Hi [[ session.user.profile.firstName ]]

Making the Most of Social In Your Business; While keeping it under control

Join IBM and Actiance to learn how to get the most out of Social for your business, while controlling the risks. The statistics are well documented regarding how Social can help grow your business. But many are slow to adopt Social aggressively because of fears of exposure and control. Join us to learn how IBM and Actiance have teamed to provide seamless integration of the Social tools you need and the governance and controls necessary to make Social profitable and easy to manage in your business.
Recorded May 28 2014 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dave Durazzano & Todd Heythaler
Presentation preview: Making the Most of Social In Your Business; While keeping it under control

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Nov 21 2017 3:00 pm UTC 60 mins
    Jeffrey Ritter
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • Achieving Digital Trust: Turning New Threats into Customer Loyalty Oct 26 2017 2:00 pm UTC 45 mins
    Jeffrey Ritter
    Dynamic, volatile, innovative. Cloud security is all of these and more. How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty? How can customers gain trust in their service vendors despite the parade? Learn how in this webcast.
  • Seeing through the Clouds: How Visibility Reduces Security Failures Oct 18 2017 3:00 pm UTC 45 mins
    Dominic Vogel, Chief Security Strategist, Cyber.SC
    As organizations continue to ramp-up their migration to cloud-based environments, they will need to account for the associated security and control risks. There are hidden dangers and blind spots that arise through the use of virtualization technology in the data center. These hidden dangers and blind spots become more prevalent as business-critical applications are increasingly deployed on the public cloud. This is a problem considering that an organization’s operations are dependent on a cloud environment that inherently has a huge visibility gap.

    Many are now making the necessary changes to keep data secure in the cloud. This talk will focus on how to pragmatically accomplish cloud security through increased emphasis on cloud network visibility and cloud access security brokers. Enterprises that can properly implement appropriate cloud network visibility and cloud access security brokers will experience a third fewer security failures. Learn about practical steps and tools that you can use for accomplishing cloud security in your organization.
  • From Self-parking to Self-loathing: Innovation and Risk in Connected Cars Jun 22 2017 12:00 pm UTC 45 mins
    Ken Munro, Partner, Pen Test Partners LLP
    While autonomous driverless cars are still a work-in-progress connected cars and the IoT are becoming the norm. Whether that relates to communications infrastructure, on-board services for vehicle management, or mobile device connectivity, more and more new cars come equipped as standard with some sort of "connected" element. Typically the cost of new technology is in the buying price, but with modern cars it could be insurance hikes, loss of privacy, or even loss of life.

    Ken Munro, Partner and Security Consultant and Pen Test Partners, breaks down the key technologies and examines the security implications for drivers, insurers and manufactures alike.

    Viewers will learn about:
    - The attack surface that a connected car presents
    - What those attacks look like
    - The implications for everyday drivers
    - What manufacturers need to be doing
  • Sharing the Data of IoT Security Incidents: 5 Keys to Improved Security Jun 20 2017 2:00 pm UTC 45 mins
    Jeffrey Ritter
    Bad things happen, but the potential of IoT will be limited if those in any connected system of devices cannot share data of adverse incidents more effectively. This webcast introduces 5 keys to doing so successfully, all toward improving security across those systems.
  • Politics and Cyber Attacks: Techniques, Prevention & Influence May 18 2017 10:00 am UTC 45 mins
    Indy Dhami, Director & Independent Security Consultant
    Focus of the talk:

    The current global political climate and the increased number of cyber attacks associated with nation states and revelations from whistleblowers such as WikiLeaks. The strategies and potential reasons for such attacks – We are seeing a focus shifting from financial gain
    to political power, control and mass surveillance.

    Audience learning:

    A view of the technologies utilised and targeted to perform the attacks such as malware targets such as iPhones, Android devices and smart TVs and malware on Windows, Osx, Linux etc

    Audience takeaways:

    The talk is aimed at those with a general interest in Cyber Security and how political gain is firmly intertwined and a tool utilised in state sponsored cyber attacks indiscriminately against corporations, criminals and citizens alike.

    ------------------

    Indy possesses over 14 years’ experience, having worked in both
    operational and consulting positions at FTSE100 and Fortune 500
    organisations including AXA, Deutsche Bank, PwC, Accenture,
    Mercedes-Benz, Jaguar Land Rover and many other world leading
    organisations.

    His experience includes leadership positions in information/
    cybersecurity transformation, risk assurance, crisis management
    (pre and post incident), assurance, audit, governance, risk and
    compliance programmes.
  • Shark Attacks and Car Crashes: Interrogating Fear and Risk in Data Protection May 17 2017 10:00 am UTC 45 mins
    Tim Sadler, ‎Co-founder & CEO, CheckRecipient
    Contrary to the fear around malicious insiders and external hackers, the Information Commissioner's Office recently reported that the most common data security incidents reported to them are all due to inadvertent human error (incidents like misaddressed emails and laptops being left on trains).

