Hi [[ session.user.profile.firstName ]]

The Truth Behind Cybersecurity’s Biggest Lie

What the Industry Tries to Cover Up and What you Need to know.

"This is the most secure solution that you will ever need. It has Machine Learning, advanced Artificial Intelligence, block-chain and blah blah blah."

Yet, cyber-crime is increasing!

Like in other sectors, IT and cyber have their fair share of Snake-oil sellers. However, if you include the blow-out-of-proportionists and aggressive selling tactics, it gets more complicated, dangerous and sometimes leaves you with little more than unadulterated lies.

Join Amar Singh and Chris Eves from Alsid as they separate the wheat from the chaff and filter-out the noise to show you the stuff that really matters when it comes to building a cyber-resilient business.

Amar Singh is an experienced Cyber and Privacy practitioner and is the CEO of Cyber Management Alliance Ltd and the founder of Wisdom of Crowds.

Chris Eves is a Data Protection expert helping to protect enterprise organisations from cyber attacks, both internally and externally. During Chris's 10 years in IT, he has built up knowledge of Networking, Infrastructure, Backup, Data Storage and more recently Data Protection & Governance and Active Directory Cyber Security.
Recorded Nov 28 2019 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amar Singh, Chris Eves
Presentation preview: The Truth Behind Cybersecurity’s Biggest Lie

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Workshop: Creating a People Centric Cybersecurity Awareness Culture Jan 29 2020 2:00 pm UTC 75 mins
    Amar Singh, Nick Wilding
    Companies and governments continue to make significant security investments yet still find themselves vulnerable to the poor decisions people make, often by a single employee. A single click.

    This second webinar in our series will assess ways in which we can create a people-centric cybersecurity awareness program and minimise the number of mistakes that we make.

    We need to engage directly with our people and teams to identify and better understand the key issues. These include the barriers to adopting security policies, the critical security concerns of staff, customers and third parties and what would the most effective configuration of security advice and guidance look like?

    Join us as we share a blueprint showing how your cyber awareness training could work. Corporate learning in the digital age is all about enabling and supporting behaviour change and we will assess the ways in which immersive training and active employee engagement can form the backbone of your cyber awareness blueprint.


    The Panellists:

    - Nick Wilding, General Manager, Cyber Resilience, AXELOS and Head of RESILIA
    - Amar Singh, Founder and CEO, Cyber Management Alliance
  • Four Security Hurdles with SD-WAN Recorded: Jan 16 2020 39 mins
    Amar Singh, Lee Dolsen
    Businesses are facing specific threats that include

    - Vastly dispersed offices, across multiple continents
    - Increasingly erratic (even called flexible) work patterns
    - Ever increasing threats from the wild-west cyberspace

    SD-WAN is proposed as a technology that can solve the above and more but there are several obstacles that you need to be aware of before you embrace this technology.

    Join us on this educational webinar on SD-WAN as we discuss the challenges and opportunities offered by this technology and what you can do to decrease your risk exposure.

    The panelists on this webinar:

    Amar Singh, CEO, Cyber Management Alliance
    Lee Dolson, Director of Engineering, ZSCALER
  • Rewiring The Brain For Cyber Awareness Behaviour Change Recorded: Jan 15 2020 53 mins
    Amar Singh, Nick Wilding, Lizzie Coles-Kemp
    The author Maya Angelou has said: “…people will forget what you said, people will forget what you did, but people will never forget how you made them feel.”

    The fact is security that doesn’t work for your people, doesn’t work.

    We need to understand our own ‘human operating systems’ to ensure we can be effective in designing and managing innovative and collaborative solutions for our own ‘human error’ – the most significant threat to our organisations security and resilience. If, like us, you believe that there is a better way to achieve lasting behaviour change, then join us and share your experiences and insights.

    The webinar will:

    - Outline and illustrate some of the principles that should underpin an engaging and effective cyber awareness training.
    - Highlight the critical questions you should be asking in assessing any awareness training solution.
    - Highlight techniques now being used to make cyber awareness training engaging and fun,
    - Discuss new research designed to develop real ‘people-centred’ security.

    The Panellists

    - Nick Wilding, General Manager, Cyber Resilience, AXELOS and Head of RESILIA Frontline
    - Amar Singh, Founder and CEO, Cyber Management Alliance
    - Lizzie Coles-Kemp, Professor of Information Security, Royal Holloway, University of London
  • Why Hackers are Targeting and Succeeding in India and the Asia Pacific Recorded: Dec 17 2019 49 mins
    Amar Singh, Ben Verschaeren
    Interesting new research reveals that organisations in India and APJ face a series of cybersecurity shortcomings in the areas of education, company culture, skills, budgeting and operational management.

