Hi [[ session.user.profile.firstName ]]
Sort by:
    • Why cybersecurity is everyone’s responsibility in today’s FS organization
      Why cybersecurity is everyone’s responsibility in today’s FS organization Steve Holt, EY EMEIA Financial Services Cyber Security Leader Recorded: May 25 2017 3:00 pm UTC 56 mins
    • This webinar will discuss the global cybersecurity landscape, and the threats and opportunities cybersecurity is presenting for financial services organizations. Given the panel is being held exactly one year before the official General Data Protection Regulation (GDPR) implementation date, panelists will be reflecting specifically on the implications of this regulation for FS organizations.

      Panelists

      * Cheri McGuire, Group Chief Information Security Officer, Standard Chartered Bank
      * Simon Hales, Group Head of ISR, HSBC
      * Tony de Bos, EY EMEIA Financial Services, Data Protection and Privacy Leader

      Topics for discussion:

      * Talent and awareness - building a culture that makes cybersecurity part of everyone’s job and rethinking the role of the Chief Information Security Officer (CISO)
      * Strategy and innovation - putting cybersecurity at the heart of business strategy and ensuring that new digital innovation includes cybersecurity at the outset
      * Regulation - assessing the impact GDPR will have on your organization’s people, processes and technology ahead of the 2018 implementation date
      * Resilience and scalability - being prepared to recover rapidly from a cyber-breach while holding up your ecosystem to the same cybersecurity standards that you follow as an organization

      This publication contains information in summary form and is therefore intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of professional judgment. Member firms of the global EY organization cannot accept responsibility for loss to any person relying on this article.

      Read more >
    • Where Does CyberSecurity Preparedness Fall Short? Lessons from the DoJ
      Where Does CyberSecurity Preparedness Fall Short? Lessons from the DoJ John Carlin Recorded: May 9 2017 9:35 pm UTC 73 mins
    • From the hack of SONY Entertainment, to Russian interference in the 2016 election, John Carlin led investigations into these breaches and was responsible for protecting the nation against terrorism, espionage, and cyber and other national security threats.

      John's days of chasing cyber-terrorists for the DOJ as Assistant Attorney General for National Security might be over, but he’s joining us to share an insider’s perspective on cyber threats in the public and private sector.

      Learn:
      Where cybersecurity preparedness falls short (public and private sector)
      Practical takeaways to meet the cybersecurity needs of C-Suite executives
      How to manage the evolving threat landscape - and what you can do to stay secure

      Read more >
    • How the Cybersecurity Executive Order Impacts Today’s IT Risk Strategy
      How the Cybersecurity Executive Order Impacts Today’s IT Risk Strategy Craig A. Newman, Partner and Chair of Patterson Belknap Webb & Tyler LLP, Steven Grossman, VP of Strategy at Bay Dynamics Upcoming: Jun 6 2017 4:00 pm UTC 60 mins
    • Two events in a single month recently reshaped the cyber-security landscape– the President’s Cybersecurity Executive Order and a massive ransomware attack that struck countless organizations worldwide. At their core, these headlines span common unresolved matters that affect nearly every practitioner in the cybersecurity field.

      The ransomware attacks exploited unpatched-yet-well-known vulnerabilities. The White House policy explicitly supports a risk based approach, mandating that federal agencies prioritize IT security strategy based on exposure of their most valued assets.

      For years, cybersecurity teams have sought to tackle those threats and vulnerabilities that could compromise these critical assets. Given the state of real-world threats and these new marching orders, both public and private sector organizations must re-assess where they stand and take a closer look at evolving practices.

      This webinar, co-presented by Craig A. Newman, Partner and Chair of Patterson Belknap Webb & Tyler LLP’s Privacy and Data Security Practice, and Steven Grossman, VP of Strategy at Bay Dynamics will cover:

      * The must-know takeaways of the latest Cybersecurity Executive Order
      * Related findings from the recently released report – A Day in the Life of a Cybersecurity Pro
      * How private and public organizations can apply specific practices that directly enable more effective prioritization of asset-based IT risk

      Read more >
    • The State of Cybersecurity for CIOs and CSOs
      The State of Cybersecurity for CIOs and CSOs Rick Howard, CSO of Palo Alto Networks Recorded: May 15 2017 6:30 pm UTC 57 mins
    • Kick-Start a Radical Change in the Evolution of Cybersecurity. C-level Webinar for Government and Education Executives.

      Senior government and education officials are prime for the next evolution in cybersecurity. Although network defenders remain lockstep in outdated best practices, CIOs and CSOs are moving away from the coveted defense-in-depth strategies of the past and looking forward to more effective measures to implement the Cyber Kill Chain™ model.

      In this executive webinar, the CSO of Palo Alto Networks®, Rick Howard, will discuss how CIOs and CSOs can more effectively orchestrate their enterprise security posture. Rick will review the state of enterprise cyber defense and provide insight for executives on:

      • Why the defense-in-depth model failed.
      • Why its replacement, the Cyber Kill Chain, hasn’t realized its full potential.
      • How to shift focus to automatic enterprise security orchestration.
      • How to influence the board and radically change thinking from the top down.

