Hi [[ session.user.profile.firstName ]]

Cyber Security and the Boardroom Relationship

The boardroom understanding what ‘cyber security’ really means, is going through a radical transformation. In many ways, our business leaders are a little late to the table for this particular feast, but their leadership and strategic thinking are vital if they are to steer their business ships through the challenging cyber-waters ahead. Research shows that many boards are well behind the joined up thinking demonstrated by cyber-criminal groups. But what does this mean for the business world at large?
Recorded Nov 30 2016 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Gillespie, VP C3i Cybersecurity, Cybercrime & Cyber Intelligence Group
Presentation preview: Cyber Security and the Boardroom Relationship

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Emerging Data Privacy and Security for Cloud Jul 18 2019 12:00 pm UTC 58 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data.

    The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.

    Join this interactive webinar to learn more about:
    - The latest trends and strategies for securing sensitive data in cloud and the enterprise
    - How to discover and capture your data inventory
    - What’s needed to prevent a data breach by securing your critical data and protect your reputation
  • Using Threat Intelligence in the Security Operations Center Jul 17 2019 3:00 pm UTC 60 mins
    Roselle Safran, President, Rosint Labs
    For security operations centers (SOCs), threat intelligence can be overwhelming and distracting or it can be a powerful asset that improves SOC efficiency and effectiveness.

    Join this presentation to learn how to make the most out of threat intelligence and productively apply it to all the key functions of SOC operations – prevention, detection, and response. Attendees will learn a framework for using threat intelligence in the SOC as well as processes that can be readily incorporated into workflows.

    About the Speaker:
    Roselle Safran is President of Rosint Labs, a cybersecurity consultancy that provides operational and strategic direction to security teams, leaders, and startups.
  • Golden Chickens: Threat Actor Deep Dive Analysis Jul 17 2019 12:00 pm UTC 60 mins
    Chaz Hobson & Daniel Young, QuoScient GmbH
    Cyber Threat Intelligence (CTI) analysis and investigation is critical to identifying, tracking and efficiently countering threat actors and adversarial techniques. In this webinar, we will dive into the Golden Chickens threat actor family uncovered and show you how to rapidly identify and derive actionable intelligence for this threat actor. In this presentation, you will see:

    In depth overview of this emerging threat actor and their primary targets
    The analytic methodology that led to the uncovering of this threat actor
    Drive this analysis of complex and multifaceted adversaries
    Understand the steps that can be taken to identify and mitigate this and other related threat actors


    Speakers:
    Chaz Hobson: Senior Threat Intelligence Analyst, QuoLab
    Daniel Young: IR Lead and Senior Sales Engineer, QuoLab
  • Introducing Adaptive Threat Response Jul 17 2019 10:00 am UTC 60 mins
    Robin Smith CISSP, CISM, CISA – Cyber Security Researcher, Lifeboat Foundation
    This webinar examines the imperative to introduce greater agility into threat response. There are too many orthodoxies dictating cyber standards, limiting an organisations ability to move quickly once threats to standards and services are identified.

    This webinar will provide an insight into new methods for threat response that focus on lean methods to speed responses and deliver an improved security posture for the organisation.
  • Fighting Cyber Crime: Tips, Tools and Tech Jul 16 2019 3:00 pm UTC 60 mins
    Chris Roberts (Attivo), Nathan Wenzler (Moss Adams), Ali Golshan (StackRox), Kevin Sheu (Vectra)
    According to a recent FBI report, cyber crime cost organizations $2.7 billion in 2018. Business email scams that targeted wire transfer payments accounted for almost half of that.

    How are businesses protecting against cyber crime? What are the best practices when it comes to cyber crime prevention, breach detection and data security in general?

