Hi [[ session.user.profile.firstName ]]

How the Latest Trends in Data Security Can Help Your Data Protection Strategy

Data breaches are on the rise. The constant threat of cyber attacks combined with the high cost and a shortage of skilled security engineers has put many companies at risk. There is a shift in cybersecurity investment and IT risk and security leaders must move from trying to prevent every threat and acknowledge that perfect protection is not achievable. PCI DSS 3.2 is out with an important update on data discovery and requirements to detect security control failures.
In this webinar, cybersecurity expert Ulf Mattsson will highlight current trends in the security landscape based on major industry report findings, and discuss how we should re-think our security approach.
Recorded Jul 13 2016 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ulf Mattsson, CTO, Compliance Engineering
Presentation preview: How the Latest Trends in Data Security Can Help Your Data Protection Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Data Protection On-premises, and in Public and Private Clouds Jun 10 2019 4:00 pm UTC 60 mins
    Ulf Mattsson, David Morris, Juanita Koilpillai
    ​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
    Learn about the Identity and Data Protection solutions for enterprise security organizations can take a data-centric approach to their security posture.
    Learn about the new trends in Data Masking, Tokenization and Encryption.
    Learn about new Standards for masking from ISO and NIST.
    Learn about the new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds.
  • How will New Regulations Impact Cloud and Blockchain in 2019? Apr 10 2019 4:00 pm UTC 60 mins
    This expert panel include RICARDO G. DIAZ, Julie Goggin, Ulf Mattsson and other experts
    Breached businesses in Europe: Brace for more class action lawsuits. GDPR Compliance in a Data-Driven World. Insights from a 2018 Survey. Learn More. There have been countless breaches before — Facebook has even dealt with specific login bugs like this one — but the GDPR changes everything. If the company is found to have violated the rule, it could be liable for up to four percent of annual revenue, a staggering $4 billion. Under the GDPR, the question of blame largely hinges on whether the company was negligent, ignoring basic practices that could have prevented the breach. Both Facebook and Google have already come under fire for having Terms of Service that violate the regulation. Facebook is preparing for what could be the fight of its life. No one has ever litigated these issues before, and we only have a hazy sense of what a strong or weak GDPR case looks like. We’re just months into the GDPR regime, and there’s simply no roadmap for how it can be used.
    RICARDO G. DIAZ, the founder and CEO of BCLT will cover Blockchain identity aspects. Julie Goggin is the General Counsel & Corporate Secretary at Blockchain Security, Inc. She will cover legal aspects related to Blockchain.
    This expert panel will discuss how GDPR will impact Cloud and Blockchain in 2019.
  • Utilizing a Digital Risk Management Framework for Securing the Cloud Feb 22 2019 6:00 pm UTC 90 mins
    Bob Liscouski, Juanita Koilpillai and David Morris
    How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.

    In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.
  • The Rise of Nation State Attacks and what you can do about it Recorded: Jan 30 2019 58 mins
    Ulf Mattsson, Mark Rasch and David Morris
    In this session you will lean what is a Nation-State attack, who are the primary perpetrators, technical controls, and what if any legal sanctions can be brought to bear
  • Data Privacy and California Consumer Privacy Act (CCPA) Recorded: Jan 28 2019 76 mins
    David Morris, Steven W. Teppler and Mark Rasch
    In this session, you will learn what the California Consumer Privacy Act (CCPA) is, what it means to your organization, how it differs from GDPR and lastly where do you start to become CCPA compliant.
  • Threat Hunting: A Live Demonstration Recorded: Jan 24 2019 77 mins
    David Morris, Andrew Johnston, Mark Rasch
    This session will feature a live demonstration of Threat Hunting by a former Federal law enforcement cyber threat hunter. In this session, you will see what a Threat Hunter actually does and how it is done.
  • 2019: A Cybersecurity Reality Check Recorded: Dec 12 2018 66 mins
    David Morris, Barak Engell and Mark Rasch
    Will 2019 bring any real transformative cybersecurity technology advancements that will have an impact? Tune into this controversial eye opening session on what's in store for 2019 in the cybersecurity space.
  • Self Sovereign Identity - Going Where No Identity Has Gone Before Recorded: Nov 26 2018 59 mins
    Ricardo Diaz, Blockchain CLT, Founder Managing Partner, Mike Lodder, Sovrin Foundation Security Maven
    Data privacy is dead. Social login is not the answer. Over thirty years of cyber security internal controls have fallen short of protecting our data. Traditional identity and access management (IAM) systems, aka Web 2.0 IAM, have evolved but only exacerbates the proliferation of centralized identity repositories. Centralized identity repositories that have for decades been the “Crown Jewels” of every malicious hacker or nation state bad actor to be the gateway to our personally identifiable information. A new paradigm shift in the identity management industry is here, Web 3.0 IAM. Blockchain identity management has many names. Decentralized identity. Self-Sovereign Identity. Multi-source identity. All define the same new IAM future. An identity management system powered by distributed ledger technology.
    We will cover the basics of what is Self-Sovereign Identity (SSI) and this evolution of the IAM space. The webcast will showcase how one of the SSI leaders in the blockchain identity space, Sovrin, works. Sovrin.org is the leading SSI public identity network solutions in the Blockchain world. It is an open source project managed by the Hyperledger Indy project within the Linux Foundation.
    Speakers
    Michael Lodder: Security Maven | Sovrin Foundation
    Mike currently works on all things security related to algorithms, protocols, and technology. I have worked in the identity and security space for many years.
    Ricardo Diaz: Founder | Managing Partner | Blockchain CLT
    Ricardo is the founder of Blockchain CLT, a DLT services and solution business based out of the Charlotte, NC. He is a serial entrepreneur, human rights advocate, social impact entrepreneur and has a passion for decentralized identity (SSI). An enterprise software executive, cyber security, identity management, cloud and decentralized computing professional with almost 25 years of working experience in engineering, consulting, sales, marketing and business development roles.
  • Encryption & Tokenization as Effective GDPR Best Practices Recorded: Oct 26 2018 63 mins
    An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
  • What is a Secure Enterprise Architecture Roadmap? Recorded: Sep 20 2018 69 mins
    Juanita Koilpillai, Bob Flores, Mark Rasch, Ulf Mattsson, David Morris
    This session will cover the following topics:

