Hi [[ session.user.profile.firstName ]]

Cyber Threats and Disaster Recovery after Hurricane Harvey

The devastating impact of Hurricanes Harvey and Irma across Texas and Florida will continue to live long after the waters have receded. How are enterprises, small businesses, government agencies and non-profit organizations prepared for the disruption caused by Harvey and Irma?

If anything, these hurricanes are a stark reminder that all organizations need to have a disaster preparedness and business continuity plans in place to help with recovery from major natural catastrophes.

Join this interactive panel as we discuss:
- The aftermath of Hurricanes Harvey and Irma
- Impact on cybersecurity and how to avoid falling for a Harvey or Irma cyber scam
- Need for business continuity and disaster recovery planning
- Recommendations for crafting the right BCDR strategy and enabling recovery following a disaster

- Joseph George, Vice President Product Management at Sungard Availability Services
- Mark Weatherford, Chief Cybersecurity Strategist at vArmour
- Inigo Merino, Founder & CEO at Cienaga Systems
Recorded Sep 12 2017 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joseph George (Sungard Availability Services), Mark Weatherford (vArmour), Inigo Merino (Cienaga Systems)
Presentation preview: Cyber Threats and Disaster Recovery after Hurricane Harvey

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Trends in Cyber Attacks and Breaches Dec 11 2018 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    As the scale, sophistication, and targeting of cyber-attacks increase, organisations need to manage risk in ways beyond those traditionally handled by the information security function.

    In this webinar, Steve Durbin, Managing Director at the ISF will offer his insights into how security and business teams across the entire organisation can work together to minimise the impact of a breach, in order to protect organisations from damaging shareholder value and business reputation.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Security in the Golden Age of Cloud Oct 23 2018 12:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    Demand for cloud services continues to increase as the benefits of cloud services change the way organisation manage their data and use of IT.

    However, while these services can be implemented quickly and easily, with increased legislation and data privacy, the threat of cyber theft is on the increase and organisations must have a clear understanding of where their information is stored and how reliant these services are.

    In this webinar, Steve Durbin, Managing Director of the ISF will discuss the risks associated with cloud computing and how to manage them, as well as how to maximise the benefits.

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats Sep 18 2018 12:00 pm UTC 45 mins
    Nick Frost, Principal Consultant, ISF LTD
    With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:

    ‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
    ‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
    ‒ end-to-end, covering the complete information life cycle.

    This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.

    In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
  • [Ep.18] Founders Spotlight: Paul Kurtz, Co-founder & CEO of TruSTAR Aug 21 2018 5:00 pm UTC 45 mins
    Paul Kurtz, Co-founder & CEO of TruSTAR
    This webinar is part of BrightTALK's Founders Spotlight Series, where each week we feature inspiring founders and entrepreneurs from across industries.

    In this episode, Paul Kurtz, an internationally recognized expert on cybersecurity and the co-founder and CEO of TruSTAR Technology, will share his insight and expertise into the threat intelligence and security industry.
    - What it means to found and run a security start up
    - Where is the industry headed in the age of cyber attacks and high-profile breaches
    - How to scale and grow a business in this hi-tech industry

    Paul will be taking questions from the live audience so this session will be an excellent opportunity for any entrepreneurs or security professionals out there to have their questions answered.

    About the Speaker:
    Paul began working on cybersecurity at the White House in the late 1990s. He served in senior positions relating to critical infrastructure and counterterrorism on the White House's National Security and Homeland Security Councils under Presidents Clinton and Bush. After leaving government, Paul has held numerous private sector cybersecurity positions including founding the Cyber Security Industry Alliance (Acquired by Tech America), Executive Director of SAFECode, Managing Partner of Good Harbor Consulting in Abu Dhabi, and CISO of CyberPoint International.

