Hi [[ session.user.profile.firstName ]]

EC-Council | Security Channel

  • Date
  • Rating
  • Views
  • Fighting Claim Fraud with InsurTech Fighting Claim Fraud with InsurTech Ina Yulo (BrightTALK), John Erik Setsaas (Signicat), John Egan (Anthemis Group), Jason Peto (360global net) Recorded: Jul 28 2016 60 mins
    When it comes to analysing and managing insurance claims, the market still runs in a very old school manner — human intervention, lots of paperwork and phone calls. This unfortunately also poses a real threat when it comes to fraudulent claims and applications. With digital advances and the rise of InsurTech, these risks can be minimised and fraudulent applications detected way before they can do any harm.

    Join this panel where we’ll discuss:
    -How predictive analytics can help spot fraudulent applications before they can do proper damage
    -How new technologies can help investigate and monitor specific claims
    -The need for more transparency throughout the claiming process and the importance of identity validation
    -Improving the customer journey by empowering the individual to report and settle claims online or through mobile devices
  • Ransomware: The Darker Side of Bitcoin Ransomware: The Darker Side of Bitcoin JP Vergne (Scotiabank Lab, Ivey B-School), Alexander Hinchliffe (Palo Alto), Samee Zafar (Edgar Dunn) Mark Lavender (BT) Recorded: Jul 27 2016 61 mins
    Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.

    However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
    Join this panel of industry-leading speakers, who'll be discussing the following:

    -Why has Bitcoin-related ransomware become more popular in recent years?

    -How can you prevent a Ransomware outbreak in your organisation?

    -Is it possible to catch and subsequently prosecute blockchain criminals?

    -How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?
  • Up and Running in AWS, Now What About Security? Up and Running in AWS, Now What About Security? Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Jul 21 2016 54 mins
    For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.

    Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Tradition is out: where traditional security does and doesn’t fit
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • Security practices for safe mobile money transfers Security practices for safe mobile money transfers Tom Meredith (SmartToken Chain), Ali Raza (CCG Catalyst) Recorded: Jul 20 2016 62 mins
    Every person on the planet has a mobile phone, but 2 Billion people are “Un-banked”.
    Banks and telecoms are in a Gold Rush to bank the unbanked, but many obstacles remain. Money transfers are some of the most popular transactions made by both the banked and the unbanked. However, building trust in this new service is definitely a challenge.

    Join this panel where discussion points will include:

    -Who has the upper hand: Banks or Carriers?
    -How can Fintech companies ensure trust and security when it comes to mobile money transfers?
    -Global ISO Standards Authenticate ID and Asset Verification
    -ISO Reduces Fraud and Speeds up Asset Transfers
    -What are some of the security challenges new payment services are able to overcome?
    -Are “Standards” emerging to reduce implementation and compliance costs?
    -How do you create cross-border and Inter-bank/carrier transactions?
    -How can banks and telecoms successfully bank the unbanked?
  • Mobile Payments: Disruptive innovations or security threat? Mobile Payments: Disruptive innovations or security threat? Kristian Sørensen, Mario Maawad (CaixaBank), Giles Sutherland (Carta), Douglas Kinloch (Inside Secure), Jose Caldera Recorded: Jul 20 2016 62 mins
    With more and more people using their phones to conduct business and make transactions, concerns around security have also increased.

    During the session, we will discuss:

    Is hardware security a thing of the past?
    Will tokenisation solve security issues or introduce new problems?
    How do you secure your app?
    How do you balance security with convenience?
    Will biometrics make secure solutions easier to use?
    The end user perspective - are consumers driven by security or by trust?
    Future outlook - are we heading in the right direction security wise?
  • Bigger Bang for the Buck: Agility with Security for Financial Services Bigger Bang for the Buck: Agility with Security for Financial Services Maya Malevich - Director, Product Marketing Tufin and John Parmley- Area Vice President - US West, Tufin Recorded: Jul 19 2016 43 mins
    For many financial services organizations, security and risk management is a necessary evil that slows down IT's ability to keep up with business needs. The conflict between security and agility becomes even greater with adoption of hybrid cloud platforms. While agility should be maintained, security and compliance become even more challenging.

    By automating and orchestrating network security policies across physical and hybrid cloud platforms, it is possible to maximize both agility and security simultaneously.

    Join us for this session to understand how network security change automation with inherent policy controls can help you stop the balancing act between agility and security and maximize both for your business.
  • Applying Web Isolation to Prevent Advanced Threats Applying Web Isolation to Prevent Advanced Threats Dan Amiga, CTO and Co-Founder, Fireglass Recorded: Jul 14 2016 43 mins
    Conventional security solutions have been failing in preventing advanced threats. Join to learn how web isolation is revolutionizing cyber-security by indisputably eliminating critical attack vectors including browsers, emails and documents
  • Office 365 Security and Compliance – Enforcing the 4 Layers of Trust Office 365 Security and Compliance – Enforcing the 4 Layers of Trust Brandon Cook and Srini Gurrapu of Skyhigh Networks Recorded: Jul 13 2016 50 mins
    Office 365 usage has tripled in the last 9 months as more and more companies enable anytime, anywhere access to Microsoft’s suite of cloud services. But security and compliance require a new level of granularity when users access cloud-based systems of record from a variety of networks, locations, and devices.

    In today’s cloud-first, mobile-first world, IT Security teams are creating variable trust models based on user, device, activity, and data sensitivity. In this session, we’ll share the proven 4-layer trust model for security and compliance in O365.
  • Protecting employees on the move with cloud-friendly application segmentation Protecting employees on the move with cloud-friendly application segmentation Paul German of Certes Networks Recorded: Jul 13 2016 52 mins
    Changed business practices, such as employees working on the move and the adoption of the cloud and cloud resources, should be mirrored by a change in security strategies. Organizations are commonly reluctant to adopt cloud technologies over concerns with security and control over enterprise data. However at the same time, many of these same organizations opened up access to applications for employees on the move, users on personal devices, external contractors, and other third parties that created a significantly larger attack surface than cloud services would have. To combat these threats, a number of cloud-friendly segmentation and application isolation techniques can be deployed to allow organizations to safely use the cloud whilst reducing their attack surface. Specifically, application segmentation via software-defined security represents a technique to accommodate borderless applications, adoption of the cloud, and modern user behaviours.

    Paul German, VP in EMEA, will discuss how the challenges presented by the next generation of information security can be overcome with practical examples and best practice tips.
  • Securing the IoT: next generation Code Signing Securing the IoT: next generation Code Signing Abhinav Sharma and Dave Roche, Product Managers for Symantec Secure App Service Recorded: Jul 13 2016 49 mins
    With the explosion of connected objects and mobile devices, publishing or sharing software - even internally - has become a real challenge for companies with a coding activity. In this webinar, we will explore the code signing threat landscape and share our best practice and solutions to all your code signing needs. You will learn about:

    - the value of code signing today and the new code signing use cases in the world of IoT

    - the risks associated with traditional code signing: key management, auditing and reporting, multitude of signing platforms and files, compliance, embedding in the development process, etc.

    - the security and development costs to take into account

    - how to transition from a traditional to a next generation code signing activity thanks to Cloud based signing

Embed in website or blog