Hi [[ session.user.profile.firstName ]]

Infosecurity 2016: Big Data Security Analytics in Cyber Warfare

- Infosecurity Europe 2016 -

BrightTALK got the chance to spend some time with Splunk's lead security evangelist, Joe Goldberg at Infosecurity.

Joe broke down key topics such as the cyber security risks faced by financial institutions and the developments that they could make to better protect themselves; the rise of nation-state attacks and cyber warfare and what Splunk are most excited about in the world of information security - big data security analytics.
Recorded Jun 14 2016 4 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joe Goldberg, Chief Security Evangelist, Splunk
Presentation preview: Infosecurity 2016: Big Data Security Analytics in Cyber Warfare

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response Feb 20 2019 1:00 pm UTC 45 mins
    Daniel Norman, Research Analyst, ISF
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • Best Practices for Protecting Your Business from Cybercrime Feb 19 2019 4:00 pm UTC 60 mins
    Michelle Drolet (Towerwall), Michael Thelander (Venafi), William Peteroy (Gigamon), Kalani Enos (kenos)
    Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

    Join this panel of security experts to learn more about:
    - Trends in cybercrime and lessons learned in 2018
    - The cost of data breaches
    - Rise of cryptojacking and ransomware
    - Who are the players who make up the world of cybercrime (e.g. programmers, distributors, fraudsters, etc.)
    - The CISO vs the cybercriminal
    - Best practices for protecting your business

    Speakers:
    - Michelle Drolet, CEO, Towerwall
    - Michael Thelander, Director of Product Marketing, Venafi
    - William Peteroy, Security CTO, Gigamon
    - Kalani Enos, Founder & CEO, kenos Technologies (Moderator)
  • Top Cybersecurity Threats and 2019 Predictions Feb 19 2019 11:00 am UTC 45 mins
    Kelvin Murray, Sr. Threat Research Analyst, Webroot
    Small and medium-sized businesses are major targets for cybercriminals. To stay safe, today’s businesses must understand the different types of cyberattacks they may encounter and implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses faced this year and what's upcoming in 2019 to get details and tips that will help you keep your business and clients safe. Our Threat expert will be discussing ransomware, banking Trojans, phishing and all the crypto-crime that’s wreaking havoc on IT pros.

    Book your place and get some key insights, including:

    · 2019 Threat Landscape Predictions
    · Observed business trends (how businesses worry about the wrong threats)
    · Where stolen data/information ends up
    · Long term effects of data theft
  • IoT Series [Ep.3]: IoT Essentials -- Selecting a Vendor Recorded: Feb 12 2019 49 mins
    Johna Till Johnson, CEO & Founder, Nemertes Research
    Selecting a vendor partner (or partners) is one of the most critical decisions enterprises will make on their IoT journeys. The right partner makes all the difference: enterprises with top-ranked partners report greater success in generating revenue, cutting costs, and optimizing business processes via IoT.
    • Who are the right providers?
    • What are the critical factors to consider in selecting one?

    This webinar reviews the provider landscape and highlights critical selection factors for companies of all sizes and industries.
  • Moving the Needle - Women in CyberSecurity Recorded: Feb 8 2019 61 mins
    Taly Walsh, Executive Director, WiCyS
    A new study has updated the ratio of women to men in the cybersecurity workforce – from 11% to 20%. Yet more than 300,000 cybersecurity jobs are unfilled today, a number that is exponentially growing into the millions. Let's do something to move the needle to 50% women in cybersecurity!

    Women in CyberSecurity (WiCyS), a non-profit organization with deep roots in academia, government and industry, is driving to increase recruitment, retention and advancement of women in cybersecurity.

    During this engaging webinar for diversity recruiters and women in various stages of cybersecurity careers, we will interview two WiCyS Board Members who offer stats and important guidelines for recruitment and retention of women in cybersecurity.