    Paul’s work in intelligence analysis, counterterrorism, critical infrastructure protection, and non-proliferation of weapons of mass destruction influenced his approach to cybersecurity. Specifically, the fields highlighted the need to build an exchange platform which addresses barriers to sharing information--bureaucratic, legal, and market risk and concerns--while providing immediate value to operators defending networks.
  • The SNIA Persistent Memory Security Threat Model Aug 21 2018 5:00 pm UTC 75 mins
    Doug Voigt, Co-Chair, SNIA NVM Programming TWG and Distinguished Technologist, HPE
    What new security requirements apply to Persistent Memory (PM)? While many existing security practices such as access control, encryption, multi-tenancy and key management apply to persistent memory, new security threats may result from the differences between PM and storage technologies. The SNIA PM security threat model provides a starting place for exposing system behavior, protocol and implementation security gaps that are specific to PM. This in turn motivates industry groups such as TCG and JEDEC to standardize methods of completing the PM security solution space.
  • [Webcam Panel] Trends Discussed at Black Hat 2018 Aug 15 2018 5:00 pm UTC 60 mins
    Charles Tendell (The Charles Tendell Show) | Eddie Lamb (6point6) | Other Panelists TBA
    Join this post-Black Hat panel as we look at the biggest trends and cyber threats covered during the Black Hat Conference 2018 in Las Vegas.

    Tune in for an interactive Q&A panel with industry experts across the security ecosystem as they discuss:
    - What are the biggest threats to security in 2018?
    - Key steps to take today to better secure your critical data assets
    - Top technological advancements powering security
    - CISO strategy in the age of breaches

    - Charles Tendell, Renown Cybersecurity Expert, Certified Ethical Hacker & Host of "The Charles Tendell Show"
    - Eddie Lamb, Managing Director, Cyber Security at 6point6
    - Other Panelists TBA

    The session is being brought to you in partnership with ITSPmagazine.
  • How to Manage Cyber Risks in a Regulatory Environment with Security Analytics Aug 14 2018 3:00 pm UTC 45 mins
    Ashwin Chaudhary, Accedere Inc
    With increased security and privacy regulations such as the new EU GDPR, it is becoming more important to reduce the dwell time of incidents to be able to report those breaches in the required time. For example GDPR requires you to report them in 72 hours.

    Please join me to discuss how Security Analytics can help you do that on August 14, 2018
  • [Webcam Panel] What to Expect at Black Hat 2018 Jul 31 2018 5:00 pm UTC 60 mins
    Sean Martin (ITSPmagazine) | Eddie Lamb (6point6) | Other Panelists TBA
    Join this panel of industry experts as they share their experiences and thoughts on one of biggest security conferences in the world, Black Hat in Las Vegas, along with their expectations from this year's event.

    Tune in for an interactive Q&A panel with some of the biggest names in infosecurity to learn more about:
    - What can security professionals learn during Black Hat / DEF CON week
    - Must-attend events and why
    - What's new on the cyber threatscape
    - Advances in technology
    - AI: Hype vs Reality
    - Common sense advice for CISOs
    - How to keep your employees cyber safe

    - Sean Martin, Co-Founder and Editor-in-Chief, ITSPmagazine
    - Eddie Lamb, Managing Director, Cyber Security at 6point6
    - Other Panelists TBA

    The session is being brought to you in partnership with ITSPmagazine.
  • Threat Hunting - An Indepth Explaination Jul 23 2018 4:00 pm UTC 60 mins
    Lance James, Andrew Johnston and Ulf Mattsson
    Threat Hunting is a complicated and often misunderstood cybersecurity activity that if properly used can add tremendous value to your cybersecurity posture.

    In this session you will learn:
    What is Threat Hunting?
    When do I use it?
    What will it tell me?
    How do I use it?
  • Zero to Hero: Blissfully Ignorant to Risk Focused Jul 19 2018 9:00 pm UTC 60 mins
    Casey Reid, Principal Security Engineer, Tenable
    Innovation is the key to survival in today's Digital economy. Providing fresh content in new ways to broader markets is expanding the attack surface. The adoption of DevOps, cloud proliferation and enterprise IoT has added significant challenges to understanding your Cyber Risk.

