CISO Panel 2: How CISOs can get Cyber Security Woven Into the Business Strategy
A Seat at the King's Table - CISO Panel, Part 2 of 2
Join us for Part 2 of our CISO panel as our guests continue the conversation around the maturation of the information security within today's organizations.
This session's discussion is a continuation of the conversation in Part 1 of this CISO Panel. We will build off of the questions addressed during and after the Part 1, and dig into the research and analysis performed by Thom between the sessions.
Our Panel members include:
-Host: Thom Langford, InfoSec veteran and prior CISO at Publicis Groupe
-Panelist: Jun Chen, Deputy CISO/SVP Cyber Security of Publicis Groupe
-Panelist: Curt Dalton, Global Leader of Security & Privacy at Protiviti
-Panelist: Guest CISO
Part 1 of this series took place on September 30th - watch on demand here: https://www.brighttalk.com/webcast/18534/439844
During Part 2, we will welcome a new panel of CISO's to share their thoughts and experiences on the discussion topics and research. We look forward to you joining us at both! As a way to say thank you, those who attend both sessions will receive a free autographed copy of “The Psychology of Information Security” authored by one of our panelists, Leron Zinatullin.
*Bonus* Between Part 1 and Part 2 of this event, our host Thom Langford will conduct research pertaining to this topic of discussion and produce a research paper to share with those who attend!*
RecordedOct 22 202061 mins
Your place is confirmed, we'll send you email reminders
Rome wasn't built in a day, nor is the success of your organization. With CybelAngel, you are assured to keep the optimal coverage as your business scales in a shifting environment.
Join Product Specialist Julia Osseland to discuss how CybelAngel Digital Risk Protection Platform can help you remain secure through expansions, acquisitions, and new projects.
In this webinar, you will:
- Discover how you can adapt your coverage dynamically, adding new perimeters, keywords, users, on the go
- Understand how CybelAngel Platform allows you to collaborate across teams and business units
- See how CybelAngel makes your teams' workload manageable through APIs and Connectors
Easy, scalable, and robust: cloud storage is a no-brainer for 83% of businesses worldwide who store sensitive information on the cloud (McAfee). Still, you don't get to just deploy your data and go: about a third of organisations have experimented with account compromises (Unit 42 Cloud Security Trends)
Protecting against data leaks on the Cloud is a priority for you. As your investments in virtual infrastructure grow, so is your concern about the safety of confidential information being stored in, and accessed from, outside of your firewall.
Join Product Specialist Julia Osseland to discuss how CybelAngel Digital Risk Protection Platform can help prevent costly data breaches by allowing you to keep visibility and control over your most sensitive assets.
In this webinar, you will:
- Understand how misconfigured AWS S3, Azure, and GCS buckets make your critical data publicly accessible without you knowing it.
- Prevent exposure from turning into breaches.
- Discover how CybelAngel's Machine Learning capacities make us the fastest to detect exposed cloud assets.
2020 was the year that third-party risk management was put under a microscope. How will this change third-party risk management in the year to come?
Tune in to our fireside chat with industry leaders from SecurityScorecard and CybelAngel as they discuss their top 5 predictions for Third-Party Risk Management in 2021, and how to stay ahead of the risks!
Speakers:
● Drew Wilkinson, VP Professional Services and Customer Success at SecurityScorecard
● Camille Charaudeau, VP Marketing & Product Strategy at CybelAngel
David Sygula, Expert Analyste en Cybersécurité, CybelAngel
Sécurisez les données de vos patients et protégez votre organisation.
Notre expert en cybersécurité CybelAngel partagera les résultats d'une enquête réalisée pendant 6 mois. Cette recherche révèle que plus de 45 millions de fichiers d'imagerie médicale comprenant des informations personnelles sur les soins de santé, des radiographies et des scanners, sont accessibles publiquement sur des serveurs non sécurisés.
Participez au webinar pour comprendre :
- Les enjeux réglementaires liés à la protection des données de santé,
- Les menaces liées à la fuite de ces données,
- Comment détecter les fuites de données pour les sécuriser rapidement
Vulnerable assets are open doors into your infrastructure. That's why ransomware gangs are actively looking for these weak spots. And that's why most organisations have endpoint management protocols in place.
