Hi [[ session.user.profile.firstName ]]

IT Security

  • What is the essence of information security governance, risk & compliance? How do you meet your governance, risk and compliance requirements and prevent a data breach? The key is to understand the spirit of risk management and create a customised information security management system (ISMS) for your business. This presentation details a practical, step-by-step guide for designing and implementing a cost-effective ISMS to minimise your risk of a breach and meet your Association’s legislative (Data Protection Act), regulatory (Payment Card Industry), or industry standard (ISO-27001) compliance requirements to include:

    · Practical ISMS documentation structure

    · Scope, objectives & risk strategy examples

    · Risk treatment plan, asset register & classification guide examples

    · Policy frameworks

    · Control objectives, evidence & policy examples

    · Audit & testing documentation examples
  • The success of cyber threat intelligence is measured by its effectiveness in reducing the impact of malicious actors. It is therefore important to understand the economy of malware in order to break the chains of success of such economy. Such success needs to be materialised by a change in attitude, policies and configurations.

    Whilst applicable to most organisations, most examples used during this seminar will feature the financial sector and aim to:


    · Analyse the core components of the economy of malware

    · Analyse how to gather intelligence to reduce the impact of malicious actors

    · Show how to use the intelligence gathered to improve the security posture of the organisation
  • Blockchains are a new solution to a fundamental question in the digital world: How do you establish trust between parties over the Internet’s untrusted network? More specifically, how do you get perfect, simultaneous, shared data between a number of different people, devices or businesses? It is the technology that supports cryptocurrencies such as Bitcoin, but it can support the transfer of any data or digital asset. Bitcoin is the tip of the blockchain iceberg. Decision makers across industries are beginning to ask: "What does blockchain technology mean for our future?" This webinar will equip attendees with the foundation to understand its huge potential.
  • If you think pentesting is sexy, think again. Pentesting is mostly pointless if you have don't have the foundational backing of vulnerability information. Amar makes a bold claim and that is that Vulnerability scanning can be as important and sometimes more fun than running a pentest with some free tools. Yes, hacking maybe fun but if you really want to lower your risk exposure you need to get on top of vulnerabilities. Come and listen to Amar Singh as he shares the secrets of how to make your security assessments delivery maximum value within the shortest period of time.
  • A study of the top data breaches in 2015 reads like a "who's who" of actors in society across governmental departments, banks and retail establishments. The financial services industry understands that a comprehensive & strategic approach to cybersecurity is now far from being an IT challenge a few years ago to a "must have". As digital and IoT ecosystems in financial services evolve to cloud computing architectures fronted by API federations, more assets are at danger of being targeted by fraudsters and other sophisticated adversaries. This webinar will explore how the Hadoop ecosystems can deliver immense value to cyber security systems in today's data driven world.
  • Security demands countless decisions to determine whether or not log data or other surveillance data are positive indicators of adverse activity or merely false positives. Knowing when, and how, to make and document those decisions can be critical to how legal and compliance sanctions may be imposed. Designing your security controls to do so effectively can make all of the difference. Learn how rules-based design can transform your design frameworks and keep lawyers and regulators away.
  • Growing concern over climate change, increasing utility prices and the availability of sustainable energy like solar are driving increased demand for conservation, pricing transparency and cost savings. Smart energy solutions provide real time visibility into consumption and billing data helping consumers to conserve resources, while energy and utility companies are better able to balance production to meet actual demand reducing brown outs and other potential issues. At a time when energy utilities play an increasingly important part of our everyday lives, smart grid technologies introduce new security challenges that must be addressed.
    In this webinar we will discuss:
    •The threat landscape
    •Addressing security challenges in critical infrastructure with cryptography and strong authentication
    •Compliance with NERC CIP Version 5
    •The road ahead
  • For centuries mankind’s greatest innovations came about through careful examination of natural systems. Information Security is no different. This presentation will explore how information security professionals can use the agricultural concept of “permaculture” (the practice of using design principles observed in natural ecosystems) to cultivate a sustainable, data-driven security program.

    In this fast-paced, thought-provoking session you’ll learn:

    - The basic tenets of permaculture and how they apply to information security strategy
    - How to build a security program that fosters collaboration, coupled with feedback loops and metrics
    - How embracing differences within an organization can lead to increases in productivity and security
    - Effective policy and control designs that enhance business objections as opposed to stifling them

    About the Speaker

    Chris Nelson has a passion for security, especially building security programs and teams in incredibly dynamic organizations. Chris is currently the Vice President of ISSA’s Denver Chapter, and Director of Security for Distil Networks, where he continues to expand his theories on using Permaculture in the design and implementation of security programs and controls. Chris held a similar role at Rally Software after working with Aetna as a security, compliance and privacy lead. Previously, he held similar roles with Return Path and has served multiple Fortune 500 clients in a consulting capacity.
  • Scale Venture Partners committed to move 100% of its IT infrastructure to the cloud and Zach Boewer, VP of Information Technology lead the charge. While the cost, performance and flexibility benefits of moving to the cloud are undisputed, security fears still linger.

    Zach believes recent advancements in Security-as-a-Service has made it possible to provide better security in the cloud than is possible in the typical corporate datacenter. The Cloud can actually be safer.

    In this video, Zach will describe the tools and processes he is using to ensure end-to-end data security, detailing the strengths (and limitations) of security in the most popular SaaS/IaaS applications. He will cover the tools he has deployed to manage policy across all his cloud deployments and the lessons he has learned in selecting them.