    In this webinar Casey Reid, Principal Security Engineer at Tenable will talk about:
    - Why there no such thing as "Secure"
    - How the "Race to Zero" is killing your productivity and increasing your Cyber Risk
    - How "Chasing the Zero Day" could be a big waste of time
    - What it takes to be Risk focused: Going from Zero to Hero

    About the Speaker:
    Casey Reid is a Principal Security Engineer at Tenable, responsible for helping enterprise customers reduce their Cyber Exposure and strengthen their Vulnerability Management program. He is an energetic, outspoken, problem solver and hobby hacker with over 15 years of diverse technical experience. When he's not learning new technologies or hacking in his lab, he is competing at local CrossFit competitions and Obstacle Course Races such as the World's Toughest Mudder.
  • Trends in Security Analytics & Threat Intelligence Jul 17 2018 9:00 pm UTC 60 mins
    Anupam Sahai (Cavirin) | Setu Kulkarni (WhiteHat Security) | Yiyi Miao (OPSWAT)
    Discover the trends in security analytics technology and how leveraging threat intelligence can help organizations on their journey to cyber resilience.

    Join this interactive Q&A panel with top security experts across the ecosystem to learn more about:
    - What's new on the threatscape
    - How to leverage security analytics to investigate and hunt modern threats
    - How cyber threat intelligence helps organizations understand their risk of external threats
    - CISO recommendations for improving security

    - Anupam Sahai, Vice President of Product Management, Cavirin
    - Setu Kulkarni, VP Product & Corporate Strategy, WhiteHat Security
    - Yiyi Miao, VP Products, OPSWAT
  • Best Practices for Securing Your Enterprise Jul 17 2018 12:00 pm UTC 60 mins
    Panelists TBA
    Cybercriminals are constantly innovating ways to infiltrate your organization, and steal your valuable data. With an ever expanding attack surface, security professionals are struggling to secure the enterprise.

    Join this roundtable discussion with top security experts to learn more about:
    - What's new on the cyber threat landscape
    - Why cyber threat intelligence Is more critical than ever
    - How to prevent and protect against breaches
    - What tools and approaches should security teams use
    - Why network visibility and actionable data about attackers is key
    - Best practices and expert recommendations on improving your enterprise security
  • [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program Jun 26 2018 5:00 pm UTC 75 mins
    Rebecca Herold. Panel: Jake Olcott, BitSight; Todd Boehler, ProcessUnity; Matt Kunkel, LogicGate; Scott Schneider, CyberGRX.
    As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.

    Learning objectives:

    - Find out why traditional vendor risk management programs don’t work
    - Learn how to perform quantifiable vendor security analyses
    - Discover how to build a scalable VRM program
  • Increasing Cyber Workforce Diversity Jun 20 2018 8:00 pm UTC 60 mins
    Max Shuftan, Jessica Gulick and other panelist
    Join this webinar to hear from past students and current champions discuss how the SANS CyberTalent program is changing lives and closing the workforce gap. The cybersecurity workforce gap can be partly solved through increasing diversity. Organizations like SANS CyberTalent and the WSC are reaching into communities throughout Maryland and the US searching for professionals with technical appitude but new to cybersecurity.

    These academies are designed to help qualified veterans and women receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in six to eight months, depending upon program selected. The program is at NO COST to the students selected.

    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • Hear from a recent graduate who will share her experience
    • How this training academy and related certifications can help your career
  • PCI Dream Team: Ask Us Your Toughest Questions [Part 4] Recorded: Jun 15 2018 60 mins
    Ben Rothke | David Mundhenk | Jeff Hall | Arthur Cooper
    With hundreds of different requirements, the various Payment Card Industry (PCI) standards can be overwhelming. While the PCI Security Standards Council has provided lots of answers, the devil is often in the details. Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

    Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive Q&A session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.

    - Ben Rothke, Principal Security Consultant at Nettitude
    - David Mundhenk, Senior Security Consultant at Herjavec Group
    - Jeff Hall, Principal Security Consultant at Optiv Security
    - Arthur Cooper "Coop", Senior Security Consultant at NuArx
  • Embrace the Suck: How to Protect IoT Devices You Can't Change Recorded: Jun 14 2018 47 mins
    John Bambenek, VP Security Research and Intelligence at ThreatSTOP
    In the past few years manufacturers have been taking products that have existed for years or decades already and decided to put computers in them and connect them to the Internet. From cars, to smart home devices like Echo, to smart meters, to elevators, there has been orders of magnitude more devices that are now connected.

