Hi [[ session.user.profile.firstName ]]

Using machines to combat criminals

2016 is turning out to be a landmark year in terms of Ransomware and there’s no sign of these threats slowing down any time soon. Ransomware is not new, it is just getting more sophisticated and is inflicting major damage to companies, organisations and individuals, shaping up to be a frighteningly lucrative year for cybercriminals, where any person with a computer can be exploited and used as a revenue source with the potential for vast profits.

Learn how Cylance have revolutionized the industry by utilizing data science and security experts to provide a next-generation cybersecurity technology that proactively prevents, rather than detects the execution of advanced persistent threats and malware in real time before they ever cause harm.
Recorded Oct 13 2016 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Lloyd Webb, Sales Engineering Director, Cylance
Presentation preview: Using machines to combat criminals

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Privileged accounts: the most powerful backdoor used by hackers Apr 27 2017 2:00 pm UTC 60 mins
    Grant Burst and Chad Carter
    Privileged accounts can be some of the most serious threats your company can face. As more and more processes are digitalized and activities externalized, the number of accounts accessing critical and strategic information escalates, extending the cyber threat across continents. Meanwhile, companies and individuals are becoming increasingly aware that any data or server can be accessed with the right privileges; it is therefore imperative to know who accesses critical resources, as well as when and why they do so to avoid any leak. By monitoring the users holding the keys to the kingdom - the privileged users, we are able to know what exactly happened on a system at any given time and how. Whether malicious or negligent, incidents caused by internal or external threats can be avoided quickly if visibility over the IS is restored. Session monitoring and recording dissuades malicious or negligent users while offering real-time alerts, traceability, and post-mortem analysis. Discover how some of the most dramatic cyberattacks to date could have been prevented had there been a Privileged Access Management solution in place to protect and secure target systems.
  • How to Build An Advanced Email Security Strategy Apr 27 2017 9:00 am UTC 45 mins
    Richard Davis, Dir, Cyber Security Strategy and Adenike Cosgrove, Cyber Security Strategy - EMEA, Proofpoint
    You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk.

    Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about:

    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.

    •Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox.

    • How to respond to and mitigate security risks faster and more reliably at a reduced cost.
  • Reduce time to detect and respond to cyber threats - without adding resources Apr 26 2017 9:00 am UTC 45 mins
    Chris Martin, LogRhythm Security Expert
    Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

    In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

    You’ll learn:

    • The definition and details of the TLM framework
    • How TLM enables you to sort through the noise to highlight and investigate concerning incidents
    • How TLM works to streamline processes through automated workflow
    • Specific use cases TLM can address to prevent major data breaches

    Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).
  • Is Your Organisation GDPR Ready? Recorded: Apr 25 2017 49 mins
    Steve Durbin, Managing Director, ISF LTD
    Many organisations are still unclear as to how they will meet the requirements of the EU GDPR legislation which will come into effect in May 2018. Fundamentally organisations need to start preparing for this now.

    In this webinar Steve addresses some of the key questions organisations are asking such as: does the EU GDPR regulation apply to me? how should I prepare for this legislation? and what additional resources do I need?
  • Interview: CTO of Symantec on advanced cybersecurity Recorded: Apr 24 2017 22 mins
    Darren Thomson, CTO & VP of Technology, Symantec, EMEA & Andrew Bird, EA Visionary, Interview Moderator
    Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
    ----------
    BrightTALK caught up with Darren Thomson, CTO & VP of Technology, Symantec, for an in-depth conversation on the future of cybersecurity in the context of IoT, AI and Machine Learning.

    Among topics discussed:

    - Trending business vulnerabilities in 2017
    - Particularities of pentesting
    - How to prepare for GDPR in 2018
    - Implications of IoT, AI & machine learning on cyber security
    - Yahoo breach
    - Brexit and cybersecurity
    - Recommendations to CISO's developing security strategies

    About the speaker:
    Darren is an industry recognised IT innovator and strategist, with +20 years of industry experience. He is a published author. His latest work has recently been published by Wiley Co. and is entitled, “Delivering Utility Computing: Business Driven IT Optimisation”. Details can be found at www.amazon.com.
  • Human Factor Podcast : Stuart Coulson Recorded: Apr 21 2017 54 mins
    Jenny Radcliffe
    In this episode, I am delighted to talk to Stuart Coulson.

    Stuart has been involved in the information security industry for many years and has extensive experience and expertise of working with major corporations and assisting them with relevant online protection plans and security solutions.

