Hi [[ session.user.profile.firstName ]]

Top 5 Ways Next-Generation Masking is Changing How Businesses Prevent Breach

Data Masking Is Changing How Businesses Prevent Data Breach
With data breaches on the rise, businesses are heavily investing in solutions to safeguard sensitive data. However, businesses too often fail to secure confidential information in environments used for development, testing, training, and analytics. These so-called non-production environments can represent over 80% of the surface area of risk for breach. Data masking has emerged as the de facto standard for protecting these environments from insider and outsider threats alike. Masking replaces sensitive data with fictitious yet realistic data, preserving its value for non-production use while completely eliminating the risk of breach. Moreover, a new generation of solutions couples data masking with advanced virtualization technology to secure and deliver data -- without the slowdown caused by traditional methods.
Register and discover:

The key reasons why next-generation data masking reduces risk of breach
How masking compares to other security approaches such as encryption
Why next-generation masking is essential for businesses that must comply with HIPAA, PCI DSS, and SOX
Recorded Jun 14 2016 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matthew Yeh, Delphix, Product Marketing & Olivia Zhu, Delphix, Business Technology Consultant
Presentation preview: Top 5 Ways Next-Generation Masking is Changing How Businesses Prevent Breach

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Era of Ransomware and Cyber Extortion Sep 27 2017 9:00 pm UTC 60 mins
    Ondrej Krehel, CEO and Founder, LIFARS
    Cyber extortion has reached new proportions, including ransomware attacks such as WannaCry in May 2017, and SamSam affecting major hospitals in 2016.

    Considering the payoff, cybersecurity experts expect these attacks to only increase. This model of extortion attacks is affecting everyone, and it is only going to become more popular as hackers gain access to affordable “Ransomware-as-a-Service” tools to aid their cause.

    CEOs are major targets, as they manage extremely sensitive data that can have a real impact on everything from future corporate strategy to public stock performance.

    Join this interactive webinar and learn more about the tools and strategies needed for elevating your cyber resilience.

    About the Presenter:
    Ondrej Krehel is the CEO and Founder of LIFARS LLC, an international cybersecurity and digital forensics firm. He’s the former Chief Information Security Officer of Identity Theft 911, the nation’s premier identity theft recovery and data breach management service. He previously conducted forensics investigations and managed the cyber security department at Stroz Friedberg and the Loews Corporation. With two decades of experience in computer security and digital forensics, he has launched investigations into a broad range of IT security matters—from hacker attacks to data breaches to intellectual property theft.
  • [Panel] Protecting Data in the Age of Ransomware Sep 27 2017 12:00 pm UTC 60 mins
    Josh Downs, BrightTALK; David Cook, Eversheds Sutherland; Jonathan Wright, Commvault & Jason Kent, AsTech Consulting
    - Protecting Data in the Age of Ransomware -

    2017 was a bumper year for Ransomware; with WannaCry & notPetya grabbing headlines around the world and instilling fear in the hearts of security professionals around the globe.

    With GDPR regulations on the horizon and potentially huge fines for badly protected and breached data, security professionals need to improve their defensive stature and ensure that their organisation's data is fully protected from end to end.

    This roundtable discussion will discuss how to best protect your data so if it falls into the wrong hands, you won't end up on the front of the worlds' papers!

    Topics for discussion:

    - Why ransomware should still be top of your list of concerns in 2018

    - Methods to protect your organisation's sensitive data

    - Steps to take if your organisation does suffer a damaging breach
  • Ransomware: Executive Talking Points Sep 26 2017 9:00 pm UTC 60 mins
    Ed Moyle, Director of Thought Leadership and Research, ISACA
    Ask any security practitioner and they’ll tell you that ransomware is on the rise. Recent high-profile events like Petya, WannaCry, and others have captured media attention both the trade and mainstream press and, by extension, have captured executive attention at the highest levels of organizations.

    High profile events like these create havoc in the short term, but in the long term may actually help to foster security improvements provided that security teams are prepared to leverage them when they occur. Specifically, by preparing in advance “talking points” for situations like these, and by channeling executive interest and visibility when they occur, security practitioners can help make progress in areas that are normally challenging. For example, by securing budget to address known problem areas, prioritizing and gaining visibility for known risks, or by securing additional personnel to address skill shortages. The key to doing this is in the planning.

    This session will focus on the talking points; both specific talking points arising from these events that practitioners can tailor for their situation as well as how they can prepare talking points for future situations should they arise.
  • Defending Against Ransomware in 2017 Sep 26 2017 5:00 pm UTC 60 mins
    John Bambenek (Fidelis Cybersecurity), Masha Sedova (Elevate Security), Jay Beale (InGuardians)
    Hacking and malware attacks, including ransomware attacks, are a major cause of breaches in 2017. With high-profile ransomware attacks on the rise, enterprises and small businesses worldwide are looking to better secure their data from cyber criminals and more nefarious attackers.

