Hi [[ session.user.profile.firstName ]]

3 Steps to Secure Content Sharing

Consumer sync and share tools help people access and send personal files, but smart IT leaders know that businesses require more than just ease-of-use. Strong security, mobile support, and deployment architecture are just a few of the many important factors to consider when evaluating vendors for a company-wide solution. Where should you start?

Join guest speakers Rob Koplowitz, VP and Principal Analyst at Forrester Research, Ted Schadler, VP and Principal Analyst at Forrester Research, and Whitney Bouck, SVP & GM of Enterprise at Box, for a complimentary webinar that will help you create a 3-step plan to select the right vendor for your business needs.

In this webinar, you'll learn:

-- The current landscape of the content sharing and collaboration market and gain insight into its future
-- Criteria that Forrester Research uses to evaluate vendors, such as mobile support, security, and deployment architecture
-- How to identify your unique requirements and create a shortlist of providers to pilot
Recorded Jan 28 2014 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rob Koplowitz (Forrester), Ted Schadler (Forrester), Whitney Bouck (Box)
Presentation preview: 3 Steps to Secure Content Sharing

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Insider Threats and Critical Infrastructure: Vulnerabilities and Protections Dec 7 2016 3:00 pm UTC 45 mins
    Lydia Kostopoulos, PhD, Principal Consultant - Cybersecurity (Human Risk), @LKCyber
    As the sophistication of encryption and technical defences rises each year, so do the attacks against the people in organizations. Hence the rise in PICNIC = Problem In Chair, Not In Computer.

    This session gives an overview of the latest insider threats facing critical infrastructures and how they can compromise air-gapped networks. It provides proactive, preventative and defensive measures to manage the risk, and concludes with a discussion of the responsibilities organizations who manage critical infrastructures have to support national security, the well-being of society and economic prosperity.
  • The 2017 Threatscape Dec 6 2016 3:00 pm UTC 45 mins
    Amar Singh
    There is only one threat that you need to fight and conquer in 2017. We can write a few lines about how threats are changing or about the dynamic threat landscape. However, let’s spare you the pain of reading the same old blurb and instead let’s do the right thing and share with you the one single, biggest threat facing every single business. It’s been around forever however in 2017 exploiting this threat is most certainly going to cause increased financial pain and reputation damage.

    Join Amar Singh, CEO of Cyber Management Alliance and founder of the Insights with Cyber Leaders series and other distinguished cyber leaders as they lay bare the severity of this threat.

    Note: 30 Minutes webinar only with 15 minutes of interactive questions from the audience at the end.
  • The 2017 Threatscape Dec 6 2016 2:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF Ltd
    The pace and scale of information security threats continues to accelerate, endangering the integrity of trusted organisations. Although cyberspace offers opportunities for leading organisations, this environment is uncertain and potentially dangerous. It is a place where hacktivists and cybercriminals are honing their skills and governments are introducing new regulation and legislation in response to major incidents and public concerns. Organisations are forced to continually adapt and rapidly respond.

    In this webinar, Steve Durbin Managing Director at the ISF, will discuss the rapidly changing threat landscape, identify the key cyber challenges for 2017 and suggest ways of managing the associated risks.
  • Security: Enabling the Digital Revolution Without Disruption Nov 23 2016 3:00 pm UTC 60 mins
    Alert Logic and Rackspace
    These days, almost every business is a digital business: modern technologies are unlocking competitive advantage, enabling efficiencies, flexible & agile – all to enhance the relationship businesses have with their new and existing customers. But yet securing that digital infrastructure, and the data that resides on it, is still a major issue. According to a recent survey of UK senior ITDMs by IDG, over a third of respondents stated that managing security was one of the biggest issues faced when implementing digital transformation.

    Cloud requires a different approach to security as traditional tools and methods are no longer sufficient to protect against vulnerability or attack.

