Hi [[ session.user.profile.firstName ]]
Sort by:
    • Cyber Attack Trends from the Threatscape
      Cyber Attack Trends from the Threatscape Peter Wood, CEO of First Base Technologies Recorded: Mar 21 2018 11:00 am UTC 47 mins
    • What are the latest trends in the cyber-criminal underworld?
      Which attacks are you likely to be preventing as we move further into 2018?
      Who’s looking for vulnerability on your network?

      These questions and more, answered by Peter Wood FBCS CITP MIEEE CISSP M.Inst.ISP
      Chief Executive Officer, First Base Technologies LLP
      Peter’s career spans 48 years, with experience in network security, social engineering, threat and risk analysis, red teaming, industrial control systems and electronics. He founded First Base Technologies, one of the UK’s first information security consultancies in 1989. Peter has provided security advice and guidance for businesses of all sizes for more than 28 years, leading a team of expert penetration testers and consultants unrivalled in the industry.
      He is also a world-renowned security evangelist, speaking at major conferences and delivering seminars and webinars. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
      He is a BCS Fellow, a Chartered IT Professional, CISSP and a member of IISP, ISACA, ISSA, IEEE, ACM and Mensa. He is a visiting lecturer at the University of Sussex, teaching cybersecurity and ethical hacking.

      Read more >
    • Lessons of a Cyber Attack to Prevent Future Cyber Epidemics
      Lessons of a Cyber Attack to Prevent Future Cyber Epidemics Srinivas Mukkamala PhD., CEO and Co-Founder RiskSense Recorded: Nov 14 2017 9:00 pm UTC 47 mins
    • The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.

      Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.

      Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.

      What you will learn from this webinar:

      - How to prioritize what is most important when an attack happens.
      - Visibility into your attack surface and how to validate what the exposure is.
      - How to establish a metric based risk management program.

      About the Presenter:
      Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.

      Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.

      Read more >
    • Your breach readiness master plan: take the sting out of a cyber attack
      Your breach readiness master plan: take the sting out of a cyber attack Judith Moore, Director & Partner, FleishmanHillard Fishburn; Mark Deem, Partner, Cooley; Mike Trevett, UKI Director, Mandiant Recorded: Oct 22 2018 10:00 am UTC 61 mins
    • With numerous market-leading companies making negative data breach headlines this year, and attackers constantly evolving their techniques, tactics and procedures, it seems there’s no longer a case of ‘if’ an organisation will be breached, but instead ‘when’.

      “Do you know how your team will respond to and remediate a cyber-attack?”, is an increasingly pertinent question that all C-suite leaders should be able to answer—and more importantly, have a role in finding that answer to ensure their organisation’s cyber-security posture and incident response (IR) plan is built for success.

      Join and contribute to the conversation as Judith Moore, Director & Partner, Corporate and Crisis at FleishmanHillard Fishburn, Mark Deem, Partner at Cooley LLP and Mike Trevett, UKI Director at Mandiant discuss:

      •How to identify security maturity improvement areas before, during and after a breach
      •Why constantly-evolving threats require organisations to periodically revisit their crisis communication plans
      •What actions organisations should take to ensure they can effectively protect their reputation in the event of a breach
      •Which key strategic communication tactics should be considered when reporting a breach

      Read more >
    • How to Limit Damage from Cyber Attacks with BCDR & SDS
      How to Limit Damage from Cyber Attacks with BCDR & SDS Garry Carpenter Recorded: Jun 7 2018 9:00 am UTC 21 mins
    • Join us for this 45 minute webinar on 7th June at 10am UK that will ensure that your Business is Seamlessly Up and Running in Minutes. Understand how Ultimate Damage Limitation for Cyber-Attacks is Achieved through Business Continuity within Software-Defined Storage.

      Reasons to attend:

      Severity of cyber-attacks are judged by the length of time critical systems, data and applications are down. The ability to have a Business Continuity and Disaster Recovery enabled infrastructure mitigates the risk, offering zero downtime, zero Recovery Point Objective, and seamless rollback in time to the point before the attack hits.

      Joining the webinar equips you with 3 essential skills for damage limitation:

      Learn how to:

      * Implement multi layered protection that offers
      * Achieve additional resiliency with disaster recovery to the Cloud and 3rd Site
      * Rollback to the point immediately before the attack

      Your host for the meeting, Garry Carpenter has immersed himself in all things business continuity for the past few decades and is one of the leading UK authorities in the field.

