Hi [[ session.user.profile.firstName ]]

What is Your Primary Cyber Security Concern for 2015?

2014 has been a bumper year for information security. Many of you will have begun now looking at your security strategy for the New Year. To help, here’s three of the industry’s top thinkers, giving you their opinion on what’ll be keeping them up at night in 2015...
Recorded Dec 17 2014 3 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amar Singh, Founder, Cyber Management Alliance; Mikko Hypponen, Chief Research Officer, F-Secure & EJ Hilbert, MD UK, Kroll
Presentation preview: What is Your Primary Cyber Security Concern for 2015?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Leveraging Threat Hunting Techniques To Investigate Petya Nov 23 2017 2:00 pm UTC 75 mins
    Amar Singh
    Warning - this is a technical webinar.

    Since the outbreak of Petya there have been many webinars dissecting the malware, its purpose, and its attribution. We view the Petya outbreak differently. In this webinar we show you how we leveraged threat hunting techniques developed to identify and pattern malicious behaviour evident in malware like Petya.

    Join us to
    * -See a Live Demo of actual tools used to dissect the malware.
    * -Ask and interact with the specialists in threat analysis.

    Following on from our successful webinar titled A Day in the Life of a Threat Analyst, we bring you another informational and educational webinar on how an experienced threat analyst would investigate Petya.

    Sign up now for this interactive webinar.
  • [Panel] Protecting Data in the Next Generation of the Cloud Oct 25 2017 10:00 am UTC 60 mins
    Amar Singh (Cyber Management Alliance); Klaus Gheri (Barracuda Networks), Daniele Catteddu (CSA)
    Cloud computing is an increasingly vital element of information security. It’s used to protect sensitive data; for identity and access management; for network security and to aid with incident response. However it’s not without it’s own set of risks and has been hit in the past with significant and newsworthy breaches.

    Join this interactive Q&A panel with top cloud and security experts as they discuss the future of the cloud and considerations to take for protecting sensitive data when it's held in the Cloud.

    Moderator:
    - Amar Singh, Cyber Management Alliance

    Speakers:
    - Daniele Catteddu, CTO, Cloud Security Alliance
    - Klaus Gheri, VP and GM, Network Security, Barracuda Networks
  • Post GDPR World - What Are Your Chances of Survival? Recorded: Oct 19 2017 60 mins
    Amar Singh & Chris Payne
    With the greatest shake-up of data protection regulation in a generation looming, CISOs, DPOs and IT Administrators are busy planning for the changes needed for their organisations to be compliant. But with 60% of IT executives suggesting staff as their biggest threat to adherence (Bluesource, 2017) and 90% of staff admitting to violating policies designed to prevent security incidents (BSI, 2017), have they really addressed the issue of friendly fire?

    In this live, informative and interactive webinar led by Amar Singh, Global CISO & CEO of Cyber Management Alliance. A panel of data security and policy experts will discuss, why staff remain such an active threat to GDPR compliance, why policies are being ignored and how to ensure that your staff are on-board with the GDPR before May 2018.

    Panellists:

    Amar Singh, Global CISO & CEO, Cyber Management Alliance
    Chris Payne, Data Privacy Expert & Managing Director, Advanced Cyber Solutions
    Dominic Saunders, CTO and Co-Founder, NETconsent
    Joe Lee – UK and Ireland Commercial Manager, NETconsent
  • How the US Secret Service combats advanced ransomware Recorded: Oct 4 2017 60 mins
    Amar Singh, Mark Grantz, Chris Payne, Brian Laing, Ronny Wolf
    Following on from our popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next", we bring to you our next special episode with US Secret Service Special Agent Mark Grantz.

    If you think criminals are bored of Ransomware, think again! The ransomware market is anything but boring. Criminals are continuing to flock to ransomware as the barriers to entry, RaaS or ransomware-as-a-service, make it easy for anyone to try their luck at digital extortion. The authors behind Cerber — currently the most prominent ransomware family — release updated variants every 8.4 days on average!

    Join Amar Singh, global CISO and CEO of Cyber Management Alliance and US Secret Service Special Agent Mark Grantz as they
     
    •Dig deep into the inner workings of advanced cyber criminal gangs
    •Share how law enforcement agents, like Mark Grantz, keep pace and take down these criminal outfits and police cyberspace.
    •Share best practice tips and strategies on securing your organisation.
     
