Hi [[ session.user.profile.firstName ]]

Threat intelligence and predictions for 2017 with Kaspersky Lab

Join us to learn about the top predictions for 2017, as identified by Kaspersky Lab's Global Research & Analysis Team (GReAT). Gain the latest intelligence on the threat landscape and our predictions for 2017

We face a future of increasingly subtle and sophisticated threat factors; a world where traditional clues and indicators are no longer enough on their own to identify and block attacks; where information is wielded as a weapon, misdirection is king, and global networks of connected devices can be used to paralyse the Internet. What does this mean for business in 2017?

Kaspersky Lab UK's Principal Security Researcher, David Emm, shall present the Who, What, How and Why in Kaspersky Lab's predictions for 2017 and explain how they will affect the cyber-security landscape throughout the year.

- Who: The business sectors we predict will be particularly targeted in 2017 and who will attack them.

- What: The data, behaviour and habits that will expose businesses to increasingly sophisticated threat factors.

- How: The technical methods through which businesses will be targeted.

- Why: What Kaspersky predict to be the endgame of 2017's cyber-criminals.

Hosted by Amar Singh
Recorded Jan 6 2017 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amar Singh
Presentation preview: Threat intelligence and predictions for 2017 with Kaspersky Lab

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Demo Hardening Windows Server 2016 in Just 10 Minutes Jul 20 2018 1:00 pm UTC 60 mins
    Amar Singh, Chris Payne
    “If you are not hardening your systems you deserve to be breached” Amar Singh.

    It’s a chore but operating systems have to be hardened, secured and configured correctly to ensure they are not the “lowest hanging fruit” in the organisation. Furthermore, you can’t just harden your system once, you must continuously monitor and baseline it against common standards. The CIS or Centre for Internet Security is a leading non-profit organisation that provides a wide array of baseline guides for securing various systems.

    Join Amar Singh, Chris Payne and other experts in this informative and interactive webinar where they discuss:

    - How you can benchmark and configure a Windows Server 2016 OS
    - Automate: The simple steps you can take to monitor and ensure consistency over the lifecycle of the system
    - Create useful management friendly reports that demonstrate compliance and value

    Register for this webinar today to see the live demo on how we baseline and configure a Windows Server 2016
  • Fed Up of File Integrity Monitoring? Strategies & products to make FIM work Jul 6 2018 12:00 pm UTC 60 mins
    Amar Singh, Chris Payne
    Industry giants take their dominant position for granted and often ignore client requests for improvement and innovation. Given that the FIM or file integrity monitoring industry has seen little innovation over the last decade, Chris Payne and Amar Singh sit down to explore alternatives.

    Join Amar Singh, Chris Payne and experts in this informative and interactive webinar where they discuss:

    - The current FIM landscape, its importance and relevance.
    - The challenges that organisations are facing in the operational life-cycle.
    - Why VISA Europe, Walmart, Bank of China and JetBlue are exploring alternative options.
    - How you can see an instant reduction in operational costs by up to 70%.

    Register for this webinar today.
  • The Day We Weaponised a Sleeper APT Recorded: Jun 15 2018 51 mins
    Amar Singh; Fleming Shi; Jonathan Tanner
    It’s not everyday you get the inside story on how a group of cybersecurity researchers stumbled upon an APT, an advanced persistent threat, when they were examining the intelligence data from their security kit.

    It appeared harmless and boring but of advanced attributes. But Fleming Shi and Jonathan Tanner suspected something was amiss.

    Facilitated by Amar Singh, practising CISO, on this exclusive webinar as he unpicks what Fleming and Jonathan did next. Their curiosity got the better of them and they set about tinkering to discover the true intentions of this benign malware.
  • [Webcam Panel] Trends Discussed at Infosecurity Europe 2018 Recorded: Jun 13 2018 57 mins
    Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance) | Danny Eastman (Cyber Fortified) | Paul Simmonds (CSA)
    Join this post-conference panel for an in-depth look into the biggest trends and cyber threats covered during the Infosecurity Europe 2018 conference in London.

    Tune in for an interactive Q&A panel with industry experts as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches
  • Improving Security & Data Breach Response Recorded: Jun 7 2018 45 mins
    Amar Singh, Darren Thomson, Giampiero Nanni, and George Patsis
    How are CISOs staying on top of the latest cyber threats? Where should enterprises be investing their cybersecurity budgets? What should you do in the event of a data breach? Get the tactical insights on how to protect your organization before, during, and after a data breach.

