Hi [[ session.user.profile.firstName ]]

The Role of Supervisors in Mitigating Security Threats

Cyber attacks are on the rise, both in volume and impact, and organizations worldwide are focusing on improving cybersecurity and data protection. A key aspect of this is raising security awareness across the organization. Join this presentation and learn about the the role supervisors play in awareness, preparedness and threat mitigation.

Viewers will learn:
- The types of insider cybercrimes
- Mitigating insider's factors in cybercrime
- Supervisors' value in the mitigation
- Preparation of supervisors for mitigation
Recorded Dec 8 2016 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Anita R. Wood, Assistant Professor, Computer Information Technology at Pennsylvania College of Technology
Presentation preview: The Role of Supervisors in Mitigating  Security Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [PANEL] Protecting & Maintaining Cloud Security Sep 24 2019 3:00 pm UTC 60 mins
    Ed Moyle (Prelude Institute) | Nathan Burke (Axonius) | Raef Meeuwisse, ISACA Expert Speaker (Cybersecurity for Beginners)
    As organizations are forced to adapt to the world around them, the amount and severity of threats continues to increase. In order to ensure security in the cloud, it is vital to protect and maintain IT systems and devices in the office and remotely. Join this panel of industry experts as they discuss cloud cyber hygiene strategies and solutions, including:

    - Cloud security protocol best practices
    - Strategies for cloud security success
    - IT Security hygiene in real time
    - Tools and technology to ensure cloud hygiene

    - Ed Moyle, General Manager and Chief Content Officer, Prelude Institute
    - Nathan Burke, CMO Axonius
    - Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners

    Join BrightTALK's LinkedIn Group for IT Security: http://bit.ly/2IsbauU
  • Livestream Discussion - Mitigating Business Risk in FinServ with Cybersecurity Sep 24 2019 1:00 pm UTC 45 mins
    Dearg OBartuin, Founders Bank | Cheri McGuire, Standard Chartered | Tony Fish | Robert Prigge, Jumio | Steven Holt, EY
    Cyber-attacks have cost the financial services industry more than any other sector, especially due to the extremely sensitive data and assets that they are gatekeeping.

    Join this panel to learn:
    -What is the current state of the cybersecurity in financial services?
    -Why is cybersecurity more of a business risk than a technology issue?
    -Best practices for detecting and preventing threats

    Robert Prigge, President, Jumio
    Tony Fish, Founder, AMF Ventures
    Dearg OBartuin, CTO, Founders Bank
    Steven Holt, Practice Lead - EMEIA FS Cybersecurity, EY
    Cheri McGuire, Group Chief Information Security Officer, Standard Chartered Bank
  • Ask the Expert: How to Automate Identity Verification in Financial Services Sep 24 2019 9:30 am UTC 30 mins
    Mohan Mahadevan, VP of Research, Onfido & Tony Fish, Founder, AMF Ventures
    The interplay of Humans and Machines in AI-based Automation

    Machine learning systems are now routinely performing complex tasks at unparalleled levels of performance across a wide range of applications. However, mission-critical applications such as those in financial services have a minimum tolerance for errors and error correction. Resultantly, the design of machine learning-based systems for such applications requires unprecedented levels of oversight and adaptability.

    An optimal system has the right level of interplay between humans and machines. Onfido employs a large number of machine learning models to deliver scalable, secure and frictionless identity verification for their clients, whilst giving clients accurate data they need to remain KYC compliant—so ensuring their models deliver real-world results is business-critical. In this interview we talk with Mohan Mahadevan, VP of Research at Onfido, to learn about how the constraints on these applications, the tradeoffs in an optimal system, and what the future looks like.

