Hi [[ session.user.profile.firstName ]]

CISO Panel 2: How CISOs can get Cyber Security Woven Into the Business Strategy

A Seat at the King's Table - CISO Panel, Part 2 of 2

Join us for Part 2 of our CISO panel as our guests continue the conversation around the maturation of the information security within today's organizations.

This session's discussion is a continuation of the conversation in Part 1 of this CISO Panel. We will build off of the questions addressed during and after the Part 1, and dig into the research and analysis performed by Thom between the sessions.

Our Panel members include:
-Host: Thom Langford, InfoSec veteran and prior CISO at Publicis Groupe
-Panelist: Jun Chen, Deputy CISO/SVP Cyber Security of Publicis Groupe
-Panelist: Curt Dalton, Global Leader of Security & Privacy at Protiviti
-Panelist: Guest CISO

Part 1 of this series took place on September 30th - watch on demand here: https://www.brighttalk.com/webcast/18534/439844

During Part 2, we will welcome a new panel of CISO's to share their thoughts and experiences on the discussion topics and research. We look forward to you joining us at both! As a way to say thank you, those who attend both sessions will receive a free autographed copy of “The Psychology of Information Security” authored by one of our panelists, Leron Zinatullin.

*Bonus* Between Part 1 and Part 2 of this event, our host Thom Langford will conduct research pertaining to this topic of discussion and produce a research paper to share with those who attend!*
Recorded Oct 22 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Thom Langford, InfoSec veteran, and a panel of guest CISOs
Presentation preview: CISO Panel 2: How CISOs can get Cyber Security Woven Into the Business Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Secure your External Attack Surface: Transitioning to a Proactive Mindset Jun 15 2021 9:00 am UTC 45 mins
    Johan Norrman, Head of Technology Partnerships at Detectify & Thomas Garnier, Direct of Product at CybelAngel
    From Web Apps to IoT devices and DevOps tools, modern digital assets are the building blocks of today's business success stories. They can easily become the chips in the most robust organizations' armors without the knowledge and timely detection. But with the right tools in the right place, and at the right time, cybersecurity can go from being a weakness to organizational resilience against persistent attacks.

    Shedding light on your internet-facing infrastructure is the first and necessary step to secure your attack surface.

    Join Thomas Garnier, Director of Product at CybelAngel, and Johan Norrman, Head of Technology Partnerships at Detectify to understand how companies like CybelAngel and Detectify help your business prevail against cyber threats.

    In this webinar, you will:
    - Understand the threats caused by shadow IT and unsanctioned digital assets
    - See your digital footprint through the eyes of attackers
    -Spot opportunities to reduce your external attack surface
  • Open Databases Invite Data Breaches Jun 10 2021 10:00 am UTC 34 mins
    Todd Carroll, CISO and David Sygula, Cyber Security Researcher at CybelAngel
    Billions of documents are exiting the enterprise’s perimeter through unsecured databases – exposing confidential and sensitive data. How many of these data leaks belong to your organisation?

    David Sygula, CybelAngel Senior Cybersecurity Analyst and Author shares 2020 research, which exposes the source and extent of unsecured database leaks.

    He is joined by our CISO and retired FBI Cyber/Counterintelligence Deputy who openly shares how to effectively protect your critical data including how to::

    Monitor and protect your data across the entirety of the Internet
    Detect open database vulnerabilities, even those from your third parties
    Sort through the overwhelming false positives...without overwhelming your staff
  • How to Gain Visibility into the Unknown and Accelerate Risk Mitigation Jun 2 2021 3:00 pm UTC 60 mins
    Pia McSharry, VP Sales Engineering at SecurityScorecard & Nate Alden, Cyber Security Sales Engineer at CybelAngel
    Stolen credentials are the primary vector for hackers to access your corporate IT environment and launch ransomware attacks. 80% of hacking techniques leverage stolen or brute-forced credentials. Nearly 60% of businesses have experienced a major data breach caused by a third party. When critical information is breached, your business, brand and reputation are damaged. Organizations can’t wait for these data leaks to turn into major data breaches.