    The attackers are attracted to the "low hanging fruit" and green pastures as companies in India and the region are only just coming to terms with the negative impact of being insecure and not ready for cyber-attacks.

    Join Amar Singh & Ben Verschaeren as they discuss why overcoming these challenges won’t be easy and the opportunities available to strengthen these areas in addition to the hardening of the technology platforms and tools used.

    Ben, based in Australia, is Sophos' Global Solutions Engineer and threat researcher. Ben is responsible for researching the threat landscape and educating the Sophos team, customers and partners on the latest threats. This includes building demonstration and training tools, focusing on real world exploits and malware.

    Amar is based in London, UK and is a globally recognised cyber and privacy specialist and a practising CISO. Amar and his firm Cyber Management Alliance Ltd are trusted advisors in cybersecurity and privacy to global organisations and mentor CISO and C-Level executives on cyber resilience and data-privacy.
  • The Truth Behind Cybersecurity’s Biggest Lie Recorded: Nov 28 2019 55 mins
    Amar Singh, Chris Eves
    What the Industry Tries to Cover Up and What you Need to know.

    "This is the most secure solution that you will ever need. It has Machine Learning, advanced Artificial Intelligence, block-chain and blah blah blah."

    Yet, cyber-crime is increasing!

    Like in other sectors, IT and cyber have their fair share of Snake-oil sellers. However, if you include the blow-out-of-proportionists and aggressive selling tactics, it gets more complicated, dangerous and sometimes leaves you with little more than unadulterated lies.

    Join Amar Singh and Chris Eves from Alsid as they separate the wheat from the chaff and filter-out the noise to show you the stuff that really matters when it comes to building a cyber-resilient business.

    Amar Singh is an experienced Cyber and Privacy practitioner and is the CEO of Cyber Management Alliance Ltd and the founder of Wisdom of Crowds.

    Chris Eves is a Data Protection expert helping to protect enterprise organisations from cyber attacks, both internally and externally. During Chris's 10 years in IT, he has built up knowledge of Networking, Infrastructure, Backup, Data Storage and more recently Data Protection & Governance and Active Directory Cyber Security.
  • Rapid Incident Response - How to Respond to Cyber-Attacks at Cyber-Speed Recorded: Sep 30 2019 31 mins
    Amar Singh (Cyber Management Alliance), Steven Peake (Barracuda)
    To-the-point webinar that shows you the key technology stack you need to ensure you are able to detect and swiftly respond to the early stages of a cyber-attack. There are enough statistics and figures available to convince anyone - criminals will succeed in breaking-in. The question you have to ask yourself? - Are you prepared for Rapid Detection and Rapid Response.

    Furthermore, successful and swift response requires the right technology stack where all the various technology solutions work together. Review this educational webinar to see how a harmonious eco-system works as one to make Rapid Incident Response real and effective.
  • Beyond the Gateway: Steps to Significantly Increase Your Cyber Resilience Recorded: Aug 27 2019 28 mins
    Junior Birkett (Barracuda Networks), Peter Mullens (Barracuda Networks), Amar Singh (Cyber Management Alliance)
    Discover how email security is moving beyond the gateway, using new techniques such as artificial intelligence and machine learning to protect organizations against the latest emerging threats such as spear phishing and account takeover.
  • Updated - Creating Incident Response Playbooks and more Recorded: Feb 20 2019 49 mins
    Amar Singh
    Wow - This is an exciting and busy webinar - with loads of templates and downloads too!

    * Live session on how we create an incident playbook from scratch!
    * Review of our playbook scratchpad - how we design the initial playbooks.
    * Automating incident response - some thoughts.
    * Exciting updates on the GCHQ-certified CIPR training

    This playbook webinar is taken from our certified Cyber Incident Planning & Response (CIPR) workshop and we will have several past attendees sharing their experience about the workshop and how they implemented the lessons from this training.
  • Morrisons Could Have Stopped the Breach - This is How Recorded: Jan 29 2019 57 mins
    Amar Singh, Barnaby Davies, Jeremy Wittkop
    Morrisons, the fifth largest super market in UK, will go down in history for all the wrong reasons. The inability to not just prevent but detect a massive data leak has meant that its brand name is being dragged through the mud and dirt, not once, but many times over. Yes Morrisons could have done many things and this webinar is NOT about beating up the brand or pointing a finger.

    Experts in this webinar will discuss a better, simpler approach that may reduce or at least make these kind of incidents very difficult to materialise. Join Amar Singh, Barnaby Davies and Jeremy Wittkop as they take a positive and proactive approach to preventing brand-damaging data breaches.

