Hi [[ session.user.profile.firstName ]]

How the Latest Trends in Data Security Can Help Your Data Protection Strategy

Data breaches are on the rise. The constant threat of cyber attacks combined with the high cost and a shortage of skilled security engineers has put many companies at risk. There is a shift in cybersecurity investment and IT risk and security leaders must move from trying to prevent every threat and acknowledge that perfect protection is not achievable. PCI DSS 3.2 is out with an important update on data discovery and requirements to detect security control failures.
In this webinar, cybersecurity expert Ulf Mattsson will highlight current trends in the security landscape based on major industry report findings, and discuss how we should re-think our security approach.
Recorded Jul 13 2016 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ulf Mattsson, CTO, Compliance Engineering
Presentation preview: How the Latest Trends in Data Security Can Help Your Data Protection Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Real Cybersecurity Threat- The GAP in Cybersecurity Talent Jan 17 2018 5:00 pm UTC 60 mins
    Ulf Mattsson, Jon Klein, John Mulhull, Harrison Morris, David Morris
    As Cybersecurity has evolved from the back room of the data center and traditional IT Departments over the past 30 years; there is now a critical shortage in the supply of skilled technical Cybersecurity talent.
    This session will discuss the generational gap in talent, the critical shortage in skilled talent and what we can do and how new talent can gain entry into this sorely lacking field which is in desperate need of the next generation of Cybersecurity professionals.
  • A New Approach to Next-Gen Encryption Dec 14 2017 5:00 pm UTC 60 mins
    Sophos and ABT CTO
    Data loss is an ongoing concern for all organizations. At the same time the world we work in has changed and people - and their data - are increasingly mobile and on an ever-growing number of devices and applications. Businesses need to secure their data and comply with regulations, without slowing down their users. Now is the time for a Next-Gen Encryption strategy that offers a new approach to data security, designed specifically to meet your needs.
  • Cloud and IOT Security: Considerations for securing data Dec 13 2017 5:00 pm UTC 60 mins
    NCC Group will be on our panel
    As the adoption of cloud computing increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your own on premise firewalls and other security products. This has the potential of creating data blind spots that can affect your overall security posture—both for your internal data and those of your customers and clients. To protect your business, you need a balanced approach to managing cloud risk and respective security controls—combining compliance, responsiveness, and engineering without sacrificing usability and agility. During this Webinar, we will walk through a check list of questions to ask your business units to ensure your cloud usage is not putting your enterprise at risk.

    Join this presentation to learn how to reduce risk associated with moving to the cloud while maintaining simplicity and efficacy.

    -IT is all about the data - Do you know what data you have, where it is, and how is protected?
    -What are your security responsibilities and those of your cloud service provider?
    -What is your current risk register regarding use of the your cloud service provider (confidentiality, integrity and availability)?
    -How do you perform a risk assessment for your current and emerging cloud services?
  • Integrate Security into DevOps - SecDevOps Nov 16 2017 5:00 pm UTC 60 mins
    Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space
    Topics:
    1.Security Controls Must Be Programmable and Automated Wherever Possible
    2.Implement a Simple Risk and Threat Model for All Applications
    3.Scan Custom Code, Applications and APIs
    4.Scan for OSS Issues in Development
    5.Treat Scripts/Recipes/Templates/Layers as Sensitive Code
    6.Measure System Integrity and Ensure Correct Configuration at Load
    7.Use Whitelisting on Production Systems, Including Container-Based Implementations
    8.Assume Compromise; Monitor Everything; Architect for Rapid Detection and Response
    9.Lock Down Production Infrastructure and Services
    10.If Containers Are Used, Acknowledge and Address the Security Limitations
  • 2018 - The New Targets and New Technologies Nov 15 2017 6:00 pm UTC 60 mins
    Ulf Mattsson, CTO Atlantic BT Security
    2018 is bringing new Threats & Technologies.
    Viewers will learn:
    • Case studies and Current trends in Cyber attacks
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps
  • Data Protection On-premises, and in Public and Private Clouds Nov 9 2017 5:00 pm UTC 60 mins
    Ulf Mattsson, CTO Atlantic BT Security
    ​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

    Learn about the Identity and Data Protection solutions for enterprise security organizations can take a data-centric approach to their security posture. This session will discuss how to control access to the infrastructure and applications — both on-premises, and in public and private clouds.
  • EU GDPR Details Oct 25 2017 2:00 pm UTC 60 mins
    Ulf Mattsson, CTO Atlantic BT Security, Martyn Hope the founder of the GDPR Institut
    Martyn Hope the founder of the GDPR Institut talk about EU GDPR Details
  • Cloud Security - Protection Against Evolving Data Security Threats Oct 24 2017 4:45 pm UTC 60 mins
    Ulf Mattsson, David Morris, Rich Morrell, Juanita Koilpillai
    Cloud Security- Protection Against Evolving Security Threats
    Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?
    In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software Defined Perimeter (SDP) as well as encryption and tokenization.
  • Cloud Security & Integration: Protecting your Applications & Data Oct 19 2017 5:00 pm UTC 60 mins
    Ulf Mattsson, David Morris, Juanita Koilpillai
    Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?