    Mohan Mahadevan, VP of Research, Onfido
    Tony Fish, Founder, AMF Ventures

    About Mohan

    Mohan is an expert in computer vision, machine learning, AI, data and model interpretability, previously leading research efforts at Amazon as Head of Computer Vision and Machine Learning for Robotic Applications. He has over 15 patents in areas spanning optical architectures, algorithms, system design, automation, robotics and packaging technologies. As Onfido’s VP of Research he leads Onfido’s team of specialist machine learning engineers and is focused on ensuring their systems work both in the lab and the real world.
  • A unified strategy on multi-cloud security Sep 23 2019 10:00 pm UTC 45 mins
    Jeremy Snyder, VP Business Development & International Strategy, DivvyCloud
    In this session, we'll discuss various approaches to managing multi-cloud security,

    Presented by:
    Jeremy Snyder, VP Business Development & International Strategy
    Jeremy has been in SaaS since 2002 and in the cloud since 2010. His career has been 5 startups (3 co-founded) and Amazon Web Services. Jeremy's been with DivvyCloud since 2016 and has worked with cloud customers in 4 continents to improve their security posture. Jeremy has a BA in Linguistics from the UNC and an MBA from GMU. Jeremy has lived in 5 countries and speaks more than 5 languages. Jeremy once went 3 days without seeing another human (although he saw dozens of reindeer) and another time got kicked off a train in central Sweden.
  • Why Multi-cloud Requires a “Zero Trust” Approach Sep 23 2019 9:00 pm UTC 45 mins
    Sandy Bird, CTO & Co-Founder, Sonrai Security
    Join Sonrai Security CTO & Co-Founder Sandy Bird present why a zero-trust security program is critical to public cloud platforms like AWS, Azure, & GCP

    Applications built on a public cloud requires a security model based on trust relationships between consumers of data and the data itself. Public clouds like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) all provide the ability to build applications with strong Identity and Access Management (IAM) policies.

    Unfortunately, the numerous IAM configuration options can quickly turn a unique opportunity to build security into applications into a security nightmare. Enterprises building in public cloud must ensure their security programs tightly control trust relationships to ensure adherence to the principles of least privilege and the segregation of duties. During this webcast you will learn:

    - A historical perspective on zero trust
    - Why the foundation of zero trust is critical for applications built in a public cloud
    - The potential risk that can be introduced by public cloud IAM configuration options
    - The importance of baselining and monitoring trust relationships in public cloud
    - Highlights of different public cloud IAM models
  • Strategies to Architect Security for Private, Hybrid, and Public Clouds Sep 23 2019 6:00 pm UTC 60 mins
    Predrag "Pez" Zivic, Sr. Security Solutions Architect
    World of kubernetes and cloud is very different from traditional data center world. This talk will address the differences between the two worlds for security professionals.

    The information about what security architects need to think about when designing overarching security architecture will be explored. Important foundational comparisons of different cloud-native architecture design and data center architecture will be reviewed. Distributed and centralized characteristics of the two different environments will be considered for security architecture design.

    Architecture attributes of cloud-native security architecture versus legacy data center security architecture will be reviewed. Ideas on how to alter security architecture models to meet dynamic nature of cloud technologies will be explored.

    This session will equip security architects with facts that will help them design future security implementations.

    Join BrightTALK's LinkedIn Group for IT Security: http://bit.ly/2IsbauU
  • [PANEL] Multiple Clouds, Multiple Concerns - Best Practices for Cloud Security Sep 23 2019 3:00 pm UTC 60 mins
    Clarify360 | Nuvalo| Optimized Channel | Palo Alto Networks | SonicWall
    According to Forrester's Cloud Security Solutions Forecast 2018 to 2023 report, the global spend for cloud security technologies will reach $12.7 billion by 2023, mostly driven by financial services organizations. This spend likely won't flow into a single vendor, as organizations are increasingly relying on several options for securing their clouds.