    Join top security experts to get the answer to these questions and more:
    - The biggest trends from the 2018 threatscape
    - What to do if there is a data breach
    - The data breach checklist
    - Cyber risk management
    - Building a cyber resilient enterprise

    Speakers:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Darren Thomson, Chief Technology Officer, EMEA Region, Symantec
    - Giampiero Nanni, Government Affairs, EMEA, Symantec
    - George Patsis, CEO, Obrela Security Industries

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Data Breaches, Identity & Security Recorded: Jun 6 2018 45 mins
    Amar Singh (CMA) | Barry Scott (Centrify) | Nick Bilogorskiy (Juniper Networks) | Raef Meeuwisse
    Data breaches are on the rise, affecting millions of people around the world. With personal information exposed to cyber criminals and up for sale, the impact of a breach can continue to haunt its victims for months, and even years to come.

    Join top security experts for this interactive Q&A panel as they discuss:
    - The current (broken) state of security and the role identity plays in cyber-attacks
    - Zero trust framework: Guiding principles and paradigms
    - The massive rethink underway that redefines security to follow identity
    - What you can do today to adopt a Zero Trust model and reduce risk through the power of next-gen access
    - Recommendations for prevention of data breaches

    Panelists:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Barry Scott, CTO – EMEA, Centrify
    - Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
    - Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Breaking the Internet - Takedown Strategies Used by Cyber Criminals Recorded: May 31 2018 61 mins
    Amar Singh
    Following on from our oversubscribed webinar on March 23rd, we bring you another information packed and educational webinar on how cyber criminals can take down the whole Internet.

    It's surprisingly simple and powerful!

    One technique in particular can completely knock-off the Internet! You have to listen in to believe it. The simplicity and success rate is high and it’s no wonder organisations keep getting compromised.

    Click here to register.

    Panelists:

    - Amar Singh - Practising CISO and Founder Wisdom of Crowds, Cyber Management Alliance Ltd
    - Gavin Rawson, Technology Lead from the awesome Nominet.
    - Naush - DV Cleared, Cyber Criminologist, Dark web researcher & master ethical hacker
  • Shaping the Future of Cloud Security Recorded: May 9 2018 56 mins
    Amar Singh | Raef Meeuwisse | Paul Dignan | Chris Munday
    Tune in for an interactive discussion with cloud and security experts on the key trends shaping enterprise cloud strategy, explore the latest technological advancements, and discover how to better secure your critical data and workflows in the cloud.

    Join top cloud and security experts for this interactive Q&A discussion on:
    - The top cloud trends in 2018
    - Advanced security reporting & analysis
    - Minimizing your risk and reducing your attack surface
    - Recommendations for improved security
    - The future of cloud

    Speakers:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Raef Meeuwisse, CISM, CISA, Author of "Cybersecurity for Beginners"
    - Paul Dignan, Application Delivery, Networking and Security Expert, F5 Networks
    - Chris Munday, Senior Systems Engineer and cloud expert, Palo Alto Networks

    The session will be broadcast LIVE from the AWS Summit in London.
  • Leveraging Threat Hunting To Investigate Advanced Threats Recorded: May 3 2018 47 mins
    Amar Singh, Damien Townsend
    Warning - this is a technical webinar.

    The reality: Many organizations have information security protections in place that still fail to reliably answer the question: "Have we already been compromised?". A truly advanced and persistent threat could be hiding in areas of your network, systems or devices and harvesting information for extended periods of time, undetected by security software and unnoticed by an untrained eye.

    Join us to
    * -See a Live Demo of actual tools used to detect, analyse and hunt down advanced malware.
    - Understand how advanced threats evade detection
    - Get a clear understanding of exactly how threat hunting works
    - Learn how you can begin threat hunting in your organisation.
    * -Ask and interact with the specialists in threat analysis.

    Following on from our successful webinar titled A Day in the Life of a Threat Analyst, we bring you another informational and educational webinar on how an experienced threat analyst goes about investigating an advanced threat and the tools he/she would use to detect, analyse, hunt and remediate.

