Hi [[ session.user.profile.firstName ]]
Sort by:
    • Reducing Threats through Improving Identity Security
      Reducing Threats through Improving Identity Security David Coxe, Co-Founder, Criterion Systems and Co-Founder & CEO of ID DataWeb Recorded: Dec 12 2016 6:00 pm UTC 41 mins
    • Cyber threats are increasing in frequency and complexity, and all industry segments are vulnerable. Join this presentation to learn the advances in identity security and privacy, and how you can protect your organization in 2017.

      Presenter:
      David Coxe is the CEO of ID DataWeb, Inc. (IDW) and was the Principal Investigator for the Criterion Systems NSTIC pilot program. He is also co- founder of Criterion Systems, a successful IT services contractor that provides information security, cloud computing, software development and other services to civilian agencies, DoD, and the Intelligence community. David has 20 years identity management experience and is currently very active in the development and implementation of attribute exchange trust frameworks. He co-chaired the Attribute Exchange Working Group (AXWG) at the Open Identity Exchange (OIX) for implementing the business, legal, technical, policy/privacy and assessor/certification requirements for Attribute Exchange (AX) Trust Frameworks.

      Read more >
    • Fully Autonomous A.I. - Powered Cybersecurity System
      Fully Autonomous A.I. - Powered Cybersecurity System Ulf Mattsson and Richard Malinowski Recorded: Sep 27 2017 3:00 pm UTC 60 mins
    • A Fully Autonomous A.I.- Powered Cybersecurity System can provide
      automated network protection, endpoint protection and incident management. We will discuss Regulatory Compliance - Supporting adherence to critical regulations.

      We will cover important regulations, including NISPOM, DSS, RMF, NIST 800-53 & 800-171, FFIEC, SOX, HIPPA, and PCI DSS.
      Viewers will learn:
      • Current trends in Cyber attacks
      • FFIEC Cyber Assessment Toolkit
      • NIST Cybersecurity Framework principles
      • Security Metrics
      • Oversight of third parties
      • How to measure cybersecurity preparedness
      • Automated approaches to integrate Security into DevOps

      Richard Malinowski is CEO of REMTCS including expertise in Cybersecurity & Artificial Intelligence:
      20 Years of experience in Cybersecurity & High Performance Computing
      10 Years of experience in Artificial Intelligence
      7 Patents in Next Generation Security Systems harnessing Artificial Intelligence and High Performance Computing
      Former Head of IT for Western Hemisphere for UBS, ran Crisis Management Team
      Former Head of IT for Citibank’s Money Market and Treasury Divisions
      Former Chief Architect for NASDAQ

      Read more >
    • The Cost of a HIPAA Data Breach – the Calculus has Changed
      The Cost of a HIPAA Data Breach – the Calculus has Changed Frederick D. Cox, CISM, CISA, CRISC, CISSP | Director, Information Security Precyse Recorded: May 30 2014 4:00 pm UTC 55 mins
    • The Regulations (Brief overview)
      HIPAA
      HITECH
      - The Security Rule

      - The Privacy Rule

      HIPAA Final Rule (Omnibus) 2013

      Regulatory changes
      - Office of the Inspector General Scathing report on HHS / Office of Civil Rights – a brief summary of their findings, based on only 3 out of 211 passed the audits.

      - HHS Conducts 211 audits in several sectors of HealthCare to see how bad compliance really is in the field

      - HHS Ramps up HIPAA Oversight efforts

      - HHS Issues Omnibus rules

      - ICD-10 New process for coding and billing medical activities is being required (affects Hospital Cash Flow)

      - Meaningful Use – stipulations on how data and processes must function – multiple year implementation time frame, fines associated with missed deadlines.


      Financial Penalties – Class Action Law Suits
      - No Longer just OCR Fines but Class action lawsuits with no cap on fines.


      Demand for Information Security Services
      - Risk assessments (required by HIPAA)

      - Increase in Network vulnerability testing

      - Security consulting services particularly security design and monitoring

      Read more >
    • Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps
      Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps Health Security Solutions & Juniper Networks Recorded: Nov 26 2013 12:35 am UTC 63 mins
    • Meaningful Use incentive programs. New HIPAA regulatory measures. Medical data explosion. Mobile health demands.

      Numerous factors are driving healthcare organizations to control who’s allowed to access the healthcare network and what resources –applications, data, patient records - they’re entitled to view or edit.

      But consider this: A doctor, who inadvertently picked up malicious code during a telemedicine event, can infect your entire network. A disgruntled employee can exfiltrate patient records. And cyber criminals are always looking for ways to steal and sell your valuable data.

      Is your network designed to identify the suspicious traffic and/or anomalous behavior to a specific user or device? Can your organization afford the painful penalties under the final HIPAA/HITECH omnibus rule due to a security breach?

