Hi [[ session.user.profile.firstName ]]

The Future of Cybersecurity Has Arrived – and the Bad Guys are in the Lead

The future of cybersecurity has already begun and the bad guys are in the lead. Automation is the first step to a future where attacks are not sporadic but constant. We’re exiting the musket era of cyberthreats and entering the semi-automatic age. The future will be constant carpet bombing. The only way good guys will keep up is by automating themselves and getting AI involved. The far future of cyberwar will be AIs fighting AIs, and humans will only be brought in when the AI needs help to make choices. Bad guys will get alerts when their AI manages to crack into that juicy target the AI was set after. Good guys will get alerted when the bad guy seems to have slipped through and been detected and choices about what assets to lose need to be made. The AIs will be more than the foot soldiers. Humans will be in the commander in chief role, but in the future just about every other role will be some form of AI which can do the millions of calculations per second to counter the constant bombardment with maximum automated efficiency.
Recorded Oct 4 2016 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jonathan Sander, VP of Product Strategy, Lieberman Software
Presentation preview: The Future of Cybersecurity Has Arrived – and the Bad Guys are in the Lead

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Protecting Against Insider Threat in 2020 Recorded: Jun 10 2020 61 mins
    Shareth Ben, Securonix & Joseph Blankenship, Forrester
    In the past few years, Insider Threat has evolved in several aspects from how sensitive data leaves the organization to ways in which privilege access gets misused, creating risks for organizations to mitigate. The proliferation of cloud applications had made tracking and protecting sensitive data extremely challenging. Add to this the current remote work setup in the midst of COVID-19, and one can imagine how hard it is to track, monitor, and protect your crown jewels.

    Insider threats can originate from malicious insiders or insiders that are simply negligent and do not follow best practices. Insider threats can also originate from compromised accounts that are controlled by an outsider. Given all the scenarios, monitoring solutions are forced to curate use cases in conjunction with purpose-built detection techniques in order to derive specific outcomes to be effective in detecting infractions.

    This shift in behavior is becoming more evident as organizations ramp up visibility into how its employees and contractors use their assets and resources over time. Join Shareth Ben (Executive Director, Insider Threat &Cyber Threat Analytics, Securonix) and featured speaker Joseph Blankenship (Vice President, Research Director, Security & Risk, Forrester) to gain some insights into:

    • How Insider Threat has evolved over time and the new challenges it presents.
    • What are some of the most common Insider Threat behaviors observed in the field?
    • Which detection techniques are effective in detecting nefarious behaviors within the organization?
    • Walkthrough of the key trends and observations from the Securonix 2020 Insider Threat Report.
  • Why managing your mobile endpoints is not securing your mobile endpoints Recorded: Jun 10 2020 50 mins
    Chris Hazelton, Director of Security Solutions at Lookout
    With employees accessing sensitive business data from mobile devices, many organizations deploy mobile device management (MDM) believing this protects them from cybersecurity threats. Your mobile employees are now prime targets for phishing, application, and other threats that management tools cannot protect against. Learn how to protect your users, your corporate data, and your organization from the latest cybersecurity threats.

    Attend this webinar to learn about:
    -The strengths and weaknesses of mobile device management (MDM).
    -What threats mobile management tools are blind to.
    -How to apply dynamic security protections for all mobile users of cloud data.
  • Cutting through the noise: smart communication for smart FIs. Recorded: Jun 3 2020 27 mins
    Simon Rodway, VP Solutions at Entersekt
    Reaching out with important messages, in a world where message communication is regarded with scepticism.
  • Industrial Cybersecurity - Managing Your Business Risk Recorded: Jun 2 2020 33 mins
    Nigel Stanley, CTO - TUV; Anthony Dickinson, Chief Revenue Office - 2MC; Dev O’Nion, EMEA Commercial Director - 2MC
    Today, operational technology (OT) and industrial systems are an important element of modern life. From product manufacturing through to oil, gas and transport networks computer-controlled processes and operations reduce costs and improve productivity.

    Managing these assets to ensure better availability and output is a tough challenge, and balancing this with changing business requirements, governance, risk and compliance (GRC) issues makes it even harder.

    Unfortunately, these systems are now facing another challenge – the increasing threat from hackers, hacktivists and nation-states. Safety critical controls are also being targeted, and if these are compromised serious damage and injuries could be the end result.

    Although there is an ever-growing threat of cybersecurity events and incidents impacting OT systems many organisations have not yet run a comprehensive risk assessment for these systems. In fact, in a survey conducted by TUV Rheinland in 2019, 74% of respondents had either never conducted a cybersecurity risk review of their OT systems or were unaware if such a risk review had been completed.

