Hi [[ session.user.profile.firstName ]]

Roundtable: Advancing Security Leaders - (ISC)² Security Congress EMEA 2016

This panel discussion will draw on experts from three different spheres of experience: academia, business leadership and practicing CSO/ CISO, to debate the current challenges around advancing security leaders to build resilience:
•What are the skills required for next generation technology and security leaders?
•How are organisations approaching recruitment and maintenance of the best?
•Where will the next generation of technology thinkers and doers come from?
•Do we absorb? Do we add a discipline? Do we submit to the Risk Manager function?

Such concerns are set to dominate discussions at the 3rd Annual (ISC)² Security Congress EMEA, October 18-19 in Dublin, Ireland.

Speakers:
- Brian Honan, Independent Security Consultant & Founder and Head, IRISSCERT & Special Advisor, Europol's Cybercrime Centre (EC3)
- Richard Nealon, Member, Board of Directors, (ISC)²
- Dr Jessica Barker, Independent Cyber Security Consultant
Moderator:
Adrian Davis, Managing Director, (ISC)² EMEA
Recorded Jun 15 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adrian Davis (ISC)² EMEA, Brian Honan IRISSCERT & EC3, Richard Nealon (ISC)², Jessica Barker Consultant
Presentation preview: Roundtable: Advancing Security Leaders - (ISC)² Security Congress EMEA 2016

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Aug 21 2017 12:00 pm UTC 60 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Q&A with Membership Services
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • GDPR: Countdown to Day0 May 24 2017 2:00 pm UTC 60 mins
    Neil Thacker, Forcepoint, Moyn Uddin, Cyber Councel, Jonathan Armstrong, Cordery, Adrian Davis, (ISC)²
    With the EU General Data Protection Regulation entering into force and becoming applicable from the 25th May 2018, this webcast, featuring an expert panel, will focus on key milestones to become ready for the new regulation and what we have learned to date with 1 year to go.

    Topics for discussion will include obligations to:

    · Maintain a personal data inventory
    · Map Data flow vs. Data Transfer Agreements
    · Incident Response and obligations for mandatory data breach notification
  • CISO Says: Interview with Darron Gibbard, CTSO, Qualys Recorded: Apr 27 2017 61 mins
    Darron Gibbard, CTSO, Qualys, Adrian Davis, Managing Director (ISC)² EMEA
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
  • Part II – How to get started with GDPR & Applying Appropriate Security Controls Recorded: Apr 25 2017 62 mins
    Jason Hart, Gemalto, Lisa Bentall, DQM GRC, Adrian Davis, (ISC)² EMEA, Nathaniel Ford, (ISC)² EMEA
    As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Lisa Bentall (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.
  • Mission Possible: Executing a 30-Day Sprint to Protect Privileged Credentials Recorded: Apr 11 2017 49 mins
    Bryan Murphy, Consulting Services Manager, CyberArk, Nathaniel Ford, Morderator, (ISC)² EMEA
    To avoid a data breach you ultimately need to understand the techniques attackers are using and what security controls can stop them. Organisations that have already been breached are the best source of information.

    Join us for a live webinar where we will provide an inside look into the lessons learned from several high-profile data breaches. We will discuss lessons learned from security professionals and technical experts who have been on the front lines of breach remediation and outline a proven framework for an intensive sprint of approximately 30 days to implement a set of key controls around privileged credentials.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Recorded: Apr 3 2017 58 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Q&A with Membership Services
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Getting started with GDPR, Privacy and Applying Appropriate Security Controls Recorded: Mar 23 2017 56 mins
    Jason Hart, Gemalto, Christine Andrews, DQM GRC, Adrian Davis, (ISC)² EMEA
    In this webinar, presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) you will learn:

    a. The background to the new General Data Protection Regulation
    b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
    c. A focus on the information security implications and considerations for meeting compliance
    d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards
  • Securing Cisco with Splunk - Lessons from One of the World’s Most Mature CSIRTs Recorded: Mar 20 2017 59 mins
    Imran Islam, CISCO, Matthias Maier, Splunk, Adrian Davis, (ISC)² EMEA
    The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.
    Learn how Imran Islam, leader of Cisco’s EMEA/APAC CSIRT team relies on Splunk to help his team drive best practices in threat assessment, mitigation planning, incident detection and response, incident trend analysis, and the development of future security architecture.
    Join this webinar to hear Imran Islam discuss how Cisco drives CSIRT best practices:
    - CSIRT playbooks and automation methods
    - The importance of timely CSIRT data access, correlation & visualisation
    - CSIRT staffing approaches
    - CSIRT threat intelligence management
    - Driving CSIRT operational efficiency
    - The importance of CSIRT collaboration across the business during investigations
    - How CSIRT functions can increase business relevance
    - Learn about the importance of understanding your environment
    - Learn about the importance of having the right data
    - Learn the critical success factors for building a CSIRT Team and capabilities
    - Learn how to enable your security team to scale its ability to handle incidents and quickly find, validate, and resolve issues
    - Learn how to justify adding more resources to an incident response team
    - Learn how to introduce consistency into your security team for approaching and solving security problems.
  • Collective Security – Prairie Dogs vs Humans Recorded: Mar 16 2017 61 mins
    Jim Hansen, Chief Operating Officer, PhishMe, Adrian Davis, Managing Director, (ISC)² EMEA
    As the security industry has continued to under invest in the human element of security, phishing has become the top attack vector for cyber criminals. Breaches continue to occur in record numbers, identification takes an exorbitantly long time, and the most preferred target is an organization’s human assets. Empowering human assets to provide vetted intelligence into your incident response teams is often overlooked. Every organization has these human sensors, and there’s a natural desire for these employees to want to help.

    In this presentation, Jim Hansen will discuss:
    •Why the cyber security industry is broken
    •How to reduce susceptibility to human-targeted attacks
    •How to empower users to become human sensors to recognize and report suspected attacks
  • Facing up to Mobile Security Challenges Recorded: Feb 28 2017 62 mins
    Stephen McCormack, Mobile Security Leader, IBM MaaS360, Adrian Davis, Managing Director, (ISC)² EMEA
    Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis. But what about the risks? Join me, Stephen McCormack from IBM MaaS360 as I take you step-by-step through the key challenges that mobile devices bring, and how you can easily act to ensure your organisation is protected.
  • Do You Really Mean ‘I Need a SOC’? Recorded: Feb 27 2017 62 mins
    Andy Herrington, Fujitsu Services UK Ltd, Paul McEvatt, Fujitsu Services UK Ltd, Adrian Davis, (ISC)² EMEA
    Enterprises have generally responded to the security challenge, recognising that they cannot simply cross their fingers and hope to avoid a major cyber incident. Many have reached for the ‘big security technology catalogue’ and in the past couple of years we have seen increasing numbers of organisations setting out with the intention of deploying some form of SOC. While there is no getting away from the fact effectively deployed technologies and the integration of a well organised SOC can be part of the solution, very few organisations can actually set up and operate a form of SOC that will make a material difference. In this webinar, experts from Fujitsu will discuss the considerations that go into an effective SOC, identify common mistakes and recommend a SOC Strategy which is more likely to yield an improved security posture than blowing a massive budget on a ‘home-grown’ SOC.
  • The Unique Challenges of Protecting Cloud Assets Recorded: Feb 10 2017 62 mins
    Chris S. Smith, Product Marketing – Cloud and MSP, CyberArk Software, Adrian Davis, Managing Director, (ISC)² EMEA
    This session is targeted at IT and security leaders and is designed to help them understand and address the unique challenges that enterprises typically face when they deploy their applications in the public cloud. It summarize the areas that the public cloud vendors typically take care of and highlights the areas that the enterprise and application owners are typically responsible for. With a focus on managing privileged accounts in the cloud environment the session addresses challenges and solutions for securing application to application sharing and communications, elastic, hybrid and DevOps environments. While the focus is on public cloud many of the best practices and learnings will also be applicable to private cloud environments.
  • CISO Says: Interview with Craig Rice, Director of Security, Payments UK Recorded: Feb 6 2017 61 mins
    Speaker: Craig Rice, Director of Security, Payments UK, Moderator: Adrian Davis, Managing Director (ISC)² EMEA
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
  • The Rise of Malware-less Attacks: How Can Endpoint Security Keep Up? Recorded: Jan 30 2017 61 mins
    Paul Morville, Carbon Black, Chris Sherman, Forrester Research, Adrian Davis, (ISC)² EMEA
    The security industry is witnessing a rapid evolution in attack techniques - including advanced polymorphic malware and file-less attacks. In fact, according to the 2016 Verizon Data Breach Report, the majority of breaches (53%) involve no malware.