    In order to stay ahead, security and vendor risk management teams need actionable threat intelligence at their fingertips. In this session, SecurityScorecard, CybelAngel & a Customer Speaker will unpack what it means to incorporate security ratings and digital risk protection into your automated risk management program, and give you an inside look into SecurityScorecard’s newest features to incorporate continuous digital risk protection and security ratings into your strategy.

    What we’ll cover:
    How to incorporate security ratings and digital risk protection data into your organization’s risk management strategy.
    What next steps you should take with internal teams and third parties when an event - such as critical vulnerability or leaked information - is detected.
    Learn best practices to do this effectively from a customer speaker
    Give you a sneak peak into the latest features to help you automate security ratings and digital risk protection in one platform.

    This session is best suited for anyone interested in leveraging security ratings along with digital risk data to automate and continuously monitor the cybersecurity posture of their organization and vendors.
  • Prevent vs Pay: A Better Ransomware Plan May 18 2021 10:00 am UTC 38 mins
    Julia Osseland, Product Manager at CybelAngel
    Vulnerable assets are open doors into your infrastructure. That's why ransomware gangs are actively looking for these weak spots. And that's why most organisations have endpoint management protocols in place.

    But did you know that 40% of your organisations IT infrastructure actually exists outside of the central IT's purview? What are the odds of being attacked through those shadow assets?

    In this webinar, you will:

    - Learn how ransomware gangs are scanning your external-facing assets for vulnerabilities

    - Understand the challenges of securing a shadow digital footprint in an open world

    - Get actionable tips to anticipate attacks on shadow IT at scale
  • Protect as You Grow: Digital Risk Protection Made Scalable Recorded: May 11 2021 33 mins
    Julia Osseland, Product Specialist at CybelAngel
    Rome wasn't built in a day, nor is the success of your organization. With CybelAngel, you are assured to keep the optimal coverage as your business scales in a shifting environment.

    Join Product Specialist Julia Osseland to discuss how CybelAngel Digital Risk Protection Platform can help you remain secure through expansions, acquisitions, and new projects.

    In this webinar, you will:
    - Discover how you can adapt your coverage dynamically, adding new perimeters, keywords, users, on the go
    - Understand how CybelAngel Platform allows you to collaborate across teams and business units
    - See how CybelAngel makes your teams' workload manageable through APIs and Connectors
  • Smart Buildings Under Siege: Why CISOs Shouldn't Overlook Physical Security Recorded: Apr 20 2021 38 mins
    Todd Carroll, CISO & Julia Osseland, Product Product Manager at CybelAngel
    Hundreds of guests locked out of their Austrian hotel rooms...

    A blast furnace shut down in a German steel mill...

    All production lines stopped in an American brewery...

    Across all industries, connected buildings are becoming prime targets for cyber-attacks. Hackers are quicker than security leaders to recognize blindspots in intertwined IT/OT/IoT environments relying on third-party providers and outsourced systems.

    By 2023, the financial impact of cyber-physical system attacks as a result of fatal casualties will reach over $50 billion, 10 times higher than 2013 levels of data security breaches. (Source: Gartner, 2020).

    Good news is, your Digital Risk Protection solution can help you secure your operations against malware and ransomware attacks on smart technologies. Join the CybelAngel team to:

    Understand the risk landscape created by the increasing interconnection of IT, operational technology (OT) and building automation system environments.

    Learn how to integrate third-party providers’ techs and outsourced systems into your attack surface management strategy.

    Discover how CybelAngel can help you bridge the gap between physical security and digital risk protection.
  • Data in the Cloud: Prevent Data Breaches from Misconfigured Buckets Recorded: Apr 15 2021 30 mins
    Julia Osseland, Product Specialist at CybelAngel
    Easy, scalable, and robust: cloud storage is a no-brainer for 83% of businesses worldwide who store sensitive information on the cloud (McAfee). Still, you don't get to just deploy your data and go: about a third of organisations have experimented with account compromises (Unit 42 Cloud Security Trends)

    Protecting against data leaks on the Cloud is a priority for you. As your investments in virtual infrastructure grow, so is your concern about the safety of confidential information being stored in, and accessed from, outside of your firewall.

