Hi [[ session.user.profile.firstName ]]

Secure Datacenters in Space

While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.

Join this panel of experts as we cover:
•The migration of data centers to satellites
•The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters

Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation

Jeff Snyder: CTO at Cloud Constellation Corporation

Alex Perzold:Co-Founder and CEO at TokenEx
Recorded Jun 20 2018 81 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dennis Gatens, Jeff Snyder, Alex Pezold,David Morris
Presentation preview: Secure Datacenters in Space

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A New Approach to Next-Gen Encryption Feb 28 2019 5:00 pm UTC 60 mins
    Sophos and Ulf Mattsson
    Data loss is an ongoing concern for all organizations. At the same time the world we work in has changed and people - and their data - are increasingly mobile and on an ever-growing number of devices and applications. Businesses need to secure their data and comply with regulations, without slowing down their users. Now is the time for a Next-Gen Encryption strategy that offers a new approach to data security, designed specifically to meet your needs.
  • Data Protection On-premises, and in Public and Private Clouds Jan 31 2019 5:00 pm UTC 60 mins
    Ulf Mattsson
    ​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

    Learn about the Identity and Data Protection solutions for enterprise security organizations can take a data-centric approach to their security posture. This session will discuss how to control access to the infrastructure and applications — both on-premises, and in public and private clouds.
  • The Rise of Nation State Attacks and what you can do about it Dec 28 2018 5:00 pm UTC 60 mins
    Ulf Mattsson, David Morris
    Emulated Nation-State Pen Testing, what is it and how is it different than other Pen Tests.
  • Transformative Tech Predictions in 2019 Dec 12 2018 5:00 pm UTC 60 mins
    Ulf Mattsson, David Morris, Juanita Koilpillai
    What are the new cybersecurity advancements that are most likely to have a significant impact in 2019?
  • What is a Secure Enterprise Architecture Roadmap? Recorded: Sep 20 2018 69 mins
    Juanita Koilpillai, Bob Flores, Mark Rasch, Ulf Mattsson, David Morris
    This session will cover the following topics:

    * What is a Secure Enterprise Architecture roadmap (SEA)?
    * Are there different Roadmaps for different industries?
    * How does compliance fit in with a SEA?
    * Does blockchain, GDPR, Cloud, and IoT conflict with compliance regulations complicating your SEA?
    * How will quantum computing impact SEA roadmap?
  • Threat Hunting - Hype or Substance Recorded: Sep 18 2018 65 mins
    Roselle Safran, UJ Desai and David Morris
    This session will cover the practice of Threat Hunting, when to use it, where to use it, and the technical skills needed to effectively deliver value to an organization.
    You will learn:
    - The difference between Threat Intelligence and Threat Data
    - What is Threat Hunting in relation to Threat Intelligence and Threat Data
    - When and where to apply Threat Hunting
    - What you can reasonably expect to gain through the use of Threat Hunting
  • GDPR - A users perspective Recorded: Sep 12 2018 61 mins
    Mark Rasch and Ray Ford
    This session will cover GDPR from a users perspective, examining the trials and tribulations of working towards GDPR readiness.
  • Encryption & Tokenization as effective GDPR Best Practices Recorded: Aug 20 2018 63 mins
    An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
  • Defending our Critical Infrastructure Recorded: Aug 16 2018 62 mins
    Juanita Koilpillai and Mark Rasch
    Critical Infrastructures such as Power, Water, Internet, Pipeline(Gas), and Smart Cities have been and continue to be attacked. This session will address the vulnerabilities and best practices for defending and protecting critical infrastructures.

    In this session, you will learn:
    Attacks most commonly used
    Defensive measures
    Best practices
  • The State of Cybersecurity in the Healthcare Industry Recorded: Aug 15 2018 62 mins
    Juanita Koilpillai, Mark Rasch and Dr. Jerald Dawkins
    In this session we will use the NIST Cybersecurity Framework as a backdrop to delve into the state of Cybersecurity preparedness within the healthcare sector. This sector is among the most vulnerable and least mature.
    In this session we will examine:
    - What are the vulnerabilities to the Healthcare sector?
    - What are the NIST Cybersecurity Framework implications?
    - What are some immediate best practices?
  • Financial Services and GDPR: The Next 60 Days…. Recorded: Aug 14 2018 61 mins
    Ray Ford, Mark Rasch, Mary J. Hildebrand and David Morris
    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies.

    This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.

    Learn from this leading panel of experts:.
    - Ray Ford: Founding member of the GDPR Institut
    - Mark Rasch: Chief Legal Council, Digital Risk Management Institute, Former head of US Dept. of Justice, Cyber and High Technology Crime Unit
    - Mary J. Hildebrand CIPP/US/E, Partner, Founder, and Chair, Privacy & Cybersecurity, Lowenstein Sandler LLP
  • Threat Hunting - An In-depth Explanation Recorded: Jul 23 2018 61 mins
    Juanita Koilpillai, Mark Rasch, Andrew Johnston and David Morris
    Threat Hunting is a complicated and often misunderstood cybersecurity activity that if properly used can add tremendous value to your cybersecurity posture.

    In this session you will learn:
    What is Threat Hunting?
    When do I use it?
    What will it tell me?
    How do I use it?
    What are the legal implications?

    Learn from the following leading experts:
    Juanita Koilpillai: Chief Technology Advisor, Digital Risk Management Institute
    Mark Rasch: Chief Legal Council,Digital Risk Management Institute
    Andrew Johnston: Associate Consultant,Mandiant
  • NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM ED Recorded: Jul 18 2018 60 mins
    Ulf Mattsson, Dick Morrell, Juanita Koilpillai
    NOTE: This Session has been moved to the August 14th FinTech Summit at 1:00PM EDT

    Financial Services and GDPR: The next 60 days….

