Hi [[ session.user.profile.firstName ]]

Cloud Security & Integration: Protecting your Applications & Data

Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?

In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software-Defined Perimeter (SDP) as well as encryption and tokenization.

Join Ulf Mattsson, CTO of Atlantic BT, and his special guests David Morris, Security Scorecard, and Juanita Koilpillai, CEO, Waverley Labs, in this dynamic panel discussion and live Q&A.
Recorded Oct 19 2017 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ulf Mattsson, David Morris, Juanita Koilpillai
Presentation preview: Cloud Security & Integration: Protecting your Applications & Data

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Rise of Nation State Attacks and what you can do about it Mar 5 2018 5:00 pm UTC 60 mins
    Ulf Mattsson, David Morris
    Emulated Nation-State Pen Testing, what is it and how is it different than other Pen Tests.
  • GDPR: Brace for Impact or Not? Recorded: Feb 22 2018 64 mins
    Lance James | Mark Rasch | Martyn Hope | David Morris
    The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?

    Join this panel of world-class experts:

    Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

    Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.

    Martyn Hope: Founder of the EU-GDPR Institute.

    In this session you will learn:
    - What will happen if I'm not Compliant by May 25, 2018
    - Where do I Begin to start my compliance effort
    - Who should I trust to advise me through my compliance program

    If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
  • The Real Cybersecurity Threat - The GAP in Cybersecurity Talent Recorded: Feb 9 2018 64 mins
    Dick Morrell, Barak Engel, David Morris
    This session will discuss the generational GAP in Cybersecurity Talent. One of the biggest challenges facing the Cybersecurity Community is filling the GAP as quickly as possible through mentoring and bright talent eager to enter the field with little or no cybersecurity background.
  • FEDRAMP - What is it and why should I care? Recorded: Jan 25 2018 63 mins
    David Morris, Juanita Koilpillai, Merrick Watchorn, Aaron Bishop
    Come and get educated by the leading FedRAMP Experts:
    Juanita Koilpillai: Former CTO of one of the first FedRAMP Third Party Assessors (3PAOs)
    Dr. Merrick Watchorn: FedRAMP High Security Control Baseline Team Lead, Cloud Computing Standards Roadmap, High Performance Computing Work Group
    Aaron Bishop:Former CISO at SAIC, General Manager at National Security Group, Microsoft, CIO at ANSTEC

    This session will cover FEDRAMP - the Government's complicated process for the protection of information assets. The difference between infrastructure and application security.The challenges & pitfalls in meeting the NIST framework for Federal Cloud adoption.
  • EU/GDPR Compliance - How do you test for Compliance? Recorded: Jan 22 2018 64 mins
    Ulf Mattsson, Ian White, Mark Rasch
    This session will cover how to test for compliance
  • Advanced Cyber Security: Data-driven Defense - The CISO's Dilemma Recorded: Jan 16 2018 58 mins
    Ulf Mattsson, Lance James, Barak Engel
    This session will cover the various conflicting constituencies that CISO's deal with on a regular basis and future trends.

    If you are a CISO, Board Member, CEO, CIO, COO or just want to better understand the role and challenges that today’s CISO’s Face, this is a must attend session. We are at a crossroad, and the CISO is crucial to helping navigate the way, but are they being heard?

    Join this panel of experts for a highly controversial discussion:
    • What is the Role and Goal of the CISO and What should it be.
    • The Business of Being a CISO: It’s not just all about Technology
    • The CISO as part of the Marketing Team
    • The CISO vs. The Compliance Officer
    • The CISO as a Technocrat
    • It’s not all on the CISO: Do Boards bear some responsibility
    • In an always on, 24x7, I want it now world; How does the CISO Succeed
    • The CISO Reimagined

    About the Speakers:

    Barak Engel: Chief Geek at EAmmune, CISO at Amplitude Analytics. Decades in the information security field, and in CISO/ vCISO roles: WebEx, Loyalty Labs, MarketLive/Kibo, MuleSoft, Mashery/Intel, Wrap, Amplitude.

    Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

    Ulf Mattsson: Innovation Officer at TokenEX. Member of the PCI Security Standards Council, ISSA and ISACA lecturer and ISACA Journal Contributor. Encryption and Tokenization Expert with over three decades of experience in Cybersecurity with more than 55 patents.
  • Cloud and IOT Security: Considerations for securing data Recorded: Dec 13 2017 46 mins
    Ulf Mattsson, David Morris, Juanita Koilpillai
    As the adoption of cloud computing and Iot increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your own on premise firewalls and other security products. This has the potential of creating data blind spots that can affect your overall security posture—both for your internal data and those of your customers and clients. To protect your business, you need a balanced approach to managing IoT and cloud risk and respective security controls—combining compliance, responsiveness, and engineering without sacrificing usability and agility. During this Webinar, we will walk through a check list of questions to ask your business units to ensure your cloud usage is not putting your enterprise at risk.

    Cloud Security Platforms can provide cost effective Ecommerce, mobile, payment security, fraud management, and secure file transfer as a flexible software as a service (SaaS). These solutions, operating on tightly controlled secure data centers, provide a cloud security solution that adapts and integrates with a variety of business processes and organizations.