    During this panel-based webinar, experts from TUV Rheinland and 2MC will discuss in detail:

    - How the role of GRC has a significant part to play in many OT deployments

    - By coupling real-time monitoring with a risk-based mindset, underpinned by a governance, risk and compliance approach, an operator of OT equipment can embrace cybersecurity challenges

    - How crucial risk assessments need not be overly time consuming or complex

    - How production assets can be safely utilised in response to ever-changing business demands
  • Vulnerability Management Explained: the Stats You Need to Beat Cybercriminals Recorded: May 21 2020 40 mins
    Eoin Keary, CEO and founder, Edgescan; Rahim Jina, COO, Edgescan
    Eoin Keary CEO and founder of Edgescan, and Rahim Jina, COO, will explain how to nail down the fundamentals of vulnerability management in the age of digital transformation. As organisations' attack surface is wider than it has ever been, the Edgescan team will present clear and actionable data to inform a cybersecurity strategy that keeps pace with change.

    Chaired by Yvonne Eskenzi. the webinar will also provide an overview of the most common vulnerabilities detected by Edgescan's team over the course of last year, and will highlight the problems with how we currently think about patch management and vulnerability scanning.
  • The good, the bad and the ugly: The limitations of CVSS Recorded: May 5 2020 46 mins
    Simon Roe, Product Manager, Application Security at Outpost24
    Hosted by Simon Roe, Product Manager, Application Security at Outpost24, this webinar will delve into the limitations of CVSS, the go-to risk score for vulnerability management, to prevent security teams from drowning in network vulnerabilities. By examining risk-based prioritization in detail including data and analysis, Simon will inform listeners on how to determine the risk of a vulnerability to help prioritize and make better-informed decisions for remediation. He will then conclude with the benefits of an efficient predictive risk-based approach which can make patching vulnerabilities more manageable and streamlining remediation through automation and orchestration.
  • Shooting Phish in a Barrel Recorded: Apr 24 2020 44 mins
    Javvad Malik, Security Awareness Advocate at KnowBe4
    A frank discussion about the risks of phishing, aggravated by the rise in remote working.

    Hosted by Javvad Malik, Security Awareness Advocate at KnowBe4, this webinar will be examining the cybersecurity challenges of remote working. Specifically, drawing upon the KnowBe4 Benchmarking Report as well as the Q1 Phishing Report, Javvad will run listeners through an in-depth analysis of UK phishing trends. He will then end with his top tips on keeping cyber safe when working from home.
  • Operationalize a Global Identity Data Governance Policy Recorded: Oct 10 2018 65 mins
    Martijn Loderus, VP, Solutions Engineering & Services, JAnrain
    Multinational brands must adhere to different data governance standards and regulations of the regions and countries they do business in. For brands that operate multiple websites, applications and other properties, having siloed data warehouses with disparate policies creates inefficiencies, poor user experiences and legal vulnerabilities.

    To tackle these challenges, leading brands are investing in a global data governance policy that centralizes customer identity data, universally manages personally identifiable information (PII) across applications, and creates a self-service workflow for data subjects to manage their communication preferences and data.

    Watch this webinar featuring Janrain VP of Solutions Engineering & Services, Martijn Loderus, who has supported leading brands in implementing global data governance policies with customer identity and access management (CIAM) at the core. He recently helped prepare clients for the Global Data Protection Regulation (GDPR) and will share case studies from those experiences

    What you’ll learn:
    The cross functional business impact of identity data governance in today’s landscape
    Best practices to retain seamless customer experiences while ensuring compliance
    How CIAM works in regards to policy management
    The short- and long-term benefits of a global identity data governance policy
    Who should attend?
    Business leaders from information security, IT, legal and marketing teams
  • Operationalize a Global Identity Data Governance Policy Recorded: Oct 9 2018 65 mins
    Martijn Loderus, VP, Solutions Engineering & Services, JAnrain
    Multinational brands must adhere to different data governance standards and regulations of the regions and countries they do business in. For brands that operate multiple websites, applications and other properties, having siloed data warehouses with disparate policies creates inefficiencies, poor user experiences and legal vulnerabilities.

    To tackle these challenges, leading brands are investing in a global data governance policy that centralizes customer identity data, universally manages personally identifiable information (PII) across applications, and creates a self-service workflow for data subjects to manage their communication preferences and data.

