Hi [[ session.user.profile.firstName ]]

A 3 Step Approach to Increasing Enterprise Security By Inspecting SSL

With online privacy concerns growing, along with a corresponding growth in “default encryption” by cloud-based applications and services, more and more enterprise traffic is going uninspected. Yet, at last check, Gartner Research indicated that “less than 20% of organizations with a firewall, an intrusion prevention system (IPS) or a unified threat management (UTM) appliance decrypt inbound or outbound SSL traffic.” And they declared that security leaders must address this risk.

This webcast will explore:
1) Why so few organizations currently inspect encrypted traffic
2) What makes it so critical to expand inspection to encompass it
3) How exactly to do it in a practical, real-world way
Recorded Nov 11 2014 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Finger, Product Marketing Director, Fortinet
Presentation preview: A 3 Step Approach to Increasing Enterprise Security By Inspecting SSL

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Panel] Big Data Analytics vs Privacy: Risks and Opportunities Dec 14 2017 1:00 pm UTC 60 mins
    Panel of data experts
    Using sensitive data for advanced analytics and machine learning is an effective mechanism for increasing revenue and building customer loyalty - among other benefits - but it comes with a set of considerations around utility and privacy, all of which need addressing:

    - How can you extract value from your sensitive data sets?

    - What privacy concerns should you consider?

    - Is encryption enough to protect your data when it is shared?

    Many organisations are sitting on vast amounts of sensitive, yet highly valuable data and are currently unable to maximise its value. That data could be shared with internal teams and third parties, but privacy concerns and compliance restrictions prevent the data from being utilised effectively.

    Unlocking the data’s true value is a challenge, but there are a range of tools and techniques that can help. This live discussion will focus on the data analytics landscape; compliance considerations and opportunities for improving data utility in 2018 and beyond.

    Key takeaways:

    - A view of the data protection landscape

    - Tools and techniques to unlock the value of your sensitive data

    - Considerations for moving data to the cloud and sharing it with internal teams and third parties

    - Opportunities for maximising data utility in 2018
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Nov 21 2017 3:00 pm UTC 60 mins
    Jeffrey Ritter
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • Security Heretic: What got us here, won't get us there Recorded: Nov 16 2017 57 mins
    Gary Marsden, Senior Director of Data Protection Solutions at Gemalto
    Cybersecurity is at a crossroads and requires a dramatic shift to adequately support the needs of business owners and security administrators as digital transformation challenges their needs and investments. Managing multiple cloud providers and dramatic increases in the number of endpoints generating data and the subsequent volume of data means enterprise security teams no longer have the requisite skills and bandwidth to deal with complicated security products. Building in security from the beginning quickly and cost-effectively is an industry game changer, especially with new growth markets like Big Data, Blockchain, Cloud Computing, Internet of Things and Digital Payments.

    Multi-cloud environments and government regulations and industry compliance add to the complexity of maintaining a manageable and effective data protection strategy. Transforming encryption and key management (data protection in general) into a click and deploy model reduces internal business barriers between security teams, DevOps and product teams and alleviates disparate security policies, so you know where your data is and that it is secure. The way people consume security is changing by taking an on-demand approach similar to the Netflix philosophy. In this webinar, we will discuss how cloud-based security is simplifying workflow processes, changing cost/benefit models to drive us towards a pervasiveness of encryption and key management that will de-risk data and connectivity in similar ways to anti-virus and firewalls.

    Join this interactive presentation to learn about:
    • The role of security in today's connected world
    • The drivers for and impact of simplifying security on business and workflow
    • How security is providing valuable business intelligence through connected systems and meeting compliance mandates
    • Gemalto’s solution to solving on-demand data protection
    • Upcoming cybersecurity trends and how to prepare
  • Delivering a Secure API layer with Open Banking Recorded: Nov 16 2017 61 mins
    Louise Beaumont (Publicis.Sapient & techUK), Bernard Harguindeguy (Elastic Beam), Chris Ward (Mapa Research)
    This discussion focuses on delivering a secure API layer and how Open Banking will deliver a secure Open Future..