    Join this panel of experts from the industry as they discuss the latest trends in cyber crime and how organizations can get a step ahead of attackers.
    - New in cyber crime
    - Is ransomware still a threat?
    - Biggest priorities when it comes to cyber threat prevention
    - Tips from the front lines of security
    - Tools, technologies and policies that make security professionals' lives easier
  • Demystifying Hacking Jul 16 2019 10:00 am UTC 60 mins
    6point6 Cyber Lab Expert
    The world of hacking remains a mystery for many. In this webinar, our 6point6 Cyber Lab ethical hackers will demystify hacking by running a live demo and will discuss tips on what you can do protect yourself from hacks.
  • Prevailing Trends in Cyber Crime Jul 15 2019 3:00 pm UTC 60 mins
    Robin Smith (Rosint Labs), Bob Rudis (Rapid7) + Panelists TBD
    The average cost of a malware attack on a company is $2.4 million, according to Accenture. Organizations need to ensure they are following cybersecurity best practices in order to mitigate risk.

    Join this interactive Q&A panel to learn more about:
    • What’s new on the threatscape
    • The latest hacking tools, strategies and methods and how to protect against them
    • How to implement proactive strategies rather than reactive
    • Recommendations for improving security and steps to take today
  • Evolving Cyber Crimes and its effective counter-measures Jul 15 2019 10:00 am UTC 60 mins
    Ravikumar Ramachandran, Account Security Officer, DXC Technology India
    Join this presentation to learn about the present types of cyber crimes and the scale and efficiency of it and the methods to counter it.
  • [PANEL] Email Security Strategies and Solutions Jul 9 2019 3:00 pm UTC 60 mins
    Panelists TBA
    With email security breaches constantly making headlines, it is crucial for organisations to be ahead of the curve. Join this interactive panel of industry experts as they discuss the latest trends in email security and how to prevent becoming the next international headline.

    Join this Q&A panel to learn more about:

    -Emerging trends in email attacks
    -How to stay on top of the latest threats
    -Best solutions to protect your organisation
  • [PANEL] Proactive Security Strategies and Best Practices Jul 4 2019 3:00 pm UTC 60 mins
    Panelists TBA
    In today’s business landscape it is important to take a proactive approach to security rather than a reactive approach. Join leading security experts as they discuss the safest ways to protect your organisation in 2019 and beyond.

    Join this Q&A panel to learn more about:

    - Key organisational benefits to practising proactive security
    - Technologies powering security
    - Best practices and recommendations for a more secure organization
  • What I Learned at Gartner Summit 2019 Jul 2 2019 4:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    The Gartner Summit 2019 agenda featured five comprehensive programs to cover your security and risk management key priorities and challenges. Digital transformation continues to challenge the conventions of information risk and security management. It requires a coherent digital security program based on a clear vision and strategy. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level.

    The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value.

    Gartner includes data ethics and privacy on their list of the top 10 strategic technology trends of 2019, placing it on the same level as AI-driven development, blockchain, and edge computing. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data.

    The cloud, SaaS applications, and user mobility are powerful enablers of digital transformation, but many IT organizations are grappling with legacy network and security architectures that haven't evolved in decades. In the era of Cloud 3.0, companies are re-imagining business processes from and for the cloud. With these new opportunities comes a new cybersecurity reality for IT leaders in a hybrid, multicloud world. At a minimum, cloud computing breaks into 3 primary layers: SaaS, PaaS and IaaS.

    This presentation will explain primary security controls. You’ll learn how to take a strategic approach to risk, improve business and data resilience, build digital trust and implement a new generation of continuously adaptive security strategies. Cloud security remains a top priority. This presentation summarizes the problems, recommended processes, and new product types to address key issues.
  • [Earn CPE] Executive's Guide to Smarter GRC with Cybersecurity Attack Analytics Jun 27 2019 5:00 pm UTC 75 mins
    Panelists: Sam Abidir, Lockpath; James Rice, Greenlight Technologies; Ilia Sotnikov,Netwrix; and Jason Bonds, Ping Identity.
    Today’s increasing organizational complexity and evolving threat environment have made it more critical than ever for organizations to clearly identify their exposures, measure vulnerability risk, and quickly prioritize remediation efforts. Cyberattacks are often hidden from view under a mountain of alerts generated by security systems, giving attackers time to gain access to systems and seize valuable data.

