Hi [[ session.user.profile.firstName ]]

2018 - The Best Year for Cyber Criminals. Period

Meltdown and Spectre have set the scene for 2018 and make attending our webinar even more of an imperative. This year is going to see it all and we have top panellists and audience members joining. The US Secret Service’s Mark Grantz, Middle East’s top Cybersecurity executive, Tushar Vartak, Europes most recognised Cybersecurity and AI visionary Ramses Gallego, Cybersecurity SME Wieland Alge, a NATO cleared hacker and of course, your very own Amar Singh, CISO and co-founder of Wisdom of Crowds and Cyber Management Alliance Ltd.

Join the debate, Share your opinions and hear a wide range of experts share their experience and insights.

Cyber Management Alliance brings you our interactive and educational webinar, inaugurating the new year with an exclusive webinar on what to expect, how and what the criminals are going to do (or not do) and what you can do to protect yourself.

Yes, we know GDPR is around the corner, but we believe there is much more ahead than just privacy concerns.
Recorded Jan 19 2018 76 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amar Singh, Wieland Alge, Ramses Gallego, Mark Grantz, Tushar Vartak
Presentation preview: 2018 - The Best Year for Cyber Criminals. Period

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Saving Money and Stopping Cyber Attacks - 3 Simple Steps for the Small Business Nov 14 2018 12:15 pm UTC 60 mins
    Amar Singh; Steve Vickers
    Are you open minded to saving money and ensuring that your business is better protected from cyber criminals at the same time? Join Amar Singh and Steve Vickers as they discuss a simple checklist for charities and small businesses. A non-technical discussion, we layout step by step guidance on what you can do:

    - To save money on your current IT and security investments
    - To ensure your third party is delivering the right level of security and service
    - Increase your operational efficiency and lower total cost of operations.
  • How to break a PCI Compliant Application Oct 31 2018 2:00 pm UTC 75 mins
    Amar Singh, Aatish Pattni, Karsten Desler
    ** Warning - This webinar is only for informational purposes. We do not condone or encourage any malicious activity. The knowledge you gain from this webinar should be used to protect your own infrastructure and web applications. **

    PCI-DSS needs no introduction. The Payment Card Industry Data Security Standard applies to any organisation accepting credit card details in some way or the other. This webinar is going to share some of the latest techniques cyber criminals are using to break web applications.

    Join us to learn how they are doing this and what you should do to protect your organisation and compliance status.
  • Five Absolute Must-Haves for AWS, Azure, Google Cloud and Others Recorded: Oct 22 2018 57 mins
    Anmol Anand Amar Singh, Chris Payne
    The great migration to the cloud is in full swing and almost every organisation is getting involved.

    Whether it be virtual infrastructure, email services or collaboration tools, the benefits of the cloud, such as better availability and lower costs are being embraced universally.

    But what about security?

    In this webinar, several experts, including Anmol Anand, Amar Singh and Chris Payne will discuss their absolute security must-haves for cloud adoption.

    Topics covered:

    - Secure configuration management and benchmarking.
    - File storage and data transfer.
    - Alerting and incident response.
    - Authentication and identity management.

    Don't miss this exciting and informative webinar!
  • Implementing a Cloud Ready Software Defined WAN - Challenges & Opportunities Recorded: Oct 18 2018 61 mins
    Amar Singh; Steve Vickers
    With the explosion of cloud-based cloud ready applications, many organisations struggle with optimising application performance for cloud or hybrid environments. The culprit, in many cases, is the connectivity from the offices to the cloud. The wide area network, (WAN) connecting offices to the Internet and to other offices, is still playing catchup. WAN technology is stuck in the old-age.

    Think about this: Does your business, small or large, have two or more broadband connections, maybe a broadband and a dial up or some other form of Internet connectivity? Apart from the security risk of having too many Internet points of exit, your business is also wasting money and resources in managing these various connectivity channels.

