Hi [[ session.user.profile.firstName ]]
Sort by:
    • Cyber Attack Trends from the Threatscape
      Cyber Attack Trends from the Threatscape Peter Wood, CEO of First Base Technologies Recorded: Mar 21 2018 11:00 am UTC 47 mins
    • What are the latest trends in the cyber-criminal underworld?
      Which attacks are you likely to be preventing as we move further into 2018?
      Who’s looking for vulnerability on your network?

      These questions and more, answered by Peter Wood FBCS CITP MIEEE CISSP M.Inst.ISP
      Chief Executive Officer, First Base Technologies LLP
      Peter’s career spans 48 years, with experience in network security, social engineering, threat and risk analysis, red teaming, industrial control systems and electronics. He founded First Base Technologies, one of the UK’s first information security consultancies in 1989. Peter has provided security advice and guidance for businesses of all sizes for more than 28 years, leading a team of expert penetration testers and consultants unrivalled in the industry.
      He is also a world-renowned security evangelist, speaking at major conferences and delivering seminars and webinars. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
      He is a BCS Fellow, a Chartered IT Professional, CISSP and a member of IISP, ISACA, ISSA, IEEE, ACM and Mensa. He is a visiting lecturer at the University of Sussex, teaching cybersecurity and ethical hacking.

      Read more >
    • Lessons of a Cyber Attack to Prevent Future Cyber Epidemics
      Lessons of a Cyber Attack to Prevent Future Cyber Epidemics Srinivas Mukkamala PhD., CEO and Co-Founder RiskSense Recorded: Nov 14 2017 9:00 pm UTC 47 mins
    • The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.

      Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.

      Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.

      What you will learn from this webinar:

      - How to prioritize what is most important when an attack happens.
      - Visibility into your attack surface and how to validate what the exposure is.
      - How to establish a metric based risk management program.

      About the Presenter:
      Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.

      Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.

      Read more >
    • Trends in Cyber Attacks and Breaches
      Trends in Cyber Attacks and Breaches Steve Durbin, Managing Director, ISF LTD Upcoming: Dec 11 2018 1:00 pm UTC 45 mins
    • As the scale, sophistication, and targeting of cyber-attacks increase, organisations need to manage risk in ways beyond those traditionally handled by the information security function.

      In this webinar, Steve Durbin, Managing Director at the ISF will offer his insights into how security and business teams across the entire organisation can work together to minimise the impact of a breach, in order to protect organisations from damaging shareholder value and business reputation.


      About the presenter

      Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.

      Read more >
    • How to Limit Damage from Cyber Attacks with BCDR & SDS
      How to Limit Damage from Cyber Attacks with BCDR & SDS Garry Carpenter Recorded: Jun 7 2018 9:00 am UTC 21 mins
    • Join us for this 45 minute webinar on 7th June at 10am UK that will ensure that your Business is Seamlessly Up and Running in Minutes. Understand how Ultimate Damage Limitation for Cyber-Attacks is Achieved through Business Continuity within Software-Defined Storage.

      Reasons to attend:

      Severity of cyber-attacks are judged by the length of time critical systems, data and applications are down. The ability to have a Business Continuity and Disaster Recovery enabled infrastructure mitigates the risk, offering zero downtime, zero Recovery Point Objective, and seamless rollback in time to the point before the attack hits.

      Joining the webinar equips you with 3 essential skills for damage limitation:

      Learn how to:

      * Implement multi layered protection that offers
      * Achieve additional resiliency with disaster recovery to the Cloud and 3rd Site
      * Rollback to the point immediately before the attack

      Your host for the meeting, Garry Carpenter has immersed himself in all things business continuity for the past few decades and is one of the leading UK authorities in the field.

      Read more >
    • M-Trends 2018 - Understanding Today's Cyber Attack Trends
      M-Trends 2018 - Understanding Today's Cyber Attack Trends Stuart McKenzie, VP, Mandiant Consulting Recorded: May 2 2018 10:00 am UTC 45 mins
    • Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarised in the annual M-Trends report, which explores changes in the cyber threat landscape.

      During this webinar, our Vice President Stuart McKenzie will discuss:

      - Longer-term trends in today's threat landscape
      - Sophisticated and harmful APT groups to look out for
      - Which organisations are most likely to be retargeted by attackers
      - The difficulty of finding skilled personnel and how it affects the security function
      - How weaknesses in security fundamentals contributed to successful compromises
      - Best practice red teaming tactics for improved security defense

      Read more >
    • Schools and Local Government: Protect Your Data from Cyber Attacks
      Schools and Local Government: Protect Your Data from Cyber Attacks Alpesh Shah, Security Practice & Solutions Architect Manager, Presidio Recorded: Dec 19 2017 2:30 pm UTC 30 mins
    • Increasingly sensitive school and local government data is being targeted by cyber criminals. In 2016, there was a startling 40% growth in data breaches, with over 172k records exposed in the US.

      • Understand how cyber criminals are approaching their targets
      • Discover how phishing, hacking and selling info in the black market works
      • Learn valuable tools and strategies to secure private information from cyber criminals

      About the Presenter: Alpesh Shah is the Practice Director and Cyber Security Solutions Architect Manager at Presidio. He supports both fortune 500 companies and government agencies in designing leading edge, complex and enterprise level cloud and security solutions. His passion for information security encouraged him to obtain several technical and business level certifications like CISSP, CISM, CEH, CHP, Security+ and ITILv3. With over a decade of experience in the IT industry, he specializes in managed security solutions, threat and vulnerability management, governance and compliance (HIPAA, PCI, FEDRAMP, ISO 27001, NIST), Disaster Recovery and Business Continuity Planning amongst other areas.

      Read more >
    • Red Team Exercises: How to Defend Against Cyber Attacks
      Red Team Exercises: How to Defend Against Cyber Attacks Anthony Paimany, Principle Red Team Consultant at Cylance® Recorded: Apr 19 2018 9:00 am UTC 41 mins
    • Defending from increasingly advanced and targeted cyberattacks is a constant challenge. Organizations need to gain a true understanding of their network security gaps and vulnerabilities from the perspective of an attacker in order to better address the risk these gaps and vulnerabilities can place on their operations.

      Join Anthony Paimany, Principle Red Team Consultant at Cylance®, as he demonstrates how cyberattacks are executed to test assumptions at every level of detection and response and discusses:

      - Cyberattackers’ primary tools, techniques, and procedures
      - How to determine gaps in defensive controls
      - How to identify and prioritize these risks through penetration tests, assessments, and social engineering

      Read more >
    • Red vs. Blue: The Threatscape Predictions for 2018
      Red vs. Blue: The Threatscape Predictions for 2018 Adi Ashkenazy, VP Product for XM Cyber Recorded: Mar 21 2018 9:00 pm UTC 45 mins
    • Analyzing cyber-attacks from last year, this session will cover leading trends, and identify potential evolution both in the defensive and offensive fields going forward. As we do so, we will explore the increasing importance of automation and the diminishing role of the human professional in large scale networks.

      About the Speaker:
      Adi Ashkenazy is the VP Product for XM Cyber, an innovative cyber security start-up developing a revolutionary breach and attack simulation solution, capable of identifying critical attack paths towards key organizational assets, while providing actionable prioritized remediation. Prior to XM Cyber, Adi served as deputy director of an elite cyber technology department in the prime minister's office in Israel, leading Israel's finest engineers and security professionals through some of the most complex cyber security challenges in the world today.

      Read more >