Hi [[ session.user.profile.firstName ]]

The evolution of threat detection

In a rapidly shifting threat landscape, understanding adversary behavior and the biggest threats to your business is a constant challenge. The increasing number of threat actors, the loss of the network perimeter with cloud and a rise in remote working and connected devices to the network, all increase the number and types of threats you are exposed to.

Join us in the second webinar of our security insights and trends series as we discuss how best to take effective action to prevent incidents occurring in the first place.
Live online Sep 29 9:00 am UTC
or after on demand 30 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Experts from BT - Tristan Morgan, Steve Benton, John Ashdown, and Aaron Lloyd
Presentation preview: The evolution of threat detection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The evolution of threat detection Sep 29 2020 9:00 am UTC 30 mins
    Experts from BT - Tristan Morgan, Steve Benton, John Ashdown, and Aaron Lloyd
    In a rapidly shifting threat landscape, understanding adversary behavior and the biggest threats to your business is a constant challenge. The increasing number of threat actors, the loss of the network perimeter with cloud and a rise in remote working and connected devices to the network, all increase the number and types of threats you are exposed to.

    Join us in the second webinar of our security insights and trends series as we discuss how best to take effective action to prevent incidents occurring in the first place.
  • A new cloud security strategy for a new normal Recorded: Aug 13 2020 29 mins
    BT cloud security experts
    Your cloud security strategy will have changed over the last 6 months. You will have reacted at pace to the pandemic so now’s the time to pause and re-assess for the future.

    Join us as we explore the trends and topics shaping the future of cloud security. You will also get a unique insight into how our own cloud security strategy has evolved over the last few months. We will share with you how our approach has changed and what the future looks like for us.

    Speakers:
    o Phil Packman, CISO, BT
    o David Stark, Director Security Portfolio, BT
    o Michael Wolkowicz, US Sales Director, BT
    o Michala Hart, UK Sales Director, BT (Moderator)
  • How to avoid SD-WAN's five key security vulnerabilities Recorded: Mar 13 2020 9 mins
    Andy day, Sales manager; Natalie Walker, Head of virtual security services; and Phil Packman, CISO, commercial contracts
    Without a doubt, SD-WAN delivers in terms of network visibility, flexibility and scalability, but it’s essential you embrace it with your eyes wide open. Hackers can now exploit the fact that your SD-WAN devices are directly connected to the internet and your organisation may be exposed to fresh security vulnerabilities.

    So how do you protect your critical assets and data from these new threat vectors?

    Many enterprises simply transfer their traditional approaches to security over to the world of SD-WAN. They fail to reassess their security needs and leave themselves open to breaches such as a DDoS attack knocking out their network or a hacked SD-WAN site giving access to un-encrypted customer traffic.

    Robust SD-WAN security starts with an awareness of how internet connectivity brings increased vulnerability to cyber attack. Only then can you put mitigating defenses in place.

    Watch our video to discover what risks you now face and how to protect your organisation.
  • Masterclass: An intelligence-led approach to cyber threat management Recorded: Mar 4 2020 29 mins
    Cyber security experts from BT - Tristan Morgan, Adam Gray, and Aarthi Krishna
    When it comes to effective cyber threat management it’s vital to be armed with a clear understanding of your adversary’s behaviour. This knowledge will underpin your security operations strategy, define the services you deploy and give you clarity on where to place security solutions to best protect your business.

    Join us on this webinar to discover how to:
    • understand adversary behaviour and determine the biggest threats to your business, based on real-world attack tactics, techniques and procedures
    • recognise the threat surface of your organisation, align security controls and identify where your gaps exist
    • prioritise your strategic or roadmap initiatives in order to achieve your business goals
    • ensure your investments are focused on your key threats, in order to deliver maximum value

    You’ll be able to assess how your existing or future ambitions align to some of the case studies we discuss, so that your investments remain focused on mitigating current and future threats.
  • Make Security integral to your business Recorded: Oct 15 2019 46 mins
    Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes, BT
    It’s a scary world out there and whilst technology brings opportunities, that also means that there are new security challenges facing us. The dangers are everywhere: stolen identities, systems held to ransom, phishing scams – the list is almost endless. It therefore definitely pays to be aware and know what you’re facing, that way you can be prepared and on the front foot.
  • Understanding your assets Recorded: Sep 18 2019 3 mins
    Deborah Moir, Head of UK security consulting, BT
    According to Gartner, "Half of all the enterprises only perform asset management once a year and 20 per cent only once every five years."