    His current role at the Challenge sees him working with organisations to complement their existing strategies to fill the cyber skills gap.
  • Human Factor Podcast : Dr Daniel Dresner Recorded: Apr 21 2017 44 mins
    Jenny Radcliffe
    In this episode, I am delighted to chat to Dr. Daniel Dresner. Daniel’s LinkedIn profile tells us he is a consulting research analyst and lecturer. His mission is to find the threads that bind information together and mend them when they break. He contributed material to the Cyber Essentials and worked with a colleague to define the only real benchmark of cyber security. Being a proud father and grandfather motivated him to define ‘The Green Surf Code’.
  • Human Factor Podcast : Graham Cluley Recorded: Apr 21 2017 35 mins
    Jenny Radcliffe
    In this episode, I was delighted to be joined by Graham Cluley. Graham Cluley is a security blogger, researcher and public speaker. He has been a well-known figure in the computer security industry since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows.
  • Zero-Day Attacks and What To Do About It Recorded: Apr 20 2017 35 mins
    Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
  • BrightTALK at RSA 2017: Ben Bernstein on Cyber Attack Trends for 2017 Recorded: Apr 20 2017 10 mins
    Josh Downs, BrightTALK & Ben Bernstein, CEO, Twistlock
    BrightTALK caught up with Twistlock's CEO Ben Bernstein for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - Trends in the cyber threat landscape
    - What companies can be doing to better improve their security posture
    - 2016's biggest breaches (including Yahoo) and why they happened
    - Preparations to take in advance of GDPR in May 2018
    - Cyber security in the financial sector
    - AI & Machine learning and the influence it'll have on the security industry

    About the Speaker:
    Ben Bernstein co-founded Twistlock, Inc. in 2015, and serves as its Chief Executive Officer. Ben has 14+ years of experience in enterprise security and operating systems. He is a Microsoft veteran with extensive experiences in both software development and product management. Ben is a veteran of the Israeli Intelligence Corps. He has a B.A cum laude in Computer Science from the Technion in Israel and an MBA with a scholarship of excellence from the Interdisciplinary Center in Israel. Ben hates writing about himself in third body.
  • How to respond to cyber security incidents faster, smarter, better Recorded: Apr 18 2017 57 mins
    Chris Neely, Director of Technical Sales, EMEA, IBM Resilient
    How to respond to cyber security incidents faster, smarter, better: an introduction to the Resilient Incident Response Platform

    The Resilient incident response platform (IRP) empowers cyber security teams to orchestrate their incident response processes, and respond to and resolve incidents faster, more effectively, and more intelligently. The Resilient IRP is the leading platform for orchestrating and automating incident response processes.

    This demonstration will showcase the Resilient IRP’s ability to enable complete IR orchestration and automation - aligning security teams' people, process, and technologies into a single hub for incident response.By understanding the capabilities of the solution, attendees can learn how to:

    • Achieve greater intelligence and efficiency by integrating your existing security technologies, including SIEMs, EDR, threat intelligence, and more.

    • Adapt to real-time incident conditions with Resilient Dynamic Playbooks –ensuring a fast and complete response to all incident types.

    • Build, configure, and maintain your own IR action plans within hours or days
  • DIY PKI Recorded: Apr 17 2017 56 mins
    Rae Barton, PKI expert at Gemalto
    Public Key Infrastructure (PKI) is a well-known security protocol used by some of the world’s largest governments and top enterprises, but it’s a technology that also affords many possibilities in new and growing industries. Even small to medium sized businesses can greatly benefit from PKI. However, PKI is also often mistakenly perceived as being difficult to deploy. Gemalto is addressing this common misconception. The next webinar in our PKI series, DIY PKI, will walk attendees through the entire process of setting up a PKI environment and how to manage it. We have developed a five step process to make it easy for security professionals to get their PKI system up and running with minimal time spent. The five step implementation method will give you an idea of how to set up a two tier Microsoft PKI infrastructure with Gemalto SafeNet Authentication Manager and SafeNet Luna HSM to perform smart card log on for small to medium sized enterprises.

    Attendees of the DIY PKI webinar will learn:

    -Challenges of PKI deployment
    -Overall PKI integration ecosystem
    -Common use cases deployed in enterprises: Smart card logon – What happens in the backgrounnd, email encryption/signing

    Step by step implementation steps
    oInstall and configure a Hardware Security Module (HSM)
    oInstall the root CA and configure it with the HSM
    oInstall and configure the issuing CA
    oConfigure the permissions of users and create certificate templates
    oInstall and configure an authentication manager



    For the purpose of this webinar and using Gemalto’s five step propriety approach, we will use our SafeNet line of technologies to demonstrate the implementation of the PKI solution.
  • BrightTALK at RSA 2017: Bill Diotte on Securing IoT Networks Recorded: Apr 13 2017 8 mins
    Josh Downs, Community Manager, BrightTALK & Bill Diotte, CEO, Morcana
    BrightTALK caught up with Mocana's Bill Diotte for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - The difference between securing IoT networks than tradition enterprise IT networks
    - The role of government regulation in IoT security
    - The 'mission critical' elements that need protecting in IoT networks
    - The threat actors and motives targeting IoT networks
    - The role of cyber warfare in global geo-politics

    About the Speaker:
    William (Bill) Diotte is a technology entrepreneur, CEO and Board Member with over 20 years of experience in working with tech-driven companies from startup stage to Fortune 500. Prior to joining Mocana as Chief Executive, he was the co-founder and CEO of software defined networking pioneer BroadHop Inc., acquired by Cisco. Starting off his career as a manufacturing engineer, he became an executive and managing director with both Gemini and SRI Consulting serving high tech companies in the software and telecom markets. Bill has also served as a Board Member to LiveAction, Inc., and is an investor and advisor to several companies in the software infrastructure and security space.
  • Prevent Major Data Breaches with Threat Lifecycle Management Recorded: Apr 12 2017 61 mins
    Seth Goldhammer, Senior Director of Product Management
    Throughout 2017 organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    A traditional prevention-centric strategy naively assumes all threats can be blocked at the perimeter, which leaves you blind to the threats that do get in. Many organisations are shifting to a more balanced strategy including detection and response. Enter Threat Lifecycle Management (TLM) - your playbook for rapidly detecting and responding to cyber-attacks.

