Hi [[ session.user.profile.firstName ]]

eSummit Session 2: Cloud Breach – Detection and Response

Your next breach or insider attack will most likely have you digging for evidence in the cloud. Are you prepared? The old styles of imaging disks and tapping networks won't work. They will not scale. Join this webinar to discover response scenarios for cloud enabled and cloud dependent enterprises, a model for preparing for cloud response and examples of cloud breach investigations.
Recorded Aug 23 2016 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matthias Maier, Product Manager EMEA, Splunk, Adrian Davis, Managing Director (ISC)²
Presentation preview: eSummit Session 2: Cloud Breach – Detection and Response

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Jan 29 2018 12:00 pm UTC 60 mins
    Nathaniel Ford, (ISC)² EMEA, Membership Services Team, (ISC)² EMEA
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Is DNS a Part of Your Cyber Strategy? Dec 20 2017 12:00 pm UTC 60 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Gary Cox, Technology Director, Infoblox
    Detecting malware, helping to prevent and disrupt command and control communication, ransomware and phishing attacks, being part of a data loss prevention program – DNS can help with this and much more, but are you leveraging it as part of your security controls and processes?

    DNS is the perfect choke point to stop not just data exfiltration through it, but also detect and stop malware from spreading and executing

    In this webinar you’ll learn:
    •The value of DNS as part of your cyber strategy
    •How DNS can provide your SIEM with actionable intelligence
    •How DNS can add value to other security controls, such as vulnerability scanners and end point protection

    Join Infoblox and (ISC)² for a discussion on this often overlooked topic.
  • How to Stop a Security Breach Becoming a PR Disaster Dec 14 2017 12:00 pm UTC 60 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Neil Stinchcombe, Director, Eskenzi PR
    Your CEO has just called your mobile because a reporter from the BBC wants to know how many customers are affected by a hack into your payment database.
    How should you respond?
    What is the one thing you should not say to avoid turning a cyber incident into an event that has to be reported under GDPR?
    Why is Crisis Comms so different from all other types of PR?
    What things do you need to demonstrate that will limit the damage?
    Do you have a tried and tested Crisis Comms plan?
    Does everyone know who is on the Crisis Comms team?
    What they have to do?
    Who they need to inform?
    What they can and cannot say, and how they should say it?
    What type of skills do you need to manage media communications and prevent a cyber incident becoming a crisis?
  • Artificial Intelligence and Its Role in Reducing Risk to Your Organisation Recorded: Dec 11 2017 62 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Patrick Bayle, EMEA Channel Engineer, Cylance
    In this webinar, we will discuss how utilising artificial intelligence and machine learning addresses risk reduction when dealing with the increasing pace of unknown malware proliferation. We will also discuss how this approach differs from legacy methods and provide a compliance example of how you can remove complexity and liberate resources by leveraging advanced artificial intelligence and machine learning.
  • Securing Privilege in DevOps and in the Cloud Recorded: Dec 6 2017 61 mins
    Alistair Anderson, Technical Advisor, CyberArk, Adrian Davis, Managing Director, (ISC)² EMEA
    In this webinar we will explore new privileged account risks that DevOps, the Cloud and digital transformation projects bring. Examples shown will discuss the privilege risks that have already been exploited to compromise businesses. We will share best practices and guidelines on managing highly privileged secrets used to access cloud consoles, access keys and finally how to manage the privileged secrets bestowed to the new robot-guardians of our infrastructure, CI/CD tools.
  • Part 2: Your 6 Step Journey to GDPR Compliance Recorded: Dec 5 2017 64 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Jan Smets, Certified DPO, Gemalto
    Following our hugely popular “6 Steps to GDPR Compliance” webinar, part 2 will offer a recap followed by an interactive Q&A moderated by Adrian Davis, (ISC)² EMEA's Managing Director.
    Join Jan Smets, certified DPO at Gemalto who will focus on the steps where our customers are currently actioning.

