Hi [[ session.user.profile.firstName ]]

Protect your data – Key decisions you need to make

In a recent BT Security study, we found over half of organisations lose IP as employees leave.

The rise in hybrid ways of working now means that your data is everywhere, so managing it correctly is more critical than ever. It can be difficult to track though, which could leave you open to threats.

In our next webinar, we will share our experiences and give you unique insight on:
• the threats you face – both inside and outside your organisation
• the best strategies and detection methods for organising your data
• the importance of good cyber hygiene
Recorded Nov 19 2020 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tristan Morgan, Director, Security advisory; Steve Benton, Director Protect; & Lee Stephens, Principal, Security advisory
Presentation preview: Protect your data – Key decisions you need to make

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SASE: how to define the most effective strategy Dec 15 2020 10:00 am UTC 30 mins
    James Todd, Security CTO; Tristan Morgan, Director of security advisory services; David Stark, Security portfolio director
    Security thinking has been moving towards SASE for some time now to protect the new dynamic perimeter. It brings together connectivity and network security into a single policy-driven service that provides consistent centrally-managed access and security from edge to edge.

    By 2024, at least 40% of enterprises will have explicit strategies to adopt SASE, up from less than 1% at year-end 2018. (Gartner, the future of network security is in the cloud 2019)

    Join our latest webinar in our Security insights and trend series as we share our experience and give you unique insight into:
    • the BT approach to SASE
    • how to move to SASE in the most simple and cost effective way
    • how to mitigate the risks of change.

    Speakers:
    • James Todd, Security CTO, BT
    • Tristan Morgan, Director of security advisory services, BT
    • David Stark, Security portfolio director, BT
  • Protect your data – Key decisions you need to make Recorded: Nov 19 2020 32 mins
    Tristan Morgan, Director, Security advisory; Steve Benton, Director Protect; & Lee Stephens, Principal, Security advisory
    In a recent BT Security study, we found over half of organisations lose IP as employees leave.

    The rise in hybrid ways of working now means that your data is everywhere, so managing it correctly is more critical than ever. It can be difficult to track though, which could leave you open to threats.

    In our next webinar, we will share our experiences and give you unique insight on:
    • the threats you face – both inside and outside your organisation
    • the best strategies and detection methods for organising your data
    • the importance of good cyber hygiene
  • Don't let your data escape Recorded: Oct 7 2020 8 mins
    Kevin Brown, MD, Security; Tristan Morgan, Director, Security advisory services; David Stark, Security portfolio director
    In response to the pandemic, businesses are resetting their strategies and reducing their workforces. How do you deal with the increased insider threat and stop up to 50% of your data leaving with your employees?

    Find out what steps you should take to understand where your data is, the risks it faces, the security controls you can put in place and the importance of a good leaving process for your people.
  • The evolution of threat detection Recorded: Sep 29 2020 32 mins
    Experts from BT - Tristan Morgan, Steve Benton, John Ashdown, and Aaron Lloyd
    In a rapidly shifting threat landscape, understanding adversary behavior and the biggest threats to your business is a constant challenge. The increasing number of threat actors, the loss of the network perimeter with cloud and a rise in remote working and connected devices to the network, all increase the number and types of threats you are exposed to.

    Join us in the second webinar of our security insights and trends series as we discuss how best to take effective action to prevent incidents occurring in the first place.
  • A new cloud security strategy for a new normal Recorded: Aug 13 2020 29 mins
    BT cloud security experts
    Your cloud security strategy will have changed over the last 6 months. You will have reacted at pace to the pandemic so now’s the time to pause and re-assess for the future.

    Join us as we explore the trends and topics shaping the future of cloud security. You will also get a unique insight into how our own cloud security strategy has evolved over the last few months. We will share with you how our approach has changed and what the future looks like for us.