    Joining Mark and Amar are Ronny Wolf from GFI, Brian Laing from Lastline and cyber and data privacy expert Chris Payne from Advanced Cyber Solutions.
  • Insights with Cyber Leaders - Adel Al Hosani CISO UAE Customs Recorded: Sep 27 2017 25 mins
    Amar Singh CEO Cyber Management Alliance
    Amar Singh, CEO and co-founder of Cyber Management Alliance, took the opportunity to discuss cyber security and information management with Adel Al Hasani, CISO and Head of Information Security for the UAE Government.
  • Insights with Cyber Leaders - Taiye Lambo Former CISO of Atlanta City Recorded: Sep 27 2017 18 mins
    Amar Singh CEO Cyber Management Alliance
    Cyber Management Alliance had the pleasure recently to talk to Taiye Lambo, former CISO for Atlanta, about his early career in IT, moving from Nigeria to London, and then onto Atlanta, and the way he has crossed over from full time positions to an entrepreneur, and back again. Taiye also gave us his views on certifications, why knowledge is important and his love of mentorship.
  • Insights with Cyber Leaders - Patrick Heuri Recorded: Sep 22 2017 22 mins
    Amar Singh Cyber Management Alliance
    Insights with Cyber Leaders series brings you a fascinating Interview with Patrik Heuri former Global Head of Information Security Risk at HSBC Private Bank.

    Moving from an information security role into a cyber security role has been challenging. Patrik explains his thoughts in that when you think about information security, you think of it as a technical subject, and that’s correct. In fact, most project leads will, when they start as juniors, learn the necessary techniques and methodologies they will need to develop their expertise as an IT security officer. However, further down the line of their careers, Patrik believes that there is a requirement to better understand the legal aspects to cyber and information security, such as regulations and compliance, and the information production within the organisation. He adds that it will be of great benefit to anyone entering the information security/cyber security space to train and work with the legal teams on IT matters.
  • A Day in the Life of a Threat Analyst – A Technical Case Study on Attribution Recorded: Sep 12 2017 60 mins
    Amar Singh, Steve Miller (Anomali)
    Threat actors are devious and persistent to say the least. Consequently, the practice of threat analysis requires a similar mindset of unrelenting determination and doggedness. Join Steve Miller and Amar Singh as they share a glimpse of this exciting world and examine the various toolsets, methodologies and processes employed by threat analysts to ask and answer complicated questions about cyber threats. We will preview a day in the life of a threat intelligence analyst in the context of incident and malware attribution.

    This technical webinar will cover:

    * . Role of an intelligence analyst
    * . Typical challenges and questions
    * . Tools and processes used to find answers
    * . Case study on attributing an intrusion set

    Amar Singh is a globally recognised CISO and trusted advisor to FTSE 100 and other organisations. He also is the founder of Cyber Management Alliance Ltd, Give01Day and Wisdom of Crowds.

    Steve Miller is an incident response professional and a threat intelligence analyst at Anomali. Steve came to Anomali from Mandiant, where he built security operations centers around the world, conducted hundreds of intrusion investigations and, of course, chased down a lot of evil – work that directly led to the discovery of tons of new zero-days, APT malware families, and targeted attack campaigns.

    Prior to joining Mandiant, Steve conducted research and special projects for federal government agencies the U.S. Department of Homeland Security and the U.S. Department of State.
  • The Second Coming of Ransomware - Insights into New Developments Recorded: Sep 12 2017 54 mins
    Amar Singh
    We are excited to bring you an updated version of our hugely popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next". Traditional ransomware, for the want of a better word, is boring and truthfully a fairly opportunistic way to make money. Guess what, criminal gangs don't believe in opportunistic attacks that may make them money. They want a certain assurance of success and importantly, they want big bucks.

    Modern ransomware is going to be able to deliver this and more to anyone who can pay top dollar.

