Hi [[ session.user.profile.firstName ]]

The next wave of Privacy, Security and Compliance - Integrated Risk Management

Learn from our panel of experts as they discuss Privacy, Security and Compliance and how to effectively navigate the ever-evolving compliance mandates and regulations. - Learn how to make information security actionable.
Recorded Aug 6 2020 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Keavy Murphy, Patty Patria, Deidre Diamond, Robert Pellerin
Presentation preview: The next wave of Privacy, Security and Compliance - Integrated Risk Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Best Practices for Cloud host-based forensics Oct 21 2020 4:00 pm UTC 60 mins
    Michael Mimo, Copyright Clearance Center, Sr. Director of Information Technology
    Cloud host instance forensic acquisition presents certain challenges to forensics teams. Traditional forensic methods usually are not effective in the cloud. Access and networks are designed differently than in an on-premise Data Center. Forward thinking strategies need to be implemented so that Incident Response Cyber teams can effectively use forensically sound methods to examine artifacts on hosts. My talk is about how to prepare your organization for forensic acquisitions in a cloud infrastructure. I will quickly cover how to prepare a fleet of systems for memory and physical disk forensics. The targets are AWS EC2 instances but could be applied to any other cloud providers host provisioning infrastructure. I will focus on the process and infrastructure required to do this level of inspection. By the end you will be able to apply these strategies to activities such as Threat Hunting.
  • Managed Detection & Response: How does it play in your cyber security program? Recorded: Sep 10 2020 47 mins
    Michelle Drolet, CEO, Towerwall, Bob Antia, Data Privacy Consultant, Bharath Vasudevan, Alert Logic, Blake Strozdas, Pcysys
    As the average monetary cost of a malware attack continues to increase and currently costs an organization an average of $3.86 M, it is vital to be up to date on detection and prevention best practices. No level of investment prevents or blocks 100% of attacks. You will learn how to continuously identify and address breaches or gaps before they cause real damage. Join leading industry experts as they discuss the use of Deep Learning, AI and MDR solutions.
  • The next wave of Privacy, Security and Compliance - Integrated Risk Management Recorded: Aug 6 2020 47 mins
    Keavy Murphy, Patty Patria, Deidre Diamond, Robert Pellerin
    Learn from our panel of experts as they discuss Privacy, Security and Compliance and how to effectively navigate the ever-evolving compliance mandates and regulations. - Learn how to make information security actionable.
  • Cyber Threats: Protect Your Company's Human and Financial Capital Recorded: Jul 21 2020 41 mins
    Michelle Drolet, Michael Perkins, Jenny Holmes, John Kolar
    Panel of experts will be be addressing and answering questions on what steps an organization can take to limit their exposure to cyber threats that continue to emerge.
  • Zero Trust Architectures Recorded: Jul 2 2020 53 mins
    Michelle Drolet, Towerwall, Itay Nachum, Safe-T, Scott Tingley, Cogito Tom Ward, Qnext
    Data breaches are on the rise, highlighting no organization is safe from cyberattacks. One cause is that workforce mobility and cloud computing has placed most workloads beyond the shelter of corporate networks and traditional perimeter defenses. There are no perimeters.
    What are the issues, drivers and considerations for how Information Technology and Security organizations are applying Zero Trust Network Access (ZTNA) capabilities?
    In this BrightTalk you will learn about:

