Hi [[ session.user.profile.firstName ]]

Infosecurity 2016: Tristan Liverpool, F5 Networks

- Infosecurity Europe 2016 -

BrightTALK got the chance to speak with F5 Networks' Tristan Liverpool and hear his thoughts on the current cyber landscape.

Tristan gave his insights into application security; the challenges around data protection and the regulations from government; the potential influence of a UK Brexit from Europe on cyber security; how to protect the financial industry from cyber criminals; developments in social engineering and improving your perimeter security.
Recorded Jun 15 2016 3 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tristan Liverpool, Director of Systems Engineering, F5 Networks
Presentation preview: Infosecurity 2016: Tristan Liverpool, F5 Networks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Using Behavioural Economics to Raise Digital Resilience Amongst Employees Mar 22 2018 9:00 am UTC 60 mins
    Robin Smith, Head of IT Security, South Yorks NHS
    This case study examines how a major NHS organiation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.

    Join this webinar presentation to learn:
    - Key lessons on the value of micro-marketing
    - Lessons from cybernetics
    - The value of cyber resilience in healthcare

    About the Presenter:
    Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.
  • GDPR and Security: De-Identifying Personal Data Feb 22 2018 4:00 pm UTC 60 mins
    Ashwin Chaudhary, President of Accedere
    Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.

    Join this webinar to learn the GDPR requirements for managing personal information and digital identity.
  • Critical Actions to Finalize Your GDPR Compliance Program: Part 2 Jan 30 2018 6:00 pm UTC 75 mins
    Moderated by Dr. Branden Williams, with panelists from Imperva, Workday, ASG Technologies and TrustArc.
    The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

    In this webinar series you will hear from industry experts facing the same challenges you face and find out how they're meeting and surpassing critical implementation check points, and you will learn what actions other organisations are taking preparation for data protection – not only for GDPR, but for long-term data protection.
  • Key Considerations for Building Stronger Security Jan 18 2018 6:00 pm UTC 60 mins
    John Bambenek (Fidelis) | Mike Bruemmer (Experian) | Kevin Lee (Sift Science) | Dennis Leber (Commonwealth of Kentucky)
    In the age of breaches and increased cyber attacks, security professionals are looking for the best ways to secure their organizations and prepare against upcoming cyber threats. Join this panel of experts are they look back the biggest events of 2017 and provide their recommendations for CISO's on what to look out for in the next months and how to improve their organization's cyber security in 2018.

    - Breaches and (Compromised) Identity
    - Lessons learned from 2017's major breaches (Equifax, Uber, etc.)
    - Fighting cyber fraud, identity theft, account takeovers
    - The likelihood of GDPR leading to companies not disclosing breaches
    - Cyber attack trends on the horizon
    - How to protect against these attacks and build a more resilient enterprise

    Speakers:
    - John Bambenek, Threat Systems Manager, Fidelis Cybersecurity
    - Dennis Leber, CISO at Cabinet for Health and Family Services, Commonwealth of Kentucky
    - Kevin Lee, Trust and Safety Architect, Sift Science
    - Michael Bruemmer, VP Consumer Protection, Experian Consumer Services
  • Top Cybersecurity Priorities for CISOs Jan 16 2018 10:00 pm UTC 60 mins
    Dr. Christopher Pierson (Viewpost), John Cloonan (Lastline), Roselle Safran (Rosint Labs)
    Aligning security with business goals remains a challenge for CISOs across industries. In an age of relentless attacks, CISOs need to be proactive, informed and have the resources to launch a resilient cyber defense.

    Tune in to this interactive panel discussion to learn the key cyber priorities for CISOs this year:
    - Cyber attacks and new threats on the horizon
    - Understanding your company's cyber risk
    - Cost of breaches
    - Best practices for improving security in 2018
    - Communicating security strategy to the board

    Speakers:
    - Dr. Christopher Pierson, CSO, Viewpost
    - Roselle Safran, President, Rosint Labs
    - John Cloonan, Director of Products, Lastline
  • Securing Your Digital Way of Life Jan 16 2018 6:00 pm UTC 60 mins
    Ron Temske, VP Security Solutions, Logicalis
    In this presentation, Ron Temske, Vice President of Security for Logicalis US, will discuss the prevalence of cyberattacks through a variety of attack vectors.