    * What is a Secure Enterprise Architecture roadmap (SEA)?
    * Are there different Roadmaps for different industries?
    * How does compliance fit in with a SEA?
    * Does blockchain, GDPR, Cloud, and IoT conflict with compliance regulations complicating your SEA?
    * How will quantum computing impact SEA roadmap?
  • Threat Hunting - Hype or Substance Recorded: Sep 18 2018 65 mins
    Roselle Safran, UJ Desai and David Morris
    This session will cover the practice of Threat Hunting, when to use it, where to use it, and the technical skills needed to effectively deliver value to an organization.
    You will learn:
    - The difference between Threat Intelligence and Threat Data
    - What is Threat Hunting in relation to Threat Intelligence and Threat Data
    - When and where to apply Threat Hunting
    - What you can reasonably expect to gain through the use of Threat Hunting
  • GDPR - A users perspective Recorded: Sep 12 2018 61 mins
    Mark Rasch and Ray Ford
    This session will cover GDPR from a users perspective, examining the trials and tribulations of working towards GDPR readiness.
  • Encryption & Tokenization as effective GDPR Best Practices Recorded: Aug 20 2018 63 mins
    An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
  • Defending our Critical Infrastructure Recorded: Aug 16 2018 62 mins
    Juanita Koilpillai and Mark Rasch
    Critical Infrastructures such as Power, Water, Internet, Pipeline(Gas), and Smart Cities have been and continue to be attacked. This session will address the vulnerabilities and best practices for defending and protecting critical infrastructures.

    In this session, you will learn:
    Attacks most commonly used
    Defensive measures
    Best practices
  • The State of Cybersecurity in the Healthcare Industry Recorded: Aug 15 2018 62 mins
    Juanita Koilpillai, Mark Rasch and Dr. Jerald Dawkins
    In this session we will use the NIST Cybersecurity Framework as a backdrop to delve into the state of Cybersecurity preparedness within the healthcare sector. This sector is among the most vulnerable and least mature.
    In this session we will examine:
    - What are the vulnerabilities to the Healthcare sector?
    - What are the NIST Cybersecurity Framework implications?
    - What are some immediate best practices?
  • Financial Services and GDPR: The Next 60 Days…. Recorded: Aug 14 2018 61 mins
    Ray Ford, Mark Rasch, Mary J. Hildebrand and David Morris
    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies.

    This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.

    Learn from this leading panel of experts:.
    - Ray Ford: Founding member of the GDPR Institut
    - Mark Rasch: Chief Legal Council, Digital Risk Management Institute, Former head of US Dept. of Justice, Cyber and High Technology Crime Unit
    - Mary J. Hildebrand CIPP/US/E, Partner, Founder, and Chair, Privacy & Cybersecurity, Lowenstein Sandler LLP
  • Threat Hunting - An In-depth Explanation Recorded: Jul 23 2018 61 mins
    Juanita Koilpillai, Mark Rasch, Andrew Johnston and David Morris
    Threat Hunting is a complicated and often misunderstood cybersecurity activity that if properly used can add tremendous value to your cybersecurity posture.

    In this session you will learn:
    What is Threat Hunting?
    When do I use it?
    What will it tell me?
    How do I use it?
    What are the legal implications?

    Learn from the following leading experts:
    Juanita Koilpillai: Chief Technology Advisor, Digital Risk Management Institute
    Mark Rasch: Chief Legal Council,Digital Risk Management Institute
    Andrew Johnston: Associate Consultant,Mandiant
  • NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED Recorded: Jul 18 2018 60 mins
    Ulf Mattsson, Dick Morrell, Juanita Koilpillai
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT

    Financial Services and GDPR: The next 60 days….

    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
  • Software Defined Perimeter - In Depth Use Cases Recorded: Jul 9 2018 53 mins
    Juanita Koilpillai, CEO of Waverley Labs and Bob Flores, Co-Founder of Cognitio Corp., David Morris
    This session will include a biref overview of Software Defined Perimeters and will then proceed to dirll-down on specific use cases.
    In this session you will learn what are some of the most popular use cases for Software Defined Perimeters and who has used them.

    Join this panel of SDP experts:
    Juanita Koilpillai, CEO of Waverley Labs
    Bob Flores, C0-Founder of Cognitio Corp and former CTO of the CIA.
  • Secure Datacenters in Space Recorded: Jun 20 2018 81 mins
    Dennis Gatens, Jeff Snyder, Alex Pezold,David Morris
    While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.

    Join this panel of experts as we cover:
    •The migration of data centers to satellites
    •The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters

    Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation

    Jeff Snyder: CTO at Cloud Constellation Corporation

    Alex Perzold:Co-Founder and CEO at TokenEx
Comprehensive Information Security Management and Compliance
The Cybersecurity- No Spin Zone is dedicated first and foremost to educating viewers about Cybersecurity Technologies, Problems, Compliance and Legal FACTS. We are not a Vendor Sponsored Channel, this gives us the unique ability to bring you factual unbiased information and advice from subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How the Latest Trends in Data Security Can Help Your Data Protection Strategy
  • Live at: Jul 13 2016 4:00 pm
  • Presented by: Ulf Mattsson, CTO, Compliance Engineering
  • From:
Your email has been sent.
or close