      Join us to learn more about this new and necessary direction in the evolution of cybersecurity.

      Read more >
    • 2017 Cybersecurity Predictions Leadership Webinar
      2017 Cybersecurity Predictions Leadership Webinar Rick Howard, CSO, and Ryan Olson, Unit 42 Intelligence Director, Palo Alto Networks Recorded: Mar 30 2017 6:30 pm UTC 49 mins
    • Cybersecurity is in a state of constant change and evolution. Executive leaders have an opportunity to get ahead of cybercriminals by understanding existing and potential threats and how to mitigate against them.

      In this leadership webinar designed specifically for CSO’s and technical security executives, Palo Alto Networks CSO, Rick Howard, and Unit 42 Intelligence Director, Ryan Olson, will review the cybersecurity predictions and share best practices for achieving a more resilient posture in 2017. Join us to learn about “Sure Things” (predictions that are almost guaranteed to happen) and “Long Shots” (predictions that are less likely to happen) in cybersecurity this year.

      Get the executive point of view on these top-of-mind CSO initiatives as we discuss:
      •Why automation and playbook models will take on key roles in threat intelligence sharing.
      •Why cybersecurity is extending beyond the IT department and what your can do about it.
      •Trends for ransomware and practical advice to protect your organization from attacks.

      Read more >
    • 2017 Cybersecurity Threat Insights for Leaders
      2017 Cybersecurity Threat Insights for Leaders Alex Tilley, Counter Threat e-crime lead and Daniel Eden, Senior Incident Responder, SecureWorks Recorded: Mar 8 2017 11:00 pm UTC 59 mins
    • Partnering to Fight Cybercrime

      In our “2017 Cybersecurity Threat Insights Report for Leaders ” report, we shared several key findings and observations from our client engagements and about the security industry. This webcast will cover our findings and observations but will also provide you with clear direction on where you need to focus your resources to evoke positive action in your security program.

      During this webcast our Counter Threat Unit™ e-crime lead, Alex Tilley, and Senior Incident Responder Daniel Eden, will give their perspective, observations and guidance through responses to a series of questions led by a moderator.

      You Will Learn About:

      - Our observations from our engagements and findings
      - How you need to rethink core security processes and operations
      - Whether the current nature and behaviors of the threat are evolving or staying constant
      - What the common attack vectors are and how to protect your organization against the fundamentals of cyber-attacks
      - How to focus your resources from a tactical and strategic perspective

      Read more >
    • Mitigating New Threats Faster with Rapid Intel and Automation
      Mitigating New Threats Faster with Rapid Intel and Automation Paul Morris, Acting CISO/Acting Director, Cybersecurity Division, TSA and Pamela Warren, Director, Palo Alto Networks Recorded: Feb 23 2017 6:00 pm UTC 62 mins
    • Cyber security is front and center like never before, and cyber leaders are working to speed cyber response times for threat prevention, detection, and mitigation for known, and more importantly, unknown threats.

      A recent study shows Feds are losing the race against hackers– with 85% of security operations professionals taking hours, even days, to create protections against newly discovered cyber threats.

      View the on-demand “Pedal to the Metal” webinar and hear from Federal and industry cyber experts as they discuss MeriTalk’s newest cyber study findings, including:
      •How much time and manpower is expended analyzing threat intelligence?
      •What advanced automatic capabilities can Feds utilize to act rapidly and decisively against advanced threats?
      •Is threat intelligence is helping Feds prevent attacks – from never-before-seen threat actors and tactics – faster?

      Featured Speakers Include:
      •Paul Morris, Acting CISO/Acting Director, Information Assurance and Cybersecurity Division, TSA
      •Pamela Warren, Director, Government and Industry Initiatives, Palo Alto Networks

      Read more >
    • Cybersecurity Threats for Education - A New Global Frontier
      Cybersecurity Threats for Education - A New Global Frontier Center for Digital Education, University of Wisconsin-Madison, Palo Alto Networks Recorded: Feb 23 2017 4:00 pm UTC 60 mins
    • On a daily basis, organizations are targeted by cybersecurity threats. While these threats occur throughout the world, half of ransomware detections occur in the U.S. Today, the internet of everything, mobile devices, underfunded/staffed IT organizations and a critical lack of trained cybersecurity professionals are combining to make things more difficult. As ransomware attacks become more prevalent and the effectiveness of phishing attempts become more sophisticated, all but the largest IT organizations are fortunate if they can keep pace.

      We know cyber attackers are becoming more refined and are searching for new ways to make a profit. Thanks to advances in attack distribution, anonymous payments, reliably encrypting and decrypting data, ransomware attacks are rising dramatically. Understanding the dangers of ransomware, and how to prevent them, has never has been more important.

      SPEAKERS:
      Bob Turner, Chief Information Security Officer, Office of the CIO & Vice Provost for Information Technology, University of Wisconsin-Madison

      Brad Duncan, Unit 42 Threat Expert, Palo Alto Networks

      MODERATOR:
      Jim Jorstad, Senior Fellow, Center for Digital Education


      Please join the Center for Digital Education, the University of Wisconsin-Madison, and Palo Alto Networks for this informative on demand webinar to learn more about these challenges and to gain focused advice to help you combat one of the biggest obstacles every IT organization is facing.