    In this webinar, Amar Singh and Steve Vickers explore the problems typically faced by organisations based on the latest research and show how organisations can create a seamless and secure SD-WAN infrastructure without having to manage multiple products.
  • Insights with Cyber Leaders - Ashish Khanna Dubai Health Authority Recorded: Sep 19 2018 12 mins
    Amar Singh Cyber Management Alliance
    Amar Singh, CEO and co-founder of Cyber Management Alliance, recently had the pleasure to sit down with Ashish Khanna, information security officer at Dubai Health Authority, to briefly talk about what led Khanna to Dubai and to discuss some of the life lessons he learned along the way.
  • Creating Actionable Incident Response Playbooks + CIPR Review Recorded: Sep 18 2018 51 mins
    Amar Singh (Cyber Management Alliance)
    We do two things in this webinar - review how the UK-GCHQ Certified Training course, Cyber Incident Planning & Response or CIPR has helped organisations like the NHS and BMJ and discuss how you too can create actionable playbooks.

    This webinar will cover topics such as:
    - CIPR review - how it has helped organisations
    - How to create actionable incident response playbooks,
    - The flow and logic behind creating playbooks that work.
    - Example playbooks around GDPR and Malware

    We also discuss management playbooks along with technical content and share insights into how you can automate your playbooks.

    This playbook webinar is taken from our certified Cyber Incident Planning & Response (CIPR) workshop and we will have several past attendees sharing their experience about the workshop and how they implemented the lessons from this training.

    Robin Smith - from the NHS
    Aaron Townsend - from the BMJ

    Visit https://www.cm-alliance.com/training/cipr-cyber-incident-planning-response/ for more information
  • Insights with Cyber Leaders with Ian Glover Recorded: Sep 4 2018 32 mins
    Amar Singh and Ian Glover
    CREST president Ian Glover sat down with Amar Singh, CEO and co-founder of Cyber Management Alliance, to talk about his career and pass on some of the insights he has gained over the course of his long and fruitful career in information technology.
  • Killing Multiple Regulatory Birds with One Stone! Recorded: Aug 16 2018 51 mins
    Amar Singh, Chris Payne
    In today’s privacy oriented and highly regulated world, it can be tough being a compliance officer or an IT security manager. Balancing mandated requirements with a finite budget and limited resources may come to define these very roles.

    In this webinar, Amar Singh, Global CISO and CEO of Cyber Management Alliance; and Chris Payne, Managing Director at Advanced Cyber Solutions, will discuss how to get efficient when it comes to regulatory requirements and standards. By finding the commonalities between NIS, NIST, ISO 27001, GDPR and PCI-DSS, you can implement controls and solutions which kill multiple birds with one stone.
  • Insights with Cyber Leaders - Sanjay Khanna CIO RAKBank Recorded: Aug 12 2018 11 mins
    Amar Singh
    Amar Singh, CEO and co-founder of Cyber Management Alliance, had the pleasure of interviewing Sanjay Khanna, CIO at Rakbank in Dubai, as part of their informative Interview with Cyber Leaders series. Amar talked to Sanjay about a variety of topics, asking key questions about interview criteria, why it’s important to be prepared to take risks and step outside your comfort zone, and what excites him about the next 5 years.
  • Live Demo Hardening Windows Server 2016 in Just 10 Minutes Recorded: Aug 9 2018 32 mins
    Amar Singh, Chris Payne
    “If you are not hardening your systems you deserve to be breached” Amar Singh.

    It’s a chore but operating systems have to be hardened, secured and configured correctly to ensure they are not the “lowest hanging fruit” in the organisation. Furthermore, you can’t just harden your system once, you must continuously monitor and baseline it against common standards. The CIS or Centre for Internet Security is a leading non-profit organisation that provides a wide array of baseline guides for securing various systems.

