Hi [[ session.user.profile.firstName ]]

Briefings Part 2: Who's accessing your critical data, and what are they doing?

Beyond Traditional Defences

Recent security breaches by trusted insiders have propelled Identity and Access Management (IAM) to the top security priority of many organisations.. After all, it’s clear security is only as strong as its weakest link – people – and the press is full of articles documenting the damage people can do. So it’s natural for security managers to want to shore up their IAM infrastructure to avoid similar embarrassment.

Some are finding it difficult to understand who has access to their critical data and whether they are using it appropriately. Understanding the full extended environment and by taking associated risks into account is the way to avoid being in the headlines. In other words, whether you are starting from scratch or taking on new IAM challenges such as cloud and mobile, there are certain principles you should follow to build a successful, effective IAM solution.

Join Neil Warburton, Security Architect at IBM and learn about the key principles that will help you implement a successful IAM solution. The session will be moderated by John Colley, Managing Director at (ISC)2 EMEA.
Recorded Sep 11 2014 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Neil Warburton, Security Architect, IBM Security Systems
Presentation preview: Briefings Part 2: Who's accessing your critical data, and what are they doing?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Crypto Crime: Hunting for Cryptocurrency Mining in Your Enterprise May 29 2018 1:00 pm UTC 60 mins
    Adrian Davis, (ISC)² EMEA, Tom Kellermann, Chief Security Officer, Rick McElroy, Security Strategist, Carbon Black
    2018 is shaping up to be an important year for not just Bitcoin, but the many new cryptocurrencies that seem to be popping up by the day. Attackers have discovered that mining cryptocurrency can prove to be a very profitable endeavor if they can leverage someone else's computing resources.
    To ensure that organisations have full visibility into all activity in their environments, Tom Kellermann – Chief Security Officer and Rick McElroy – Security Strategist from Carbon Black will walk you through the key pointers you need to know about how to hunt for malicious mining malware in your enterprise and ensure your critical business resources aren't generating profit for the adversary on your dime.
    In this webinar you will hear all you need to know for a Cryptocurrency Mining 101, as well as learning about:
    •Monero - What is it, and why use it?
    •Indicators of cryptominers
    •Using Carbon Cb Response to hunt for miners
  • Security as a Service: Bringing Security Into the DevOps Age May 15 2018 11:00 am UTC 60 mins
    Adrian Davis, Director of Cybersecurity Advocacy for EMEA, (ISC)², Josh Kirkwood, DevOps Security Lead, CyberArk
    DevSecOps seems to be the magic word, but for many people it may lack definition and clarity. During this presentation, Josh Kirkwood from the CyberArk DevOps team explains how normal security folk can become part of this revolution and start seeing how they can contribute to the velocity.
  • The Secrets to an Effective Insider Threat Program May 8 2018 11:00 am UTC 60 mins
    Adrian Davis, Director of Advocacy for EMEA, (ISC)², Mayank Choudhary, Vice President, Observe IT
    With three million records stolen every day, insider threats are quickly becoming the greatest cybersecurity threat organisations face today. Unfortunately, the most trusted people - contractors, vendors, privileged users and business users - often create the most risk. Whether insider threats are unintentional or malicious, the secret to quickly identifying and eliminating them starts with a people-centric approach. Attend this webinar to learn best practices for building and maintaining an effective insider threat program.

    You will learn:
    - Why insider threats are prevalent, despite many organizations implementing a layered defense approach
    - How to stop insider threats in their tracks, through comprehensive visibility, real time intelligence and policy enforcement
    - Why you need to focus on people, process and technology, in that order
  • CISO Says: Interview with David Fox, Head of Security at BAE Systems Apr 30 2018 11:00 am UTC 60 mins
    Adrian Davis, Director of Cybersecurity Advocacy for EMEA, (ISC)², David Fox, Head of Security, BAE
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Recorded: Apr 16 2018 58 mins
    Nathaniel Ford, Moderator (ISC)² EMEA, Membership Services Team, (ISC)² EMEA
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Why I Am Ignoring GDPR and Focusing on Protecting My Data by Design Recorded: Apr 3 2018 61 mins
    Adrian Davis, Director of Cybersecurity Advocacy for EMEA, (ISC)², Matt Middleton-Leal, EMEA General Manager, Netwrix
    Why is it better to implement data protection by design than just meet the regulatory requirements of GDPR? The answer is simple: if you build privacy and security directly into your technology, design and operations, you will create a secure foundation for the future, improving your security posture and reducing costs going forward. This concept is not new, however we continually see organisations taking the reactive approach, and then being surprised when they are compromised.
    In our webinar General Manager EMEA at Netwrix, CISSP Matt Middleton-Leal will discuss, how to create and implement data protection by design strategy:

