Hi [[ session.user.profile.firstName ]]

How to Create a Winning Cybersecurity Strategy

Cyber attacks on businesses, organizations and critical infrastructure becoming the norm in 2018. Massive breaches are constantly in the news and consumers are demanding stricter data and privacy protections. Cybersecurity has never been more important to organizations, and the investment in security technology has never been greater.

CISOs are in the spotlight, and are looking to build the best strategy to secure their organizations, customers and users.

Join top security experts for an interactive Q&A panel discussion on:
- The key factors CISOs should consider for their cybersecurity strategy
- The current and future threatscape
- Technological solutions that make CISOs' lives easier
- How organizations are coping with the shortage of qualified security workforce
- How CISOs can better communicate their strategy to the board

Speakers:
- Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners
- Slavik Markovich, Founder & CEO, Demisto
- Matthias Maier, Product Marketing Director & Security Evangelist, Splunk
- Luke Potter, Cybersecurity Practice Director, SureCloud

The session will be streamed LIVE from London from the Infosecurity Europe conference.
Recorded Jun 7 2018 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Raef Meeuwisse (ISACA Speaker & Author) | Slavik Markovich (Demisto) | Matthias Maier (Splunk) | Luke Potter (SureCloud)
Presentation preview: How to Create a Winning Cybersecurity Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Create a Winning Cybersecurity Strategy Recorded: Jun 7 2018 55 mins
    Raef Meeuwisse (ISACA Speaker & Author) | Slavik Markovich (Demisto) | Matthias Maier (Splunk) | Luke Potter (SureCloud)
    Cyber attacks on businesses, organizations and critical infrastructure becoming the norm in 2018. Massive breaches are constantly in the news and consumers are demanding stricter data and privacy protections. Cybersecurity has never been more important to organizations, and the investment in security technology has never been greater.

    CISOs are in the spotlight, and are looking to build the best strategy to secure their organizations, customers and users.

    Join top security experts for an interactive Q&A panel discussion on:
    - The key factors CISOs should consider for their cybersecurity strategy
    - The current and future threatscape
    - Technological solutions that make CISOs' lives easier
    - How organizations are coping with the shortage of qualified security workforce
    - How CISOs can better communicate their strategy to the board

    Speakers:
    - Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners
    - Slavik Markovich, Founder & CEO, Demisto
    - Matthias Maier, Product Marketing Director & Security Evangelist, Splunk
    - Luke Potter, Cybersecurity Practice Director, SureCloud

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Cloud Migration: How to Weather The Data Storm Recorded: May 10 2018 12 mins
    James Hodge, AVP Field Technology, EMEA, and Paul Davies, Senior EMEA Alliances Sales Engineer, Splunk
    Join this 10 minute live Q&A with Splunk cloud migration experts as they discuss how organisations are cutting through the fog to gain visibility into their cloud environments for monitoring usage, security, compliance and keeping control of costs.

    High visibility, low pressure.
  • Next-Generation Cloud Monitoring for AWS Workloads Recorded: May 10 2018 37 mins
    Simon Ratcliffe, Andrew Bird, James Hodge and Benjamin Andrew
    Join this live panel discussion with experts from Splunk and AWS Marketplace to learn the latest trends and best practices for better cloud monitoring.

    Tune into this interactive Q&A session to hear from Cloud and Storage experts on:

    - How to ensure adherence to security and compliance standards
    - How to manage AWS costs
    - The benefits of analytics and visibility for your AWS workloads
    - Why moving mission-critical workloads to AWS improves agility
    - The latest updates from Splunk and AWS Marketplace on industry trends

    This session will be broadcast LIVE straight from the AWS Summit in London.

