Hi [[ session.user.profile.firstName ]]

Top 5: Vulnerabilities Below Your Radar

Peter Wood, CEO of First Base Technologies, breaks down his Top 5 vulnerabilities that are flying below your radar.
Recorded Feb 10 2016 8 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Wood, CEO, First Base Technologies LLP
Presentation preview: Top 5: Vulnerabilities Below Your Radar

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • CIS Foundations Benchmark for Microsoft Azure Apr 26 2018 9:00 pm UTC 60 mins
    Jordan Rakoske (CIS) | Jonathan Trull (Microsoft) | Gururaj Pandurangi (Cloudneeti, Avyan Corp)
    Recently the Center for Internet Security (CIS) published the CIS Azure Foundations Benchmark, the first ever set of security configuration best practices for Microsoft Azure.

    These industry-accepted best practices go beyond the high-level security guidance already available by providing Microsoft Azure customers with clear, step-by-step implementation and assessment procedures.

    In this webcast, attendees will learn:
    · Who is CIS? How the CIS Benchmarks remove guesswork for security professionals?
    · What is CIS Azure Foundations Benchmark? Why Azure decided to use CIS Foundations Benchmark?
    · How audit teams can consistently evaluate the security of Azure Subscriptions, reducing complexity in managing risk when using Azure for critical, regulated systems
    · How these security checks can be seamlessly integrated into an organization’s security and audit ecosystem with an array of security tools and solutions.

    CIS Benchmarks have been the de facto standard for prescriptive, industry-accepted best practices for securely configuring traditional IT components. The release of the CIS Azure Foundations Benchmark into this existing ecosystem marks one of many milestones for the maturation of the cloud and its suitability for sensitive and regulated workloads.

    Panelists:
    · Jordan Rakoske, Senior Technical Product Manager, Center for Internet Security (CIS)
    · Jonathan Trull, Senior Director for Cybersecurity, Microsoft
    · Gururaj Pandurangi, CEO and Founder, Cloudneeti and Avyan Corp
  • Endpoint Security: The Right Balance Between Positive and Negative Approaches Apr 26 2018 7:00 pm UTC 60 mins
    Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga
    Endpoint security represents the frontline in your fight against cybercriminals. Despite the relative maturity of the endpoint security market, new threats and evolving attacker capabilities have proven traditional approaches inadequate - and left organizations exposed.

    Guest speaker Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga will discuss the current state of endpoint security while highlighting a path forward for organizations looking to re-focus their strategies to combat current threats.

    Attendees will learn:

    • Which threats are causing the most difficulties for traditional
    endpoint security approaches
    • Why organizations need to balance positive and negative security
    approaches
    •How to layer multiple tools for maximum protection
  • The Board's Role in Balancing Risk & Reward Apr 26 2018 11:00 am UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    Cyber has become a strategic issue and for many companies is now a business enabler and increasingly a form of competitive advantage. However it is clear that it remains difficult for Board's to get the “right” management information to support their cyber risk discussions and decision making.

    So how can Board's ensure that they are asking the right questions when it comes to an organisation’s cyber posture and how can CISOs maintain and improve the Board’s attention in this fast-moving space? This webinar will look at the challenges faced by CISOs and Board members and offer insights into how to successfully approach cyber security at Board level.

    About the presenter:
    Steve Durbin is Managing Director at the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • The hackers are winning: Deploy your secret weapon Apr 26 2018 10:00 am UTC 45 mins
    Rob Shapland, Principal Cyber Security Consultant, First Base Technologies
    How to make your staff your first and last line of defence.

    Learn how to:
    •Identify your enemy and their tactics
    •Discover why technological defences will lose to hackers
    •Learn how to make staff genuinely care about security

    About Rob Shapland BSc (Hons) OSCP OSWP CRT Principal Cyber Security Consultant, First Base Technologies

