Hi [[ session.user.profile.firstName ]]

Exposing the Storefront…Protecting the BackEnd

The App Store model has moved beyond consumer realm to become a new service delivery platform for the enterprise. Consumers, partners, and employees are now invited to drive innovation using a variety of exposed APIs, upload mechanisms, and platform hosted tools. As Intel launched AppUp, it knew a host of security issues needed to be addressed to meet corporate security compliance regulations. From scanning uploaded content for rogue payloads, to putting in place a perimeter that could defend back-end systems from SQL injections, and countermeasures for DOS attacks….the list was extensive. In this session, learn how Intel architects offloaded security processing to a Service Gateway ensuring fast performance and a consistent user experience. Learn how this portable security architecture is well positioned for future cloud deployment plans.
Recorded Jun 3 2010 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Cesar Alderete, Senior Software Engineer, Intel & Girish Juneja; Director of SOA Products, Intel
Presentation preview: Exposing the Storefront…Protecting the BackEnd

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Will Faster Payments Mean Faster Fraud? May 10 2017 3:00 pm UTC 60 mins
    Jeroen Mulder, Jim Wadsworth (Accura), Romana Sachova (CaixaBank), Dean Wallace (ACI Worldwide), Kaspar Gering (TransferWise)
    The faster payments initiative was put into place to ensure a better customer experience. However, with this comes the question -- will it also encourage faster fraudulent and insecure transactions?

    Join this panel where experts will discuss:

    ·How an industry-wide approach to data sharing is critical to better tackle fraud and wider financial crime
    ·How analytical tools present a significant opportunity to better protect all users of payments systems against fraud
    ·What is known about the size, scale and flow of stolen money through the UK’s payments systems
    ·What are banks doing on a global scale to tackle the potential challenges head-on?
  • Phishing and Fraud: How can banks stay safe and alert? May 10 2017 2:00 pm UTC 60 mins
    Jonathan Williams (MIDAS Alliance), Andy Green (BLOCKPHISH)
    Phishing e-mail scams have been plaguing banks and their customers with many questioning how tight security is within the sector.

    How can scammers be stopped and how can banks educate internally and externally to prevent future mishaps?

    Join this panel where we will discuss:

    - General safeguards and measures that banks can put in place
    -The role of payment service user education in preventing phishing
    - Where does behavioural analysis fit alongside other security measures
    - Prevention of director/CEO and invoice fraud
    - Prevention vs detection and outcome/data sharing
  • Strong Customer Authentication (SCA) and PSD2 - enabler or obstacle? May 9 2017 2:00 pm UTC 60 mins
    Kristian Sørensen (Norfico), Tim Richards (Consult Hyperion), Adam Kissane (Deloitte), Marten Nelson (Token)
    With the new European Payment Service Directive (PSD2) the most talked about topics are the new access to account (XS2A) options that Payment Initiation Service Providers (PISPs) and Account Information Service Providers (AISPs) will get. But as the Directive not only aims to open the banking infrastructure to foster innovation but at the same time it also aims to increase security and reduce fraud.

    To achieve this ambition new requirements for the use of Strong User Authentication (SCA) play a central role of the Directive. The Commission have given the European Banking Authority (EBA) the responsibility to develop Regulatory Technical Standards (RTS) for SCA. The process has involved discussion papers, 250+ comments from different parties and by the end of February, the "final draft" version of the SCA RTS was published.

    The panel will make sense of the alphabet soup of acronyms and discuss the requirements, the interpretations and the implications of SCA and the RTS.

