Hi [[ session.user.profile.firstName ]]

PCI DSS 3.2 – What’s New? What are the Best Tools to Prevent Data Loss?

PCI DSS v3.2 provides an important and unique update on data discovery (A3.2.5, A3.2.5.1, A3.2.6) for service providers. Join this webinar and learn about the new requirements, and how implementing data discovery solutions can make it easier to validate PCI compliance.

It is becoming widely recognized that “unknown” data leakage of PCI data, and more broadly other Personally Identifiable Information, within enterprises is the highest value target for the “bad guys”. While current market Data Loss Prevention tools are valuable, they do not provide for expansive and prescriptive data discovery. We urgently need more intelligent data discovery tools to dynamically limited our attack surface.

This presentation will highlight some of these tools.
Recorded Oct 11 2016 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ulf Mattsson, CTO, Compliance Engineering
Presentation preview: PCI DSS 3.2 – What’s New? What are the Best Tools to Prevent Data Loss?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Transformative Tech Predictions in 2019 Dec 12 2018 5:00 pm UTC 60 mins
    Ulf Mattsson, David Morris, Juanita Koilpillai, Private Machines
    What are the new cybersecurity advancements that are most likely to have a significant impact in 2019?
  • The Real Cybersecurity Threat- The GAP in Cybersecurity Talent Feb 9 2018 5:00 pm UTC 60 mins
    Ulf Mattsson, Jon Klein, John Mulhull, Harrison Morris, David Morris
    As Cybersecurity has evolved from the back room of the data center and traditional IT Departments over the past 30 years; there is now a critical shortage in the supply of skilled technical Cybersecurity talent.
    This session will discuss the generational gap in talent, the critical shortage in skilled talent and what we can do and how new talent can gain entry into this sorely lacking field which is in desperate need of the next generation of Cybersecurity professionals.
  • A New Approach to Next-Gen Encryption Feb 7 2018 5:00 pm UTC 60 mins
    Sophos and ABT CTO
    Data loss is an ongoing concern for all organizations. At the same time the world we work in has changed and people - and their data - are increasingly mobile and on an ever-growing number of devices and applications. Businesses need to secure their data and comply with regulations, without slowing down their users. Now is the time for a Next-Gen Encryption strategy that offers a new approach to data security, designed specifically to meet your needs.
  • Data Protection On-premises, and in Public and Private Clouds Jan 25 2018 5:00 pm UTC 60 mins
    Ulf Mattsson, CTO Atlantic BT Security
    ​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

    Learn about the Identity and Data Protection solutions for enterprise security organizations can take a data-centric approach to their security posture. This session will discuss how to control access to the infrastructure and applications — both on-premises, and in public and private clouds.
  • Practical Approaches to Complying with GDPR Jan 22 2018 5:45 pm UTC 60 mins
    John Rostern, Vice President Risk Management & Governance North America at NCC Group
    Practical Approaches to Complying with GDPR, presented by John Rostern, Vice President Risk Management & Governance North America at NCC Group
  • Cloud and IOT Security: Considerations for securing data Dec 13 2017 5:00 pm UTC 60 mins
    Ulf Mattsson, David Morris, Richard Malinowski
    As the adoption of cloud computing increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your own on premise firewalls and other security products. This has the potential of creating data blind spots that can affect your overall security posture—both for your internal data and those of your customers and clients. To protect your business, you need a balanced approach to managing cloud risk and respective security controls—combining compliance, responsiveness, and engineering without sacrificing usability and agility. During this Webinar, we will walk through a check list of questions to ask your business units to ensure your cloud usage is not putting your enterprise at risk.

    Join this presentation to learn how to reduce risk associated with moving to the cloud while maintaining simplicity and efficacy.

    -IT is all about the data - Do you know what data you have, where it is, and how is protected?
    -What are your security responsibilities and those of your cloud service provider?
    -What is your current risk register regarding use of the your cloud service provider (confidentiality, integrity and availability)?
    -How do you perform a risk assessment for your current and emerging cloud services?
  • Integrate Security into DevOps - SecDevOps Recorded: Nov 16 2017 63 mins
    Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space
    Topics:
    1.Security Controls Must Be Programmable and Automated Wherever Possible
    2.Implement a Simple Risk and Threat Model for All Applications
    3.Scan Custom Code, Applications and APIs
    4.Scan for OSS Issues in Development
    5.Treat Scripts/Recipes/Templates/Layers as Sensitive Code
    6.Measure System Integrity and Ensure Correct Configuration at Load
    7.Use Whitelisting on Production Systems, Including Container-Based Implementations
    8.Assume Compromise; Monitor Everything; Architect for Rapid Detection and Response
    9.Lock Down Production Infrastructure and Services
    10.If Containers Are Used, Acknowledge and Address the Security Limitations
  • 2018 - The New Targets and New Technologies Recorded: Nov 15 2017 64 mins
    Ulf Mattsson, David Morris, Rich Morrell, Juanita Koilpillai
    2018 is bringing new Threats & Technologies.
    Viewers will learn:
    • Case studies and Current trends in Cyber attacks
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    Juanita Koilpillai is President at Digital Risk Management Institute. She
    Coauthored the Software Defined Perimeter Specification sponsored by the Cloud Security Alliance, Developed a Security Risk Index System adopted by NIST to calculate risk of moving applications to the cloud, She is a Key member of FEMA’s Enterprise Security Management Team: drafting U.S. Government’s initial Critical Infrastructure Protection Plan Led the team that developed the 1st security event & incident response system: sold to Symantec and Led the team that deployed the 1st modern Air Traffic Control System for the FAA.

