This session will look at the changing threat landscape and share intelligence insights and practical approaches to combat threats and help your organisation stay safe.
Nick Coleman is the Global Head of Cyber Security Intelligence Services at IBM. Previously he was National Reviewer of Security for the UK Government. He is an appointed advisor to the Executive Director of the EU Cyber Security Agency ENISA serving on the Permanent Stakeholders Group. He is an Honorary Professor at Lancaster University. He is a Fellow of the Institution of Engineering and Technology and a Fellow of the British Computer Society. He also holds an MBA with Distinction.
BrightTALK caught up with Menlo Security's Jason Steer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The Russian hack of the US election
- AI & Machine learning in Cyber Security
- The Yahoo breach and steps to take to avoid it happening to other companies
- The leading prevention technologies currently and how to adopt them
- Cyber warfare in today's political spectrum
These days it's not a matter of if you'll be breached, but when. Security teams in the modern enterprise must accept that as well as efforts to protect their perimeter, they must also focus on understanding their east-west traffic.
This panel discussion will look at the trends and technologies influencing cyber security strategy in 2017, in particular those that deal with effectively monitoring your network to ensure your organisation handles vulnerabilities and stays breach free.
- Josh Downs, Community Manager - Information Security, BrightTALK (moderator)
- Jeff Costlow, Director of Security, ExtraHop Networks
- Rami Mizrahi, VP of R&D, TopSpin Security
- Francois Raynaud, Founder, DevSecCon
Tune into this panel conversation if you're a network or security professional looking to hear the latest trends and security best-practices to defend against a constantly evolving opponent.
As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Building and maintaining a capable Cyber Security team today is a challenge.
A fundamental shortage of Cyber Security professionals, coupled with high attrition rates, can lead to organisations failing to acquire or retain the expertise necessary to respond to an ever-evolving threat landscape.
To better help you prepare against this situation, we have arranged for a webinar session, where we will explore the skills gap in the different stages of a Cyber Security programme, and provide recommendations on how to:
•Create and operationalise a robust cyber security team
•Build and upskill existing talent
•Address the skills gap in different stages of your Cyber Security programme
•Source skilled security professionals differently
(1) Source: ISACA’s State of Cyber Security 2017: Current Trends in Workforce Development
- BrightTALK at Infosecurity Europe 2016 -
BrightTALK got the chance to quickly catch up with Blue Coat Systems' Robert Arandjelovic to discuss the current cyber security landscape.
Robert talked through the attractiveness of financial institutions as targets for cyber crime and cyber criminals along with the main threat actors at play.
He also covered how to mitigate and respond to the danger of an insider threat; how to effectively monitor your company's network; how we should be protecting our critical infrastructure and finally the developments from the world of cyber security that we should be really optimistic about.
Cyber threats continue to evolve and rapidly expand - both in terms of sophistication, complexity and the scale of their consequences. Find out why having a good understanding of the Cyber Kill Chain can help you take a preventative approach to cloud security.Read more >
The future for women in Cyber Security is NOW.
Despite the growing demand and tremendous opportunities in the job market, cyber security remains an area where there is a significant shortage of skilled professionals regionally, nationally and internationally.
At EC-Council University we want to empower and recognize women who are results-driven and able to manage multiple disparate tasks while leading groups to achieve positive outcomes and astonishing professional successes.
Even worse, women’s representation in this male-dominated field of security is alarmingly low. Women are detail oriented with an analytical mind that quickly assess and achieve solutions to the most difficult problems, prioritizing and executing in a rapid, dynamic environment.
“At EC-Council University we wish to highlight these prestigious women and set examples for others to follow suit.”
- RSA 2016 -
BrightTALK favourite Raj Samani took the time to discuss the influence of cyber on middle eastern political conflicts; the role of hacking in Russian-American tensions; how to combat the cyber skills shortage and the enduring benefits of security collaboration.
BrightTALK caught up with Kai Roer, the Creator of the Security Culture Framework for an in-depth conversation on security culture and it's value to businesses today. Kai also talks through the findings of the Security Culture Report 2017, which can be accessed via the videos attachments.
Topics up for discussion:
- The importance of building a strong culture of security at businesses to add to an overall security strategy
- How to improve security culture within your organisation
- GDPR and how to prepare effectively
- The findings of the Security Culture Report 2017
- BrightTALK at CRESTCON & IISP Congress -
BrightTALK caught up with IBM Security Europe's Martin Borrett for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- AI & machine learning and the influence that the technology will have on the security space
- The ins and outs of AI & machine learning and how it analyses your data looking for security incidents
- How to find a good solution to suit all budgets
- The growth of IoT networks and how we can look to protect them effectively
- V2V security and how to ensure connected cars are protected from cyber threats
- The threatscape in 2017; the threat actors, motives and attack techniques
To find out more about IBM Security, click the link in the attachments tab.
In this talk, we will give a short introduction into hybrid app development, present specific attacks and discuss how Android developers are using Apache Cordova. In the second half of the talk, we will focus on the secure development of hybrid apps: both with hands-on guidelines for defensive programming as well as recommendations for hybrid app specific security testing strategies.
Dr. Achim D. Brucker (https://www.brucker.ch) leads the Software Assurance & Security Research Team (https://logicalhacking.com) at the University of Sheffield, UK. Until December 2015, he was a Security Testing Strategist in the Global Security Team of SAP SE, where, among others, he defined the risk-based security testing strategy of SAP. He is a frequent speaker at security conferences.