    Background: The Court of Appeal (October 2018) upheld a decision of the High Court holding Morrisons vicariously liable for data breaches caused by the actions of its employee, even though the employee’s actions were specifically intended to harm Morrisons.

    Do Google: search for morrisons data leak court case for more information.
  • 5 Key Criteria for a Secure Cloud Storage & File Sharing Service Recorded: Jan 24 2019 59 mins
    Amar Singh and Istvan Lam
    File storage & sharing should not just be about the size but also privacy and most importantly about maximum security.

    * Is your data protected by default?
    * Who has access to your data?
    * Who can index your data?
    * Where is your data stored?

    These and many more questions will ensure you select the right type of service that offers NOT only you but your clients the assurance that you take privacy and security seriously - especially when it comes to the cloud.

    Join Amar Singh as he discusses the following with Istvan Lam, the founder and CEO of Tresorit:

    - How to design an intercept-proof file sync & sharing service?

    - What does End-To-End encryption service actually mean?

    - How to combine on premise equivalent security with consumer grade simplicity?

    - Where is your data actually stored and what would happen in case of a breach of those cloud servers?

    - What does ZERO-Knowledge mean in the real world?
  • Creating a Winning Security Strategy for 2019 Recorded: Dec 5 2018 49 mins
    Israel Barak, Cybereason | Dario Forte, DFLabs
    Cyber attacks on businesses, organizations and critical infrastructure becoming the norm in 2018. Massive breaches are constantly in the news and consumers are demanding stricter data and privacy protections. Cybersecurity has never been more important to organizations, and the investment in security technology has never been greater.

    CISOs are in the spotlight, and are looking to build the best strategy to secure their organizations, customers and users.

    Join top security experts for an interactive Q&A panel discussion on:
    - The key factors CISOs should consider for their cybersecurity strategy
    - The current and future threatscape
    - Platform Security for 2019
    - Technological solutions that make CISOs' lives easier
    - How organizations are coping with the shortage of qualified security workforce
    - How CISOs can better communicate their strategy to the board

    Panelists:
    Israel Barak,CSO, Cybereason
    Dario Forte, CEO, DFLabs

    Panel moderated by:
    Amar Singh, Founder & CEO, Cyber Management Alliance
  • 5 Absolute Must-Haves for a Secure File Sync & Sharing Service Recorded: Nov 28 2018 46 mins
    Amar Singh, Istvan Lam
    File storage & sharing should not just be about the size but also privacy and most importantly about maximum security.

    * Is your data protected by default?
    * Who has access to your data?
    * Who can index your data?
    * Where is your data stored?

    These and many more questions will ensure you select the right type of service that offers NOT only you but your clients the assurance that you take privacy and security seriously - especially when it comes to the cloud.

    Join Amar Singh as he discusses the following with Istvan Lam, the founder and CEO of Tresorit:

    - How to design an intercept-proof file sync & sharing service?
    - What does End-To-End encryption service actually mean?
    - How to combine on premise equivalent security with consumer grade simplicity?
    - Where is your data actually stored and what would happen in case of a breach of those cloud servers?
    - What does ZERO-Knowledge mean in the real world?
  • Architecting a Sophisticated DDoS Attack in 5 steps Recorded: Nov 22 2018 58 mins
    Amar Singh, Aatish Pattni, Karsten Desler
    --- This is a Technical Webinar **

    Following on from our successful webinar, Breaking PCI-DSS Applications, we bring you our next instalment - How to Create a Complex DDoS attack in 5 steps. Join Amar Singh, Karsten Dessler as they dive into

    - The details, step-by-step, on planning a DDoS attack
    - The prerequisites for this plan to succeed
    - The different tools that can be used to launch such an attack.

    Needless to say, we will share mitigating strategies and the technology configurations that you should use to protect your web products.
  • Saving Money and Stopping Cyber Attacks - 3 Simple Steps for the Small Business Recorded: Nov 14 2018 47 mins
    Amar Singh; Steve Vickers
    Are you open minded to saving money and ensuring that your business is better protected from cyber criminals at the same time? Join Amar Singh and Steve Vickers as they discuss a simple checklist for charities and small businesses. A non-technical discussion, we layout step by step guidance on what you can do:

    - To save money on your current IT and security investments
    - To ensure your third party is delivering the right level of security and service
    - Increase your operational efficiency and lower total cost of operations.
  • How to break a PCI Compliant Application Recorded: Oct 31 2018 58 mins
    Amar Singh, Aatish Pattni, Karsten Desler
    ** Warning - This webinar is only for informational purposes. We do not condone or encourage any malicious activity. The knowledge you gain from this webinar should be used to protect your own infrastructure and web applications. **

    PCI-DSS needs no introduction. The Payment Card Industry Data Security Standard applies to any organisation accepting credit card details in some way or the other. This webinar is going to share some of the latest techniques cyber criminals are using to break web applications.