    Moderator: Simon Ratcliffe, Principal Consultant, Ensono & Cloud Industry Forum Chair
    Panelists: James Hodge, AVP Field Technology, Splunk, Andrew Bird, Chief Digital Officer, Oryzus Consulting, and Benjamin Andrew, Global Lead - Security & Network Infrastructure, AWS Marketplace
  • A Day in the Life of a GDPR Breach Recorded: Oct 4 2017 62 mins
    Adrian, Davis, (ISC)², EMEA, Matthias, Maier, Elizabeth
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of
    the night because personal data held by your organization has been
    discovered for sale on the dark web. This disclosure puts the privacy of
    your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a
    breach investigation and response scenario as it would be after GDPR
    comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy
    Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you'll learn:
    ● What breach response will look like under the GDPR
    ● What tools and processes a data privacy officer will rely on in
    case of a breach
    ● What departments and entities will be involved beyond IT
    ● What activities are currently happening within organizations to
    prepare for the GDPR
    ● What the consequences of the breach could be
  • Comprehensive Cyber Security & Incident Response: CISCO + Splunk Recorded: Sep 13 2017 59 mins
    Imran Islam, CISCO, Matthias Maier, Splunk, Adrian Davis, (ISC)² EMEA
    The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.

    Learn how Imran Islam, leader of Cisco’s EMEA/APAC CSIRT team relies on Splunk to help his team drive best practices in threat assessment, mitigation planning, incident detection and response, incident trend analysis, and the development of future security architecture.

    Join this webinar to hear Imran Islam discuss how Cisco drives CSIRT best practices:

    - CSIRT playbooks and automation methods

    - The importance of timely CSIRT data access, correlation & visualisation

    - CSIRT staffing approaches

    - CSIRT threat intelligence management

    - Driving CSIRT operational efficiency

    - The importance of CSIRT collaboration across the business during investigations

    - How CSIRT functions can increase business relevance

    - Learn about the importance of understanding your environment

    - Learn about the importance of having the right data

    - Learn the critical success factors for building a CSIRT Team and capabilities

    - Learn how to enable your security team to scale its ability to handle incidents and quickly find, validate, and resolve issues

    - Learn how to justify adding more resources to an incident response team

    - Learn how to introduce consistency into your security team for approaching and solving security problems.
  • The State of Security Operations: How Prepared Are You For An Attack? Recorded: Aug 23 2017 58 mins
    Duncan Brown, IDC, Matthias Maier, Splunk, Nathaniel Ford, (ISC)² EMEA
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:

    ●The time and associated cost security teams spend on incident response and how you compare to your peers

    ●How organizations are coping with an average of 40 actionable security incidents per week

    ●Where teams are focusing their security efforts

    ●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • Splunk and Gartner: Use an Analytics-Driven SIEM for Targeted Attack Detection Recorded: Jun 7 2017 62 mins
    Girish Bhat, Splunk Director of Security Product Marketing; Kelly Kavanaugh, Research Analyst,Info Security & Privacy,Gartner
    Description : It's no longer a question whether an organization will be breached -- it's a matter of when. According to Gartner, organizations are failing at early breach detection, with fewer than 20% of breaches detected internally.* The time to detect a compromise can takes days, or even months.

    Join this webinar to hear Splunk and Gartner discuss the strategic role of SIEM as a centralized solution and why organizations need to move from prevention only solutions to detection, response and remediation.

    In this session, Gartner research analyst Kelly Kavanagh will address:
    - Challenges facing organizations when it comes to advanced threats
    - The resources and technologies needed
    - Best practices on how organizations can leverage SIEM and lean-forward technologies like user and entity behavior analytics
  • [ANALYST VIDEO] Investigation or Exasperation? The State of Security Operations Recorded: Jun 1 2017 3 mins
    Duncan Brown, Associate Vice President, European Security Practice, IDC
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 45 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.
  • WannaCry Ransomware Attack: Splunk Briefing and Demo Recorded: May 31 2017 60 mins
    Angelo Brancato & Kai-Ping Seidenschnur
    From national health agencies to public transportation infrastructure, the recent WannaCry ransomware attack has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of the attack shows that ransomware is a greater concern that affects all of IT.

    How can you better prepare and respond to such threats?
    Watch this ondemand webinar to learn how to apply a broader analytical approach and data-driven techniques to quickly pinpoint the source of an attack and determine the appropriate remediation steps.

    Hear from Splunk’s EMEA Security Specialists Angelo Brancato & Kai-Ping Seidenschnur to learn:
    - How to gain end-to-end visibility of potential ransomware infections
    - How to quickly verify an infection and accurately identify the method and source of infection
    - Strategies to ensure continuity of operations during an attack
    - Remediation guidance on how to prevent similar infections
    - Best practices to immediately improve your security posture using Splunk
  • [Case study] How Illumina Detects Advanced Malware and Threats Recorded: May 9 2017 62 mins
    Ryan Niemes Sr. Staff Information Security Analyst Illumina
    Illumina, a leader in genetic sequencing, needed a security solution to provide visibility into all its data and to accelerate the detection of advanced malware, and investigate and hunt threats.