    Featuring:
    Dr. Janell Straach, Chairman of the Board, WiCyS - Director, Center for Engaging Women in Cybersecurity, University of Texas Dallas

    Dr. Costis Toregas, Treasurer, WiCyS - Director, Cyber Security and Privacy Research Institute, George Washington University

    Interviewer: Taly Walsh, Executive Director, WiCyS
  • Panel Discussion - Future of Cyber Security Recorded: Feb 7 2019 46 mins
    Britta Glade, Wendy Nather, Rich Mogull, Diana Kelley, Ryan Berg
    Join RSA Conference Director of Content Curation and four Program Committee Members for a panel discussion about the topics they’re most excited about at RSA Conference 2019. Plus, some hints at the big discussions to take place in areas like Blockchain, security strategy and more:

    * Is Blockchain bulletproof?
    * Are there technical risks related to cryptocurrencies?
    * How to assess the coverage and gaps in your security portfolio
    * The theme of “acceptance” in security strategy
    * Exciting sessions in our Hackers & Threats track from chipset to containers, as well as smart contracts
    * Closing the enterprise gaps when it comes to moving to the cloud

    You’ll have a chance to ask questions during this live webcast. Join us for this exclusive preview of what you’ll hear about at RSA Conference 2019, March 4-8 in San Francisco.

    Britta Glade, Director Content & Curation, RSA Conference
    Wendy Nather, Director, Advisory CISOs, Duo Security
    Rich Mogull, Analyst & CEO, Securosis
    Diana Kelley, Cybersecurity Field CTO, Microsoft
    Ryan Berg, Fellow, Alert Logic
  • Managing Compliance and Security in the Cloud Recorded: Jan 30 2019 43 mins
    Benny Czarny, Tzach Horowitz, Ariel Zeitlin, Diana Kelley
    "In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.

    Join cloud, security and compliance experts as they discuss:
    - How to proactively analyze security risk from the business perspective
    - What you need to know about your data, and how to ensure it is compliant when in the cloud
    - How to automate security policy changes
    - Top challenges for CISOs and CIOs
    - Achieving security and compliance across multiple clouds
    - Steps to take today"

    Presenters
    Benny Czarny, CEO and Founder, OPSWAT
    Tzach Horowitz, Pre-Sale Director, Cybergym
    Ariel Zeitlin, CTO and co-founder, Guardicore
    Diana Kelley, Cybersecurity Field CTO, Microsoft
  • Best Practices for Securing DevOps Recorded: Jan 30 2019 43 mins
    Ran Ilany, Guy Dagan, Bar Hofesh, Ory Segal
    Making sure security is included at every step in the software or application development lifecycle is key in the age of breaches, data leaks and third party security risks.

    Join experts from the industry to learn more about:
    - Security challenges and vulnerabilities
    - DevOps vs DevSecOps: What's the difference?
    - How to make disjointed security and DevOps teams work effectively
    - DevOps security scans
    - Steps to better application security

    Panellists
    Ran Ilany, CEO, Portshift
    Bar Hofesh, CTO, NeuraLegion
    Ory Segal, CTO, PureSec
    Guy Dagan, Cofounder and Partner, Consienta
  • Strategies for Cyber Resilience in 2019 Recorded: Jan 30 2019 50 mins
    Aviv Cohen, Eddy Bobritsky, Israel Levy, Ariel Koren
    With cyber attacks and breaches on the rise, cyber resilience is becoming an area of focus for C-suite executives worldwide. It is no longer a question of "if" a breach will occur, but "when," and organizations are looking to include cyber resilience as part of their business continuity and disaster recovery programs.

    Join security and business continuity experts as they review:
    - Threats to cyber resilience and business continuity
    - Lessons from Wannacry (ransomware) and NotPetya (wiper) attacks
    - Attack trends and business preparedness
    - Steps for enterprises to take today

    Panellists
    Aviv Cohen, CMO, Pcysys
    Ariel Koren, CTO, SNDBOX
    Israel Levy, CEO, Bufferzone Security
    Eddy Bobritsky, Founder & CEO, Minerva Labs
  • Top Challenges for CISOs and How to Solve Them Recorded: Jan 29 2019 46 mins
    Aviv Grafi, Guy Dagan, Noam Erez, Kobi Freedman, Avivit Kotler
    According to a recent study, having a lack of influence in the boardroom is a key reason why 84% of CISOs in North America believe there is no way to avoid a data breach. How are CISOs addressing the ever-growing cyber threat landscape, disappearing security perimeter and the chronic lack of skilled security professionals? What do they need to communicate and how, to get the board on their side?