    Open Banking will affect every layer of the bank:
    -It will stretch and stress banks’ brands – resulting in both the potential for significantly increased reach, and reputational enhancement and risk
    -It will change and complicate how banks talk to consumers and SMEs – whether direct, intermediated, invisible, or all three simultaneously
    -The ecosystem environment will radically change how services are designed - with a flood of ideas and data available for those banks which successfully attract, seed and enrich the ecosystem within which they are a player
    -And the ecosystem environment will fundamentally change how these services are delivered – whether by companies with whom the bank has a partnership, or companies with whom the bank has absolutely no relationship
    -And finally, it also demands a rich, growing - and secure - API layer to enable the Open Future
  • Top cyber threats in the financial sector Recorded: Nov 16 2017 49 mins
    Candid Wueest, Principal Threat Researcher, Symantec
    Financial institutions are increasingly facing attacks on multiple fronts.

    Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions. While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing new types of attacks in the form of large-scale financial heists.

    Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards. They are using living off the land and fileless attack tactics similar to APT groups. But also extortion with DDoS attacks or business email compromise (BEC) scams are increasingly bothering financial corporations.

    In this webcast on the current financial threat landscape, Symantec takes a look at the most prevalent and significant financial threats.

    In this webcast we will review:
    - The top threats facing financial institutions with statistics and examples
    - Explore the most common techniques employed in financial attacks
    - Provide case studies of the most high-profile financial attacks of the past 12 months
  • Achieving Digital Trust: Turning New Threats into Customer Loyalty Recorded: Nov 15 2017 43 mins
    Jeffrey Ritter
    Dynamic, volatile, innovative. Cloud security is all of these and more. Join this webinar to learn more about:
    - How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty?
    - How can customers gain trust in their service vendors despite the parade?
  • Defending from Attack: Winning the Cyber Conflict Recorded: Nov 14 2017 31 mins
    Griff James, Director, Damrod Analysis Ltd.
    Effective responses to modern IT risks requires a transition from cyber security to cyber defense. This presentation introduces analysis based on proven military tools to understand, assess, and defend against cyber-attack. See how Petya worked its way in, and how to defend against it. Take away valuable tools and frameworks to develop your defenses.

    Presenter:

    Griff is trained as a Canadian Infantry Officer and is a graduate of the Johnson-Shoyama Graduate School of Public Policy. After a two-year stint as a Strategic Policy Analyst at the Treasury Board Secretariat in Ottawa, he moved to London where he completed a Master’s Degree at the LSE. Unable to find “real” work, he got into software development as a Scrum Master, leading the development of a web based application. This experience fostered an interest in cybersecurity, and Griff went on to a boutique start-up providing application security to Fortune 500 companies. Frustrated by the disconnect between technologies and poor analysis within cyber security, Griff founded cyber defense firm Damrod Analysis in 2017. He is London based, where he and his wife are expecting their first child shortly.
  • The 2018 Threatscape: Cyber clairvoyance and divination Recorded: Nov 14 2017 47 mins
    Peter Wood, CEO, First Base Technologies
    What have we learned from 2017's biggest breaches and how will we deal with 2018's emerging threats? Attempting to look both backward and forward over the cyber landscape, Peter Wood will review lessons learned and apply them to the evolving threatscape.
  • Securing SDx and Automation Recorded: Nov 7 2017 43 mins
    Nicolas Thomas, Fortinet Consulting System Engineer
    Software Defined everything (SDx) relies heavily on automation. As organizations adopt SDx, daily tasks become more automated and traditional security architectures (such as DC perimeter security) are not enough.

    Constant changes automated throughout the system and the integration and separation of responsibilities shake our security habits. In this session, we will look at how security architecture and solutions can adapt to those moving targets and provide the automated approach to make these environments even more secure.

