Hi [[ session.user.profile.firstName ]]

Web 2.0 and Beyond - Technology challenges, risks and rewards

A webinar to answer these questions: Where is your security perimeter when many endpoints are mobile handheld devices? How do you enable good governance whilst taking advantage of the cloud? What are the legal, confidentiality and availability issues in the cloud and in Web 2.0? What happens when your interaction with customers is immediate and intimate through Web 2.0?
Recorded Dec 15 2010 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Wood
Presentation preview: Web 2.0 and Beyond - Technology challenges, risks and rewards

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Future of IoT and Cyber Security Jun 14 2018 10:00 am UTC 45 mins
    Peter Wood & Mike McLaughlin
    In-depth look into the advancements in technologies designed to protect the IoT.
  • GDPR: Compliance and Preparation May 24 2018 10:00 am UTC 45 mins
    Peter Wood
    Learn the steps to take to respond effectively to a serious breach.
  • Security Awareness and Data Protection Apr 26 2018 10:00 am UTC 45 mins
    Rob Shapland
    Learn how educating employees about phishing, insider threats and ransomware can help protect your organization.
  • Cyber Attack Trends from the Threatscape Mar 21 2018 11:00 am UTC 45 mins
    Peter Wood
    What are the latest trends in the cyber-criminal underworld. Which attacks are you likely to be preventing as we move further into 2018? Who’s looking for vulnerability on your network? These questions and more, answered by our selected experts.
  • GDPR's influence on security Feb 22 2018 11:00 am UTC 45 mins
    Rob Shapland
    Will GDPR have the desired effect? Will it increase security, or see companies regularly hit with catastrophic fines for poor compliance.
  • Smarter Security: Cyber Resilience, TARA and Red Teaming Recorded: Jan 16 2018 48 mins
    Peter Wood and Rob Shapland
    Cyber risk isn't new, but the stakes grow higher every day. An incident is no longer likely to be an isolated event, but a sustained and persistent campaign. There is no single solution that will offer protection from an attack, but a Cyber Resilience strategy can provide a multi-layered approach that encompasses people, processes and technology.

    Pete Wood will talk about eliminating the gap between IT and the business to present a united front against threats. This is a paradigm shift that uses security intelligence to guide decisions and support agility.
  • The 2018 Threatscape: Cyber clairvoyance and divination Recorded: Nov 14 2017 47 mins
    Peter Wood, CEO, First Base Technologies
    What have we learned from 2017's biggest breaches and how will we deal with 2018's emerging threats? Attempting to look both backward and forward over the cyber landscape, Peter Wood will review lessons learned and apply them to the evolving threatscape.
  • The Future of Cloud Security: Next Generation Threat-based Testing Recorded: Oct 24 2017 48 mins
    Peter Wood
    If your processing and data is in the cloud, how can you deliver assurance, compliance and governance? How do you find the flaws and soft spots that criminals will exploit? From browser to database, through human factors and end points, this presentation will take a threat-based approach to securing the cloud.
  • Petrified by the Petya Ransomware? Live Q&A session with Pete Wood Recorded: Jul 5 2017 46 mins
    Pete Wood, CEO, First Base Technologies LLP
    - Interactive audience Q&A -

    Fresh of the heels of WannaCry this week has seen the Petya / notPetya / Goldeneye attacks strike many global organisations in a wave of devastating ransomware attacks.

    Questions need to be raised though:

    - Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune in live to this interactive ask the expert webinar with First Base Technologies CEO Pete Wood as he takes your questions on the attacks and suggests ways that you can defend yourself from similar variations in the future.

