Hi [[ session.user.profile.firstName ]]

IT Security

  • GDPR: Brace for Impact or Not?
    GDPR: Brace for Impact or Not? Mark Rasch, Martyn Hope, Lance James, David Morris Recorded: Mar 23 2018 76 mins
    The GDPR compliance date is fast approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?
  • Intelligence in Cyber Defence - How to Win a Modern Cyber War
    Intelligence in Cyber Defence - How to Win a Modern Cyber War Alexander Poizner, CyberSecurity Advisor Parabellyx Recorded: Mar 23 2018 45 mins
    Modern cyber defence strategy requires us to deal with multiple degrees of unknowns. The effectiveness of traditional risk management approach is greatly reduced by dynamics of modern technology and threat landscape. Enterprises must increasingly rely on security analytics to win the battle against various threat actors. However, to become an efficient tool, your security analytics practice must have both internal and external intelligence at its disposal. During this session, we will discuss the challenges in cyber-intelligence and how to build an effective security analytics practice.
  • You Should've Been a Doctor: How to turn your interests into a career
    You Should've Been a Doctor: How to turn your interests into a career Ina Yulo, Senior Content Strategy Manager, BrightTALK Recorded: Mar 23 2018 44 mins
    Ever since she was a kid, Ina Yulo's grandmother told her that she wasted the skills she had in math and science by going into the marketing and communication field. "You should've been a doctor," said her grandmother. To which she responded, "But I don't WANT to be one."

    Despite taking a while for her to really feel comfortable and proud about her chosen path, she now has a thriving career running content strategy and communities for the FinTech industry, where she has grown a community of over 300,000 global members.

    Join this session where you will learn:

    -How to intelligently turn your interests into an income-earning profession
    -The importance of putting time aside for learning
    -Finding your niche, your tribe, and yourself
    -The importance of speaking opportunities and throwing yourself out there
    -Branching out -- How not to be a one-trick pony
  • First – Fix the Plumbing - What’s broken in cyberspace and How to Fix it
    First – Fix the Plumbing - What’s broken in cyberspace and How to Fix it Amar Singh, Adam Gladsden Recorded: Mar 23 2018 57 mins
    Way back in 2000 it was common practice to spend considerable time configuring and tinkering the plumbing of what we today call cyberspace. The technology was embryonic, immature and often hours were spent ensuring nothing broke and that the business operations carried on smoothly.

    Today, those flaky technologies are settled and stable.
    - AI and Machine Learning are the focus of marketing teams.
    - Everyone keeps focusing on NG or next generation technology.
    - If not technology, we keep blaming the human!

    Today, surely, the technical plumbing, the boring stuff is secure and stable, correct?

    Think again.

    In this webinar we explore the bedrock technologies underpinning cyberspace and discuss why we need to focus on understanding and securing them.

    Panelists -

    - Amar Singh - CEO and Founder Wisdom of Crowds, Cyber Management Alliance Ltd
    - Adam Gladsden - SME cybersecurity technologies.
    - NH - DV Cleared, Cyber Criminologist, Dark web researcher & master ethical hacker
  • Weakest Link to Strongest Asset: Let's Focus on the Culture
    Weakest Link to Strongest Asset: Let's Focus on the Culture Tarun Samtani, Group DPO for Vectura Group Plc, & SkyePharma Recorded: Mar 23 2018 39 mins
    It is commonly said that staff are the weakest link to security but is it really? Or we have missed something? Computers process and transmit data and we have been patching them for last 20 odd years or longer but how about humans?

    This session will be all about how you turn your so called weakest link (the people) in to your strongest asset in the fight for cybercrime. Especially, with the new upcoming regulation GDPR it has become even more crucial.