    In the face of game-changing regulatory changes like GDPR, it's crucial that information security and data protection professionals prioritise addressing the most prevalent risks first, not the ones that appear the scariest.

    This webinar is ideal for any security professionals looking to understand the regulatory and data protection landscape; reduce vulnerabilities; respond to threats more effectively and remediate breaches more effectively.
  • Trusting Data Protection by FinTech: The Questions to Ask May 16 2017 2:00 pm UTC 45 mins
    Jeffrey Ritter
    Global FinTech innovations challenge institutions and customers to navigate how to align the innovations to complex privacy and data protection rules, both in law and in contract. Key questions need to be asked, and answered, to achieve success. Learn how to make the answers useful to conforming to those requirements.
  • Securing FinTech: Threat-based testing along the kill chain May 16 2017 10:00 am UTC 45 mins
    Peter Wood
    Threat-based testing, accurately simulating criminal attacks, is a critical approach in securing FinTech. Attackers constantly evolve their attack methods and strategies in response to changing technologies, making it essential that security tests match the threat landscape.
  • Quantifying Cyber Risk: A Top-down Approach May 16 2017 8:00 am UTC 45 mins
    Ariel Evans, CEO, Innosec
    Cyber risk must be measures using a top-down approach to understand the business impact of cyber risk in dollars and cents and the effectiveness of cyber controls. Bottom-up approaches stop at the system level and do not tie the business processes to the data assets and the systems, hence they lack the ability to demonstrate the effect a missing control, or a discovered vulnerability has on cyber risk.

    Bottom-Up methods have proved themselves to be extremely inaccurate as they measure controls on the technology level and only describe the control maturity and not its effectiveness. Control maturity is a term that is commonly used by IT to measure their ability to perform and is derived from IT governance methodologies such as CobIT, ITIL and CMMI models. From a Risk Management perspective, controls maturity has no effect on Risk because it only describes the implementation status of the control. For example, an Anti-Malware solution can be 90% mature because it is installed on 90% of the end-points. But from a Risk perspective, the policy this control is enforcing could be irrelevant to the Risk. So its effectiveness could be 0%.

    Measuring cyber risk by evaluating controls maturity puts the insurer in a very high exposure for loss. Learn how to quantify cyber risk in dollars and cents.
  • A Day in the Life of an Incident Investigator - Live Demo Apr 4 2017 1:00 pm UTC 60 mins
    Amar Singh Cyber Management Alliance
    This webinar includes a live demo of real incident response play-books in action!

    Join Amar Singh and his special guests in this highly informative and educational webinar on:

    * How to design play-books (aka run-books) for different attack scenarios.
    * How to align your incident response to official standards.
    * Learn more about a day in the life of an investigator.
    * How to create an effective triage process that works for every type of attack.
    * Discover the various types of data enrichment attributes to apply to every incident.
  • Ransomware Wins! User Awareness Doesn't Work! What Do you Do? Mar 30 2017 1:00 pm UTC 60 mins
    Amar Singh & Industry Experts
    Nope this is NOT another webinar on How to Protect Against Ransomware blah blah blah.

    If you reckon that users (yes that includes you and me) are the first line of defence against ransomware! Sorry to break it to you but you are WRONG! We are all humans and we make mistakes and ransomware creators know that.

    You have a choice.Hope and or pray that your awareness training protects your employees and your business from becoming a ransomware victim OR attend this webinar and learn what you can do to protect your business.

    Note: This is not your typical webinar. Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
  • BrightTALK at RSA 2017: Chenxi Wang on Diversity and the Future of Cyber Warfare Recorded: Mar 23 2017 11 mins
    Chenxi Wang, Founder of The Jane Bond Project & Josh Downs, Community Manager, BrightTALK
    BrightTALK caught up with Chenxi Wang, Founder of The Jane Project and Twistlock's Chief Strategy Officer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Yahoo Breach and some of her suspected reasons why
    - The influence of the supposed Russian US election hack and what it means for cyber warfare
    - Diversity in the cyber industry and how it can be improved
    - AI & Machine learning and use cases for security
    - The key vulnerabilities in IoT networks that we should be thinking about
  • BrightTALK at RSA 2017: Mark Weatherford on Ransomware, DDoS & Virtualization Recorded: Mar 21 2017 10 mins
    Mark Weatherford, Chief Cybersecurity Strategist at vArmour and Josh Downs, Community Manager at BrightTALK
    BrightTALK caught up with vArmour's Chief Strategist, Mark Weatherford for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The rise of Ransomware and where companies are more vulnerable
    - DDoS and why it's still a key threat to businesses
    - The increased vulnerability of the IoT
    - Challenges for Donald Trump and his new cyber team
    - How to boost equality and diversity in the information security industry
    - How cloud and virtualization are changing the security game

