Hi [[ session.user.profile.firstName ]]
Sort by:
    • Don't Be the Next Headline: Data Security Best Practices for 2015 and Beyond Don't Be the Next Headline: Data Security Best Practices for 2015 and Beyond Moderator: Brandon Dunlap. Panel: Bob Russo, PCI SSC; Terence Spies, Voltage; Yo Delmar, MetricStream; Rick Dakin, Coalfire Recorded: Nov 4 2014 6:00 pm UTC 65 mins
    • Albert Einstein once observed: "Technological progress is like an axe in the hands of a pathological criminal." His words were eerily prophetic of the continuous news of data breaches in the retail and banking sectors.

      Data breaches can be financially catastrophic as they drive costs to repair the damage, costs to secure their systems, costs to repay the consumers, losses in profits, losses in consumer confidence, and lawsuits seeking damages for alleged negligence. Intense media and Congressional scrutiny have classified all data breaches as direct attacks on privacy, and any company that has possession of personal identification information should consider itself in possession of potentially explosive material.

      Although the headline-making breaches are highly sophisticated, most attacks simply exploit lax security practices. In fact, Verizon's 2014 Data Breach Investigations Report found that 78 percent of the attacks were of very low or low difficulty. That means that in more than three-quarters of all breaches, attackers used basic methods that required few resources and no software customization. That's the bad news. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.

      Join our panel of experts as they discuss how to implement data security best practices, and how to prepare your experts with a crisis response plan to avoid being another headline.

      Read more >
    • Next Generation Vulnerability Management Next Generation Vulnerability Management David Langlands, Dell SecureWorks Director of Security/Risk Consulting and David French, Vice President of Risk I/O Recorded: Aug 13 2014 6:00 pm UTC 54 mins
    • A Discussion on Trends and Dell SecureWorks’ New Vulnerability Prioritization Service with Risk I/O

      As a valued client of Dell SecureWorks, we are inviting you to a discussion about our Vulnerability Monitoring and Prioritization service.

      Vulnerability management is critical to any comprehensive defense strategy, and yet, organizations struggle with prioritizing vulnerabilities for remediation based on real risk to their organization.

      Please join Dell SecureWorks’ David Langlands, (Director, Security and Risk Consulting), and Risk I/O’s David French, (Vice President), as they discuss how organizations are currently approaching vulnerability management today and the limitations with how risk associated with vulnerabilities is classified and remediated.

      Dell SecureWorks, in collaboration with Risk I/O will paint a vision of how organization’s need to evolve their vulnerability management so that they are better assessing and remediating technical and business risk to their organization.

      Presenters will discuss:
      •Current state of vulnerability management and where it needs to go
      •Intelligence-driven prioritization of vulnerabilities defense
      •Visualization of vulnerability risk for effective decision-making

      Read more >
    • Essential Components of a Vendor Risk Management Program Essential Components of a Vendor Risk Management Program Jake Olcott, VP at BitSight Recorded: Feb 9 2016 6:00 pm UTC 57 mins
    • Understanding the cybersecurity posture of vendors, suppliers, and third-parties is now a necessity for businesses in all industries. Yet, many businesses do not have a formalized vendor risk management program. There are multiple components needed to create a comprehensive vendor risk management program. These span governance and control, as well as security controls and technology.

      Join Jake Olcott, VP at BitSight on February 9 as he highlights best practices and industry standards for vendor risk management programs. Attendees will learn:

      - Which frameworks and methodologies can help get you started
      - Vital questions you should be asking your vendors
      - Why continuous monitoring and verifying vendor security is crucial to mitigate cyber risk

      Read more >
    • ICS and Cyber Security, are you doing the best you can? ICS and Cyber Security, are you doing the best you can? Peter C. Geytenbeek MBA Recorded: Dec 15 2015 10:00 am UTC 29 mins
    • With the end of 2015 in sight, we look back on a year when public and private sector cyber-attacks are almost commonplace headlines. Unfortunately confirming the reality that the digital domain is now one of the most dangerous battlegrounds in the modern era.

      During this webinar we will use the intelligence gained from a comprehensive survey that we ran amongst 127,000 professionals in the Oil & Gas IQ community. We will dig deeper into the answers given, offer fortifying insights and suggestions. Additionally we will share example scenarios on how we believe IT Security should become a continuous process.

      Read more >