    To ensure their companies don't end up in the headlines for the wrong reasons, corporate governance, risk management, compliance management and other “lines of defense” functions need to rethink their security strategy and take an approach that looks at behavior and attack patterns. By conecting cybersecurity attack analytics with risk programs and GRC work streams, executives can increase visibility into the overall security risk of the organization which makes the investigation of application security events easy, and enables teams to mitigate and respond to real security threats quickly and decisively.

    Join this CPE panel webinar for insights on achieving smarter GRC with CAA. We will share:

    - Why traditional endpoint security is failing to see and stop attacks.
    - How using attack analytics can stop cyberattacks now and in the future.
    - Efficient ways to analyze events and prevent threats.
    - How to move from looking back to real-time and forward-looking GRC monitoring.
  • Emerging Data Privacy and Security for Cloud Recorded: Jun 25 2019 59 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data.

    The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.

    Join this interactive webinar to learn more about:
    - The latest trends and strategies for securing sensitive data in cloud and the enterprise
    - How to discover and capture your data inventory
    - What’s needed to prevent a data breach by securing your critical data and protect your reputation
  • [PANEL] Breach Protection - Best Practices, Tips and Tools Recorded: Jun 24 2019 54 mins
    David Morris | Nick Vigier | Kalani Enos
    As more and more organizations are getting breached, executives are finally paying attention to cybersecurity and data protection. What are the biggest challenges for businesses when it comes to securing the enterprise?

    Join this panel of experts to learn more about the current state of breaches, how organizations of all sizes are coping, and what CISOs are prioritizing this year.

    Attendees will learn more about:
    - Who is most at risk of being breached
    - How to prevent a breach or minimize its impact
    - How long it takes to detect a breach
    - Best practices for investigation and remediation
    - Words of wisdom from the experts

    Speakers:
    - David Morris, Managing Partner, Morris Cybersecurity
    - Nick Vigier, CxO Advisor, Coalfire
    - Kalani Enos, Founder & CEO, kenos Technologies
  • The New Age of Multi-Factor Authentication Recorded: Jun 18 2019 53 mins
    Lysa Myers & Cameron Camp, Security Researchers
    Trying to navigate the stormy seas of multi-factor authentication (MFA) to find the “killer app” both you and your organization can use to bolster security? In this webinar, we look at:

    - The various factors of authentication
    - Factor vs “steps”
    - Considerations in choosing a factor
    - The various technologies that people are using
    - What seems to be working

    Whether you’re pondering Near Field Communication (NFC) ninja tech for your smart phone, or those new biometric doo-dads that verify you based on the smell of your ears (really), we can help you sort out what might work for you and what would be crazy to implement. And as a bonus: this tech will all keep you far safer that your plain old password ever did.
  • How to Operate a DDoS Testing Program Recorded: Jun 13 2019 55 mins
    Murray Goldschmidt, Co-founder & COO, Sense of Security
    Most people associate DDoS with large scale volumetric attacks. This is far from reality. Many organisations subjected to DDoS attacks are therefore unlikely to identify them or mitigate them because they simply don’t know what defences work against the huge range of attack vectors out in the wild.

    DDoS is much more than experiencing degraded performance; and the operational response is as important as the technology in place to attempt to prevent the attack. Unfortunately most vulnerability management program focus on scanning and penetration testing and simulating genuine DDoS attacks is seldom on the agenda. Resilience against Denial of Service should be as prominent in IT Networks as safety is in the automotive or airline industry.

    Have you ever tested your system defences and response capability?
  • IoT Threats & Vulnerabilities in Healthcare Recorded: Jun 12 2019 33 mins
    Jordan Kelly, Senior Managing Director at FTI Consulting
    Cybersecurity affects us all. Malicious actors are constantly scanning vulnerable systems of companies across all sectors, and healthcare organizations are a particularly attractive target. They are often responsible for the safety and security of confidential patient records, which is valuable information for malicious hackers. While the use of innovative technology in healthcare is on the rise, the industry faces tremendous risks from cyber threats due to this growing attack surface and the prevalence of dated medical hardware and software across the supply chain. This session will discuss the IoT threats facing the healthcare sector, as well as strategies for managing and mitigating threats. 

