Hi [[ session.user.profile.firstName ]]

Data Breach Response - what do you need to know?

This session will delve into the requirements and best practices for a solid data breach response policy, covering when and who should be notified.
May 21 3:00 pm UTC 75 mins
Starting in 00:00:00
Your place is confirmed,
we'll send you email reminders
Presented by
David Morris, Steven Teppler and Mark Rasch
Presentation preview: Data Breach Response - what do you need to know?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Proactive Threat Hunting Aug 21 2019 5:00 pm UTC 75 mins
    David Morris, Zac Blenden, Mark Rasch
    This session will feature a live demonstration of Threat Hunting by a cyber threat hunter. In this session, you will see what a Threat Hunter actually does and how it is done.
  • Trust in Math, Not Humans: Privacy Technology in Crypto” Aug 6 2019 4:00 pm UTC 60 mins
    This expert panel include RICARDO G. DIAZ, Julie Goggin, Ulf Mattsson and other experts
    Trust in Math, Not Humans : Privacy Technology In Crypto

    The blockchain revolution of the past 10 years has seen the biggest surge in open source projects with 90K+ Github repositories dedicated to blockchain (DLT) projects. This massive paradigm shift to decentralized computing has also advanced the field of cryptography with exciting new math that will deliver on the promise of privacy like never before.

    With over 20 years enterprise software and cyber security expertise, Ricardo Diaz, today is the founder of Blockchain CLT, a blockchain consultancy. He will discuss the future and evolution of trust with innovative privacy technologies powering blockchain projects today and in the future.
  • Defending IoT Driven DDoS Cyber Attacks Jun 13 2019 5:00 pm UTC 75 mins
    David Morris and Juanita Koilpillai
    This session will examine IoT driven DDoS attacks and how they are generated, and what can be done to prevent them.
  • Data Protection On-premises, and in Public and Private Clouds Jun 10 2019 12:00 pm UTC 75 mins
    David Morris, Juanita Koilpillai and Bob Flores
    ​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical. Learn about the Identity and Data Protection solutions for enterprise security organizations can take a data-centric approach to their security posture.
    This session will discuss how to control access to the infrastructure and applications — both on-premises, and in public and private clouds.
  • Privacy & Security Under GDPR and CCPA May 22 2019 5:00 pm UTC 75 mins
    David Morris, Steven Teppler and Mark Rasch
    What does Privacy and Security mean under GDPR and CCPA? What are the differences between GDPR and CCPA with regard to privacy and security? What controls and mechanisms can be utilized in order to become compliant with this specific aspect of these regulations.
  • Data Breach Response - what do you need to know? May 21 2019 3:00 pm UTC 75 mins
    David Morris, Steven Teppler and Mark Rasch
    This session will delve into the requirements and best practices for a solid data breach response policy, covering when and who should be notified.
  • How to Keep Your Cyber Defenders Sharp: Do You have the right people? Recorded: Apr 23 2019 62 mins
    David Morris and Brian Markus
    Tune into this session to learn how to determine if you have the right people with the sharpest skills defending your organization through the use of a Cyber Training Range.

    Learn what are Persistent Cyber Training Range Environments, the benefits and value of a Cyber Training Range and how they help you answer the question ARE WE READY TO DEFEND AGAINST THE NEXT ATTACK?".
  • Threat Intelligence 101 Recorded: Apr 15 2019 51 mins
    David Morris, Zac Blenden, Mark Rasch
    This session will define the role and responsibility of the Threat Intelligence function and what tools, tactics and procedures are used as well as the various stakeholders that benefit from their efforts.
  • What I learned from RSAC 2019 Recorded: Apr 10 2019 59 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Cloud application development is accelerating and diversifying where many organizations have virtual machines, containers, and now serverless applications running in the cloud, transforming code into infrastructure. Microservices make a lot of sense for scale and development agility, but if everything is talking to everything else via APIs, it’s likely that there are many (and I mean many) application vulnerabilities. Additionally, API security is new, so processes are likely immature, and API security sits somewhere between application developers, DevOps, and cybersecurity, leading to organizational and skills challenges. We will organize this chaos from RSAC 2019 and discuss Security in the new API Ecosystem.

    Join this interactive webinar to learn more about:
    - What security people should talk about instead
    - The Human Factor
    - Advancements in Machine Learning and AI
    - Security in app development and the API economy
    - News in quantum computing and multiparty computing
    - Trends in innovation and cloud security
    - New standards and regulations

    We will also discuss:
    - How IT Audit can be automated to meet new requirements from for Agile Development and cloud
    - How IT Audit can learn more about new controls and technologies
    - How IT Audit can be involved early in the DevOps planning phase
    - How Artificial Intelligence can be used in IT audits to expand beyond sampling
  • Utilizing a Digital Risk Management Framework for Securing the Cloud Recorded: Feb 22 2019 60 mins
    Bob Liscouski, Juanita Koilpillai and David Morris
    How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.