    Rob Shapland is an ethical hacker with 9 years’ experience conducting penetration tests for hundreds of organisations, from small businesses to major international organisations.
    He specialises in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
    He is also a regular speaker at events and conferences around Europe, and has appeared on both BBC and ITV as a cyber security adviser. He holds qualifications from SANS, Offensive Security and CREST, and has been trained in social engineering techniques by Chris Hadnagy, one of the world's leading practitioners and researchers.
  • Reducing the Cost of a Breach with SD-WAN Apr 25 2018 9:00 pm UTC 45 mins
    Jack Miller, CISO & Martin Bosshardt, CEO of Open Systems
    This webinar will provide an in-depth review of how software-defined wide-area network or SD-WAN can be used to:
    - Improve your cyber security posture and reduce the chances of a breach
    - Decrease your detection time to reduce the hackers time in your network and reduce response costs
    - Use dynamic segmentation to prevent the spread of a breach, thus reducing financial impact

    About the Presenters

    Jack Miller, CISO, Open Systems

    Jack Miller is a well know cybersecurity veteran with over 16 years of CISO experience at 4 multi-billion dollar organizations. He currently serves as the Chief Information Security Officer for Open Systems, Switzerland’s largest Secure SDWAN and Cloud delivered Security-As-A-Service solution provider.

    Martin Bosshardt, CEO, Open Systems

    Martin Bosshardt has been CEO of Open Systems AG since 2002. Martin Bosshardt studied at the ETH in Zurich and Todai University in Tokyo. He has a master's degree in electrical engineering from the Swiss Federal Institute of Technology (ETH). In 2011, Martin Bosshardt was awarded with the SVC Entrepreneurs Award. Since 2013, he has been a member of the Advisory Board of PwC Switzerland.
  • Small Business, Big Cyber Risk Apr 25 2018 5:00 pm UTC 45 mins
    Mike Ward, Co-founder and CEO of Turtle Creek Concepts
    Small businesses are the low-hanging fruit of the cybercrime world. Operating a small business is tough work and requires the small business owner to be skilled in many areas of business, finance, tech, customer service, sales, fulfillment, and so on. Cybersecurity is only a part of what SMB owners needs to know about in order to successfully run their business. However, the cybersecurity portion is often overlooked. As hackers and attackers are looking for people to scam and steal from, they look for the easiest targets first.

    In this webinar, audiences will learn more about:
    - The risks and real costs of ignoring your data security
    - How it can cause you to go out of business
    - Simple steps to take immediately to help improve your security

    Be sure that you have a good grip on understanding what you need to do when it comes to protecting your small business from these threats.

    And as an added bonus, you'll receive some valuable resources that you'll be able to use in the future as you discover, plan, and implement new security strategies in your own small business. Be #SmallBizCyber smart about your small business!
  • Economy of Effort in Cyber Defense: Spend Less Better Apr 25 2018 2:00 pm UTC 60 mins
    Griff James, Director, Damrod Analysis
    You probably spend enough on cyber security. Leadership and analysis can achieve more than additional spending.

    Technology and services will continue to improve and evolve, but the total spend by companies does not need to grow to counter new threats. Damrod provides an analytical toolkit based on military principles to understand, assess, and defend against cyber-attack.

    This presentation focuses on treating cyber as conflict and countering an attacker through better tactics to achieve a better defense.

    About the Speaker:
    Griff is trained as a Canadian Infantry Officer and is a holds a Master’s Degree from the LSE. Unable to find “real” work, he got into software development as a Scrum Master, leading the development of a web based application. This experience fostered an interest in cybersecurity, and Griff went on to a boutique start-up providing application security to Fortune 500 companies. Frustrated by the disconnect between technologies and poor analysis within cyber security, Griff founded cyber defense firm Damrod Analysis in 2017.
  • [Panel] Building Effective Cyber Defense Apr 25 2018 12:00 pm UTC 60 mins
    Amar Singh (Cyber Management Alliance) | Simon Moor (FireEye) | Bob Honour (SonicWall)
    With data breaches on the rise, enterprises worldwide are looking to implement better technologies and processes for faster breach detection and response, as well as train all employees to be cyber aware.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Why breach prevention matters
    - True costs of breaches
    - Technological solutions to consider for a more cyber resilient enterprise
    - How AI/machine learning and human talent can work together
    - Top threats to look out for in 2018

    Speakers:
    - Amar Singh, CEO & Founder, Wisdom of Crowds, Cyber Management Alliance
    - Simon Moor, VP for Northern Europe, FireEye
    - Bob Honour, EMEA Marketing Director, SonicWall
  • An Ethical Hackers Guide to Cybersecurity - It's All About The Price Tag Baby! Apr 25 2018 10:00 am UTC 45 mins
    Zoë Rose, Ethical Hacker, Baringa Partners
    As an experienced Ethical Hacker I have worked on both the offensive and the defensive side of cybersecurity to help my clients become more resilient to cyber attack. I have designed and executed various simulated attacks, and incident response exercises based on feasible scenarios and from actual experiences in helping clients respond to data breaches. The one question, asked consistently throughout much of my career has been: “how much does it cost?”