    In this webinar you will hear Dee Chadha, EMEA Director for Rackspace Manage Security (RMS) Services and Oliver Pinson-Roxburgh, EMEA Technical Director, discuss:

    • Insight into real-life customer use-cases
    • Practical guidance on next steps for securing your digital transformation journey
    • The role security currently plays in digital transformation projects, and how it needs to change
    • Security maturity, and the different ways to approach securing workloads across multiple infrastructures

    Register for this must-attend webinar as we discuss how security can enable your digital transformation journey
  • Wrangling Unicorns – A Skills Shortage Survival Guide Nov 15 2016 3:00 pm UTC 45 mins
    Ryan Farmer - Delivery Manager at Acumin Consulting
    Join Acumin’s Delivery Manager, Ryan Farmer on a guided tour through the wilderness of the infosec recruitment landscape. The way is fraught with danger, but using his 8 years of experience in this environment, Ryan will help you to identify and navigate the pitfalls. The insights and advice in this handy guide will help you cut through the myths and overcome the challenges in keeping your own ranch full of unicorns.
  • How secure is your digital wallet? Nov 15 2016 2:00 pm UTC 60 mins
    Kristian Sørensen (Norfico), Shachar Bialick (Curve)
    Digital wallets are just one of the many technologies that have emerged from the changing culture of commerce. Though digital wallets have many benefits such as analytics for budget control and the ease of merging many accounts, it also comes with some security concerns.

    Join this panel where we will discuss:

    -Security and liability when introducing new abstraction layers into the payments systems
    -Applications for tokenisation
    -Using proprietary dataset covering KYC, transactional and behavioural data, as well as machine learning across multiple cards to combat fraud
    -Use cases from testing fraud prevention technologies directly with customers
  • GDPR Panel: What May 2018 Means to Your Business Nov 10 2016 2:00 pm UTC 60 mins
    Peter Wood, First Base Technologies; Florian Malecki, Dell; Jonathan Armstrong, Cordery & Kristian Norsgaard Rieper-Holm
    A global survey on the European Union’s new General Data Protection Regulation (GDPR) commissioned by SonicWALL in September 2016, reveals that surveyed organizations ‒ both SMBs and large enterprises ‒ lack general awareness of the requirements of the new regulation, how to prepare for it, and the final impact of non-compliance on data security and business outcomes.

    Don’t wait until it is too late: join Kristian Norsgaard Rieper-Holm from Globalsequr, Florian Malecki from SonicWALL, Jonathan Armstrong from Cordery and moderated by First Base Technologies’ Peter Wood as they shed some light on the ins and outs of the new GDPR requirements and how to increase your overall data security posture to minimise the cyber risks and potential financial fines.
  • Your Data's Been Breached - What Do You Do Now?! Nov 9 2016 6:00 pm UTC 45 mins
    Heather Wilde, CTO, ROCeteer
    If your company collects data of any kind, it's guaranteed that there is someone out there who will find it valuable enough to attempt to hack. Learn what to do when this happens from someone who has direct experience with breach recovery and cleanup.

    This is an interactive panel complete with war stories from the front lines.

    Attendees will walk away with lessons learned and best practices.
  • Learn how to prevent the worst from happening when it comes to key loss Nov 9 2016 4:00 pm UTC 45 mins
    Leon Brown, Product Marketing
    In your eco-systems with apps across numerous platforms, and where you possibly are fielding millions of IoT devices, preventing mistrust, and avoiding damaging malware targeting your customers is priority one. We will talk about challenges of remediation when things go wrong, and suggest some solutions to the complexities of managing code-signing and keys at scale.
  • Proactive Monitoring: Real life experience Nov 9 2016 3:00 pm UTC 45 mins
    Michael Biederer, VP Operations, Signalhorn
    Michael Biederer, Signalhorn’s VP Operations, explains the proactive monitoring approach of Signalhorn. Signalhorn’s Secure-NOC has been operating with the proactive approach for many years. Michael will go into detail about the setup, daily operations, and how Signalhorn customers benefit from this operational approach.

    Key takeaways:
    - How to setup and run secure monitoring operations
    - Specific setup for high availability networks and satellite networks
    - How to convert your NOC into an asset and feature for your customers
    - How to increase customer satisfaction by proactive monitoring
    - How to reduce reaction time and minimize the impact on your customer
  • Data Protection: Going Beyond Encryption and Residency Nov 9 2016 2:00 pm UTC 45 mins
    Josh Goldfarb, VP, CTO - Emerging Technologies, FireEye & Roger Francis, Senior Consultant - Mandiant a FireEye Company
    When the majority of people think about data protection, they often focus on encryption. Whether the data is at rest, or in transit, the assumption is that cryptographic protocols alone will thwart any attackers attempts to gain access to sensitive data. Whilst there is no doubt that encryption is a core component of an effective data protection strategy, advanced attackers have come up with some creative techniques for circumventing controls.

