Hi [[ session.user.profile.firstName ]]

Information Security Community

  • Date
  • Rating
  • Views
  • Zero-Day Attacks and What To Do About It
    Zero-Day Attacks and What To Do About It Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton Recorded: Apr 20 2017 35 mins
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
  • BrightTALK at RSA 2017: Ben Bernstein on Cyber Attack Trends for 2017
    BrightTALK at RSA 2017: Ben Bernstein on Cyber Attack Trends for 2017 Josh Downs, BrightTALK & Ben Bernstein, CEO, Twistlock Recorded: Apr 20 2017 10 mins
    BrightTALK caught up with Twistlock's CEO Ben Bernstein for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - Trends in the cyber threat landscape
    - What companies can be doing to better improve their security posture
    - 2016's biggest breaches (including Yahoo) and why they happened
    - Preparations to take in advance of GDPR in May 2018
    - Cyber security in the financial sector
    - AI & Machine learning and the influence it'll have on the security industry

    About the Speaker:
    Ben Bernstein co-founded Twistlock, Inc. in 2015, and serves as its Chief Executive Officer. Ben has 14+ years of experience in enterprise security and operating systems. He is a Microsoft veteran with extensive experiences in both software development and product management. Ben is a veteran of the Israeli Intelligence Corps. He has a B.A cum laude in Computer Science from the Technion in Israel and an MBA with a scholarship of excellence from the Interdisciplinary Center in Israel. Ben hates writing about himself in third body.
  • How to respond to cyber security incidents faster, smarter, better
    How to respond to cyber security incidents faster, smarter, better Chris Neely, Director of Technical Sales, EMEA, IBM Resilient Recorded: Apr 18 2017 57 mins
    How to respond to cyber security incidents faster, smarter, better: an introduction to the Resilient Incident Response Platform

    The Resilient incident response platform (IRP) empowers cyber security teams to orchestrate their incident response processes, and respond to and resolve incidents faster, more effectively, and more intelligently. The Resilient IRP is the leading platform for orchestrating and automating incident response processes.

    This demonstration will showcase the Resilient IRP’s ability to enable complete IR orchestration and automation - aligning security teams' people, process, and technologies into a single hub for incident response.By understanding the capabilities of the solution, attendees can learn how to:

    • Achieve greater intelligence and efficiency by integrating your existing security technologies, including SIEMs, EDR, threat intelligence, and more.

    • Adapt to real-time incident conditions with Resilient Dynamic Playbooks –ensuring a fast and complete response to all incident types.

    • Build, configure, and maintain your own IR action plans within hours or days
  • DIY PKI
    DIY PKI Rae Barton, PKI expert at Gemalto Recorded: Apr 17 2017 56 mins
    Public Key Infrastructure (PKI) is a well-known security protocol used by some of the world’s largest governments and top enterprises, but it’s a technology that also affords many possibilities in new and growing industries. Even small to medium sized businesses can greatly benefit from PKI. However, PKI is also often mistakenly perceived as being difficult to deploy. Gemalto is addressing this common misconception. The next webinar in our PKI series, DIY PKI, will walk attendees through the entire process of setting up a PKI environment and how to manage it. We have developed a five step process to make it easy for security professionals to get their PKI system up and running with minimal time spent. The five step implementation method will give you an idea of how to set up a two tier Microsoft PKI infrastructure with Gemalto SafeNet Authentication Manager and SafeNet Luna HSM to perform smart card log on for small to medium sized enterprises.

    Attendees of the DIY PKI webinar will learn:

    -Challenges of PKI deployment
    -Overall PKI integration ecosystem
    -Common use cases deployed in enterprises: Smart card logon – What happens in the backgrounnd, email encryption/signing

    Step by step implementation steps
    oInstall and configure a Hardware Security Module (HSM)
    oInstall the root CA and configure it with the HSM
    oInstall and configure the issuing CA
    oConfigure the permissions of users and create certificate templates
    oInstall and configure an authentication manager



