Hi [[ session.user.profile.firstName ]]

Protect and Manage the (Crypto) Keys to Your Castle

Jeff Kalwerisky will give us an overview of the most dangerous mistakes organizations are making when it comes to key management and how you can implement a series of best practices to mitigate these mistakes today.
Recorded Jun 25 2014 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jeff Kalwerisky, VP of Information Security & Technical Training at CPE Interactive, Inc
Presentation preview: Protect and Manage the (Crypto) Keys to Your Castle

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • CyberTECH Securing the Internet of Things Forum San Francisco - Part 1 Recorded: Apr 23 2015 83 mins
    Expert panel
    This panel of security experts will discuss the internet of things and what's keeping them up at night when they think about security in 2015. After an in-depth discussion, there will be live Q&A from the audience.

    This week's panelists include:
    Darin Andersen, Chairman and Founder, CyberTECH
    Mark Rasch, CyberLaw Editor, SecurityCurrent.com
    Grant Jordan, President, Somerset Recon
  • Will Drones Shoot Down Privacy? Recorded: Feb 24 2015 57 mins
    Jeff Kalwerisky, CTO, CPE Interactive, Inc; Stephen Wu, Of Counsel, Silicon Valley Law Group
    Drones are coming! Whether of the flying variety (quadricopters, etc.) or the driving variety (autonomous – i.e., self-driving - cars), they will soon be ubiquitous in the air and on our roads. However, there are a number of critical questions to be considered and resolved before we move into the is Brave New World. For example, are drones a threat to privacy?

    Jeff Kalwerisky, CTO of CPE Interactive and Stephen Wu, an attorney with Silicon Valley Law Group, will talk about how drones threaten privacy and more broadly the technological and legal issues arising from the manufacture, sale, and use of drones. Can companies be sued for selling or using drones? What laws bear on the use and sale of drones? This talk will cover technological and legal risk management methods companies can use to mitigate their privacy and liability risks.
  • The New Cybersecurity: Leveraging the Cloud and Big Data Recorded: Jan 14 2015 59 mins
    Jeff Kalwerisky, VP of Information Security & Technical Training at CPE Interactive, Inc
    We need a new cybersecurity model. One which will reduce the current insane complexity, handle the megavolumes of security events, and provide adequate defenses to organizations of all sizes and technical sophistication.
    Fortunately, two maturing new technologies are available to point the way. First, the Cloud already provides a cost-effective Software-as-a-Service (SaaS) model. In similar fashion, the Cloud can be leveraged for Security-as-a-Service. In this model, large and sophisticated Cloud Service Providers (CSPs) provide the security experts, toolsets, and up-to-date threat information, all on a pay-as-you-go basis. Small and mid-sized organizations gain the same benefits as large ones.
    The second technology is so-called Big Data which provides capabilities to analyze gigantic, rapidly growing datasets, such as security log files, to detect patterns, the evidence of ongoing or potential cyber-attacks; all in near real-time.
    This session will review these exciting concepts which address the current cybersecurity issues while simultaneously reducing costs and simplifying the management headaches.
  • The Rolling Data Center of the (Near) Future: Thoughts on Security and Privacy Recorded: Nov 19 2014 48 mins
    Jeff Kalwerisky, VP of Information Security & Technical Training at CPE Interactive, Inc
    The Internet of Things is affecting pretty much everything and cars are in the vanguard of this change, as various players move their offerings and services inside more vehicles. Cars already offer 4G and WiFi connectivity, work smoothly with smart watches and smart phones, and provide access to masses of data, including real-time navigation. Beyond that there is a wider world of information services and content, not to mention information to help improve car care, security, and many other functions.
    So-called V2V (Vehicle-to-Vehicle) technology is also on the way. V2V will allow all vehicles to communicate with one another, on road conditions, weather, traffic patterns, bottlenecks, etc. The goal is to improve road safety and ultimately avoid many crashes altogether by exchanging basic safety data, such as speed and position, many times per second. The technology is so promising that the National Highway Traffic Safety Administration (NHTSA) is working on a regulatory proposal to require V2V devices in new vehicles in the future.
    Self-driving or autonomous vehicles (AVs) will soon add to this flood of data. Google’s test fleet of AVs has driven over 700,000 accident-free highway and city miles – equivalent to several normal lifetimes of safe driving. Each car’s array of sensors, including cameras and lidar detectors, scan the road continuously, generating gigabits of data per second to be processed by the onboard computers.
    Quite soon, your car’s seat will be the control terminal for a data center of the highway, a true rolling data center. The obvious question is: how secure will this tsunami of rolling data be and what are the legal and privacy implications?
    This BrightTalk session will review the rolling data center concept from the viewpoint of cyber-security and data privacy and investigate the issues and likely effects on us as consumers.
  • The Internet of Things is Coming: What Can Possibly Go Wrong? Recorded: Sep 23 2014 53 mins
    Jeff Kalwerisky, VP of Information Security & Technical Training at CPE Interactive, Inc
    The buzz phrase du jour, the ‘Internet of Things’, – AKA the “Internet of Everything” – refers to a myriad of everyday devices which are being connected to the Internet, each with its own IP address. The IoT will comprise large numbers of such low-cost “smart” devices, up to 26 billion by 2020, according Gartner. They range from “smart” watches (Hi Apple!) to microwaves, and heart monitors to “smart” power grids.

