Hi [[ session.user.profile.firstName ]]

Security Ratings: A Big Data Approach to Measuring and Mitigating Security Risk

The increasing volume of breaches we hear about in the news highlights the challenge risk managers face in working to address cyber risk. Current assessment methods, while insightful, are inadequate due to the pace at which security postures change, leaving organizations vulnerable and exposed in the blink of an eye. In order to truly reduce security risk, managers need more insight and better tools that allow for continuous visibility into the ever-changing network environments they are administering.

Join Stephen Boyer, CTO and co-founder of BitSight Technologies, and Oliver Brew, Vice President of Professional Liability at Liberty International Underwriters (LIU) for this webinar to discover:

- Why measuring security risk is difficult and how some assessment methods leave organizations vulnerable to threats and financial loss

- How forward-looking organizations are using Big Data to reduce risk, increase transparency and address new regulatory requirements

- Case Study: How LIU is using Security Ratings to mitigate risk
Recorded Apr 17 2014 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stephen Boyer of BitSight Technologies and Oliver Brew of Liberty International Underwriters
Presentation preview: Security Ratings: A Big Data Approach to Measuring and Mitigating Security Risk

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Trends in Cyber Attacks and Breaches Dec 11 2018 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    As the scale, sophistication, and targeting of cyber-attacks increase, organisations need to manage risk in ways beyond those traditionally handled by the information security function.

    In this webinar, Steve Durbin, Managing Director at the ISF will offer his insights into how security and business teams across the entire organisation can work together to minimise the impact of a breach, in order to protect organisations from damaging shareholder value and business reputation.


    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Security in the Golden Age of Cloud Oct 23 2018 12:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    Demand for cloud services continues to increase as the benefits of cloud services change the way organisation manage their data and use of IT.

    However, while these services can be implemented quickly and easily, with increased legislation and data privacy, the threat of cyber theft is on the increase and organisations must have a clear understanding of where their information is stored and how reliant these services are.

    In this webinar, Steve Durbin, Managing Director of the ISF will discuss the risks associated with cloud computing and how to manage them, as well as how to maximise the benefits.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Data Breach Prevention, Detection & Response Sep 18 2018 12:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    With the ever-increasing security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves.

    In order to prevent, detect and respond to breaches, organisations must focus on the basics such as software updates and patches, as well as build awareness within the organisation to ensure employees are educated on cybersecurity best practices.

    In this webinar, Steve Durbin, Managing Director of the ISF will discuss what actions can be taken to prevent and detect a data breach, and how to respond to a breach in order to reduce damage to brand and reputation, as well as how to mitigate the impact of a breach.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • The Future of IoT and Cyber Security Jun 14 2018 10:00 am UTC 45 mins
    Peter Wood & Mike McLaughlin
    In-depth look into the advancements in technologies designed to protect the IoT.
  • GDPR: Compliance Now and in the Future May 25 2018 12:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    After month's of planning and mapping out GDPR compliance activities, IT and security leaders are now under pressure to ensure their organisation is compliant and remains compliant.

    In this webinar, Steve Durbin, Managing Director at the ISF, will share his insights into the next steps organisations should take when maintaining a GDPR compliance programme, to ensure a culture of security awareness is established and embedded across the enterprise, and what to do in the event of a breach.

    About the presenter:
    Steve Durbin is Managing Director at the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • GDPR Countdown: Are you Ready? May 24 2018 12:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    With the EU's GDPR deadline upon us, what have organisations put in place to ensure they are compliant, and how can they ensure they stay compliant from now into the future?

    In this webinar, Steve Durbin, Managing Director at the ISF will discuss how organisations need to create a structured method in order to maintain sufficient levels of compliance. Steve will share insights into how organisations can achieve this through:

    - Identifying and updating how much personal data your organisation holds
    - implementing a compliance programme
    - Translating compliance actions into tangible business benefits
  • GDPR: Compliance and Preparation May 24 2018 10:00 am UTC 45 mins
    Peter Wood
    Learn the steps to take to respond effectively to a serious breach.
  • Machine Learning and AI for Healthcare Fraud Detection and Prevention May 16 2018 2:00 pm UTC 45 mins
    Aleksandar Lazarevic, Senior Director, Aetna
    The United States spent around $3.5 trillion or 18% of GDP on healthcare. According to FBI, the amount of this spending lost due to fraud, waste, and abuse (FWA) ranged between $90 billion and $330 billion!

