Hi [[ session.user.profile.firstName ]]

Video Panel: The Growing Danger of Advanced Threats

We’re excited to announce that we’re broadcasting a LIVE VIDEO panel discussion, focused on the growing danger of advanced threats.

We’ve arranged four of the industry’s leading thinkers for this in-depth debate focused on the current threatscape, the industry's ATP trends and suggestions for effective breach prevention in 2015.

Panelists:

-> Jason Steer, Chief Security Strategist EMEA, FireEye

-> Raj Samani, VP & EMEA CTO, McAfee

-> Amar Singh, Founder, Give01Day

-> James Hatch, Head of Cyber Services, BAE Systems Applied Intelligence

-> Lindley Gooden (moderator), Managing and Creative Director, Greenscreen

The four thought leaders will be discussing the following ATP questions:

> Which factors define an advanced threat?

> How have advanced threats evolved over the last year?

> What key suggestions could be made looking ahead to deal with advanced threats?

> How can security professionals better adapt their organisations defences to deal with the current threatscape?

This is a blockbuster panel, filmed and broadcast live as part of the Advanced Threat Protection Summit. Tune in and listen to four of the industry’s leading thinkers, discuss the key issues keeping security professionals up at night.

All the panelists will also be available for 20 minutes of audience Q&A at the end. We look forward to seeing you join the debate!
Recorded Mar 18 2015 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Steer, FireEye; Raj Samani, McAfee; Amar Singh, Give01Day, James Hatch, BAE Systems & Lindley Gooden (moderator)
Presentation preview: Video Panel: The Growing Danger of Advanced Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Most 2FA Solutions are Insecure, Is Yours One of them? Mar 1 2017 2:00 pm UTC 60 mins
    Amar Singh & Chris Payne
    Everyone knows two-factor authentication right? or do you just know how to use it? Something you know and something you own is a phrase we can all recite but very few actually understand two-factor authentication and its true benefits. How it works, why two solutions are not alike or what to look for in a true secure solution are just some of the conversation topics covered in this webinar.
  • Incident Response and GDPR. What You Need To Know. Recorded: Feb 23 2017 60 mins
    Amar Singh
    Warning - this is not just another GDPR webinar. Join Amar Singh in his popular and interactive webinars and deep-dive into this special Cyber Incident Planning & Response webinar where we share and discuss the following:

    * - What are the key components to automate in incident management to enable GDPR compliance.

    * - Four important questions a CISO or Manager must ask to manage an incident successfully.

    * - Understand Process Automation for Incident Orchestration.

    * - How you can, using the technology and processes, build a lean, effective and knowledge Security team with or without a Security Operations Centre.

    * - Data Protection and Incident Response for the non-technical manager.

    * - How and why it's critical that middle and senior management, working with technical teams, get involved in delivering effective cyber incident planning & response.
  • (ISC)2 Managing Director EMEA Adrian Davis Insights with Cyber Leaders Recorded: Feb 20 2017 41 mins
    Amar Singh - Cyber Management Alliance
    (ISC)2 Managing Director EMEA Adrian Davis talks to Amar Singh about his top tips for CISSP aspirants and about hs personal journey and how he made it.
  • Taming the "God" User Recorded: Feb 16 2017 60 mins
    Amar Singh and Joseph Carson
    Privileged IT users hold significant power in an organisation. They can delete, change or read emails and create, reset or change user accounts amongst other things. In many cases the privileged user can easily bring a business to its knees.

    Businesses may be aware of the scale of the privileged insider threat but efficiently managing these users often remains an aspiration. Join Amar Singh in this interactive webinar as he talks to privileged management expert Joseph Carson and discusses how you can expertly manage your privileged users.