    1. Key ways that Zero Trust can simplify infosec implementation.
    2. Tips on how to communicate security risk, and the rewards of Zero Trust, to business owners.
    3. How inherent trust is the root of most pervasive issues facing IT today.
    4. Zero Trust adoption research findings: perceptions, progress, investments and initiatives
    • How zero trust facilitates a secure work from home world
    • The need for planning in order to pull it off right and securely (ie: these may no longer be endpoints you control)
  • Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19 Recorded: Jun 4 2020 49 mins
    Diana Kelley, Cybersecurity Field CTO, Microsoft, Michelle Drolet, CEO, Towerwall
    Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
    Wherever we turn it feels like the news is all COVID-19 all the time. Many of us are feeling stressed and overwhelmed and attackers know it. At Microsoft we've seen an increase in the success of phishing attacks, one of the common vectors for malware and ransomware infections. Rather than inventing entirely new exploits, attackers are pivoting their existing infrastructure for ransomware and other malware delivery tools to COVID-19 focused lures to get us to click. In this talk we'll share insights into how the attackers have shifted their lures and provide recommendations for improving detect and response times to reduce the likelihood these attacks will work.
  • Q&A Panel: How to Stay Cybersafe in 2020 Recorded: May 28 2020 57 mins
    Michelle Drolet & Arun Subramoniam Towerwall, Inc., Chris Chaves, Sophos
    Cyberthreats morph rapidly as they try to stay ahead of our defenses; wearing new disguises and breaking down virtual barriers in unique ways. As such, the answer to, "How do I remain secure?" changes as quickly as the cyberthreats we face.

    Join us for an interactive Q&A Panel with experts Chris Chaves of Sophos, and Michelle Drolet and Arun Subramoniam of Towerwall. Engage in a discussion on staying safe in the evolving threat landscape. They'll provide the multi-layered answer to, "How do I stay cybersafe in 2020?", including:

    • What you can do today to remain secure
    • The types of threats Sophos Labs is seeing recently
    • What we know about COVID-19 scams
    • How to correct your security posture
  • Zeroing in on Zero Trust Network Access – Everything You Need to Know Recorded: Nov 6 2019 33 mins
    Michelle Drolet, Tony Yodice
    In today’s modern enterprise, the use of legacy network access solutions has resulted in both an overly complex and inevitably vulnerable perimeter. Poor networking configuration and excess visibility into the perimeter leaves organizations open to both external attack and insider threat.

    Join Michelle Drolet, CEO at Towerwall and Tony Yodice, Director of US Operations at Safe-T to learn:

    -What is Zero Trust Network Access
    -Why modern enterprises require access policies built with an identity centric approach
    -How to protect your organization from the inside out
  • Data Protection & Privacy in 2020 Recorded: Oct 1 2019 57 mins
    Dr. Christopher Pierson | Shahrokh Shahidzadeh | Michelle Drolet | George Wrenn
    What's new in data privacy and security? Discover how the compliance landscape is changing in 2020 and what organizations are doing - or should be doing - to prepare.

    Join this panel of experts for an interactive Q&A session to learn more about what's coming up on the horizon in 2020 regarding data privacy and security, and the steps you can take today.

    Viewers will learn more about:
    - Data regulations and deadline dates to be aware of
    - Privacy in the cloud
    - How to build trust through privacy
    - Recommendations for 2020
    - The CCPA checklist

    - Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
    - Shahrokh Shahidzadeh, CEO, Acceptto
    - Michelle Drolet, CEO, Towerwall
    - George Wrenn, CEO & Founder, CyberSaint Security

    This Q&A panel is part of National Cyber Security Awareness Month.
    #CyberAware #BeCyberSmart
  • 7 Best Practices for Securing the Public Cloud Recorded: Sep 17 2019 52 mins
    Michelle Drolet and Byron Watson
    Workloads in the public cloud are the new pot of gold for savvy cybercriminals. Often misconfigured and under-secured, they’re an easy way for hackers to steal data and take advantage of your processing power. If you use Amazon Web Services, Microsoft Azure, or Google Cloud Platform, or are thinking about migrating to any of these, this webinar will provide essential insight for you. We’ll cover:

    - How public cloud security differs from traditional on-premises protection
    -What you are (and aren’t) responsible for when using AWS, Azure, and GCP
    -Seven practical steps that will help you stay secure and compliant
  • Live Webcam Panel: Operationalizing Cybersecurity Recorded: Mar 19 2019 56 mins
    Michelle Drolet, Towerwal, Amy McLaughlin, Oregon State University and Ariful Huq, Aporeto
    Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.

    Join us for an interactive Q&A panel with security leaders to learn more about how to operationalize cybersecurity.