    Join us to learn how they are doing this and what you should do to protect your organisation and compliance status.
  • Five Absolute Must-Haves for AWS, Azure, Google Cloud and Others Recorded: Oct 22 2018 57 mins
    Anmol Anand Amar Singh, Chris Payne
    The great migration to the cloud is in full swing and almost every organisation is getting involved.

    Whether it be virtual infrastructure, email services or collaboration tools, the benefits of the cloud, such as better availability and lower costs are being embraced universally.

    But what about security?

    In this webinar, several experts, including Anmol Anand, Amar Singh and Chris Payne will discuss their absolute security must-haves for cloud adoption.

    Topics covered:

    - Secure configuration management and benchmarking.
    - File storage and data transfer.
    - Alerting and incident response.
    - Authentication and identity management.

    Don't miss this exciting and informative webinar!
  • Implementing a Cloud Ready Software Defined WAN - Challenges & Opportunities Recorded: Oct 18 2018 61 mins
    Amar Singh; Steve Vickers
    With the explosion of cloud-based cloud ready applications, many organisations struggle with optimising application performance for cloud or hybrid environments. The culprit, in many cases, is the connectivity from the offices to the cloud. The wide area network, (WAN) connecting offices to the Internet and to other offices, is still playing catchup. WAN technology is stuck in the old-age.

    Think about this: Does your business, small or large, have two or more broadband connections, maybe a broadband and a dial up or some other form of Internet connectivity? Apart from the security risk of having too many Internet points of exit, your business is also wasting money and resources in managing these various connectivity channels.

    In this webinar, Amar Singh and Steve Vickers explore the problems typically faced by organisations based on the latest research and show how organisations can create a seamless and secure SD-WAN infrastructure without having to manage multiple products.
  • Insights with Cyber Leaders - Ashish Khanna Dubai Health Authority Recorded: Sep 19 2018 12 mins
    Amar Singh Cyber Management Alliance
    Amar Singh, CEO and co-founder of Cyber Management Alliance, recently had the pleasure to sit down with Ashish Khanna, information security officer at Dubai Health Authority, to briefly talk about what led Khanna to Dubai and to discuss some of the life lessons he learned along the way.
  • Creating Actionable Incident Response Playbooks + CIPR Review Recorded: Sep 18 2018 51 mins
    Amar Singh (Cyber Management Alliance)
    We do two things in this webinar - review how the UK-GCHQ Certified Training course, Cyber Incident Planning & Response or CIPR has helped organisations like the NHS and BMJ and discuss how you too can create actionable playbooks.

    This webinar will cover topics such as:
    - CIPR review - how it has helped organisations
    - How to create actionable incident response playbooks,
    - The flow and logic behind creating playbooks that work.
    - Example playbooks around GDPR and Malware

    We also discuss management playbooks along with technical content and share insights into how you can automate your playbooks.

    This playbook webinar is taken from our certified Cyber Incident Planning & Response (CIPR) workshop and we will have several past attendees sharing their experience about the workshop and how they implemented the lessons from this training.

    Robin Smith - from the NHS
    Aaron Townsend - from the BMJ

    Visit https://www.cm-alliance.com/training/cipr-cyber-incident-planning-response/ for more information
  • Insights with Cyber Leaders with Ian Glover Recorded: Sep 4 2018 32 mins
    Amar Singh and Ian Glover
    CREST president Ian Glover sat down with Amar Singh, CEO and co-founder of Cyber Management Alliance, to talk about his career and pass on some of the insights he has gained over the course of his long and fruitful career in information technology.
View our exclusive "Insights with Cyber Leaders Series" and webinars
Cyber Management Alliance presents an exciting series of interviews with International Cyber Security Leaders. Want to know what they look for when hiring for their teams? Want to know the secrets to their success and what keeps them awake at night? Theses exclusive interviews are presented by industry thought leader and Chair of ISACA's UK Security Advisory Group and Global CISO Amar Singh. Series but humours and light hearted interviews. See the leading figures in Cyber Security like you've never seen them before. From Eugene Kaspersky to CTO HP Enterprise and CTO of Intel Security we have an amazing line up. Subscribe for updates.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Truth Behind Cybersecurity’s Biggest Lie
  • Live at: Nov 28 2019 2:00 pm
  • Presented by: Amar Singh, Chris Eves
  • From:
Your email has been sent.
or close