Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Are You Ready for GDPR? Cybersecurity and Privacy Impacts [Keynote Panel]
    Are You Ready for GDPR? Cybersecurity and Privacy Impacts [Keynote Panel] Michelle Dennedy (Cisco), Ariel Silverstone (GoDaddy), Paul Rosenzweig (Red Branch Consulting) Recorded: Aug 17 2017 63 mins
    The General Data Protection Regulation (GDPR), a set of rules governing the privacy and security of personal data that is being implemented by the European Commission, is going into effect in May, 2018.

    This means your company, and every other company in the world are considering:
    - Does GDPR affect my organization and how
    - What are the cybersecurity and privacy implications of GDPR
    - What happens if I don't comply
    Join this panel of top privacy and security experts as they discuss the state of identity, privacy and cyber security in the context of GDPR.

    Speakers:
    - Michelle Dennedy, VP & Chief Privacy Officer at Cisco
    - Ariel Silverstone, Vice President of Security Strategy, Privacy and Trust at GoDaddy
    - Paul Rosenzweig, Principal at Red Branch Consulting
  • Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR
    Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR Nicola Franchetto of ICT Legal Consulting Recorded: Aug 17 2017 60 mins
    Nicola Franchetto will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Franchetto will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
  • GDPR Privacy Impact and Risk Assessments
    GDPR Privacy Impact and Risk Assessments Ariel Evans, CEO, InnoSec Recorded: Aug 17 2017 49 mins
    - InnoSec is the winner of the EU commission Horizon 2020 grant based on its innovation in GDPR and cyber risk -

    GDPR is an urgent issue that has companies scrambling to be compliant by May of 2018. Any organization that processes EU citizen data is in scope and the penalties are severe.

    Alignment with the requirements can reduce the chances of triggering a Data Protection Authority (DPA) to investigate a company’s privacy practices after the GDPR takes effect in May 2018. DPAs can impose a fine on companies of up to 4% of annual global revenues for egregious violations of the GDPR. Member states can also add to these fines. The Netherlands, for instance, has more than doubled its own fining capacity to 10% of annual revenues. European privacy advocates are pressuring DPAs to fully exercise these new powers after May 2018.To manage this risk, multinationals should have a means to demonstrate alignment with the GDPR requirements and communication of this program with DPAs that have jurisdiction over their major European operations.

    InnoSec’s GDPR solution provides privacy impact and risk assessments which measure the confidentiality and integrity of the system and the risk associated to it meeting articles 1,2, 5, 32, 35 and 36. Additionally, we provide a readiness gap analysis for managing, planning and budgeting for GDPR.

    Most e-commerce, educational and multi-national organizations process EU citizen data and are in scope for GDPR. Moreover, most organizations are not ready according to Gartner and his means the race to the finish line requires as much automation as you can afford. InnoSec provides a means for companies to save money and time with their GDPR assessment and gap analysis offering.. Our GDPR offering automates the assessment process and provides a gap analysis readiness feature, that also ensures that organizations can plan, budget and manage their GDPR program.

    Come to this webinar to see how it is done.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018?
    BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Sian John, Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case Recorded: Aug 17 2017 63 mins
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Using Open Standards to Comply with GDPR
    Using Open Standards to Comply with GDPR Tommaso De Orchi, Solution Manager (EMEA), Yubico and Nic Sarginson, Solutions Engineer (EMEA) Recorded: Aug 17 2017 33 mins
    The EU General Data Protection Regulation (GDPR) was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy, and to reshape the way organizations across the region approach data privacy. Acknowledging identity threats like phishing and man-in-the-middle attacks, the GDPR applies to all companies processing and holding the personal data of those residing in the European Union, regardless of the company’s location.

    An excerpt from the GDPR describes authentication as ‘key to securing computer systems’ and as the first step ‘in using a remote service or facility, and performing access control’. The document also outlines various GDPR-compliant authentication solutions, such as smart card, OTP push apps, and FIDO Universal 2nd Factor (U2F).

    Yubico’s enterprise solution - the YubiKey - combines support for OpenPGP (an open standard for signing and encryption), FIDO U2F (a protocol that works with an unlimited number of applications), and smart card / PIV (a standard that enables RSA or ECC sign/encrypt operations using a private key stored on the device) all in one multi-protocol authentication device. This makes it a strong and flexible solution for companies required to comply with GDPR. Attend this webcast and learn:

    •How GDPR will impact the way organizations worldwide store and access the personal information of EU citizens
    •How to leverage open standards to achieve GDPR compliance for strong authentication
    •How a multi-protocol authentication device protects organizations from phishing and man-in-the-middle attacks
  • BYOD – Why It’s Good for You and How to Secure It
    BYOD – Why It’s Good for You and How to Secure It Graham Williamson and Andrew Ferguson, KuppingerCole Recorded: Aug 16 2017 60 mins
    Mobile devices have won. Whether it’s a cell phone or tablet they are the device of choice for users wanting to access corporate resources. This webinar will discuss the options for supporting these devices as a business imperative. At one end of the spectrum there’s the “corporate device only” approach, at the other end is a BYOD approach. Either approach is acceptable provided it’s based on a risk assessment and adheres to corporate policy.

