Hi [[ session.user.profile.firstName ]]
Sort by:
    • Comodo Cybersecurity: Render Attacks Useless
      Comodo Cybersecurity: Render Attacks Useless Comodo Cybersecurity Recorded: Jun 26 2018 7:05 pm UTC 2 mins
    • Trojans, and other malicious “wares” generate approximately one million new specimens of hostile software every day. Although many cybersecurity vendors will promise full protection against threats —the truth is, they can’t, no one can. Businesses and people must accept that malware cannot be successfully blocked 100% of the time. As a leader in cybersecurity for over twenty years, Comodo Cybersecurity seeks to protect businesses by understanding the true nature of the digital environment and what malware needs to survive.

      Read more >
    • Technology Trends 2019: 5 ways cybersecurity will transform next year
      Technology Trends 2019: 5 ways cybersecurity will transform next year Matthew Gyde, Group Executive, Cybersecurity at Dimension Data Recorded: Nov 19 2018 6:30 pm UTC 33 mins
    • CyberConversations around the strength of a company’s cybersecurity has never been more pertinent. We’re generating more data than we know how to deal with, and as the opportunities for cybercriminals proliferate, so does their approach to attacks mature.
      A key piece of advice? Trust no-one. With the cloud continuing to aid digital transformation, and AI/machine learning finally realising their potential, cybersecurity defences are beginning to migrate to a more predictive model. This will allow companies to create digital fingerprints of their employees, improve access to data and applications, and predict attacks before they happen.
      Join Matthew Gyde, Group Executive, Cybersecurity at Dimension Data, as he reveals the main findings from Dimension Data’s Technology Trends 2019 report, exploring how the cybersecurity landscape will shift in 2019, and what measures companies can take to keep the bad guys out.
      This webinar will cover:
      •How zero trust is maturing into digital trust, and the evolution of predictive threat detection.
      •Why organisations are focusing on cloud-based security platforms.
      •Why organisations now aim to be secure by design.
      •How cybersecurity is becoming intelligence driven.
      •Why tighter regulation is affecting risk profiles.

      Read more >
    • How Predictive Threat Intelligence is changing cybersecurity
      How Predictive Threat Intelligence is changing cybersecurity Mark Thomas, Group CTO Cybersecurity, Dimension Data, & TK Keanini, Product Line CTO for Analytics, Cisco Recorded: Nov 7 2018 9:00 pm UTC 54 mins
    • Your organisation can get cybersecurity right 99% of the time, but a cybercriminal only needs to get an attack right once to negatively impact your business. Therefore, staying one step ahead of threat actors is critical.

      Predictive threat intelligence helps you identify that other 1% to foresee where and when threats will strike and mitigate cyber risks to your business. It’s a significant development in your cybersecurity line of defense because just as your business has been able to reap the benefits of digital, so have your cyber adversaries – they too are using automation and the cloud to scale and implement their attacks faster than ever before.

      In this session Mark Thomas, Group CTO Cybersecurity at Dimension Data, and TK Keanini, Distinguished Engineer, Product Line CTO for Analytics at Cisco, as they explore:

      •Securing the digital business in a changing threat landscape
      •What is predictive threat intelligence
      •Foundational predictive technologies:
      oArtificial Intelligence and Machine learning
      oThreat intelligence
      oEncrypted traffic analysis
      oAnalytics for cybersecurity
      •How to build a predictive threat intelligence capability – build or partner

      The session will conclude with a Q&A session with attendees

      Read more >
    • IT Trends in 2018: Cybersecurity
      IT Trends in 2018: Cybersecurity Matthew Gyde Cybersecurity, & Craig Jett Global Security, Dimension Data Recorded: Nov 1 2017 2:00 pm UTC 47 mins
    • 2017 saw a wave of high profile hacks, Ransomware attacks and data security breaches which pushed cybersecurity even further up the business agenda. With customers more concerned about this issue than ever before, companies are turning to technologies such as Artificial Intelligence, blockchain and deep learning software to help them in the fight against digital crime and secure customer data.

      In this webinar we explore how the threat of cybercrime has evolved and advise how these technologies and others can help companies strengthen their defences in 2018.

      Speakers:
      Matthew Gyde, Group Executive, Cybersecurity Dimension Data
      Craig Jett
      VP, Global Security Strategy & Consulting Dimension Data

      Read more >
    • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
      [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Recorded: Jan 22 2018 6:00 pm UTC 63 mins
    • Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

      Here’s a sampling of some of the predictions our cybersecurity experts will review:

      •Ransomware Prevention more important than ever
      •The Internet of Things blurs the line between personal and corporate security
      •The era of Software Supply-Chain attacks has begun
      •The Cloud will accelerate channel partner migration to next-generation security innovators
      •Advances in Machine Learning will improve both patient care and cybersecurity
      •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls

      Read more >
    • Jumpstart Your Cybersecurity Strategy with NIST Guidance
      Jumpstart Your Cybersecurity Strategy with NIST Guidance Donna Dodson, Chief Cybersecurity Advisor, NIST; Hemma Prafullchandra, CTO and EVP Products, HyTrust Recorded: Feb 20 2018 8:30 pm UTC 63 mins
    • In 2017, the total cost of a data breach averaged $3.62 million. Companies who experienced a data breach have a 27.7% likelihood of a recurring material data breach over the next two years. These staggering statistics from a 2017 Ponemon Study highlights the need for a strong cybersecurity strategy going into this year.