    Join FireEye/Mandiant in this webinar to run through some real-world case studies, and discuss data exfiltration techniques.
  • Data Protection & Incident Response Nov 9 2016 2:00 pm UTC 60 mins
    Amar Singh
    Have your say and share your experience and expertise in this highly interactive incident response workshop, titled Cyber Incident Planning & Response or CIPR. The CIPR workshop will deconstruct the prevailing approach to planning, incident response and the wider field of incident management and identify where and how you can improve and build a more resilient business. This is your chance to get involved and learn from your peers and contribute your own thoughts and opinions in this highly interactive workshop.

    Note: This is not your typical webinar where one, two or three sparks stand on the podium and proclaim their mastery. Rather, Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
  • Don’t allow security & data regulations to slow business transformation Nov 9 2016 11:00 am UTC 45 mins
    Sunil Choudrie, Global Solutions Marketing Mngr - Symantec & Ravi Pather, VP EMEA, Cloud Data Protection Solutions - Bluecoat
    The adoption of SaaS is accelerating faster than expected. However, as this SaaS adoption accelerates, enterprises are discovering various legal and regulatory data compliance responsibilities that maybe challenging to address in a seamless manner or potentially slow down the adoption of SaaS applications and potentially innovation.


    • How enterprises can leverage the full value of SaaS applications such but fully meet complex data compliance needs without impacting the usability of the SaaS application. Learn how sensitive data can be protected yet leverage the full benefits of the SaaS application without breaking SaaS application functionality such as searching, sorting and reporting of sensitive data.

    • The different methods of data obfuscation such as 'data tokenization' and 'data encryption' and understand the specifics when meeting and demonstrating data compliance in a SaaS environment.

    • If SaaS vendor application encryption can be relied upon to address your enterprises data compliance requirements when the sensitive data is encrypted just at rest. What are the data compliance implications of key management and who controls the encryption keys?
  • Nivdort: A long lasting threat with a big bag of tricks Nov 8 2016 4:00 pm UTC 45 mins
    Tiago Pereira – Threat Intel Researcher, at AnubisNetworks
    Nivdort is a malware family that has been around for several years. Over these years it has been subject to several improvements and, as a result, today it is a very interesting piece of malware with an uncommonly large number of features that has steadily kept a few botnets running with a high number of infections.

    Join us on this webinar to learn more about the Nivdort family and some of its extensive list of tricks (e.g. DGA, P2P, information stealing, email spam, instant messaging spam, bitcoin mining), and about its worldwide infection distribution.
  • Withstanding a Ransomware Attack: A Step-by-Step Guide Nov 8 2016 2:00 pm UTC 45 mins
    Russel McDermott, Netwrix
    Ransomware has spread epidemically in 2016. Analysts, IT pros and corporate staff list it among the top IT security threats. According to a report prepared by the Cyber Threat Alliance (CTA), CryptoWall, version 3.0, alone has already cost its victims $325 million. Malicious software R&D is funded profusely through sources ranging from the proceeds of criminal activity to money raised through crowdfunding services. Under crowdfunding, those who pay the developer receive a copy and can try using it.

    Join our new webinar “Withstanding a ransomware attack: A step-by-step guide” and learn:

    -What you should do to ensure your data’s availability,
    -How to train your colleagues to avoid being caught on the hook of ransomware,
    -How to moderate the aftermath of a ransomware attack,
    -And more!
  • Shark Attacks and Car Crashes: Interrogating Fear and Risk in Data Protection Nov 8 2016 1:00 pm UTC 45 mins
    Tim Sadler, Co-founder & CEO, CheckRecipient
    Contrary to the fear around malicious insiders and external hackers, the Information Commissioner's Office recently reported that the most common data security incidents reported to them are all due to inadvertent human error (incidents like misaddressed emails and laptops being left on trains). In the face of game-changing regulatory changes like GDPR, it's crucial that information security and data protection professionals prioritise addressing the most prevalent risks first, not the ones that appear the scariest.
  • One Firewall to Rule them All! Nov 8 2016 10:00 am UTC 45 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    The firewall wars have caused nothing but confusion in the market. Lines have been drawn between UTM and NGFW; are they different or are they the same thing? Unfortunately that confusion has led to introducing complexity and vulnerability in enterprise networks. There is a better way. Rather than fighting through a sea of acronyms, focus on what’s really important - How can I simplify my security infrastructure and improve my ability to fight off advanced attacks, no matter where they occur in the network?

