Hi [[ session.user.profile.firstName ]]

IT Security

  • What is the essence of information security governance, risk & compliance? How do you meet your governance, risk and compliance requirements and prevent a data breach? The key is to understand the spirit of risk management and create a customised information security management system (ISMS) for your business. This presentation details a practical, step-by-step guide for designing and implementing a cost-effective ISMS to minimise your risk of a breach and meet your Association’s legislative (Data Protection Act), regulatory (Payment Card Industry), or industry standard (ISO-27001) compliance requirements to include:

    · Practical ISMS documentation structure

    · Scope, objectives & risk strategy examples

    · Risk treatment plan, asset register & classification guide examples

    · Policy frameworks

    · Control objectives, evidence & policy examples

    · Audit & testing documentation examples
  • The success of cyber threat intelligence is measured by its effectiveness in reducing the impact of malicious actors. It is therefore important to understand the economy of malware in order to break the chains of success of such economy. Such success needs to be materialised by a change in attitude, policies and configurations.

    Whilst applicable to most organisations, most examples used during this seminar will feature the financial sector and aim to:


    · Analyse the core components of the economy of malware

    · Analyse how to gather intelligence to reduce the impact of malicious actors

    · Show how to use the intelligence gathered to improve the security posture of the organisation
  • Blockchains are a new solution to a fundamental question in the digital world: How do you establish trust between parties over the Internet’s untrusted network? More specifically, how do you get perfect, simultaneous, shared data between a number of different people, devices or businesses? It is the technology that supports cryptocurrencies such as Bitcoin, but it can support the transfer of any data or digital asset. Bitcoin is the tip of the blockchain iceberg. Decision makers across industries are beginning to ask: "What does blockchain technology mean for our future?" This webinar will equip attendees with the foundation to understand its huge potential.
  • If you think pentesting is sexy, think again. Pentesting is mostly pointless if you have don't have the foundational backing of vulnerability information. Amar makes a bold claim and that is that Vulnerability scanning can be as important and sometimes more fun than running a pentest with some free tools. Yes, hacking maybe fun but if you really want to lower your risk exposure you need to get on top of vulnerabilities. Come and listen to Amar Singh as he shares the secrets of how to make your security assessments delivery maximum value within the shortest period of time.
  • A study of the top data breaches in 2015 reads like a "who's who" of actors in society across governmental departments, banks and retail establishments. The financial services industry understands that a comprehensive & strategic approach to cybersecurity is now far from being an IT challenge a few years ago to a "must have". As digital and IoT ecosystems in financial services evolve to cloud computing architectures fronted by API federations, more assets are at danger of being targeted by fraudsters and other sophisticated adversaries. This webinar will explore how the Hadoop ecosystems can deliver immense value to cyber security systems in today's data driven world.
  • Growing concern over climate change, increasing utility prices and the availability of sustainable energy like solar are driving increased demand for conservation, pricing transparency and cost savings. Smart energy solutions provide real time visibility into consumption and billing data helping consumers to conserve resources, while energy and utility companies are better able to balance production to meet actual demand reducing brown outs and other potential issues. At a time when energy utilities play an increasingly important part of our everyday lives, smart grid technologies introduce new security challenges that must be addressed.
    In this webinar we will discuss:
    •The threat landscape
    •Addressing security challenges in critical infrastructure with cryptography and strong authentication
    •Compliance with NERC CIP Version 5
    •The road ahead
  • Security demands countless decisions to determine whether or not log data or other surveillance data are positive indicators of adverse activity or merely false positives. Knowing when, and how, to make and document those decisions can be critical to how legal and compliance sanctions may be imposed. Designing your security controls to do so effectively can make all of the difference. Learn how rules-based design can transform your design frameworks and keep lawyers and regulators away.
  • For centuries mankind’s greatest innovations came about through careful examination of natural systems. Information Security is no different. This presentation will explore how information security professionals can use the agricultural concept of “permaculture” (the practice of using design principles observed in natural ecosystems) to cultivate a sustainable, data-driven security program.

    In this fast-paced, thought-provoking session you’ll learn:

    - The basic tenets of permaculture and how they apply to information security strategy
    - How to build a security program that fosters collaboration, coupled with feedback loops and metrics
    - How embracing differences within an organization can lead to increases in productivity and security
    - Effective policy and control designs that enhance business objections as opposed to stifling them

    About the Speaker

    Chris Nelson has a passion for security, especially building security programs and teams in incredibly dynamic organizations. Chris is currently the Vice President of ISSA’s Denver Chapter, and Director of Security for Distil Networks, where he continues to expand his theories on using Permaculture in the design and implementation of security programs and controls. Chris held a similar role at Rally Software after working with Aetna as a security, compliance and privacy lead. Previously, he held similar roles with Return Path and has served multiple Fortune 500 clients in a consulting capacity.
  • Windows 10 opens up innovative device experiences and enables your business to take advantage of new hardware enabled security features.

    Every business has potential. Given the right tools, it's the people within that can take big ideas from brainstorms to results.

    Buying a Windows 10 device means you'll have the tools for transforming ideas, and your business, into something greater. When you accelerate a PC refresh* from Windows 7 to Windows 10 you are getting extra hardware enabled security features giving you the most secure Windows platform yet.

    Plus, newer devices and form factors light up new user experiences like Cortana, Inking, Touch and Continuum**.

    With enhanced security, productivity, performance and mobility you really can’t do better than accelerating to Windows 10 today.

    Watch this webcast to:
    •Discover new features that are enabled in the latest devices with Windows 10
    •Understand why the 6th generation Intel processor helps deliver better security and manageability
    •Learn more about the latest Intel Skylake devices announced in January 2016
    •Get additional resources to evaluate what device is right for you