Hi [[ session.user.profile.firstName ]]

Do you know where your next cyber security threat is likely to come from?

The biggest threat to an organizations cyber security isn't malware, phishing scams or even hackers - it is its employees. According to Gartner Inc, "people continue to be the weakest link in the security chain, as criminal social engineering ploys reach new levels of deviousness".

Join this compelling webcast that will address how to protect your employees against your next cyber security threat. This will also tackle key causes for major security attacks:

- Naive and disgruntled end-users
- The disappearance of the corporate perimeter
- Mobile devices becoming ideal entry points
- Lack of layered defenses
Recorded Jun 18 2015 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc.
Presentation preview: Do you know where your next cyber security threat is likely to come from?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Nov 21 2017 3:00 pm UTC 60 mins
    Jeffrey Ritter
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • Achieving Digital Trust: Turning New Threats into Customer Loyalty Oct 26 2017 2:00 pm UTC 45 mins
    Jeffrey Ritter
    Dynamic, volatile, innovative. Cloud security is all of these and more. How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty? How can customers gain trust in their service vendors despite the parade? Learn how in this webcast.
  • Seeing through the Clouds: How Visibility Reduces Security Failures Oct 25 2017 3:00 pm UTC 45 mins
    Dominic Vogel, Chief Security Strategist, Cyber.SC
    As organizations continue to ramp-up their migration to cloud-based environments, they will need to account for the associated security and control risks. There are hidden dangers and blind spots that arise through the use of virtualization technology in the data center. These hidden dangers and blind spots become more prevalent as business-critical applications are increasingly deployed on the public cloud. This is a problem considering that an organization’s operations are dependent on a cloud environment that inherently has a huge visibility gap.

    Many are now making the necessary changes to keep data secure in the cloud. This talk will focus on how to pragmatically accomplish cloud security through increased emphasis on cloud network visibility and cloud access security brokers. Enterprises that can properly implement appropriate cloud network visibility and cloud access security brokers will experience a third fewer security failures. Learn about practical steps and tools that you can use for accomplishing cloud security in your organization.
  • From Self-parking to Self-loathing: Innovation and Risk in Connected Cars Jun 22 2017 12:00 pm UTC 45 mins
    Ken Munro, Partner, Pen Test Partners LLP
    While autonomous driverless cars are still a work-in-progress connected cars and the IoT are becoming the norm. Whether that relates to communications infrastructure, on-board services for vehicle management, or mobile device connectivity, more and more new cars come equipped as standard with some sort of "connected" element. Typically the cost of new technology is in the buying price, but with modern cars it could be insurance hikes, loss of privacy, or even loss of life.

    Ken Munro, Partner and Security Consultant and Pen Test Partners, breaks down the key technologies and examines the security implications for drivers, insurers and manufactures alike.

    Viewers will learn about:
    - The attack surface that a connected car presents
    - What those attacks look like
    - The implications for everyday drivers
    - What manufacturers need to be doing
  • Sharing the Data of IoT Security Incidents: 5 Keys to Improved Security Jun 20 2017 2:00 pm UTC 45 mins
    Jeffrey Ritter
    Bad things happen, but the potential of IoT will be limited if those in any connected system of devices cannot share data of adverse incidents more effectively. This webcast introduces 5 keys to doing so successfully, all toward improving security across those systems.
  • Everything you wanted to know about GDPR but were too scared to ask May 23 2017 3:00 pm UTC 60 mins
    Jonathan Armstrong, Cordery & Nima Baiati, Absolute
    This webinar will give an update on key aspects of the GDPR and what you need to worry about most. It will offer some practical tips for what your organisation should do between now and the end of the year to get GDPR ready.
  • [Video Panel] Fighting Ransomware & Responding if the Worst Happens May 18 2017 12:00 pm UTC 60 mins
    Josh Downs, BrightTALK; Adrian Taylor, FireEye; Ian Whiting, Titania & others TBC
    Ransomware was one of the biggest threats facing businesses in 2016 and that trend is expected to continue as we press further into 2017.

    As more and more cheap malware becomes available to cyber criminals the sheer amount of ransomware attacks is on the rise.

    However, cyber defences are beginning to catch up.

    This expert video panel will be discussing the ransomware landscape, what you can do to better protect your business from the threat and steps to take should the worst happen.

    Panelists:

    - Josh Downs, BrightTALK (moderator)

    - Adrian Taylor, Field CTO, FireEye

    - Ian Whiting, CEO, Titania

    - other panelists TBC
  • Politics and Cyber Attacks: Techniques, Prevention & Influence May 18 2017 10:00 am UTC 45 mins
    Indy Dhami, Director & Independent Security Consultant
    Focus of the talk:

    The current global political climate and the increased number of cyber attacks associated with nation states and revelations from whistleblowers such as WikiLeaks. The strategies and potential reasons for such attacks – We are seeing a focus shifting from financial gain
    to political power, control and mass surveillance.