    Join this presentation to learn how to reduce risk associated with moving to the cloud while maintaining simplicity and efficacy.

    - IT is all about the data - Do you know what data you have, where it is, and how is protected?
    - What are your security responsibilities for IoT and those of your cloud service provider?
    - What is your current risk register regarding use of the your cloud service provider (confidentiality, integrity and availability)?
    - How do you perform a risk assessment for your current and emerging cloud services and IoT?
  • Integrate Security into DevOps - SecDevOps Recorded: Nov 16 2017 63 mins
    Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space
    Topics:
    1.Security Controls Must Be Programmable and Automated Wherever Possible
    2.Implement a Simple Risk and Threat Model for All Applications
    3.Scan Custom Code, Applications and APIs
    4.Scan for OSS Issues in Development
    5.Treat Scripts/Recipes/Templates/Layers as Sensitive Code
    6.Measure System Integrity and Ensure Correct Configuration at Load
    7.Use Whitelisting on Production Systems, Including Container-Based Implementations
    8.Assume Compromise; Monitor Everything; Architect for Rapid Detection and Response
    9.Lock Down Production Infrastructure and Services
    10.If Containers Are Used, Acknowledge and Address the Security Limitations
  • 2018 - The New Targets and New Technologies Recorded: Nov 15 2017 64 mins
    Ulf Mattsson, David Morris, Rich Morrell, Juanita Koilpillai
    2018 is bringing new Threats & Technologies.
    Viewers will learn:
    • Case studies and Current trends in Cyber attacks
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    Juanita Koilpillai is President at Digital Risk Management Institute. She
    Coauthored the Software Defined Perimeter Specification sponsored by the Cloud Security Alliance, Developed a Security Risk Index System adopted by NIST to calculate risk of moving applications to the cloud, She is a Key member of FEMA’s Enterprise Security Management Team: drafting U.S. Government’s initial Critical Infrastructure Protection Plan Led the team that developed the 1st security event & incident response system: sold to Symantec and Led the team that deployed the 1st modern Air Traffic Control System for the FAA.

    Rich Morrell is CTO and Managing Director of Falanx Group - Cyber Defence, CISO and Director of Cloud Security Alliance. Former Senior Security Strategist at Red Hat. Former CTO at Gartner Global Security Risk Practice. Founder and co-author of SmoothWall protecting over 200m networks globally since 2000.
  • EU GDPR Details Recorded: Oct 25 2017 64 mins
    Ulf Mattsson, Ian West, Martyn Hope, Denver Edwards
    Martyn Hope the founder of the GDPR Institute will talk about EU GDPR Details
  • Cloud Security - Protection Against Evolving Data Security Threats Recorded: Oct 24 2017 64 mins
    Ulf Mattsson, David Morris, Rich Morrell, Juanita Koilpillai
    Cloud Security- Protection Against Evolving Security Threats
    Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?
    In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software Defined Perimeter (SDP) as well as encryption and tokenization.
  • Cloud Security & Integration: Protecting your Applications & Data Recorded: Oct 19 2017 62 mins
    Ulf Mattsson, David Morris, Juanita Koilpillai
    Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?

    In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software-Defined Perimeter (SDP) as well as encryption and tokenization.

    Join Ulf Mattsson, CTO of Atlantic BT, and his special guests David Morris, Security Scorecard, and Juanita Koilpillai, CEO, Waverley Labs, in this dynamic panel discussion and live Q&A.
  • Controlling access to infrastructure and applications, in cloud and on-prem Recorded: Oct 17 2017 64 mins
    Ulf Mattsson, CTO at Atlantic BT. Alex Hanway, Product Marketing Manager at Gemalto, David Morris, Pioneer in Cybersecurity
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
    This session will discuss Identity and Data Protection solutions for enterprise security, organizations can take a data-centric approach to their security posture, all while controlling access to the infrastructure and applications they rely upon — both on-premises, and in public and private clouds.
  • Fully Autonomous A.I. - Powered Cybersecurity System Recorded: Sep 27 2017 60 mins
    Ulf Mattsson and Richard Malinowski
    A Fully Autonomous A.I.- Powered Cybersecurity System can provide
    automated network protection, endpoint protection and incident management. We will discuss Regulatory Compliance - Supporting adherence to critical regulations.