    Cyber Management Alliance's webinars are highly interactive and have a higher than normal user interaction during the webinar. So, sign-up now and take this opportunity to ask, learn and share.
  • Privileged Access Management Executive Interview Jackson Shaw from Dell Recorded: Jan 28 2017 7 mins
    Jackson Shaw Senior Director, Product Management, Identity & Access Management at Dell
    We interviewed Jackson Shaw; Senior Director, Product Management, Identity & Access Management at Dell and delved further into the topic of Privileged Access Management.
  • CISSP Exam Strategies Recorded: Jan 11 2017 38 mins
    Amar Singh Cyber Management Alliance
    An exclusive interview with CISSP trainer Abhi G about his top tips for preparing for the CISSP exam. Download the CISSP Exam Plan worksheet from the attachments section on this page.
  • Insights with Cyber Leaders - Eugene Kaspersky Recorded: Jan 10 2017 24 mins
    Amar Singh Cyber Management Alliance
    An exclusive interview with Kaspersky Lab founder and CEO Eugene Kaspersky. Find out about how Eugene made it and his thoughts about the future of cyber security. The first in the series of Insights with Cyber Leaders videos created by Cyber Management Alliance featuring our CEO Amar Singh.
  • Threat intelligence and predictions for 2017 with Kaspersky Lab Recorded: Jan 6 2017 60 mins
    Amar Singh
    Join us to learn about the top predictions for 2017, as identified by Kaspersky Lab's Global Research & Analysis Team (GReAT). Gain the latest intelligence on the threat landscape and our predictions for 2017

    We face a future of increasingly subtle and sophisticated threat factors; a world where traditional clues and indicators are no longer enough on their own to identify and block attacks; where information is wielded as a weapon, misdirection is king, and global networks of connected devices can be used to paralyse the Internet. What does this mean for business in 2017?

    Kaspersky Lab UK's Principal Security Researcher, David Emm, shall present the Who, What, How and Why in Kaspersky Lab's predictions for 2017 and explain how they will affect the cyber-security landscape throughout the year.

    - Who: The business sectors we predict will be particularly targeted in 2017 and who will attack them.

    - What: The data, behaviour and habits that will expose businesses to increasingly sophisticated threat factors.

    - How: The technical methods through which businesses will be targeted.

    - Why: What Kaspersky predict to be the endgame of 2017's cyber-criminals.

    Hosted by Amar Singh
  • Designing the Foundations of a Secure Organisation - Cyber Management Alliance Recorded: Jan 3 2017 58 mins
    Amar Singh - Cyber Management Alliance
    There are almost 300 controls you could review and select for this year or you can view this webinar and hear what the experts have to say about the most essential controls and how to use them to lay the foundations of a secure resilient business. Let's design a more secure 2017 together.
  • Sandro Bucchianeri - Insights with Cyber Leaders Recorded: Nov 26 2016 21 mins
    Amar Singh - Cyber Management Alliance
    A fascinating interview with former CISO of Investec and current Group CSO of National Bank of Abhu Dhabi Sandro Bucchianeri. Sandro covers some interestinginsights into his career and issues CISO's face.
  • Saqib Chaudhry CISO - Podcasts with Cyber Leaders Recorded: Nov 15 2016 11 mins
    Amar Singh - Cyber Management Alliance
    Saqib Chaudhry CISO Cleveland Clinic in Abhu Dhabi discusses Information Security Awareness on the latest edition of Podcasts with Cyber Leaders - Global practitioners sharing opinions and perspectives on Cyber Security & Data Privacy. Brought to you by Cyber Management Alliance.
  • Raj Samani CTO EMEA Intel Security - Insights with Cyber Leaders Recorded: Nov 15 2016 34 mins
    Amar Singh - Cyber Management Alliance
    A fascinating interview with a true Cyber Leader in Raj Samani. Raj says it how its is! A must watch for all information security professionals.
  • Todd Bell CISO - Podcasts with Cyber Leaders Recorded: Nov 15 2016 8 mins
    Amar Singh - Cyber Management Alliance
    Todd Bell CISO discusses Information Security Awareness on the latest edition of Podcasts with Cyber Leaders - Global practitioners sharing opinions and perspectives on Cyber Security & Data Privacy. Brought to you by Cyber Management Alliance.
  • Dr Daniel Dresner - Podcasts with Cyber Leaders Recorded: Nov 10 2016 10 mins
    Amar Singh - Cyber Management Alliance
    Podcasts with Cyber Leaders - Global practitioners sharing opinions and perspectives on Cyber Security & Data Privacy. Brought to you by Cyber Management Alliance.
  • Data Protection & Incident Response - Interactive Recorded: Nov 9 2016 88 mins
    Amar Singh - Cyber Management Alliance
    Have your say and share your experience and expertise in this highly interactive incident response workshop, titled Cyber Incident Planning & Response or CIPR. The CIPR workshop will deconstruct the prevailing approach to planning, incident response and the wider field of incident management and identify where and how you can improve and build a more resilient business. This is your chance to get involved and learn from your peers and contribute your own thoughts and opinions in this highly interactive workshop.