    Join Amar Singh, Chris Payne and other experts in this informative and interactive webinar where they discuss:

    - How you can benchmark and configure a Windows Server 2016 OS
    - Automate: The simple steps you can take to monitor and ensure consistency over the lifecycle of the system
    - Create useful management friendly reports that demonstrate compliance and value

    Register for this webinar today to see the live demo on how we baseline and configure a Windows Server 2016
  • Insights with Cyber Leaders - Dhiraj Sasidharan Recorded: Jul 30 2018 19 mins
    Amar Singh
    Dhiraj Sasikaran, the former Director of information security at Dubai Holdings, which Jumairah Group is also a part of, sat down with Amar Singh in Dubai.

    Dhiraj talked about his formative years, the importance of training and passion, knowledge and training for CISOs and why it’s not just about technical skills in the ever-challenging cybersecurity sector.
  • Maximising SoC Effectiveness With Advanced Threat Intelligence Recorded: Jul 17 2018 60 mins
    Amar Singh, Peter Culley, Tushar Vartak
    Running a security operations is not a simple undertaking. It takes skilled staff, technology, processes and procedures and loads of practice. In addition, actionable contextual threat intelligence is key when it comes to ensuring the SoC and its teams are affective in early detection of attacks.

    The key word here is EARLY detection. Join Amar Singh and his special panelists as they discuss some of the key pillars of threat intelligence and how to make them work in any SoC environment.
  • Fed Up of FIM? Strategies & products to make File Integrity Monitoring work. Recorded: Jul 6 2018 45 mins
    Amar Singh, Chris Payne
    Industry giants take their dominant position for granted and often ignore client requests for improvement and innovation.

    Given that the FIM or file integrity monitoring industry has seen little innovation over the last decade, Chris Payne and Amar Singh sit down to explore alternatives.

    Join Amar Singh, Chris Payne and experts in this informative and interactive webinar where they discuss:

    - The current FIM landscape, its importance and relevance.
    - The challenges that organisations are facing in the operational life-cycle.
    - Why household names are exploring alternative FIM options.
    - How you can see an instant reduction in operational costs by up to 70%.

    Register for this webinar today.
  • The 5th Floor - Why Protecting Email Remains the Most Sensible Strategy. Recorded: Jun 28 2018 58 mins
    Amar Singh; Peter Mullens; Stefan Schachinger; Junior Birkett
    Ok, email is boring. Email is antiquated. Email is NOT dead, particularly with GDPR now in everyone's minds it remains the favourite attack vector for cyber criminals! Like it or not, if you don’t show the deserved love and attention to email, criminals will keep winning.

    No, User Education is not THE only answer. You need the right set of technologies that enable organisation to be cyber resilient.

    Join Amar Singh, practicing CISO, as he presents 'The 5th Floor - Why Protecting Email Remains the Most Sensible Strategy' and discusses with Peter, Stefan and Junior the lessons learnt and technologies available to businesses to increase their cybersecurity maturity.
  • The Day We Weaponised a Sleeper APT Recorded: Jun 15 2018 51 mins
    Amar Singh; Fleming Shi; Jonathan Tanner
    It’s not everyday you get the inside story on how a group of cybersecurity researchers stumbled upon an APT, an advanced persistent threat, when they were examining the intelligence data from their security kit.

    It appeared harmless and boring but of advanced attributes. But Fleming Shi and Jonathan Tanner suspected something was amiss.

    Facilitated by Amar Singh, practising CISO, on this exclusive webinar as he unpicks what Fleming and Jonathan did next. Their curiosity got the better of them and they set about tinkering to discover the true intentions of this benign malware.
  • [Webcam Panel] Trends Discussed at Infosecurity Europe 2018 Recorded: Jun 13 2018 57 mins
    Amar Singh (Cyber Management Alliance) | Matt Stephenson (Cylance) | Danny Eastman (Cyber Fortified) | Paul Simmonds (CSA)
    Join this post-conference panel for an in-depth look into the biggest trends and cyber threats covered during the Infosecurity Europe 2018 conference in London.

    Tune in for an interactive Q&A panel with industry experts as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches
  • Improving Security & Data Breach Response Recorded: Jun 7 2018 45 mins
    Amar Singh, Darren Thomson, Giampiero Nanni, and George Patsis
    How are CISOs staying on top of the latest cyber threats? Where should enterprises be investing their cybersecurity budgets? What should you do in the event of a data breach? Get the tactical insights on how to protect your organization before, during, and after a data breach.