    What are the 7 Foundational Principles of privacy by design?
    How can privacy assurance become an organization’s default mode of operation?
    What is the risk-based approach for implementation of data protection by design?
  • Part 2: Is DNS a Part of Your Cyber Strategy? Recorded: Mar 29 2018 61 mins
    Adrian Davis, (ISC)² EMEA, Peter Goodwin, Infoblox, Mo Cashman, McAfee
    Today, 91% of malware uses DNS to carry out campaigns once it has breached the perimeter. In a recent SC Magazine survey, 46% of survey respondents said they experienced DNS-based data exfiltration. DNS traffic is not investigated or filtered by firewalls and thus is a gap that is commonly exploited by malicious actors.

    Solving these challenges requires:
    •Visibility into DNS traffic
    •Plugging the DNS security gap with a multipronged approach to threat detection
    •Integration between DNS Security and other security tools that are part of the ecosystem

    As part of the continued DNS Security webinar series, please join (ISC)², Infoblox and McAfee for this interactive discussion and learn more on why DNS should be part of your cyber strategy.

    For part 1 in this series: paste the following URL into your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars/Focused-Webinars?commid=293803&part2
  • CISO Says: Interview with Mike Loginov, Public Sector Cyber Security Strategist Recorded: Mar 26 2018 62 mins
    Adrian Davis, Director of Cybersecurity Advocacy for EMEA, (ISC)² EMEA, Mike Loginov, Cyber Security Strategist
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
  • As Attackers Evolve, So Must Machines:Advancing Machine Learning Beyond the Hype Recorded: Mar 20 2018 55 mins
    Adrian Davis, Director of Cybersecurity Advocacy, (ISC)² EMEA, Jon Ross, Director of Engineering, Carbon Black
    The demand for machine learning (ML) in security is growing fast. There are countless approaches, but there’s also a lot of hype. This webinar provides a frank assessment of the strengths and weaknesses of static analysis, decompilation, detonation, in-context analysis, artificial intelligence and other emerging approaches, all grounded in real-world examples and specific algorithmic details.
  • GDPR Compliance - Don’t Let Your SIEM Be Your Downfall Recorded: Mar 13 2018 61 mins
    Adrian Davis, Director of Cybersecurity Advocacy for EMEA, (ISC)², Matthias Maier, Product Director, Splunk
    Whatever SIEM solution you operate, it is highly likely that personal information is captured in the log data such as phone numbers, email addresses, cookies, RFID’s, geolocation and more. If it can identify an individual in combination with other data, you must ensure that you’re not in breach of the GDPR. To help give guidance on this, we have conducted detailed analysis on how you should treat your SIEM solution and log data under the GDPR. Join the webinar to:
    •Learn the most relevant aspects of GDPR, to understand its impact on log management
    •Understand the risk of processing and storing log data in the context of GDPR
    •Discover your obligations and the precautions you can take to comply and maintain visibility
    •Observe specific compliance guidance and relevant use cases for network and information security logs
  • Detecting the Risk Obscured in Hidden Parts of Kerberos Recorded: Mar 8 2018 51 mins
    Nathaniel Ford, Moderator, (ISC)² EMEA, Ido Hoorvitch, Security Research, CyberArk Labs
    As long as Kerberos communication is not being decrypted, attackers get an opportunity to act freely using Kerberos without being detected because the encryption is being handed to them on a silver platter. Because Microsoft’s native software uses Kerberos, once control over a computer in a network is obtained, attackers can hide their activities and easily blend into a detection-less highway.