    Join us on November 7th to learn how to ensure your operations team don’t put security in too late in the automation game.
  • Seeing through the Clouds: How Visibility Reduces Security Failures Recorded: Oct 25 2017 47 mins
    Dominic Vogel, Chief Security Strategist, Cyber.SC
    As organizations continue to ramp-up their migration to cloud-based environments, they will need to account for the associated security and control risks. There are hidden dangers and blind spots that arise through the use of virtualization technology in the data center. These hidden dangers and blind spots become more prevalent as business-critical applications are increasingly deployed on the public cloud. This is a problem considering that an organization’s operations are dependent on a cloud environment that inherently has a huge visibility gap.

    Many are now making the necessary changes to keep data secure in the cloud. This talk will focus on how to pragmatically accomplish cloud security through increased emphasis on cloud network visibility and cloud access security brokers. Enterprises that can properly implement appropriate cloud network visibility and cloud access security brokers will experience a third fewer security failures. Learn about practical steps and tools that you can use for accomplishing cloud security in your organization.
  • [Panel] Protecting Data in the Next Generation of the Cloud Recorded: Oct 25 2017 58 mins
    Amar Singh (Cyber Management Alliance); Klaus Gheri (Barracuda Networks), Daniele Catteddu (CSA)
    Cloud computing is an increasingly vital element of information security. It’s used to protect sensitive data; for identity and access management; for network security and to aid with incident response. However it’s not without it’s own set of risks and has been hit in the past with significant and newsworthy breaches.

    Join this interactive Q&A panel with top cloud and security experts as they discuss the future of the cloud and considerations to take for protecting sensitive data when it's held in the Cloud.

    Moderator:
    - Amar Singh, Cyber Management Alliance

    Speakers:
    - Daniele Catteddu, CTO, Cloud Security Alliance
    - Klaus Gheri, VP and GM, Network Security, Barracuda Networks
  • Protecting your Organisation Against the Evolving Threatscape Recorded: Oct 24 2017 41 mins
    Steve Durbin, Managing Director, ISF LTD
    Technology will underpin all aspects of modern society by 2019, profoundly impacting the way people live and work. Business leaders face a stark dilemma; should they rush to adopt new technology and risk major fallout if things go wrong; or wait and potentially lose ground to competitors. Organisations that are well informed about emerging technologies and corresponding threats will be best placed to make winning decisions.

    In this webinar, Steve Durbin, Managing Director, ISF, will examine the threats that organisations will be dealing with over the next two years and will provide advice on the best ways of handling them.
  • The Future of Cloud Security: Next Generation Threat-based Testing Recorded: Oct 24 2017 48 mins
    Peter Wood
    If your processing and data is in the cloud, how can you deliver assurance, compliance and governance? How do you find the flaws and soft spots that criminals will exploit? From browser to database, through human factors and end points, this presentation will take a threat-based approach to securing the cloud.
  • Bitcoin Forensics Recorded: Oct 10 2017 45 mins
    Anupam Tiwari, IT Security Consultant
    Bitcoin is all the rage right now. But many question the security behind this popular cryptocurrency.

    Join this session where Anupam's agenda will include:

    -Brief intro
    -Anonymity Vs. Pseudonymity
    -Bitcoin working mechanics and cryptography involved
    -Forensics
    -Transaction conduct and types
    -Wallets and types
    -Blockchain explorer
    -Bitcoin artifacts
    -Conclusion
  • Defending Against Cyber Crime Recorded: Sep 29 2017 46 mins
    Lisa Forte, Cyber Protection Officer, South West Police Cyber Crime Unit
    The South West Regional Cyber Crime Unit are involved in fighting cyber crime along with other national and international law enforcement agencies.

    As such they see certain traits, methodologies and vulnerabilities over and over again. Lisa Forte, the Cyber Protect Officer for the Unit, will be explaining how businesses should adapt their thinking to "see what the hackers see" to better defend themselves against the threat she sees every day.

    Lisa will also be talking about the importance of planning and war gaming out cyber attack scenarios. The businesses that have a plan are the businesses that survive to tell the tale. Lisa will be using real life cases that the Cyber Crime Unit have dealt with to highlight how quickly things can go wrong as well as providing some simple steps businesses can apply to reduce their vulnerability.