    This talk will offer practical advice on how to effectively organize and join various healthcare data sources such as claim and clinical data, how to set-up the problem, and how to design an effective machine learning solution to identify FWA leads and expedite investigator review using intuitive visualization to understand the risk factors contributing to those leads.
  • The Future of Payment Fraud Prevention May 16 2018 8:00 am UTC 45 mins
    Rodrigo Camacho, CCO, Nethone
    Payment fraud prevention tools have existed since the end of the 90s and have improved continuously since. In the last 2 to 3 years we have seen a new paradigm come into the space - machine learning.

    This new technology is perfectly fitted for identifying fraud and is slowly being adopted by the market. Moving forward, using tools like this will no longer be a choice but rather an obligation for merchants. An obligation, as it will be at the origin of a competitive advantage which goes way beyond fraud prevention and will bleed into business intelligence fields.

    In this session, Rodrigo Camacho, CCO at Nethone will walk you through the evolution fraud prevention touching on the following key points;

    How the problem is solved by a large part of the industry today
    The revolution that is happening in the space today
    The halo effect that this revolution is going to have on the rest of business processes
  • The Board's Role in Balancing Risk & Reward Recorded: Apr 26 2018 46 mins
    Steve Durbin, Managing Director, ISF LTD
    Cyber has become a strategic issue and for many companies is now a business enabler and increasingly a form of competitive advantage. However it is clear that it remains difficult for Board's to get the “right” management information to support their cyber risk discussions and decision making.

    So how can Board's ensure that they are asking the right questions when it comes to an organisation’s cyber posture and how can CISOs maintain and improve the Board’s attention in this fast-moving space? This webinar will look at the challenges faced by CISOs and Board members and offer insights into how to successfully approach cyber security at Board level.

    About the presenter:
    Steve Durbin is Managing Director at the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Cyber Attack Trends from the Threatscape Recorded: Mar 21 2018 47 mins
    Peter Wood, CEO of First Base Technologies
    What are the latest trends in the cyber-criminal underworld?
    Which attacks are you likely to be preventing as we move further into 2018?
    Who’s looking for vulnerability on your network?

    These questions and more, answered by Peter Wood FBCS CITP MIEEE CISSP M.Inst.ISP
    Chief Executive Officer, First Base Technologies LLP
    Peter’s career spans 48 years, with experience in network security, social engineering, threat and risk analysis, red teaming, industrial control systems and electronics. He founded First Base Technologies, one of the UK’s first information security consultancies in 1989. Peter has provided security advice and guidance for businesses of all sizes for more than 28 years, leading a team of expert penetration testers and consultants unrivalled in the industry.
    He is also a world-renowned security evangelist, speaking at major conferences and delivering seminars and webinars. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
    He is a BCS Fellow, a Chartered IT Professional, CISSP and a member of IISP, ISACA, ISSA, IEEE, ACM and Mensa. He is a visiting lecturer at the University of Sussex, teaching cybersecurity and ethical hacking.
  • The Rise and Rise of Ransomware: Prepare and Protect Recorded: Mar 20 2018 49 mins
    Nick Frost, Principal Consultant, ISF
    The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

    With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

    In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

    About the presenter:

    Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
  • SD-WAN is Dead. Long Live Secure SD-WAN! Recorded: Mar 20 2018 46 mins
    Ronen Shpirer, Security Solutions Architect, Fortinet
    In the age of Digital Transformation, SD-WAN is on the lips of all enterprises and service providers. While the operational and commercial benefits of SD-WAN are clear, the focus on these as THE consideration is dangerous, as along its benefits comes a greater cyber security risk.

    This session will focus on Secure SD-WAN and the built-in benefits it provides, from both the operational and security points of view.
  • "Assessing the Impact of Web-Based Attacks" - a CFR exam topic Recorded: Mar 15 2018 62 mins
    Stacey McBrine, CISSP, CASP, CFR, CEI, CEH, ECSA, CHFI, CCNA, CCSI
    The second part of this webinar will cover the topic "Assessing the Impact of Web-Based Attacks" from the "Analyzing Attacks on Computing and Network Environments" module of the official CFR course.

    Before we get to this, the introduction will include an overview of the CyberSec First Responder (CFR) course and certification from Logical Operations. The CFR course prepares IT professionals with the knowledge, ability, and skills necessary to defend information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes.