    Predictably, the hype about the future benefits is in full force. And, yes, some of these benefits may actually happen. However, based on past disruptive trends, we can be certain that: (1) hackers, crackers, and attackers will not be slow to spot new opportunities for badware; (2) the IoT will generate gigantic amounts of data at very high velocity, with associated privacy concerns, and (3) boring stuff like updates and patches are going to be tough to do.

    The question, “What Can Possibly Go Wrong?”, must temper out enthusiasm for this immersive new environment so that we can avoid some of the security disasters of the past, particularly in sensitive industries, like healthcare and nationwide utility grids. This session will review the IoT from the viewpoint of cybersecurity and data privacy and develop some guidelines for the pragmatic and cautious user.
  • Authentication After Passwords Recorded: Aug 21 2014 47 mins
    Jeff Kalwerisky, VP of Information Security & Technical Training at CPE Interactive, Inc
    The venerable password or PIN has been with us a long time to authenticate online users. But its last day is rapidly approaching. Users can no longer cope with the plethora of passwords to be remembered for a myriad of Websites, Enterprise logins, VPNs, and more. Even worse, every day seems to bring yet another incident of wholesale theft of IDs and passwords from sites with less than stellar security.

    The FIDO Alliance was formed specifically to develop specifications for reducing reliance on passwords. Even more encouraging, several startups are addressing the problem of replacing passwords in innovative ways. Heather Adkins, Google's manager of information security, put it succinctly recently when she commented that “the game is over” for startups that rely on passwords as the chief method to secure users and their data. She noted that "passwords are done at Google."

    This Webinar will examine the state of the art in authentication and how we will soon have much stronger identities in the digital world. It will discuss the problems with passwords and review solutions we will likely see in the near future to replace passwords and make us more secure and less hassled by having to remember so many different electronic identities.
  • Protect and Manage the (Crypto) Keys to Your Castle Recorded: Jun 25 2014 49 mins
    Jeff Kalwerisky, VP of Information Security & Technical Training at CPE Interactive, Inc
    Jeff Kalwerisky will give us an overview of the most dangerous mistakes organizations are making when it comes to key management and how you can implement a series of best practices to mitigate these mistakes today.
  • Encrypting Our Data To Stay Off The Front Pages Recorded: Apr 29 2014 54 mins
    Jeff Kalwerisky, VP of Information Security & Technical Training at CPE Interactive, Inc
    In this presentation, Jeff Kalwerisky will give us a run-down of the latest high profile OpenSSL vulnerabilities that led to some of the most devastating data breaches on record. He will discuss how these vulnerabilities remained un-detected, how key management plays a key role in your vulnerability in the wake of an OpenSSL flaw and a look forward into how encryption and SSL will work in the wake of Heartbleed.
  • Encryption Couldn’t Protect the NSA from Snowden. What Does That Mean For My Org Recorded: Jan 22 2014 46 mins
    Jeff Kalwerisky, VP of Information Security & Technical Training at CPE Interactive, Inc.
    The National Security Agency (NSA) are acknowledged world-class experts on encryption technology. Yet, Edward Snowden, a junior consultant working for the Agency, managed to bypass all security to download and steal many gigabytes of highly classified information. This session will examine how it all went wrong for the vaunted NSA and what enterprises can learn about using encryption to protect their own sensitive information.
  • Information is Leaking Everywhere! Is Encryption the Solution? A Pragmatic View Recorded: Dec 3 2013 44 mins
    Jeff Kalwerisky; VP of Cybersecurity Training; CPEinteractive, Inc.
    Reports about leaked sensitive information are endemic lately: the State Department (Wikileaks), the NSA (Edward Snowden), government-sponsored hacking of corporate secrets, companies’ “accidentally” losing sensitive personal information; and the list goes on.
    Encryption as a technique to protect data and prevent loss, has been with the IT industry for decades. Can encryption solve or, at least, ameliorate this leakage? And, if so, why isn’t it working?
CPE Interactive
Thought leadership and best practices on SSL, encryption, cryptography, data protection, the internet of things and more!

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protect and Manage the (Crypto) Keys to Your Castle
  • Live at: Jun 25 2014 3:00 pm
  • Presented by: Jeff Kalwerisky, VP of Information Security & Technical Training at CPE Interactive, Inc
  • From:
Your email has been sent.
or close