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • Best Practices for Securing Containerised Applications Recorded: Nov 30 2017 61 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Kumbirai Tanekha, Software Engineer R&D, CyberArk
    In this webinar we will show practical tips on how developers can secure their containerised applications across the DevOps pipeline and solve their secrets management challenges without stifling architectural and software design choices .
    We will show a demo of Conjur from CyberArk, an open source security service that helps to securely store and safely retrieve secrets in high-velocity and widely-scaled IT environments while integrating with popular CI/CD tools to provide machine identity authorisation and more.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Recorded: Nov 27 2017 52 mins
    Nathaniel Ford, Moderator, (ISC)² EMEA, Membership Services Team, (ISC)² EMEA
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • How a Military Concept can Help Build Your Incident Response Framework Recorded: Nov 14 2017 53 mins
    Nathaniel Ford, Moderator, (ISC)² EMEA, Craig Roberts, European Technical Engineer, IBM Resilient
    In the current cyber threat landscape, organisations are looking at ways to respond as effectively as possible. This session will look at the role that can be played by OODA loops, a military concept developed to improve fighter pilots' abilities to respond in combat, it stands for Observe, Orient, Decide & Act. Companies can build these concepts into their Incident Response (IR) process to aid clarity of thinking and improve their ability to respond quickly and effectively to cyber attacks.
  • Form the Future with Secure IoT Recorded: Nov 7 2017 62 mins
    Adrian Davis, (ISC)² EMEA, Mark Wharton, CTO, Iotic Labs, Ali Nicholl, Head of Communication, Iotic Labs
    The Internet of Things (IoT) has the potential to disrupt and enchant services, empower communities and improve efficiency and effectiveness, enhancing our experiences. However, it has so far promised much and failed to deliver. There are many reasons for this, summed up by just two:
    1.Diverse and incompatible solutions
    2.Security concerns
    If we can meet the security challenges that threaten the IoT, then we can unlock potential for businesses to mitigate risks, take advantage of operational efficiencies, and emerge as significant players of the 21st century.
    In collaboration with (ISC)² and network security experts, Iotic Labs has written a self-paced practical course to help businesses understand and overcome the pitfalls of introducing IoT devices into their networks and to “just start”.
    This webinar will discuss the landscape of IoT security, notable challenges, and provide an overview as to how the course and a future-flexible Iotic approach address these challenges.
  • PCI DSS 3.2 - Are You Ready? Recorded: Oct 19 2017 59 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Mor Ahuvia, IAM Product Marketing Manager, Gemalto
    The February 2018 deadline for complying with PCI DSS 3.2 is fast looming. Most of the new requirements in the latest PCI DSS guidelines are focused on the need to extend multi-factor authentication (MFA) to additional use cases and user groups within organisations who handle Credit Card Data. From February 2018 onwards, all individuals who access systems such as databases, network modules and email servers which hold credit card data will be required to authenticate themselves with MFA.
    Join (ISC)² EMEA and Gemalto to learn:
    - What’s new in PCI DSS 3.2
    - How to effectively map PCI DSS MFA requirements to business use cases and user groups in your organisations
    - Best practices for organisations that need to extend their MFA footprints to additional use cases, and for those that are starting to think about how to comply with PCI DSS’s authentication requirements.
  • Part 2: Security control quick wins that help achieve clarity for GDPR Recorded: Oct 10 2017 63 mins
    Adrian Davis, Jeremy King, Andrew Barrett, Chris Strand
    Organisations apply many cybersecurity controls to help measure and maintain data security and regulatory compliance. Several are purposeful and list requirements that are subjective in how to employ them and how to meet their unique business risk strategy. This can often make it difficult to create a baseline security control strategy that will meet new regulations as they are introduced.

    In this session, the expert panel will discuss specific security controls that can be used to provide clarity, and measure for any data security and protection programme including the GDPR. Considerable focus and examples will be drawn from prescriptive data security standards such as the PCI DSS, (Payment Card Industry Data Security Standard), and how leveraging such standards can help to create a security control strategy to meet and measure continuous data security compliance.

    Webinar attendees will take away many practical examples, solutions, and anecdotes on how their businesses can alleviate the pressures of employing the right security controls to protect GDPR-defined data, meet compliance and prove security control efficacy.

    Panel Experts:
    Jeremy King, ‎International Director, PCI Security Standards Council
    Andrew Barrett, International / Managing Principal Application validation, Coalfire
    Christopher Strand, Sr. Director Compliance Strategy, Carbon Black
    Moderator: Adrian Davis, Managing Director, (ISC)² EMEA

    To listen to Part 1 of this session, paste the following URL into your browser: https://www.isc2.org/News-and-Events/Webinars/EMEA-Webinars/Focused-Webinars?commid=260091
  • Phishing Response: Stop the Chaos Recorded: Oct 3 2017 62 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, John ‘Lex’ Robinson, Marcel Feller, PhishMe
    During a survey recently conducted among security professionals, 90% said phishing is the #1 threat. Yet many acknowledged they’re unprepared to deal with phishing attacks.

    Attend this webinar to learn why responders are drowning in emails instead of hunting real threats. See why they’re betting on automation whilst we know, tech alone won’t stop threats from getting through and wreaking serious havoc. Learn what rapid changes and investments your peers are planning to turn the tide against phishing and protect their organisations.

    You will also find out:
    •How bad is the phishing threat?
    •How confident are companies in their phishing responses?
    •What solutions are companies using—and which ones should they add?
    •How can automation and technology help? Why are humans important, too?
  • A Day in the Life of a GDPR Breach Recorded: Sep 21 2017 62 mins
    Adrian Davis, (ISC)² EMEA, Matthias Maier, Elizabeth Davies, Splunk
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?

    Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you will learn:
    - What breach response will look like under the GDPR
    - What tools and processes a data privacy officer will rely on in case of a breach
    - What departments and entities will be involved beyond IT
    - What activities are currently happening within organisations to prepare for the GDPR
    - What the consequences of the breach could be
  • Cognitive Security in Action: Watson at Wimbledon Recorded: Sep 20 2017 60 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Mike Spradbery, IBM's UK & Ireland Security Technical Leader
    Cognitive Security has game-changing potential to help tackle cybercrime, but how is this playing out in reality? In February this year IBM announced Watson for Cyber Security, described as 'the industry’s first augmented intelligence technology designed to power cognitive Security Operations Centres'. What do customers say about their experiences working with Watson for Cyber Security and how is it helping security analysts improve response times?

    Mike Spradbery, IBM's UK&I Security Technical Leader, will discuss not only the promise of Watson for Cyber Security but the client results that IBM is seeing. Mike will talk live to Brian Jensen, the analyst responsible for Cyber Security during the high-profile Wimbledon tennis tournament, to understand the scale and type of attacks the team saw, and how innovative new technologies like Watson for Cyber Security helped the team keep Wimbledon safe and secure.
  • The Next Generation CISO: How to Find and Train Tomorrow's Security Executives Recorded: Sep 7 2017 62 mins
    Adrian Davis, (ISC)² EMEA, Sam Curry Chief Security Officer, Cybereason
    Somewhere out there, in a market crowded by over-qualified workers deluged by job offers, the next generation of CISOs is maturing. But how can CISOs train tomorrow’s security executives when today’s well-known security talent deficit makes it difficult to fill even the most basic roles?
    Retaining cyber professionals isn’t just a matter of offering the biggest salary — it requires getting creative with cross-training, hands-on experience and developing collaborative solutions with fellow CISOs.
    Watch the webinar with Sam Curry, Cybereason Chief Security Officer, to explore strategies for identifying and developing the next generation — including your own replacement.
  • Guarding Against Mobile Malware, How to Avoid the Next Big Threat Recorded: Sep 5 2017 62 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Stephen McCormack, Mobile Security Leader, IBM MaaS360
    In the wake of global ransomware attacks targeted mainly at Windows desktop and laptop devices, this webinar will discuss an often-overlooked threat: the mobilization of malware and ransomware. Whether through malign apps, poorly written code, corrupt e-mail profiles or disreputable websites, there are a range of avenues of attack open to hackers who might choose to target smart devices.
    To date, attacks on mobile devices have been mostly on a small scale, targeting individual user devices and data. But is a big attack waiting in the long grass? Will the next WannaCry or Petya target mobiles, and how can you protect yourself?
  • The IR Boost: How Cyber Hunting Enhances Incident Response Recorded: Aug 31 2017 51 mins
    Nathaniel Ford, (ISC)² EMEA, Clifton Slater, Lital Asher-Dotan, Cybereason
    Incident response has become increasingly complicated. According to a recent report, 67% of security professionals believe that incident response is more difficult today than it was two years ago. This is due to the numbers of IT activities and security alerts, and the need for advanced IR skills.
    This webinar will explore a new and unexpected boost to incident response, coming from the integration of threat hunting methodologies.
    Israel Barak, Cybereason CISO and an Incident Response expert, will chat with Lital Asher-Dotan, Senior Director of Content, about:
    - The latest challenges faced by IR professionals
    - Threat hunting and its benefits for IR
    - Specific examples in which threat hunting leveled up IR practices
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Recorded: Aug 21 2017 49 mins
    Nathaniel Ford, Moderator (ISC)² EMEA, Membership Services, (ISC)² EMEA
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • Reduce Security Vulnerabilities in Enterprise Applications Recorded: Aug 17 2017 61 mins
    Mike Pittenger, VP of Security Strategy, Black Duck Software, Adrian Davis, Managing Director, (ISC)² EMEA
    Would you leave sensitive data out in the open making yourself a target to thieves looking for a victim? That is exactly what your business is doing if it fails to identify vulnerabilities in their business applications. Cyber attackers are looking at your business applications for security vulnerabilities so they can get access and wreak havoc. It’s time to find and fix security vulnerabilities before the hackers do. Wondering where to start and what to do? This webinar will help you build a comprehensive plan to minimize threats and protect your company. Join this webinar to hear application security experts: Discuss methods for scanning & evaluating potential security vulnerabilities in out-of-the box and home grown business applications Teach methods for quickly detecting and eradicating software flaws Make recommendations for how to choose and implement vulnerability scanning tools Explain how to reduce security vulnerabilities during internal application development Examine the widespread use of open-source code and how it may expose your business to security threats
(ISC)² EMEA Secure Webinars
Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² EMEA Secure Webinars Channel. Sign up to join us for educational Security Briefings, Roundtables and eSummits aimed at all those vested in the world of information security. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: eSummit Session 2: Cloud Breach – Detection and Response
  • Live at: Aug 23 2016 10:00 am
  • Presented by: Matthias Maier, Product Manager EMEA, Splunk, Adrian Davis, Managing Director (ISC)²
  • From:
Your email has been sent.
or close