    In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software-Defined Perimeter (SDP) as well as encryption and tokenization.
  • Controlling access to infrastructure and applications, in cloud and on-prem Recorded: Oct 17 2017 60 mins
    Ulf Mattsson, CTO at Atlantic BT. Alex Hanway, Product Marketing Manager at Gemalto, David Morris, Pioneer in Cybersecurity
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
    This session will discuss Identity and Data Protection solutions for enterprise security, organizations can take a data-centric approach to their security posture, all while controlling access to the infrastructure and applications they rely upon — both on-premises, and in public and private clouds.
  • Fully Autonomous A.I. - Powered Cybersecurity System Recorded: Sep 27 2017 60 mins
    Ulf Mattsson and Richard Malinowski
    A Fully Autonomous A.I.- Powered Cybersecurity System can provide
    automated network protection, endpoint protection and incident management. We will discuss Regulatory Compliance - Supporting adherence to critical regulations.

    We will cover important regulations, including NISPOM, DSS, RMF, NIST 800-53 & 800-171, FFIEC, SOX, HIPPA, and PCI DSS.
    Viewers will learn:
    • Current trends in Cyber attacks
    • FFIEC Cyber Assessment Toolkit
    • NIST Cybersecurity Framework principles
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    Richard Malinowski is CEO of REMTCS including expertise in Cybersecurity & Artificial Intelligence:
    20 Years of experience in Cybersecurity & High Performance Computing
    10 Years of experience in Artificial Intelligence
    7 Patents in Next Generation Security Systems harnessing Artificial Intelligence and High Performance Computing
    Former Head of IT for Western Hemisphere for UBS, ran Crisis Management Team
    Former Head of IT for Citibank’s Money Market and Treasury Divisions
    Former Chief Architect for NASDAQ
  • Understanding Your Attack Surface and Detecting & Mitigating External Threats Recorded: Sep 20 2017 62 mins
    Ulf Mattsson, CTO Atlantic BT. David Morris, Pioneer in Cybersecurity, Benjamin Powell, Technical Manager at RiskIQ
    Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there really is no perimeter. In this presentation, we'll discuss Digital Footprints in understanding your company’s external attack surface. We will discuss social, mobile, web attacks and analyze and review lessons learned recently publicized attacks (Polish banking institutions, Apache Struts Vulnerability or WannaCry ransomware. The speed of business and cybercrime isn't slowing down, so how can you be prepared to address and defend against these types of threats? Attend our session to find out how.
    Reducing Your Digital Attack Surface and Mitigating External Threats - What, Why, How:
    What is a Digital Footprint?
    Breakdown of External Threats (Social, Mobile, Web)
    What are blended attacks?
    What is actually being targeting at your company?
    How are your brands, customers, and employees being attack outside of your company?
    How to become proactive in threat monitoring on the internet?
    Considerations in External Threat solutions
    Threat correspondence tracking considerations
    Is legal cease and desist letters adequate in stopping attacks?
    Examination of a phishing attack campaign
    How phishing kits work
    Analysis and lesson learned from recent published attacks
    What are the most important capability in a digital risk monitoring solution?
  • 2017 Trends in IoT Cyber Attacks Recorded: Sep 13 2017 61 mins
    Ulf Mattsson, David Morris, Mandeep Khera, Juanita Koilpillai
    There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of about 30 billion objects by 2020. This session will discuss the key findings.
    Viewers will learn:
    • Current trends in Cyber attacks for IoT
    • Security Metrics for IoT
    • Oversight of third parties in IoT
    • How to measure cybersecurity preparedness for IoT
    • Automated approaches to integrate Security into IoT
  • Do You Have a Roadmap for EU GDPR Compliance? Recorded: Aug 17 2017 60 mins
    Ulf Mattsson, David Morris, Ian West. and Khizar Sheikh
    The General Data Protection Regulation (GDPR) goes into effect in 2018 and it will affect any business that handles data, even if it's not based in the European Union.