    Audience learning:

    A view of the technologies utilised and targeted to perform the attacks such as malware targets such as iPhones, Android devices and smart TVs and malware on Windows, Osx, Linux etc

    Audience takeaways:

    The talk is aimed at those with a general interest in Cyber Security and how political gain is firmly intertwined and a tool utilised in state sponsored cyber attacks indiscriminately against corporations, criminals and citizens alike.

    ------------------

    Indy possesses over 14 years’ experience, having worked in both
    operational and consulting positions at FTSE100 and Fortune 500
    organisations including AXA, Deutsche Bank, PwC, Accenture,
    Mercedes-Benz, Jaguar Land Rover and many other world leading
    organisations.

    His experience includes leadership positions in information/
    cybersecurity transformation, risk assurance, crisis management
    (pre and post incident), assurance, audit, governance, risk and
    compliance programmes.
  • Data Protection, Privacy & Preparing for GDPR May 17 2017 12:00 pm UTC 45 mins
    Sri Akunuri, Board Member & Director, ISACA London
    The new technologies are enabling organisations to capture a wealth of personal data and analysis of their behaviour to optimise their services and disrupt traditional business models, but all this means that personal privacy advocates and the regulators are playing catch up with the new EU General Data Protection Regulations (GDPR).

    The webinar discusses the data privacy concerns raised due to the pervasive nature of technologies & platforms, the principles used by GDPR to protect an individual's privacy, capabilities that organisations need to consider to protect data. The webinar takes a technology agnostic view by using a capability view and their relation to some of the common frameworks used to design and implement data security.

    - Speaker bio -

    Sri works with business leaders in setting business goals and achieving them. Sri focuses on leveraging latest technologies to build strategic capabilities through tailored frameworks for their creation, transition and operation. Sri brings together his deep experience in building strategies and solutions for managing data and information in a wide range of industry domains while complying with diverse regulatory regimes using tailored, business aligned, fit-for-purpose solutions for clients.

    With a range of qualifications in Information Risk, Audit, Security and Governance, Sri is a board member of ISACA London Chapter. Sri offers a range of management consultancy services for strategic business transformations including training and compliance services related to EU GDPR.
  • Shark Attacks and Car Crashes: Interrogating Fear and Risk in Data Protection May 17 2017 10:00 am UTC 45 mins
    Tim Sadler, ‎Co-founder & CEO, CheckRecipient
    Contrary to the fear around malicious insiders and external hackers, the Information Commissioner's Office recently reported that the most common data security incidents reported to them are all due to inadvertent human error (incidents like misaddressed emails and laptops being left on trains).

    In the face of game-changing regulatory changes like GDPR, it's crucial that information security and data protection professionals prioritise addressing the most prevalent risks first, not the ones that appear the scariest.

    This webinar is ideal for any security professionals looking to understand the regulatory and data protection landscape; reduce vulnerabilities; respond to threats more effectively and remediate breaches more effectively.
  • Email — The Achilles Heel of Cybersecurity That Lets Everyone Down May 17 2017 8:00 am UTC 45 mins
    Randal Pinto, Co-founder & COO, Red Sift
    A hole in the way the global email infrastructure works exposes every business to cyber-criminals. DMARC is a new security protocol that secures your email, protects your clients and improves the deliverability of every email you send.

    This webinar will provide you with an overview about the DMARC protocol and the types of attack that it protects against, its email configuration and deliverability benefits and how to protect your business.
  • Trusting Data Protection by FinTech: The Questions to Ask May 16 2017 2:00 pm UTC 45 mins
    Jeffrey Ritter
    Global FinTech innovations challenge institutions and customers to navigate how to align the innovations to complex privacy and data protection rules, both in law and in contract. Key questions need to be asked, and answered, to achieve success. Learn how to make the answers useful to conforming to those requirements.
  • Securing Finance: Lessons Learnt So Far May 16 2017 1:00 pm UTC 45 mins
    Roger Francis, Senior Consultant, Mandiant; Jeroen Herlaar, Regional Director, Mandiant
    In 2016 FireEye observed an increase in the number of advanced targeted attacks leveraged against financial institutions in Europe and the Middle East. Much of the activity involved sophisticated financially motivated attackers targeting poorly defended institutions, and centred on the interbanking messaging system.

    Join Mandiant’s live webinar and hear real world experts as they discuss recent interbanking messaging system breaches, what lessons should be learnt, and how to avoid such pitfalls in the future.
  • Securing FinTech: Threat-based testing along the kill chain May 16 2017 10:00 am UTC 45 mins
    Peter Wood
    Threat-based testing, accurately simulating criminal attacks, is a critical approach in securing FinTech. Attackers constantly evolve their attack methods and strategies in response to changing technologies, making it essential that security tests match the threat landscape.
  • Quantifying Cyber Risk: A Top-down Approach May 16 2017 8:00 am UTC 45 mins
    Ariel Evans, CEO, Innosec
    Cyber risk must be measures using a top-down approach to understand the business impact of cyber risk in dollars and cents and the effectiveness of cyber controls. Bottom-up approaches stop at the system level and do not tie the business processes to the data assets and the systems, hence they lack the ability to demonstrate the effect a missing control, or a discovered vulnerability has on cyber risk.