    We see in the media, organisations who’ve suffered a breach costing thousands, millions, even hundreds of millions – but where do these values come from?

    In this session, I will walk you through the true cost of a data breach, including the hidden costs which you may not realise until an incident occurs.
  • Creating a Cybersecurity Culture Live 60 mins
    Heather Stratford, CEO of Stronger.tech
    For the last 2 decades, technology security was delegated to the IT team. It was role specific and designated for one small subsection of the IT team. That mentality and way of thinking must change.

    A paradigm shift is required for the whole organization. Every part of the organization contributes to the success or failure of the organization. Creating a security culture is not a one-time event, it is a new way of talking and acting.

    Join this webinar with Heather Stratford, CEO of Stronger.tech to:
    - Understand the steps that need to happen to create this culture
    - See where your organization is on the scale of creating a Strong Security Culture
    - Learn why creating a security-minded culture is an essential part of the "new" requirements for a CIO.
  • [Earn 1 CPE] GDPR Compliance MasterClass Recorded: Apr 24 2018 73 mins
    Rebecca Herold, Moderator; John McLeod, AlienVault; Mark McGlenn, Absolute; Brian Philbrook, OneTrust; Jake Olcott, BitSight.
    The GDPR is the most significant change in data privacy regulation in more than 20 years. It comes into force on 25 May 2018 and will impact all businesses that process personal data or businesses that process personal data of EU citizens even if they are not in the EU. Obligations for compliance will affect both controller and processors and regulators will get increased enforcement powers and the right to impose fines of up to 4% of global turnover for both data breaches and infringements of the law.

    Attend this CPE accredited educational webinar with our panel of experts to learn what you need to know about the GDPR and how to remain compliant.

    Learning Objectives:

    - Learn how to prepare for GDPR implementation
    - Identify the real life challenges of compliance
    - Learn about prioritizing plans and actions to effectively prepare for data protection
    - Discover some of the benefits, approaches, and tools to comply with the GDPR
  • [Webcam Panel] CISO Strategy & the Boardroom Recorded: Apr 24 2018 59 mins
    Dr. Christopher Pierson (Binary Sun) | Ben Johnson (Obsidian) | Deidre Diamond (CyberSN)
    Having a strong buy-in from the highest level of executive leadership in your organization is a key factor for a successful implementation of your CISO strategy. With high-profile breaches on the rise and a company's reputation at stake, cybersecurity is a top-of-mind issue for CISOs.

    Join this interactive Q&A panel to learn more about:
    - Key factors for building a successful CISO strategy
    - Selling your security strategy to the Board
    - Why your Board should be up to date on cybersecurity
    - Top threats to look out for in 2018

    Speakers:
    - Ben Johnson, CTO of Obsidian Security
    - Deidre Diamond, Founder and CEO, CyberSN
    - Dr. Christopher Pierson, CEO of Binary Sun Cyber Risk Advisors
  • [CPE Credit Panel] Emerging Threats & Cyber Defense Recorded: Apr 18 2018 52 mins
    Chris Roberts (Acalvio) | Nick Bilogorskiy (Juniper Networks) | Dan Lohrmann (Security Mentor) | Joseph Carson (Thycotic)
    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². Tune in for an in-depth look into the evolving cyber threat landscape with CISOs and top security experts. The panel will examine the latest cyber attack trends and provide recommendations for defending enterprises and SMBs.