    Attendees will also learn about market trends, malware evolution and smarter security strategies to reduce enterprise vulnerability and mitigate risks.

    About the Presenter
    Ron Temske is Vice President of Security Solutions for Logicalis US, an international IT solutions and managed services provider (www.us.logicalis.com). At Logicalis, he is responsible for defining the strategic vision for security solutions and ensuring that consistent methodologies and procedures are applied nationwide. Ron has more than 20 years of experience in the information technology-consulting arena and blends sales and management skills with his training as an engineer. Ron holds Bachelor’s and Master’s degrees in Nuclear Engineering from the University of Michigan at Ann Arbor.
  • Crafting Smarter Security Strategy in 2018 Jan 16 2018 1:00 pm UTC 60 mins
    Raef Meeuwisse, Paul Swarbrick, Cristiano Cafferata, Graeme Park
    Last year's massive cyber attacks and data breaches that disrupted organizations and governments worldwide are a major wake up call for CISO's everywhere. Now, more than ever, it's paramount to make invest in smarter security to protect your organizations critical data assets and workloads.

    Join this panel of top industry experts as they discuss:
    - Why businesses should put cybersecurity a key priority in 2018
    - Key factors to consider when crafting your security strategy
    - How to prevent breaches, detect them faster and launch an appropriate response
    - Recommendations for CISO's and CIO's
  • Making Security Strategy Reality: Winning Strategy through Tactics Jan 16 2018 9:00 am UTC 60 mins
    Griff James, Director, Damrod Analysis
    In cyber security the strategic goals are often clear, while the methods to achieve those goals is anything but. This webinar introduces Damrod’s Cyber Strategic Framework that applies military analysis to cyber security challenges. Aimed at security teams trying to implement high level goals in the real world, this talk focuses on effects based planning that integrates disparate elements of IT and security into a cohesive package. Defending the network is about more than technology. Analysis and leadership are critical elements of an effective cyber defense. You will leave this webinar better equipped to develop the tactics that make strategy a reality.

    About the Presenter:
    Griff is trained as a Canadian Infantry Officer and is a holds a Master’s Degree from the LSE. Unable to find “real” work, he got into software development as a Scrum Master, leading the development of a web based application. This experience fostered an interest in cybersecurity, and Griff went on to a boutique start-up providing application security to Fortune 500 companies. Frustrated by the disconnect between technologies and poor analysis within cyber security, Griff founded cyber defense firm Damrod Analysis in 2017.
  • Security Review & 2018 Predictions for Financial Services Dec 15 2017 5:00 pm UTC 60 mins
    Adam Hamm, Managing Director, Protiviti Global Consulting
    The regulators are coming regarding cybersecurity. Are you ready?

    Join this interactive webinar to learn more about:
    - The NYDFS Part 500 cyber regulations, including insights on implementation and auditing
    - Review the NAIC's new Insurance Data Security Model Law adopted on October 24, 2017

    About the Presenter:
    Adam Hamm is a Managing Director at Protiviti Global Consulting who serves financial services industry clients across the country regarding risk, compliance, and cybersecurity matters. He has deep knowledge of financial services regulation with hands on experience in all insurance supervision and policy related matters. Before he joined Protiviti in January 2017, he was a former President of the National Association of Insurance Commissioners (NAIC), Chairman of the NAIC’s Cybersecurity Task Force, Principal on America’s Financial and Banking Information Infrastructure Committee (the primary national regulatory cybersecurity committee for the financial services sector), Principal on the United States Financial Stability Oversight Council (FSOC), and North Dakota’s elected insurance commissioner from 2007-2016. Adam also spent ten years as a violent crimes prosecutor and civil litigator.
  • Cyber Threat Predictions & Security for 2018 Dec 14 2017 6:00 pm UTC 60 mins
    Diana Kelley | Mark Weatherford | Jon Green | David McGuire | Ashton Mozano
    With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.