    About the Speaker:
    Tarun Samtani is the Group DPO for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Retail, Leisure, Telecommunications, ISP's, Financial Services, Gambling and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments.
  • Building a Strong Information Security Program in 2018
    Building a Strong Information Security Program in 2018 Michelle Drolet, CEO and Co-founder, Towerwall Recorded: Mar 23 2018 42 mins
    How can you build a strong information security program that ensures the protection of the confidentiality, integrity, and availability of your information assets and supporting infrastructure? How are your governance functions evolving to meet the latest cybersecurity threats?

    Join this webinar to discuss the development of the following governance related functions and more;
    * Security Leadership
    * Security Strategy
    * Policy Management
    * Organizational Security Roles and Responsibilities
    * Third Party Security Management
    * Security Awareness
  • A Paradigm Shift in Enterprise Cyber Defence Strategies: The Role of End Users
    A Paradigm Shift in Enterprise Cyber Defence Strategies: The Role of End Users Dr Debbie Garside, CEO, GeoLang Ltd Recorded: Mar 23 2018 29 mins
    Every enterprise has a pre-built enterprise cyber defence arm; their employees. Enterprises are only now starting to recognise the potential cyber defence value employees offer. Harnessing and educating this currently untapped resource will change the face of enterprise cyber defence – putting responsibility on the front line, minus the blame culture.

    This webinar will highlight where and how your employees can add significant value to your Enterprise cyber defence in-depth strategy.
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation Ian Greenwood, Regional Sales Manager UK&I Recorded: Mar 23 2018 35 mins
    Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.

    With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    This webinar will consider:

    • Key security considerations for a digital transformation strategy

    • Why a proactive data defence strategy is crucial

    • The benefits of maximising the level of control over data irrespective of where it is created, store or shared.
  • Career Conversations w/ Debra J Farber - Privacy Guru
    Career Conversations w/ Debra J Farber - Privacy Guru Debra J. Farber, Privacy Guru and Jessica Gulick, WSC Vice President Recorded: Mar 22 2018 59 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Debra J Farber, CISSP-ISSMP, CIPP/US, CIPP/E, CIPT, CIPM, FIP | Executive Consultant & U.S. Chief Privacy Office, CRANIUM

    Hosted by: Jessica Gulick, WSC Vice President, CEO of Katzcy Consulting

    About the Speaker:
    Debra J. Farber (@privacyguru) is a data privacy and information security executive and entrepreneur with 13+ years of data strategy, operations, public policy, training, product, and compliance experience across industries and frameworks. She's Executive Consultant & U.S. Chief Privacy Officer, at CRANIUM, an EU-based privacy and security consulting firm with offices in Brussels, Utrecht, Budapest, NYC, & San Francisco. She also serves as an Executive Consultant and External DPO for CRANIUM's many clients.

    Based in San Francisco, Debra serves on several industry working groups and startup advisory boards. She is a member of the IEEE Data Privacy Process Standards Working Group, IAPP CIPT Exam Development Advisory Board, and privacy tech vendor BigID's Advisory Board. In addition, Debra serves as Editorial Board Member for Cyber Security: A Peer-Reviewed Journal. She also co-founded the SF-based non-profit project, Women in Security and Privacy (WISP).
  • What Hackers Know That You Don’t: Personal Data Edition
    What Hackers Know That You Don’t: Personal Data Edition Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Mar 22 2018 40 mins
    The internet is a rapidly shifting landscape that continues to integrate with our daily life. Today, having an easily searchable online identity that is inseparable from your own is considered a boon both in and outside of the workplace, and is often considered essential to maintaining a modern social circle. Half of internet users recycle their passwords, a practice that’s been shown to present a significant security risk, especially when it comes to the possibility of a data breach. The volume of stolen data increased 40% from 2015 to 2016 alone. These numbers aren’t just because there’s more information out there, either.

    Hackers are getting smarter and there are significant incentives for cyber-criminals to engage in and traffic stolen records on a massive scale. Coordinated attacks that exploit fundamental flaws in current data storage practices are becoming more common. As the digital presence of a user increases through multiple online services, all vying for different pieces of personal information, so does the chance that the information they enter may be compromised. Even with relatively limited access, attackers can combine what they’ve obtained from now-infamous breaches with publicly available info to further compromise a user’s identity to various ends.

