Hi [[ session.user.profile.firstName ]]
Sort by:
    • Presenting Cybersecurity to the Board: Your How-to for Success
      Presenting Cybersecurity to the Board: Your How-to for Success Richard Clarke, Jasper Osstenjuk, Jake Olcott Recorded: Jan 25 2017 6:00 pm UTC 62 mins
    • Today, cybersecurity is a #1 concern for board members. But what do they need to know? And how should it be presented?

      Richard Clarke has a pretty good idea. As a senior White House advisor to four U.S. Presidents, a member of three corporate boards, and CEO of Good Harbor Security Risk Management, he’s talked cybersecurity in both the Situation Room and the boardroom.

      Jasper Ossentjuk also knows how to present cybersecurity in the boardroom. As SVP and CISO for TransUnion, Jasper regularly presents information to his Board about his organization's security posture.

      On January 25th at 1:00PM ET, join Richard and Jasper for a discussion of:

      - What cybersecurity metrics and measurements are most important for the board
      - Methods for security leaders to communicate security issues across the enterprise
      - How to graphically represent your cybersecurity program

      Read more >
    • Demystifying the NIST Cybersecurity Framework for Healthcare
      Demystifying the NIST Cybersecurity Framework for Healthcare Don Kleoppel, Chief Security Officer, Cerner and Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Feb 9 2017 6:00 pm UTC 51 mins
    • As cyber-attacks are growing more sophisticated and focused on the healthcare industry, it is paramount that these organizations put in place an effective, robust, and dynamic approach to identifying, managing and/or mitigating critical threats on an ongoing basis.

      This quarterly webinar series is designed to discuss how healthcare organizations are adopting the 5 core functions of the NIST Cybersecurity Framework-Identify, Protect, Detect, Respond, and Recover- to help them defend against cybersecurity threats on an ongoing basis, prioritize security risks and incidents based on potential impacts, and mitigate the most significant problems first, all while maintaining compliant with HIPAA and other federal and state regulations.

      Join us for Part 1 of this series as Cerner’s Chief Security Officer, Don Kleoppel discusses how Cerner is using the NIST CSF as the foundation to building out their cybersecurity strategy, lessons learned through the process, and what the framework means to not only their organization but also to the customers they serve.

      During this webinar, we will also cover:

      •Mapping current investments to the NIST CSF as well as identifying security gaps to efficiently manage your cybersecurity posture

      •Symantec’s involvement with NIST in building out a framework specific to meeting healthcare requirements and regulations

      •Leveraging the CSF to shift from a “check the box” compliance mindset to an automated risk management approach

      Register Today

      Read more >
    • Cybersecurity and Investors
      Cybersecurity and Investors Jacob Olcott, Vice President, BitSight, Nell Minow Recorded: Oct 26 2015 6:00 pm UTC 49 mins
    • There’s no doubt that cyber attacks cause real financial harm to businesses. Money can be stolen, business operations disrupted. Cyber theft can provide international competitors with years worth of valuable intellectual property or trade secrets virtually overnight, jeopardizing current and future market opportunities. Cyber attacks can seriously damage an organization’s reputation with customers and result in legal liability for the company, executives, and board members.

      As companies race to protect themselves, how do investors know if the organizations they are investing in are secure?

      Join Jacob Olcott, VP at BitSight, and Nell Minow, corporate governance expert and co-founder of Institutional Shareholder Services (ISS), for a discussion of key issues, including:

      -How investors assess cybersecurity in the M&A diligence process

      -What institutional shareholders want to know about cyber risks to their investments

      -How shareholders can meaningfully engage with companies on cybersecurity

      Read more >
    • Using Data Science for Cybersecurity
      Using Data Science for Cybersecurity Anirudh Kondaveeti and Jeff Kelly Recorded: Jan 17 2017 7:00 pm UTC 56 mins
    • Enterprise networks are under constant threat. While perimeter security can help keep some bad actors out, we know from experience that there is no 100%, foolproof way to prevent unwanted intrusions. In many cases, bad actors come from within the enterprise, meaning perimeter security methods are ineffective.

