Hi [[ session.user.profile.firstName ]]

How Does a Formula One CIO Cope?

Nominet research uncovered the strain on those responsible for cyber security at high-pressure organisations. What’s it like in F1?

Hear Gary Foote, CIO of Haas F1 Team, explain what drove him into racing and how he unwinds when he gets the chance.

This video forms part of Nominet’s wider investigation into how CIOs and CISO cope with the pressure of keeping organisations safe from cyber security threats, while also being asked to improve efficiencies and value delivered.
Recorded Jun 25 2019 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nominet Cyber Security
Presentation preview: How Does a Formula One CIO Cope?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber Security and the Cloud Recorded: Sep 11 2019 31 mins
    Stuart Reed - VP Products, Nominet
    To some extent, cloud security concerns have been overcome. But how? What has happened to reassure enterprise security teams? And what role do they see for cloud-first propositions in the security solutions of the future?

    Stuart Reed, VP Products at Nominet, delves deeper into these questions in this short webinar based on the results of original research into the adoption of cloud security by large organizations in the US and UK.
  • Security Begins Here: Insight from Charlie McMurdie Recorded: Sep 11 2019 7 mins
    Charlie McMurdie - Cybercrime & Security Expert
    Nominet’s Security Begins Here series captures thoughts and opinions from some of the most influential and vibrant voices in the cyber security industry. We explore the issues organizations are exposed to every day at every level: from digital transformation, to cloud security and cyber confidence. Our series experts draw from first-hand experience to explain how they have dealt with today’s cyber challenges, with advice on how others can better manage security risks.

    Security expert and former head of Scotland Yard’s Police National Cyber Crime Unit, Charlie McMurdie discusses her views on the importance of speed, agility and ingenuity in the battle to defend against the actions of those committing felonies online, taking into consideration the level of confidence in the cloud and accountability demonstrated by those working within organizations globally.

    #SecurityBeginsHere
  • Cath Goulding on Digital Transformation Recorded: Aug 21 2019 3 mins
    Cath Goulding - CISO, Nominet
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation. In this video Cath Goulding, CISO at Nominet, talks of her experiences and provides her perspective and on the challenges large enterprises face when keeping their organizations secure during digital transformation programs.
  • James Stickland on Digital Transformation Recorded: Aug 21 2019 3 mins
    James Stickland - CEO, Veridium
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation. In this video James Stickland, CEO, at Veridium talks of his experiences and provides his perspective and on the challenges large enterprises face when keeping their organizations secure during digital transformation programs.
  • Charlie McMurdie on Digital Transformation Recorded: Aug 21 2019 3 mins
    Charlie McMurdie - Cybercrime & Security Expert
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation. In this video, cyber security expert, Charlie McMurdie, talks of her experiences and provides her perspectives on the challenges large enterprises face when keeping their organizations secure during digital transformation programs.
  • Security Begins Here: Insight from Shan Lee Recorded: Aug 8 2019 5 mins
    Shan Lee - CISO & DPO, TransferWise
    Nominet’s Security Begins Here series captures thoughts and opinions from some of the most influential and vibrant voices in the cyber security industry. We explore the issues organizations are exposed to every day at every level: from digital transformation, to cloud security and cyber confidence. Our series experts draw from first-hand experience to explain how they have dealt with today’s cyber challenges, with advice on how others can better manage security risks.

    Shan Lee is CISO and DPO at TransferWise, a financial company for people who travel, live and work internationally. In this video he discusses his views on security culture in the workplace, as well as the challenges companies face in the fast-evolving wold of cloud security and cyber confidence.

    #SecurityBeginsHere
  • Digital Transformation: Perspectives from Industry Leaders Recorded: Aug 8 2019 3 mins
    Nominet Cyber Security
    Today, if an organization is unable to keep pace with digital disruption its very existence is at threat. What’s more, unlike many previous business challenges, digital transformation is not a one-off event. Rather, it’s an unfolding process that changes over time as new technologies emerge that lead to new business models and modes of differentiation.