    Join this keynote panel of experts to learn more about the biggest trends in cloud security, as well as the best practices for securing your multi clouds:
    - Crucial steps companies should be taking as they move data and processes to multiple cloud environments
    - Understanding the shared responsibility model in the context of infrastructure-as-a-service (IaaS), software-as-a-service (SaaS), and platform-as-a-service (PaaS)
    - Protecting and planning for the future

    - Jo Peterson, Vice President, Cloud and Security Services, Clarify360

    - Manon Buettner, CEO & Co-Founder, Nuvalo
    - Michelle Ruyle, CEO & Founder, Optimized Channel
    - Fred Streefland, Chief Security Officer,, North and North East Europe, Palo Alto Networks
    - John Aarsen, Benelux & Nordics Solutions Architect, SonicWall

    Join BrightTALK's LinkedIn Group for IT Security: http://bit.ly/2IsbauU
  • [PANEL] Email Security Strategies and Solutions Sep 19 2019 3:00 pm UTC 60 mins
    Panelists TBA
    With email security breaches constantly making headlines, it is crucial for organisations to be ahead of the curve. Join this interactive panel of industry experts as they discuss the latest trends in email security and how to prevent becoming the next international headline.

    Join this Q&A panel to learn more about:

    -Emerging trends in email attacks
    -How to stay on top of the latest threats
    -Best solutions to protect your organisation
  • Machine Learning and AI in a Brave New Cloud World Sep 18 2019 5:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Machine learning platforms are one of the fastest growing services of the public cloud. ML, an approach and set of technologies that use Artificial Intelligence (AI) concepts, is directly related to pattern recognition and computational learning. Early adopters of AI have now rolled out cloud-based services that are bringing AI to the masses.

    How are AI, deep learning, machine learning, big data, and cloud related? Can machine learning algorithms enable the use of an individual’s comprehensive biological information to predict or diagnose diseases, and to find or develop the best therapy for that individual? How is Quantum Computing in the Cloud related to the use of AI and Cybersecurity?

    Join this webinar to learn more about:
    - Machine Learning, Data Discovery and Cloud
    - Cloud-Based ML Applications and ML services from AWS and Google Cloud
    - How to Automate Machine Learning

    Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
  • [PANEL] Getting Ready for CCPA Recorded: Sep 17 2019 59 mins
    Guy Cohen | Lisa Hawke | Joanne Furtsch | Laura Koulet
    The California Consumer Privacy Act (CCPA) is going into effect on January 1, 2020, making it America’s first-ever state data privacy law. It is also the most far-reaching privacy regulation in the U.S. to date.

    Join this panel of experts for an interactive Q&A session to learn more about what businesses need to do to prepare for CCPA. Attendees will also learn about the CCPA checklist, as well as dive into:
    - GDPR vs. CCPA
    - Which organizations need to plan for CCPA compliance
    - What to do to avoid the risk of fines
    - How to develop a strategy and start implementing tools to achieve compliance
    - More privacy legislation on the horizon

    - Guy Cohen, Strategy and Policy Lead, Privitar
    - Lisa Hawke, VP Security and Compliance, Everlaw
    - Joanne Furtsch, Director, Deputy Data Governance Officer, TrustArc
    - Laura Koulet, Vice President, Head of Legal & Privacy, Tapad
  • Seeking a SOC Recorded: Sep 17 2019 49 mins
    Johna Till Johnson, CEO and Founder, Nemertes Research
    Seeking a SOC? The Time is Right!

    If you're like most enterprise security professionals, you know you need a security operations center (SOC). But should you build out your own, engage a third party, or take a hybrid approach? This webinar provides you with the answers. Nemertes helps you make that decision, based on objective data from our research studies. And we provide a detailed playbook and roadmap for taking action.
  • Pivoting to a Career in Cybersecurity Recorded: Sep 12 2019 61 mins
    Teresa Merklin, Lockheed Martin Aeronautics Company
    This Lockheed Martin presentation introduces the concepts of career pivots for women who are contemplating or executing a pivot as well as anyone who might have the need to navigate a career pivot in the future. Keys to successful career pivots are identified and the general steps to be performed are described. Specific considerations for pivoting into careers in cybersecurity are also provided.
  • CCS [Ep.2]: Mastering Multicloud - Architectures, Organizations, Building Blocks Recorded: Sep 12 2019 57 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Cloud and Cybersecurity Series [Ep. 2]: Mastering Multicloud - Architectures, Organizations, Building Blocks

    In 2019 the balance tipped, and for the first time the majority of enterprise IT workloads are running in the cloud, not in a data center.