But did you know that 40% of your organisations IT infrastructure actually exists outside of the central IT's purview? What are the odds of being attacked through those shadow assets?
In this webinar, you will:
- Learn how ransomware gangs are scanning your external-facing assets for vulnerabilities
- Understand the challenges of securing a shadow digital footprint in an open world
- Get actionable tips to anticipate attacks on shadow IT at scale
2020 was the year that third-party risk management was put under a microscope. How will this change third-party risk management in the year to come?
Tune in to our fireside chat with industry leaders from SecurityScorecard and CybelAngel as they discuss their top 5 predictions for Third-Party Risk Management in 2021, and how to stay ahead of the risks!
Speakers:
● Drew Wilkinson, VP Professional Services and Customer Success at SecurityScorecard
● Camille Charaudeau, VP Marketing & Product Strategy at CybelAngel
Tom Field, SVP of Editorial at ISMG, Todd Carroll, CISO at CybelAngel, Maxime Boquet, Product Manager at CybelAngel
While exchanging information with organizations is the lifeblood of business, once data leaves the perimeter of your enterprise, it takes its own journey through your third parties and their suppliers, and so on.
Join CybelAngel and ISMG host Tom Field on Wednesday, January 6th at 10 AM EST for our upcoming webinar: How to Manage Your Third-Party Risk.
During this discussion, you'll hear from CybelAngel's CISO, Todd Carroll, and Product Manager, Maxime Boquet, and walk away with valuable insight on:
*Real-world statistics, examples, and costs of third-party leaks
*3 keys to mitigating your third-party risk
Todd Carroll, CybelAngel CISO - Howard Marshall, Managing Director @ Accenture Security - Dave Bittner, Host @ The CyberWire
The acceleration of digital transformation and the proliferation of connected devices has no doubt left the workforce more connected than ever. However the trade off of this convenient connectedness comes in the form of exponentially increased threat surfaces and vulnerabilities.
Tune into our thought leadership discussion on the consequences of being wildly connected on Thursday, November 12th @ 10 AM EST, featuring:
*Todd Carroll -- retired FBI cybersecurity executive, CISO at CybelAngel
*Howard Marshall -- retired FBI cybersecurity executive, Managing Director at Accenture Security
*Hosted by -- Dave Bittner, Producer & Host of The CyberWire
These cybersecurity professionals with their unique federal intelligence and cyber backgrounds will share their thoughts on:
*The consequences of a connected enterprise
*The sophisticated attacks of today's cyber criminals
*The evolution of cyber attacks
Mayeul Berger Senior Analyst / Cyber Partnerships Manager et Christophe Longuepez Head of offensive and defensive activities
Superviser sa Cybersécurité jusqu'aux limites de l´entreprise et de son système d´information est aujourd´hui devenu insuffisant.
Venez découvrir comment y ajouter de nouveaux périmètres tels que le Deep/DarkNet, les DNS publics ou encore les bases de données non sécurisées en toute simplicité et sans surcharger vos équipes opérationnelles.
Thom Langford, InfoSec veteran, and a panel of guest CISOs
A Seat at the King's Table - CISO Panel, Part 2 of 2
Join us for Part 2 of our CISO panel as our guests continue the conversation around the maturation of the information security within today's organizations.
This session's discussion is a continuation of the conversation in Part 1 of this CISO Panel. We will build off of the questions addressed during and after the Part 1, and dig into the research and analysis performed by Thom between the sessions.
Our Panel members include:
-Host: Thom Langford, InfoSec veteran and prior CISO at Publicis Groupe
-Panelist: Jun Chen, Deputy CISO/SVP Cyber Security of Publicis Groupe
-Panelist: Curt Dalton, Global Leader of Security & Privacy at Protiviti
-Panelist: Guest CISO
Part 1 of this series took place on September 30th - watch on demand here: https://www.brighttalk.com/webcast/18534/439844
During Part 2, we will welcome a new panel of CISO's to share their thoughts and experiences on the discussion topics and research. We look forward to you joining us at both! As a way to say thank you, those who attend both sessions will receive a free autographed copy of “The Psychology of Information Security” authored by one of our panelists, Leron Zinatullin.