    Watch this webinar featuring Janrain VP of Solutions Engineering & Services, Martijn Loderus, who has supported leading brands in implementing global data governance policies with customer identity and access management (CIAM) at the core. He recently helped prepare clients for the Global Data Protection Regulation (GDPR) and will share case studies from those experiences

    What you’ll learn:
    The cross functional business impact of identity data governance in today’s landscape
    Best practices to retain seamless customer experiences while ensuring compliance
    How CIAM works in regards to policy management
    The short- and long-term benefits of a global identity data governance policy
    Who should attend?
    Business leaders from information security, IT, legal and marketing teams
  • Neuro Diversity in the Cyber Security Industry Recorded: Oct 6 2017 59 mins
    Brian Higgins, Business Development Manager at (ISC)²
    In this session, we’ll look at some of the characteristics that make a cyber-security personality – they don’t always need to follow convention. Brian Higgins from ISC2 will chair the event as we hear from the National Autistic Society, Thomas who is visually impaired and getting his start up off the ground and Tania a computing teacher for neuro diverse young people.

    Speakers include: Brian Higgins, Business Development Manager at (ISC)²; Cath Legget, National Autistic Society; Thomas Seidling, relationship manager at Cyber Smart and Tania Brooks, computing teacher.
  • Creative Employment in Cyber Security Recorded: Oct 5 2017 67 mins
    Neil Stinchcombe, co-Founder, Security Serious
    session will look at how employers are going about recruiting people creatively and what they’re doing to find the right talent and what incentives they’re putting in place to retain and grow their current staff.

    Speakers include: Shan Lee, Information Security Officer at TransferWise, Vicki Gavin, Head of Business Continuity and Information Security at the Economist Group; Ryan Farmer, Delivery Manager, Acumin Consulting; Emily Swiatek, National Autistic Society and James Hadley, Founder/CEO of Immersive Labs.
  • Ransomware: How to strategically Fight it, Without Breaking the Bank Recorded: Oct 4 2017 64 mins
    John Cloonan, head of products at Lastline
    Ransomware presents some unique challenges to organizations, regardless of the size, industry or geography. However, it has very distinct behavior relative to other kinds of malware. It actually tells you that an attack has taken place. From a defender's point of view, being alerted to an attack is far better than having it stay undetected in your systems. During this presentation, John Cloonan, head of products at Lastline, will review:

    - Common elements of today's malware strains
    - Effective strategies for combatting ransomware
    - What malware defenders can learn from ransomware
  • Artificial Intelligence - how could it potentially help bridge the Cyber-skills Recorded: Oct 4 2017 76 mins
    Pete Warren, Chairman at Cyber Security Research Institute
    How could AI potentially save the cyber-security industry – Peter Warren, journalist and thought leader on AI, will chair this session on how AI should be in the interest and control of the people for the people – and how it will impact on businesses from a legal perspective.

    Speakers include: Pete Warren, Chairman at Cyber Security Research Institute and Andrew Jones, Professor of Cyber Security at University of Hertfordshire.
  • Incentives to make the UK a hub for cyber-security companies Recorded: Oct 3 2017 61 mins
    Sarb Sembhi, CTO, CISO & DPO, Virtually Informed
    This session will look at what is available to make the UK an attractive place to start-up and grow a successful cyber-security company. It will look at regional development grants for areas such as Wales, Bristol and Ireland as well as grants, accelerator programmes and other incentives available.Speakers include: Shane Wickramasuriya, Operations Manager, CyLon; David Howorth, Head of EMEA, AlertLogic; Andrew Mulvenna, founder of Brightpearl and Mike Spain, Operations Director, Cyber Growth Partnership.
  • The Cyber Skills Gap – The Challenge – Setting the Scene Recorded: Oct 2 2017 70 mins
    Warwick Ashford, Security Editor at Computer Weekly
    This first session will be based around the Global Workforce Study which shows the real numbers that expose the challenges facing UK companies in the wake of a global cyber-security shortfall. How can the UK become a haven for cyber-security and compete against the rest of the world for the best talent? What are the answers to building a viable, strong and competent cyber-security team? Is there enough being done to home-grow our own cyber-security workforce or will we need to talent from overseas and is that even possible with the challenges Brexit will bring?

    Speakers include: Adrian Davis Managing Director, EMEA at (ISC)²; Ian Glover, President at CREST; Quentyn Taylor, Director of Information Security at Canon for Europe, Warwick Ashford, Security Editor at Computer Weekly.
  • Why the Web Remains a Primary Ransomware Vector Recorded: Oct 13 2016 39 mins
    Greg Maudsley, Senior Director, Product Marketing at Menlo Security
    Ransomware attacks are globally pervasive, and only getting worse for retailers, hospitals and a number of other businesses. The number of strains of Ransomware is infinite, with more and more advanced versions coming to light every day, but the vectors through which attacks occur remain the same. 90% of malware is delivered via web and email, with dynamic web content dramatically increasing the risk to users. Of the top 50 most visited US sites in 2016, 42% were found to be running vulnerable versions of web-software code. Traditional approaches to cyber security are failing – distinguishing the good from the bad is no longer a reliable option and has a very costly impact on enterprises. One approach that has been developed to tackle the constantly evolving threat landscape is Isolation, which assumes that all active content poses a risk.