    Join global CISO and cybersecurity expert, Amar Singh, as he shares his insights and experience on the murky world of cyber crime and ransomware and how you can be better prepared to manage this growing threat.
  • The Imminent Smart Device Mutiny Recorded: Aug 16 2017 59 mins
    Amar Singh & Chris Payne
    Are we filling our homes and carrying around in our pockets, our biggest cybersecurity vulnerabilities? Join us in a lively debate where we will discuss the increase in IoT and smart devices, some of the lesser talked about threats and what steps are being taken to reduce the risk to the imminent smart device mutiny of future.
  • Insights with Cyber Leaders - Tracy Andrew Former Infosec Manager at Freshfields Recorded: Jul 31 2017 21 mins
    Amar Singh CEO Cyber Management Alliance and Tracy Andrew CISO Freshfields
    As part of Cyber Management Alliance’s exclusive Insights With Cyber Leaders interview series, Amar Singh, CEO of Cyber Management Alliance, sat down with Tracy Andrew, former Information Security and Compliance Manager at one of the largest law firms in Europe - Fieldfisher, to gather fascinating insights into his career, his thoughts on qualifications and certifications, what attributes he looks for when recruiting, and whether, in his opinion, it is important to have a technical background to succeed in cyber security.
  • Wisdom of Crowds Virtual Roundtable - Data Security with RSA, Dell and more. Recorded: Jul 27 2017 20 mins
    Rashmi Knowles, Charles Race,William Culbert, Paul Ferron,Jason Goode and Jackson Shaw
    Participants in the Roundtable: Rashmi Knowles from RSA, Charles Race from OneLogin, William Culbert from Bomgar, Paul Ferron from CA Technologies, Jason Goode from Ping Identity and Jackson Shaw from Dell Security

    How has the adoption of ‘cloud’, including SaaS applications, changed the security landscape?

    What are the benefits of an Identity Access Management solution, why should it be implemented, and would you recommend an on-premise, cloud or hybrid solution?

    How does a single sign-on policy help to improve productivity and save costs, and what are the principle differences between SSO and federated identity?

    How should businesses and organisations leverage provisioning and deprovisioning for cloud applications, and what impact will this have?
  • An Exciting Day in the Life of a Risk Manager! - Really! Recorded: Jul 27 2017 50 mins
    Amar Singh, Chris Payne, Dom Saunders
    Policy? We have a policy? Have you read the policy? Thats right...who actually reads company policies?

    Risk and compliance managers globally have lost the fight against user policy acceptance leading to increasing organisational risk and the decreased ability to stand up and demonstrate effective compliance to regulatory bodies.

    Does it have to be this way? In this webinar, we

    * Demo what we use to transform and make mainstream what is often boring and ignored.

    * Show how you can effectively measure (yes measure and report) on how effective your policy implementation is.

    * Better engage and enforce your policies with third parties.
  • Amnon Bar-Lev - Check Point Executive Interview Recorded: Jul 21 2017 10 mins
    Amnon Bar
    We asked Amnon about the current key issues in data security and why having up-to-date threat information is becoming increasingly important, in what way malware attacks can be prevented, and how this intelligence can be harnessed and applied to the mobile and cloud environments.
    We also learn about Check Point Software’s new security architecture, Software Defined Protection, and how it can be used to control your security environment by combining intelligence with segmenting your network.
    View Amnon’s Executive Interview to learn how Check Point Software’s new architecture and other security solutions can be of benefit to your organisation.
  • Insights with Cyber Leaders with Saqib Chaudhry CISO Cleveland Clinic Recorded: Jul 17 2017 25 mins
    Amar Singh CEO Cyber Management Alliance and Saqib Chaudhry
    Amar Singh, CEO and founder of Cyber Management talked in length to Saqib Chaudry, CISO at the world-renowned Cleveland Clinic in Abu Dhabi on a range of topics including his early career in consulting, security certifications, whether the ability to hack is a step up to a security job, and the importance of threat intelligence.

    Starting out as an Helpdesk analyst; moving into systems and engineering, all as a consultant, allowed Saqib to choose projects to work on in between being a student. Saqib highly recommends starting a career in consulting, enabling you to gain experience in different technologies and business continuity. The role of CISO, to Saqib, is less with technology and more with understanding the processes, end to end, for an organisation.

    “Consulting firms already have a set list of clients across various industries which gives you a broad spectrum of what’s out there – makes your decision easier for the major you will work on.”
    From a personal development perspective, elaborates Saqib, is to focus on developing you as a person. Within a consulting firm, you can learn a range of different skills; from sales to dealing with executives, proposal writing, different cultures and how to market yourself.

