Hi [[ session.user.profile.firstName ]]

Application of Data Security in Daily Life

In this talk, my focus is on the application of data security in our data today's life. Attendees get to learn the security perspective of data and how they can pursue a career in security while continuing their passion for data security.

Additionally, we will discuss the different perspectives of data security solutions such as Cloud data security, Web Browser Security, eMail Security, Payments Security, Enterprise Data Protection, Hardware security module, Key management, etc.
Recorded Oct 16 2020 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Deveeshree Nayak, Infosec Professional & Educator
Presentation preview: Application of Data Security in Daily Life

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cybercrime Trends and Threats in COVID-19 Oct 26 2020 1:00 pm UTC 60 mins
    Deveeshree Nayak, Infosec Professional & Educator
    As Covid 19 continues to increase all over the world, an increase in cybercrime is highly enhanced. The vulnerability related work from home and the capability for increased financial benefit, cybercriminals are building their activities and develop more advanced operations. In this talk, I will cover several scenarios of Cyber attack impact due to Covid 19.
  • Application of Data Security in Daily Life Recorded: Oct 16 2020 41 mins
    Deveeshree Nayak, Infosec Professional & Educator
    In this talk, my focus is on the application of data security in our data today's life. Attendees get to learn the security perspective of data and how they can pursue a career in security while continuing their passion for data security.

    Additionally, we will discuss the different perspectives of data security solutions such as Cloud data security, Web Browser Security, eMail Security, Payments Security, Enterprise Data Protection, Hardware security module, Key management, etc.
  • Work-From-Anywhere is Easy, But How Do You Secure-From-Anywhere? Recorded: Oct 14 2020 42 mins
    Babak Pasdar, CEO / CTO, Acreto
    Infrastructure today is distributed and mobile, yet security architecture and technologies have not evolved and remain static and disjointed.

    This session will walk through best practices of securing Hybrid Infrastructure (Distributed & Mobile Environments), along with practical use-cases to secure multi-platform/multi-owner applications that span Cloud, SaaS, IoT/OT, Data Centers, Third-Parties and Remote Users.

    In order to understand the security and connectivity challenges with hybrid infrastructure, we will review the challenges with current security tools and approaches and provide insight into a newer, more refined model that can secure infrastructure that is becoming even more distributed, more mobile, and more diversified.
  • Securing Your Connected Devices at Home & at Work Recorded: Oct 13 2020 59 mins
    Chris Hazelton, Brandon Hoffman, Rick Moy & Jack Mannino
    Connected devices are everywhere. More than 83 million U.S. households have at least one smart device, according to a study by the Consumer Technology Association. In fact, U.S. households own an average of 11 Internet-connected devices, according to a study from Deloitte, including seven with screens to view content (e.g. smartphones, tablets, laptops, TVs). 

    With so many devices on the home network, how is security keeping up? What is needed to make device security easier and faster?

    Find out why attackers are targeting internet-connected devices, some common attack vectors, and what to do to reduce the risk of breach at the endpoint.

    Join this panel of security experts to learn more about the security risks connected devices pose to your home and office, and what can be done about it:
    - Connected devices - the gateway for attackers
    - The likelihood that you or your company will be breached via connected devices 
    - Steps to mitigate the risk of breach
    - What is needed to close the gap in device security
    - Best practices for protecting your smart home from online threats

    This panel is part of National Cyber Security Awareness Month (NCSAM) 2020.

    We welcome and encourage audience participation and questions.

    Chris Hazelton, Director of Security Solutions, Lookout (Moderator)
    Brandon Hoffman, CISO, Netenrich
    Rick Moy, Vice President of Marketing, Tempered Networks
    Jack Mannino, CEO, nVisium
  • Risks and Countermeasures of IOT Devices Recorded: Oct 9 2020 58 mins
    Christie Ogubere, Principal Consultant, Intex IT
    Internet of Things (IoT) as a technology has transformed global economies through the proliferation of connected devices across multiple protocols and standards. The benefits have been highly published however, these devices can bring an enormous level of risk to businesses, security and privacy concerns for the end users. In this webinar, I discuss different IOT application landscape and identify security threats in IOT architecture. The possible countermeasures by implementing rigorous security standards to protect data at rest and in motion drive efficiencies.
  • Protecting Connected Devices from Cyber Threats Recorded: Oct 7 2020 57 mins
    Rick Holland, Mark Lynd, Terence Jackson & Dirk Schrader
    The proliferation of connected devices at home and in the workplace has opened the door to attackers, who often find poorly protected IoT devices as easy targets and entry points.

    This panel of security experts and industry leaders will explore the security risks that connected devices pose for individuals and organizations in the U.S. and what can be done to secure devices, deter attackers and overall minimize the risk of breach.
    - How connected devices have changed the game from a cybersecurity perspective?
    - Why connected devices are easy targets for attackers
    - Other cyber threats to be aware of when it comes to connected devices
    - What you can do to secure your devices at home and at work
    - Understanding the risk of breach
    - Best practices & how to #BeCyberSmart

    This panel is part of National Cyber Security Awareness Month (NCSAM) 2020.