    Join this interactive Q&A session with security experts across industries to learn more about:
    - What can we learn from Wannacry, NotPetya and other ransomware attacks seen in 2017
    - Financial motivation or disruption
    - Who is at risk of a ransomware attack
    - What to do before, during, and after a ransomware attack
    - How can we better protect our businesses, organizations, governments and infrastructure from cyber attacks
    - Urgent steps to take today

    Moderator:
    - Jay Beale, CTO & COO of InGuardians

    Speakers:
    - John Bambenek, Threat Systems Manager, Fidelis Cybersecurity
    - Masha Sedova, Co-founder of Elevate Security
  • Psychological Mechanisms Used in Ransomware Splash Screens Sep 26 2017 3:00 pm UTC 45 mins
    Jeremiah Grossman, Chief of Security Strategy at SentinelOne
    SentinelOne recently released a report with De Montfort University to examines the differing levels of sophistication on the part of the attackers and trends and tactics use to commission a payment from organizations.

    Join this session as we discuss the common trends highlighted in the report including:
    - Time criticality and deadline sensitivity
    - Consequences for not paying or missing the demand
    - The Customer Service Approach on how to pay the ransom
    - The use of a variety of imagery
    - Preferred mechanism for payment

    About the presenter:
    Jeremiah’s InfoSec career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry’s biggest names. At SentinelOne, Jeremiah is responsible for designing effective defense strategies against ever-evolving attacks including ransomware. Prior to joining, Jeremiah was the Founder & CEO of WhiteHat Security, specializing in website risk management.
  • Beyond the Equifax Breach - Lessons and Actions to Take Recorded: Sep 22 2017 64 mins
    Dr. Chris Pierson (Viewpost), Sarah Squire (Engage Identity), Debra Farber (The Privacy Pact), Dr. Ravi Rajamiyer (Cavirin)
    The recent Equifax data breach, which may have jeopardized the personal information of 143 million U.S. consumers, will likely haunt us for years to come.

    Join this interactive panel with experts from the cyber security, identity and privacy space to learn more about:
    - What we know occurred or is likely to have occurred
    - Data Breach Timeline - too slow or too fast
    - External communications - how has the breach been handled and communicated
    - Internal Actions - security remediation, work with law enforcement, root cause, incident response
    - External forces - lawsuits, media scrutiny, and customer communications

    Speakers:
    - Dr. Christopher Pierson, CSO, Viewpost
    - Sarah Squire, Founder and Principal Consultant, Engage Identity
    - Dr. Ravi Rajamiyer, VP of Engineering, Cavirin
    - Debra J. Farber Executive Privacy & Security Consultant, Cranium USA & Host of "The Privacy Pact," ITSPmagazine
  • Equifax Hack and Improving Data Protection Recorded: Sep 21 2017 61 mins
    Satya Gupta (Virsec Systems), Shawn Burke (SungardAS), Vamshi Sriperumbudur (CipherCloud), William Leichter (Virsec)
    In the aftermath of the Equifax data breach, both consumers and enterprises are scrambling for ways to minimize the impact. Since highly personal information was exposed (social security numbers, addresses, birthdays), the implications of this breach could haunt us in the long-term future.

    What are the lessons of this breach to individuals, as well as organizations?

    Join this interactive panel discussion with security experts to learn:
    - The short and long-term effects of this data breach
    - What you can do to protect yourself and your organization
    - How to protect against future scams
    - Why breaches happen and how organizations can improve their breach prevention efforts, as well as employ technologies and process for faster breach detection and response
    - How to improve cyber security going into 2018

    Speakers:
    - Satya Gupta, CTO, Virsec Systems
    - Shawn Burke, Global Chief Security Officer, Sungard Availability Services
    - Vamshi Sriperumbudur, VP Marketing, CipherCloud

    Moderator:
    - William Leichter, VP Marketing, Virsec Systems
  • Enterprises under fire - how to manage risk and response Recorded: Sep 21 2017 87 mins
    Kaspersky Lab
    On Thursday, 21 September, from 14.00 to 15.30 BST/15.00 to 16.30 CET, Kaspersky Lab will be joined by senior business and IT experts at the Kaspersky CyberSecurity Summit 2017, to debate the top threats facing enterprises – and what they mean for CISOs in terms of incident response, business continuity and risk management. Participants will leave armed with clear, actionable intelligence.

    Speakers: Duncan Brown, Associate Vice President, European Security Practice, IDC; Christian Toon, Chief Information Security Officer, Pinsent Masons LLP; Roderick Clayton, EVP and Co-lead, Global Issues and Crisis, Weber Shandwick; Juan Andres Guerrero-Saade, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab; and Alessio Aceti, Head of Enterprise Division, Kaspersky Lab.