    *What is SCA?
    *How can SCA be done?
    *Who must do SCA?
    *Who can do SCA?
    *How will SCA impact transactions and commerce?
  • [Video Interview] Piers Wilson and the IISP Industry Survey May 4 2017 1:00 pm UTC 30 mins
    Josh Downs, BrightTALK & Piers Wilson, Director, IISP
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with The IISP's Piers Wison for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The findings of the IISP Industry Survey

    - AI & machine learning in the security sphere

    - The steps cyber professionals need to take to prepare for GDPR

    - What banks can be doing to remain as protected as possible from cyber criminals

    - The growth of IoT networks and their subsequent vulnerabilities

    - What to look for when assembling a security team

    - How to get the most out of your security budget

    -
  • Knowledge of Natural Sciences Applied to Cybersecurity May 3 2017 2:00 pm UTC 45 mins
    Luis Bernardi, Director at IT Scientia Ltd
    The use of the knowledge and understanding of natural sciences, in particular the human body, applied to computer security is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex cyber threat landscape of computer systems. It is hoped that biologically inspired approaches in this area, including, but not limited, to the use of immune-based systems will be able to meet this challenge.

    Join this webinar to understand more about these ideas to further foster the need to design and develop naturally inspired and sustainable protection and defence systems.
  • [Video Interview] Andrew Gould on Early Cyber Prevention Techniques May 3 2017 1:00 pm UTC 30 mins
    Josh Downs, BrightTALK & Andrew Gould, Head of the MET's Falcon Cybercrime Unit
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with The MET's Andrew Gould for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The rise of Ransomware and what we can be doing to protect ourselves

    - The steps that businesses should be taking to prepare for GDPR

    - Financial cyber security and what the banks can be doing better to defend against malicious hackers

    - Cyber security relations and the future of law enforcement post-Brexit
  • Is Your Security Keeping Pace with Your Cloud Initiatives? May 2 2017 3:00 pm UTC 60 mins
    Jonathan Glass, Turner Broadcasting System, Chris Geiser, Garrigan Lyman Group, and Allison Armstrong, Alert Logic
    You’ve decided to move to the cloud. It’s faster, more scalable, and more agile. Security is a priority, but you don’t want it to slow you down. The foundational infrastructure delivered by cloud providers is secure, but protecting the applications, workloads, and data you run on top of it is your responsibility—and it’s a big one.

    Watch ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, for a lively discussion on how to evolve your security strategy to account for innovation at cloud speeds. Our panel of experts will discuss:

    - Why conventional security approaches falter in highly dynamic and elastic environments
    - Key steps to eliminate choke points, keep pace with elastic workloads, and how to deploy security controls in minutes
    - How to keep your internal and external customer’s applications and workloads secure while meeting compliance requirements
    - Why a Security-as-a-Service can help you strike the optimum balance between risk, cost and cloud speed.

    Join Jonathan Glass, Cloud Security Architect, Turner Broadcasting System, Chris Geiser, CTO of the Garrigan Lyman Group, and Allison Armstrong, VP of Technology and Product Marketing at Alert Logic, for a discussion on ‘Is Your Security Keeping Pace with Your Cloud Initiatives?’, and learn how it can. Register now!
  • [Video Interview] Tarah Wheeler on the Ethics of Hacking Back and AI in Security May 2 2017 1:00 pm UTC 30 mins
    Josh Downs, BrightTALK & Tarah Wheeler, Principal Security Advocate, Symantec
    - BrightTALK at CRESTCON & IISP Congress -

    BrightTALK caught up with Symantec's Tarah Wheeler for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The ethics of 'hacking back'

    - AI & Machine learning and the influence it'll have on security

    - Cyber security in the financial sector

    - Cyber warfare and the new tactics coming through

    - Vulnerabilities in the IoT and what we can do about them

    Enjoy!
  • Privileged accounts: the most powerful backdoor used by hackers Recorded: Apr 27 2017 47 mins
    Grant Burst and Chad Carter
    Privileged accounts can be some of the most serious threats your company can face. As more and more processes are digitalized and activities externalized, the number of accounts accessing critical and strategic information escalates, extending the cyber threat across continents. Meanwhile, companies and individuals are becoming increasingly aware that any data or server can be accessed with the right privileges; it is therefore imperative to know who accesses critical resources, as well as when and why they do so to avoid any leak. By monitoring the users holding the keys to the kingdom - the privileged users, we are able to know what exactly happened on a system at any given time and how. Whether malicious or negligent, incidents caused by internal or external threats can be avoided quickly if visibility over the IS is restored. Session monitoring and recording dissuades malicious or negligent users while offering real-time alerts, traceability, and post-mortem analysis. Discover how some of the most dramatic cyberattacks to date could have been prevented had there been a Privileged Access Management solution in place to protect and secure target systems.
  • How to Build An Advanced Email Security Strategy Recorded: Apr 27 2017 46 mins
    Richard Davis, Dir, Cyber Security Strategy and Adenike Cosgrove, Cyber Security Strategy - EMEA, Proofpoint
    You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk.

    Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about:

    • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats.

    •Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox.

    • How to respond to and mitigate security risks faster and more reliably at a reduced cost.
  • Reduce time to detect and respond to cyber threats - without adding resources Recorded: Apr 26 2017 48 mins
    Chris Martin, LogRhythm Security Expert
    Today’s reality is that organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.

    In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.

    You’ll learn:

    • The definition and details of the TLM framework
    • How TLM enables you to sort through the noise to highlight and investigate concerning incidents
    • How TLM works to streamline processes through automated workflow
    • Specific use cases TLM can address to prevent major data breaches

    Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).
  • Is Your Organisation GDPR Ready? Recorded: Apr 25 2017 49 mins
    Steve Durbin, Managing Director, ISF LTD
    Many organisations are still unclear as to how they will meet the requirements of the EU GDPR legislation which will come into effect in May 2018. Fundamentally organisations need to start preparing for this now.

    In this webinar Steve addresses some of the key questions organisations are asking such as: does the EU GDPR regulation apply to me? how should I prepare for this legislation? and what additional resources do I need?
  • Surveillance, Then and Now: The Growing Need for Privacy & Security by Design Recorded: Apr 24 2017 64 mins
    Ann Cavoukian, Executive Director, Privacy & Big Data Institute at Ryerson University
    The growth of state surveillance appears to be escalating dramatically. With the most recent Wikileaks Vault 7 revelations, it is clear that independent oversight is totally lacking and yet, much-needed if we ever hope to curb such unwarranted surveillance. Transparency relating to such activities is essential in order to hold governments accountable for their actions. The need for both global privacy and security - by design, is growing on a daily basis, and will be outlined in this presentation, in an effort to move things forward.

    About the Presenter:
    Dr. Ann Cavoukian is recognized as one of the world’s leading privacy experts. She is presently the Executive Director of Ryerson University’s Privacy and Big Data Institute. Dr. Cavoukian served an unprecedented three terms as the Information & Privacy Commissioner of Ontario, Canada. There she created Privacy by Design, a framework that seeks to proactively embed privacy into design, thereby achieving the strongest protection possible. In 2010, International Privacy Regulators unanimously passed a Resolution recognizing Privacy by Design as an international standard. Since then, PbD has been translated into 39 languages. Dr. Cavoukian has received numerous awards recognizing her leadership in privacy, most recently as of the Top 100 Leaders in Identity (January, 2017).
  • Interview: CTO of Symantec on advanced cybersecurity Recorded: Apr 24 2017 22 mins
    Darren Thomson, CTO & VP of Technology, Symantec, EMEA & Andrew Bird, EA Visionary, Interview Moderator
    Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
    ----------
    BrightTALK caught up with Darren Thomson, CTO & VP of Technology, Symantec, for an in-depth conversation on the future of cybersecurity in the context of IoT, AI and Machine Learning.

    Among topics discussed:

    - Trending business vulnerabilities in 2017
    - Particularities of pentesting
    - How to prepare for GDPR in 2018
    - Implications of IoT, AI & machine learning on cyber security
    - Yahoo breach
    - Brexit and cybersecurity
    - Recommendations to CISO's developing security strategies

    About the speaker:
    Darren is an industry recognised IT innovator and strategist, with +20 years of industry experience. He is a published author. His latest work has recently been published by Wiley Co. and is entitled, “Delivering Utility Computing: Business Driven IT Optimisation”. Details can be found at www.amazon.com.
  • Human Factor Podcast : Stuart Coulson Recorded: Apr 21 2017 54 mins
    Jenny Radcliffe
    In this episode, I am delighted to talk to Stuart Coulson.

