Hi [[ session.user.profile.firstName ]]
Sort by:
    • The State of Cyber Insurance: Market Update & Trends
      The State of Cyber Insurance: Market Update & Trends Susan Young, SVP & Advisor Marsh USA, Inc. E & O and Cyber Practice Recorded: Mar 22 2018 5:00 pm UTC 64 mins
    • New cyber risks and threats are emerging at a pace faster than ever before.
      - How are cyber risks evolving
      - Which risks can be managed through cyber insurance? 

      We’ll address these questions – and dig a bit deeper into the state of the cyber insurance market and the role of cyber insurance in your overall cyber risk management strategy.  Cyber risk can’t be eliminated – it must be managed.

      This webinar is brought to you in partnership with ISSA Financial Industry Special Interest Group.

      About the Speaker:
      Susan Young is a Senior Vice President and advisor with Marsh’s
      national Cyber & E&O Practice (part of Marsh’s Financial & Professional Liability Practice, FINPRO) in the Seattle office. She is primarily focused on cyber /security & privacy risk, media liability, and technology errors and omissions.

      Read more >
    • Managing Your Cyber Risk
      Managing Your Cyber Risk Sean Martin (ITSPmagazine) | Panelists TBA Upcoming: Aug 9 2018 5:30 pm UTC 60 mins
    • Cybersecurity isn't just about detecting and responding to threats; it's also about understanding an organization's risk. In an age of high-profile cyber attacks, it's becoming increasingly important to have a strategy and process for accessing risks and their potential impact on your business.

      Join top industry experts and executives for an interactive Q&A session to learn more about:
      - How to evaluate your cyber risk
      - Recent NIST CSF risk assessment update
      - Staying on top of the latest threats and protecting the critical assets those threats can impact
      - Cyber risk insurance
      - Recommendations for improving security and minimizing your risk

      The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from Las Vegas during Black Hat.

      Read more >
    • AI in Cyber Security: Explained
      AI in Cyber Security: Explained Dave Palmer, Director of Technology, Darktrace Recorded: Feb 22 2018 5:00 pm UTC 49 mins
    • The year of 2018 may very well be the year of ‘smart malware’. As sophisticated threat-actors continue to bolster their toolkits, it is only a matter of time before we see weaponized AI targeting our organizations. Simultaneously, cyber security companies are racing to implement new AI technologies into their cyber defense strategies. We now find ourselves in an AI arms race. Defenders and attackers alike are rushing to stay one step ahead before machines fight machines on the battleground of corporate networks.

      Amidst this new threat landscape, cyber defense has become a confusing terrain to navigate. What are the actual risks of AI-based attacks? What would an AI attack look like? And how can effectively implementing AI proactively defend against this new era of threat?

      Join Dave Palmer, Director of Technology at Darktrace, on February 22nd at 9AM PST for a discussion on how AI will shape the next age of cyber defense.

      In this webinar, you will learn:
      •How AI will enhance the sophistication of cyber-threats
      •Why organizations should prepare for AI-based attacks
      •How cyber security companies are responding to advances in AI
      •How Darktrace has leveraged AI to spearhead a fundamentally new approach to cyber defense

      Read more >
    • Lessons of a Cyber Attack to Prevent Future Cyber Epidemics
      Lessons of a Cyber Attack to Prevent Future Cyber Epidemics Srinivas Mukkamala PhD., CEO and Co-Founder RiskSense Recorded: Nov 14 2017 9:00 pm UTC 47 mins
    • The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.

      Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.

      Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.

      What you will learn from this webinar:

      - How to prioritize what is most important when an attack happens.
      - Visibility into your attack surface and how to validate what the exposure is.
      - How to establish a metric based risk management program.

      About the Presenter:
      Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.

      Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.