    In this webinar, we will share solutions to mitigate the increasing threats to digital identity theft, as well as outline some of the economic factors that perpetuate the underground industry capitalizing on those threats. This webinar will focus on:

    - Share insight into how and why hackers are motivated to steal information now more than ever
    - Discuss how businesses can build secure ecosystems that are founded on authenticity, but created to protect personal data with less friction and risk
    - Review ways that businesses should rethink their approach to handling personal data and defend against the threat of a data breach
  • How Bro Provides Better Data and Enables 10x Faster Incident Response
    How Bro Provides Better Data and Enables 10x Faster Incident Response Vince Stoffer, Director of Customer Solutions at Corelight Recorded: Mar 22 2018 46 mins
    Resolving security incidents and threat hunting relies on access to great data. Network data is ground truth at any organization because essentially all threats must traverse a network. And when it comes to network data, there's no better source than Bro, the open source network monitoring project created in 1995.

    This webinar will be an overview of how Bro creates better network data, and why it gives incident responders and threat hunters a powerful new tool that can cut the time required to resolve typical incidents by a factor of 10 or more.

    Watch this webinar to learn:
    - The massive improvement in the work of incident response effectiveness with and without Bro
    - How Bro can reduce the time to resolve incidents and help you get to the truth faster
    - The specific capabilities of Bro and how that helps security teams hunt and defend more effectively
    - How Bro may help you reduce or eliminate any further investment in PCAP systems

    Vince Stoffer, Director of Customer Solutions at Corelight, spent the first part of his career as an incident responder. He will talk about his experience doing incident response before he became aware of Bro, and contrast that with his role at Lawrence Berkeley Lab where he was defending the national lab network where Bro was first developed.
  • Into the Mind of a Healthcare Hacker: A Penetration Tester's Perspective
    Into the Mind of a Healthcare Hacker: A Penetration Tester's Perspective Chuck Ben-Tzur, Information Security Consultant | eSentire Recorded: Mar 22 2018 61 mins
    The healthcare industry continues to be one of the most exploited industries. Risk factors such as third party access, high volume of staff-patient interaction and an investment imbalance when it comes to protecting a patient’s health vs. their personal information leaves healthcare organizations susceptible to attack. While new vulnerabilities present new vectors to exploit, attack techniques remain fundamentally the same: discover, analyze, attack and exploit. Assuming attackers will continue to find a way through, the key to reducing risk is understanding how they target and execute their attacks.

    Join eSentire Penetration Tester, Chuck Ben-Tzur, as he shares his experience conducting penetration tests against healthcare organizations.

    Chuck will cover the following topics:

    • Why healthcare organizations are a prime target for cyber-attackers
    • The tools and fine-tuned attack vectors used by attackers
    • Common weaknesses and potential impacts
    • A real-life account of an attack on a healthcare organization
    • Recommendations for strengthening your security posture
  • The Future of Passwords
    The Future of Passwords Hamza Sirag Recorded: Mar 22 2018 58 mins
    This webinar will provide an overview of the future of passwords. Passwords have become very important, protecting a treasure trove of information. You will get an inside look at the techniques and tactics used conduct password attacks. We will discuss the various countermeasures available, new improvements made to the latest operating systems to prevent successful password attacks, and how the industry is trying to eliminate passwords. We will conclude by discussing ways we can potentially circumvent new countermeasures.