    Join this webinar to hear how Illumina uses Splunk’s Enterprise Security as a SIEM and security intelligence platform to:

    • Gain visibility across all data sources
    • Detect patient-zero malware
    • Rapidly respond to incidents
    • Accelerate time to detect using the threat intelligence framework
    • Hunt for threats

    Splunk will discuss the key capabilities in a modern SIEM solution and how you can use Splunk Enterprise Security to implement a SIEM, and to replace or augment legacy SIEMs and analytics solutions
  • [Product overview] How to Use Splunk ES for Analytics-Driven SIEM? Recorded: May 9 2017 60 mins
    Girish Bhat, director of security product marketing at Splunk Chris Shobert, senior sales engineer at Splunk
    Splunk Enterprise Security (ES) is an analytics-driven SIEM that powers successful security operations teams. But did you know it is actually made up of distinct frameworks that can each be leveraged independently to meet specific security use cases?

    Join us to learn the technical details behind key ES frameworks including: asset and identity correlation, notable event, threat intelligence, risk analysis, investigation and adaptive response. Splunk experts will discuss real-world examples and demo the key frameworks, which will help you to solve your security challenges
  • Don’t Let Your Legacy SIEM Be Your Kryptonite Recorded: May 9 2017 58 mins
    Girish Bhat, Splunk Director of Security Product Marketing; Risi Avila, Security Professional Services Consultant
    It’s a bird, it’s a plane, no it’s just your legacy SIEM. Did you know your SIEM might be weakening your security powers? Your legacy SIEM could be:
    • Limiting your ability to collect, store and use security-relevant unstructured and structured data
    • Making it difficult to maintain your SIEM and requiring skilled staff to work around the clock just to keep the lights on
    • Burdening your security operations team by forcing them to chase false alarms while missing critical alerts
    • Failing to detect modern threats and putting your entire business at risk
  • [Product demo] How to Detect and Prevent Ransomware with Splunk Recorded: May 9 2017 63 mins
    James Brodsky, Sr. Security SME, Splunk
    Ransomware has moved from a nuisance targeting consumers to a serious threat to businesses and government agencies.

    In this session you will learn more about what ransomware is and how it works, followed by a live Splunk demonstration with data from a Windows ransomware infection.

    You will learn:
    - How to use Splunk Enterprise to hunt for ransomware IOCs
    - How to detect malicious endpoint behavior
    - Strategies for prevention
  • [Case study] How Travis Perkins Enhanced Security for 27,000 Employees Recorded: May 5 2017 58 mins
    Nick Bleech, Head of Information Security, Travis Perkins
    Faced with a complex, heterogeneous IT infrastructure and a ‘Cloud First’ instruction from the board, Nick Bleech, Head of Information Security at building supplies giant Travis Perkins, used Splunk Enterprise Security running on Splunk Cloud to deliver enhanced security for 27,000 employees.

    Splunk allowed Travis Perkins to provide real-time security monitoring, faster incident resolution and improved data governance while delivering demonstrable business value to the board.

    Join this webinar to hear Nick Bleech discuss:
    ●The business and security drivers of deploying a cloud-based security incident and event management solution
    ●The overall benefits of the Splunk solution
    ●The project’s critical success factors
    ●How stakeholders and the overall project were managed
    ●The positive impact on the deployment on the IT operations and IT security teams
    ●The next steps in the development of a lightweight security operations centre
Splunk Webinars and Videos
Splunk Inc. (NASDAQ: SPLK) is the market leader in analyzing machine data to deliver Operational Intelligence for security, IT and the business. Splunk® software provides the enterprise machine data fabric that drives digital transformation. More

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Create a Winning Cybersecurity Strategy
  • Live at: Jun 7 2018 10:00 am
  • Presented by: Raef Meeuwisse (ISACA Speaker & Author) | Slavik Markovich (Demisto) | Matthias Maier (Splunk) | Luke Potter (SureCloud)
  • From:
Your email has been sent.
or close