    Join Amar Singh, CEO and globally acknowledged CISO along with Damien Townsend, deeply experienced senior security analyst and threat hunter on this interactive webinar.
  • [Panel] Building Effective Cyber Defense Recorded: Apr 25 2018 58 mins
    Amar Singh (Cyber Management Alliance) | Simon Moor (FireEye) | Bob Honour (SonicWall)
    With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Why breach prevention matters
    - True costs of breaches
    - Technological solutions to consider for a more cyber resilient enterprise
    - How AI/machine learning and human talent can work together
    - Top threats to look out for in 2018

    Speakers:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Simon Moor, VP for Northern Europe, FireEye
    - Bob Honour, EMEA Marketing Director, SonicWall
  • Live Demo Cloud Security - Fixing the Fundamentals Recorded: Mar 30 2018 52 mins
    Amar Singh, Klaus Gheri
    Live demo of how to Dynamically Secure Cloud Infrastructure.

    The title says it all folks - we are going to talk about what's broken in the cloud and do a demo of why it is so easy to break down the current security infrastructure that most companies deploy in the cloud.

    Join me, Amar Singh and other specialists including

    - Amar Singh - CEO & Founder, Wisdom of Crowds and Cyber Management Alliance
    - Klaus Gehri - Specialist Cloud Security, VP Barracuda
  • First – Fix the Plumbing - What’s broken in cyberspace and How to Fix it Recorded: Mar 23 2018 57 mins
    Amar Singh, Adam Gladsden
    Way back in 2000 it was common practice to spend considerable time configuring and tinkering the plumbing of what we today call cyberspace. The technology was embryonic, immature and often hours were spent ensuring nothing broke and that the business operations carried on smoothly.

    Today, those flaky technologies are settled and stable.
    - AI and Machine Learning are the focus of marketing teams.
    - Everyone keeps focusing on NG or next generation technology.
    - If not technology, we keep blaming the human!

    Today, surely, the technical plumbing, the boring stuff is secure and stable, correct?

    Think again.

    In this webinar we explore the bedrock technologies underpinning cyberspace and discuss why we need to focus on understanding and securing them.

    Panelists -

    - Amar Singh - CEO and Founder Wisdom of Crowds, Cyber Management Alliance Ltd
    - Adam Gladsden - SME cybersecurity technologies.
    - NH - DV Cleared, Cyber Criminologist, Dark web researcher & master ethical hacker
  • GDPR Is Coming - Is Your Organization Ready? Key Steps to Help You Prepare Recorded: Feb 21 2018 60 mins
    Amar Singh, Guy Cohen, Dr.Rula Saya, Punit Bhatia
    On May 25 the long-awaited General Data Protection Regulation (GDPR) will go into effect across Europe. GDPR is the biggest overhaul of data protection laws in more than two decades. How prepared is your organization for GDPR?

    Join this interactive panel of experts as they discuss:
    - What is GDPR?
    - Why should you be GDPR-compliant?
    - How to achieve compliance?
    - Steps your organization should take today to prepare for GDPR
    - Other GDPR considerations

    Panelists

    Amar Singh - CEO, Cyber Management Alliance Ltd
    Dr Rula Sayaf - PhD in privacy, security, and data science, GDPR Expert
    Punit Bhatia, DPO and author - be ready for GDPR.
    Guy Cohen, Strategy and Policy Lead, Privitar
    Mark Leiser - Lecturer in Law, University of Leicester
  • 2018 - The Best Year for Cyber Criminals. Period Recorded: Jan 19 2018 76 mins
    Amar Singh, Wieland Alge, Ramses Gallego, Mark Grantz, Tushar Vartak
    Meltdown and Spectre have set the scene for 2018 and make attending our webinar even more of an imperative. This year is going to see it all and we have top panellists and audience members joining. The US Secret Service’s Mark Grantz, Middle East’s top Cybersecurity executive, Tushar Vartak, Europes most recognised Cybersecurity and AI visionary Ramses Gallego, Cybersecurity SME Wieland Alge, a NATO cleared hacker and of course, your very own Amar Singh, CISO and co-founder of Wisdom of Crowds and Cyber Management Alliance Ltd.

    Join the debate, Share your opinions and hear a wide range of experts share their experience and insights.

    Cyber Management Alliance brings you our interactive and educational webinar, inaugurating the new year with an exclusive webinar on what to expect, how and what the criminals are going to do (or not do) and what you can do to protect yourself.

