Hi [[ session.user.profile.firstName ]]

Protecting Corporate Assets: Best Practices for Data Encryption

In this webcast, you will learn about how to protect corporate assets using data encryption. We will share with you advances coming out of research and development labs, the impact mobile and virtualization will have on data protection, and the role of compliance in dictating the need for stronger encryption.

Sandra Gittlen, Editor at SLG Publishing (moderator); Winn Schwartau, Chairman at Mobile Active Defense; Steve Orrin, Director of Security Solutions at Intel; Phil Hochmuth, Program Manager of Security Products at IDC
Recorded May 5 2011 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sandra Gittlen, SLG Publishing; Winn Schwartau, Mobile Active Defense; Steve Orrin, Intel; Phil Hochmouth, IDC
Presentation preview: Protecting Corporate Assets: Best Practices for Data Encryption

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Live Video Panel - Creating a Winning Security Strategy for 2020 Dec 2 2019 11:30 am UTC 45 mins
    Panel of industry experts
    Join security experts as they review the past 12 months and discuss security strategies, solutions and tools for success in 2020 and beyond.

    Discussion topics will include:

    - The key factors CISOs should consider for their cybersecurity strategy
    - The current and future threatscape
    - Platform Security for 2020
    - Technological solutions that make CISOs' lives easier
    - How organizations are coping with the shortage of qualified security workforce
    - How CISOs can better communicate their strategy to the board

    Panellists
    Richard Agnew - VP EMEA - Code42

    Moderator to be confirmed

    Security Strategy, CISO, Cyber Security, IT Security, Best Practices, Skills shortage, Network Security, Cyber Defence, Breach Prevention, Data Security, Email Security, Vulnerabilities, Cloud Security
    "
  • Ask the Expert - Interview with Richard Agnew - VP EMEA - Code42 Dec 2 2019 9:30 am UTC 30 mins
    Paige Azevedo & Richard Agnew, VP EMEA, Code42
    Join this interactive interview with Richard Agnew - VP EMEA - Code42

    Code42 is the leader in data loss protection. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, helps satisfy regulatory compliance requirements and speeds incident response – all without lengthy deployments, complex policy management or blocking user productivity. Because the solution collects and indexes every version of every file, it offers total visibility and recovery of data – wherever it lives and moves. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak and theft while maintaining an open and collaborative culture for employees.

    Richard brings a broad base of sales and management experience to Code42, gained through years leading regional teams within internationally recognised brands such as Veeam, NetApp, and Dell. Outside of work, Richard is an avid cyclist who competes in a number of local organised cycling events.
  • [PANEL] Email Security Strategies and Solutions Nov 28 2019 4:00 pm UTC 60 mins
    Panelists TBA
    With email security breaches constantly making headlines, it is crucial for organisations to be ahead of the curve. Join this interactive panel of industry experts as they discuss the latest trends in email security and how to prevent becoming the next international headline.

    Join this Q&A panel to learn more about:

    -Emerging trends in email attacks
    -How to stay on top of the latest threats
    -Best solutions to protect your organisation
  • The Day When Role Based Access Control Disappears Nov 25 2019 5:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    We will discuss the Good, the Bad and the Ugly of Role Based Access Control. We will review access control in systems where multiple roles are fulfilled and compare MAC, DAC and RBAC.

    We will present the "next generation" authorization model that provides dynamic, context-aware and risk-intelligent access control. We will discuss Identity Management, Data Discovery, AI, policy-based access control (PBAC), claims-based access control (CBAC) and key standards, including XACML and ALFA.
  • [PANEL] How to Simplify Cyber Risk Management? Nov 20 2019 5:00 pm UTC 60 mins
    Panelists TBA
    In today’s multi-cloud and hybrid environments, CISO's are struggling to secure assets, manage security policies across clouds, monitor and mitigate risks, while also supporting the business. How are CISOs solving the challenge of complexity?