    “You have 7 seconds to hold your senior executive’s attention so, when they ask you a question, answer it with a yes, no or I don’t know, before you launch into your explanation.”
  • Petya Ransomware Attacks: Autopsy and Lessons to Learn Recorded: Jul 13 2017 55 mins
    Josh Downs, BrightTALK; Ben Bartle,Barracuda Networks & Amar Singh, Cyber Management Alliance
    The only thing that can stop the security world discussing WannaCry was another large ransomware attack; which is exactly what happened at the end of June in the shape of Petya / notPetya / Goldeneye.

    The attacks compromised several global organisations and hit the headlines worldwide.

    In this session the moderator and panelists will cover the following:

    Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune into this session to get the lowdown on where the attacks came from; who was behind them; what they mean for the cyber security industry and how you can improve the protection for your business the next time something similar rolls along.

    PANELISTS:


    - Josh Downs, Senior Community Manager, BrightTALK (moderator)
    - Ben Bartle, Technical Engineer, Barracuda Networks
    - Amar Singh, CEO & Founder, Cyber Management Alliance
  • Insights with Cyber Leaders with Marek Pietrzyk Recorded: Jul 5 2017 20 mins
    Amar Singh CEO Cyber Management Alliance and Marek Pietrzyk
    Amar Singh, CEO and founder of Cyber Management had the pleasure of talking to Marek Pietrzyk, Director and Program Manager for Digital Data Protection at UBS on a range of topics including data classification and protection, the need for education and training, and his top three cyber security challenges for organisations today.
  • Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next Recorded: Jul 5 2017 54 mins
    Amar Singh, CEO & Founder, Cyber Management Alliance
    Media hype, so called cyber experts and the rest of the delettantes are all out in force trying to decipher what just happened with Petya. Ransomware or not? Script kiddies? Cyber warfare?

    Let's dive into behind the scenes of what may just be the turning point in targeted malware (sorry ransomware) attacks.

    Tune into this session to get the lowdown on where the attacks came from; who was behind them; what they mean for the cyber security industry and how you can improve the protection for your business the next time something similar rolls along.

    You'll also have the chance to ask Amar your Petya or ransomware questions and to get the upper hand defending your organisation.

    -----------------

    Amar Singh:

    CEO & Founder: Cyber Management Alliance & Give01Day.com - Chair of ISACA's UK Security Advisory Group.

    Experienced cyber, information security & data privacy practitioner. Senior C Level Executive, Global Chief Information Security Officer, Expert in Information Risk Management

    UK Government GCHQ Certified Trainer and creator of APMG & GCHQ Certified course CSPE (Cyber Security & Privacy Essentials)

    Creator and trainer of business focused Cyber Incident Planning & Response Course for middle to senior executives. (CIPR)

    Mentor & Trusted Advisor to FTSE 100 Firms, Start-ups & Incubator Funds

    Board Member and Consultant: MBA in Cyber Security. Chair of ISACA Security Advisory Group.

    Author, writer, Industry speaker & presenter
  • Dario Forte CEO of DFLabs explains Incident Response Automation and Orchestratio Recorded: Jul 4 2017 11 mins
    Dario Forte CEO DFLabs
    We had the opportunity to interview DFLabs, Founder and CEO, Dario Forte. Dario shared his insights on how to build an effective SOC utilising incident response automation and orchestration.
  • GDPR Mini-Webinar Series - Episode 8 - Working with Third-Parties Recorded: Jun 23 2017 13 mins
    Amar Singh & Chris Payne
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss working with third-parties
View our exclusive "Insights with Cyber Leaders Series" and webinars
Cyber Management Alliance presents an exciting series of interviews with International Cyber Security Leaders. Want to know what they look for when hiring for their teams? Want to know the secrets to their success and what keeps them awake at night? Theses exclusive interviews are presented by industry thought leader and Chair of ISACA's UK Security Advisory Group and Global CISO Amar Singh. Series but humours and light hearted interviews. See the leading figures in Cyber Security like you've never seen them before. From Eugene Kaspersky to CTO HP Enterprise and CTO of Intel Security we have an amazing line up. Subscribe for updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: What is Your Primary Cyber Security Concern for 2015?
  • Live at: Dec 17 2014 5:05 pm
  • Presented by: Amar Singh, Founder, Cyber Management Alliance; Mikko Hypponen, Chief Research Officer, F-Secure & EJ Hilbert, MD UK, Kroll
  • From:
Your email has been sent.
or close