Hi [[ session.user.profile.firstName ]]

Security Best Practices for Regular Users

Data breaches happen all the time, but that only happens to large enterprises, right? What about me? How can you alter behaviors to better protect yourself and your family from personal attacks, phishing scams and the like?

In this webinar, geared to everyday users, we will show you how to easily and quickly protect yourself from the breaches that lurk all around us:

•The What and How Behind Your Personal Threat Model
•Quick and Easy Steps for Password Protection and Two Factor Authentication
•Everyone’s Watching: How to Manage Your Online Privacy While Remaining Social

Join cybersecurity expert, Roman Garber, from Security Innovation for an inside look into protecting your and your families’ personal assets so you won’t become a victim of online threats and breaches.
Recorded Oct 4 2018 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roman Garber
Presentation preview: Security Best Practices for Regular Users

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive Dec 19 2018 6:00 pm UTC 30 mins
    Mike Cooper, Sr. Security Engineer
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • The Great DevOps Debate: Evolution or Revolution? Recorded: Dec 13 2018 63 mins
    Ed Adams, CEO and Roman Garber, Development & Security Manager
    DevOps continues to be a buzzword in the software development and operations world, but is it really a paradigm shift? It depends on what lens you view it through.

    Roman Garber, an active software security engineering and software team lead thinks so. Ed Adams, Security Innovation CEO, a 20-year software quality veteran and former mechanical engineer, curmudgeonly disagrees.

    Watch our on-demand session to decide which side of the fence you're on.
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive Recorded: Nov 28 2018 24 mins
    Mike Cooper, Sr. Security Engineer
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • Your Bank’s Digital Side Door Recorded: Nov 27 2018 55 mins
    Ed Adams, CEO of Security Innovation
    A widely-used but little known technology has created a vulnerable “Side Door” to thousands of financial institutions in North America. This discovery started with a simple question: why does my bank require multi-factor authentication (MFA), but Quicken does not? This led to an exploration of the 20-year old Open Financial Exchange (OFX) protocol and the 3000+ North American banks that support it.  The conclusion:  80% of banks supporting OFX have no MFA support, putting consumers at risk by exposing login credentials. 

    This presentation provides a summary of our research. It also describes how organizations can assess and mitigate enterprise risk posed by OFX.  Topics include:

    · Open Financial Exchange (OFX) protocol — how it works and where it’s vulnerable 

    · Research findings —  OFX security vulnerabilities that create enterprise and consumer risk

    · Compliance implications - using a known vulnerable component creates headaches

    · Assessment techniques — commercial scanning tools don’t work with OFX. Learn how to assess this risk quickly

    ·Mitigation techniques — compensating controls that reduce exposure while using the OFX protocol
  • Security Best Practices for Regular Users Recorded: Oct 4 2018 48 mins
    Roman Garber
    Data breaches happen all the time, but that only happens to large enterprises, right? What about me? How can you alter behaviors to better protect yourself and your family from personal attacks, phishing scams and the like?

    In this webinar, geared to everyday users, we will show you how to easily and quickly protect yourself from the breaches that lurk all around us:

    •The What and How Behind Your Personal Threat Model
    •Quick and Easy Steps for Password Protection and Two Factor Authentication
    •Everyone’s Watching: How to Manage Your Online Privacy While Remaining Social

    Join cybersecurity expert, Roman Garber, from Security Innovation for an inside look into protecting your and your families’ personal assets so you won’t become a victim of online threats and breaches.
  • 5 Best Practices for Slashing Enterprise Risk Recorded: Oct 2 2018 62 mins
    Ed Adams, CEO of Security Innovation and Holger Schulze, CEO of Cybersecurity Insiders
    Despite software being the primary target of attacks, organizations still fall woefully short with even basic security hygiene:

    53% lack significant resources to detect and remediate application vulnerabilities

    42% blame "rushing to release” for not establishing secure coding procedures

    Limited budgets, low-security awareness, and lack of skilled personnel compound problems.

    Join cybersecurity experts from Security Innovation and Cybersecurity Insiders as they explore the current security landscape and present actionable measures for integrating best practices into your software development process that will help slash enterprise risk.

    You will learn:
    - How your organization stacks-up in comparison to your peers
    - Top challenges and roadblocks to effectively protect your applications
    - Best practices to improve your security posture
  • IoT Security – Debunking the “We Aren’t THAT Connected” Myth Recorded: Jun 12 2018 56 mins
    Ed Adams, CEO, Security Innovation
    In a world where convenience is key, consumers are adopting every new connected device that hits the shelves - and doing so with the assumption that due diligence security has been considered. But recent IoT attacks suggest otherwise.

    As organizations migrate from a primarily offline to online business model, they are failing to consider IoT’s unique threats which traditional solutions are unable to secure. As a result, steps must be taken to ensure that the device, connections and infrastructure are hardened, especially software which runs IoT devices and is the source of ~90% of attacks.

    This webinar is ideal for risk, technology, and security professionals that want to understand why a hacker would want to attack their “harmless” IoT device and what the stealth risk to their organization and consumers is.

    Topics covered include:

    - IoT security – why it’s so different….and tough
    - The IoT ecosystem and attack surface
    - Managing liability - IoT risks to consumers and vendors
    - Auditing IoT software development
  • Threat Modeling – Locking the Door on Vulnerabilities Recorded: May 9 2018 63 mins
    Ed Adams, CEO by day, engineer at heart
    Did you lock the door before leaving your house this morning? If you did, you threat modeled without even realizing it. Threat modeling is identifying potential threats (house robbery) and implementing measures to mitigate the risk (locking your door).

    Protecting valuable assets, no matter if personal assets or business-related assets such as the software you are developing, threat modeling should become an instinctual and necessary part of your process.