    Join this panel of experts to learn how to simplify cyber risk management as well as maximize the value of your team and technology.
    - Risk scoring and security controls
    - How to identify risks for organizations and their third-party vendors
    - How to prevent, detect, and respond to, privacy and network security incidents
    - Best of vulnerability and risk management in a multi-vendor environment
    - Best practices and use cases across industries
  • Emerging PCI DSS v4 Data Security and Privacy for Hybrid Cloud Nov 20 2019 5:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    The upcoming PCI DSS version 4.0 will include many new or revised requirements and compensating controls will be removed It will include support for a range of evolving payment environments, technologies, and methodologies for achieving security. PCI DSS v4.0 further supports the use of different new technologies. The new validation option gives organizations the flexibility to take a customized approach to demonstrate how they are meeting the security intent of each PCI DSS requirement. This customized approach supports organizations using security approaches that may be different than traditional PCI DSS requirements.

    Through customized validation, entities can show how their specific implementation meets the intent and addresses the risk. Unlike compensating controls, customized validation will not require a business or technical justification for meeting the requirements using alternative methods, as the requirements will now be outcome-based.

    We will discuss how PCI DSS v4 may impact:

    - Implementation of the new “Customized Controls”
    - Cloud implementations
    - Compliance cost
    - Changes in liability
    - Relation to the 49 new US State Laws
    - PII and PI privacy
    - Measure data re-identifiability for pseudonymization.
    - Apply data protection to discovered sensitive data
  • Cyber Security is Not a Department: Building an Information Security Culture Nov 15 2019 12:00 am UTC 45 mins
    Amy McLaughlin, CISM, CHPS Director of Information Services, Student Health, Oregon State University
    All organizations face ongoing threats from phishing attacks, insider threats, and other trajectories. It is evident that no organization will be able to hire or afford enough cyber security to mitigate or intercept every risk. Security strategy has to start with building a culture in which every employee is responsible for information security. A culture that imbues employee with the training and situational awareness to identify and respond (or not respond, as the case may be) to incoming threats. This webinar explores ways to move beyond everyday security awareness to an integrated security culture.
  • Benefits of Soft Skills in Security Nov 14 2019 10:00 pm UTC 60 mins
    Rosielle Vengua, Sr. Security Engineer, Nordstrom
    The insider threat continues to top all IT security threats. Conventional threat prevention measures primarily consist of annual security training and inserting security early into a project/product lifecycle to ensure incorporation throughout the design. However, these methods have stagnated in mitigating the largest category of insider threat: unintentional/non-malicious.
     
    This presentation provides anecdotal and empirical evidence via a real-life use case,metrics, and testimonials of soft skills as essential characteristics for a modern organization’s security evolution.  Specifically, it addresses the universal reality of internal-organization perceptions of security. New soft skill methods are then offered to overcome communication barriers with internal and external business/technology partners while also promoting a continual working relationship. The result of these improved relationships is project teams viewing security as an essential team member during all phases of an application/product lifecycle, plus the increased security of applications/products released. Secondary gains include maximizing cooperation and collaboration, creating opportunities to teach security concepts and proactively build security into the team’s processes and procedures, and fostering a team’s willingness to self-report security findings and vulnerabilities. As a whole, these behaviors exemplify a security culture that prevents and mitigates the unintentional/non-malicious insider threat.
  • CISO Mind Map: Today's Key Cybersecurity Focus Areas Nov 14 2019 4:00 pm UTC 45 mins
    Roselle Safran, President, Rosint Labs
    The CISO position is now a multifaceted role that encompasses technical capabilities, legal/GRC requirements, and personnel and project management - all while not losing sight of the main objective: business enablement. This webinar will discuss what is important today for both new CISOs who are building their nascent security programs and seasoned CISOs who are maturing their established security programs.