    Clearly, traditional antivirus (AV) solutions no longer stop advanced attacks. Modern attackers can easily get their hands on the static and highly predictable prevention models used by legacy AV vendors, which means they can reliably bypass them. Unfortunately, many emerging “next-gen” vendors are using approaches that fall victim to the same fundamental flaw.

    In this webinar with guest speaker Chris Sherman, Senior Analyst at Forrester Research, we will discuss the latest trends in endpoint security, including results from The Forrester Wave™: Endpoint Security Suites, Q4 2016. Carbon Black's Paul Morville will talk about how to stop these pervasive attack techniques.

    Topics Covered On the Webinar:
    •Forrester analysis on new security threats and the need for a next-generation of endpoint security
    •Forrester Endpoint Security Wave Report results
    •How next-gen antivirus makes it harder for attackers to achieve their objectives
  • Security in the Age of Open Source Recorded: Jan 26 2017 61 mins
    Mike Pittenger, VP of Security Strategy, Black Duck Software, Adrian Davis, Managing Director, (ISC)² EMEA
    With over 4,000 new open source vulnerabilities discovered since 2014, developers need new tools in their arsenals to guide, enforce, and monitor their use of open source code throughout the SDLC.

    Join Mike Pittenger, VP of Security Strategy at Black Duck Software, where he’ll discuss how your organization can:

    · Automate identification of all open source you’re using and map against known and newly identified vulnerabilities
    · Accelerate remediation
    · Take action today to better enforce open source security without impacting an agile SDLC
  • Doing the right thing: Privacy beyond GDPR Recorded: Jan 24 2017 60 mins
    Jorge Carillo, President of the (ISC)² Czech Chapter, Adrian Davis, Managing Director, (ISC)² EMEA
    With the large possibility amount of personal data availably, Data protection impact assessments are crucial to identify, understand and address any privacy issues that might arise when developing new products and services or undertaking any other new activities that involve the processing of personal data.

    The objective of this webinar is to provide a pragmatic approach to such type of assessments in the context of the GDPR and IoT.
  • Is Enterprise Security Positioned to Succeed? Recorded: Jan 19 2017 62 mins
    Daniel Kennedy, Research Director, 451 Research, Adrian Davis, Managing Director, (ISC)² EMEA
    Two themes emerge from 451 Research's recent study of the organizational dynamics of enterprise information security teams: that security teams are understaffed and potentially incorrectly positioned in organizations. Join us to review the the study's results based on more than 930 online surveys and 20 live interviews with enterprise security leaders.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Recorded: Jan 9 2017 60 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Q&A with Membership Services
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning Recorded: Dec 9 2016 62 mins
    James Hanlon, Security Markets Director, Splunk, Adrian Davis, Managing Director, (ISC)² EMEA
    Threat hunting is evolving. Many organizations still carry out threat hunting in an adhoc manner without a defined and repeatable process. Yet some organizations are now looking at new machine learning driven approaches to accelerate their maturity and success. This session will review the current approaches to threat hunting and explain how Splunk can support & accelerate your threat hunting maturity.
  • GDPR: What Your Board Needs to Know Recorded: Nov 30 2016 63 mins
    Nigel Hawthorn, Skyhigh Networks, Anthony Lee, DMH Stallard, Dr. Adrian Davis, (ISC)2 EMEA
    The new GDPR regulations are going to change how enterprises behave, and it's not just a matter for IT departments. So how do you get boards to listen? How do you make marketing care? How do you get finance's attention? Who else needs to know?
    Six months after the publication of the GDPR and 20 months before it is implemented, what has been learnt and how can you take advantage of other people’s experience?
    The team will talk and address these and other questions – less a seminar and more a round table discussion; come along with your questions ready for the team.

    Join Nigel Hawthorn, Anthony Lee and Adrian Davis for a look at GDPR and leave with some answers to your questions.
(ISC)² EMEA Secure Webinars
Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² EMEA Secure Webinars Channel. Sign up to join us for educational Security Briefings, ThinkTank Round Tables and eSymposiums aimed at all those vested in the world of information security. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Roundtable: Advancing Security Leaders - (ISC)² Security Congress EMEA 2016
  • Live at: Jun 15 2016 11:00 am
  • Presented by: Adrian Davis (ISC)² EMEA, Brian Honan IRISSCERT & EC3, Richard Nealon (ISC)², Jessica Barker Consultant
  • From:
Your email has been sent.
or close