    Join security experts across the industry for an interactive discussion on:
    - What keeps CISOs up at night
    - Strategies for breach prevention
    - Strategies for making the most of AI technolofy and human talent
    - Coping with analyst fatugue
    - Threats on the horizon
    - Recommendations for strengthening security

    Panellists
    Noam Erez, co-founder and CEO, XM Cyber
    Aviv Grafi, CEO and co-founder, Votiro
    Guy Dagan, Cofounder and Partner, Consienta
    Avivit Kotler, CISO - Head of Cyber Security & Business Continuity, Clal Insurance
    Kobi Freedman, Co-founder & CEO, IDRRA
  • IoT Cyber Attacks and Proactive Security Recorded: Jan 29 2019 56 mins
    Moshe Shlisel, Udi Solomon, Ari Eitan, Guy Dagan
    The Internet of Things is set to reach 50 billion connected devices by 2020, according to a recent Cisco report, making them an attractive target for cyber criminals who can easily use them get inside networks of organizations worldwide. Once in, attackers can easily take over and control IP-enabled devices to extract data or implant malicious code.

    Join IoT and security experts to learn more about:
    - Unique challenges of securing IoT systems
    - IoT and AI: Threats, attack trends and recommendations for basic cyber hygiene
    - Proactive security strategies to stave off the threat of IoT cyber attacks

    Panellists
    Ari Eitan, VP of Research, Intezer
    Udi Solomon, CEO & Co-Founder, ShieldIoT
    Moshe Shlisel, CEO and Co-Founder, GuardKnox
    Guy Dagan, Cofounder and Partner, Consienta
  • Addressing the Cyber Threats on the Horizon Recorded: Jan 29 2019 41 mins
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Panellists
    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • Sanity 101 for Privacy Pros Recorded: Jan 28 2019 56 mins
    Jackie Wilkosz, Privacy and Data Protection Consultant, Aleada Consulting
    Strategies to Keep You and Your Privacy Program Focused and Sane

    Are the new and ever-changing data protection laws stressing you out? Feeling overwhelmed by the tidal waves of compliance requirements? Don’t know where to start? Take a deep breath.

    We’ll share 5 key strategic steps to help get you and your privacy program focused and release the overwhelm. Leave this webinar feeling grounded and ready to tackle the data protection obstacle courses of 2019.

    Jackie Wilkosz is a Manager at Aleada Consulting, where she advises clients on privacy, data protection, and information security issues. Jackie cultivates dynamic client partnerships to provide practical, actionable advice. She has specific expertise in human resources privacy and building multi-jurisdictional compliance programs.
  • Privacy Trends and Priorities for 2019 Recorded: Jan 28 2019 62 mins
    Chris Pierson (BLACKCLOAK), Alyssa Coley (Aleada), Sarah Squire (Ping Identity)
    Consumers are increasingly concerned about the privacy of their personal data, and businesses are starting to pay attention. Privacy came into focus in 2018, not only because GDPR went into effect following months of hype, but also because of the steady stream of high-profile hacks and breaches, as well as media attention on how some of the biggest tech companies have been harvesting, storing and sharing user data.

    On Data Privacy Day, join the experts to learn more about:
    - Why your business strategy should include data privacy
    - Data protection regulations around the world
    - The biggest data privacy events in 2018
    - What to look out for in 2019

    Speakers:
    - Christopher Pierson, Founder & CEO, BLACKCLOAK
    - Alyssa Coley, Associate, Aleada Consulting
    - Sarah Squire, Senior Technical Architect, Ping Identity
  • IoT Series [Ep.2]: Current State -- Maturity and Success Recorded: Jan 24 2019 51 mins
    Johna Till Johnson, CEO & Founder, Nemertes Research
    Everybody knows IoT is the wave of the future. But what are successful organizations doing differently when it comes to their IoT initiatives? Are they saving more? Generating new revenue and lines of business? Or increasing operational efficiency and other metrics?

    This webinar unveils the secrets of top-performing companies when it comes to IoT initiatives. You'll learn how they plan for, design, secure, and operate their IoT initiatives--and how they track the benefits.
  • [Earn 1 CPE] Critical Actions to Survive a Data Breach in 2019 and Beyond Recorded: Jan 17 2019 65 mins
    Colin Whittaker, Moderator. Panelists: Stephen Boyer, BitSight; Jon Siegler, LogicGate; and Justin Fier, Darktrace.
    With large-scale data breaches continuing to make the headlines in 2018, Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. Cyberattacks that target and infiltrate critical infrastructure are very real and for the United States, it’s not a matter of if, but when.