    This interactive Q&A panel with security industry experts will explore:
    - The biggest threats on the horizon
    - Key vulnerabilities and how to protect against them
    - Measures for breach prevention, detection and response
    - Which areas to focus on in 2018
    - Recommendations for CISOs

    Speakers:
    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - David McGuire, CEO, SpecterOps
    - Ashton Mozano, CTO, Circadence
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company
  • Lessons Learned and Recovery from Breaches Dec 14 2017 5:00 pm UTC 60 mins
    Rebecca Herold, CEO and Founder, The Privacy Professor
    In 2016, there were 329 breaches involving 500+ records, amassing a total of 16,471,765 records breached. The reported main cause of the known healthcare data breaches in 2016 was unauthorized access/disclosure. Most could have been avoided by the effective use of data encryption technology, as part of a comprehensive information security and privacy management program.

    Additionally, ransomware accounted for 72% of healthcare malware attacks in 2016; these attacks usually resulted in EHR downtime. Ransomware attacks rose 250% in 2017. Ransomware recovery costs can exceed $10M per covered entity, with daily downtime costs running over $8,500 per hour of downtime. Organizations must understand both the regulatory hurdles and backup/recovery strategies when encountering breaches.

    In this webinar, Rebecca Herold, a highly recognized privacy and security expert, will describe:
    - Real life examples, legal requirements as well as mitigation actions, costs associated with breaches
    - Specific ransomware issues, backup and recovery practices
    - Recommended practices to prevent breaches.

    About the Presenter:
    Rebecca Herold is CEO and Founder of The Privacy Professor® consultancy she established in 2004, and is Co-Founder and President of SIMBUS, LLC, an information security, privacy, technology & compliance management cloud service for organizations of all sizes, in all industries, in all locations founded in 2014. Rebecca is an entrepreneur with over 25 years of systems engineering, information security, privacy and compliance experience. Rebecca created the information security and privacy department functions at a large multi-national financial and health care organization throughout the 1990s. Rebecca has authored 19 books to date, dozens of book chapters, and hundreds of published articles.
  • Big Data Analytics vs Privacy: Risks and Opportunities Dec 14 2017 1:00 pm UTC 60 mins
    Rob Anderson, Head of Field Operations (Privitar),Tim Hickman, Associate (White & Case)
    Today's modern businesses gain competitive edge and remain innovative by using advanced analytics and machine learning. Utilising big data can build customer loyalty by improving personalised marketing campaigns; optimises fraud detection; and improves products and services by advanced testing. However, the data sets required for advanced analytics are often sensitive, containing personal customer information, and therefore come with an inherent set of privacy risks and concerns.

    This roundtable will cover a few key questions on data utility and privacy:

    - In what ways advanced analytics help businesses gain competitive edge?

    - What is defined as sensitive data?

    - Will GDPR affect the way you're allowed to use customer data?

    - What opportunities are there to utilise sensitive data?

    Unlocking the data’s true value is a challenge, but there are a range of tools and techniques that can help. This live discussion will focus on the data analytics landscape; compliance considerations and opportunities for improving data utility in 2018 and beyond.