    Topics covered will include:

    - Strategic initiatives that are top of mind for security leaders
    - Optimal combinations of in-house and outsourced talent
    - Technology essentials and non-essentials
    - Communicating reports, metrics, and other pertinent information to stakeholders
  • CISO as Commander: The Path from Strategy to Action. Nov 14 2019 1:00 pm UTC 45 mins
    Griff James, Director, Damrod Analysis Ltd.
    In cyber security the strategic goals are often clear, while the methods to achieve those goals is anything but. This webinar introduces Damrod’s Cyber Strategic Framework that applies military analysis to cyber security challenges. Aimed at security teams trying to implement high level goals in the real world, this talk focuses on effects based planning that integrates disparate elements of IT and security into a cohesive package. Defending the network is about more than technology. Analysis and leadership are critical elements of an effective cyber defense. You will leave this webinar better equipped to develop the tactics that make strategy a reality.
  • Advanced PII/PI Data Discovery Nov 13 2019 9:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Join this interactive webinar as we discuss using advanced PII/PI discovery to find & inventory all personal data at an enterprise scale.

    Learn about new machine learning & identity intelligence technology, including:
    - Identify all PII across structured, unstructured, cloud & Big Data.
    - Inventory PII by data subject & residency for GDPR.
    - Measure data re-identifiability for pseudonymization.
    - Uncover dark or uncatalogued data.
    - Fix data quality, visualize PII data relationships
    - Automatically apply data protection to discovered sensitive data.
  • Q4 2019 Community Update: IT Security Nov 13 2019 5:00 pm UTC 60 mins
    John McCumber, (ISC)² | Dan Lohrmann, Security Mentor, Inc | Marija Atanasova, BrightTALK
    Find out what's trending in BrightTALK's IT Security community and the challenges keeping security professionals up at night.

    Join John McCumber, Director of Cybersecurity Advocacy at (ISC)², Dan Lohrmann, Chief Strategist & Chief Security Officer at Security Mentor, Inc., and Marija Atanasova, Content Strategist from BrightTALK for an interactive Q&A session to learn more about:

    - Key challenges for security professionals
    - Insights from the (ISC)² 2019 Cybersecurity Workforce Study
    - What to expect in 2020 and beyond
    - Events in the community
  • [PANEL] CISO Challenges & Opportunities Nov 13 2019 4:00 pm UTC 60 mins
    John Bambenek, ThreatSTOP Inc. | Yotam Gutman | Cyber Mktg Pros | Thomas J. Harrington, Securonix | Michal Jarski, Tenable
    What keeps CISOs up at night? What challenges are they facing on a daily basis? And what opportunities are they seeing in the industry?

    Join experts from leading security organizations as they discuss strategies, solutions and technologies CISOs use in the face of on-going security challenges:

    - Strategies for breach prevention
    - Strategies for making the most of AI technology and human talent
    - New technologies on the horizon
    - Security strategy recommendations

    Moderated by:
    John Bambenek, VP Security Research and Intelligence at ThreatSTOP, Inc.
    Thomas J. Harrington, Associate Deputy Director (Retired), Federal Bureau of Investigation; Managing Director and Chief Information Security Officer (Retired), Citi, Strategic Advisory Board, Securonix
    Michal Jarski, Territory Manager, Tenable
    Yotam Gutman, Community Manager, Cyber Marketing Pros
  • The New Edge Services Security Recorded: Nov 13 2019 42 mins
    Predrag “Pez” Zivic Sr. Security Solutions Architect, Pensando
    This presentation will discuss the current sprawl of different firewall and micro-segmentation appliances and software agents and present an approach on how to solve this challenge.

    Today different firewalls and micro-segmentation tools and agents are deployed for network zones, bare metal servers, virtual machines and container environments. This implementation of many disparate security tools creates operational and security problems. To eliminate these challenges, new approach will be introduced which moves services security to the server edge.