    Speakers:
    o Phil Packman, CISO, BT
    o David Stark, Director Security Portfolio, BT
    o Michael Wolkowicz, US Sales Director, BT
    o Michala Hart, UK Sales Director, BT (Moderator)
  • How to avoid SD-WAN's five key security vulnerabilities Recorded: Mar 13 2020 9 mins
    Andy day, Sales manager; Natalie Walker, Head of virtual security services; and Phil Packman, CISO, commercial contracts
    Without a doubt, SD-WAN delivers in terms of network visibility, flexibility and scalability, but it’s essential you embrace it with your eyes wide open. Hackers can now exploit the fact that your SD-WAN devices are directly connected to the internet and your organisation may be exposed to fresh security vulnerabilities.

    So how do you protect your critical assets and data from these new threat vectors?

    Many enterprises simply transfer their traditional approaches to security over to the world of SD-WAN. They fail to reassess their security needs and leave themselves open to breaches such as a DDoS attack knocking out their network or a hacked SD-WAN site giving access to un-encrypted customer traffic.

    Robust SD-WAN security starts with an awareness of how internet connectivity brings increased vulnerability to cyber attack. Only then can you put mitigating defenses in place.

    Watch our video to discover what risks you now face and how to protect your organisation.
  • Masterclass: An intelligence-led approach to cyber threat management Recorded: Mar 4 2020 29 mins
    Cyber security experts from BT - Tristan Morgan, Adam Gray, and Aarthi Krishna
    When it comes to effective cyber threat management it’s vital to be armed with a clear understanding of your adversary’s behaviour. This knowledge will underpin your security operations strategy, define the services you deploy and give you clarity on where to place security solutions to best protect your business.

    Join us on this webinar to discover how to:
    • understand adversary behaviour and determine the biggest threats to your business, based on real-world attack tactics, techniques and procedures
    • recognise the threat surface of your organisation, align security controls and identify where your gaps exist
    • prioritise your strategic or roadmap initiatives in order to achieve your business goals
    • ensure your investments are focused on your key threats, in order to deliver maximum value

    You’ll be able to assess how your existing or future ambitions align to some of the case studies we discuss, so that your investments remain focused on mitigating current and future threats.
  • Make Security integral to your business Recorded: Oct 15 2019 46 mins
    Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes, BT
    It’s a scary world out there and whilst technology brings opportunities, that also means that there are new security challenges facing us. The dangers are everywhere: stolen identities, systems held to ransom, phishing scams – the list is almost endless. It therefore definitely pays to be aware and know what you’re facing, that way you can be prepared and on the front foot.
  • Understanding your assets Recorded: Sep 18 2019 3 mins
    Deborah Moir, Head of UK security consulting, BT
    According to Gartner, "Half of all the enterprises only perform asset management once a year and 20 per cent only once every five years."

    If you don't know what's plugged into your network, how do you know what you need to protect? New devices are connecting to your network all the time, bringing new vulnerabilities and exposing you to new risks. To build a secure infrastructure you need to start with the basics and get a complete view of your network first.

    In this video, our security expert, Deborah Moir, Head of UK security consulting, BT, shares her views on the importance of asset discovery, how to achieve it, and how it is vital for compliance, cost and management reasons.
  • Identity and access management - the key to a successful zero trust model Recorded: Sep 18 2019 3 mins
    Hila Meller, VP, BT Security Europe
    We know that attackers are constantly looking for weaknesses to exploit — and with cloud and hosted services, these gaps can lie outside your perimeter. A zero-trust mindset means you can segment and control applications in a way that provides only the functionality that’s needed, efficiently and securely.

    Although most organisations have a defined process to manage and control privileged accounts, many still underestimate the associated vulnerabilities.

    Watch our video to discover why it's crucial to keep track of identities and the permission levels of accounts, and how SaaS and managed services can prove to be more efficient and flexible for an organisation's changing environment.
  • An industry crisis: the IT security skills shortage Recorded: Sep 18 2019 5 mins
    Hila Meller, VP, BT Security Europe
    The IT security sector is under pressure, with not enough skilled people to do the job. In fact, the Centre for Cyber Safety and Education predicts there’ll be a shortage of 1.8 million cyber security professionals globally by 2022.