    Note: This is not your typical webinar where one, two or three sparks stand on the podium and proclaim their mastery. Rather, Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
  • Podcasts with Cyber Leaders - Andrew Rose CISO Recorded: Oct 31 2016 11 mins
    Amar Singh
    Podcasts with Cyber Leaders - Global practitioners sharing opinions and perspectives on Cyber Security & Data Privacy. Brought to you by Cyber Management Alliance.
  • Insights with Cyber Leaders - Eugene Kaspersky Recorded: Oct 31 2016 24 mins
    Eugene Kaspersky
    An exclusive interview with Kaspersky Lab founder and CEO Eugene Kaspersky. Find out about how Eugene made it and his thoughts about the future of cyber security. The first in the series of Insights with Cyber Leaders videos created by Cyber Management Alliance featuring our CEO Amar Singh.
  • Free CISSP Training Class Recorded: Jun 23 2016 98 mins
    Cyber Management Alliance
    Free to view CISSP Identity and Access Management training. Learn from our CISSP expert trainer and practitioner, watch how he breaks everything down into easy to understand sections. This video covers

    Identity and Access Management (Controlling Access and Managing Identity)
    Physical and logical assets control
    Identification and authentication of people and devices
    Identity as a service (e.g. cloud identity)
    Third-party identity services (e.g. on-premise)
    Access control attacks
    Identity and access provisioning lifecycle (e.g. provisioning review)
    The CISSP candidate must have at least 5 years of paid full-time experience in 2 or more of the above (ISC)² CISSP CBK® domains to be recognised as a full CISSP. Those candidates with less than 5 years experience will be able to become CISSP Associates upon passing the exam. Candidates may receive a one year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience.

    What if I don't have the required experience?
    If you don't have the experience you can become an Associate of (ISC)² by successfully passing the CISSP exam. You'll then have 6 years to earn your experience to become a CISSP.
  • Infosecurity 2016: Cyber Security Doesn't End with the Tech Recorded: Jun 14 2016 6 mins
    Amar Singh, Founder & CEO of Cyber Management Alliance and Give01Day.com & Josh Downs, BrightTALK
    - Infosecurity Europe 2016 -

    BrightTALK favourite Amar Singh swung by the booth at Infosecurity Europe to give his thoughts on the information security world.

    Amar discussed the encryption industry and how much influence the Apple iPhone unlock has been; cyber security in financial services and the improvements that need to be made to better protect peoples' data and money; protecting the IoT and the current landscape of threat actors.
  • Secure Mobility: How to Best Protect Your Data Recorded: May 24 2016 57 mins
    Florian Malecki, Dell SonicWALL & Amar Singh, Founder and CEO, Cyber Management Alliance
    Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.

    Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
View our exclusive "Insights with Cyber Leaders Series" and webinars
Cyber Management Alliance presents an exciting series of interviews with International Cyber Security Leaders. Want to know what they look for when hiring for their teams? Want to know the secrets to their success and what keeps them awake at night? Theses exclusive interviews are presented by industry thought leader and Chair of ISACA's UK Security Advisory Group and Global CISO Amar Singh. Series but humours and light hearted interviews. See the leading figures in Cyber Security like you've never seen them before. From Eugene Kaspersky to CTO HP Enterprise and CTO of Intel Security we have an amazing line up. Subscribe for updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Video Panel: The Growing Danger of Advanced Threats
  • Live at: Mar 18 2015 3:30 pm
  • Presented by: Jason Steer, FireEye; Raj Samani, McAfee; Amar Singh, Give01Day, James Hatch, BAE Systems & Lindley Gooden (moderator)
  • From:
Your email has been sent.
or close