    Bottom-Up methods have proved themselves to be extremely inaccurate as they measure controls on the technology level and only describe the control maturity and not its effectiveness. Control maturity is a term that is commonly used by IT to measure their ability to perform and is derived from IT governance methodologies such as CobIT, ITIL and CMMI models. From a Risk Management perspective, controls maturity has no effect on Risk because it only describes the implementation status of the control. For example, an Anti-Malware solution can be 90% mature because it is installed on 90% of the end-points. But from a Risk perspective, the policy this control is enforcing could be irrelevant to the Risk. So its effectiveness could be 0%.

    Measuring cyber risk by evaluating controls maturity puts the insurer in a very high exposure for loss. Learn how to quantify cyber risk in dollars and cents.
  • [Video Interview] Piers Wilson and the IISP Industry Survey May 4 2017 1:00 pm UTC 30 mins
    Josh Downs, BrightTALK & Piers Wilson, Director, IISP
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with The IISP's Piers Wison for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The findings of the IISP Industry Survey

    - AI & machine learning in the security sphere

    - The steps cyber professionals need to take to prepare for GDPR

    - What banks can be doing to remain as protected as possible from cyber criminals

    - The growth of IoT networks and their subsequent vulnerabilities

    - What to look for when assembling a security team

    - How to get the most out of your security budget

    -
  • Knowledge of Natural Sciences Applied to Cybersecurity May 3 2017 2:00 pm UTC 45 mins
    Luis Bernardi, Director at IT Scientia Ltd
    The use of the knowledge and understanding of natural sciences, in particular the human body, applied to computer security is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex cyber threat landscape of computer systems. It is hoped that biologically inspired approaches in this area, including, but not limited, to the use of immune-based systems will be able to meet this challenge.

    Join this webinar to understand more about these ideas to further foster the need to design and develop naturally inspired and sustainable protection and defence systems.
  • [Video Interview] Andrew Gould on Early Cyber Prevention Techniques May 3 2017 1:00 pm UTC 30 mins
    Josh Downs, BrightTALK & Andrew Gould, Head of the MET's Falcon Cybercrime Unit
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with The MET's Andrew Gould for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The rise of Ransomware and what we can be doing to protect ourselves

    - The steps that businesses should be taking to prepare for GDPR

    - Financial cyber security and what the banks can be doing better to defend against malicious hackers

    - Cyber security relations and the future of law enforcement post-Brexit
  • Is Your Security Keeping Pace with Your Cloud Initiatives? May 2 2017 3:00 pm UTC 60 mins
    Jonathan Glass, Turner Broadcasting System, Chris Geiser, Garrigan Lyman Group, and Allison Armstrong, Alert Logic
    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility—and it’s a big one.

    Watch ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, for a lively discussion on how to evolve your security strategy to account for innovation at cloud speeds. Our panel of experts will discuss:

    - Why conventional security approaches falter in highly dynamic and elastic environments
    - Key steps to eliminate choke points, keep pace with elastic workloads, and how to deploy security controls in minutes
    - How to keep your internal and external customer’s applications and workloads secure while meeting compliance requirements
    - Why a Security-as-a-Service can help you strike the optimum balance between risk, cost and cloud speed.

    Join Jonathan Glass, Cloud Security Architect, Turner Broadcasting System, Chris Geiser, CTO of the Garrigan Lyman Group, and Allison Armstrong, VP of Technology and Product Marketing at Alert Logic, for a discussion on ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, and learn how it can. Register now!
  • [Video Interview] Tarah Wheeler on the Ethics of Hacking Back and AI in Security May 2 2017 1:00 pm UTC 30 mins
    Josh Downs, BrightTALK & Tarah Wheeler, Principal Security Advocate, Symantec
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with Symantec's Tarah Wheeler for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The ethics of 'hacking back'

    - AI & Machine learning and the influence it'll have on security

    - Cyber security in the financial sector

    - Cyber warfare and the new tactics coming through

    - Vulnerabilities in the IoT and what we can do about them

    Enjoy!
Resources and information to help you further your InfoSec career
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security.

www.infosec-careers.com

- Post Security jobs
- Set up and manage your resume to get found by security employers & recruiters
- Security training & certification offers
- Security resources, including reports, white papers & toolkits.

This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after.

Key areas:

InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Do you know where your next cyber security threat is likely to come from?
  • Live at: Jun 18 2015 3:00 pm
  • Presented by: Patrick Foxhoven, VP & CTO of Emerging Technologies, Zscaler, Inc.
  • From:
Your email has been sent.
or close