    Key takeaways:

    - A view of the data protection landscape

    - How to remaining compliant with GDPR when using customer data

    - Use cases for advanced analytics and machine learning

    - Opportunities for maximising data utility in 2018
  • Multi-Cloud Storage: Addressing the Need for Portability and Interoperability Recorded: Dec 12 2017 43 mins
    John Webster, Senior Partner, Evaluator Group, Mark Carlson, SNIA CSI Co-Chair, Alex McDonald, SNIA CSI Chair
    In a recent survey of enterprise hybrid cloud users, the Evaluator Group saw that nearly 60% of respondents indicated that lack of interoperability is a significant technology-related issue that they must overcome in order to move forward. In fact, lack of interoperability was chosen above public cloud security and network security as significant inhibitors. This webcast looks at enterprise hybrid cloud objectives and barriers with a focus on cloud interoperability within the storage domain and the SNIA’s Cloud Storage Initiative to promote interoperability and portability of data stored in the cloud.
  • CPE Webinar: Critical Actions to Finalize Your GDPR Compliance Program: Part 1 Recorded: Dec 12 2017 75 mins
    Dr. Branden Williams; Chris Covell, Absolute, Jake Olcott, BitSight, Brian Philbrook, OneTrust, and Marshall Toburen, RSA
    Attendees can earn 1 CPE credit on this session.

    The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

    In this webinar series you will hear from industry experts facing the same challenges you face and find out how they're meeting and surpassing critical implementation check points, and you will learn what actions other organisations are taking preparation for data protection – not only for GDPR, but for long-term data protection.
  • Best Cyber Breach Protection: Certified NIST RMF Professionals Recorded: Dec 8 2017 64 mins
    Dr. Ron Ross, Mr. Richard Spires, and Dr. Victor Berlin
    Dr. Ron Ross (NIST), Richard Spires (Learning Tree Int’l), and Dr. Victor Berlin (Mission Critical Institute) will discuss how hiring Certified NIST RMF Professionals can be your key to cybersecurity breach protection.

    Dr. Ron Ross, Fellow, National Institute of Standards and Technology
    Ron Ross is a Fellow at the National Institute of Standards and Technology. Dr. Ross leads the Federal Information Security Modernization Act (FISMA) Implementation Project, which includes the NIST Risk Management Framework.

    Mr. Richard Spires, CEO, Learning Tree International (CIO, DHS, IRA ret.)
    Richard Spires is CEO of Learning Tree International. Previously he has served as the U.S. Department of Homeland Security’s (DHS) Chief Information Officer (CIO) and IRS’s CIO. Spires also served as the Vice-Chairman of the Federal Government CIO Council and the Co-Chairman of the Committee for National Security Systems (CNSS).

    Dr. V. N. Berlin, CEO, Mission Critical Institute
    Victor Berlin is the CEO of Mission Critical Institute (MCI). MCI enables universities to graduate career-ready cybersecurity risk management professionals by utilizing MCI’s cutting-edge cybersecurity education system. Dr. Berlin has over 15 years of cybersecurity graduate level education experience which includes serving as the founding president of the first accredited cybersecurity graduate university, University of Fairfax.
  • Uber, Equifax and the Year of Data Breaches Recorded: Dec 7 2017 60 mins
    Chris Morales (Vectra Networks) | Jason Kent (AsTech) | Willy Leichter (Virsec Systems)
    Massive data breaches are a dime a dozen these days, affecting more people that before and exposing the highly personal information of millions of consumers. Uber is the latest company to disclose a major breach, joining Equifax from a few months ago, in which the names, addresses and other personal data got stolen by hackers.

    Join this interactive Q&A panel discussion to learn more about:
    - Impact and lessons learned from the Uber breach
    - What should enterprises do to better protect their customer data?
    - How can we address the growing threat of cyber attacks?

    Some of the industry's top minds will provide their insights on the impact of the recent breaches on consumers, organizations and policy.

    Moderator:
    - William Leichter, VP Marketing, Virsec Systems (Moderator)

    Speakers:
    - Chris Morales, Head of Security Analytics, Vectra Networks
    - Jason Kent, CTO, AsTech Consulting
  • Stop losing game revenue and players to cyber attacks Recorded: Dec 6 2017 61 mins
    Ryan Safarian, VP of Engineering, JumpRamp Games
    Cyberattacks cost companies over $1 million per day and the video game industry is being targeted more than ever. The global audience is huge and growing across demographics. The number of platforms, from personal computers, consoles and hand-helds to smartphones and tablets, makes a smorgasbord of vulnerable users.