    We welcome and encourage audience participation and questions.

    Terence Jackson, Chief Information Security Officer, Thycotic (Moderator)
    Rick Holland, CISO, Vice President of Strategy, Digital Shadows
    Mark Lynd, Head of Digital Business - CISSP, ISSAP & ISSMP, NETSYNC
    Dirk Schrader, Global VP of Product Marketing & Business Development, NNT
  • Protecting Data Privacy in Analytics and Machine Learning Recorded: Oct 7 2020 61 mins
    Ulf Mattsson, Chief Security Strategist, Protegrity
    In this session, we will discuss a range of new emerging technologies for privacy and confidentiality in machine learning and data analytics. We will discuss how to put these technologies to work for databases and other data sources.

    When we think about developing AI responsibly, there’s many different activities that we need to think about.

    This session also discusses international standards and emerging privacy-enhanced computation techniques, secure multiparty computation, zero trust, cloud and trusted execution environments. We will discuss the “why, what, and how” of techniques for privacy preserving computing.

    We will review how different industries are taking opportunity of these privacy preserving techniques. A retail company used secure multi-party computation to be able to respect user privacy and specific regulations and allow the retailer to gain insights while protecting the organization’s IP. Secure data-sharing is used by a healthcare organization to protect the privacy of individuals and they also store and search on encrypted medical data in cloud.

    We will also review the benefits of secure data-sharing for financial institutions including a large bank that wanted to broaden access to its data lake without compromising data privacy but preserving the data’s analytical quality for machine learning purposes.
  • CISO Insights: How to Practice Cyber Hygiene & #BeCyberSmart Recorded: Oct 5 2020 61 mins
    Dan Lohrmann | Earl Duby | Keith Hollender | Adam Ford
    By popular demand, the CISO Insights series is back in October for National Cyber Security Awareness Month with a new episode on securing connected devices.

    Join this interactive Q&A discussion with CISOs to learn more about:
    - Why connected devices are a popular target for attackers
    - Steps for easy cyber hygiene at home and at work
    - Building a security culture together
    - CISO recommendations & best practices

    - Dan Lohrmann, CSO & Chief Strategist, Security Mentor, Inc.
    - Earl Duby, CISO, Lear Corporation
    - Keith Hollender, former CISO; Partner, Global Cybersecurity Practice Lead at MorganFranklin Consulting
    - Adam Ford, CISO of Illinois

    This panel is part of National Cyber Security Awareness Month (NCSAM) 2020.

    We welcome and encourage audience participation and questions.
  • Part 2: What can State and Local Governments do to Prevent Ransomware? Recorded: Oct 29 2019 61 mins
    David Morris, Roy Hadley, Reid Eastburn and Skeet Spillane
    This session will be a short recap of Session 1 and will then go into detail as to what State and Local Governments can do to prevent Ransomware Attacks.
  • 7 Tips for Marketing Cybersecurity Solutions Recorded: Oct 29 2019 62 mins
    Jessica Gulick, CEO, and Monica Ricci, VP of Marketing, Katzcy
    Join Jessica Gulick, tech & cybersecurity growth hacker, as she shares the top lessons that have not only been learned, but have been put into practice by Katzcy’s growth-stage clients. We’ll talk about the importance of understanding buyer profiles, the techno-buzz trap, the right time for geek-speak, and how to build a narrative that positions your unique solution in the right box in the minds of buyers, industry analysts, and influencers alike.
  • How to make DevSecOps a Reality Recorded: Oct 28 2019 59 mins
    Sushila Nair NTT DATA, Setu Kulkarni WhiteHat Security, Larry Quick NTT Ltd, Sanjiev Chattopadhya Blackboard
    Custom code is the way that we are optimizing and creating new business opportunities but it is also the way that we are being attacked. Learn how to integrate security into DevOps and manage the risk posed by application development in such a way that speed and agility are not sacrificed.
  • A New Prescription for Cyber Security - Global IT Asset Inventory Recorded: Oct 24 2019 62 mins
    Chris Rodgers, Director of Product Management, Qualys & Jim Reavis, CEO and Co-founder of CSA
    Most people think that a network is a static event. However, with new types of devices, transient workloads, contract and guest participation, the system is fluid. At any given time,15-20% of the network is unseen or unmanaged. This is why the principle of maximum IT asset visibility is a fundamental prerequisite to improving your security posture. Simply put, it is difficult, if not impossible, to secure what we do not know or cannot see.