    The problem is that, in most cases, you can't make any real changes to them so how do you apply controls and maintain the security of your network with thousands of these devices now being connected that you may not even be able to log in to? There are perceptions of what threats these devices can pose, but there are life-safety risks that are not adequately addressed.
  • The Internet of Insufficiently Safe Things Recorded: Jun 14 2018 49 mins
    Charles Arthur, Author of "Cyber Wars: Hacks That Shocked the Business World"
    The business model around many IoT devices leads naturally to a situation where many can be exploited by malicious code to create botnets with minimal opportunity to monitor them.

    Even though there are companies which are taking action, the existence of any “defector” from a secure standard creates problems. Coordinated government action, at least incorporating kitemarks, is needed. But the nature of software could mean that even that is a forlorn hope.

    About the Speaker:
    Charles Arthur is the author of Cyber Wars: Hacks That Shocked the Business World, published by Kogan Page. He is a journalist who has been writing about technology, science and medicine for over 20 years, most recently as technology editor at The Guardian from 2005-2014 and previously from 1995-2004 at The Independent. He lives in Essex.
  • Building Trust and Security into the IoT Recorded: Jun 14 2018 47 mins
    Gil Bernabeu, Technical Director, GlobalPlatform
    The IoT landscape is exploding, with predictions of more than 20 billion connected objects worldwide by 2020. But protecting and securing data, devices and services in this dynamic, ever- expanding landscape presents significant challenges. Many of today’s connected objects do more than simply provide information at your fingertips – they can make use of sensitive data, gather information and even impact the physical world. Because of this, there is a need for ubiquitous end-point security, regardless of the use case, to prevent devices from becoming a platform for attacks.

    To be able to trust today’s digital services and devices, the IoT ecosystem needs to be built on a proven security foundation. Years away, right?
    Wrong. GlobalPlatform Specifications are readily available to the IoT community today, to protect service providers, device manufacturers and consumers on the edge.

    In this presentation GlobalPlatform, will provide an overview of:
    - The increasingly urgent need for robust security in IoT objects and the principles that must be addressed if the IoT market is to fully evolve;
    - The value that GlobalPlatform specifications and frameworks deliver to IoT stakeholders to address their security and privacy concerns;
    - How GlobalPlatform’s new Device Trust Architecture framework empowers all actors in the value chain to seamlessly deliver, and securely manage, digital services and devices.
  • How to Get Yourself Cyber-Ready in an Era of Unknown Threats Recorded: Jun 14 2018 64 mins
    Magda Chelly, Managing Director, Responsible Cyber
    With an increase of IoT adoption and a 99% connectivity by 2020, users, including businesses of IoT technology must consider the impact on privacy and security of those new gadgets. In fact, we are exponentially increasing our risk surface, in alignment with the growth of connected end points.

    Did you ever asked your manufacturer, are you adopting a Privacy and a Security By Design approach?

    Nowadays, with the data breaches on the first page of all magazines, we clearly are doing it all wrong, and are unable to protect our systems and data properly.

    How are we going to tackle the challenges of an interconnected complex ecosystem, interacting with billions of ''gadgets'', across networks and systems?

    In this talk, you will hear from one of the advocates of cyber security inclusion and diversity, how to prepare or get yourself cyber ready in an era of unknown threats.
  • Auditing IoT Recorded: Jun 14 2018 49 mins
    R.V. Raghu, CISA, CRISC ISACA Board Director Director, Versatilist Consulting India Pvt, Ltd
    The internet of everything is around us whether we like it or not. Organisations are increasingly relying on IoT for all aspects, making the need for auditing IoT increasingly critical.

    Join this interactive webinar to:
    - Understand current and potential IoT usage
    - Appreciate the concerns that will need to be addressed
    - Establish audit considerations for IoT
    - Learn how to conduct IOT audits based on a framework approach.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyber Threats and Disaster Recovery after Hurricane Harvey
  • Live at: Sep 12 2017 5:00 pm
  • Presented by: Joseph George (Sungard Availability Services), Mark Weatherford (vArmour), Inigo Merino (Cienaga Systems)
  • From:
Your email has been sent.
or close