    Digitally transforming an enterprise to a point where it is capable of continual innovation is a huge prize, but it also brings with it a range of challenges, particularly when it comes to cyber security. In the digital age, organizations can no longer hide behind the security of their perimeter walls. Instead, they must open up digitally to partners, suppliers, IoT devices and even competitors in order to create the seamless, customer-centric services people increasingly demand.

    We spoke with industry leaders to garner their views on cyber security in the age of digital transformation.
  • Cyber Security in the Age of Digital Transformation Recorded: Jul 25 2019 28 mins
    Stuart Reed - VP Products, Nominet
    Today, forward-thinking enterprises are already digital to the core and those that aren't, soon will be.

    Advancements in technology such as the cloud, mobile, virtual reality (VR), blockchain, machine learning, data science, quantum computing and more will continue to reshape how we work and live.

    But this comes at a huge risk. The other major change that technology has brought us is the constant threat of damage from cyber crime. Without paying the right level of attention to cyber security, digital agility can expose more interfaces to these threats.

    Find out why cyber security issues are key for digital transformation projects, what the risks are and how to offset them.
  • Effecting Digital Transformation in Safety - the NTX Way Recorded: Jul 10 2019 2 mins
    Nominet Cyber Security
    The Haas F1 Team is a new and disruptive entrant to the world’s most prestigious motor racing carnival. Built on a new model where expertise is outsourced as much as possible and heavily reliant on technology, the team finds itself at an interesting and challenging juncture.

    Having spent four years building a core service as quickly as possible, CIO Gary Foote now has to start a digital transformation process to turn the technology platform into an enabler for the business.

    Hear him explain how NTX now safeguards the team as it embarks on that journey.
  • Leveraging Hidden DNS Information to Fight Threats Recorded: Jul 9 2019 10 mins
    Nominet Cyber Security
    Stuart Reed discusses how the information provided in a domain name system is far more comprehensive than just those transactions that take place, providing granular information around some security risks. However, as his conversation with Varun Haran suggests, few CISOs tend to make the most of this goldmine of information available to them.

    Recorded at the 2019 RSA Conference in San Francisco, the video covers:

    - The changing threat landscape
    - Foundational controls lacking in a breach
    - The concept of DNS tunnelling
  • The Role of DNS in Cyber Security Recorded: Jul 9 2019 8 mins
    Nominet Cyber Security
    Stuart Reed discusses the ways in which Nominet can improve visibility from a cuber security perspective with Nick Holland, DIrector of Banking & Payments at ISMG.

    Recorded at Infosecurity Europe, the video discusses DNS as the best kept secret in cyber security, and covers the following points:

    - The role of machine learning in mitigating risks
    - The need to improve visibility
    - The results of research on the CISO's role
  • How Does a Formula One CIO Cope? Recorded: Jun 25 2019 2 mins
    Nominet Cyber Security
    Nominet research uncovered the strain on those responsible for cyber security at high-pressure organisations. What’s it like in F1?

    Hear Gary Foote, CIO of Haas F1 Team, explain what drove him into racing and how he unwinds when he gets the chance.

    This video forms part of Nominet’s wider investigation into how CIOs and CISO cope with the pressure of keeping organisations safe from cyber security threats, while also being asked to improve efficiencies and value delivered.
  • Haas F1 Security and NTX Recorded: Jun 14 2019 2 mins
    Nominet Cyber Security
    In this 90 second video, Gary Foote, CIO of the Rich Energy Haas F1 Team, explains how Nominet’s NTX:

    - secures business data
    - protects reputations: Haas F1 Team and its partners
    - handles global spread
    - enhances an existing security stack
    - allows freedom to use own devices in safety
    - immediately found previously unknown threats and vulnerabilities

    NTX does this all without placing a burden on the team or presenting barriers to business as usual. The Haas F1 Team outsources as much as possible and in this instance has trusted Nominet’s expertise and technology to protect the business on its behalf.
  • Using the DNS to Block Phishing Attempts Recorded: Jun 14 2019 3 mins
    Nominet Cyber Security
    Although phishing has been around for decades, it’s still one of the most popular tactics used by cyber criminals.