    During the webinar, Jim Reavis, co-founder and CEO of the Cloud Security Alliance, will discuss the challenges facing today's complex and hyper-connected IT environments. Additionally, Qualys' Chris Rodgers will explore:
    - Why comprehensive visibility is the foundation for your security architecture
    - The importance of visibility as it relates to compliance
    - A demonstration of the role visibility plays in threat hunting
    - Customer success stories highlighting how access to clean, reliable data with visibility and context enabled leads to effective business decisions
  • Getting Inside Insider Threats: Response and Mitigation Recorded: Oct 23 2019 49 mins
    Ryan Lai, EVP of Professional Services, Nisos
    Insider threats can wreck your network, your business, and your company's reputation. But stopping malicious or simply incompetent insiders from doing damage isn't just an exercise in analyzing where the damage came from. Insider Threats aren’t just malicious employees. They can run the gamut from incompetent to accidental to theft. Join Ryan Lai, EVP of Professional Services at Nisos, as he discusses the wide-ranging complexities of an insider threat investigation.
  • Part 1: Why State and Local Governments are Prime Targets for Ransomware Recorded: Oct 22 2019 61 mins
    David Morris, Roy E. Hadley Jr., Reid Eastburn and Skeet Spillane
    This session will cover why State and Local Governments have headed the list of Ransomware Attacks. Part 1 will delve into why is this the case and Part 2 will address what can be done to prevent these attacks.
  • Sharing Cyber Threat Information: Why, When and How? Recorded: Oct 22 2019 59 mins
    Troy Vennon, Director of Security Innovation, the Columbus Collaboratory
    It’s been 20+ years since the US government first issued a directive mandating that critical infrastructure providers in the public and private sectors share information about cyber threats. This directive, PDD63, recognized that, in the face of increasing threats, organizations that band together to share information and coordinate responses stand a better chance of protecting themselves. Thus, the realm of threat intelligence sharing was created. Join Troy Vennon, Director of Security Innovation at Columbus Collaboratory, as he reviews the basics of sharing threat intelligence and how it can benefit an organization of any size in any industry.
  • What’s Your Organization’s Exposure on the Dark Web? Recorded: Oct 17 2019 58 mins
    Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management, Terbium Labs
    A thriving fraud economy exists in the criminal underground, on the Dark Web and beyond, that trades in compromised information. Even if it’s not your business’s information, it’s still your problem because stolen user credentials are used for large-scale phishing attacks, credential stuffing, and account takeover.

    Join two Terbium Labs VPs—Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management—as they offer insights into how your organization should rethink data security as more information is exposed, and re-exposed, every day.
  • Getting Started with WiCyS Student Chapters and Making an Impact Recorded: Oct 16 2019 61 mins
    Dr. Vitaly Ford, Professor Pauline Mosley, and the Tennessee Tech Chapter Students
    In this webinar, we will talk about how to get started as a Women in CyberSecurity (WiCyS) Student Chapter and share ideas on activities, funding, sustainability, competitions, and resources.
  • What Happens When Your Bank is Hacked? Recorded: Oct 15 2019 61 mins
    David Morris, Lance James, Steven Teppler, and Mark Rasch
    This session will delve into the legal responsibilities of your Bank's liability and your requirements to protect your banking credentials from the unauthorized transfer of funds as a result of a hack.
  • Diversify Defense — Improving Cybersecurity Through Smart Consolidation Recorded: Oct 15 2019 53 mins
    Jeff Costlow, Deputy CISO, ExtraHop & Craig Balding of CSA
    The rush to innovate has resulted in more sophisticated threat defenses, but it has also created a complex web of tools that must be managed by an already overworked and understaffed security team. Heterogeneity of defense systems is itself a defense, so modern security teams need to approach consolidation differently.

    In this session, Jeff Costlow, Deputy CISO at ExtraHop will give an abbreviated version of his keynote presentation at the upcoming CSA Summit at (ISC)² and share insights about how data-first approaches and cross-collaboration improve security posture and help reduce tool sprawl.
  • No Geek-Speak Allowed: The Financial View of Cyber Risk Recorded: Oct 15 2019 50 mins
    Jerry Caponera, VP of Products & Cyber Risk, Nehemiah Security
    Join us for this webinar to explore how cyber risk models have evolved to more accurately predict financial outcomes through better alignment with frameworks and models like NIST and MITRE ATT&CK. Jerry Caponera, VP of Products and Cyber Risk at Nehemiah Security, will share insights from global cybersecurity leaders who have risen above cyber geek talk and successfully translated risk into business terms. He will cover managing risk by tracking associated potential financial losses; what’s behind the hype surrounding financial data risk assessment (FinDRA); how to calculate ROI for security and mitigation investments; and how to brief your Board on cyber risk in financial terms.
Panels, webinars and tutorials on cyber awareness during NCSAM
Join BrightTALK and partners as we celebrate the 17th Anniversary of NCSAM in October 2020 with a series of #BeCyberSmart panels, webinar presentations and video tutorials.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Application of Data Security in Daily Life
  • Live at: Oct 16 2020 2:00 pm
  • Presented by: Deveeshree Nayak, Infosec Professional & Educator
  • From:
Your email has been sent.
or close