    Keeping your company secure is as much about detecting and responding to attacks as they occur as it is about preventing attacks before they happen. On this webinar our panel of experts will discuss THE critical actions organisations should consider to prepare for and survive any subsequent breach that may happen, and attendees will learn how to:

    - Implement security analytics for incident detection and response.
    - Quickly determine the extent of a compromise once a breach is detected, and understand the steps necessary to contain the affected systems.
    - Leverage AI to autonomously respond to emerging threats before they can do serious damage.
    - Understand key information that needs to be communicated to various stakeholders in the event of a breach.
    - Apply a “standard of due care” in order to prove compliance to regulatory agencies.
  • The Threats of 2019 Recorded: Jan 17 2019 49 mins
    Bogdan Botezatu, Director of Threat Research and Reporting, Bitdefender
    What threats can we expect to see in 2019, and how do we make sure we're prepared?

    Join Bitdefender Director of Threat Research and Reporting, Bogdan Botezatu to discuss research-based predictions on the biggest threats of 2019. He'll walk through the future of cryptojacking, advanced persistent threats (APTs), network-level exploits, IoT attacks, and others and provide recommendations on the industry's best defenses against these threats.
  • Tackling Your Biggest Threat for Free: One Active Directory Policy Recorded: Jan 17 2019 32 mins
    Helen Oswell, Cyber Security Engineer
    The biggest threat to any organization is it’s own people, particularly when they have access to its most sensitive data. This talk is about limiting the internal threat through RBAC and segregation of duties, and how to implement these using Active Directory.

    Helen has a masters in electronic engineering, specializing in machine learning. She moved into Cyber Security at 10x Future Technologies, a fintech start up founded by the ex-CEO of Barclays Anthony Jenkins. She is now working with 6point6 to provide SME services to HM Government, designing and building a number of Cyber Security tools.
  • CISO Panel - Cybersecurity and the New CISO Recorded: Jan 16 2019 59 mins
    Gary Hayslip (Webroot) | Dan Lohrmann (Security Mentor) | Mark Weatherford (vArmour) | Amos Stern (Siemplify)
    Learn how the role of Chief Information Security Officer (CISO) has changed in the age of data breaches and high-profile cyber attacks.

    Join well-known CISOs at the top of their game for an interactive discussion on:
    - How the role of CISO has changed in the last few years
    - Hiring and retaining a CISO
    - Top challenges for CISOs
    - Dealing with stress & pressure associated with the role
    - How to keep your security team happy
    - Tools, technology and policies CISOs swear by
    - What keeps CISOs up at night
    - Why leadership buy-in is essential to boost cybersecurity
    - Future trends and predictions

    Speakers:
    - Gary Hayslip, CISO, Webroot
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Dan Lohrmann, Chief Strategist & CSO, Security Mentor
    - Amos Stern, CEO, Siemplify

    This exclusive CISO webinar originally aired during National Cyber Security Awareness Month (NCSAM).
  • Security Strategy & Influence Recorded: Jan 15 2019 38 mins
    Max Aulakh, CEO, Ignyte Assurance Platform
    Every organization has a strategy – sometimes this is explicitly stated within various organizational documents and other times the strategic objectives are held within the minds of executive leadership. CISOs today are struggling to find the right words and narrative to set the tone from the top. How do you properly extract the right type of information from your organization that will help you build a consensus and influence with your top-level management?

    As a CISOs, you need to acquire a new set of skills while maintaining your technical trench warfare knowledge (Frameworks, SIEMs, DLP, MDR, etc..). In this presentation, Max Aulakh (CEO) will present broad range of skills that are needed for the next CISO. We will also examine behaviors of some of the well known CISOs in our industry and how they interact & build influence to gain consensus.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Infosecurity 2016: Big Data Security Analytics in Cyber Warfare
  • Live at: Jun 14 2016 1:15 pm
  • Presented by: Joe Goldberg, Chief Security Evangelist, Splunk
  • From:
Your email has been sent.
or close