    Join Product Specialist Julia Osseland to discuss how CybelAngel Digital Risk Protection Platform can help prevent costly data breaches by allowing you to keep visibility and control over your most sensitive assets.

    In this webinar, you will:
    - Understand how misconfigured AWS S3, Azure, and GCS buckets make your critical data publicly accessible without you knowing it
    - Prevent exposure from turning into breaches
    - Discover how CybelAngel's Machine Learning capacities make us the fastest to detect exposed cloud assets
  • Plus de 45 mill. de fichiers médicaux en libre accès sur Internet Recorded: Mar 3 2021 51 mins
    David Sygula, Expert Analyste en Cybersécurité, CybelAngel
    Sécurisez les données de vos patients et protégez votre organisation.

    Notre expert en cybersécurité CybelAngel partagera les résultats d'une enquête réalisée pendant 6 mois. Cette recherche révèle que plus de 45 millions de fichiers d'imagerie médicale comprenant des informations personnelles sur les soins de santé, des radiographies et des scanners, sont accessibles publiquement sur des serveurs non sécurisés.

    Participez au webinar pour comprendre :
    - Les enjeux réglementaires liés à la protection des données de santé,
    - Les menaces liées à la fuite de ces données,
    - Comment détecter les fuites de données pour les sécuriser rapidement
  • Prevent vs Pay: A Better Ransomware Plan Recorded: Feb 18 2021 39 mins
    Julia Osseland, Product Specialist
    Vulnerable assets are open doors into your infrastructure. That's why ransomware gangs are actively looking for these weak spots. And that's why most organisations have endpoint management protocols in place.

    But did you know that 40% of your organisations IT infrastructure actually exists outside of the central IT's purview? What are the odds of being attacked through those shadow assets?

    In this webinar, you will:

    - Learn how ransomware gangs are scanning your external-facing assets for vulnerabilities

    - Understand the challenges of securing a shadow digital footprint in an open world

    - Get actionable tips to anticipate attacks on shadow IT at scale
  • Get Ahead of Digital Third-Party Risk Management in 2021 Recorded: Feb 4 2021 38 mins
    Camille Charaudeau, VP Product Strategy, CybelAngel, Drew Wilkinson, VP Professional Services, SecurityScorecard
    2020 was the year that third-party risk management was put under a microscope. How will this change third-party risk management in the year to come?

    Tune in to our fireside chat with industry leaders from SecurityScorecard and CybelAngel as they discuss their top 5 predictions for Third-Party Risk Management in 2021, and how to stay ahead of the risks!

    Speakers:
    ● Drew Wilkinson, VP Professional Services and Customer Success at SecurityScorecard
    ● Camille Charaudeau, VP Marketing & Product Strategy at CybelAngel
  • How to Manage Your Third-Party Risk Recorded: Jan 6 2021 40 mins
    Tom Field, SVP of Editorial at ISMG, Todd Carroll, CISO at CybelAngel, Maxime Boquet, Product Manager at CybelAngel
    While exchanging information with organizations is the lifeblood of business, once data leaves the perimeter of your enterprise, it takes its own journey through your third parties and their suppliers, and so on.

    Join CybelAngel and ISMG host Tom Field on Wednesday, January 6th at 10 AM EST for our upcoming webinar: How to Manage Your Third-Party Risk.

    During this discussion, you'll hear from CybelAngel's CISO, Todd Carroll, and Product Manager, Maxime Boquet, and walk away with valuable insight on:
    *Real-world statistics, examples, and costs of third-party leaks
    *3 keys to mitigating your third-party risk
  • Consequences of Connectedness: Easy for you and Attackers Recorded: Nov 12 2020 42 mins
    Todd Carroll, CybelAngel CISO - Howard Marshall, Managing Director @ Accenture Security - Dave Bittner, Host @ The CyberWire
    The acceleration of digital transformation and the proliferation of connected devices has no doubt left the workforce more connected than ever. However the trade off of this convenient connectedness comes in the form of exponentially increased threat surfaces and vulnerabilities.