    And then the bad guys get to work. Accounts are hacked to rip off virtual items your users have invested time and money on, and real-world identification and financial information is harvested for sale. All told, DoS attacks piss off users and drop game income, and more.

    Game publishers and developers are the ones who end up shouldering the blame, taking massive financial and reputational hits. But there are increasingly sophisticated ways to lock out the hackers, keep your users safe, and your intellectual property secure.

    Join this VB Live event to learn from digital security experts about the four key perimeters of defense, how to proactively secure your environment, and protect against the increasing number of hacks, DDoS attacks, and more.

    Register here for free.

    You’ll learn about:
    * How to prevent data breaches, SQL injections, cross-site scripting, remote file inclusion, and other cyberattacks.
    * Integrating cloud and on-premises solutions
    * How to handle larger, Internet-scale attacks
    * Preventing the reputation hit that hacked accounts or downed sites bring

    Speakers:
    * Ryan Safarian, VP Engineering, JumpRamp Games
    * Arash S.Haghighi, Manager of Infrastructure, Smilegate West
    * Dean Takahashi, Lead Writer, GamesBeat, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat



    Sponsored by Akamai
  • The Practical Execution of Security in the Enterprise Recorded: Dec 5 2017 28 mins
    Gee Rittenhouse, SVP Security Business Group, Cisco; Mike Iwanoff, SVP/CISO/CIO, iconectiv
    As more of our business data will exist in the cloud and as the scale of IoT creates more weak links in the security chain, what systems in the network are designed securely that CIOs and CSOs can leverage? And will a lack of industry standards and technology architecture around the IoT makes it difficult to create security policies? Also, why do some contend that the IoT is impossible to secure?

    On this edition of NMGs podcast series, we invite Gee Rittenhouse, Senior Vice President, Security Business Group at Cisco and Mike Iwanoff, SVP/CISO/CIO at iconectiv.



    Key takeaways for listeners:

    a.Fraudsters are out in full force: Yesterday’s solution might not solve tomorrow’s problems/challenges

    b.Tips and Info: Top three things I can do to get more info/more data and improve my posture in this area
    •Threat Modeling
    •Risk Assessment
    •Risk Framework

    c.Determine whether you have the technology requirements for an acceptable risk posture:
    •Multi-cloud security
    •Visibility
    •segmentation of the network
    •automation – allowing you to implement controls to recover from a threat, find the source and mitigate the threat from reoccurring.

    d.Communicate that risk posture to exec team and to the board - At the end, the company should know what their risks are and what
    they are willing to accept

    e.Understand the challenge and know that you don’t have to build your own security solutions.
  • Uber Data Breach: Impact and Lessons for CISO's Recorded: Nov 30 2017 60 mins
    Alex Holden (Hold Security) | Jesper Johansson (Yubico) | Nathan Wenzler (AsTech)
    Uber recently disclosed a massive data breach in which the personal information of 57 million Uber customers and drivers were stolen by hackers in October 2016. What are some of the lessons we can draw from this latest breach?

    Join this interactive panel of experts as they review:
    - What is the impact of this breach?
    - What should Uber users do in response to this breach?
    - What are the most common reasons for breaches?
    - What should organizations be doing to better tighten their security?

    Speakers:
    - Alex Holden, CISO of Hold Security
    - Jesper Johansson, Chief Security Architect, Yubico
    - Nathan Wenzler, Chief Security Strategist, AsTech Consulting
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Recorded: Nov 21 2017 52 mins
    Jeffrey Ritter
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Infosecurity 2016: Tristan Liverpool, F5 Networks
  • Live at: Jun 15 2016 4:05 pm
  • Presented by: Tristan Liverpool, Director of Systems Engineering, F5 Networks
  • From:
Your email has been sent.
or close