrate the information security risks to your business. Using the same models that criminals use, he will illustrate how to minimise your vulnerabilities using pragmatic, people-focused solutions
  • 2 Minutes on BrightTALK: Understanding the Modern Range of Complex Threats Recorded: May 20 2014 2 mins
    Peter Wood, CEO, First Base Technologies
    Peter Wood highlights the need to keep on top of IT Security, and how the people in your organisation can really make the difference.
  • Cloud Security and Risks: An Ethical Hacker’s View Recorded: May 13 2014 46 mins
    Peter Wood, CEO, First Base Technologies
    Preventing loss and theft of data is key to corporate survival. Criminals and competitors don’t want your network - they want your data! Cloud provides them with unprecedented opportunities for theft and fraud. The gaps between partner organisations and the absence of any real possibility of audit and control, gives thieves potential access to corporate information and sensitive data. Peter Wood will show you some real-world threats posed by cloud and suggestions for mitigating the risk.
  • Risk-Based Security: An Ethical Hacker’s View Recorded: Jan 21 2014 46 mins
    Peter Wood, Partner & CEO, First Base Technologies
    Peter Wood will discuss the techniques he uses to identify the real threats to some of the largest and most agile organisations. His presentation will describe how risks can be identified and prioritised, how likelihood and impact affect decision making, and what skills are required to ensure a secure enterprise in 2014. Combining over 40 years of experience with cutting-edge techniques, Pete’s presentation will help you make the best risk-based decisions.
  • Web 2.0 and Beyond - Technology challenges, risks and rewards Recorded: Dec 15 2010 61 mins
    Peter Wood
    A webinar to answer these questions: Where is your security perimeter when many endpoints are mobile handheld devices? How do you enable good governance whilst taking advantage of the cloud? What are the legal, confidentiality and availability issues in the cloud and in Web 2.0? What happens when your interaction with customers is immediate and intimate through Web 2.0?
Webcasts from the leading cyber security firm
Ethical hacking case studies and real-world cyber security issues

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Web 2.0 and Beyond - Technology challenges, risks and rewards
  • Live at: Dec 15 2010 3:00 pm
  • Presented by: Peter Wood
  • From:
Your email has been sent.
or close
You must be logged in to email this