    About the Speaker:
    Mark Weatherford is Chief Cybersecurity Strategist at vArmour, the data center and cloud security company. He was formerly a Principal at the Chertoff Group, was Deputy Under Secretary for Cybersecurity at DHS, was Chief Security Officer at the North American Electric Reliability Corporation (NERC) and was the CISO for the states of California and Colorado. He also served as a cryptologic officer in the US Navy. Weatherford is a Director on the Boards of Coalfire, the Center for Cyber and Homeland Security (CCHS) at the George Washington University, and the National Cybersecurity Center (NCC) in Colorado Springs. He is also on the Advisory Board at both Cylance and AlertEnterprise.
  • GDPR: Ready or not, here it comes Recorded: Mar 16 2017 59 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    Europe’s General Data Protection Regulation (GDPR) will come into effect on 25th May 2018, leaving all organisations that process the data of EU residents with less than 18 months to meet the stringent requirements of the regulation. Organisations must implement a cloud security strategy that supports compliance and minimises their organisation’s exposure to the new breach notification requirements and financial penalties, as high as 20 million Euros or 4% of total annual turnover.

    Still figuring out how your organisation is going to comply? What actionable steps you should be taking today? Look no further. Join Oliver Pinson-Roxburgh, EMEA Technical Director from Alert Logic for an in-depth discussion about GDPR, highlights include:

    - Cutting through the ambiguity and focusing on the key cloud security considerations
    - Data breach responsibilities and what that means to your organisation
    - What is the role and expectation of your cloud provider when it comes to GDPR
    - Insight into real-life case studies

    Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
  • Operationalizing Threat Intelligence Recorded: Mar 16 2017 45 mins
    Igors Konovalovs, Sales Director, EMEA, FireEye iSIGHT Intelligence
    Learn how intelligence-led organizations globally apply threat intelligence to prioritize vulnerability patching, accelerate incident response, reveal strategic risks and plan cyber security investments.

    Amongst other things this webinar will provide insight into:
    1. Importance of visibility over an entire attack lifecycle
    2. How NATO military doctrine for intelligence collection & analysis can be applied in a commercial environment
    3. Key Threat Hunting skills and requirements
  • Cyber Attack Trends 2017 & Beyond: Protecting your business from cyber criminals Recorded: Mar 16 2017 47 mins
    Steve Durbin, Managing Director, ISF Ltd
    As the scale and sophistication of cyber attacks increases, businesses need to manage risk in ways beyond those traditionally handled by the information security function.

    In this webinar, Steve Durbin, Managing Director, ISF will offer insights into how security and business teams across the organisation can work together to minimise the impact of cyber attacks on shareholder value and business reputation.
  • [Live Panel] Threat Hunters in Action Recorded: Mar 16 2017 59 mins
    Josh Downs, BrightTALK (moderator), Jens Monrad, FireEye & Amar Singh, Cyber Management Alliance
    Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally by 2021, up from $3 trillion in 2015. Every industry and government is at risk, highlighting the need for stronger cyber defence.

    This live panel will focus on the tools and techniques threat hunters use to patrol your networks, mitigate threats and remove unwanted presence.
  • Jenny Radcliffe - Threat Hunters in Action - Social Engineering Inside Out Recorded: Mar 16 2017 44 mins
    Jenny Radcliffe, Director, Jenny Radcliffe Training
    For the Threat Hunters in Action series, this webinar presents a guide to how social engineering forms a large part of insider threats within organisations.

    Learn how insider threats are created and manipulated by external parties as well as how organisations help create their own insider threats through cultural and behavioural factors.

    The webinar will give advice on how to spot individuals "within the family" who may have malicious intentions towards the business, and gives advice on how to manage the problem within an organisation.
  • 7 Strategies for Dynamic Contract Management in the Cloud Recorded: Mar 15 2017 42 mins
    Jeffrey Ritter
    New threats and new defenses constantly challenge the rules for managing security across third party cloud services. In this webcast, you will learn 7 strategies for how to structure and adapt the complex commercial agreements to assure both vendors and customers new risks are being controlled.
Resources and information to help you further your InfoSec career
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security.

www.infosec-careers.com

- Post Security jobs
- Set up and manage your resume to get found by security employers & recruiters
- Security training & certification offers
- Security resources, including reports, white papers & toolkits.

This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after.

Key areas:

InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Making the Most of Social In Your Business; While keeping it under control
  • Live at: May 28 2014 4:00 pm
  • Presented by: Dave Durazzano & Todd Heythaler
  • From:
Your email has been sent.
or close