      Enterprises, therefore, must enhance their cybersecurity efforts to include data science-driven methods for identifying anomalous and potentially nefarious user behavior taking place inside their networks and IT infrastructure.

      Join Pivotal’s Anirudh Kondaveeti and Jeff Kelly in this live webinar on data science for cybersecurity. You’ll learn how to perform data-science driven anomalous user behavior using a two-stage framework, including using principal components analysis to develop user specific behavioral models. Anirudh and Jeff will also share examples of successful real-world cybersecurity efforts and tips for getting started.

      About the Speakers:
      Anirudh Kondaveeti is a Principal Data Scientist at Pivotal with a focus on Cybersecurity and spatio-temporal data mining. He has developed statistical models and machine learning algorithms to detect insider and external threats and "needle-in-the-hay-stack"​ anomalies in machine generated network data for leading industries.

      Jeff Kelly is a Principal Product Marketing Manager at Pivotal.

      Read more >
    • Cybersecurity Threats for Education - A New Global Frontier
      Cybersecurity Threats for Education - A New Global Frontier Center for Digital Education, University of Wisconsin-Madison, Palo Alto Networks Recorded: Feb 23 2017 4:00 pm UTC 60 mins
    • On a daily basis, organizations are targeted by cybersecurity threats. While these threats occur throughout the world, half of ransomware detections occur in the U.S. Today, the internet of everything, mobile devices, underfunded/staffed IT organizations and a critical lack of trained cybersecurity professionals are combining to make things more difficult. As ransomware attacks become more prevalent and the effectiveness of phishing attempts become more sophisticated, all but the largest IT organizations are fortunate if they can keep pace.

      We know cyber attackers are becoming more refined and are searching for new ways to make a profit. Thanks to advances in attack distribution, anonymous payments, reliably encrypting and decrypting data, ransomware attacks are rising dramatically. Understanding the dangers of ransomware, and how to prevent them, has never has been more important.

      Bob Turner, Chief Information Security Officer, Office of the CIO & Vice Provost for Information Technology, University of Wisconsin-Madison

      Brad Duncan, Unit 42 Threat Expert, Palo Alto Networks

      Jim Jorstad, Senior Fellow, Center for Digital Education

      Please join the Center for Digital Education, the University of Wisconsin-Madison, and Palo Alto Networks for this informative on demand webinar to learn more about these challenges and to gain focused advice to help you combat one of the biggest obstacles every IT organization is facing.

      Topics will include:
      •The three key steps to protect against ransomware: preparation, prevention, and response
      •New attack strategies and what to do about them
      •Combatting new forms of cryptolocker and other ransomware
      •Myths of ransomware

      Read more >
    • Exploring the Current State of Cybersecurity in the Legal Sector
      Exploring the Current State of Cybersecurity in the Legal Sector Jake Olcott, VP of Business Development at BitSight Technologies and Jay Jacobs, Sr. Data Scientist at BitSight Technologies Recorded: Jan 19 2017 6:00 pm UTC 45 mins
    • Despite the fact that third party breaches have been on the rise, organizations may not be doing enough to manage the cybersecurity of all of their critical vendors. Law firms, in particular, are one of the most widely used third parties, yet the Legal sector may be getting overlooked in vendor security discussions.

      In fact, the latest BitSight Insights Industry Index report revealed that although companies in the Legal sector have high security ratings and low rates of vulnerabilities, the industry remains a key target for cyber criminals. Therefore, it’s crucial for organizations in this space to understand their cybersecurity posture and improve their vendor risk management techniques.

      Join Jake Olcott, VP at BitSight, and Jay Jacobs, Sr. Data Scientist at BitSight as they discuss data security in the Legal sector and beyond. In this webinar, you’ll learn:

      - How the cybersecurity posture of the Legal sector has changed over time
      - How the Legal sector stacks up against six other industries
      - The importance of cybersecurity in the Legal sector

      Read more >
    • Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automatio
      Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automatio Paul Morris, Acting CISO/Acting Director, Cybersecurity Division, TSA and Pamela Warren, Director, Palo Alto Networks Recorded: Feb 23 2017 6:00 pm UTC 62 mins
    • Cyber security is front and center like never before, and cyber leaders are working to speed cyber response times for threat prevention, detection, and mitigation for known, and more importantly, unknown threats.