    Attend this webinar presented by the CyberArk Labs team to learn how decrypting the Kerberos protocol can bridge the gap between attackers and the defensive side by providing the defenders a real view over the network.

    We’ll discuss:
    •Why SIEM solutions are blind to this attack maneuver
    •Kerberos basics
    •Kerberos attacks overview
    •Kerberos attacks detection – considerations and limitations
    •Decryption – exposing the attack

    Speakers:
    Ido Hoorvitch
    Lavi Lazarovitz
  • 2018 Phishing Trends: New year. New threats. Same dark intentions. Recorded: Feb 20 2018 61 mins
    Adrian Davis, Director of Cybersecurity Advocacy for EMEA, (ISC)², Mollie Holleman, Senior Intelligence Specialist, Phishme
    Join (ISC)² EMEA and PhishMe for a look back at 2017’s threats and a look ahead. We’ll provide an overview of what PhishMe's Intelligence team uncovered, discuss trends in phishing-delivered malware, and analyse how various delivery vectors evolved.

    Some of the trends we’ll discuss:
    •The implications of last year’s major global cyber-events, such as WannaCry and NotPetya
    •The emergence of new ransomware families
    •The abuse of legitimate functions built into business-critical software platforms to deliver malware
    •The favouring of modularity and plug-in accompaniments to lightweight botnet and stealer malwares
    •New ways cyber-criminals are obtaining cryptocurrency

    Cyber-crime won’t slow down. Take this opportunity to learn from the recent past as you deal with current threats and prepare for whatever’s next.
  • GDPR - Burden or Benefit? Recorded: Feb 7 2018 62 mins
    Adrian Davis, Ardi Kolah, William Richmond-Coggan, Mandeep Sandhu
    Ask a CISO what is keeping them awake at night and all too often, they will mention their organisation’s readiness for the upcoming General Data Protection Regulation (GDPR) legislation. A recent survey showed that only a third of respondents are already compliant or on target to be compliant with the GDPR. But how has the GDPR earned its fearsome reputation?
    Supporting this debate is Ardi Kolah, Executive Fellow and Director of the GDPR Transition Programme at Henley Business School who will be discussing the implications of GDPR for business, along with William Richmond-Coggan from Pitmans Law who will be addressing the legal implications of GDPR as well as the opportunities for your business.
    The panel will be joined by Mandeep Sandhu, Compliance Technical Director for Carbon Black who will show how the security threat landscape could affect your business's GDPR compliance.
    Key Takeaways:
    •What you need to do to approach the May 2018 GDPR deadline with confidence.
    •How taking data security and privacy seriously is actually a great opportunity for your business
    •The security threat landscape, and how current threats could affect GDPR compliance
    Moderator: Adrian Davis, MD (ISC)² EMEA
  • Golden SAML Are The New Golden Tickets Recorded: Jan 30 2018 59 mins
    Nathaniel Ford, Moderator, (ISC)² EMEA, Shaked Reiner, CyberArk Labs Researcher
    In this webinar, we will explore a new attack vector that CyberArk Labs has discovered and dubbed “golden SAML.” The vector enables an attacker to create a golden SAML, which is basically a forged SAML “authentication object,” and authenticate across every service that uses SAML 2.0 protocol as an SSO mechanism.

    The team from CyberArk Labs will discuss how in a golden SAML attack, attackers can gain access to any application that supports SAML authentication (e.g. Azure, AWS, vSphere, etc.) with any privileges they desire and be any user on the targeted application (even one that is non-existent in the application in some cases).

