Hi [[ session.user.profile.firstName ]]
Sort by:
    • Is Security Spend Proportionate to Cyber Resiliency? Is Security Spend Proportionate to Cyber Resiliency? Richard Turner, President EMEA, FireEye Recorded: May 10 2016 1:00 pm UTC 46 mins
    • There is an assumption that the more you spend on security technology, the more secure you will be. However, it is evident from the media that even though organisations are spending many on security products they are still being breached. Majority of organisations are falling back on 'historical, layered defence strategies’ with the tendency to think that by merely upgrading software and building up walls, their organisation is safe, but what if the attacker dug underneath the wall?. Does this demonstrate they are spending effectively and keeping their organisation secure?
      In this webinar, we will discuss why organisations don't need to spend more on security to be better protected but need to spend wisely with the budget they already have. Organisations continually need to think about how they readjust and refocus on strategies that enable them to be resilient and recover from a cyber-attack. The webinar will cover:
      Spend vs Resiliency – is it proportionate?
      Strategy for protecting what really matters
      Focusing on the 5% of alerts that really matter

      Join Richard Turner, FireEye President of EMEA, as he continues his discussion around taking the ‘Risk message of Cyber Secuirty to the board’

      Read more >
    • Vulnerability Scanning and Compliance Vulnerability Scanning and Compliance Lee Lawson Recorded: Jun 15 2011 11:00 am UTC 34 mins
    • With patches, threats and changes to your network taking place on a daily basis it is vital to understand if you are managing risk effectively. Vulnerability scanning is often a useful method to establish a vulnerability baseline across the network which is then tested on a regular basis to understand variance.

      Vulnerability Scanning is also required for a number of key regulatory compliance standards in both the public and private sector making it an even more crucial element of an organisation’s security operations.

      During this 30 minute webcast, Lee Lawson, Head of Security Testing and Response at Dell SecureWorks, will cover the following topics:

      •Vulnerability scanning drivers
      •Pros and cons for different vulnerability scanning solutions
      •Best fit solution for specific regulatory compliance standards

      Lee Lawson is the team leader, lead computer forensic investigator and penetration tester for Dell SecureWorks in EMEA. With a broad range of experience in IT security analysis, systems engineering and network security, Lee leads the penetration testing and digital forensic teams.

      Lee has been involved with secure computer systems for over a decade, as a user and later as an engineer and penetration tester of Military networks. Lee holds many professional certifications in his specialised fields such as the EnCase Certified Examiner, Certified Ethical Hacker, Certified Information Systems Security Professional (CISSP) and PCI QSA (Qualified Scanning Assessor). Lee holds UK Government SC clearance and has experience of developing and delivering training courses for Security Testing and Forensic Readiness. In addition, he has been responsible for reporting evidence in several cases of financial fraud, hacker attacks, IP theft and deception.

      Read more >
    • Communicating Cloud Services to SMBs Using ITIL Best Practices Communicating Cloud Services to SMBs Using ITIL Best Practices Johannes W. van den Bent, Principal Consultant, CLOUD-linguistics Recorded: Jul 14 2010 2:00 pm UTC 48 mins
    • A recent poll by developer GFI Software found that small business hesitate to use cloud services. The challenge seems to be how to communicate the benefits to this large target group.
      What role can the traditional SLA play in this communication, or do we need something new?

      In this presentation Hans looks at the traditional SLA according to ITIL and tries to investigate where it should be adapted to suit cloud service description for “the masses”.

      As a professional linguist Hans started a career in the ICT industry in the late eighties. With more than 21 years experience in the industry, Hans is an expert in international IT and quality standards like ITIL and ISO. Hans was one of the first to adopt the ITIL method in 1991, and helped its further development by teaching ITIL all over the world. As one of the main authors, he has helped develop ITIL v2 at the turn of the millennium, and more recently he has helped develop the Open Group’s TOGAF 9 certification program. In this international organization Hans was Vice Chair of the Certification Committee and Chair of the Localization Committee.

      In 2010 Hans started his own linguistic consultancy business delivering specialized services for the international ICT industry and educational organizations. His focus lies on international quality and IT standards. Hans is also a member of editing board of the new International Best Practice Institute.

      Read more >