*Bonus* Between Part 1 and Part 2 of this event, our host Thom Langford will conduct research pertaining to this topic of discussion and produce a research paper to share with those who attend!*
Todd Carroll, CISO & VP Operations, CybelAngel and Chris Coleman, Principal and Founder, Dominus Group, LLC
With America’s 2020 presidential election just over a month away, many of us can’t help wondering if and to what extent cyber meddling is playing in this year's election.
Tune into this week's thought-provoking discussion: Securing America's Voice: Cybersecurity and the 2020 Election on Thursday, October 8th @ 11 AM EDT, featuring:
*Todd Carroll -- retired FBI cybersecurity executive, currently serving as CybelAngel CISO
*Chris Coleman -- 27-year cybersecurity leader and visionary, current Principal & Founder of Dominus Group
*Hosted by -- Dave Bittner, Producer & Host of The CyberWire
These cybersecurity professionals with their unique federal intelligence and cybersecurity backgrounds will share their thoughts on:
*Cyber threats that could impact the election outcome
*Potential outside influences from other countries or interests
*Ensuring election integrity
Thom Langford, InfoSec veteran, and a panel of guest CISOs
A Seat at the King's Table - CISO Panel, Part 1 of 2
Join us for our upcoming CISO panel as our guests discuss the maturation of the information security within today's organizations. More specifically, the discussion will focus on the CISO's:
-Ability to guide business strategy
-Ability to leverage integral KPIs to claim their seat at the executive strategy table
Our Panel members include:
-Host: Thom Langford, InfoSec veteran and prior CISO at Publicis Groupe
-Panelist: Amahdy Bradley, CISO, Havi
-Panelist: Jayson Dudley, Group CISO, Mazars
-Panelist: Leron Zinatullin, ex-CISO and Author
Part 2 of this series will take part at the end of October, and we'll welcome a new panel of CISO's to share their thoughts and experiences on the discussion topics and research. We look forward to you joining us at both! As a way to say thank you, those who attend both sessions will receive a free autographed copy of “The Psychology of Information Security” authored by one of our panelists, Leron Zinatullin.
*Bonus* Between Part 1 and Part 2 of this event, our host Thom Langford will conduct research pertaining to this topic of discussion and produce a research paper to share with those who attend!*
Todd Carroll, CybelAngel CISO and David Sygula, Sr. Cybersecurity Analyst
Today’s enterprise supply chains include hundreds of third and Nth parties extending across the globe. These complex, third-party ecosystems require digital interconnectivity which equates to cybersecurity risk at each data access point. Enterprises have no direct visibility nor direct control of their sensitive information being leaked throughout their extended supply chain.
Tune in as cybersecurity veterans Todd Carroll and David Sygula of CybelAngel explore:
*Digital risks faced when dealing with third-party ecosystems
*Case study findings of the heavily interconnected Aviation industry
*How to overcome third-party data leaks before they become breaches
Speakers:
Todd Carroll, CISO at CybelAngel
David Sygula, Senior Cybersecurity Analyst, Cybelangel
Camille Charaudeau, Vice President of Produce Strategy at CybelAngel
Losses from data breaches due to third parties, Cloud and IoT devices continue to rise, leaving organizations with damages in the 10’s of millions of dollars. Meanwhile, enterprise cyberattack surfaces continue to expand.
From PII exposed on AWS S3 Buckets to code publicly accessible on GitHub, and facility blueprints sitting on personal NAS drives, uncover how negligence can wreak havoc in organizations.
The good news is you can stop data leaks of your most sensitive data. Detecting and remediating data leaks before they become breaches saves your enterprise from losing customer trust, diminishing your brand, and incurring legal and regulatory penalties.
Walk away from this discussion with real-world solutions for dealing with the digital risks associated with an increasingly more complex and digitalized supply chain.
CybelAngel is a leading digital risk management platform providing enterprises with actionable threat intelligence that enables effective remediation and improved cybersecurity posture.
By leveraging artificial intelligence and proven machine learning capabilities, to monitor, detect and manage digital risk across all layers of the Internet, CybelAngel helps organizations protect their intellectual property, brand, and reputation. Every day, CybelAngel detects data leaks that others don't.
CISO Panel 2: How CISOs can get Cyber Security Woven Into the Business StrategyThom Langford, InfoSec veteran, and a panel of guest CISOs[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]60 mins