    Education helps but is rarely 100% effective. Millions of spoof emails are sent every day and they get ever more convincing.

    Nominet’s NTX platform uses original research, data science and machine learning to weed out the signs of phishing. It analyses DNS traffic that’s usually whitelisted by firewalls and other cyber security measures to prevent phishing campaigns from being effective.

    This short video explains how phishing works and how NTX prevents harm, should your staff click through to the wrong place.
  • Using the DNS to Defend Against Malware Recorded: Jun 14 2019 3 mins
    Nominet Cyber Security
    Nearly all malware - ransomware, viruses, trojans, worms, adware, spyware, fileless malware and all the hybrid forms - use DNS at some point. It might be to steal data, communicate with a command and control server or misdirect you.

    The point is that DNS is so ubiquitous that most cyber security defences disregard it.

    NTX doesn’t. NTX uses the tell-tale signs of malware in DNS packets against the cyber criminals, to predict, detect and block malware.

    This short video explains more - feel free to share it with colleagues, manager and the board.
  • Using the DNS to Prevent Data Loss Recorded: Jun 13 2019 3 mins
    Nominet Cyber Security
    A very hard-to-detect technique for getting your confidential data out of your company is to hide it among DNS packets. It’s not fast, but criminals use it because it is so hard to detect. DNS traffic is so abundant and ordinary that very few cyber security solutions look at it.

    This quick video explains how it happens, how it can be disastrous for your organisation and what you can do to prevent it.
  • DNS: The Best Kept Secret in Cyber Security? Recorded: Jun 11 2019 2 mins
    Nominet Cyber Security
    DNS is used by the vast majority of cyber threats and runs on every single network. But it doesn’t have to be a liability; its very ubiquity makes it an invaluable source of threat intelligence.

    If only you could access that intelligence?

    NTX does it for you. Combining advanced DNS analytics with unique detection algorithms, original research, machine learning and data science, NTX predicts, detects and blocks cyber threats before they harm your business.
  • Cyber security challenges faced by critical infrastructure organisations Recorded: Mar 28 2019 4 mins
    Nominet Cyber Security
    Learn more about the cyber security challenges faced by organisations involved in the provision and maintenance of critical national infrastructure (CNI).

    What are the numerous cyber threats faced by CNI? Three recent, high-profile attacks that crippled sections of CNI are analysed. The video goes on to explain specifically how Nominet’s innovative NTX platform, with its unique algorithms, would have prevented each attack, had it been installed.
  • Why is DNS so important? Recorded: Mar 25 2019 3 mins
    Nominet Cyber Security
    The domain name system (DNS) is at the heart of everything we do.

    The internet has grown up around this signposting system that allows us to browse the web and allows applications and programs to find the systems they need to operate.

    Watch this video to learn how the DNS works, why the DNS is regularly exploited by cyber criminals and what makes it the perfect place for us to detect signs of cyber threats and protect organisations against them.
  • The NTX Platform: Proactively protecting your network Recorded: Mar 19 2019 2 mins
    Nominet Cyber Security
    Nominet’s NTX platform can predict, detect and block cyber threats that exploit DNS at some point in their attack cycle - which is most of them.

    Watch this video to learn how important DNS is to the day-to-day operation of networks, and how NTX’s unique technology uses DNS to instantly predict, detect and block cyber threats on your network.

    In the age of digital transformation, protecting your network is protecting your organisation!
Proactively detect and block cyber threats to your organisation.
The NTX solution from Nominet cuts through the noise, detecting and pinpointing threats on your network immediately.

Our solution identifies and proactively addresses threats to enable cyber security teams to operate in an efficient and insightful way, whilst protecting your business and reputation.

Built to analyse billions of DNS data packets in real time, NTX provides you with visibility and protection on critical threats to your organisation, including malware, phishing and data exfiltration.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How Does a Formula One CIO Cope?
  • Live at: Jun 25 2019 9:55 am
  • Presented by: Nominet Cyber Security
  • From:
Your email has been sent.
or close