    The practicality and value of the certification including its DOD 8570 approval will be highlighted.

    TOPICS TO BE COVERED:

    - Learn about how the CFR certification from Logical Operations can improve your organization’s information security defensive readiness, response capabilities and investigation to cover all aspects of incident response and analysis including before, during and after the incident.
    - Learn why CFR is one of the most practical security certifications available providing excellent ROI
    - Learn about types of web based attacks and their impact on your organization
    - Learn through using OWASP ZAP to scan a vulnerable website
    - Learn by exploiting a vulnerable website using SQL injection and XSS
    - Learn about how to get discounted exam vouchers


    ABOUT THE PRESENTER:

    Stacey McBrine has more than 30 years’ experience analyzing, securing, designing and implementing such diverse systems as Microsoft Windows, Novell Netware, DEC VMS, IBM AIX, Solaris, SCO Unix, Linux, and MAC O/S and Cisco switches, routers and firewalls. He served as systems analyst for many software development projects using assembly language, C, dBase, Access, Visual Basic and Oracle.
  • Basic Security with Cryptocurrencies Recorded: Mar 14 2018 56 mins
    Travin Keith, Managing Director at Agavon, Co-Founder at SICOS, and Administrator at BitcoinMarkets
    With the burst of interest into cryptocurrencies, there have been a lot of new users into this innovative world. However, the rush into the space has caused many users to skip key steps in joining the cryptocurrency community, such as understanding what basic security practices they should follow in order to keep themselves and their money secure.

    While there are technical steps to take to secure one's funds, there's also a number of things to keep in mind while interacting with the community.

    This webinar discussion aims to give beginners in the world of cryptocurrencies tips to better protect themselves, their money, and their sanity.
  • Securing Permissioned Blockchains Recorded: Mar 13 2018 49 mins
    David Huseby, Security Maven at Hyperledger
    Multi-party permissioned blockchains present a set of new security challenges for dev ops and system and network administration.

    This webinar will cover why a lot of what we already know from securing N-tier architectures also applies to securing permissioned blockchains. It will also cover what is different and new and discuss strategies for the practical defense of these distributed systems.
  • GDPR's influence on security Recorded: Feb 22 2018 43 mins
    Rob Shapland
    Will GDPR have the desired effect? Will it increase security, or see companies regularly hit with catastrophic fines for poor compliance.
  • The Real Cybersecurity Threat - The GAP in Cybersecurity Talent Recorded: Feb 9 2018 64 mins
    Dick Morrell, Barak Engel, David Morris
    This session will discuss the generational GAP in Cybersecurity Talent. One of the biggest challenges facing the Cybersecurity Community is filling the GAP as quickly as possible through mentoring and bright talent eager to enter the field with little or no cybersecurity background.
  • Hunting the Hunters or Can you cover your cyber tracks to avoid being caught? Recorded: Jan 23 2018 35 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    While some hackers crave the attention of a high profile attack or data breach, others prefer to work in shadows either trying to hide their tracks or are indifferent all together.

    Regardless, accurately understanding where an attack comes from is very helpful in defending against future attacks. More importantly, when companies and key organizations work together it is possible to tie together a multitude of individual footprints into a single, conclusive trail back to the originator.

    This session will focus on the importance of attribution and includes a case study of how a major cyber criminal was taken down, from the lowest foot soldier to the kingpin himself.
  • Smarter Security: Cyber Resilience, TARA and Red Teaming Recorded: Jan 16 2018 48 mins
    Peter Wood and Rob Shapland
    Cyber risk isn't new, but the stakes grow higher every day. An incident is no longer likely to be an isolated event, but a sustained and persistent campaign. There is no single solution that will offer protection from an attack, but a Cyber Resilience strategy can provide a multi-layered approach that encompasses people, processes and technology.

    Pete Wood will talk about eliminating the gap between IT and the business to present a united front against threats. This is a paradigm shift that uses security intelligence to guide decisions and support agility.
Resources and information to help you further your InfoSec career
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security.

Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more.

www.infosec-careers.com

This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after.

Key areas:

InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Ratings: A Big Data Approach to Measuring and Mitigating Security Risk
  • Live at: Apr 17 2014 4:00 pm
  • Presented by: Stephen Boyer of BitSight Technologies and Oliver Brew of Liberty International Underwriters
  • From:
Your email has been sent.
or close