Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Vote Cyber! Modern Day Threats to Democracy Vote Cyber! Modern Day Threats to Democracy Simon Crosby, CTO of Bromium Recorded: Oct 20 2016 37 mins
    The US election and its voting infrastructure are under attack. The result is ugly and shows the extent to which we need to plan for and protect against the influence of cyber-related attacks on US elections in future. In this brief discussion, Simon Crosby, CTO of Bromium will review the underpinnings of Democracy, and how we might defend it when it is in everyone’s interest to subvert it.
  • The Data Breach War: How banks can step up their line of defence The Data Breach War: How banks can step up their line of defence JP Vergne (Scotiabank Lab, Ivey B-School), Nik Walser (EY), Mario Maawad (CaixaBank), Lawrence Chin (Palo Alto Networks) Recorded: Oct 19 2016 62 mins
    As holders of valuable client and financial data, banks have been prime targets for hackers and thieves. Entire payment systems can be compromised in the blink of an eye and clients also risk having their identities stolen.

    Join this panel session where our experts will discuss:

    -Best practices for preventing cyberattacks at every stage
    -Top mistakes banks and financial institutions make when dealing with valuable data
    -What makes you a target?
    -Using real-time analytics to identify anomalies and act on them immediately
    -Malware, threat prevention, next-generation security — what are they, what do you need to know?
  • IT Security & Privacy Governance in the Cloud IT Security & Privacy Governance in the Cloud Moderated by Rebecca Herold, The Privacy Professor; Jacqueline Cooney, BAH, Daniel Catteddu, CSA, Chris Griffith from HPE Recorded: Oct 18 2016 61 mins
    After multiple newsworthy data breaches in recent times, IT security and privacy governance has gained importance across the globe. Most organizations have established security and compliance policies and procedures to protect their intellectual property and corporate assets, especially in the IT space. As companies transition their applications and data to the cloud, it is critical for them to maintain, or preferably surpass, the level of security they had in their traditional IT environment. Leaders are also responsible for defining policies to address privacy concerns and raise awareness of data protection within their organization, and for ensuring that their cloud providers adhere to the defined privacy policies. Failure to ensure IT Security when using cloud services could ultimately result in higher costs and potential loss of business, thus eliminating any of the potential benefits of the cloud.

    While security and privacy are related, they are also distinct. IT security is primarily concerned with defending against attacks, not all of which are aimed at stealing data, while privacy is specifically related to personal data held by an organization, which may be endangered by negligence or software bugs, not necessarily by malevolent persons. On this webinar our panel of experts will address some of the key distinctions, and discuss some best practices for managing IT security and implementing privacy governance for the cloud.
  • Elections, Deceptions and the Coming Cyberwar Elections, Deceptions and the Coming Cyberwar John Bambenek, Manager, Threat Systems at Fidelis Cybersecurity Recorded: Oct 17 2016 39 mins
    Earlier this year, it appeared Russian state sponsored actors had not only hacked the Democratic National Convention and Democratic Congressional Campaign Committee, they were using the purloined information for a propaganda operation insider the United States to attempt to influence the election. Now that the United States has made it clear there will be retaliation for this, we may have crossed over to open cyberwar. This talk will talk about the lead up to where we are today, what the likely outcomes of two developed nations attacking each other will be and what it means for consumers and enterprises who still most operate globally.
  • The Value of Redaction and Anonymity: Protecting Against Unwanted Exposure The Value of Redaction and Anonymity: Protecting Against Unwanted Exposure Paul Kurtz, Co-Founder & CEO of TruSTAR Technology Recorded: Oct 14 2016 27 mins
    We need a different type of intelligence exchange in this day and age - an exchange that is designed for timely and actionable insights. TruSTAR finds that there are 2 core pillars that enable this: Protecting Against Unwanted Exposure + Immediate RoI to Incentivize Early Use.

    We will be covering the 1st pillar in this webinar. The focus on privacy and the protection of unwanted market and reputational risk is a key ingredient to enabling a powerful and active exchange.