    Join top cyber security experts for an interactive Q&A roundtable discussion on the biggest threats targeting organizations in 2018:
    - Lessons from recent cyber attacks and breaches
    - What keeps CISOs up at night
    - Biggest cyber security challenges and how to overcome them

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Nick Bilogorskiy, Cybersecurity Strategist, Juniper Networks
    - Dan Lohrmann, Chief Strategist & Chief Security Officer, Security Mentor
    - Joseph Carson, Chief Security Scientist, Thycotic

    The session is being brought to you in partnership with ITSPmagazine and will be streamed LIVE from San Francisco during RSAC week.
  • [CPE Credit Panel] Beyond the Breach Recorded: Apr 18 2018 53 mins
    Sean Martin (ITSPmagazine) | Robert M. Lee (Dragos) | Dr. Bret Fund (SecureSet) | Bernard Harguindeguy (Elastic Beam)
    Massive data breaches are becoming more frequent. Personal customer data is often exposed to hackers, leaving companies and individuals to deal with the aftermath. What is the real cost of a breach and how can we prevent, detect and respond to breaches? What are some of the things to do post-breach to prevent future cyber attacks?

    Join security, risk and privacy experts for an interactive Q&A discussion on:
    - True cost of a breach
    - Preventing breaches with solutions, processes and employee training
    - How to detect attacks and breaches faster
    - Appropriate response to a breach
    - Post-breach attacks: Phishing, cyber fraud, account takeovers, cyber crime
    - Recommendations for improved security in 2018

    Speakers:
    - Sean Martin, Editor-in-Chief, ITSPmagazine
    - Robert M. Lee, CEO, Dragos
    - Dr. Bret Fund, CEO of SecureSet
    - Bernard Harguindeguy, Founder & CEO, Elastic Beam

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². This panel will be streamed LIVE from San Francisco during RSAC week.
  • [CPE Credit Panel] GDPR, Identity & Cybersecurity Recorded: Apr 17 2018 54 mins
    Jeff Carpenter (Crossmatch) | Chris Pierson (Binary Sun Cyber) | Alex Horan (Onapsis) | Elena Elkina (Aleada)
    The General Data Protection Regulation (GDPR) is a European Union law, but it's going to impact businesses beyond the EU. Basically, any business that collects and processes personal data of EU individuals will need to achieve GDPR compliance by deadline day, May 25th, 2018.

    What are the privacy & security requirements for being GDPR compliant? -
    - Why we should think beyond GDPR when it comes to improving data security?
    - Are you compliant / ready when GDPR goes into effect next month?
    - What are some last-minute items to complete before the GDPR deadline?

    Join top experts for this interactive Q&A roundtable, streamed LIVE during RSAC week, as they discuss the implication of GDPR on managing digital identity, customer data, privacy and cyber security.

    Speakers:
    - Dr. Christopher Pierson, CEO, Binary Sun Cyber Risk Advisors
    - Jeff Carpenter, CISSP, CCSP, Crossmatch
    - Alex Horan, Director of Product Management, Onapsis
    - Elena Elkina, Partner, Aleada Consulting

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)².
  • [CPE Credit Panel] AI & Machine Learning in Cybersecurity Recorded: Apr 17 2018 53 mins
    Diana Kelley (Microsoft) | Mary Writz (Micro Focus) | Chris Morales (Vectra Networks) | Barbara Kay (ExtraHop)
    Artificial intelligence and machine learning can power cyber attacks and disrupt the operations of organizations on a global level. ML can also help organizations detect and analyze threats faster, as well as respond to attacks and security incidents. What are the latest advancements in AL & ML? How can we incorporate ML to improve our security posture and better protect our data?

    Join security experts, researchers and practitioners for an interactive Q&A roundtable discussion. Viewers will learn more about:
    - The latest AI/ML trends and applications in cyber security
    - ML tasks for better security
    - Threats, detection & response
    - Hype vs. reality
    - Recommendations for CISOs

    Speakers:
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - Mary Writz, Director of Product Management, ArcSight, Micro Focus
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Barbara Kay, Sr. Director of Security, ExtraHop

    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². This panel will be streamed LIVE from San Francisco during RSAC week.
  • [CPE Credit Panel] Securing the Cloud in 2018 Recorded: Apr 16 2018 52 mins
    Sian John (Microsoft) | Mark Weatherford (vArmour) | Dan Hubbard (Lacework) | Lisa Green (ISE)
    This is a CPE credit session in partnership with ITSPmagazine and (ISC)². Tune in for an in-depth look into how enterprises are ensuring a safe migration to the cloud, protecting our data and processes in the cloud, as well as staying up to date on the latest cyber threats.