    Are you looking to move and host data for EU citizens? Do you have a roadmap and associated estimated costs for EU GDPR compliance?

    Join this webinar to learn:
    • Case study and legal/regulatory impact to GDPR
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps
  • Learning from WannaCry and now 250 million PCs infected - Long-Term Implications Recorded: Jul 12 2017 61 mins
    Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space
    The massive attack known as WannaCry struck over 900,000 computers worldwide, completely locking victims out of their PCs. The security firm Check Point has warned of a massive new outbreak: They count 250 million PCs infected with malicious code they've called Fireball, designed to hijack browsers to change the default search engine, and track their web traffic on behalf of a Beijing-based digital marketing firm called Rafotech. But more disturbingly, Check Point says it found that the malware also has the ability to remotely run any code on the victim's machine, or download new malicious files. It's potentially serious malware.
    What are the lessons we've learned from Wannacry and other similar attacks? What is the best defense against ransomware?
    In this session, Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space, will lay out common sense steps that organizations should take today to better protect themselves, as well as strategic security principles to guide you going forward.
  • The Myth behind Real Time Malware Detection Recorded: Jun 16 2017 61 mins
    Richard Malinowski, CEO at REMTCS, Ulf Mattsson, CTO at Atlantic BT Security Solutions, David Morris, Security Expert
    All UK submarines are running MS XP (not just UK Health System)! Updated as “MS War Whips” by Dec 2008. Impossible to change the OS.
    This session will cover the Myth behind Real-Time Malware detection and Mitigation. What does real-time mean? Is it achievable? What should a comprehensive malware solution and managed service look like?
  • Learning from Verizon 2017 Data Breach Investigations Report – The New Targets Recorded: Jun 13 2017 60 mins
    Ulf Mattsson, CTO Atlantic BT Security
    The Verizon 2017 Data Breach Investigations Report findings relate specifically to the occurrence (likelihood) of security breaches leading to data compromise. The information, provided in aggregate, is filtered in many ways to make it relevant to you (e.g., by industry, actor motive). It is a piece of the information security puzzle—an awesome corner piece that can get you started—but just a piece nonetheless. This session will discuss the new targets that are identified and some solutions
  • Google Docs and the Future of Phishing Scams Recorded: Jun 8 2017 60 mins
    Vikram Thakur (Symantec), Limor Kessem (IBM), David Morris (Pioneer in Cyber security), Phil Richards (Ivanti)
    When the Google Docs phishing scam spread across the network in early May, it showed what a sophisticated phishing email looks like. It did not ask for a user's password and in some cases, it came from contacts the user already knew. What made this scam so hard to spot and what can we expect to see in the future when it comes to phishing attacks?

    Join this panel of experts to learn:
    - Latest trends in phishing scams
    - How to spot a phishing email from a mile away
    - Recommendations on how to avoid becoming a victim

    Moderator:
    - David Morris, Pioneer in Cyber security

    Speakers:
    - Limor Kessem, Global Executive Security Advisor at IBM
    - Phil Richards, CSO of Ivanti Software
    - Vikram Thakur, Technical Director, Security Response Team at Symantec
  • Learning from the RSA Conference 2017 - Uncover Data Security Blind Spots Recorded: May 25 2017 60 mins
    Ulf Mattsson, CTO Atlantic BT Security
    The RSA conference is a unique and valuable event for IT security experts from around the world. With cyber-attacks on the rise, securing your data is more imperative than ever. The RSA conference pointed out that revisions to PCI (Payment Card Industry) DSS (Data Security Standard) is increasingly focusing on Rugged DevOps or SecDevOps, and the different approach called DevSecOps, embracing the speed of DevOps and continuous delivery in a secure environment. DevOps does affect security, and you can use it to your advantage. As cloud, big data and DevOps disrupt traditional approaches to security, new capabilities emerge to automate and enhance security operations.
    Join this session and learn how to automatically address these data security blind spots and how security can be built into the development process and IT platforms. We will discuss how security can be built into Rugged DevOps,SecDevOps, DevSecOps, Scrum, SAFe, DAD and use in Large-scale Development.
Comprehensive Information Security Management and Compliance
Atlantic BT Security Solutions provides a wide range of solutions and services that increase operational efficiency and reduce liabilities and cost. Every solution is fully integrated into your environment and supported by our technical services team.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How the Latest Trends in Data Security Can Help Your Data Protection Strategy
  • Live at: Jul 13 2016 4:00 pm
  • Presented by: Ulf Mattsson, CTO, Compliance Engineering
  • From:
Your email has been sent.
or close