    Join TruSTAR's CEO Paul Kurtz and learn about the value of Redaction and Anonymity when thinking about a successful and active incident exchange.
  • Privacy vs. Security: Balancing Vulnerability Awareness & Incident Prevention Privacy vs. Security: Balancing Vulnerability Awareness & Incident Prevention Keith Moulsdale, Partner with Whiteford Taylor Preston LLP, Tim Vogel: CEO & CISO, Xtium; Kevin Lancaster, CEO, ID Agent Recorded: Oct 14 2016 59 mins
    Join us for this timely discussion with privacy and data security experts. With ever looming environmental threats such as of ransomware, data theft, denial-of- service attacks, every organization and every industry must be focused on IT security. However, there is a delicate balance and frequent conflicts between the idea of information privacy and security.

    How much individual privacy can be expected in an inter-connected world? How much should be sacrificed for the sake of maximizing corporate security? And where (if anywhere) can the lines between personal and corporate be drawn? How do these issue impact policies, training and security surrounding even the most simple of business communication tools: email.

    This presentation will provide an overview of the privacy vs. security challenges and explore specifically how these issues are impacting the issue of user email credentials and email vulnerabilities. This is especially critical given that emails are the number one contributor to data breaches. In fact, 63% of breaches in the US last year were the result of a compromised email credential.

    We will then a) discuss common misperceptions and security holes that can lead to ransomware and other malware vulnerabilities, b) compare the various alternatives for proactively addressing these vulnerabilities, and c) discuss strategies for preventing and responding to cyberattacks.
  • Privacy and/or Security – It’s a Matter of Perspective! Privacy and/or Security – It’s a Matter of Perspective! Michael Lester, Chairman & Co-founder of SecretValet LLC Recorded: Oct 13 2016 41 mins
    Germany and France have “Declared War” on encryption in the name of national security and fighting terrorism at the same time that Apple and Microsoft have increased their encryption to ensure privacy. The twin concepts of Privacy and Security seem to be at odds with each other with governments primarily pushing for less personal privacy to provide greater national security while private corporations are pushing for more personal privacy claiming that personal privacy has little to no effect on national security or the fight against terrorism. How can both be right/wrong? How is it trending? Join us for a look at where we are now, how we got here, why most people are asking the wrong questions, and how the outcome of this battle will affect individuals, corporations, and countries alike.
  • Turbocharge your Cyber Investigations, Part 1 Turbocharge your Cyber Investigations, Part 1 Jeff Lenton, Solutions Architect, RiskIQ Recorded: Oct 13 2016 32 mins
    While their cyber tactics may be continuously changing, bad actors can’t avoid interacting with core components of the internet. These interactions leave a trail that when connected through rigorous threat infrastructure analysis, can reveal the full scale of an attack and provide the information needed to determine the best response. The key to this analysis is access to a variety of global datasets and the ability to correlate and pivot between them in your investigation.

    In this two part series we will look at a range of global datasets and how each can be used to shed additional light on your adversary’s infrastructure. This session will focus on Passive DNS, Whois and Malware data. We will also demonstrate how security analysts can use the free community version of RiskIQ’s PassiveTotal to gain access to and pivot across these global datasets.
  • Using machines to combat criminals Using machines to combat criminals Lloyd Webb, Sales Engineering Director, Cylance Recorded: Oct 13 2016 39 mins
    2016 is turning out to be a landmark year in terms of Ransomware and there’s no sign of these threats slowing down any time soon. Ransomware is not new, it is just getting more sophisticated and is inflicting major damage to companies, organisations and individuals, shaping up to be a frighteningly lucrative year for cybercriminals, where any person with a computer can be exploited and used as a revenue source with the potential for vast profits.

    Learn how Cylance have revolutionized the industry by utilizing data science and security experts to provide a next-generation cybersecurity technology that proactively prevents, rather than detects the execution of advanced persistent threats and malware in real time before they ever cause harm.
  • Mostly OK Means Occasionally Disastrous: Context, Privacy & User Expectations Mostly OK Means Occasionally Disastrous: Context, Privacy & User Expectations John Wunderlich, Information Privacy & Security Expert, John Wunderlich & Associates Recorded: Oct 12 2016 46 mins
    Protecting customer privacy is usually closely aligned with security. However, when faced with national security threats, where do companies draw the line? In the example of social media companies that are trying to limit the reach of extremist videos and suspending extremist accounts, a problem can arise when such a system is used by an authoritarian regime to take down or identify individuals opposing it. The same tools, but used in a different context, become something other than what was intended. Join this talk as John Wunderlich, an information privacy and security expert, discusses why incorporating privacy into the design of such tools is key to protecting them from abuse by authoritarian regimes.

Embed in website or blog