PCI DSS 3.2 – What’s New? What are the Best Tools to Prevent Data Loss?
PCI DSS v3.2 provides an important and unique update on data discovery (A3.2.5, A3.2.5.1, A3.2.6) for service providers. Join this webinar and learn about the new requirements, and how implementing data discovery solutions can make it easier to validate PCI compliance.
It is becoming widely recognized that “unknown” data leakage of PCI data, and more broadly other Personally Identifiable Information, within enterprises is the highest value target for the “bad guys”. While current market Data Loss Prevention tools are valuable, they do not provide for expansive and prescriptive data discovery. We urgently need more intelligent data discovery tools to dynamically limited our attack surface.
This presentation will highlight some of these tools.
RecordedOct 11 201648 mins
Your place is confirmed, we'll send you email reminders
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
Learn about the Identity and Data Protection solutions for enterprise security organizations can take a data-centric approach to their security posture. This session will discuss how to control access to the infrastructure and applications — both on-premises, and in public and private clouds.
Data loss is an ongoing concern for all organizations. At the same time the world we work in has changed and people - and their data - are increasingly mobile and on an ever-growing number of devices and applications. Businesses need to secure their data and comply with regulations, without slowing down their users. Now is the time for a Next-Gen Encryption strategy that offers a new approach to data security, designed specifically to meet your needs.
Threat Hunting is a complicated and often misunderstood cybersecurity activity that if properly used can add tremendous value to your cybersecurity posture.
In this session you will learn:
What is Threat Hunting?
When do I use it?
What will it tell me?
How do I use it?
There are many technologies that secure our transactions and our financial information. But as challenges get greater, the technology needs to get better. Discover the latest in financial security technology in this track.
Juanita Koilpillai, CEO of Waverley Labs and Todd McAnally, Early Pioneer in SDP, CTO Waverley Labs
This session will include a biref overview of Software Defined Perimeters and will then proceed to dirll-down on specific use cases.
In this session you will learn what are some of the most popular use cases for Software Defined Perimeters and who has used them.
Join this panel of SDP experts:
Juanita Koilpillai, CEO of Waverley Labs and Todd McAnally, Early Pioneer in SDP, CTO Waverley Labs
While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.
This session will cover:
•The migration of data centers to satellites
•The risks, vulnerabilities and threats posed to a satellites based datacenter
Learn what keeps CISOs up at night when it comes to threats coming from the IoT. This session will cover:
Do I know what IoT devices are internal to my company? Do I know what IoT devices are externally entering my company via my employees, contractors and vendors?
Do I know what threats and vulnerabilities these IoT devices represent to my company?
Ulf Mattsson, ITRON, Juanita Koilpillai, Dick Morell, Barak Engell
Join this panel discussion to understand the mass adoption of IoT & Smart City technologies, and what the underlying security concerns are for these infrastructures.
This session will cover:
What is a Smart City?
What are the Security concerns surrounding a Smart City?
Moderator: David Morris
Panelists: ITRON, Juanita Koilpillai, Dick Morell, Barak Engell
Martyn Hope, Ian White, Mark Rasch, Barak Engel, Lance James
When a Breach occurs, what are the best practices to comply with the GDPR's notification requirements. This session will cover:
Breach Notification rules
Who, what and when to notify?
Find out why data protection and encryption should be the first place to start when preparing for GDPR.
In this Session you will learn from the leading experts:
Ulf Mattsson:The father of database Encryption.
Martyn Hope: The Co-Founder of the GDPR Institute.
Mark Rasch: Former Chief Cybersecurity Evangelist at Verizon and led the DOJ's Cyber Crime Unit.
This session will delve into the concept of Active Defense in Depth, what is it, and what are its implications - legally, operationally, tactically and strategically
Lance James, Barak Engel, Dick Morrell, David Morris
Discover what CISOs, CSOs and CIOs need to know to better communicate their security strategy to the board. Why and How the CISO must be part of the Board beyond just a technocrat. This session will cover:
Beyond linking risk, security, value and cost to the Board, how does the CISO become part the revenue stream moving beyond a cost center.
GDPR is going to have a greater impact on the Financial Services Sector beyond just implementing the latest security solutions.
This session will cover:
Does GDPR apply to me?
What is the impact to people, process and Technology?
What can I do?
Ulf Mattsson (Head of Innovation, TokenEX) | Peter Partyka (Dir. Information Security, FlashPoint), David Morris
This webinar is part of BrightTALK's Ask the Expert Series.
Join world-class security and blockchain experts Ulf Mattsson and Peter Partyka to learn more about:
- Basic introduction to Blockchain and its applications
- The future of Blockchain and cryptocurrencies
Audience members are encouraged to send questions to the experts, which will be answered during the live session.
Comprehensive Information Security Management and Compliance
The Cybersecurity- No Spin Zone is dedicated first and foremost to educating viewers about Cybersecurity Technologies, Problems, Compliance and Legal FACTS. We are not a Vendor Sponsored Channel, this gives us the unique ability to bring you factual unbiased information and advice from subject matter experts.
PCI DSS 3.2 – What’s New? What are the Best Tools to Prevent Data Loss?Ulf Mattsson, CTO, Compliance Engineering[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]47 mins
Share with your team
(they'll receive one email invite and nothing else)
[[ email ]]
PCI DSS 3.2 – What’s New? What are the Best Tools to Prevent Data Loss?Ulf Mattsson, CTO, Compliance Engineering[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]47 mins