    In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.
  • The Rise of Nation State Attacks and what you can do about it Recorded: Jan 30 2019 58 mins
    Ulf Mattsson, Mark Rasch and David Morris
    In this session you will lean what is a Nation-State attack, who are the primary perpetrators, technical controls, and what if any legal sanctions can be brought to bear
  • Data Privacy and California Consumer Privacy Act (CCPA) Recorded: Jan 28 2019 76 mins
    David Morris, Steven W. Teppler and Mark Rasch
    In this session, you will learn what the California Consumer Privacy Act (CCPA) is, what it means to your organization, how it differs from GDPR and lastly where do you start to become CCPA compliant.
  • Threat Hunting: A Live Demonstration Recorded: Jan 24 2019 77 mins
    David Morris, Andrew Johnston, Mark Rasch
    This session will feature a live demonstration of Threat Hunting by a former Federal law enforcement cyber threat hunter. In this session, you will see what a Threat Hunter actually does and how it is done.
  • 2019: A Cybersecurity Reality Check Recorded: Dec 12 2018 66 mins
    David Morris, Barak Engell and Mark Rasch
    Will 2019 bring any real transformative cybersecurity technology advancements that will have an impact? Tune into this controversial eye opening session on what's in store for 2019 in the cybersecurity space.
  • Self Sovereign Identity - Going Where No Identity Has Gone Before Recorded: Nov 26 2018 59 mins
    Ricardo Diaz, Blockchain CLT, Founder Managing Partner, Mike Lodder, Sovrin Foundation Security Maven
    Data privacy is dead. Social login is not the answer. Over thirty years of cyber security internal controls have fallen short of protecting our data. Traditional identity and access management (IAM) systems, aka Web 2.0 IAM, have evolved but only exacerbates the proliferation of centralized identity repositories. Centralized identity repositories that have for decades been the “Crown Jewels” of every malicious hacker or nation state bad actor to be the gateway to our personally identifiable information. A new paradigm shift in the identity management industry is here, Web 3.0 IAM. Blockchain identity management has many names. Decentralized identity. Self-Sovereign Identity. Multi-source identity. All define the same new IAM future. An identity management system powered by distributed ledger technology.
    We will cover the basics of what is Self-Sovereign Identity (SSI) and this evolution of the IAM space. The webcast will showcase how one of the SSI leaders in the blockchain identity space, Sovrin, works. Sovrin.org is the leading SSI public identity network solutions in the Blockchain world. It is an open source project managed by the Hyperledger Indy project within the Linux Foundation.
    Speakers
    Michael Lodder: Security Maven | Sovrin Foundation
    Mike currently works on all things security related to algorithms, protocols, and technology. I have worked in the identity and security space for many years.
    Ricardo Diaz: Founder | Managing Partner | Blockchain CLT
    Ricardo is the founder of Blockchain CLT, a DLT services and solution business based out of the Charlotte, NC. He is a serial entrepreneur, human rights advocate, social impact entrepreneur and has a passion for decentralized identity (SSI). An enterprise software executive, cyber security, identity management, cloud and decentralized computing professional with almost 25 years of working experience in engineering, consulting, sales, marketing and business development roles.
  • Encryption & Tokenization as Effective GDPR Best Practices Recorded: Oct 26 2018 63 mins
    An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
  • What is a Secure Enterprise Architecture Roadmap? Recorded: Sep 20 2018 69 mins
    Juanita Koilpillai, Bob Flores, Mark Rasch, Ulf Mattsson, David Morris
    This session will cover the following topics:

    * What is a Secure Enterprise Architecture roadmap (SEA)?
    * Are there different Roadmaps for different industries?
    * How does compliance fit in with a SEA?
    * Does blockchain, GDPR, Cloud, and IoT conflict with compliance regulations complicating your SEA?
    * How will quantum computing impact SEA roadmap?
  • Threat Hunting - Hype or Substance Recorded: Sep 18 2018 65 mins
    Roselle Safran, UJ Desai and David Morris
    This session will cover the practice of Threat Hunting, when to use it, where to use it, and the technical skills needed to effectively deliver value to an organization.
    You will learn:
    - The difference between Threat Intelligence and Threat Data
    - What is Threat Hunting in relation to Threat Intelligence and Threat Data
    - When and where to apply Threat Hunting
    - What you can reasonably expect to gain through the use of Threat Hunting
  • GDPR - A users perspective Recorded: Sep 12 2018 61 mins
    Mark Rasch and Ray Ford
    This session will cover GDPR from a users perspective, examining the trials and tribulations of working towards GDPR readiness.
  • Encryption & Tokenization as effective GDPR Best Practices Recorded: Aug 20 2018 63 mins
    An expert panel including Alex Pezold, Mark Rasch, Ian West and Ulf Mattsson
    This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.
Comprehensive Information Security Management and Compliance
The Cybersecurity- No Spin Zone is dedicated first and foremost to educating viewers about Cybersecurity Technologies, Problems, Compliance and Legal FACTS. We are not a Vendor Sponsored Channel, this gives us the unique ability to bring you factual unbiased information and advice from subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Breach Response - what do you need to know?
  • Live at: May 21 2019 3:00 pm
  • Presented by: David Morris, Steven Teppler and Mark Rasch
  • From:
Your email has been sent.
or close