    Hamza Sirag Hamza is currently an Information Security consultant. He has spent the majority of his time immersed in the world of cybersecurity. He has had the opportunity to lead complex penetration tests for a variety of federal and commercial clients. He is the founder of Beltway Hackers, a Northern VA based meetup group focused on offensive cybersecurity. https://www.meetup.com/Beltway-Hackers
  • Open Source Projects That Break Boundaries
    Open Source Projects That Break Boundaries Steven Zimmerman, Product Marketing Manager, Black Duck by Synopsys Recorded: Mar 22 2018 60 mins
    Over the last decade, Black Duck by Synopsys has recognized some of the most innovative and influential open source projects launched during the previous year, as recognition to the success and momentum of these projects, and affirmation of their prospects going forward.
    In this webinar, we'll explore the origins and evolution of this year's most outstanding Open Source Rookies, who are investing their efforts in everything from Autonomous Driving, through Scalable Blockchain, and VNF Orchestration, to Personal Security and Relationship Management.
  • Insider Threats – Enhancing PAM as Effective Countermeasure
    Insider Threats – Enhancing PAM as Effective Countermeasure CA Hosts: Rob Marti, Privileged Access Management Director & Alexandra Beswerchij, Product Marketing Manager Recorded: Mar 22 2018 49 mins
    Have you reviewed the 2018 Insider Threat Report from Cybersecurity Insiders? The results are dramatic:

    • 90% of organizations feel vulnerable to insider threats
    • Over 50% have experienced an insider attack in the past year
    • 67% cite phishing as the prime concern of attacks

    Insider Threats are real. Be ready. Join CA hosts - Rob Marti, Privileged Access Management Director and Alexandra Beswerchij, Product Marketing Manager - to review the research and discuss how a layered and comprehensive Enterprise IAM approach enhances PAM to provides an effective countermeasure to both insider attacks and external actors.

    Exploit key security tactics and strategies.
  • Briefings Part 2: Top Three Ways To Tackle API Security
    Briefings Part 2: Top Three Ways To Tackle API Security Speaker: Ryan Potter, Director of Cloud Strategy and Alliances, Imperva; Brandon Dunlap, Moderator Recorded: Mar 22 2018 60 mins
    Security is an essential element of any application and increasingly critical for API-driven architectures in hybrid and public cloud environments. New threats and vulnerabilities emerge constantly, and enterprises find themselves struggling to protect these APIs from attacks. Join Imperva and (ISC)2 for Part 2 of our Security Briefings series on March 8, 2018 at 1:00PM Eastern where we will discuss proven approaches to making API security a priority through understanding how common types of attacks such as distributed denial of service (DDoS) can target APIs, what are the steps to proactively secure development frameworks, and how to enforce identity across enterprise environments.
  • [Earn 1 CPE]  Enabling Cybersecurity: Ignite Your ERM Program
    [Earn 1 CPE] Enabling Cybersecurity: Ignite Your ERM Program Colin Whittaker with Tim White, Qualys, Alon Yaffe, Barracuda; Cameron Jackson, Riskonnect; and Marc French, Mimecast Recorded: Mar 22 2018 75 mins
    Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.

    Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.

    Qualifying participants will earn 1 CPE credit.

    Learning Objectives:

    - Discover how to identify, catalog, and prioritize risks across the enterprise
    - Find out how to quickly measure critical activities and address inherited risk
    - Learn how to gain efficiency and effectiveness of current risk-management approaches
  • Myths & Realities of Multi-factor Authentication: The CISO Perspective
    Myths & Realities of Multi-factor Authentication: The CISO Perspective Stephen Lawton, Special Projects Editor, SC Magazine, Alvaro Hoyos, CISO, OneLogin Recorded: Mar 22 2018 33 mins
    Passwords alone won’t cut it in the days of sophisticated phishing, spoofed email and social engineering attacks. High-profile security breaches are making headlines weekly, and the number of incidents continues to rise. Multi-factor authentication (MFA) has become the go-to tactic to prevent malicious parties from accessing sensitive corporate data. While MFA provides undeniable value, conventional MFA solutions are difficult and time-consuming to implement with end-user usability implications.

    Watch this informative on-demand webcast hosted by SC Magazine featuring OneLogin’s, CISO, Alvaro Hoyo as we uncover the current state of MFA and the tangible security value it provides, plus key elements of a successful MFA strategy.