    In response to GDPR and Privacy Shield changes, entities in the Financial Services Industries have taken initial steps to identify gaps and modify their public facing privacy policies. This session will focus on what these heavily regulated industries will have to do in the next 60 days to establish and maintain a legally defensible position with respect to privacy and security of personal data not only to comply with regulation but to be poised to do business in the 21st Century.
  • Software Defined Perimeter - In Depth Use Cases Recorded: Jul 9 2018 53 mins
    Juanita Koilpillai, CEO of Waverley Labs and Bob Flores, Co-Founder of Cognitio Corp., David Morris
    This session will include a biref overview of Software Defined Perimeters and will then proceed to dirll-down on specific use cases.
    In this session you will learn what are some of the most popular use cases for Software Defined Perimeters and who has used them.

    Join this panel of SDP experts:
    Juanita Koilpillai, CEO of Waverley Labs
    Bob Flores, C0-Founder of Cognitio Corp and former CTO of the CIA.
  • Secure Datacenters in Space Recorded: Jun 20 2018 81 mins
    Dennis Gatens, Jeff Snyder, Alex Pezold,David Morris
    While everyone is talking about Cloud based data centers, the real migration is to outer space, where satellites continuously orbit the Earth. How will this work and what are the security implications. The Goddard Space Flight Center's lists 2,271 satellites currently in orbit.

    Join this panel of experts as we cover:
    •The migration of data centers to satellites
    •The benefits, risks, vulnerabilities and threats posed to a satellite based datacenters

    Dennis R. Gatens: VP Channel Management & Marketing at Cloud Constellation Corporation

    Jeff Snyder: CTO at Cloud Constellation Corporation

    Alex Perzold:Co-Founder and CEO at TokenEx
  • IoT Threats and Vulnerabilities Recorded: Jun 13 2018 55 mins
    Juanita Koilpillai, Dick Morrell, Barak Engel & David Morris
    Learn what keeps CISOs up at night when it comes to threats coming from the IoT. This session will cover:
    Do I know what IoT devices are internal to my company? Do I know what IoT devices are externally entering my company via my employees, contractors and vendors?
    Do I know what threats and vulnerabilities these IoT devices represent to my company?

    Moderator: David Morris
    Panelists:
    Juanita Koilpillai, Chief Technology Advisor - Digital Risk Management Institute
    Dick Morell, Managing Director and Group CTO - Falanx Group / Falanx Cyber Defense
    Barak Engel, Chief Geek at EAmmune, CISO at Amplitude Analytics
  • Security Concerns Surrounding a Smart City Recorded: Jun 6 2018 88 mins
    Dan Evans, Itron, Inc., Juanita Koilpillai, Waverley Labs, Dick Morell, Falanx Cyber , David Morris
    Join this panel discussion to understand the mass adoption of IoT & Smart City technologies and the underlying security concerns for these infrastructures.

    This session will cover:
    - What is a Smart City?
    - What are the Security concerns surrounding a Smart City?

    Moderator: David Morris
    Panelists: Dan Evans, Director, Smart Cities - Itron, Inc.
    Juanita Koilpillai, Chief Technology Advisor - Digital Risk Management Institute
    Dick Morell, Managing Director and Group CTO - Falanx Group / Falanx Cyber Defense
  • GDPR: Deadline Day Special Recorded: May 25 2018 62 mins
    Mark Rasch, Martyn Hope, Ray Ford, David Morris
    It's GDPR due date. How will enforcement be rolled out when a breach occurs and what are the likely consequences for the breach?

    Join this panel of experts:

    Martyn Hope: Co-Founder of the GDPR Institut
    Mark Rasch: Chief Legal Compliance Partner at DRM Institute, former Chief Security Evangelist at Verizon, former Lead Prosecutor at U.S. DOJ.
    Ray Ford: Founding Associate of GDPR Institut, DPO for Acer(UK) who currently hold some 15million childrens records on behalf of the Scottish Government.


    This session will cover:
    - How GDPR will be enforced.
    - Who is likely to be among the first brought to court?
    -What Should I do Now?
  • GDPR: Responding to a Breach Recorded: May 23 2018 83 mins
    Ray Ford, Ian West, Mark Rasch, David Morris
    When a Breach occurs, what are the best practices to comply with the GDPR's notification requirements. This session will cover:
    Breach Notification rules
    Who, what and when to notify?
  • GDPR: Protecting Your Data Recorded: May 22 2018 56 mins
    Ulf Mattsson, Martyn Hope, Mark Rasch, David Morris
    Find out why data protection and encryption is an essential component of preparing for your GDPR readiness process.

    Specifically, we will cover:

    What is considered "Personal Data" and why it needs to be "protected"

    The Legal Aspects of Data Protection under GDPR.

    The technical ways to protect/pseudonymization

    In this Session you will learn from the leading experts:
    - Ulf Mattsson: The father of database Encryption.
    - Martyn Hope: The Co-Founder of the GDPR Institut.
    - Mark Rasch: Former Chief Cybersecurity Evangelist at Verizon and led the DOJ's Cyber Crime Unit.
Comprehensive Information Security Management and Compliance
The Cybersecurity- No Spin Zone is dedicated first and foremost to educating viewers about Cybersecurity Technologies, Problems, Compliance and Legal FACTS. We are not a Vendor Sponsored Channel, this gives us the unique ability to bring you factual unbiased information and advice from subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Secure Datacenters in Space
  • Live at: Jun 20 2018 4:00 pm
  • Presented by: Dennis Gatens, Jeff Snyder, Alex Pezold,David Morris
  • From:
Your email has been sent.
or close