    This session will present a new way of thinking about firewalls, one without the confusion, acronyms and complexity.
  • Vawtrak v2: The next big banking Trojan Nov 3 2016 3:00 pm UTC 60 mins
    Victor Acin, Malware Analyst, Blueliv Threat Intelligence Research Labs
    Vawtrak is a serious threat to the banking eco-system and is predicted to be the next major banking Trojan.

    Blueliv’s Threat Intelligence Research Labs team has published new research based on in-depth analysis of Vawtrak, including the results from tracking the cybercriminal group infrastructure and a technical investigation which analyzes the evolution of the botnet.

    The CrimeServer infrastructure behind the Vawtrak banking Trojan thrives on basic sharing of information to maintain a highly resilient criminal network. So, sharing is a large part of the problem. But it is also part of the solution.

    We believe sharing intelligence strengthens our defences against the ever-evolving cyber threats of today.

    Join us as we explore the distribution and execution of the Vawtrak banking Trojan, how attackers are collecting stolen data and the relevance of cyber threat intelligence to the finance sector in the context of Vawtrak.

    This webinar includes detailed technical analysis of cybercriminal network infrastructures and an in depth look at how the malware is executed. The research is of special interest to malware researchers and threat intel analysts. The webinar is aimed at listeners with a degree of technical understanding about malware and banking Trojans.
  • Turbocharge your cyber investigations, Part 2 Nov 3 2016 2:00 pm UTC 45 mins
    Jeff Lenton, Solutions Architect, RiskIQ
    While their cyber tactics may be continuously changing, bad actors can’t avoid interacting with core components of the internet. These interactions leave a trail that when connected through rigorous threat infrastructure analysis, can reveal the full scale of an attack and provide the information needed to determine the best response. The key to this analysis is access to a variety of global datasets and the ability to correlate and pivot between them in your investigation.

    In this two part series we will look at a range of global datasets and how each can be used to shed additional light on your adversary’s infrastructure. This session will focus on SSL Certs, Host Pairs and Trackers. We will also demonstrate how security analysts can use the free community version of RiskIQ’s PassiveTotal to gain access to and pivot across these global datasets.
  • Activated Charcoal: Making sense of endpoint data Recorded: Oct 26 2016 64 mins
    Greg Foss, Head of Global Security Operations, LogRhythm and Sarah Miller Threat Intelligence Analyst, Carbon Black
    Security operations is all about understanding and acting upon of large amounts of data. When you can pull data from multiple sources, condense it down and correlate across systems, you are able to highlight trends, find flaws and resolve issues.

    This webcast will cover the importance of monitoring endpoints and how to leverage endpoint data to detect, respond and neutralize advanced threats.

    You’ll discover:

    - Why endpoints are the new perimeter
    - How employees can strengthen your security operations strategy
    - Techniques to test and validate security awareness program
    - How to take the data that Carbon Black collects, correlate it against thousands of endpoints, and dynamically neutralize threats using the LogRhythm security intelligence and analytics platform

    Register now to learn how LogRhythm and Carbon Black can help you strengthen your overall security operations strategy—all within a single interface.
Resources and information to help you further your InfoSec career
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security.


- Post Security jobs
- Set up and manage your resume to get found by security employers & recruiters
- Security training & certification offers
- Security resources, including reports, white papers & toolkits.

This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after.

Key areas:

InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 3 Steps to Secure Content Sharing
  • Live at: Jan 28 2014 4:00 pm
  • Presented by: Rob Koplowitz (Forrester), Ted Schadler (Forrester), Whitney Bouck (Box)
  • From:
Your email has been sent.
or close