    We will cover important regulations, including NISPOM, DSS, RMF, NIST 800-53 & 800-171, FFIEC, SOX, HIPPA, and PCI DSS.
    Viewers will learn:
    • Current trends in Cyber attacks
    • FFIEC Cyber Assessment Toolkit
    • NIST Cybersecurity Framework principles
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps

    Richard Malinowski is CEO of REMTCS including expertise in Cybersecurity & Artificial Intelligence:
    20 Years of experience in Cybersecurity & High Performance Computing
    10 Years of experience in Artificial Intelligence
    7 Patents in Next Generation Security Systems harnessing Artificial Intelligence and High Performance Computing
    Former Head of IT for Western Hemisphere for UBS, ran Crisis Management Team
    Former Head of IT for Citibank’s Money Market and Treasury Divisions
    Former Chief Architect for NASDAQ
  • Understanding Your Attack Surface and Detecting & Mitigating External Threats Recorded: Sep 20 2017 62 mins
    Ulf Mattsson, CTO Atlantic BT. David Morris, Pioneer in Cybersecurity, Benjamin Powell, Technical Manager at RiskIQ
    Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there really is no perimeter. In this presentation, we'll discuss Digital Footprints in understanding your company’s external attack surface. We will discuss social, mobile, web attacks and analyze and review lessons learned recently publicized attacks (Polish banking institutions, Apache Struts Vulnerability or WannaCry ransomware. The speed of business and cybercrime isn't slowing down, so how can you be prepared to address and defend against these types of threats? Attend our session to find out how.
    Reducing Your Digital Attack Surface and Mitigating External Threats - What, Why, How:
    What is a Digital Footprint?
    Breakdown of External Threats (Social, Mobile, Web)
    What are blended attacks?
    What is actually being targeting at your company?
    How are your brands, customers, and employees being attack outside of your company?
    How to become proactive in threat monitoring on the internet?
    Considerations in External Threat solutions
    Threat correspondence tracking considerations
    Is legal cease and desist letters adequate in stopping attacks?
    Examination of a phishing attack campaign
    How phishing kits work
    Analysis and lesson learned from recent published attacks
    What are the most important capability in a digital risk monitoring solution?
  • 2017 Trends in IoT Cyber Attacks Recorded: Sep 13 2017 61 mins
    Ulf Mattsson, David Morris, Mandeep Khera, Juanita Koilpillai
    There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of about 30 billion objects by 2020. This session will discuss the key findings.
    Viewers will learn:
    • Current trends in Cyber attacks for IoT
    • Security Metrics for IoT
    • Oversight of third parties in IoT
    • How to measure cybersecurity preparedness for IoT
    • Automated approaches to integrate Security into IoT
  • Do You Have a Roadmap for EU GDPR Compliance? Recorded: Aug 17 2017 60 mins
    Ulf Mattsson, David Morris, Ian West. and Khizar Sheikh
    The General Data Protection Regulation (GDPR) goes into effect in 2018 and it will affect any business that handles data, even if it's not based in the European Union.

    Are you looking to move and host data for EU citizens? Do you have a roadmap and associated estimated costs for EU GDPR compliance?

    Join this webinar to learn:
    • Case study and legal/regulatory impact to GDPR
    • Security Metrics
    • Oversight of third parties
    • How to measure cybersecurity preparedness
    • Automated approaches to integrate Security into DevOps
  • Learning from WannaCry and now 250 million PCs infected - Long-Term Implications Recorded: Jul 12 2017 61 mins
    Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space
    The massive attack known as WannaCry struck over 900,000 computers worldwide, completely locking victims out of their PCs. The security firm Check Point has warned of a massive new outbreak: They count 250 million PCs infected with malicious code they've called Fireball, designed to hijack browsers to change the default search engine, and track their web traffic on behalf of a Beijing-based digital marketing firm called Rafotech. But more disturbingly, Check Point says it found that the malware also has the ability to remotely run any code on the victim's machine, or download new malicious files. It's potentially serious malware.
    What are the lessons we've learned from Wannacry and other similar attacks? What is the best defense against ransomware?
    In this session, Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space, will lay out common sense steps that organizations should take today to better protect themselves, as well as strategic security principles to guide you going forward.
  • The Myth behind Real Time Malware Detection Recorded: Jun 16 2017 61 mins
    Richard Malinowski, CEO at REMTCS, Ulf Mattsson, CTO at Atlantic BT Security Solutions, David Morris, Security Expert
    All UK submarines are running MS XP (not just UK Health System)! Updated as “MS War Whips” by Dec 2008. Impossible to change the OS.
    This session will cover the Myth behind Real-Time Malware detection and Mitigation. What does real-time mean? Is it achievable? What should a comprehensive malware solution and managed service look like?
  • Learning from Verizon 2017 Data Breach Investigations Report – The New Targets Recorded: Jun 13 2017 60 mins
    Ulf Mattsson, CTO Atlantic BT Security
    The Verizon 2017 Data Breach Investigations Report findings relate specifically to the occurrence (likelihood) of security breaches leading to data compromise. The information, provided in aggregate, is filtered in many ways to make it relevant to you (e.g., by industry, actor motive). It is a piece of the information security puzzle—an awesome corner piece that can get you started—but just a piece nonetheless. This session will discuss the new targets that are identified and some solutions
Comprehensive Information Security Management and Compliance
The Cybersecurity- No Spin Zone is dedicated first and foremost to educating viewers about Cybersecurity Technologies, Problems, Compliance and Legal FACTS. We are not a Vendor Sponsored Channel, this gives us the unique ability to bring you factual unbiased information and advice from subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cloud Security & Integration: Protecting your Applications & Data
  • Live at: Oct 19 2017 5:00 pm
  • Presented by: Ulf Mattsson, David Morris, Juanita Koilpillai
  • From:
Your email has been sent.
or close