    Tune in and ask away, we'd love to hear your questions!
  • Securing the Internet of Everything: The war of the coffee machines Recorded: Jun 20 2017 47 mins
    Peter Wood
    The Internet of Everything affects everyone from multi-nationals to private citizens. The universal adoption of machine to machine communications in every aspect of our lives offers criminals a hugely expanded attack surface. How do we defend ourselves without undermining the benefits of the IoE?
  • Securing FinTech: Threat-based testing along the kill chain Recorded: May 16 2017 46 mins
    Peter Wood
    Threat-based testing, accurately simulating criminal attacks, is a critical approach in securing FinTech. Attackers constantly evolve their attack methods and strategies in response to changing technologies, making it essential that security tests match the threat landscape.
  • Hackers, Threats & Cyber Defence: Reporting from the front line Recorded: Mar 14 2017 48 mins
    Peter Wood
    Peter's presentation uses the latest research combined with experience from real-world client engagements to highlight current cyber threats. He describes how a threat-led approach works and how to change your defence and response posture to minimise your attack surface.
  • Cybersecurity Strategy: Success Cases and Avoidable Mistakes Recorded: Feb 21 2017 48 mins
    Peter Wood, CEO, First Base Technologies LLP
    Our cybersecurity consultancy practice works with multinational businesses through to medium-sized UK organisations. We see cybersecurity strategies that are impressive, comprehensive, misguided and non-existent. This webinar will distil some of the most creative and successful approaches, as well highlighting the mistakes to avoid. Our analysis is based on cyber readiness, cyber risks stress testing, cyber hygiene assessments and security gap analysis. Threat and risk assessments and red team exercises also provide an insight into the effectiveness of cybersecurity strategies.
  • GDPR Panel: What May 2018 Means to Your Business Recorded: Nov 10 2016 60 mins
    Peter Wood, First Base Technologies; Florian Malecki, Dell; Jonathan Armstrong, Cordery & Kristian Norsgaard Rieper-Holm
    A global survey on the European Union’s new General Data Protection Regulation (GDPR) commissioned by SonicWALL in September 2016, reveals that surveyed organizations ‒ both SMBs and large enterprises ‒ lack general awareness of the requirements of the new regulation, how to prepare for it, and the final impact of non-compliance on data security and business outcomes.

    Don’t wait until it is too late: join Kristian Norsgaard Rieper-Holm from Globalsequr, Florian Malecki from SonicWALL, Jonathan Armstrong from Cordery and moderated by First Base Technologies’ Peter Wood as they shed some light on the ins and outs of the new GDPR requirements and how to increase your overall data security posture to minimise the cyber risks and potential financial fines.
  • Network security, seriously? 2016 Network Penetration Tests Recorded: Sep 7 2016 46 mins
    Peter Wood
    The results of all the network penetration tests conducted by the First Base team over the past year have been analysed by Peter Wood. The annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business. Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • Ransomware: All your files now belong to us Recorded: Jul 12 2016 49 mins
    Peter Wood
    Ransomware is dominating the headlines, and with good reason - it is one of the biggest threats to business in 2016. It has evolved into a self-replicating and network-aware criminal attack that can destroy smaller organisations and cause havoc in businesses of all sizes. Learn how ransomware is developing, the attack vectors and what you can do to minimise your exposure.
  • The Cyber Security Impact of the UK Leaving the EU Recorded: Jun 22 2016 301 mins
    Peter Wood
    What will be the impact on cybersecurity in the UK when Brexit becomes a reality? Cyber security professionals and UK government have voiced their opinions and Peter Wood has distilled the key arguments into this independent analysis.
  • You’re The One That They Want: Targeted Threats and You Recorded: Jun 15 2016 46 mins
    Don Smith, SecureWorks, Ian Glover, CREST & Peter Wood, First Base Technologies
    The rise in targeted threats means that security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.

    In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?

    Key themes:

    •The challenges faced by organisations from the rise in targeted threats
    •Limitations of security processes in protecting from targeted threats
    •How to gain early visibility into the threats targeting your particular organisation

    Don Smith leads the CTU™ Cyber Intelligence Cell: a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients. Don also leads the CTU research team in EMEA.

    Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA and building important relationships for SecureWorks in the region. His enthusiasm and threat expertise means that he regularly represents SecureWorks at industry events in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise, where he took a lead role in successfully integrating 14 acquisitions. He is a recognized subject-matter expert many areas of cybersecurity and advises SecureWorks and SecureWorks’ clients globally.
  • Infosecurity 2016: The Risk of the Human Factor when Protecting a Business Recorded: Jun 15 2016 6 mins
    Peter Wood, CEO & Founder, First Base Technologies & Josh Downs, Community Manager, BrightTALK
    - Infosecurity Europe 2016 -

    BrightTALK legend Peter Wood swung by the temporary studio to answer key questions on the information security landscape.

    Peter answered questions on topics such as the developments in the IoT and how network security will adapt to prevent vulnerabilities; risk management and the value of running a solid risk analysis focused on the threat actors; cyber security in the critical and national infrastructure space and the elements that he's optimistic about regarding the human factor.
  • Social Engineering: Is that a Pwn Plug in Your Pocket? Recorded: May 24 2016 44 mins
    Peter Wood
    Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
Webcasts from the leading cyber security firm
Ethical hacking case studies and real-world cyber security issues

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Web 2.0 and Beyond - Technology challenges, risks and rewards
  • Live at: Dec 15 2010 3:00 pm
  • Presented by: Peter Wood
  • From:
Your email has been sent.
or close