      A recent study shows Feds are losing the race against hackers– with 85% of security operations professionals taking hours, even days, to create protections against newly discovered cyber threats.

      View the on-demand “Pedal to the Metal” webinar and hear from Federal and industry cyber experts as they discuss MeriTalk’s newest cyber study findings, including:
      •How much time and manpower is expended analyzing threat intelligence?
      •What advanced automatic capabilities can Feds utilize to act rapidly and decisively against advanced threats?
      •Is threat intelligence is helping Feds prevent attacks – from never-before-seen threat actors and tactics – faster?

      Featured Speakers Include:
      •Paul Morris, Acting CISO/Acting Director, Information Assurance and Cybersecurity Division, TSA
      •Pamela Warren, Director, Government and Industry Initiatives, Palo Alto Networks

      Read more >
    • Quantum Threats: The Next Undefended Frontier of Cybersecurity
      Quantum Threats: The Next Undefended Frontier of Cybersecurity Mike Brown, CTO and Co-Founder of ISARA Corporation Recorded: Dec 7 2016 6:00 pm UTC 44 mins
    • Cybersecurity threats are evolving more quickly than most organizations can pivot to defend against them. The 2016 IDC report states that “worldwide spending on cybersecurity products and services [is expected] to eclipse $1 trillion for the five-year period from 2017 to 2021” but we still may not be combatting emerging threats in the right ways.

      While we’re battling against growing threats from conventional computers, quantum computers are a growing shadow on the threat landscape, and people are already starting to think about how to get ready. Quantum safe options are becoming available, and bring with them new ways of thinking about how to integrate security solutions based on fundamentally different problems. What happens to TLS? What happens to VPN? What happens to PKI? Is your business ready? What potential threats should you be evaluating in your security strategy for 2017?

      In this talk, we’ll cover the 360-degree view of becoming quantum resistant. What is a quantum computer? Why will it cause problems for your security systems? How do you use quantum safe security?! How does entering the quantum age impact common tools like TLS, VPN, and PKI, and what are the challenges they’ll face? And most importantly, when do you need to worry?

      Read more >
    • Panel: The Cybersecurity Agenda for the Next President
      Panel: The Cybersecurity Agenda for the Next President Ely Kahn, Adam Isles, Rob Knake, Paul Kurtz, and Jacob Olcott Recorded: Nov 7 2016 7:00 pm UTC 63 mins
    • On November 8th, the citizens of the United States will elect their next President, who will be facing a variety of cybersecurity issues that he or she will need to address.

      On November 7th at 11 AM PT, a panel of former senior government officials will come together to discuss these cybersecurity issues that the next President will be facing.

      Moderator: Ely Kahn, Co-Founder of Sqrrl and former Director of Cybersecurity at the National Security Council, White House

      - Adam Isles - Principal at The Chertoff Group and former Director of International Economic Affairs at the National Security Council, White House
      - Rob Knake - Senior Advisor at Context Relevant and former Director of Cybersecurity at the National Security Council, White House
      - Paul Kurtz - Co-Founder and CEO of TruStar and former Special Assistant to the President for Critical Infrastructure Protection at the National Security Council, White House
      - Jacob Olcott - Vice President Business Development at BitSight and former Counsel at the US Senate

      Read more >
    • Communicate to Convince: Prioritizing Cybersecurity in State & Local Government
      Communicate to Convince: Prioritizing Cybersecurity in State & Local Government Presented by: Route Fifty | Underwritten by: CenturyLink Recorded: Oct 19 2016 6:00 pm UTC 62 mins
    • Although cyber attacks are on the rise, cybersecurity in state and local governments around the country often remain woefully underfunded. In an era of limited budgets and competing priorities, the behind-the-scenes risk mitigation of cybersecurity can be underappreciated and pushed down the list.