    If you don't know what's plugged into your network, how do you know what you need to protect? New devices are connecting to your network all the time, bringing new vulnerabilities and exposing you to new risks. To build a secure infrastructure you need to start with the basics and get a complete view of your network first.

    In this video, our security expert, Deborah Moir, Head of UK security consulting, BT, shares her views on the importance of asset discovery, how to achieve it, and how it is vital for compliance, cost and management reasons.
  • Identity and access management - the key to a successful zero trust model Recorded: Sep 18 2019 3 mins
    Hila Meller, VP, BT Security Europe
    We know that attackers are constantly looking for weaknesses to exploit — and with cloud and hosted services, these gaps can lie outside your perimeter. A zero-trust mindset means you can segment and control applications in a way that provides only the functionality that’s needed, efficiently and securely.

    Although most organisations have a defined process to manage and control privileged accounts, many still underestimate the associated vulnerabilities.

    Watch our video to discover why it's crucial to keep track of identities and the permission levels of accounts, and how SaaS and managed services can prove to be more efficient and flexible for an organisation's changing environment.
  • An industry crisis: the IT security skills shortage Recorded: Sep 18 2019 5 mins
    Hila Meller, VP, BT Security Europe
    The IT security sector is under pressure, with not enough skilled people to do the job. In fact, the Centre for Cyber Safety and Education predicts there’ll be a shortage of 1.8 million cyber security professionals globally by 2022.

    In this video, our security expert, Hila Meller, VP, BT Security Europe, addresses the common challenge faced by organisations, and answers a few questions:

    - What is the depth and impact of the problem?
    - Why did we let it happen?
    - How can new technology complement the lack of skills?
    - What is BT doing to help counter the skills shortage?
  • Top 3 security risks for your SD-WAN implementation Recorded: Jun 24 2019 30 mins
    Kevin Brown, Adrian Comley, and Peter Sader
    The visibility, control and agility that an SD-WAN can deliver to a global organisation makes it very attractive, but it can come with significantly higher risks. In around 80 per cent of the bids we see, customers aren’t actively considering or aware of these risks. SD-WAN is highlighting the tension between CIOs, focused on supporting the business with technology enabled solutions, and CISOs, concerned with managing information security risks. Are you clear on how to deliver the benefits of SD-WAN, whilst maintaining the security of your organisation?

    Join our webinar on 24 June where Kevin Brown, our Managing director of Security, Adrian Comley, General manager, Dynamic Network Services, and Peter Sader, Security head of business development, discuss the top 3 security risks you need to consider to make sure your SD-WAN implementation is secure.
  • Trends in Advanced Threat Detection & Vulnerability Management Recorded: Apr 16 2019 61 mins
    Wade Woolwine, Rapid7, Ajay Uggirala, Juniper Networks & O'Shea Bowens, Null Hat Security & Paul Crichard, BT Global Services
    As cyber attacks become increasingly common, it is vital for organisations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:

    - Trends in Advanced Threat Detection & Vulnerability Management
    - How to use analytics to fight against cyber attacks – patching, detection and response
    - What are the common mistakes made when it comes to Advanced Threat Detection implementation
    - Best practices and recommendations for improving your security posture

    Panel moderated by:
    Michele Drolet, CEO, Towerwall

    Panelists:
    Wade Woolwine, Director of Managed Services, Rapid7
    Ajay Uggirala, Sr. Manager, Product Marketing, Juniper Networks
    O'Shea Bowens, CEO & Founder, Null Hat Security
    Paul Crichard, Security CTO, BT Global Services
  • Global security roundtable: perspectives, threats and risks per region Recorded: Mar 20 2019 30 mins
    BT's Security experts: Steve Benton, Hila Meller, Juni Yan, and Gary Symes
    Join four of our top security experts to hear their point of view and their vision for security across the globe. Our vice presidents from Asia, Middle East, Australia and Africa, America, Europe and the UK will share their frontline experience of dealing with some of the security challenges in their region.

    Cybersecurity is a truly global concern with attacks and threats emanating from all over the world. The way each region tackles the cyber threat is subtly different. Our experts will take you through some effective security strategies and programmes that you can put in place to protect your "crown jewels" against the evolving global threats.

