Hi [[ session.user.profile.firstName ]]

How Can I Automatically Find and Fix My Data Security Blind Spots?

The need to detect data security blind spots is becoming more important every day. This includes sensitive data that was not found in the data discovery process, as well as failures of our deployed critical security control systems. Without formal and automated processes to detect and alert to new data discovery findings and critical security control failures as soon as possible, the window of time grows, allowing attackers to identify a way to compromise the systems and steal sensitive data. This can also impact our real compliance posture and compliance to PCI DSS 3.2.

Revisions to PCI DSS point toward the realization that security must be built into the development process. This is frequently referred to as Rugged DevOps or SecDevOps, and is embracing the speed of DevOps and continuous delivery in a secure environment. DevOps does affect security, and you can use it to your advantage. As cloud, big data and DevOps disrupt traditional approaches to security, new capabilities emerge to automate and enhance security operations.

Join this session and learn how to automatically report on these data security blind spots and how security can be built into the development process and platforms. Ulf Mattsson, CTO of Compliance Engineering will discuss how security can be built into Rugged DevOps,SecDevOps, DevSecOps, Scrum, SAFe, DAD and use in Large-scale Development.
Recorded Nov 8 2016 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ulf Mattsson, CTO at Compliance Engineering
Presentation preview: How Can I Automatically Find and Fix My Data Security Blind Spots?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Smart agreements on Blockchain - Create Blockchain powered Smart agreements Jun 5 2019 4:00 pm UTC 60 mins
    Ajay Jasti, Founder of kontrakt.co, New York
    We will discuss Smart agreements on Blockchain and how to create Blockchain powered Smart agreements. It is time for intelligent and self-aware contracts. Create, execute and maintain legal contracts that can be highly customized and automated with a platform powered by Blockchain, Internet-of-Things and Artificial Intelligence. This can ensure secure authentication, minimize fraud and provide complete control of your identity and ensure your privacy.
  • A New Approach to Next-Gen Encryption Mar 27 2019 4:00 pm UTC 60 mins
    Sophos and Ulf Mattsson
    Data loss is an ongoing concern for all organizations. At the same time the world we work in has changed and people - and their data - are increasingly mobile and on an ever-growing number of devices and applications. Businesses need to secure their data and comply with regulations, without slowing down their users. Now is the time for a Next-Gen Encryption strategy that offers a new approach to data security, designed specifically to meet your needs.
  • Blockchain Solutions and Post-Quantum Cryptography Feb 27 2019 3:00 pm UTC 30 mins
    Dr. Rachid El Bansarkhani CEO of QuantiCor
    We will discuss solutions for Blockchain Solutions and Post-Quantum Cryptography
  • Investing in Blockchain Feb 20 2019 5:00 pm UTC 60 mins
    Nicholas John King, Blockchain & Digital Assets Fund Founder- Blockchainandai CEO
    We will discuss Blockchain & Digital Assets.
    Nicholas King is a investBlockchain Expert panelist globally helping successful ICOs and Blockchain Companies expand globally and profitably.
  • Blockchain initiatives at the Samsung Innovation Center Feb 13 2019 5:00 pm UTC 60 mins
    John Jefferies leader of blockchain initiatives at Samsung Innovation Center and Ulf Mattsson, Head of Innovation at TokenEx
    We will discuss the 20 top cryptocurrency exchanges globally that revealed that 97% of direct bitcoin payments from identifiable criminal sources were received by unregulated cryptocurrency exchanges. We will also discuss Use Cases in digital asset businesses, regulators and law enforcement on investigations, analytics and anti-money laundering. John Jefferies did the analysis of these cases.
    John also led blockchain initiatives at Samsung Innovation Center.
  • Blockchain interoperability and co-opetition Feb 6 2019 3:00 pm UTC 60 mins
    Cindy Mallory, Emergent Tech Strategist, Blockchain Co-chair
    This webinar will discuss Blockchain interoperability and co-opetition
  • Data Protection On-premises, and in Public and Private Clouds Jan 31 2019 5:00 pm UTC 60 mins
    Ulf Mattsson
    ​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