    Speaker bio:

    Lisa Forte is the Cyber Protection Officer for the South West Police Cyber Crime Unit. Her role involves helping businesses of all shapes and sizes defend against the ever growing cyber threat. Prior to working in the Cyber Crime Unit Lisa worked in intelligence for Counter Terrorism agencies in the UK.
  • How to be Ransomware Aware: A Primer on Security Awareness Recorded: Sep 28 2017 47 mins
    Bart Parys, Threat Intelligence Analyst, PwC
    Join this interactive webinar presentation with Bart Parys, Threat Intelligence Analyst at PwC to learn more about:
    - The history of ransomware
    - How it came to be, how it works and its purpose
    - How you can protect yourself and your organisation from this threat.

    This presentation will focus not only on technology, but also the human factor in ransomware protection.

    About the Presenter
    Bart is a lead researcher in PwC's cyber threat intelligence team, responsible for tracking cyber threat actors, their latest toolsets and methodologies. He has particular familiarity with ransomware, crimeware and any other malware and malware analysis in general.
  • [Panel] Protecting Data in the Age of Ransomware Recorded: Sep 27 2017 52 mins
    Josh Downs, BrightTALK; David Cook, Eversheds Sutherland; Jonathan Wright, Commvault & Jason Kent, AsTech Consulting
    - Protecting Data in the Age of Ransomware -

    2017 was a bumper year for Ransomware; with WannaCry & notPetya grabbing headlines around the world and instilling fear in the hearts of security professionals around the globe.

    With GDPR regulations on the horizon and potentially huge fines for badly protected and breached data, security professionals need to improve their defensive stature and ensure that their organisation's data is fully protected from end to end.

    This roundtable discussion will discuss how to best protect your data so if it falls into the wrong hands, you won't end up on the front of the worlds' papers!

    Topics for discussion:

    - Why ransomware should still be top of your list of concerns in 2018

    - Methods to protect your organisation's sensitive data

    - Steps to take if your organisation does suffer a damaging breach
  • Challenges in Data Privacy Recorded: Sep 14 2017 40 mins
    Craig Scoon, Consultant in the Risk Advisory Service at Deloitte
    There are many challenges for data privacy legislation within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem seems to constantly be playing catch-up.
    This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz),
  • State of Cloud Adoption in Asia Pacific (APAC) Recorded: Sep 13 2017 36 mins
    Ekta Mishra, Research Analyst of CSA and David Siah, Country Manager of TrendMicro Singapore
    Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.

    During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.
  • Security Challenges of the IoT Within Healthcare Recorded: Sep 13 2017 49 mins
    Minatee Mishra, Software Architect & Lead of the Security Centre of Excellence, Philips HealthTech
    Healthcare industry would be one of the major adopters of IoT. What are the security challenges of healthcare industry? How does IoT change the security equation in healthcare?

    Presenter:

    Minatee leads the Security Center of Excellence (ScoE) in Philips HealthTech and has been instrumental in setting up the SCoE within Philips. The SCoE , which is a central organization responsible for doing cutting edge work in the field of security testing, doing secure code analysis , finding the vulnerable components within the software and more. Minatee has been in the field of software for 18 years right from designing and architecting systems to securing in systems, She has a bachelors in electrical engineering from NIT and Masters from IIT Kharagpur. She holds CISSP, GCIH, CEH certifications. She has been a speaker at various forums/conferences like RSA, RISC, NullCon, BPM etc.
Resources and information to help you further your InfoSec career
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security.

www.infosec-careers.com

- Post Security jobs
- Set up and manage your resume to get found by security employers & recruiters
- Security training & certification offers
- Security resources, including reports, white papers & toolkits.

This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after.

Key areas:

InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A 3 Step Approach to Increasing Enterprise Security By Inspecting SSL
  • Live at: Nov 11 2014 4:00 pm
  • Presented by: David Finger, Product Marketing Director, Fortinet
  • From:
Your email has been sent.
or close