Hi [[ session.user.profile.firstName ]]
Sort by:
    • Cyber Threat Predictions & Security for 2018
      Cyber Threat Predictions & Security for 2018 Diana Kelley | Mark Weatherford | Jon Green | David McGuire | Ashton Mozano Upcoming: Dec 14 2017 6:00 pm UTC 60 mins
    • With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.

      This interactive Q&A panel with security industry experts will explore:
      - The biggest threats on the horizon
      - Key vulnerabilities and how to protect against them
      - Measures for breach prevention, detection and response
      - Which areas to focus on in 2018
      - Recommendations for CISOs

      - Diana Kelley, Cybersecurity Field CTO, Microsoft
      - David McGuire, CEO, SpecterOps
      - Ashton Mozano, CTO, Circadence
      - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
      - Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company

      Read more >
    • Diversity and the Art of Cybersecurity | RSAC Live Panel
      Diversity and the Art of Cybersecurity | RSAC Live Panel Diana Kelley (IBM), Jennifer Steffens (IOActive), Dug Song (DuoSec), Ayelet Steinitz (Imperva), Larry Whiteside Jr. (Optiv) Recorded: Feb 14 2017 9:00 pm UTC 40 mins
    • Cybersecurity is an art. It’s a game of virtual hide-and-seek wherein attacker and defender are pitted against each other in an elaborate game of strategy which requires making unexpected connections between things before they happen. The skills needed for this job come from different experiences, perspectives and the ability to put yourself in another person’s shoes, and without a wide range of thinking styles, the solutions that we devise for a security problem are necessarily limited. Cybercriminals don’t think nor play by the rules - so why do we put unnecessary rules on ourselves? In this panel, industry experts and diversity champions discuss why diversity is critical to cybersecurity and explore the concrete steps that the security industry can take to foster diversity today for better solutions.

      The audience will learn:
      - What diversity in the workforce really means (hint: it’s more than gender!)
      - The value of diversity (with examples of successful diversity programs in InfoSec)
      - Tips, tricks and best practices to creating and maintaining a successful, working diversity program

      Diana Kelley, Global Executive Security Advisor, IBM

      - Jennifer Steffens, CEO of IOActive, Inc
      - Dug Song, Co-Founder & CEO, Duo Security
      - Ayelet Steinitz, VP of Business Development, Imperva
      - Larry Whiteside Jr., Co-founder & VP, International Consortium of Minority Cybersecurity Professionals

      Read more >
    • Make The Most Out Of Your Email Security Data
      Make The Most Out Of Your Email Security Data Kelley Mak, Former Forrester Analyst | Scott Greaux, PhishMe Recorded: Sep 20 2016 4:00 pm UTC 58 mins
    • Email remains an essential tool for business communication and collaboration as well as customer engagement. Because of its pervasiveness and business importance, it is a common – even preferred – attack vector for both cybercriminals and fraudsters that can result in devastating breaches and other financial losses. Yet, security teams can leverage the data from email to enhance their ability to detect, analyze, and respond to critical email security incidents, as well as leverage the threat intelligence for other security technologies.

      In this webinar, former Forrester Analyst Kelley Mak will join Scott Greaux from PhishMe to:
      •Provide an overview of today's email security challenges across on-premise and hosted cloud email deployments
      •Discuss the need for in-depth email incident response capabilities, including internal and external threat analysis, prioritization, and rapid response
      •Provide recommendations on how security teams can refine the email events in their enterprise into valuable threat intelligence

      Read more >
    • Finally -- Evidence-Based Best Practices For Using UV Disinfection Equipment
      Finally -- Evidence-Based Best Practices For Using UV Disinfection Equipment Dr. William Jarvis MD, Dr. Thomas Kelley MD Recorded: May 25 2016 6:00 pm UTC 62 mins
    • You wouldn’t operate a ventilator or administer an IV without knowing there are scientific studies that back up your procedures. You learned best practices supported by scientific research.

      We have the science and consensus to support UV disinfection best practices. Best practices that have resulted in infection rate reductions in real hospital environments.

      Your discussion will be led by esteemed experts Dr. William Jarvis and Dr. Thomas Kelley.

      William Jarvis, MD is a world leader in infection prevention. Among many other accomplishments he worked at the Centers for Disease Control and Prevention for 23 years, and has published over 450 peer reviewed papers. Recently it was said of Dr. Jarvis, “His decades of service and uncompromised commitment to [infection prevention] has lead to changes in how infection control is administered and has saved many lives.”