    The event will be moderated by Geoff White, Television news reporter (BBC and Channel 4 News) and investigative journalist.

    The cyberthreat landscape is becoming ever more complex and destructive. Over the last 12 months, attacks targeting enterprises have increased significantly in both number and range – with a measurable impact on operations, revenue, customers and reputation.

    In this summit, experts from IT and business will discuss the most dangerous cyberthreats targeting enterprises, how to stay protected even when breached, as well as threat intelligence, incident response, the legal, insurance and communications challenges – and more.

    Participants will be able to join in the debate and ask questions. They will leave armed with clear, actionable intelligence.
  • Equifax Breach and Managing Your Vulnerabilities Recorded: Sep 20 2017 62 mins
    Carl Wright (AttackIQ), Igor Baikalov (Securonix), Chris Petersen (LogRhythm), Sam Abadir (LockPath)
    With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.

    What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?

    Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
    - The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
    - Managing IT risk and vulnerabilities
    - How to improve breach prevention, detection and response
    - What to expect in the future

    Speakers:
    - Igor Baikalov, Chief Scientist, Securonix
    - Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
    - Sam Abadir, Director of Product Management, LockPath

    Moderator:
    - Carl Wright, CRO, AttackIQ
  • Lessons from the Equifax Data Breach for Improving Cybersecurity Recorded: Sep 19 2017 54 mins
    Brian Robison (Cylance), Michael Davis (CounterTack), Stephan Chenette (AttackIQ), Kevin Flynn (Skybox Security)
    Join this interactive Q&A panel to discover the biggest lessons of the recent Equifax breach and how to apply them toward improving your and your organizations cyber security.

    Viewers will learn:
    - The magnitude of the impact of this breach across consumers and industries
    - The true costs of a breach
    - How to discover if your personal information has been exposed and what you can do about it
    - What to expect in terms of cyber threats in the future
    - How can to protect your data and secure your organization
    - Expert recommendations on improving breach protection, detection and response

    Speakers:
    - Brian Robison, Sr. Director of Security Technology, Cylance
    - Stephan Chenette, CEO, AttackIQ
    - Michael Davis, CTO, CounterTack
    - Kevin Flynn, Global Director of Products, Skybox Security
  • How the Equifax Breach Impacts You and What To Do To Protect Yourself Recorded: Sep 18 2017 61 mins
    Vince Tocce | Rob Graham | Ray Watson | Judy Towers
    The massive Equifax data breach may involve as many as 143 million US consumers whose personal information was accessed by hackers between May and July.

    Join this interactive discussion with security experts and researchers to find out how this breach impacts your life and potentially, your organization.
    - Timeline of Equifax and why this may be the worst hack yet
    - Has your data been exposed in the hack?
    - What should you do right away?
    - When to expect the scams and cyber attacks related to this hack?
    - Expert recommendations on how to stay safe online in the age of breaches and ransomware attacks.

    Speakers:
    - Vince Tocce, Vince in the Bay Podcast
    - Judy Towers, Cyber Intelligence Analyst, Private Company
    - Ray Watson, VP Global Technology, Masergy Communications
    - Rob Graham, a well-known cybersecurity expert, creator of BlackICE, sidejacking, and masscan
  • What the Equifax Breach Means for You and Your Business Recorded: Sep 15 2017 63 mins
    Dan Lohrmann (Security Mentor), John Bambenek (Fidelis), Nathan Wenzler (AsTech)
    Data breaches have become frequent and more impactful in the last couple of years, with the latest massive breach revealed by Equifax taking the cake. Equifax is one of three major credit reporting agencies, and this breach leaves pretty much everyone's financial data vulnerable to cyber criminals.

    Join this interactive panel and ask your most pressing questions, as well as learn about:
    - How this breach exposing personal data, including social-security numbers, for 143 million Americans will affect you and your business
    - What you can do today to minimize your data exposure and protect against cyber attacks
    - What to expect in the future
    - Expert recommendations on how to improve your personal cybersecurity and your company's security.

    Speakers:
    - Nathan Wenzler, Chief Security Strategist at AsTech Consulting
    - Dan Lohrmann, CSO & Chief Strategist for Security Mentor
    - John Bambenek, Threat Systems Manager at Fidelis
  • Impact of Equifax Data Breach on Consumers and Businesses Recorded: Sep 14 2017 50 mins
    Dave Klein (GuardiCore), Dr. Al Hartmann (Ziften), Neill Feather (SiteLock), Patrick Bedwell (Lastline)
    Chances are, you and a lot of people you know could be a few of the 143 million consumers affected by the major data breach recently disclosed by Equifax.