    Join this webinar to learn about:
    - Why the healthcare industry is a highly-targeted industry for cyber attacks
    - What Internet of Things (IoT) technology is and how it’s being leveraged for crime
    - Why legacy medical hardware and software exacerbates IoT-based risks
    - How to manage and mitigate IoT risk in the healthcare sector
  • [PANEL] Best Practices for Minimizing Your IoT Cyber Risk Recorded: Jun 12 2019 63 mins
    Kalani Enos, KEnos Technologies | Michael Goldgof, Barracuda | Nathan Wenzler, Moss Adams
    The Internet of Things is expected to grow to 30 billion devices within the next two years. This means more security and privacy risks that organizations will need to address. Learn how businesses are dealing with their IoT risk, the best practices cybersecurity professionals are recommending, and get the answer to your most pressing IoT security questions.

    Join this interactive panel to learn more about:
    - How the rise of IoT is impacting your organization's security
    - Cybersecurity threats and most common IoT vulnerabilities
    - Assessing your organization's IoT risk
    - Best practices for minimizing your cyber risk
    - Words of wisdom: Steps to better security and what you can do today

    With: Michael Goldgof, Senior Director, Product Marketing, Barracuda
    Kalani Enos Founder & CEO KEnos Technologies LLC
    Nathan Wenzler, Senior Director of Cybersecurity, Moss Adams
  • Protecting Billions of Things: Challenges in exploiting & hardening next- Recorded: Jun 12 2019 42 mins
    Sumanth Naropanth, CEO, Deep Armor
    Internet of Things (IoT) products proliferate the market today. They manifest in different forms – from a pacemaker inside a human body, to an oil and gas rig monitoring device in the remotest locations on the planet. IoT products are usually made up of small hardware devices (gateways and nodes) deployed in the field, supported by much larger software stack in the form of mobile and cloud-hosted applications that complete the product ecosystem picture.

    In our presentation, we discuss threats against industrial and consumer IoT products. We demonstrate how it is possible to use cheap, publicly available hardware and open source software tools to break into Zigbee-style Wireless Sensor Networks to compromise the confidentiality and integrity of IIoT platforms (think, turning life-saving vaccines into lethal chemicals!). On the consumer IoT front, we show - with simple Android applications, how we are able to exploit vulnerabilities in Bluetooth and BLE flows. We conclude with an analysis of why such vulnerabilities occur, and how we can reform existing SDLC practices to make them relevant for next-generation technologies.
  • Keynote: The Break to Build Method Recorded: Jun 11 2019 42 mins
    Ted Harrington Executive Partner, Independent Security Evaluators
    This keynote is designed to address the seemingly overwhelming collection of security concerns with which today’s leaders contend:

    - Do you struggle with designing and implementing a security program that effectively achieves the goals outlined in your security mission?
    - Are you interested in better understanding how hackers think, how they operate, and how to defend accordingly?
    - Do you struggle to know where to invest resources in order to best deliver security to your organization?
    - Are you concerned about your organization suffering a security incident under your watch?
    - Are you seeking more certainty that by investing resources into a given security approach, that investment will deliver the outcomes you seek?
    - Do you have the appetite and capacity for change?

    If any of this describes you, this is the keynote for you! An engaging blend of research-based issue analysis combined with storytelling, this keynote seeks to empower today’s security leaders, teaching attendees how to:

    - Implement a 3-phase action plan, based on years of practical experience in security research and security consulting, designed to help equip leaders to deal with modern attackers.
    - Define and implement a threat model.
    - Differentiate between assessment methods.
    - Understand level of attacker intensity.
    - Challenge conventional wisdom
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber Security and the Boardroom Relationship
  • Live at: Nov 30 2016 3:00 pm
  • Presented by: Mike Gillespie, VP C3i Cybersecurity, Cybercrime & Cyber Intelligence Group
  • From:
Your email has been sent.
or close