    Tune into our thought leadership discussion on the consequences of being wildly connected on Thursday, November 12th @ 10 AM EST, featuring:
    *Todd Carroll -- retired FBI cybersecurity executive, CISO at CybelAngel
    *Howard Marshall -- retired FBI cybersecurity executive, Managing Director at Accenture Security
    *Hosted by -- Dave Bittner, Producer & Host of The CyberWire

    These cybersecurity professionals with their unique federal intelligence and cyber backgrounds will share their thoughts on:
    *The consequences of a connected enterprise
    *The sophisticated attacks of today's cyber criminals
    *The evolution of cyber attacks
  • CybelAngel & OpenMinded: Comment augmenter les capacités de votre SOC Recorded: Oct 28 2020 40 mins
    Mayeul Berger Senior Analyst / Cyber Partnerships Manager et Christophe Longuepez Head of offensive and defensive activities
    Superviser sa Cybersécurité jusqu'aux limites de l´entreprise et de son système d´information est aujourd´hui devenu insuffisant.
    Venez découvrir comment y ajouter de nouveaux périmètres tels que le Deep/DarkNet, les DNS publics ou encore les bases de données non sécurisées en toute simplicité et sans surcharger vos équipes opérationnelles.
  • CISO Panel 2: How CISOs can get Cyber Security Woven Into the Business Strategy Recorded: Oct 22 2020 61 mins
    Thom Langford, InfoSec veteran, and a panel of guest CISOs
    A Seat at the King's Table - CISO Panel, Part 2 of 2

    Join us for Part 2 of our CISO panel as our guests continue the conversation around the maturation of the information security within today's organizations.

    This session's discussion is a continuation of the conversation in Part 1 of this CISO Panel. We will build off of the questions addressed during and after the Part 1, and dig into the research and analysis performed by Thom between the sessions.

    Our Panel members include:
    -Host: Thom Langford, InfoSec veteran and prior CISO at Publicis Groupe
    -Panelist: Jun Chen, Deputy CISO/SVP Cyber Security of Publicis Groupe
    -Panelist: Curt Dalton, Global Leader of Security & Privacy at Protiviti
    -Panelist: Guest CISO

    Part 1 of this series took place on September 30th - watch on demand here: https://www.brighttalk.com/webcast/18534/439844

    During Part 2, we will welcome a new panel of CISO's to share their thoughts and experiences on the discussion topics and research. We look forward to you joining us at both! As a way to say thank you, those who attend both sessions will receive a free autographed copy of “The Psychology of Information Security” authored by one of our panelists, Leron Zinatullin.

    *Bonus* Between Part 1 and Part 2 of this event, our host Thom Langford will conduct research pertaining to this topic of discussion and produce a research paper to share with those who attend!*
  • Securing America's Voice: Cybersecurity and the 2020 Election Recorded: Oct 8 2020 41 mins
    Todd Carroll, CISO & VP Operations, CybelAngel and Chris Coleman, Principal and Founder, Dominus Group, LLC
    With America’s 2020 presidential election just over a month away, many of us can’t help wondering if and to what extent cyber meddling is playing in this year's election.