    Whether you're a multinational organisation with worldwide operations, or based in one particular region, our webinar will give you a local and global view on how to find your way around the security minefield.

    Speakers:
    - Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes
    - Hila Meller, Vice President, Security, Europe
    - Juni Yan, Vice President, Security, Asia Middle East, Australia and Africa
    - Gary Symes, Vice President, Security, Americas
  • The Future of Financial Services Security Recorded: Mar 12 2019 58 mins
    Paul Crichard (BT Security), Saso Mickov (Sparkasse Bank), Melike Belli (Cybertonica Ltd), Seema Khinda Johnson (Nuggets)
    Data breaches have risen 480% within Financial Services firms in the UK. With the Financial Services industry being plagued by constant risks and regular threats, professionals need to be at the top of their game to thwart criminals.

    Join this panel where our experts will discuss:
    -What is the current state of Financial Services security?
    -How can organisations prevent and detect threats?
    -What are the key questions FIs should be asking their security teams?
    -Are new regulations doing enough to keep FIs and their customers safe?
  • Expert panel: How to Secure your Business from Network to Cloud Recorded: Jan 23 2019 29 mins
    Rob Daniels, GM, security portfolio strategy & propositions, & David Simpkins, GM, managed services & public cloud
    You’re under immense pressure for digital transformation. Moving to the cloud presents new possibilities: but the security of your data and apps is critical. It’s not all plain sailing because the cloud requires a fundamentally different approach to security. If you dig your heels in, you’ll find that Shadow IT increases and people will circumvent you. It’s also increasingly difficult to keep an eye on your entire network, so you’ll need to continually reassess where you’re most exposed.

    In this webinar, live from the studio, you’ll discover how to:
    - Create a security strategy that works as an enabler to support your cloud migration, not a separate work stream or standalone function
    - Take steps to protect your new cloud infrastructure as well as your legacy network
    - Avoid certain pitfalls when it comes to cloud migration that could open up new vulnerabilities and threats
  • Make Security integral to your business Recorded: Jan 14 2019 46 mins
    Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes, BT
    It’s a scary world out there and whilst technology brings opportunities, that also means that there are new security challenges facing us. The dangers are everywhere: stolen identities, systems held to ransom, phishing scams – the list is almost endless. It therefore definitely pays to be aware and know what you’re facing, that way you can be prepared and on the front foot.
  • Masterclass: How To Address Risk and Master Security in 2019 Recorded: Nov 21 2018 42 mins
    Hila Meller, VP, Security, Europe, and Daniel Lawrence, General Manager, Threat Intelligence and Investigations
    Imagine if you could combine intelligence from multiple sources – including government, partners and your own global network – to get a birds-eye view of what’s going on in your organisation, and accurately address your risk and measure its impact? Well now you can and with the right understanding and intelligence, you can better anticipate trends and patterns, your policies and standards, as well as strengthen your day-to-day security.
    Having the right information at your fingertips is like gold dust and means you can continually learn, improve and be more robust in your cyber defence.
    Join Hila Meller and Daniel Lawrence on our webinar as we share with you the key things you need to understand to ensure that your organisation stays safe and secure from rapidly evolving threats – and then turn them into opportunities.
  • Make Security integral to your business Recorded: Sep 27 2018 47 mins
    Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes, BT
    It’s a scary world out there and whilst technology brings opportunities, that also means that there are new security challenges facing us. The dangers are everywhere: stolen identities, systems held to ransom, phishing scams – the list is almost endless. It therefore definitely pays to be aware and know what you’re facing, that way you can be prepared and on the front foot.
  • Securely manage multiple cloud providers and platforms Recorded: Jun 22 2018 40 mins
    Paul Crichard, Security CTO, BT and Richard Baker, Futures Security Architect, BT
    77% of CISOs working with BT are actively moving to the cloud or planning to adopt cloud services. Of these, 71% said they have some policies, but 30% stated they don't understand what they are in reality.

    If you’re thinking about cloud or multi-cloud environments you will need to take a deeper look at your security. Yes, it’s quicker, and agile model and therefore cheaper but it does come with an extra level of risk that previous data centre options mitigated. You’ll need to validate your cloud vendor to make sure your company’s data is separated from other data, that you are getting the context rich information back and that the right people and devices are accessing it. The big thing is to put the necessary and sufficient security and compliance controls in place, and to keep checking that they’re appropriate, effective, and moving forward while you take up the cloud (and beyond).