      What happens next depends on the policies and controls you have in place to restrict and protect your assets and data from the vulnerabilities that openness and user mobility bring. Not to mention, the controls you need simply to comply with industry and government regulations.

      Take some time to join us for this free webinar. You’ll hear from Steve Spearman, HIPAA regulation specialist who will guide you through the in’s and out’s of the newly-announced Health Insurance Portability and Accountability Act. We’ll also provide an overview of Juniper’s network security portfolio, designed to help ensure secure, consistent access to data while reducing your risk associated with HIPAA and Meaningful Use mandates.

      Read more >
    • Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps
      Smarter Security in Healthcare: Beating Back Bad Actors and Data Breach Mishaps Health Security Solutions & Juniper Networks Recorded: Nov 5 2013 7:00 pm UTC 63 mins
    • Meaningful Use incentive programs. New HIPAA regulatory measures. Medical data explosion. Mobile health demands.

      Numerous factors are driving healthcare organizations to control who’s allowed to access the healthcare network and what resources –applications, data, patient records - they’re entitled to view or edit.

      But consider this: A doctor, who inadvertently picked up malicious code during a telemedicine event, can infect your entire network. A disgruntled employee can exfiltrate patient records. And cyber criminals are always looking for ways to steal and sell your valuable data.

      Is your network designed to identify the suspicious traffic and/or anomalous behavior to a specific user or device? Can your organization afford the painful penalties under the final HIPAA/HITECH omnibus rule due to a security breach?

      What happens next depends on the policies and controls you have in place to restrict and protect your assets and data from the vulnerabilities that openness and user mobility bring. Not to mention, the controls you need simply to comply with industry and government regulations.

      Take some time to join us for this free webinar. You’ll hear from Steve Spearman, HIPAA regulation specialist who will guide you through the in’s and out’s of the newly-announced Health Insurance Portability and Accountability Act. We’ll also provide an overview of Juniper’s network security portfolio, designed to help ensure secure, consistent access to data while reducing your risk associated with HIPAA and Meaningful Use mandates.

      Read more >
    • Social Engineering: Still a threat?
      Social Engineering: Still a threat? Tarrell "Mac" McCrory, CISSP, CEH Upcoming: Oct 26 2017 5:00 pm UTC 60 mins
    • When you hear the term Social Engineering, the first thing that pops into your mind will invariably be phishing emails. However, there are many aspects of social engineering that are, more often than not, completely overlooked. Identity impersonation, physical penetration, and various other means can just as easily be employed to breach company after company. While the ability to detect malware and other types of breaches get better by the day, these types of attacks are rarely discovered quickly, if at all. Enterprise level security accounts for many of these, but rarely all. Join the indepth discussion of how Social Engineering can be dangerous for an organization and what can be done about.


      Previously, Mr. McCrory was one of the founding employees of PhishMe, Inc. where he developed and ran many social engineering engagements as a Managed Services Consultant, teaching management of various Fortune 500 and Global 100 comapnies how to deal with phishing and on occassion, various other forms of social engineering attacks.

      Mr. McCrory is also currently working on his first book and working as an independent consultant.

      Read more >
    • Understanding the Metasploit Database
      Understanding the Metasploit Database Tyrone E. Wilson - Founder, and CEO of Cover6 Solutions Recorded: Aug 31 2017 1:05 pm UTC 69 mins
    • We discussed The Metasploit Database. No matter where you are you should have an understanding of your current network environment. One of the best ways to capture, filter, and share network information is with the Metasploit Database. Keynote Speaker(s): Mr. Tyrone E. Wilson – Founder and President of Cover6 Solutions has over 20 years of experience focusing on Information Systems and Network Security. Wilson has extensive expertise in multiple areas of the cyber field including, but not limited to, network defense, cyber threat analysis, penetration testing/vulnerability assessments, and #IPv6. Wilson has a passion for spreading knowledge to all about everything he’s acquired through his years of experience. Disclaimer: Only scan/test network environments in which you have explicit permission to do so. A sample permission memo can be found at Whttp://www.counterhack.net/permission_memo.html

      Read more >
    • Web Application Testing
      Web Application Testing Ben Pick - Coveros Recorded: Aug 9 2017 3:50 pm UTC 124 mins
    • We discussed Web Application Testing. Web applications provide a vulnerable window into internal enterprises. These applications often process and use poorly validated input. This presentation discusses methodologies to identify and exploit such vulnerabilities within the applications.

      The target audience for this talk ranges from those with limited prior knowledge of web application testing to those with a moderate understanding.

      Keynote Speaker(s):
      Mr. Ben Pick has 8 years of security and development experience including vulnerability assessments of web and mobile applications, analyzing source code for security risks, and configuring architecture to monitor systems for anomalous activities. For the past few years, Ben has worked to incorporate security into DevOps environments by merging security tools within the software development lifecycle. This includes automating static code analysis and vulnerability tools on development environments which act as supplemental resources for manual tests.

      Read more >