    Join this interactive Q&A panel to discover how this breach impacts you and the steps you can take today to minimize the likelihood of a future cyber attack related to this breach:
    - How to discover if your personal information has been exposed in this breach
    - What is the impact on consumers and organizations of all sizes
    - What to expect in the future? Cyber threats related to the breach
    - How can to protect your data and secure your organization

    Speakers:
    - Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
    - Dr. Al Hartmann, Chief Scientist, Ziften
    - Neill Feather, President of SiteLock
    - Patrick Bedwell, Head of Product Marketing, Lastline
  • Challenges in Data Privacy Recorded: Sep 14 2017 40 mins
    Craig Scoon, Consultant in the Risk Advisory Service at Deloitte
    There are many challenges for data privacy legislation within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem seems to constantly be playing catch-up.
    This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz),
  • Equifax Data Breach: Facts, Impact and Steps to Take Today Recorded: Sep 13 2017 60 mins
    Michael Davis (CounterTack), Corey Williams (Centrify), Elizabeth Zalman (strongDM)
    Equifax, a massive credit reporting agency, disclosed that a data breach it discovered on July 29 may have impacted up to 143 million consumers in the United States. That's almost half the country.

    Join this interactive Q&A panel to discover how this breach impacts you:
    - Who is a victim and what this breach means for consumers and businesses
    - What should Equifax customers do
    - How to protect against and detect breaches faster
    - How can we protect our data against future breaches

    Speakers:
    - Michael Davis, CTO of CounterTack
    - Corey Williams, Senior Director of Products & Marketing, Centrify
    - Elizabeth Zalman, Co-founder & CEO, strongDM
  • 2017 Trends in IoT Cyber Attacks Recorded: Sep 13 2017 61 mins
    Ulf Mattsson, David Morris, Mandeep Khera, Juanita Koilpillai
    There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of about 30 billion objects by 2020. This session will discuss the key findings.
    Viewers will learn:
    • Current trends in Cyber attacks for IoT
    • Security Metrics for IoT
    • Oversight of third parties in IoT
    • How to measure cybersecurity preparedness for IoT
    • Automated approaches to integrate Security into IoT
  • State of Cloud Adoption in Asia Pacific (APAC) Recorded: Sep 13 2017 36 mins
    Ekta Mishra, Research Analyst of CSA and David Siah, Country Manager of TrendMicro Singapore
    Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.

    During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.
  • Security Challenges of the IoT Within Healthcare Recorded: Sep 13 2017 49 mins
    Minatee Mishra, Software Architect & Lead of the Security Centre of Excellence, Philips HealthTech
    Healthcare industry would be one of the major adopters of IoT. What are the security challenges of healthcare industry? How does IoT change the security equation in healthcare?

    Presenter:

    Minatee leads the Security Center of Excellence (ScoE) in Philips HealthTech and has been instrumental in setting up the SCoE within Philips. The SCoE , which is a central organization responsible for doing cutting edge work in the field of security testing, doing secure code analysis , finding the vulnerable components within the software and more. Minatee has been in the field of software for 18 years right from designing and architecting systems to securing in systems, She has a bachelors in electrical engineering from NIT and Masters from IIT Kharagpur. She holds CISSP, GCIH, CEH certifications. She has been a speaker at various forums/conferences like RSA, RISC, NullCon, BPM etc.
  • IT is from Mercury, ICS is from Mars Recorded: Sep 13 2017 37 mins
    Dick Bussiere, Technical Director, Tenable Network Security
    IT and ICS networks are as different as Mars is from Venus.

    This session will give the audience insight into the differences between IT environments and ICS environments, both from an operational and technical perspective.

    We will offer some ideas for how these critical networks should be monitored and secured.
  • Hurricanes and Cyber Threats: What To Expect and How to Protect Against It Recorded: Sep 12 2017 50 mins
    Chenxi Wang | Gaurav Banga | Oren Falkowitz | Ori Eisen
    In the aftermath of hurricanes Harvey and Irma, as businesses are trying to recover and people are scrambling to rebuild their lives or help others do so, we need to be mindful of the potential cyber threats that lurk after major natural disasters.

    Join this interactive panel to learn more about:
    - What to look out for when it comes to phishing or malicious campaigns related to Harvey, Irma
    - The risk of cyberattack on the US water infrastructure
    - Other cyber threats we should be aware of
    - Expert recommendations for improved cybersecurity across enterprises, small businesses and individuals

    Speakers:
    - Chenxi Wang (moderator)
    - Gaurav Banga, Founder of Balbix
    - Oren Falkowitz, CEO of Area1 Security
    - Ori Eisen, CEO of Trusona
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Top 5 Ways Next-Generation Masking is Changing How Businesses Prevent Breach
  • Live at: Jun 14 2016 4:00 pm
  • Presented by: Matthew Yeh, Delphix, Product Marketing & Olivia Zhu, Delphix, Business Technology Consultant
  • From:
Your email has been sent.
or close