    They'll then demonstrate their new tool, shimit, that implements a golden SAML in order to compromise an AWS account from within a Microsoft domain.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Recorded: Jan 29 2018 61 mins
    Nathaniel Ford, (ISC)² EMEA, Membership Services Team, (ISC)² EMEA
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Speed Up the Hunt: Make the Bad Guys’ Lives Harder with Threat-hunting Recorded: Jan 24 2018 64 mins
    Adrian Davis (ISC)² EMEA, Rick McElroy Carbon Black, Joe Moles Red Canary
    In today’s threat landscape, modern security teams recognise that compromise is inevitable. However, that does not mean that a breach should be inevitable too.
    Today’s security leaders must bring together the people, process and technology to enable threat hunting. Detect and alert strategies need to be revamped to shift from reactive forms of incident response to proactive threat hunting.
    Join Rick McElroy, Security Strategist for Carbon Black, to learn how better to enable your hunt.
    Key takeaways:
    1.Understand the role of threat hunting in a resilient cybersecurity strategy
    2.Learn how to create a culture of threat hunting and embed it within your security strategy
    3.Discover how to mature your threat hunting program
    4.Learn how to create an ROI for threat hunting
    5.Gain practical insight into the steps to take in order to start threat hunting

    Moderator: Adrian Davis, Managing Director, (ISC)² EMEA
    Speakers:
    Rick McElroy, Security Strategist, Carbon Black
    Joe Moles, Director of Detection Operations, Red Canary
  • Is DNS a Part of Your Cyber Strategy? Recorded: Dec 20 2017 63 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Gary Cox, Technology Director, Infoblox
    Detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks, being part of a data loss prevention program – DNS can help with this and much more, but are you leveraging it as part of your security controls and processes?

    DNS is the perfect choke point to stop not just data exfiltration through it, but also detect and stop malware from spreading and executing

    In this webinar you’ll learn:
    •The value of DNS as part of your cyber strategy
    •How DNS can provide your SIEM with actionable intelligence
    •How DNS can add value to other security controls, such as vulnerability scanners and end point protection

    Join Infoblox and (ISC)² for a discussion on this often overlooked topic.
  • How to Stop a Security Breach Becoming a PR Disaster Recorded: Dec 14 2017 62 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Neil Stinchcombe, Director, Eskenzi PR
    Your CEO has just called your mobile because a reporter from the BBC wants to know how many customers are affected by a hack into your payment database.
    How should you respond?
    What is the one thing you should not say to avoid turning a cyber incident into an event that has to be reported under GDPR?
    Why is Crisis Comms so different from all other types of PR?
    What things do you need to demonstrate that will limit the damage?
    Do you have a tried and tested Crisis Comms plan?
    Does everyone know who is on the Crisis Comms team?
    What they have to do?
    Who they need to inform?
    What they can and cannot say, and how they should say it?
    What type of skills do you need to manage media communications and prevent a cyber incident becoming a crisis?
  • Artificial Intelligence and Its Role in Reducing Risk to Your Organisation Recorded: Dec 11 2017 62 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Patrick Bayle, EMEA Channel Engineer, Cylance
    In this webinar, we will discuss how utilising artificial intelligence and machine learning addresses risk reduction when dealing with the increasing pace of unknown malware proliferation. We will also discuss how this approach differs from legacy methods and provide a compliance example of how you can remove complexity and liberate resources by leveraging advanced artificial intelligence and machine learning.
  • Securing Privilege in DevOps and in the Cloud Recorded: Dec 6 2017 61 mins
    Alistair Anderson, Technical Advisor, CyberArk, Adrian Davis, Managing Director, (ISC)² EMEA
    In this webinar we will explore new privileged account risks that DevOps, the Cloud and digital transformation projects bring. Examples shown will discuss the privilege risks that have already been exploited to compromise businesses. We will share best practices and guidelines on managing highly privileged secrets used to access cloud consoles, access keys and finally how to manage the privileged secrets bestowed to the new robot-guardians of our infrastructure, CI/CD tools.
(ISC)² EMEA Secure Webinars
Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² EMEA Secure Webinars Channel. Sign up to join us for educational Security Briefings, Roundtables and eSummits aimed at all those vested in the world of information security. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Briefings Part 2: Who's accessing your critical data, and what are they doing?
  • Live at: Sep 11 2014 12:00 pm
  • Presented by: Neil Warburton, Security Architect, IBM Security Systems
  • From:
Your email has been sent.
or close