    Rich Morrell is CTO and Managing Director of Falanx Group - Cyber Defence, CISO and Director of Cloud Security Alliance. Former Senior Security Strategist at Red Hat. Former CTO at Gartner Global Security Risk Practice. Founder and co-author of SmoothWall protecting over 200m networks globally since 2000.
  • EU GDPR Details Recorded: Oct 25 2017 64 mins
    Ulf Mattsson, Ian West, Martyn Hope, Denver Edwards
    Martyn Hope the founder of the GDPR Institute will talk about EU GDPR Details
  • Cloud Security - Protection Against Evolving Data Security Threats Recorded: Oct 24 2017 64 mins
    Ulf Mattsson, David Morris, Rich Morrell, Juanita Koilpillai
    Cloud Security- Protection Against Evolving Security Threats
    Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?
    In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software Defined Perimeter (SDP) as well as encryption and tokenization.
  • Cloud Security & Integration: Protecting your Applications & Data Recorded: Oct 19 2017 62 mins
    Ulf Mattsson, David Morris, Juanita Koilpillai
    Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?

    In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software-Defined Perimeter (SDP) as well as encryption and tokenization.

    Join Ulf Mattsson, CTO of Atlantic BT, and his special guests David Morris, Security Scorecard, and Juanita Koilpillai, CEO, Waverley Labs, in this dynamic panel discussion and live Q&A.
  • Controlling access to infrastructure and applications, in cloud and on-prem Recorded: Oct 17 2017 64 mins
    Ulf Mattsson, CTO at Atlantic BT. Alex Hanway, Product Marketing Manager at Gemalto, David Morris, Pioneer in Cybersecurity
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
    This session will discuss Identity and Data Protection solutions for enterprise security, organizations can take a data-centric approach to their security posture, all while controlling access to the infrastructure and applications they rely upon — both on-premises, and in public and private clouds.
  • Fully Autonomous A.I. - Powered Cybersecurity System Recorded: Sep 27 2017 60 mins
    Ulf Mattsson and Richard Malinowski
    A Fully Autonomous A.I.- Powered Cybersecurity System can provide
    automated network protection, endpoint protection and incident management. We will discuss Regulatory Compliance - Supporting adherence to critical regulations.

    We will cover important regulations, including NISPOM, DSS, RMF, NIST 800-53 & 800-171, FFIEC, SOX, HIPPA, and PCI DSS.
    Viewers will learn:
    • Current trends in Cyber attacks
    • FFIEC Cyber Assessment Toolkit
    • NIST Cybersecurity Framework principles
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    Richard Malinowski is CEO of REMTCS including expertise in Cybersecurity & Artificial Intelligence:
    20 Years of experience in Cybersecurity & High Performance Computing
    10 Years of experience in Artificial Intelligence
    7 Patents in Next Generation Security Systems harnessing Artificial Intelligence and High Performance Computing
    Former Head of IT for Western Hemisphere for UBS, ran Crisis Management Team
    Former Head of IT for Citibank’s Money Market and Treasury Divisions
    Former Chief Architect for NASDAQ
  • Understanding Your Attack Surface and Detecting & Mitigating External Threats Recorded: Sep 20 2017 62 mins
    Ulf Mattsson, CTO Atlantic BT. David Morris, Pioneer in Cybersecurity, Benjamin Powell, Technical Manager at RiskIQ
    Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there really is no perimeter. In this presentation, we'll discuss Digital Footprints in understanding your company’s external attack surface. We will discuss social, mobile, web attacks and analyze and review lessons learned recently publicized attacks (Polish banking institutions, Apache Struts Vulnerability or WannaCry ransomware. The speed of business and cybercrime isn't slowing down, so how can you be prepared to address and defend against these types of threats? Attend our session to find out how.
    Reducing Your Digital Attack Surface and Mitigating External Threats - What, Why, How:
    What is a Digital Footprint?
    Breakdown of External Threats (Social, Mobile, Web)
    What are blended attacks?
    What is actually being targeting at your company?
    How are your brands, customers, and employees being attack outside of your company?
    How to become proactive in threat monitoring on the internet?
    Considerations in External Threat solutions
    Threat correspondence tracking considerations
    Is legal cease and desist letters adequate in stopping attacks?
    Examination of a phishing attack campaign
    How phishing kits work
    Analysis and lesson learned from recent published attacks
    What are the most important capability in a digital risk monitoring solution?
  • 2017 Trends in IoT Cyber Attacks Recorded: Sep 13 2017 61 mins
    Ulf Mattsson, David Morris, Mandeep Khera, Juanita Koilpillai
    There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of about 30 billion objects by 2020. This session will discuss the key findings.
    Viewers will learn:
    • Current trends in Cyber attacks for IoT
    • Security Metrics for IoT
    • Oversight of third parties in IoT
    • How to measure cybersecurity preparedness for IoT
    • Automated approaches to integrate Security into IoT
  • Do You Have a Roadmap for EU GDPR Compliance? Recorded: Aug 17 2017 60 mins
    Ulf Mattsson, David Morris, Ian West. and Khizar Sheikh
    The General Data Protection Regulation (GDPR) goes into effect in 2018 and it will affect any business that handles data, even if it's not based in the European Union.

