Hi [[ session.user.profile.firstName ]]

Ashely Madison Hack: how to regain lost trust

We caught up with Amar Singh for his thoughts on the Ashley Madison hack and his suggestions for how to rebuild trust and visibly strengthen security for a shaken customer base...
Recorded Jul 22 2015 3 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amar Singh, Founder, CEO of Cyber Management Alliance and Give01Day.com
Presentation preview: Ashely Madison Hack: how to regain lost trust

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The 2017 Threatscape Dec 6 2016 3:00 pm UTC 45 mins
    Amar Singh
    There is only one threat that you need to fight and conquer in 2017. We can write a few lines about how threats are changing or about the dynamic threat landscape. However, let’s spare you the pain of reading the same old blurb and instead let’s do the right thing and share with you the one single, biggest threat facing every single business. It’s been around forever however in 2017 exploiting this threat is most certainly going to cause increased financial pain and reputation damage.

    Join Amar Singh, CEO of Cyber Management Alliance and founder of the Insights with Cyber Leaders series and other distinguished cyber leaders as they lay bare the severity of this threat.

    Note: 30 Minutes webinar only with 15 minutes of interactive questions from the audience at the end.
  • Data Protection & Incident Response Nov 9 2016 2:00 pm UTC 60 mins
    Amar Singh
    Have your say and share your experience and expertise in this highly interactive incident response workshop, titled Cyber Incident Planning & Response or CIPR. The CIPR workshop will deconstruct the prevailing approach to planning, incident response and the wider field of incident management and identify where and how you can improve and build a more resilient business. This is your chance to get involved and learn from your peers and contribute your own thoughts and opinions in this highly interactive workshop.

    Note: This is not your typical webinar where one, two or three sparks stand on the podium and proclaim their mastery. Rather, Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
  • Free CISSP Training Class Recorded: Jun 23 2016 98 mins
    Cyber Management Alliance
    Free to view CISSP Identity and Access Management training. Learn from our CISSP expert trainer and practitioner, watch how he breaks everything down into easy to understand sections. This video covers

    Identity and Access Management (Controlling Access and Managing Identity)
    Physical and logical assets control
    Identification and authentication of people and devices
    Identity as a service (e.g. cloud identity)
    Third-party identity services (e.g. on-premise)
    Access control attacks
    Identity and access provisioning lifecycle (e.g. provisioning review)
    The CISSP candidate must have at least 5 years of paid full-time experience in 2 or more of the above (ISC)² CISSP CBK® domains to be recognised as a full CISSP. Those candidates with less than 5 years experience will be able to become CISSP Associates upon passing the exam. Candidates may receive a one year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list, thus requiring four years of direct full-time professional security work experience.

    What if I don't have the required experience?
    If you don't have the experience you can become an Associate of (ISC)² by successfully passing the CISSP exam. You'll then have 6 years to earn your experience to become a CISSP.
  • Infosecurity 2016: Cyber Security Doesn't End with the Tech Recorded: Jun 14 2016 6 mins
    Amar Singh, Founder & CEO of Cyber Management Alliance and Give01Day.com & Josh Downs, BrightTALK
    - Infosecurity Europe 2016 -

    BrightTALK favourite Amar Singh swung by the booth at Infosecurity Europe to give his thoughts on the information security world.

    Amar discussed the encryption industry and how much influence the Apple iPhone unlock has been; cyber security in financial services and the improvements that need to be made to better protect peoples' data and money; protecting the IoT and the current landscape of threat actors.
  • Secure Mobility: How to Best Protect Your Data Recorded: May 24 2016 57 mins
    Florian Malecki, Dell SonicWALL & Amar Singh, Founder and CEO, Cyber Management Alliance
    Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.

    Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
  • Insights with Cyber Leaders Recorded: Apr 22 2016 3 mins
    Amar Singh
    It's no secret that there is massive shortage of skilled professionals in all cyber related fields including technical and managerial. The experience and knowledge of senior executives in the fields of cyber security, governance, risk and compliance are noteworthy and we feel that sharing that experience would benefit those who seek knowledge and guidance and those who want to better themselves and uplift their careers

    Our Free to Access Insights with Cyber Leaders series features exclusive interviews with some of the most renowned Cyber Security Executives from around the globe.
  • The TalkTalk Breach - What's to be learnt? Recorded: Oct 26 2015 2 mins
    Amar Singh, Founder, CEO of Cyber Management Alliance and Give01Day.com
    We caught up with Amar Singh to get his thoughts on the TalkTalk breach, what the company can do to restore faith and the steps security professionals should take, to avoid the same thing happening to their organisation.
  • Ashely Madison Hack: how to regain lost trust Recorded: Jul 22 2015 3 mins
    Amar Singh, Founder, CEO of Cyber Management Alliance and Give01Day.com
    We caught up with Amar Singh for his thoughts on the Ashley Madison hack and his suggestions for how to rebuild trust and visibly strengthen security for a shaken customer base...
  • Infosecurity Europe 2015: Amar Singh, ISACA Recorded: Jun 10 2015 3 mins
    Amar Singh, Chair of Security Group, ISACA & Josh Downs, Senior Community Associate, BrightTALK
    Infosecurity Europe 2015: Amar Singh, ISACA
  • Video Panel: The Growing Danger of Advanced Threats Recorded: Mar 18 2015 58 mins
    Jason Steer, FireEye; Raj Samani, McAfee; Amar Singh, Give01Day, James Hatch, BAE Systems & Lindley Gooden (moderator)
    We’re excited to announce that we’re broadcasting a LIVE VIDEO panel discussion, focused on the growing danger of advanced threats.

    We’ve arranged four of the industry’s leading thinkers for this in-depth debate focused on the current threatscape, the industry's ATP trends and suggestions for effective breach prevention in 2015.


    -> Jason Steer, Chief Security Strategist EMEA, FireEye

    -> Raj Samani, VP & EMEA CTO, McAfee

    -> Amar Singh, Founder, Give01Day

    -> James Hatch, Head of Cyber Services, BAE Systems Applied Intelligence

    -> Lindley Gooden (moderator), Managing and Creative Director, Greenscreen

    The four thought leaders will be discussing the following ATP questions:

    > Which factors define an advanced threat?

    > How have advanced threats evolved over the last year?

    > What key suggestions could be made looking ahead to deal with advanced threats?

    > How can security professionals better adapt their organisations defences to deal with the current threatscape?

    This is a blockbuster panel, filmed and broadcast live as part of the Advanced Threat Protection Summit. Tune in and listen to four of the industry’s leading thinkers, discuss the key issues keeping security professionals up at night.

    All the panelists will also be available for 20 minutes of audience Q&A at the end. We look forward to seeing you join the debate!
  • What is Your Primary Cyber Security Concern for 2015? Recorded: Dec 17 2014 3 mins
    Amar Singh, Founder, Cyber Management Alliance; Mikko Hypponen, Chief Research Officer, F-Secure & EJ Hilbert, MD UK, Kroll
    2014 has been a bumper year for information security. Many of you will have begun now looking at your security strategy for the New Year. To help, here’s three of the industry’s top thinkers, giving you their opinion on what’ll be keeping them up at night in 2015...
View our exclusive "Insights with Cyber Leaders Series" and webinars
Cyber Management Alliance presents an exciting series of interviews with International Cyber Security Leaders. Want to know what they look for when hiring for their teams? Want to know the secrets to their success and what keeps them awake at night? Theses exclusive interviews are presented by industry thought leader and Chair of ISACA's UK Security Advisory Group and Global CISO Amar Singh. Series but humours and light hearted interviews. See the leading figures in Cyber Security like you've never seen them before. From Eugene Kaspersky to CTO HP Enterprise and CTO of Intel Security we have an amazing line up. Subscribe for updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ashely Madison Hack: how to regain lost trust
  • Live at: Jul 22 2015 2:45 pm
  • Presented by: Amar Singh, Founder, CEO of Cyber Management Alliance and Give01Day.com
  • From:
Your email has been sent.
or close