      Dr. Jarvis will discuss:
      -Most recent CDC and SHEA guidelines, and the metrics involved
      -A review of the science available on UV technologies in the market
      -What to look for when evaluating a UV technology

      Thomas Kelley, MD is Chief of Quality and Clinical Transformation at Orlando Health. He is a practicing primary care physician in Florida and has been a champion of quality improvement his entire career. He developed the first quality improvement council for the residency program when he was a faculty physician training residents at Atlanta Medical Center, and has continued to give his time and expertise to the causes of patient safety and quality care ever since. Colleagues say, “Dr. Kelley is a true champion for quality.”

      Dr. Kelley will discuss:
      -An integrated disinfection program with pulsed xenon enlightening best practices
      -Review of the results from a system-wide deployment of pulsed xenon light technology
      -How they achieved a $3.8M cost avoidance from HAI rate reduction in 12 months

      Read more >
    • Rethinking vulnerability management: Insights from Secunia & Forrester
      Rethinking vulnerability management: Insights from Secunia & Forrester Kelley Mak, Researcher, Forrester Research & Santeri Kangas, CTO, Secunia Recorded: Sep 15 2015 3:00 pm UTC 61 mins
    • Cybersecurity incident disclosures and vulnerability warnings continue to be released at an alarming and fatiguing rate, and there aren’t any signs of breach activity slowing down. Vulnerability management is more important than ever, yet staying on top of vulnerabilities poses a major challenge for security and risk (S&R) professionals.

      In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how S&R pros can repair their strained or broken vulnerability management processes and move past low impact checkbox scanning to proactive, risk-based assessments.

      Following Kelley Mak’s presentation on the changes in vulnerability management, Secunia’s CTO Santeri Kangas will present Secunia’s take on the challenges of vulnerability management and how the Secunia VIM, our Vulnerability Intelligence Manager, helps organizations address those challenges.

      Read more >
    • Orchestrating Effective IT Risk Management Across the Lines of Defense
      Orchestrating Effective IT Risk Management Across the Lines of Defense Kelley Vick, IT GRC Forum; Cameron Jackson, Riskonnect; Weston Nelson, Moss Adams Advisory Services Recorded: Aug 8 2017 8:00 pm UTC 65 mins
    • Today’s IT risk environment is more threatened than ever thanks to the growth in sophisticated cyber attacks and security vulnerabilities. Now, complex, hard-to-detect attacks could bring down not just a single institution but also large parts of the internet and the financial markets. Organizations need an intelligent approach when it comes to assessing IT risk and managing compliance.

      Staying safe is no longer just about deflecting attackers. It’s about staying ahead of attackers who are already inside the organization, and banks are doing this through structured lines of defense that enhance security capabilities, involve IT risk managers in operations, and expand internal audits mandate so they can cover business disruption. On this webinar presentation we will address some ways how organizations can as a part of an Integrated Risk Management initiative orchestrate effective IT risk management across the lines of defense.

      Read more >
    • Managing Risk Through AI: What Financial Institutions Need to Know
      Managing Risk Through AI: What Financial Institutions Need to Know Moderator: Kevin Petrasic | Speakers: Steve Chabinsky, Kelley Chamberlain and Ben Saul Recorded: Jul 11 2017 4:00 pm UTC 66 mins
    • As banks and other financial services companies seek to improve compliance management systems, many are considering the use of algorithmic and other artificial intelligence (AI) solutions to augment or replace current systems. AI-driven RegTech has the potential to revolutionize all facets of compliance management: AML, OFAC, regulatory reporting, risk management, and cybersecurity. But, to develop and implement an AI-based compliance system, institutions need to map out a planned approach, which requires careful analysis of several threshold issues.
      This webinar features legal professionals at the leading edge of AI, data, privacy and cybersecurity law along with senior compliance officers from banks that are advancing compliance technology. They will discuss the legal and compliance questions that banks and financial services companies should consider, with a view to understanding both the risks and opportunities presented by AI-driven RegTech initiatives.

      Learning Objectives:
      •Gain perspective of the potential use cases for AI to enhance financial institution compliance management and exploring the range of AI-based solutions
      •Understand the attendant risks involved in use of AI, particularly in the context of evolving cybersecurity and data privacy standards
      •Understand the complexity of third-party outsourcing when data access and security are key issues
      •Identify compliance functions where the benefits of using AI already exceed the risks

      Read more >