    Our talk highlights how nearly 50% of security flaws can be mitigated through threat modeling. We help you prevent and mitigate risks by utilizing a reliable and hard-hitting analysis technique that can be applied to individual applications or across an entire portfolio. We show you how to effectively apply these techniques at the start of the design phase and throughout every phase of the development lifecycle so you can maximize the ROI of your security efforts.

    Topics covered include:
    • Threat Modeling 101
    • The propagating effect of poor design
    • Tabletop exercise – a world with and without threat modeling
    • Best practices and metrics for every stakeholder
  • GDPR: The AppSec Twist Recorded: Mar 21 2018 63 mins
    Roman Garber, Development Manager at Security Innovation and Edward Skraba, Lead Penetration Tester at Smarttech247
    When GDPR becomes law in a few months, it will be the most wide-ranging and stringent data protection initiative in history. To prepare for this sea change, most organizations have streamlined and detailed their information security policies; however, many are unaware that immature application security programs arguably pose the biggest threat of a data breach. This oft-forgotten piece of data protection puts organizations at risk of GDPR fines.  

    Attend this joint webinar with Security Innovation and Smarttech247 to learn practical tips on incorporating application security best practices into an InfoSec program to achieve GDPR compliance. 

    Topics include:  
    * Summary of GDPR key concepts
    * Security of data processing in software and the CIA triad
    * The people and process problem of GDPR: Governance
    * Using Data Protection by Design for secure design and business logic
    * Assessments to verify the security of processing

    Presenters:
    Roman Garber, Security Innovation
    Edward Skraba, Smarttech247
  • The OWASP Top 10 2017 - Let's Cut to The Chase Recorded: Feb 7 2018 60 mins
    Kevin Poniatowski and Mark Burnett
    What Do You REALLY Need to Know About the New OWASP Top Ten?

    The OWASP Top Ten is the de-facto web application security standard because it reflects the evolving threat landscape, providing organizations a framework to manage and mitigate application security risk.

    This dual-presenter format will examine the critical newcomers and pesky incumbents from both an offensive and defensive perspective. Attend to get our expert insight on how to harden Web applications and align your program towards OWASP compliance.


    Topics covered include:

    - The newcomers – why they are so tricky and elude traditional test efforts
    - XSS and Injection – mistakes organizations keep making that land these preventable threats on every Top Ten list
    - Design flaws that cause them and coding errors that expose them
    - High impact activities that reduce exploitability, prevalence and impact

    Meet the Presenters:

    Kevin Poniatowski, Sr. Security Instructor & Engineer at Security Innovation, brings an optimal blend of speaking ability, technical savvy, and an insatiable passion for security to Security Innovation's training customers. Kevin entered the application security field in 2007 with Security Innovation, where he has split time between application security course development and delivering instructor-led courses.

    Mark Burnett is a security consultant, author, and researcher who specializes in application security, authentication, and hardening Microsoft Windows-based servers and networks. Since 1999 he has worked in numerous areas of IT security, developing unique strategies and techniques for protecting critical assets. Mark is author and coauthor of a number of security books and publishes security articles for several web sites, newsletters, and magazines.
  • Reducing Application Risk: What Technology Can & Can’t Protect Against Recorded: Jan 12 2018 49 mins
    Mike Cooper, Sr. Security Manager, Security Innovation
    Applications are the primary target of attack due to their prevalence and inherent exposure, and require a solid defense in depth strategy to reduce risk. This on-demand webinar aims to educate IT and development teams on technologies available to build and deploy more secure software systems and debunks common myths about what each can and cannot protect.

    Topics include:

    - Network vs. Application Security
    - Secure Communication Technologies: Virtual Private Networks (VPNs), -
    Firewalls and Intrusion Detection Systems (IDS)
    - Hardening and Lockdown Tools: integrity checkers, anti-virus, access control, vulnerability assessment, and run-time application self-protection (RASP)
    - Shields Up: building stronger defenses
  • How To Test For The OWASP Top Ten Recorded: Dec 14 2017 63 mins
    Jason Taylor, CTO, Security Innovation
    The OWASP Top 10 is an expert consensus of the most critical web application security threats. If properly understood, it is an invaluable framework to prioritize efforts and address flaws that expose your organization to attack.

    Watch this on-demand webinar as Jason Taylor, one of our most experienced security experts, takes us through the journey of identifying the tell-tale markers of the OWASP Top Ten and reveals the techniques used to hunt them down.

    This session covers:

    Vulnerability anatomy – how they present themselves
    Analysis of vulnerability root cause and protection schemas
    Test procedures to validate susceptibility (or not) for each threat
  • OWASP Top Ten - Threats & Mitigations Recorded: Dec 1 2017 59 mins
    Jason Taylor, CTO, Security Innovation
    The OWASP Top Ten is an expert consensus of the most critical web application security threats. If properly understood, it is an invaluable framework to prioritize efforts and address flaws that expose your organization to attack.

    This on demand webinar presents the OWASP Top Ten in an abridged format, interpreting the threats for you and providing actionable offensive and defensive best practices. It is ideal for all IT/development stakeholders that want to take a risk-based approach to Web application security.
Securing software in the connected world
In today's connected world, software runs everything - from smart phones to banking applications, cars to home security systems, even refrigerators, garage doors and other every day devices are "connected." Software is everywhere – and unfortunately, it provides the largest attack surface for hackers. We are a cybersecurity company leveraging our deep knowledge of software security to create relevant products and services.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Best Practices for Regular Users
  • Live at: Oct 4 2018 6:00 pm
  • Presented by: Roman Garber
  • From:
Your email has been sent.
or close