    Stuart has been involved in the information security industry for many years and has extensive experience and expertise of working with major corporations and assisting them with relevant online protection plans and security solutions.

    His current role at the Challenge sees him working with organisations to complement their existing strategies to fill the cyber skills gap.
  • Human Factor Podcast : Dr Daniel Dresner Recorded: Apr 21 2017 44 mins
    Jenny Radcliffe
    In this episode, I am delighted to chat to Dr. Daniel Dresner. Daniel’s LinkedIn profile tells us he is a consulting research analyst and lecturer. His mission is to find the threads that bind information together and mend them when they break. He contributed material to the Cyber Essentials and worked with a colleague to define the only real benchmark of cyber security. Being a proud father and grandfather motivated him to define ‘The Green Surf Code’.
  • Human Factor Podcast : Graham Cluley Recorded: Apr 21 2017 35 mins
    Jenny Radcliffe
    In this episode, I was delighted to be joined by Graham Cluley. Graham Cluley is a security blogger, researcher and public speaker. He has been a well-known figure in the computer security industry since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows.
  • Zero-Day Attacks and What To Do About It Recorded: Apr 20 2017 35 mins
    Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
  • BrightTALK at RSA 2017: Ben Bernstein on Cyber Attack Trends for 2017 Recorded: Apr 20 2017 10 mins
    Josh Downs, BrightTALK & Ben Bernstein, CEO, Twistlock
    BrightTALK caught up with Twistlock's CEO Ben Bernstein for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:
    - Trends in the cyber threat landscape
    - What companies can be doing to better improve their security posture
    - 2016's biggest breaches (including Yahoo) and why they happened
    - Preparations to take in advance of GDPR in May 2018
    - Cyber security in the financial sector
    - AI & Machine learning and the influence it'll have on the security industry

    About the Speaker:
    Ben Bernstein co-founded Twistlock, Inc. in 2015, and serves as its Chief Executive Officer. Ben has 14+ years of experience in enterprise security and operating systems. He is a Microsoft veteran with extensive experiences in both software development and product management. Ben is a veteran of the Israeli Intelligence Corps. He has a B.A cum laude in Computer Science from the Technion in Israel and an MBA with a scholarship of excellence from the Interdisciplinary Center in Israel. Ben hates writing about himself in third body.
  • Women in Cybersecurity: Is This a Good Time? Recorded: Apr 18 2017 62 mins
    Tamara Dull (SAS), Barbara Cosgriff (SAS), Debra Baker (Cisco), Jeanne Alley (LexisNexis), Jennifer Rosario (First Citizens)
    It is estimated that women make up 11 percent of the cybersecurity workforce. There’s no question that we need to get more women involved, especially as we move into this Internet of Things (IoT) era where data volumes are growing exponentially, and information security continues to be a hot topic amongst IT, executive boards, and everyone in between.

    In this all-women panel discussion, Tamara Dull will be talking with cybersecurity experts about its threat, the impact of technology, why women need to be involved, their advice for President Trump, and the landscape moving forward.

    Come prepared to listen, learn, ask your questions, and have a good time.

    Moderator:
    Tamara Dull, Director of Emerging Technologies, SAS Best Practices

    Speakers:
    - Barbara Cosgriff, Software Security Architect, SAS Institute
    - Debra Baker, Product Certifications Engineer, Cisco Systems
    - Jeanne Alley, Manager Global Information Security, LexisNexis
    - Jennifer Rosario, Manager IT Risk Governance, First Citizens Bank
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Exposing the Storefront…Protecting the BackEnd
  • Live at: Jun 3 2010 3:00 pm
  • Presented by: Cesar Alderete, Senior Software Engineer, Intel & Girish Juneja; Director of SOA Products, Intel
  • From:
Your email has been sent.
or close