    Join top security experts to get the answer to these questions and more:
    - The biggest trends from the 2018 threatscape
    - What to do if there is a data breach
    - The data breach checklist
    - Cyber risk management
    - Building a cyber resilient enterprise

    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Darren Thomson, Chief Technology Officer, EMEA Region, Symantec
    - Giampiero Nanni, Government Affairs, EMEA, Symantec
    - George Patsis, CEO, Obrela Security Industries

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Data Breaches, Identity & Security Recorded: Jun 6 2018 45 mins
    Amar Singh (CMA) | Barry Scott (Centrify) | Nick Bilogorskiy (Juniper Networks) | Raef Meeuwisse
    Data breaches are on the rise, affecting millions of people around the world. With personal information exposed to cyber criminals and up for sale, the impact of a breach can continue to haunt its victims for months, and even years to come.

    Join top security experts for this interactive Q&A panel as they discuss:
    - The current (broken) state of security and the role identity plays in cyber-attacks
    - Zero trust framework: Guiding principles and paradigms
    - The massive rethink underway that redefines security to follow identity
    - What you can do today to adopt a Zero Trust model and reduce risk through the power of next-gen access
    - Recommendations for prevention of data breaches

    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Barry Scott, CTO – EMEA, Centrify
    - Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
    - Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Breaking the Internet - Takedown Strategies Used by Cyber Criminals Recorded: May 31 2018 61 mins
    Amar Singh
    Following on from our oversubscribed webinar on March 23rd, we bring you another information packed and educational webinar on how cyber criminals can take down the whole Internet.

    It's surprisingly simple and powerful!

    One technique in particular can completely knock-off the Internet! You have to listen in to believe it. The simplicity and success rate is high and it’s no wonder organisations keep getting compromised.

    Click here to register.


    - Amar Singh - Practising CISO and Founder Wisdom of Crowds, Cyber Management Alliance Ltd
    - Gavin Rawson, Technology Lead from the awesome Nominet.
    - Naush - DV Cleared, Cyber Criminologist, Dark web researcher & master ethical hacker
  • Shaping the Future of Cloud Security Recorded: May 9 2018 56 mins
    Amar Singh | Raef Meeuwisse | Paul Dignan | Chris Munday
    Tune in for an interactive discussion with cloud and security experts on the key trends shaping enterprise cloud strategy, explore the latest technological advancements, and discover how to better secure your critical data and workflows in the cloud.

    Join top cloud and security experts for this interactive Q&A discussion on:
    - The top cloud trends in 2018
    - Advanced security reporting & analysis
    - Minimizing your risk and reducing your attack surface
    - Recommendations for improved security
    - The future of cloud

    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Raef Meeuwisse, CISM, CISA, Author of "Cybersecurity for Beginners"
    - Paul Dignan, Application Delivery, Networking and Security Expert, F5 Networks
    - Chris Munday, Senior Systems Engineer and cloud expert, Palo Alto Networks

    The session will be broadcast LIVE from the AWS Summit in London.
View our exclusive "Insights with Cyber Leaders Series" and webinars
Cyber Management Alliance presents an exciting series of interviews with International Cyber Security Leaders. Want to know what they look for when hiring for their teams? Want to know the secrets to their success and what keeps them awake at night? Theses exclusive interviews are presented by industry thought leader and Chair of ISACA's UK Security Advisory Group and Global CISO Amar Singh. Series but humours and light hearted interviews. See the leading figures in Cyber Security like you've never seen them before. From Eugene Kaspersky to CTO HP Enterprise and CTO of Intel Security we have an amazing line up. Subscribe for updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 2018 - The Best Year for Cyber Criminals. Period
  • Live at: Jan 19 2018 1:00 pm
  • Presented by: Amar Singh, Wieland Alge, Ramses Gallego, Mark Grantz, Tushar Vartak
  • From:
Your email has been sent.
or close