    This presentation will address the security issues organizations are facing in supporting access to corporate resources from users with mobile devices. Join us as we discuss the importance of establishing a secure BYOD strategy, the security controls you will need to have in place and the need for strong authentication.

    About the Presenters
    Graham Williamson has 25 years experience in the Information Technology industry with expertise in identity management and access control, enterprise architecture and services-oriented architecture, electronic commerce and public key infrastructure, ICT strategy development and project management.

    Andrew Ferguson is one of the founders and key shareholders of Internet Commerce Australia (ICA) and a shareholder of KuppingerCole (Asia Pacific). He is a Senior Consultant with KuppingerCole with a 20 year career in Identity and Access Management and a total of 40 years in the IT sector. He has worked for the UK Ministry of Defence (British Army), Somerset Constabulary & the Metropolitan Police Force in London, in Retailing IT with Debenhams & MFI Warehouses, in Transport & Logistics IT & Consulting with PWC, Unilever, P&O Containers and the Port of Melbourne Authority; and Telecommunications & IT Systems Integration with both Telstra & Optus Communications, plus AT&T, EDS and UCSL.
  • The cyber security challenges faced by businesses adopting a BYOD strategy
    The cyber security challenges faced by businesses adopting a BYOD strategy Martin Cook, LogRhythm Recorded: Aug 16 2017 46 mins
    This webinar will focus on the cultural shift from tightly controlled business networks of yesterday to the converged fabric adopted by businesses today. BYOD is becoming a normality for most organisations and it doesn't have to be a heavy burden for security teams with the right policies, people and technology in place. We'll dive into some of the options available for these challenges in this webinar and how having the right BYOD strategy can play an integral role in an organisation's preparation for EU GDPR compliance.

    We’ll address:
    - The security options available today to enable an efficient and safe BYOD strategy
    - How implementing a strong BYOD strategy can help compliance
    - How you can reduce the risk of suffering a damaging cyber-breach
  • Hybrid Mobile Apps: From Security Challenges to Secure Development
    Hybrid Mobile Apps: From Security Challenges to Secure Development Dr. Achim D. Brucker, Security Consultant & Senior Lecturer, University of Sheffield Recorded: Aug 16 2017 35 mins
    Cross-platform frameworks, such as Apache Cordova, Adobe PhoneGap, or SAP Kapsel are becoming increasingly popular. They promote the development of hybrid apps that combine native, i.e., system specific, code and system independent code, e.g., HTML5/JavaScript. Combining native with platform independent code opens Pandora's box: all the security risks for native development are multiplied with the security risk of web applications.

    In this talk, we will give a short introduction into hybrid app development, present specific attacks and discuss how Android developers are using Apache Cordova. In the second half of the talk, we will focus on the secure development of hybrid apps: both with hands-on guidelines for defensive programming as well as recommendations for hybrid app specific security testing strategies.

    Speaker bio:

    Dr. Achim D. Brucker (https://www.brucker.ch) leads the Software Assurance & Security Research Team (https://logicalhacking.com) at the University of Sheffield, UK. Until December 2015, he was a Security Testing Strategist in the Global Security Team of SAP SE, where, among others, he defined the risk-based security testing strategy of SAP. He is a frequent speaker at security conferences.
  • The Imminent Smart Device Mutiny
    The Imminent Smart Device Mutiny Amar Singh & Chris Payne Recorded: Aug 16 2017 59 mins
    Are we filling our homes and carrying around in our pockets, our biggest cybersecurity vulnerabilities? Join us in a lively debate where we will discuss the increase in IoT and smart devices, some of the lesser talked about threats and what steps are being taken to reduce the risk to the imminent smart device mutiny of future.
  • The Worst Privacy and Security Risks and How To Defend Against Them
    The Worst Privacy and Security Risks and How To Defend Against Them Dr. Christopher Pierson (CSO of Viewpost), Sarah Squire (Founder & Principal Consultant, Engage Identity) Recorded: Aug 15 2017 61 mins
    We live in the age of high-profile breaches and cyber attacks. Every organization is a target, especially in the financial, healthcare and government space. With so much at stake in the event of a breach, what are the biggest cybersecurity risks for organizations? How should we defend against them?

    This live panel will discuss:
    - The relationship between identity, security and privacy
    - The role of data security regulation
    - Why investing in cybersecurity is key
    - The few basic things organizations should be doing today to better secure their customer data

Embed in website or blog