      This digital viewcast will explore some of the biggest cyber challenges facing state and local governments such as outdated IT systems, the rise of IoT, budgetary constraints and hiring the correct workforce, while also examining how to effectively communicate cyber risks to both internal and external stakeholders. Route Fifty will sit down with cyber experts to discuss the following essential elements of a successful cybersecurity program:

      - Implementing the strategy: Defining the correct priorities, tools, and tactics
      - Training the workforce: Communicating best practices in cybersecurity to employees across an organization
      - Transforming the culture: Instilling the importance of cybersecurity beyond just the office of information technology
      - Developing the partnerships: Working across both different agencies and different levels of government and collaborating with the private sector
      - Making the case: Effectively securing cybersecurity funding from skeptical stakeholders

      Read more >
    • Cybersecurity Benchmarking For CIOs
      Cybersecurity Benchmarking For CIOs Jake Olcott, Tom Stumpek Recorded: Nov 29 2016 5:00 pm UTC 60 mins
    • In order for a business to be competitive, it must be continuously improving. This is something the modern chief information officer (CIO) knows all too well. Further, technological advances and greater outsourcing in business have made cyber risk a key area that requires a great deal of thought from the CIO. So, how can CIOs know how their security programs are performing in order to make decisions on allocating funding, headcount, and policies?

      Join Jake Olcott. VP of Business Development at BitSight and Tom Stumpek, a Technology Advisor and former CIO for GE. Attendees will learn:

      - Why cybersecurity benchmarking is difficult for the modern CIO.
      - Different methods of benchmarking you may be involved in (or want to consider).
      - How Security Ratings may solve many benchmarking challenges.

      Read more >
    • Adding Intelligence to Investigations (Focus on data breach investigations)
      Adding Intelligence to Investigations (Focus on data breach investigations) Stuart Clarke, CTO, Cybersecurity, Nuix; John Douglas, Technical Director, First Response Recorded: Dec 7 2016 6:00 am UTC 61 mins
    • Data volumes are growing in both size and complexity; we have increasingly less control and awareness of the data we hold. In this session, we will highlight the benefits of information governance practices enabling organisations to build intelligence about their own data and identify their critical information assets. In the event of a data breach or security incident, this information provides actionable intelligence, allowing you to discover and respond to an incident before the matter escalates into a crisis.

      Key takeaways:
      1. Understand the basic principles required to understand your data
      2. See how leveraging intelligence can get you to the answer faster
      3. Extract hidden links and relationships with analytics

      Join Nuix and (ISC)² on Dec 07 (Wed) at 02:00p.m. (Singapore time) in learning how to add intelligence to investigations (focus on data breach investigations).

      - Stuart Clarke, Chief Technical Officer, Cybersecurity, Nuix
      - John Douglas, Technical Director, First Response

      SC Leung, CISSP, CCSP, CISA, CBCP;
      Member, Asia-Pacific Advisory Council, (ISC)²

      Read more >
    • Cybersecurity: The People Problem
      Cybersecurity: The People Problem Ralph Echemendia, 'The Ethical Hacker' at CCExpo 2016, on behalf of Interactive Intelligence Recorded: Nov 1 2016 11:55 am UTC 4 mins
    • At the Customer Cloud Expo 2016, EM360° interviewed cybersecurity expert, Ralph Echemendia to mine his insights as to what the biggest vulnerabilities in cybersecurity are today. Ralph was speaking at the event in association with Interactive Intelligence to warn enterprises of poor practices and to encourage them to review their approach to security.

      Ralph Echemendia is a world-renowned cyber security expert, known internationally by his alter ego “The Ethical Hacker.” He uses his talents and expertise to educate various institutions as well as protect companies and celebrity names. Ralph has played a pivotal role in the research and development of various key security technologies. His portfolio of work and reputation as a leading professional across several industries has landed him the credibility to make appearances on CNN, Fox News, USA Today, and Forbes, to name a few.

      Following his work as an Information Security Executive for Terremark Worldwide (acquired by Verizon in 2011) in Miami, Ralph took his talents to Hollywood, California.
      He actively works with award-winning Director Oliver Stone as a technical supervisor on films such as the upcoming release of Snowden.

      Read more >