    In this video, our security expert, Hila Meller, VP, BT Security Europe, addresses the common challenge faced by organisations, and answers a few questions:

    - What is the depth and impact of the problem?
    - Why did we let it happen?
    - How can new technology complement the lack of skills?
    - What is BT doing to help counter the skills shortage?
  • Top 3 security risks for your SD-WAN implementation Recorded: Jun 24 2019 30 mins
    Kevin Brown, Adrian Comley, and Peter Sader
    The visibility, control and agility that an SD-WAN can deliver to a global organisation makes it very attractive, but it can come with significantly higher risks. In around 80 per cent of the bids we see, customers aren’t actively considering or aware of these risks. SD-WAN is highlighting the tension between CIOs, focused on supporting the business with technology enabled solutions, and CISOs, concerned with managing information security risks. Are you clear on how to deliver the benefits of SD-WAN, whilst maintaining the security of your organisation?

    Join our webinar on 24 June where Kevin Brown, our Managing director of Security, Adrian Comley, General manager, Dynamic Network Services, and Peter Sader, Security head of business development, discuss the top 3 security risks you need to consider to make sure your SD-WAN implementation is secure.
  • Trends in Advanced Threat Detection & Vulnerability Management Recorded: Apr 16 2019 61 mins
    Wade Woolwine, Rapid7, Ajay Uggirala, Juniper Networks & O'Shea Bowens, Null Hat Security & Paul Crichard, BT Global Services
    As cyber attacks become increasingly common, it is vital for organisations to be armed with the most effective tools and knowledge to prevent, detect and respond to cyber threats.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:

    - Trends in Advanced Threat Detection & Vulnerability Management
    - How to use analytics to fight against cyber attacks – patching, detection and response
    - What are the common mistakes made when it comes to Advanced Threat Detection implementation
    - Best practices and recommendations for improving your security posture

    Panel moderated by:
    Michele Drolet, CEO, Towerwall

    Panelists:
    Wade Woolwine, Director of Managed Services, Rapid7
    Ajay Uggirala, Sr. Manager, Product Marketing, Juniper Networks
    O'Shea Bowens, CEO & Founder, Null Hat Security
    Paul Crichard, Security CTO, BT Global Services
  • Global security roundtable: perspectives, threats and risks per region Recorded: Mar 20 2019 30 mins
    BT's Security experts: Steve Benton, Hila Meller, Juni Yan, and Gary Symes
    Join four of our top security experts to hear their point of view and their vision for security across the globe. Our vice presidents from Asia, Middle East, Australia and Africa, America, Europe and the UK will share their frontline experience of dealing with some of the security challenges in their region.

    Cybersecurity is a truly global concern with attacks and threats emanating from all over the world. The way each region tackles the cyber threat is subtly different. Our experts will take you through some effective security strategies and programmes that you can put in place to protect your "crown jewels" against the evolving global threats.

    Whether you're a multinational organisation with worldwide operations, or based in one particular region, our webinar will give you a local and global view on how to find your way around the security minefield.

    Speakers:
    - Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes
    - Hila Meller, Vice President, Security, Europe
    - Juni Yan, Vice President, Security, Asia Middle East, Australia and Africa
    - Gary Symes, Vice President, Security, Americas
  • The Future of Financial Services Security Recorded: Mar 12 2019 58 mins
    Paul Crichard (BT Security), Saso Mickov (Sparkasse Bank), Melike Belli (Cybertonica Ltd), Seema Khinda Johnson (Nuggets)
    Data breaches have risen 480% within Financial Services firms in the UK. With the Financial Services industry being plagued by constant risks and regular threats, professionals need to be at the top of their game to thwart criminals.

    Join this panel where our experts will discuss:
    -What is the current state of Financial Services security?
    -How can organisations prevent and detect threats?
    -What are the key questions FIs should be asking their security teams?
    -Are new regulations doing enough to keep FIs and their customers safe?
  • Expert panel: How to Secure your Business from Network to Cloud Recorded: Jan 23 2019 29 mins
    Rob Daniels, GM, security portfolio strategy & propositions, & David Simpkins, GM, managed services & public cloud
    You’re under immense pressure for digital transformation. Moving to the cloud presents new possibilities: but the security of your data and apps is critical. It’s not all plain sailing because the cloud requires a fundamentally different approach to security. If you dig your heels in, you’ll find that Shadow IT increases and people will circumvent you. It’s also increasingly difficult to keep an eye on your entire network, so you’ll need to continually reassess where you’re most exposed.