    Tune into this week's thought-provoking discussion: Securing America's Voice: Cybersecurity and the 2020 Election on Thursday, October 8th @ 11 AM EDT, featuring:
    *Todd Carroll -- retired FBI cybersecurity executive, currently serving as CybelAngel CISO
    *Chris Coleman -- 27-year cybersecurity leader and visionary, current Principal & Founder of Dominus Group
    *Hosted by -- Dave Bittner, Producer & Host of The CyberWire

    These cybersecurity professionals with their unique federal intelligence and cybersecurity backgrounds will share their thoughts on:
    *Cyber threats that could impact the election outcome
    *Potential outside influences from other countries or interests
    *Ensuring election integrity
  • CISO Panel: How CISOs can get Cyber Security Woven into the Business Strategy Recorded: Sep 30 2020 58 mins
    Thom Langford, InfoSec veteran, and a panel of guest CISOs
    A Seat at the King's Table - CISO Panel, Part 1 of 2

    Join us for our upcoming CISO panel as our guests discuss the maturation of the information security within today's organizations. More specifically, the discussion will focus on the CISO's:
    -Ability to guide business strategy
    -Ability to leverage integral KPIs to claim their seat at the executive strategy table

    Our Panel members include:
    -Host: Thom Langford, InfoSec veteran and prior CISO at Publicis Groupe
    -Panelist: Amahdy Bradley, CISO, Havi
    -Panelist: Jayson Dudley, Group CISO, Mazars
    -Panelist: Leron Zinatullin, ex-CISO and Author

    Part 2 of this series will take part at the end of October, and we'll welcome a new panel of CISO's to share their thoughts and experiences on the discussion topics and research. We look forward to you joining us at both! As a way to say thank you, those who attend both sessions will receive a free autographed copy of “The Psychology of Information Security” authored by one of our panelists, Leron Zinatullin.

    *Bonus* Between Part 1 and Part 2 of this event, our host Thom Langford will conduct research pertaining to this topic of discussion and produce a research paper to share with those who attend!*
  • Stop Data Breaches in Your Third-Party Ecosystem Recorded: Sep 24 2020 31 mins
    Todd Carroll, CybelAngel CISO and David Sygula, Sr. Cybersecurity Analyst
    Today’s enterprise supply chains include hundreds of third and Nth parties extending across the globe. These complex, third-party ecosystems require digital interconnectivity which equates to cybersecurity risk at each data access point. Enterprises have no direct visibility nor direct control of their sensitive information being leaked throughout their extended supply chain.

    Tune in as cybersecurity veterans Todd Carroll and David Sygula of CybelAngel explore:

    *Digital risks faced when dealing with third-party ecosystems
    *Case study findings of the heavily interconnected Aviation industry
    *How to overcome third-party data leaks before they become breaches

    Speakers:
    Todd Carroll, CISO at CybelAngel
    David Sygula, Senior Cybersecurity Analyst, Cybelangel
  • Break the Data Breach Cycle Recorded: Jul 21 2020 38 mins
    Camille Charaudeau, Vice President of Produce Strategy at CybelAngel
    Losses from data breaches due to third parties, Cloud and IoT devices continue to rise, leaving organizations with damages in the 10’s of millions of dollars. Meanwhile, enterprise cyberattack surfaces continue to expand.

    From PII exposed on AWS S3 Buckets to code publicly accessible on GitHub, and facility blueprints sitting on personal NAS drives, uncover how negligence can wreak havoc in organizations.

    The good news is you can stop data leaks of your most sensitive data. Detecting and remediating data leaks before they become breaches saves your enterprise from losing customer trust, diminishing your brand, and incurring legal and regulatory penalties.

    Walk away from this discussion with real-world solutions for dealing with the digital risks associated with an increasingly more complex and digitalized supply chain.
Data leaks are inevitable. Damage is optional.
CybelAngel is a leading digital risk management platform providing enterprises with actionable threat intelligence that enables effective remediation and improved cybersecurity posture.

By leveraging artificial intelligence and proven machine learning capabilities, to monitor, detect and manage digital risk across all layers of the Internet, CybelAngel helps organizations protect their intellectual property, brand, and reputation. Every day, CybelAngel detects data leaks that others don't.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CISO Panel 2: How CISOs can get Cyber Security Woven Into the Business Strategy
  • Live at: Oct 22 2020 1:00 pm
  • Presented by: Thom Langford, InfoSec veteran, and a panel of guest CISOs
  • From:
Your email has been sent.
or close