    Greg Maudsley, Senior Director, Product Marketing at Menlo Security will highlight the steps that must be taken to raise awareness of the reality of the Ransomware threat, and discuss the best ways in which to tackle this.
  • Using machines to combat criminals Recorded: Oct 13 2016 39 mins
    Lloyd Webb, Sales Engineering Director, Cylance
    2016 is turning out to be a landmark year in terms of Ransomware and there’s no sign of these threats slowing down any time soon. Ransomware is not new, it is just getting more sophisticated and is inflicting major damage to companies, organisations and individuals, shaping up to be a frighteningly lucrative year for cybercriminals, where any person with a computer can be exploited and used as a revenue source with the potential for vast profits.

    Learn how Cylance have revolutionized the industry by utilizing data science and security experts to provide a next-generation cybersecurity technology that proactively prevents, rather than detects the execution of advanced persistent threats and malware in real time before they ever cause harm.
  • Well, Your CMS Just Got Hacked! Recorded: Oct 7 2016 39 mins
    Bryan Soltis, Technical Evangelist at Kentico Software
    Many enterprise applications run on a CMS platform to enable administrators and editors to build and update content quickly. While many of these systems have great built-in security features, there's a lot that can go wrong when a site is left vulnerable to attackers. In this webinar, Kentico Technical Evangelist Bryan Soltis will discuss many of the areas of your CMS that, when left unchecked, can expose your site to hackers, and what to do if you've already been hacked.
  • 7 Things You Didn't Know About GDPR But Were Afraid To Ask Recorded: Oct 7 2016 43 mins
    Shadi Razak, CTO of CyNation
    The EU General Data Protection Regulation (GDPR) is the biggest change to data protection law in the world since the late 90’s. Every aspect of the old law has been overhauled and modernised. Businesses trading with the EU or handling EU citizens private data will need to comply with the GDPR come 25th May 2018. This mean almost all British organisations will have to adapt to the EU GDPR despite the latest Brexit vote. Accordingly, companies will be fully accountable for implementing a comprehensive data governance policy and appropriate security mechanisms. Non-compliance can result in fines of up to €20 million or 4% of a company's global annual turnover, whichever is greater.

    The adaption process to the EU GDPR won’t be simple and easy one. It will take time and energy from businesses, especially SMBs. During this webinar we give the chance to understand the biggest changes to the current law, and learn the essential steps business need to get in place to be ready come May 2018. With the webinar's open and live format, you will have ample opportunity to engage in Q&A with our data privacy and security experts.
  • Creating an environment for “Continuous Compliance” within Open Source Software Recorded: Oct 7 2016 47 mins
    Martin Callinan
    Open Source Software is now broadly used in the development of software applications. The ability to reuse components of code already created allows development teams to create more code, with more functionality, faster. It also promotes the adoption of standards and makes applications more interoperable.
    Although Open Source Software components typically require no licensing fee, it does come at a cost. This cost is uncertainty – or perceived uncertainty in many cases. Most software developers will be meticulous about what components they use from the perspective of functionality as they want to build code that works.

    However those Open Source Software components could have inherent business risks associated with them such as Legal/IP compliance, security vulnerabilities and operational risk. IP Investors, cyber insurance companies and business management are becoming aware of the need for demonstrable controls to be in place to mitigate these risks.

    This talk will discuss strategies organisations continuous compliance culture which will manage the risks without impacting technical innovation. These strategies can be leveraged by both organisations implementing open source based solutions or by technical organisations are creating open source based solutions
Regular webcasts for IT security professionals
Our channel is aimed to give you the full picture. We will educate you on current topics of interest with the Editor of IT Security Guru hosting the webcasts, Dan Raywood. Guest speakers will join in on the debates with their own expert view and no intention of keeping it to themselves. Our aim is to give you all the information you need, for you to be able to come to your own conclusion.

http://itsecurityguru.org/

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Future of Cybersecurity Has Arrived – and the Bad Guys are in the Lead
  • Live at: Oct 4 2016 2:00 pm
  • Presented by: Jonathan Sander, VP of Product Strategy, Lieberman Software
  • From:
Your email has been sent.
or close