    Learn about the Identity and Data Protection solutions for enterprise security organizations can take a data-centric approach to their security posture. This session will discuss how to control access to the infrastructure and applications — both on-premises, and in public and private clouds.
  • The Rise of Nation State Attacks and what you can do about it Jan 30 2019 5:00 pm UTC 60 mins
    Ulf Mattsson, David Morris
    Emulated Nation-State Pen Testing, what is it and how is it different than other Pen Tests.
  • Powering business operations with blockchain Jan 29 2019 4:00 pm UTC 60 mins
    Irene Dima, Director IIB Council
    With the explosion of cryptocurrency over the past of years, many have been debating the longevity and legitimacy of cryptocurrencies in our global economy. However, those with a keener eye were fascinated with something far more useful and widely applicable: Blockchain — the technology that made cryptocurrency possible in the first place.
    The rise of Blockchain since then has been nothing short of remarkable, with gigantic companies like Microsoft, Oracle, and IBM investing heavily in the technology. The job market took notice as well, with demand on Toptal – a marketplace for on-demand tech talent- increasing 700% since January 2017.
    In fact, Blockchain-related jobs are now the second-fastest growing in today’s labor market according to TechCrunch. While it’s not news that there is a significant shortage when it comes to programming skills in the global market today, you might be surprised by the numbers that indicate the level of shortage we have in our global labor market. For instance, it’s expected that there would be 1 million programming job openings by 2020, with as many as 83% of CIOs struggling to find tech talent, according to a recent research by TechRepublic.
    Combine that with the exponential growth in demand for blockchain jobs, and it’s no surprise that even those extremely high numbers would continue to rise. To best address this challenge, IIB has taken an approach that adopts a globalized delivery of vocational education and training with agreed-upon levels of requirements among Blockchain experts.
    Irene is Director of the IIB Council, Leading the IIB Council's global initiatives and strategic partnerships. Working with industry leaders and subject matter experts from Fortune 500 companies to develop cutting edge Business-Tech certification courses.
  • Threat Hunting: A Live Demonstration Jan 24 2019 5:00 pm UTC 90 mins
    David Morris, Andrew Johnston, Mark Rasch
    This session will feature a live demonstration of Threat Hunting by a former Federal law enforcement cyber threat hunter. In this session, you will see what a Threat Hunter actually does and how it is done.
  • How will New Regulations Impact Cloud and Blockchain in 2019? Jan 23 2019 5:00 pm UTC 60 mins
    This expert panel include Ulf Mattsson, RICARDO G. DIAZ, the founder and CEO of BCLT and chief identity architects
    Breached businesses in Europe: Brace for more class action lawsuits. GDPR Compliance in a Data-Driven World. Insights from a 2018 Survey. Learn More. There have been countless breaches before — Facebook has even dealt with specific login bugs like this one — but the GDPR changes everything. If the company is found to have violated the rule, it could be liable for up to four percent of annual revenue, a staggering $4 billion. Under the GDPR, the question of blame largely hinges on whether the company was negligent, ignoring basic practices that could have prevented the breach. Both Facebook and Google have already come under fire for having Terms of Service that violate the regulation. Facebook is preparing for what could be the fight of its life. No one has ever litigated these issues before, and we only have a hazy sense of what a strong or weak GDPR case looks like. We’re just months into the GDPR regime, and there’s simply no roadmap for how it can be used.
    This expert panel will discuss how How will GDPR impact Blockchain in 2019.
  • Challenges of Key Management in Blockchain Jan 16 2019 5:00 pm UTC 60 mins
    Ulf Mattsson and Tasso Mangfas, VP North America Presales Unbound Tech
    We will present the challenges of Key Management in Blockchain and discuss cybersecurity, Cryptography, Strong Authentication, Multi-Party Computation and Blockchain.
  • Visualizing a Digital Revolution of the 21st Century Jan 10 2019 5:00 pm UTC 60 mins
    Eric Paul McNeil, Sr., Tableau Architect and Cyber-Security/Blockchain Researcher
    The goal of this brief is to quickly introduce Blockchain analytic dashboard usages. It could be said that the average person has no idea what Crypto-Currency is nor, can they explain how the technology works. Some would agree more people are now beginning to comprehend crypto-currencies like Bitcoin are simply some type of electronic investment instrument as in the American dollar.

    However, most individuals in the general population still don’t grasp the potential value of blockchain platforms. Nevertheless, a lot of technologists, researchers and professionals understand distributed ledgers are used to process and store user data associated with various types of transactions within blockchains.