    Are you looking to move and host data for EU citizens? Do you have a roadmap and associated estimated costs for EU GDPR compliance?

    Join this webinar to learn:
    • Case study and legal/regulatory impact to GDPR
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps
  • Learning from WannaCry and now 250 million PCs infected - Long-Term Implications Recorded: Jul 12 2017 61 mins
    Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space
    The massive attack known as WannaCry struck over 900,000 computers worldwide, completely locking victims out of their PCs. The security firm Check Point has warned of a massive new outbreak: They count 250 million PCs infected with malicious code they've called Fireball, designed to hijack browsers to change the default search engine, and track their web traffic on behalf of a Beijing-based digital marketing firm called Rafotech. But more disturbingly, Check Point says it found that the malware also has the ability to remotely run any code on the victim's machine, or download new malicious files. It's potentially serious malware.
    What are the lessons we've learned from Wannacry and other similar attacks? What is the best defense against ransomware?
    In this session, Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space, will lay out common sense steps that organizations should take today to better protect themselves, as well as strategic security principles to guide you going forward.
  • The Myth behind Real Time Malware Detection Recorded: Jun 16 2017 61 mins
    Richard Malinowski, CEO at REMTCS, Ulf Mattsson, CTO at Atlantic BT Security Solutions, David Morris, Security Expert
    All UK submarines are running MS XP (not just UK Health System)! Updated as “MS War Whips” by Dec 2008. Impossible to change the OS.
    This session will cover the Myth behind Real-Time Malware detection and Mitigation. What does real-time mean? Is it achievable? What should a comprehensive malware solution and managed service look like?
  • Learning from Verizon 2017 Data Breach Investigations Report – The New Targets Recorded: Jun 13 2017 60 mins
    Ulf Mattsson, CTO Atlantic BT Security
    The Verizon 2017 Data Breach Investigations Report findings relate specifically to the occurrence (likelihood) of security breaches leading to data compromise. The information, provided in aggregate, is filtered in many ways to make it relevant to you (e.g., by industry, actor motive). It is a piece of the information security puzzle—an awesome corner piece that can get you started—but just a piece nonetheless. This session will discuss the new targets that are identified and some solutions
  • Google Docs and the Future of Phishing Scams Recorded: Jun 8 2017 60 mins
    Vikram Thakur (Symantec), Limor Kessem (IBM), David Morris (Pioneer in Cyber security), Phil Richards (Ivanti)
    When the Google Docs phishing scam spread across the network in early May, it showed what a sophisticated phishing email looks like. It did not ask for a user's password and in some cases, it came from contacts the user already knew. What made this scam so hard to spot and what can we expect to see in the future when it comes to phishing attacks?

    Join this panel of experts to learn:
    - Latest trends in phishing scams
    - How to spot a phishing email from a mile away
    - Recommendations on how to avoid becoming a victim

    Moderator:
    - David Morris, Pioneer in Cyber security

    Speakers:
    - Limor Kessem, Global Executive Security Advisor at IBM
    - Phil Richards, CSO of Ivanti Software
    - Vikram Thakur, Technical Director, Security Response Team at Symantec
Comprehensive Information Security Management and Compliance
Atlantic BT Security Solutions provides a wide range of solutions and services that increase operational efficiency and reduce liabilities and cost. Every solution is fully integrated into your environment and supported by our technical services team.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: PCI DSS 3.2 – What’s New? What are the Best Tools to Prevent Data Loss?
  • Live at: Oct 11 2016 4:00 pm
  • Presented by: Ulf Mattsson, CTO, Compliance Engineering
  • From:
Your email has been sent.
or close