    Enterprise IT staff need to stop thinking of cloud solutions as islands of function and special cases and begin to think of pulling it all together into a cohesive multicloud. We'll lay out the major categories of tools and systems and how they fit together, and at the organizational structures and operational practices needed to support multicloud operations.

    This webinar presents the highlights of Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries. Later episodes will discuss cloud organizations and operational practices, and success metrics and best practices for cloud organizations.
  • [Earn CPE] Preventing Data Breaches with a Scalable Verification Program Recorded: Sep 10 2019 75 mins
    Panelists: Nathan Rowe, Evident ID; Jeremy Grant, the Better Identity Coalition; Jon Lehtinen, Thompson Reuters.
    Consumer demand is driving the corporate IT environment. Business demands for IT are changing rapidly — so too are the demands on IAM — resulting in the requirement to adopt emerging technologies (e.g., mobile and cloud computing, data loss prevention, and social media) earlier and more quickly. Scalability is critical for any business that wants to catalyze short- and long-term success. A flexible workflow for identity verification can help organizations of all sizes with limited time, resources, and funding to focus their efforts on initiatives that support positive growth. While your business might be conducting background checks today, it could have different verification needs in the future to ease onboarding friction, prevent data breaches, and demonstrate regulatory compliance.

    It’s important to begin laying the groundwork now for a more sophisticated and intricate verification program so you can be proactive, not reactive, but what does a scalability strategy look like? In this CPE accredited panel webinar our experts will address how to create identity and credential verification workflows that can scale with your organization as it grows, including how to:

    - Gain a better understanding of the digital identity landscape,
    - Ensure accuracy of both data sources and verification records,
    - Centralize verification of multiple data sources into a unified platform,
    - Evaluate new developments like biometrics, AI, and blockchain, and how they can impact identity and data management,
    - Save money in the long-term by laying the groundwork for adaptable online verification workflows,
    - Adapt and respond to new regulations.
  • Breach Detection and Response - The whole business challenge Recorded: Sep 10 2019 30 mins
    Ade Taylor, CTO, ITC Secure
    Technical detection is now just the starting point for a series of exercises which will see the entire business work together to identify what happened and to mitigate the results.

    In this session, you will learn:

    - How EDR and MDR are morphing into BDR
    - Why BDR is a challenge for the whole business
    - How technology can help, and how it doesn’t

    In this 30 minute webinar Ade will discuss how the world of cyber-security detection and response is changing, fast. From IT and technical analysts to the CEO via HR, this is a problem for the whole business to solve together.
  • CCS[Ep1]: Next-Generation Cybersecurity - Success Metrics, Best Practices & More Recorded: Sep 5 2019 59 mins
    Johna Till Johnson, CEO & Founder, Nemertes Research
    Cloud & Cybersecurity Series [Ep.1]: Success Metrics, Best Practices & More

    What does it take for enterprise cybersecurity teams to "up their games" to the next level of cybersecurity? What does it mean to be a "successful" cybersecurity organization, and what technologies and practices does it take to become one?

    This webinar presents the highlights of Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.

    We separated the best from the rest, and took an in-depth look into what made the most successful organizations that way. Participants will come away with best practices, tools, technologies, and organizational structures that contribute to success. Most importantly, they'll learn how to measure cybersecurity success--and their progress towards it.
  • Why Cybersecurity and Physical Security Belong Together Recorded: Sep 4 2019 51 mins
    Min Kyriannis, Head of Cybersec, Jaros, Baum & Bolles & Valerie Thomas, Exec Information Security Consultant, Securicon
    In this webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA), cybersecurity consultants Min Kyriannis (Jaros, Baum & Bolles) and Valerie Thomas (Securicon) will explore the important relationship between cybersecurity and physical security.