    Yes, we know GDPR is around the corner, but we believe there is much more ahead than just privacy concerns.
  • Insights with Cyber Leaders - Jay Bavisi- founder and CEO of EC Council Recorded: Jan 8 2018 14 mins
    Amar Singh
    Amar Singh, CEO and co-founder of Cyber Management Alliance, sat down with Jay Bavisi, founder and CEO of EC Council to find out more about his early career, how he started EC Council and developed their Certified Ethical Hacker program, the challenges facing CISOs in business today, and why it’s not just about technical skills.
  • Jack Daniel from Tenable Network Security and co-founder of BSides Security Recorded: Dec 4 2017 27 mins
    Amar Singh
    Cyber Management Alliance, had the pleasure of talking to Jack Daniel from Tenable Network Security and co-founder of BSides Security, about how he started in information security, why he believes it’s important to engage and share information within communities and, if you’re looking to enter the information security industry, how to make your achievements discoverable to a potential employer.
  • Hariprasad Chede - Insights with Cyber Leaders Recorded: Nov 26 2017 17 mins
    Amar Singh Cyber Management Alliance and Hariprasad Chede President ISACA UAE
    Amar Singh, CEO and co-founder of Cyber Management Alliance, had the pleasure of chatting to Hariprasad Chede, Vice President of ISACA UAE Chapter and CISO in the finance sector, about the CISO role, the importance of threat intelligence for businesses today, and his desire for more account aggregation with valued feedback in the finance sector.
  • [Panel] Defending Against the Evolving Cyber Threat Landscape in 2018 Recorded: Nov 15 2017 60 mins
    Amar Singh, Cyber Management Alliance | Stuart Davis, Mandiant | Ed Tucker, DPG | Dharminder Debisarun, Palo Alto Networks
    2017 was the year of cyber attacks and high profile data breaches. Discover what cyber security professionals should be focusing on in order to secure their organizations in 2018.

    This interactive Q&A panel will discuss:
    - The trends shaping the cyber threat landscape in 2018
    - Lessons from the biggest cyber events of the year
    - Recommendations for CISOs on securing the enterprise in an age of frequent and persistent attacks
    - The technological advancements in the fight against cyber criminals and the processes organizations need to have in place to enable their security teams

    Speakers:
    - Amar Singh, Cyber Management Alliance
    - Stuart Davis, Director, Global Services & Intelligence Europe, Middle East & Africa at Mandiant
    - Edward Tucker, CIO, DP Governance
    - Dharminder Debisarun, Industry Security Architect, Palo Alto Networks
  • Former FBI Agent Steve Bongardt - Insights with Cyber Leaders - Recorded: Nov 1 2017 19 mins
    Amar Singh CEO Cyber Management Alliance
    Steve Bongardt, retired FBI agent, took time out recently to talk to Amar Singh from Cyber Management Alliance as part of their exclusive Insights With Cyber Leaders series. Steve opened up about his early career in the Navy and multiple applications to become an FBI agent, the impact of cyber security on his time as an agent, and one of his favourite interview tactics that he likes to use on potential employees.
  • [Panel] Protecting Data in the Next Generation of the Cloud Recorded: Oct 25 2017 58 mins
    Amar Singh (Cyber Management Alliance); Klaus Gheri (Barracuda Networks), Daniele Catteddu (CSA)
    Cloud computing is an increasingly vital element of information security. It’s used to protect sensitive data; for identity and access management; for network security and to aid with incident response. However it’s not without it’s own set of risks and has been hit in the past with significant and newsworthy breaches.

    Join this interactive Q&A panel with top cloud and security experts as they discuss the future of the cloud and considerations to take for protecting sensitive data when it's held in the Cloud.

    Moderator:
    - Amar Singh, Cyber Management Alliance

    Speakers:
    - Daniele Catteddu, CTO, Cloud Security Alliance
    - Klaus Gheri, VP and GM, Network Security, Barracuda Networks
View our exclusive "Insights with Cyber Leaders Series" and webinars
Cyber Management Alliance presents an exciting series of interviews with International Cyber Security Leaders. Want to know what they look for when hiring for their teams? Want to know the secrets to their success and what keeps them awake at night? Theses exclusive interviews are presented by industry thought leader and Chair of ISACA's UK Security Advisory Group and Global CISO Amar Singh. Series but humours and light hearted interviews. See the leading figures in Cyber Security like you've never seen them before. From Eugene Kaspersky to CTO HP Enterprise and CTO of Intel Security we have an amazing line up. Subscribe for updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Threat intelligence and predictions for 2017 with Kaspersky Lab
  • Live at: Jan 6 2017 3:15 pm
  • Presented by: Amar Singh
  • From:
Your email has been sent.
or close