      In this webinar, experts from the National Institute of Standards and Technology (NIST) will share:

      -Observations and accomplishments from 2017 NIST initiatives
      -NIST’s 2018 cybersecurity focus areas, such as cloud security, internet infrastructure, and industry-aligned (healthcare, financial services) cybersecurity projects
      -Opportunities for industry engagement

      HyTrust experts will provide perspectives on:

      -Best practices for automation and continuous compliance with the NIST Cybersecurity Framework
      -Tips to strengthen your security posture and avoid common pitfalls
      -Key resources to jumpstart your 2018 cybersecurity strategy

      View this webinar to learn more about the state of cybersecurity and what you need to know now to succeed in 2018.

      Read more >
    • Cybersecurity Now: A Guide to Building a People-Centric Strategy
      Cybersecurity Now: A Guide to Building a People-Centric Strategy Ryan Kalember, SVP, Cybersecurity Strategy, Proofpoint Recorded: Nov 21 2018 10:00 am UTC 62 mins
    • Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

      You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

      Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

      o Prevent cyberattacks by stopping them before they start

      o Defend against email and cloud threats

      o Respond quickly to threats and limit the damage they could cause

      About the presenter:

      With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

      Read more >
    • Cybersecurity Attacks that will Actually Lead to a Compromise
      Cybersecurity Attacks that will Actually Lead to a Compromise Luke Potter, Cybersecurity Practice Director, SureCloud Upcoming: Jan 15 2019 4:00 pm UTC 75 mins
    • Vulnerabilities exist in every system, and for some, the impact of an attack could be catastrophic, even business-ending. Often, these incidents are the result of a vulnerability that could be identified in a penetration test.

      In this webinar SureCloud’s Cybersecurity Practice Director, expert Penetration Tester, Luke Potter will discuss some of the real-life cyber-attacks his team has conducted including the work they have done with the BBC, Daily Mail, and Which? Magazine.

      The session will cover:
      •Targeted Phishing attacks
      •IoT and ‘Smart’ devices
      •Physical attacks including Social Engineering
      •Use of OSINT Techniques to Compromise Organisations
      •Password Analysis

      Luke Potter is a CHECK team leader, Tiger Scheme senior security tester, ISO 27001 lead auditor and Microsoft Certified enterprise administrator.

      Read more >
    • Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law
      Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law Mary Chaney, Expert in Cybersecurity Law and WSC VP Jessica Gulick Recorded: Feb 16 2018 12:00 am UTC 60 mins
    • Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

      Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

      Guests: Mary Chaney, Attorney At Law, The Law Offices of Mary N. Chaney, P.L.L.C.
      Threat Intelligence and Forensics Expert, Founder of Horton Technologies, LLC

      Hosted by Jessica Gulick, VP of the Women's Society of Cyberjutsu

      About the Speaker:
      Mary N. Chaney, Esq., CISSP, has 20+ years of experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law. She spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve by becoming a Special Agent for the FBI where she investigated cybercrime as their Information Systems Security Officer.
      Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. She has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital. As an adjunct professor with the University of Cincinnati, she assisted with the establishment of their Cybersecurity Certificate program.
      Currently, Ms. Chaney practices cyber security law for her own firm, The Law Offices of Mary N. Chaney, P.L.L.C. where she specializes in helping the CIO, CISO and General Counsel understand each other to legally protect the enterprise from cyber security risk.

      Read more >
    • Cybersecurity Now: A Guide to Building a People-Centric Strategy
      Cybersecurity Now: A Guide to Building a People-Centric Strategy Ryan Kalember, SVP, Cybersecurity Strategy, Proofpoint Recorded: Sep 18 2018 3:00 pm UTC 62 mins
    • Do you know when or how your executives are being targeted? Do you know who the most cyber attacked people in your organisation are? Are your very attacked people (VAPs) the same your very important people (VIPs)?

      You need to protect your companies greatest assets– it’s people, and the data that they have access to. You must have visibility into the risky behaviours that indicate that your people may fall for a modern, socially-engineered attack.​The only way to successfully combat today’s advanced attacks is to focus on protecting your people.