      Read more >
    • Gaining Board alignment on cyber-security
      Gaining Board alignment on cyber-security BRC, CGI and DCMS speakers Recorded: Jun 14 2018 1:00 pm UTC 56 mins
    • We know the Board has a key role to play in supporting better cyber-security but with so many pressing and competing issues, how can we raise cyber security up the Board’s agenda?
      Richard Holmes, VP Secure Systems Engineering, and Gianni Rino, Global Industry Lead for Retail and Consumer Services at CGI UK, will share their insights, expertise and learning on cyber-security and Board engagement:
      •What is the role of the Board in supporting better cyber-security?
      •How to cost and communicate cyber risks to Board members
      •CGI’s eight boardroom recommendations

      Read more >
    • How to stay safe from cyber security breaches?
      How to stay safe from cyber security breaches? Paul Jackson, Asia-Pacific Leader, Cyber Security and Investigations | Kroll Recorded: Oct 27 2017 2:30 am UTC 54 mins
    • Asia Pacific has recently seen numerous changes to legislation and regulations as governments attempt to come to grips with the risks posed by cyber security breaches. In particular, the strengthening of data privacy laws which are increasingly requiring organizations to disclose, within a short time-frame, when they become aware that personally identifiable information belonging to customers or employees has been exposed. The associated heavy penalties are driving more and more companies to take proactive measures. Then there are the regulators (notably in the financial world) who are driving requirements for self-testing of cyber security with a focus on the ability to quickly recover from and remediate a cyber incident. Join Paul Jackson as he discusses the latest development of the privacy and cyber security field in Asia, and the best approach to mitigate these risks.

      Read more >
    • Economy of Effort in Cyber Defense: Spend Less Better
      Economy of Effort in Cyber Defense: Spend Less Better Griff James, Director, Damrod Analysis Recorded: Apr 25 2018 2:00 pm UTC 37 mins
    • You probably spend enough on cyber security. Leadership and analysis can achieve more than additional spending.

      Technology and services will continue to improve and evolve, but the total spend by companies does not need to grow to counter new threats. Damrod provides an analytical toolkit based on military principles to understand, assess, and defend against cyber-attack.

      This presentation focuses on treating cyber as conflict and countering an attacker through better tactics to achieve a better defense.

      About the Speaker:
      Griff is trained as a Canadian Infantry Officer and is a holds a Master’s Degree from the LSE. Unable to find “real” work, he got into software development as a Scrum Master, leading the development of a web based application. This experience fostered an interest in cybersecurity, and Griff went on to a boutique start-up providing application security to Fortune 500 companies. Frustrated by the disconnect between technologies and poor analysis within cyber security, Griff founded cyber defense firm Damrod Analysis in 2017.

      Read more >
    • The Front Lines of Cyber Risk: 4 Steps to Protecting Endpoints from Ransomware
      The Front Lines of Cyber Risk: 4 Steps to Protecting Endpoints from Ransomware Lilac Schoenbeck, Vice President, Portfolio Marketing at Carbonite, George Crump, Founder & Lead Analyst, Storage Switzerland Recorded: Mar 22 2018 6:00 pm UTC 54 mins
    • When it comes to cyber-risk, the most exposed part of any organization is also the least protected; endpoints. Much of the data on laptops and other devices is unique and not stored on storage owned by the organization, but endpoints are often the first casualties of a cyber-attack. Given the new threat organizations need to provide complete protection, which not only includes protection from device failure but also ransomware attacks, device theft and litigation response.

      The challenge for IT is providing this protection without disrupting the user. If the protection solution gets in the way of the user, they will disable it, putting not only their data at risk but leaving the organization open to data loss and cyber-breach.

      In this live webinar, learn the four requirements of complete endpoint data protection:

      1. Truly Transparent Protection (silent deployment, bandwidth optimization, quick cache)
      2. Deployment Flexibility - On-premises, Public Cloud or Private Cloud
      3. Total Encryption - Protect data in-flight and at rest
      4. Beyond Backup Features - Remote wipe, Legal hold

      Read more >