      Topics will include:
      •The three key steps to protect against ransomware: preparation, prevention, and response
      •New attack strategies and what to do about them
      •Combatting new forms of cryptolocker and other ransomware
      •Myths of ransomware

      Read more >
    • Using the NIST Cybersecurity Framework to Identify Protected Health Information
      Using the NIST Cybersecurity Framework to Identify Protected Health Information Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Vishal Gupta, VP, Engineering/Product Management, Symantec Upcoming: Jun 1 2017 5:00 pm UTC 60 mins
    • Part 2 of 7: The NIST Cybersecurity Framework Healthcare Webinar Series

      Of the 16 critical infrastructure sectors, healthcare is the only one yet to adopt a formal cybersecurity framework. That may be about to change.

      Join Symantec on June 1 for the second webinar in our series around how healthcare organizations can adopt the NIST Cybersecurity Framework (CSF).

      In this webinar – Using the NIST CSF to Identify Protected Health Information (PHI) – we will look at the Identify function, knowing that you cannot protect what you don’t know you have.

      Healthcare organizations need to identify digital systems, what data they hold, how it is used, and what value it holds before they can make the right decisions on how to protect it under their Risk Management program.

      This webinar will look at technical and administrative controls that reflect your mission and operations and why it must be the first step in protecting your sensitive data and patient information.

      During this webinar we will:

      -Discuss how to successfully implement an asset and risk management strategy that incorporates all of your hardware, software, and data to gain complete visibility of your organization’s assets

      -Provide a practical guide for healthcare organizations to navigate through the 5 categories within the Identify function

      On-Demand Webinar Series:
      - Part 1 of 7: Demystifying NIST Cybersecurity Framework for Healthcare Series http://bit.ly/Part10209WebinarNIST

      Read more >
    • Ransomware in the Age of Wannacry: What Fintech Needs to Know
      Ransomware in the Age of Wannacry: What Fintech Needs to Know John Bambenek, Threat Systems Manager at Fidelis Cybersecurity Recorded: May 18 2017 5:00 pm UTC 45 mins
    • This past week we saw the emergence of a worm-based ransomware attack in wannacry that showed us how damaging these attacks can be to critical services society relies on.

      This presentation will cover the recent wannacry attacks and what we have learned from them. In addition, we'll discuss the evolution of ransomware in recent years, focusing on attacks targeted against enterprises and so-called "high-interaction" ransomware attacks. Attendees will also be given a path forward of protecting their institution. A discussion of the renewal of Business Continuity and Disaster Recovery as a result and what this means for fintech going forward.

      About the Presenter:
      John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.

      Read more >
    • What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017
      What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017 Doug Austin, Julia Romero Peter, Esq., Sean Hall and Paul Cobb Upcoming: May 31 2017 5:00 pm UTC 75 mins
    • You’ve heard the horror stories. Data breaches are happening within organizations at an alarming rate, and sensitive data is being compromised regularly. As an attorney, what can you do to protect yourself, your firm and your client from becoming a victim? And, what do you need to do to keep up with ever-changing requirements for data security, both within the US and internationally? This webcast will discuss what you need to know today about cybersecurity and data privacy to protect the sensitive data that your organization manages every day.

      Webcast Highlights:

      + The State of Cybersecurity in the U.S. in 2017
      + Top Threats Facing Your Practice
      + Your Responsibility to Your Clients: The High Cost of Data Leaks
      + How to Protect Your Firm and Your Clients
      + Recent Developments in International Data Privacy
      + Criteria for Evaluating Providers in Your eDiscovery Projects
      + Ethics Considerations
      + Looking Forward: The Future of Cybersecurity in the Legal Field

      Presenters Include:

      
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

      Julia Romero Peter, Esq.: Julia is General Counsel and VP of Sales with CloudNine. Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

      Sean Hall: Sean is the CEO of Firm Guardian, LLC. Sean has a decade of experience working with emerging start-ups from an executive level creating scalable, profitable businesses.

      Paul Cobb: Paul is the COO for Firm Guardian LLC. Paul is a business leader with twenty years of diverse experience in management, marketing, sales strategy, and operations.

      MCLE Approved in Selected States

      Read more >
    • Learn: SANS CyberTalent Women's Immersion Academy (Cybersecurity Training)
      Learn: SANS CyberTalent Women's Immersion Academy (Cybersecurity Training) Sonny Sandelius, SANS CyberTalent Division Recorded: Mar 27 2017 9:00 pm UTC 63 mins
    • Join the SANS Institute and WSC for an insightful presentation about the SANS CyberTalent Women’s Immersion Academy. This academy is designed to help qualified women receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the selected women who attend and includes training and certification.

      Applications are due by April 5th, 2017.

      Come listen to learn:
      • What the selection process includes and important application tips
      • Understand what kind of training is provided (length and format)
      • Hear from a recent graduate who will share her experience
      • How this training academy and related certifications can help your career

      Read more >