    Topics up for discussion:
    - Making information security relatable
    - Building security programs
    - Defining your cybersecurity strategy
    - Translating your cybersecurity strategy into a risk management plan
    - Operationalizing your cybersecurity strategy
    - Using the maturity capability model for measuring success

    Michelle Drolet, CEO, Towerwall
    Amy McLaughlin, Director of Information Services, Oregon State University
    Ariful Huq, Director of Product Management, Aporeto
  • Best Practices for Protecting Your Business from Cybercrime Recorded: Feb 19 2019 62 mins
    Michelle Drolet (Towerwall), Michael Thelander (Venafi), William Peteroy (Gigamon), Kalani Enos (kenos)
    Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

    Join this panel of security experts to learn more about:
    - Trends in cybercrime and lessons learned in 2018
    - The cost of data breaches
    - Rise of cryptojacking and ransomware
    - Who are the players who make up the world of cybercrime (e.g. programmers, distributors, fraudsters, etc.)
    - The CISO vs the cybercriminal
    - Best practices for protecting your business

    - Michelle Drolet, CEO, Towerwall
    - Michael Thelander, Director of Product Marketing, Venafi
    - William Peteroy, Security CTO, Gigamon
    - Kalani Enos, Founder & CEO, kenos Technologies (Moderator)
  • Best Practices for Securing Your Organization in 2019 Recorded: Jan 15 2019 59 mins
    Griff James (Damrod Analysis); Michelle Drolet (Towerwall), Liam Brown (Lockton)
    Data breaches are on the rise and getting their fair share of media attention. It is no longer a question of "if", but "when" an organization will get breached. So, how are organizations preparing for the inevitable?

    Join this roundtable discussion with security experts to learn more about:
    - Trends in cyber attacks and breaches and what's at risk
    - Prevention best practices
    - Solution recommendations for breach detection and response
    - Key factors for CISO success
    - What's on the horizon for 2019

    - Griff James, Director, Damrod Analysis Ltd.
    - Michelle Drolet, CEO, Towerwall
    - Liam Brown, Cyber Risk Specialist, Lockton Companies
  • The Rise of Targeted Ransomware Recorded: Dec 11 2018 32 mins
    Michelle Drolet, CEO, Towerwall Inc.
    What is targeted ransomware?
    Are you susceptible?
    What can you do to defend against it?
  • Trends in Data Breaches and Comprehensive Response Recorded: Sep 19 2018 63 mins
    Michelle Drolet (Towerwall) | Dave Klein (GuardiCore) | Matthias Maier (Splunk) | Mike Trevett (FireEye)
    Does your organization have a data breach response plan? Discover the best practices for breach response and how to strengthen your organization's cyber resilience.

    Join this interactive Q&A panel with top security experts as they discuss:
    - The latest trends in data breach protection
    - Who's most at risk
    - How to detect breaches faster
    - What to do and not to do when it comes to breach response
    - Recommendations for CISOs for improving security

    - Michelle Drolet, CEO, Towerwall
    - Dave Klein, Sr. Director Engineering & Architecture, GuardiCore
    - Matthias Maier, Technical Evangelist, Splunk
    - Mike Trevett, Director, UK&I, FireEye
  • BrightTALK Platform Training Recorded: Mar 22 2018 43 mins
    BrightTALK Customer Success
    Presented by BrightTALK

    In this training you will learn How to --

    1. Schedule new webinars & upload video content.
    2. Promote your scheduled events & uploaded content.
    3. Access data and reporting.
    4. Request Help from BrightTALK Support

    Need Help?...
    Submit your questions by clicking the green chat bubble on the bottom right corner of your computer screen or email support@brighttalk.com.
Information Security
Towerwall is a woman-owned information security company offering a comprehensive suite of security services and solutions using best-of-breed tools and information security services. Our time-tested methodologies provide a consistent, repeatable, and measurable approach to information security; ranging from auditing and profiling to design and implementation. Towerwall’s 4E methodology, Evaluate Establish Educate Enforce, is time-tested, and provides a consistent, repeatable, and measurable approach to information security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The next wave of Privacy, Security and Compliance - Integrated Risk Management
  • Live at: Aug 6 2020 4:00 pm
  • Presented by: Keavy Murphy, Patty Patria, Deidre Diamond, Robert Pellerin
  • From:
Your email has been sent.
or close