    New architecture approach to distributed firewalls and micro-segmentation will be elaborated on. Benefits of new edge services security will be demonstrated. Attendees will learn how to take control and implement security at the server edge.
  • The cyber threat landscape in the digital age Recorded: Nov 12 2019 47 mins
    Sushila Nair, Security Offer Leader, NTT DATA
    Businesses are reinventing themselves, leveraging technology and data to optimize and find new streams of revenue. This session will look backwards over the last year and discuss the threat landscape. We will then look into the future and examine the impact of digital transformation and how that is impacting threats and risk. Finally, We will examine how the enterprise can build security and resilience into the business of tomorrow.
  • [PANEL] Threatscape 2020: Strategies for Better Security Recorded: Nov 12 2019 59 mins
    Jo Peterson (Clarify360) | Jessica Bryar (Masergy) | Wade Woolwine (Rapid7) | Jeff Barto (DigiCert)
    Join this keynote panel with security experts as they discuss the biggest threats organizations are facing and their strategies for better security in 2020:
    - The threat landscape in 2020
    - Key priorities for CISOs
    - Best practices for improving security

    Speakers:
    - Jo Peterson, VP Cloud Services at Clarify360
    - Jessica Bryar, Global Account Manager at Masergy
    - Wade Woolwine, Director, Managed Services, Rapid7
    - Jeff Barto, Trust Strategist, DigiCert
  • Wargaming for Cyber Defenders Recorded: Nov 12 2019 41 mins
    Griff James, Director, Damrod Analysis Ltd.
    Tools and solutions are not always technology. This webinar introduces techniques from military wargaming to cyber conflict. You will learn how to identify your assets, assess threats, and allocate defenses. Wargaming is a vital tool to test theories and improve responses by visualizing the ebb and flow of detection, protection, response, and recovery.
  • The Rise of Surveillance Mobile Malware Recorded: Nov 11 2019 42 mins
    John Bambenek, VP Security Research and Intelligence at ThreatSTOP, Inc.
    With the increase in mobile and smart devices, we've expanded the threat landscape not only against threats to steal information, but for threats that have real physical risks. For instance, recent research by Google Project Zero and Volexity showed sophisticated attacks against both Android and iPhone devices that were targeted at Uighur Muslims and Tibet. Victims of this malware are targeted for persecution by the government of the People's Republics of China.

    This talk will cover not only these attacks in specific, but in how threats are emerging that use new technologies which are being used to create physical threats to its victims and what that means for enterprises, SMBs, and society at large.

    Takeaways:

    - Technical discussion on mobile surveillance techniques and malware.
    - Cover real-world instances where such cyber attacks have led to physical harms.
    - Discuss practical techniques to begin to mitigate such threats.
  • [PANEL] The 2020 Cyber Threat Landscape Recorded: Nov 11 2019 60 mins
    Michelle Drolet, Towerwall | Nathan Wenzler, Tenable | Griff Jones, Damrod | Mark Forrest,Cryptshare
    The threat landscape continuously evolves and adapts, requiring organizations to have a high level of security visibility. Join industry experts as they discuss which threats need to be on your radar and how to prepare for them:

    -The threat landscape in 2020
    -Best practices and recommendations for a more secure organization
    -Solutions and strategies for 2020 and beyond

    Michelle Drolet, CEO, Towerwall (moderator)
    Griff Jones, Director, Damrod Analysis
    Mark Forrest, CEO, Cryptshare AG
    Nathan Wenzler, Technical Security Director, Tenable
    Zoë Rose, Ethical Hacker
  • What I learned at The 2019 ISSA International Summit Recorded: Nov 6 2019 63 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    This session will discuss what attendees learned at The ISSA International Summit 2019, held on October 1-2 at in Irving/Dallas, TX.

    Learn from one of the presenters at this conference and what cybersecurity professionals got to share and learn from the leaders in the industry.

    Over the last 30 years ISSA international has grown into the global community of choice for international cybersecurity professionals. With over 100 domestic and international chapters, members have world wide support with daily cyber threats that are becoming increasingly intricate and difficult to prevent, detect, and remediate.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Protecting Corporate Assets: Best Practices for Data Encryption
  • Live at: May 5 2011 4:00 pm
  • Presented by: Sandra Gittlen, SLG Publishing; Winn Schwartau, Mobile Active Defense; Steve Orrin, Intel; Phil Hochmouth, IDC
  • From:
Your email has been sent.
or close