    In this webcast, Seth Goldhammer, senior director of product management at LogRhythm, explains what TLM is, and demonstrates how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.
  • IoT Security Over Tea: Steeping Out the Hype Recorded: Apr 11 2017 63 mins
    Gorav Arora, CTO Office Director of Technology at Gemalto
    A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.

    We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.

    Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
    •A grounded perspective on IoT
    •Why IoT security matters for everyone
    •The persona analysis of IoT security
    •Key considerations as it begins to take off
    •How to protect what matters most to you
  • Human Factor Podcast : Sarah Clarke Recorded: Apr 11 2017 52 mins
    Jenny Radcliffe
    In this episode, I am delighted to be chatting to Sarah Clarke. Sarah is a well known privacy and security blogger (www.infospectives.co.uk) armed with over 15 years practical experience. After a business degree she tried out a few roles before finding IT. Since then she has worked across many sectors in IT Security, Information Security, Cybersecurity Governance, Risk, & Compliance and more recently Data Protection and Privacy.

    To see more information, click here - http://jennyradcliffe.com/episode-03-sarah-clarke/
  • BrightTALK at RSA 2017: John Bambenek on the State of the Cyber World in 2017 Recorded: Apr 11 2017 10 mins
    Josh Downs, Community Manager, BrightTALK & John Bambenek, Manager, Threat Systems, Fidelis Cybersecurity
    BrightTALK caught up with Fidelis Cybersecurity's John Bambenek for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The future of Cyber warfare
    - The tasks for the US political administration on an information security level
    - The Yahoo breach and who was to blame
    - GDPR and the steps that companies need to take to prepare for the legislation
    - A vision of the threatscape; new actors, motives and techniques
    - AI and machine learning and the role it has to play in the cyber security industry

    About the Speaker:
    John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
  • Human Factor Podcast : Rowenna Fielding Recorded: Apr 11 2017 55 mins
    Jenny Radcliffe
    In this episode, I’m delighted to be joined by Rowenna Fielding, who is the Information Governance Officer for the RNIB.

    Rowenna is a self-confessed privacy nerd and Information Governance Geek who began her career in information security, before broadening her
    horizons to take in the other 7 data protection principles as well.

    Having tunneled through the retail, industry and education industries then IT services for Central Government, Rowenna has now emerged into
    the sunlight of the voluntary sector and is on a mission to eradicate the word “boring” from the world of data protection, through the use of charm, pirate analogies and generous distribution of biscuits.

    To see more information, click here - http://jennyradcliffe.com/episode-11-rowenna-fielding/
  • Human Factor Podcast : Tracy Maleeff Recorded: Apr 6 2017 54 mins
    Jenny Radcliffe
    On this episode I am delighted to be joined by Tracy Maleeff, she is the owner of an independent research business, Sherpa Intelligence LLC. She was most recently the Library Resources Manager at Duane Morris LLP in Philadelphia. She earned her MLIS from the University of Pittsburgh and has undergraduate degrees from both Temple University (magna cum laude) and the Pennsylvania State University. She is a Fellow of the Special Libraries Association, received the Dow Jones Innovate Award and the Wolters Kluwer Law & Business Innovations in Law Librarianship Award. Through her new role with Sherpa Intelligence, Tracy provides research and social media consulting, with a focus on tech and information security. She contributes to the security portal Peerlyst and is active with the Women’s Society of Cyberjutsu.

    To see more information, click here - http://jennyradcliffe.com/episode-02-tracy-maleeff/
  • A Day in the Life of an Incident Investigator - Live Demo Recorded: Apr 4 2017 49 mins
    Amar Singh Cyber Management Alliance
    This webinar includes a live demo of real incident response play-books in action!

    Join Amar Singh and his special guests in this highly informative and educational webinar on:

    * How to design play-books (aka run-books) for different attack scenarios.
    * How to align your incident response to official standards.
    * Learn more about a day in the life of an investigator.
    * How to create an effective triage process that works for every type of attack.
    * Discover the various types of data enrichment attributes to apply to every incident.
Resources and information to help you further your InfoSec career
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security.

www.infosec-careers.com

- Post Security jobs
- Set up and manage your resume to get found by security employers & recruiters
- Security training & certification offers
- Security resources, including reports, white papers & toolkits.

This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after.

Key areas:

InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Using machines to combat criminals
  • Live at: Oct 13 2016 9:00 am
  • Presented by: Lloyd Webb, Sales Engineering Director, Cylance
  • From:
Your email has been sent.
or close