    Drawing lessons from real-world threats and attacks, our speakers will look at how cybersecurity vulnerabilities can be used to compromise physical security systems and why cybersecurity of IT systems depends on controlling physical security. We’ll discuss why CSOs, IT leaders, cybersecurity professionals and vendors/service providers all need to be paying attention to the cybersecurity of physical systems, and we’ll discuss what it means to drive security convergence at both strategic and operational levels, and how new technologies like AI factor into today’s converged security models.

    Key Focuses:
    •How to evaluate and improve the cybersecurity of cyber-physical systems
    •How threat actors are targeting cyber weaknesses in physical security systems
    •Why security convergence matters and what the relationship between cybersecurity and physical security teams can look like
    •How new technologies like AI are evolving security

    Key Topics: Cybersecurity, Physical security, Security convergence, Hacking, Hackers, cyber-physical systems, Security management
  • Speed Matters in AppSec: How to Start Improving Your Fix Rate Recorded: Sep 3 2019 40 mins
    Pejman Pourmousa, Vice President, Services, Veracode and Amy DeMartine, Research Director, Forrester Research
    The most important function of an application security program is effectively fixing flaws once they’re discovered. But the speed of that fix rate matters — the time it takes for attackers to come up with exploits for newly discovered vulnerabilities is measured in days, and sometimes hours. Yet our most recent State of Software Security report found that one in four high and very high severity flaws aren’t addressed within 290 days of discovery.

    Improving your fix rate is critical, but the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.

    This might seem like an insurmountable problem, but our data also presents hopeful glimpses at potential prioritization and software development methods that could help organizations reduce risk more quickly. In this session, we’ll share some steps and best practices that will start lowering your fix rate.

    This session is part of Veracode's "Your AppSec Game Plan" Summit.
  • Shifting Security Right: Know What Web Apps You Own Recorded: Sep 3 2019 34 mins
    Bipin Mistry, Director of Product Management, Veracode
    It’s more common than you think that organizations and brands have more web apps than they realize. In fact, Veracode customers often find roughly 30 per cent more applications than they knew about. With one project Veracode worked on for a high street bank in the UK, they discovered 1,800 websites that had yet to be logged.

    There are a number of reasons unknown or unlogged web applications continue to live in your portfolio. For example, through M&A activity, more than just a company or brand is acquired – you also acquire their web assets. Further, the digital landscape is decorated with marketing promotional sites meant to attract attention. And the very thing meant to draw attention to your brand and boost your bottom line is the same target attackers go after to infiltrate your organization.

    Join this session to learn how to uncover unknown web applications in your portfolio to ensure their security from cyberattackers.

    This session is part of Veracode's "Your AppSec Game Plan" Summit.
  • Practical Steps to Start Using Open Source Code More Securely Recorded: Sep 3 2019 42 mins
    Javier Perez, Director of Product Management, Veracode
    Open source frameworks have changed the business world in profound ways. They’ve ushered in a level of speed, innovation, and convenience that significantly alters the IT equation. With large numbers of developers and others contributing to a project, it’s possible to advance and evolve software in ways that wouldn’t have been imaginable in the past. What’s more, this form of open collaboration benefits everyone by making software available at a lower cost point — and sometimes even at no cost.

    Make no mistake, open source software libraries are here to stay – and they can introduce new and sometimes dangerous risks to an enterprise. The use of open source code increases the number of users affected as well as the number of exposure points. It’s vital to have a strategy and framework in place to manage open source libraries and components. Otherwise, the road to digital transformation will likely be paved with frustrations, problems, and even failures.

    Open source software risks revolve around three key areas: visibility, security, and governance.

    In this session we will help you understand these factors and how to formulate a stronger cybersecurity strategy that protects you from open source risk.

    This session is part of Veracode's "Your AppSec Game Plan" Summit.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Role of Supervisors in Mitigating Security Threats
  • Live at: Dec 8 2016 5:00 pm
  • Presented by: Anita R. Wood, Assistant Professor, Computer Information Technology at Pennsylvania College of Technology
  • From:
Your email has been sent.
or close