Hi [[ session.user.profile.firstName ]]
Sort by:
    • Vulnerability Scanning and Compliance Vulnerability Scanning and Compliance Lee Lawson Recorded: Jun 15 2011 11:00 am UTC 34 mins
    • With patches, threats and changes to your network taking place on a daily basis it is vital to understand if you are managing risk effectively. Vulnerability scanning is often a useful method to establish a vulnerability baseline across the network which is then tested on a regular basis to understand variance.

      Vulnerability Scanning is also required for a number of key regulatory compliance standards in both the public and private sector making it an even more crucial element of an organisation’s security operations.

      During this 30 minute webcast, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, will cover the following topics:

      •Vulnerability scanning drivers
      •Pros and cons for different vulnerability scanning solutions
      •Best fit solution for specific regulatory compliance standards

      Lee Lawson is the team leader, lead computer forensic investigator and penetration tester for Dell SecureWorks in EMEA. With a broad range of experience in IT security analysis, systems engineering and network security, Lee leads the penetration testing and digital forensic teams.

      Lee has been involved with secure computer systems for over a decade, as a user and later as an engineer and penetration tester of Military networks. Lee holds many professional certifications in his specialised fields such as the EnCase Certified Examiner, Certified Ethical Hacker, Certified Information Systems Security Professional (CISSP) and PCI QSA (Qualified Scanning Assessor). Lee holds UK Government SC clearance and has experience of developing and delivering training courses for Security Testing and Forensic Readiness. In addition, he has been responsible for reporting evidence in several cases of financial fraud, hacker attacks, IP theft and deception.

      Read more >
    • Communicating Cloud Services to SMBs Using ITIL Best Practices Communicating Cloud Services to SMBs Using ITIL Best Practices Johannes W. van den Bent, Principal Consultant, CLOUD-linguistics Recorded: Jul 14 2010 2:00 pm UTC 48 mins
    • A recent poll by developer GFI Software found that small business hesitate to use cloud services. The challenge seems to be how to communicate the benefits to this large target group.
      What role can the traditional SLA play in this communication, or do we need something new?

      In this presentation Hans looks at the traditional SLA according to ITIL and tries to investigate where it should be adapted to suit cloud service description for “the masses”.

      As a professional linguist Hans started a career in the ICT industry in the late eighties. With more than 21 years experience in the industry, Hans is an expert in international IT and quality standards like ITIL and ISO. Hans was one of the first to adopt the ITIL method in 1991, and helped its further development by teaching ITIL all over the world. As one of the main authors, he has helped develop ITIL v2 at the turn of the millennium, and more recently he has helped develop the Open Group’s TOGAF 9 certification program. In this international organization Hans was Vice Chair of the Certification Committee and Chair of the Localization Committee.

      In 2010 Hans started his own linguistic consultancy business delivering specialized services for the international ICT industry and educational organizations. His focus lies on international quality and IT standards. Hans is also a member of editing board of the new International Best Practice Institute.

      Read more >