    Join our live discussion with BT’s Security CTO to find out what’s required to identify, manage and control threats across your hybrid estate and multiple clouds. We’ll look at how to discover where your data is, who can see it or access it or process it, and how to avoid data sovereignty violations. The webinar will also cover how vital it is to know what we are all responsible for and how can you mitigate for the risks and new threats in order to stay secure..
  • Are you doing enough to protect your organisation and ensure compliance? Recorded: May 22 2018 18 mins
    Deborah Moir, Head of Security Consulting, BT & Alison Springate, Global Head of Security Enablement, BT
    With the launch of GDPR imminent, we wanted to take the opportunity to discuss how you can ensure you are doing enough to ensure compliance.

    Join our webinar to hear from our compliance expert Deborah Moir, Head of Security Consulting, where she will discuss the reality of GDPR compliance for large enterprises and what you should be doing to ensure you are in the best possible position to be ready and compliant.

    GDPR often means a huge overhaul of cyber security, network and processes and because failure to comply can result in a fine of up to four per cent of a company’s turnover or €20 million — whichever is higher you need to do everything you can to ensure you are on top of it.

    Adapting to GDPR means shifting how you view data protection and security. At its most basic, you need to know you have the right cyber security tools and processes in place to prevent the loss or theft of your customers’ data. And getting it right will open new doors.

    While data protection might be something you have to do, the new regulation should also be seen as an opportunity to redesign your security strategies in a way that builds a strong brand based on customer trust.
  • Using threat intelligence to stay one step ahead of the criminals Recorded: Mar 22 2018 34 mins
    Melanie Johnstone, Head of Intelligence, BT
    Most organisations are too passive in their approach to security. The response to most breaches is passive defence. Battles can be won this way, but not the War.

    To stay ahead of the game, businesses need an effective digital/threat intelligence strategy. An approach that enables proactive threat hunting, pre-emptive control mitigation based on intelligence and process, visibility over an entire estate and the tools, people, and process to solve problems when they are discovered.

    We talk to customers often who pay for threat intelligence feeds only to realise that knowing a problem exists doesn’t mean the problem will be solved. Having the right teams and people in place are a lot harder than it sounds.

    Building a digital threat intelligence capability is about much more than collating technical information on the systems used to launch attacks.
    • You need to gather evidence-based information on potential attackers, the tools they use, their motivation and the vulnerabilities they exploit, and how understand how this interacts with your business.
    • Intelligence means improving your understanding and visibility of the risk context your business is in; getting to know your threat landscape better. Creating the perfect blend of people, process and technology for your business.
    • By sharing data, you can improve your own security and cut intelligence-gathering costs. All of this should be seen not only in the context of present but also future threat.
    •Sharing intelligence product throughout your business, in a way that everyone can understand.

    Basically, you need to be one step ahead of the criminals.
  • How do you implement digital transformation securely? Recorded: Feb 8 2018 59 mins
    Mark Hughes Pres, Security BT, Martin Courtney, Principle Analyst, Tech Market View, & Danny Longbottom Dir Gov & Health, BT
    Security needs to be embedded in any digital transformation strategy. What are the fundamental things you need to get right for your organisation?

    We cover:
    - What are key issues you need to focus on?
    - What are the practical things you need to do to get your business case signed off?
    - How do you get ahead and stay ahead in this complex area?
BT – protecting your business, the way we do ours
As a global leader in managed security, we’re helping customers thrive in a digital world. With operations in over 180 countries, a team of 2,500 experts and 14 SOCs around the world, we have a unique perspective on cyber crime.

We’re constantly watching, learning, predicting and responding to the latest threats to protect our customers, using unique tools and insight to stay one step ahead of criminal entrepreneurs.
In supporting some of the world’s largest companies, nation states and critical national infrastructures we have an unparalleled insight into the targeted threats and advanced malware on global networks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The evolution of threat detection
  • Live at: Sep 29 2020 9:00 am
  • Presented by: Experts from BT - Tristan Morgan, Steve Benton, John Ashdown, and Aaron Lloyd
  • From:
Your email has been sent.
or close