    In this webinar, live from the studio, you’ll discover how to:
    - Create a security strategy that works as an enabler to support your cloud migration, not a separate work stream or standalone function
    - Take steps to protect your new cloud infrastructure as well as your legacy network
    - Avoid certain pitfalls when it comes to cloud migration that could open up new vulnerabilities and threats
  • Make Security integral to your business Recorded: Jan 14 2019 46 mins
    Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes, BT
    It’s a scary world out there and whilst technology brings opportunities, that also means that there are new security challenges facing us. The dangers are everywhere: stolen identities, systems held to ransom, phishing scams – the list is almost endless. It therefore definitely pays to be aware and know what you’re facing, that way you can be prepared and on the front foot.
  • Masterclass: How To Address Risk and Master Security in 2019 Recorded: Nov 21 2018 42 mins
    Hila Meller, VP, Security, Europe, and Daniel Lawrence, General Manager, Threat Intelligence and Investigations
    Imagine if you could combine intelligence from multiple sources – including government, partners and your own global network – to get a birds-eye view of what’s going on in your organisation, and accurately address your risk and measure its impact? Well now you can and with the right understanding and intelligence, you can better anticipate trends and patterns, your policies and standards, as well as strengthen your day-to-day security.
    Having the right information at your fingertips is like gold dust and means you can continually learn, improve and be more robust in your cyber defence.
    Join Hila Meller and Daniel Lawrence on our webinar as we share with you the key things you need to understand to ensure that your organisation stays safe and secure from rapidly evolving threats – and then turn them into opportunities.
  • Make Security integral to your business Recorded: Sep 27 2018 47 mins
    Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes, BT
    It’s a scary world out there and whilst technology brings opportunities, that also means that there are new security challenges facing us. The dangers are everywhere: stolen identities, systems held to ransom, phishing scams – the list is almost endless. It therefore definitely pays to be aware and know what you’re facing, that way you can be prepared and on the front foot.
  • Securely manage multiple cloud providers and platforms Recorded: Jun 22 2018 40 mins
    Paul Crichard, Security CTO, BT and Richard Baker, Futures Security Architect, BT
    77% of CISOs working with BT are actively moving to the cloud or planning to adopt cloud services. Of these, 71% said they have some policies, but 30% stated they don't understand what they are in reality.

    If you’re thinking about cloud or multi-cloud environments you will need to take a deeper look at your security. Yes, it’s quicker, and agile model and therefore cheaper but it does come with an extra level of risk that previous data centre options mitigated. You’ll need to validate your cloud vendor to make sure your company’s data is separated from other data, that you are getting the context rich information back and that the right people and devices are accessing it. The big thing is to put the necessary and sufficient security and compliance controls in place, and to keep checking that they’re appropriate, effective, and moving forward while you take up the cloud (and beyond).

    Join our live discussion with BT’s Security CTO to find out what’s required to identify, manage and control threats across your hybrid estate and multiple clouds. We’ll look at how to discover where your data is, who can see it or access it or process it, and how to avoid data sovereignty violations. The webinar will also cover how vital it is to know what we are all responsible for and how can you mitigate for the risks and new threats in order to stay secure..
BT – protecting your business, the way we do ours
As a global leader in managed security, we’re helping customers thrive in a digital world. With operations in over 180 countries, a team of 2,500 experts and 14 SOCs around the world, we have a unique perspective on cyber crime.

We’re constantly watching, learning, predicting and responding to the latest threats to protect our customers, using unique tools and insight to stay one step ahead of criminal entrepreneurs.
In supporting some of the world’s largest companies, nation states and critical national infrastructures we have an unparalleled insight into the targeted threats and advanced malware on global networks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protect your data – Key decisions you need to make
  • Live at: Nov 19 2020 4:00 pm
  • Presented by: Tristan Morgan, Director, Security advisory; Steve Benton, Director Protect; & Lee Stephens, Principal, Security advisory
  • From:
Your email has been sent.
or close