    For the purpose of this webinar and using Gemalto’s five step propriety approach, we will use our SafeNet line of technologies to demonstrate the implementation of the PKI solution.
  • BrightTALK at RSA 2017: Bill Diotte on Securing IoT Networks
    BrightTALK at RSA 2017: Bill Diotte on Securing IoT Networks Josh Downs, Community Manager, BrightTALK & Bill Diotte, CEO, Morcana Recorded: Apr 13 2017 8 mins
    BrightTALK caught up with Mocana's Bill Diotte for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - The difference between securing IoT networks than tradition enterprise IT networks
    - The role of government regulation in IoT security
    - The 'mission critical' elements that need protecting in IoT networks
    - The threat actors and motives targeting IoT networks
    - The role of cyber warfare in global geo-politics

    About the Speaker:
    William (Bill) Diotte is a technology entrepreneur, CEO and Board Member with over 20 years of experience in working with tech-driven companies from startup stage to Fortune 500. Prior to joining Mocana as Chief Executive, he was the co-founder and CEO of software defined networking pioneer BroadHop Inc., acquired by Cisco. Starting off his career as a manufacturing engineer, he became an executive and managing director with both Gemini and SRI Consulting serving high tech companies in the software and telecom markets. Bill has also served as a Board Member to LiveAction, Inc., and is an investor and advisor to several companies in the software infrastructure and security space.
  • Prevent Major Data Breaches with Threat Lifecycle Management
    Prevent Major Data Breaches with Threat Lifecycle Management Seth Goldhammer, Senior Director of Product Management Recorded: Apr 12 2017 61 mins
    Throughout 2017 organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    A traditional prevention-centric strategy naively assumes all threats can be blocked at the perimeter, which leaves you blind to the threats that do get in. Many organisations are shifting to a more balanced strategy including detection and response. Enter Threat Lifecycle Management (TLM) - your playbook for rapidly detecting and responding to cyber-attacks.

    In this webcast, Seth Goldhammer, senior director of product management at LogRhythm, explains what TLM is, and demonstrates how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.
  • IoT Security Over Tea: Steeping Out the Hype
    IoT Security Over Tea: Steeping Out the Hype Gorav Arora, CTO Office Director of Technology at Gemalto Recorded: Apr 11 2017 63 mins
    A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.

    We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.

    Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
    •A grounded perspective on IoT
    •Why IoT security matters for everyone
    •The persona analysis of IoT security
    •Key considerations as it begins to take off
    •How to protect what matters most to you
  • Human Factor Podcast : Sarah Clarke
    Human Factor Podcast : Sarah Clarke Jenny Radcliffe Recorded: Apr 11 2017 52 mins
    In this episode, I am delighted to be chatting to Sarah Clarke. Sarah is a well known privacy and security blogger (www.infospectives.co.uk) armed with over 15 years practical experience. After a business degree she tried out a few roles before finding IT. Since then she has worked across many sectors in IT Security, Information Security, Cybersecurity Governance, Risk, & Compliance and more recently Data Protection and Privacy.

    To see more information, click here - http://jennyradcliffe.com/episode-03-sarah-clarke/
  • BrightTALK at RSA 2017: John Bambenek on the State of the Cyber World in 2017
    BrightTALK at RSA 2017: John Bambenek on the State of the Cyber World in 2017 Josh Downs, Community Manager, BrightTALK & John Bambenek, Manager, Threat Systems, Fidelis Cybersecurity Recorded: Apr 11 2017 10 mins
    BrightTALK caught up with Fidelis Cybersecurity's John Bambenek for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The future of Cyber warfare
    - The tasks for the US political administration on an information security level
    - The Yahoo breach and who was to blame
    - GDPR and the steps that companies need to take to prepare for the legislation
    - A vision of the threatscape; new actors, motives and techniques
    - AI and machine learning and the role it has to play in the cyber security industry

    About the Speaker:
    John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
  • Human Factor Podcast : Rowenna Fielding
    Human Factor Podcast : Rowenna Fielding Jenny Radcliffe Recorded: Apr 11 2017 55 mins
    In this episode, I’m delighted to be joined by Rowenna Fielding, who is the Information Governance Officer for the RNIB.

    Rowenna is a self-confessed privacy nerd and Information Governance Geek who began her career in information security, before broadening her
    horizons to take in the other 7 data protection principles as well.

    Having tunneled through the retail, industry and education industries then IT services for Central Government, Rowenna has now emerged into
    the sunlight of the voluntary sector and is on a mission to eradicate the word “boring” from the world of data protection, through the use of charm, pirate analogies and generous distribution of biscuits.

    To see more information, click here - http://jennyradcliffe.com/episode-11-rowenna-fielding/

Embed in website or blog