      Read more >
    • M-Trends 2018 - Understanding Today's Cyber Attack Trends
      M-Trends 2018 - Understanding Today's Cyber Attack Trends Stuart McKenzie, VP, Mandiant Consulting Recorded: May 2 2018 10:00 am UTC 45 mins
    • Every year consultants from Mandiant, a FireEye company, respond to a wide variety of cyber incidents by threat groups around the world. This experience is summarised in the annual M-Trends report, which explores changes in the cyber threat landscape.

      During this webinar, our Vice President Stuart McKenzie will discuss:

      - Longer-term trends in today's threat landscape
      - Sophisticated and harmful APT groups to look out for
      - Which organisations are most likely to be retargeted by attackers
      - The difficulty of finding skilled personnel and how it affects the security function
      - How weaknesses in security fundamentals contributed to successful compromises
      - Best practice red teaming tactics for improved security defense

      Read more >
    • Cyber Security Risk Management –New Methods to Gain Control
      Cyber Security Risk Management –New Methods to Gain Control Matthew Keane, Sr. Director, FireEye, Travis Fry, Sr. Consultant, FireEye & Michelle Visser, Partner, Ropes & Gray Recorded: Oct 23 2018 3:00 pm UTC 58 mins
    • Due to the combination of growing cyber risks threatening critical assets of organizations today, and firmer security regulations enforced by lawmakers across the globe, security leaders are increasingly taking steps improve their risk management processes and key stakeholder communication—to enable better decision-making around security domains and necessary investments.

      This includes adoption of new risk management methods to generate realistic risk forecasts, effective metrics techniques, and a clear roadmap for capability improvements.

      Join Matthew Keane, Sr. Director of Strategic Services at FireEye, Travis Fry, Sr. Consultant at FireEye, and Michelle Visser, Partner at Ropes & Gray, as they share their security and legal expertise on:

      • Security risks across the complete cyber attack lifecycle, not only detection and response
      • A simple and proven method for approaching the risk reality facing all organizations
      • The rising cyber security insurance market and how it will affect risk management efforts
      • Influence of new regulatory requirements and the SEC’s interpretive guidance on disclosure issues
      • Using threat intelligence to ensure risk management efforts are based on real-world threats and ongoing adversary activities, not hypothetical or academic scenarios
      • Best practice exercises to test your incident response plan based on real-world experiences
      • Techniques for effectively reporting risk and capability needs to a Board-level audience

      Read more >
    • What Should SMEs be doing to mitigate against a Cyber Attack?
      What Should SMEs be doing to mitigate against a Cyber Attack? Danny Eastman, Cyber Security Specialist, Cyber Fortified Recorded: Sep 17 2018 12:00 pm UTC 40 mins
    • With the change in the data protection laws, in the UK, SME businesses must start to embrace the need for a cyber security strategy. No longer is “cyber security” an elitist term that fills the corridors and board rooms of large enterprises.

      As part of BrightTALK's Data Breaches and Effective Response Summit, we will look to dispel this misconception and help SME business owners understand what they can do to begin to protect and help mitigate the risk of a Cyber Attack against them.

      This webinar will cover the following topics:
      - What are the fundamentals that SMEs should be putting in place
      - Case Studies: Learning from previous data breaches
      - Proportionately remediating against gaps in security
      - Taking some practical steps to get you started

      Read more >
    • Live Interview Panel: IoT Cyber Attacks and Proactive Security
      Live Interview Panel: IoT Cyber Attacks and Proactive Security tbc Upcoming: Jan 29 2019 11:30 am UTC 60 mins
    • The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

      Join IoT and security experts to learn more about:
      - Unique challenges of securing IoT systems
      - IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
      - Proactive security strategies to stave off the threat of IoT cyber attacks IoT

      Read more >
    • Cybersecurity in the wake of recent attacks - Is Browser Isolation the solution?
      Cybersecurity in the wake of recent attacks - Is Browser Isolation the solution? Rajiv Raghunarayan, VP - Products, Cyberinc Recorded: Aug 21 2018 3:00 am UTC 49 mins
    • The spate of cyber-attacks continues with an increasing level of sophistication and precision and sometimes finding the easiest path – through the weakest link in the chain – the human factor. Businesses and even government organizations are constantly in an alarmed state having to deal with the aftermath of such attacks. Be it the case of City of Atlanta or the more recent SingHealth breach, it is evident that CIOs and CISOs across the globe need to re-assess their traditional security approach.

      What is Browser Isolation? And how can this technology aid CISOs, security leaders & practitioners in managing cyber threats?

      Register to watch Rajiv Raghunarayan, VP Products at Cyberinc outline a simple yet effective approach organizations - enterprise or government - could take towards reducing risk and vulnerabilities, while also driving up the productivity of their IT security teams.

      Read more >