    Herein, we will crack open the cyber wallet/vault using a software platform to briefly demo three user dashboard scenarios which will illustrate Blockchain use case value: Asset Auditor; Purchase Tracker; Anomaly Reporter
  • 2019: A Cybersecurity Reality Check Dec 12 2018 4:00 pm UTC 90 mins
    David Morris, Barak Engel, Richard Morrell and Mark Rasch
    Will 2019 bring any real transformative cybersecurity technology advancements that will have an impact? Tune into this controversial eye opening session on what's in store for 2019 in the cybersecurity space.
  • Self Sovereign Identity - Going Where No Identity Has Gone Before Nov 26 2018 5:00 pm UTC 60 mins
    Ricardo Diaz, Blockchain CLT, Founder Managing Partner, Mike Lodder, Sovrin Foundation Security Maven
    Data privacy is dead. Social login is not the answer. Over thirty years of cyber security internal controls have fallen short of protecting our data. Traditional identity and access management (IAM) systems, aka Web 2.0 IAM, have evolved but only exacerbates the proliferation of centralized identity repositories. Centralized identity repositories that have for decades been the “Crown Jewels” of every malicious hacker or nation state bad actor to be the gateway to our personally identifiable information. A new paradigm shift in the identity management industry is here, Web 3.0 IAM. Blockchain identity management has many names. Decentralized identity. Self-Sovereign Identity. Multi-source identity. All define the same new IAM future. An identity management system powered by distributed ledger technology.
    We will cover the basics of what is Self-Sovereign Identity (SSI) and this evolution of the IAM space. The webcast will showcase how one of the SSI leaders in the blockchain identity space, Sovrin, works. Sovrin.org is the leading SSI public identity network solutions in the Blockchain world. It is an open source project managed by the Hyperledger Indy project within the Linux Foundation.
    Speakers
    Michael Lodder: Security Maven | Sovrin Foundation
    Mike currently works on all things security related to algorithms, protocols, and technology. I have worked in the identity and security space for many years.
    Ricardo Diaz: Founder | Managing Partner | Blockchain CLT
    Ricardo is the founder of Blockchain CLT, a DLT services and solution business based out of the Charlotte, NC. He is a serial entrepreneur, human rights advocate, social impact entrepreneur and has a passion for decentralized identity (SSI). An enterprise software executive, cyber security, identity management, cloud and decentralized computing professional with almost 25 years of working experience in engineering, consulting, sales, marketing and business development roles.
  • Encryption & Tokenization as Effective GDPR Best Practices Recorded: Oct 26 2018 63 mins
    An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
  • What is a Secure Enterprise Architecture Roadmap? Recorded: Sep 20 2018 69 mins
    Juanita Koilpillai, Bob Flores, Mark Rasch, Ulf Mattsson, David Morris
    This session will cover the following topics:

    * What is a Secure Enterprise Architecture roadmap (SEA)?
    * Are there different Roadmaps for different industries?
    * How does compliance fit in with a SEA?
    * Does blockchain, GDPR, Cloud, and IoT conflict with compliance regulations complicating your SEA?
    * How will quantum computing impact SEA roadmap?
  • Threat Hunting - Hype or Substance Recorded: Sep 18 2018 65 mins
    Roselle Safran, UJ Desai and David Morris
    This session will cover the practice of Threat Hunting, when to use it, where to use it, and the technical skills needed to effectively deliver value to an organization.
    You will learn:
    - The difference between Threat Intelligence and Threat Data
    - What is Threat Hunting in relation to Threat Intelligence and Threat Data
    - When and where to apply Threat Hunting
    - What you can reasonably expect to gain through the use of Threat Hunting
  • GDPR - A users perspective Recorded: Sep 12 2018 61 mins
    Mark Rasch and Ray Ford
    This session will cover GDPR from a users perspective, examining the trials and tribulations of working towards GDPR readiness.
  • Encryption & Tokenization as effective GDPR Best Practices Recorded: Aug 20 2018 63 mins
    An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
Comprehensive Information Security Management and Compliance
The Cybersecurity- No Spin Zone is dedicated first and foremost to educating viewers about Cybersecurity Technologies, Problems, Compliance and Legal FACTS. We are not a Vendor Sponsored Channel, this gives us the unique ability to bring you factual unbiased information and advice from subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How Can I Automatically Find and Fix My Data Security Blind Spots?
  • Live at: Nov 8 2016 5:00 pm
  • Presented by: Ulf Mattsson, CTO at Compliance Engineering
  • From:
Your email has been sent.
or close