      Join Proofpoint’s SVP of Cybersecurity, Ryan Kalember during this webinar to learn how to build a people centric cybersecurity strategy that will:

      o Prevent cyberattacks by stopping them before they start

      o Defend against email and cloud threats

      o Respond quickly to threats and limit the damage they could cause

      About the presenter:

      With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

      Read more >
    • How to Build your People-Centric Cybersecurity Strategy
      How to Build your People-Centric Cybersecurity Strategy Ryan Kalember, SVP Cybersecurity Strategies at Proofpoint Recorded: Sep 12 2018 6:00 pm UTC 60 mins
    • Today’s most popular security and compliance tools focus on protecting the perimeter—they manage endpoints and patch system vulnerabilities.

      But cybercriminals don’t target technical vulnerabilities. They target human weakness: the distracted user who clicks on an email attachment, the eager customer who fills in credentials to claim a fake offer, a loyal employee who follows directions to wire money from a criminal impersonating their CEO.

      The only security strategy that will successfully combat today’s advanced attacks is one that focuses on protecting our people. Join Proofpoint SVP Ryan Kalember to learn how to build a strategy that:

      • Reveals who is targeted and how
      • Combats attacks before they reach your users, and
      • Mitigates damage from the attacks that inevitably will reach your people

      About the presenter:

      With over 15-years of experience in the information security industry, Ryan currently leads cybersecurity strategy for Proofpoint and is a sought-out expert for media commentary on breaches and best practices for enterprises as well as consumers. He joined Proofpoint from WatchDox where he served as chief marketing officer and was responsible for successfully building and leading the marketing team through the company’s acquisition by Blackberry. Prior to WatchDox, Ryan was instrumental in running solutions across Hewlett-Packard’s portfolio of security products. He has also held a variety of marketing leadership positions at ArcSight and VeriSign including EMEA regional manager. Ryan received his bachelor's degree from Stanford University, where he studied fault tolerance, cryptography, and authentication algorithms.

      Read more >
    • Cybersecurity Webinar LIVE: The Unpatchables
      Cybersecurity Webinar LIVE: The Unpatchables Join Lindseigh Strickland, Cybersecurity Specialist and Ori Pliner, Systems Engineer at Palo Alto Networks Recorded: Oct 2 2018 2:00 pm UTC 36 mins
    • Patch management is often highlighted as a major issue for many organisations. The volume and frequency of updates makes it almost impossible to keep all machines up to date and secure. This issue is worse for older machines many of which cannot be patched at all.

      Join Lindseigh Strickland, Cybersecurity Specialist and Ori Pliner, Systems Engineer Specialist at Palo Alto Networks, for an exclusive cybersecurity webinar on September 12th at 3:00 p.m. to receive an insight into an alternative approach to securing older machines. We’ll also discuss how this approach provides more flexibility and control around patching and protecting unpatchable devices.

      This is a ‘must attend’ event if you want to understand:
      - The security, risk and compliance ramifications of operating unpatchable systems and applications
      - How to prevent security breaches on legacy machines when patching is not an option

      A live demonstration of Palo Alto Networks Advanced Endpoint Protection will also be provided.

      Read more >
    • 2019 Forcepoint Cybersecurity Predictions
      2019 Forcepoint Cybersecurity Predictions Raffael Marty, VP Research & Intelligence, and Carl Leonard, Principal Security Analyst Recorded: Nov 29 2018 5:00 pm UTC 49 mins
    • Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your enterprise and the primary source of security breaches driving cyber risk to all-time highs.

      In 2019, attackers will stop at nothing to steal our identities, evade detection through new techniques, and bring disruption to our doorsteps. The stakes are high, the world more connected than we could have ever imagined.

      Join our webcast now, where we’ll examine topics such as:

      - How attacks on industrial IoT could lead to widespread power outages
      - When credential theft moves to cloning your face to bypass biometric authentication
      - What happens in a world incentivized to commit intellectual property theft at scale

      Join Forcepoint's Raffael Marty, VP Research & Intelligence, and Carl Leonard, Principal Security Analyst, for a webcast discussing the most pressing cybersecurity issues – and what you can do to protect against them.

      Read more >
    • Cybersecurity Webinar: The Unpatchables
      Cybersecurity Webinar: The Unpatchables Lindseigh Strickland, Cybersecurity Specialist and Ori Pliner, Systems Engineer Specialist at Palo Alto Networks Recorded: Mar 28 2018 2:00 pm UTC 38 mins
    • Patch management is often highlighted as a major issue for many organisations. The volume and frequency of updates makes it almost impossible to keep all machines up to date and secure. This issue is worse for older machines many of which cannot be patched at all.

      Join Lindseigh Strickland, Cybersecurity Specialist and Ori Pliner, Systems Engineer Specialist at Palo Alto Networks, for an exclusive cybersecurity webinar on March 28th at 3:00 p.m. to receive an insight into an alternative approach to securing older machines. We’ll also discuss how this approach provides more flexibility and control around patching and protecting unpatchable devices.

      This is a ‘must attend’ event if you want to understand:
      - The security, risk and compliance ramifications of operating unpatchable systems and applications
      - How to prevent security breaches on legacy machines when patching is not an option

      A live demonstration of Palo Alto Networks Advanced Endpoint Protection will also be provided.

      Read more >