    Join top cloud and security experts for this interactive Q&A discussion on:
    - The top cloud trends in 2018
    - Top threats to security
    - How to better safeguard our data in the cloud

    Speakers:
    - Sian John, Chief Security Advisor, Microsoft
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Dan Hubbard, Chief Security Architect, Lacework
    - Lisa Green, Director People Relations, Independent Security Evaluators

    The session is brought to you in partnership with ITSPmagazine and will be streamed LIVE from San Francisco during RSAC week.
  • [Webcam Panel] What to Expect at RSAC 2018 Recorded: Apr 11 2018 64 mins
    Jay Beale (InGuardians) | Bernard Harguindeguy (Elastic Beam) | John Bambenek (ThreatSTOP)
    Join this panel of industry experts as they share their experiences and thoughts on one of biggest security conferences in the world, RSAC in San Francisco, along with their expectations from this year's event.

    Tune in for an interactive Q&A panel to learn more about:
    - What can we expect to learn during RSAC week
    - What's new on the cyber threat horizon
    - Biggest trends shaping cyber security in 2018
    - How to better secure our data in the age of attacks

    Speakers:
    - Jay Beale, Co-founder, COO and CTO of InGuardians
    - Bernard Harguindeguy, Founder & CEO, Elastic Beam
    - John Bambenek, VP Security Research and Intelligence, ThreatSTOP
  • How to Secure GitHub with Automated Threat Detection Recorded: Apr 11 2018 51 mins
    Kumar Saurabh, CEO and Co-founder, LogicHub
    Your developers love managing their source code in GitHub. Whether this is crucial Intellectual Property, or critical applications that run your business, how do you ensure this source code isn’t being accessed by unauthorized actors?

    Introducing ThreatGPS for GitHub, a breakthrough in threat detection automation that starts providing a high quality alert feed in just a few clicks.

    Join this webinar to learn how you can easily automate threat detection for all GitHub repositories.

    We will cover the following:
    * Potential data leaks with GitHub, what to watch out for
    * Gaining 360 degree view of all GitHub audit events
    * Automating suspicious pattern detection
    * Finding repos left open to public by mistake
    * Creating automation that learns and improves over time

    This webinar will be led by Kumar Saurabh, CEO and Co-founder of LogicHub.
  • Why CISO's Get Fired Recorded: Apr 5 2018 23 mins
    Douglas Bayne, Rosario Mastrogiacomo and Bill Noonan
    This live webinar covers the most important things you need to know about the data, systems and assets that are living in your organization’s environment. Three of our industry experts: Douglas Bayne, Bill Noonan and Rosario Mastrogiacomo will be discussing the importance of knowing what’s in your environment and how to protect your most sensitive information. Specifically, they will be discussing:

    • How to gain visibility into your environment
    • Data security
    • The problems people have with unstructured data
    • Mishandling of data
    • Open access and much more!

    About the presenters:

    Douglas Bayne:

    Doug Bayne is the Director of Professional Services at SPHERE Technology Solutions. Doug is an industry expert with over 25 years of experience solving challenging business problems with re-engineering and technology across the Data Governance, E-Communications & Surveillance, and Identity & Access Management domains. Doug is a thought-leader and innovator with a deep understanding of technology, security and compliance. Doug brings his years of expertise to SPHERE by managing our services organization that delivers on the solutions that our clients depend on to solve their risk and mitigation needs.

    Rosario Mastrogiacomo:

    Rosario Mastrogiacomo is the Director of Architecture and Design at SPHERE Technology Solutions. Rosario is an experienced technology executive and industry leader with over 25 years of experience working in the financial services industry. At SPHERE, Mastrogiacomo is responsible for the strategy of SPHERE’s suite of solutions including SPHEREengine, and SPHEREboard.

    Bill Noonan:

    Bill Noonan is a Senior Director at SPHERE Technology Solutions and oversees Sales, Marketing and Business Development. As an experienced Executive and industry leader who is well-known throughout the business world, Noonan brings over 30 years of experience and expertise in a variety of disciplines, and has a huge list of accomplishments – and stories!
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top 5: Vulnerabilities Below Your Radar
  • Live at: Feb 10 2016 11:00 am
  • Presented by: Peter Wood, CEO, First Base Technologies LLP
  • From:
Your email has been sent.
or close