Hi [[ session.user.profile.firstName ]]

Vetting a Cloud Service Provider

Examining the issues facing small to medium enterprises when choosing a cloud service provider. This presentation will give an overview of what areas and questions the SME procurer should consider to make an informed decision about adopting new cloud services.
Recorded Jun 16 2011 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Emma Webb-Hobson, Information Assurance Consultant, QinetiQ
Presentation preview: Vetting a Cloud Service Provider

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security on a Shoestring Oct 14 2021 1:30 am UTC 45 mins
    Ashwin Pal | Director Cybersecurity | Unisys Asia Pacific
    It is now widely known that SMBs are a key target for cyber criminals. They are now seen as the ‘low hanging fruit’ as SMBs generally cannot afford the same investment in cyber security initiatives when compared to larger firms. Unfortunately, as far as the cyber criminals are concerned, anyone on the internet is fair game. Unlike their larger counterparts, a cyber attack on an SMB can be very debilitating and can even cause the business to shut down. SMBs face their own unique challenges when it comes to defending against cyber-attacks. Within this presentation, you will hear about how the Invictus Games in Sydney in 2019 was secured using minimal funding and time as a case study. We will then explore some of the unique challenges faced by SMBs when it comes to cyber security. We will look at how focusing on your core business and risk management helps direct efforts to the right places in a cost effective manner. We will then explore what a typical attack looks like and discuss the basics that need to be covered to provide an SMB with an ability to defend itself from cyber-attacks while avoiding overspend.
  • Protecting Critical Web APIs: Evolution of Attack Vectors & Defense Strategies Jul 15 2021 9:00 pm UTC 45 mins
    David Senecal, Sr. Director of Product Architecture & Research | Spandan Brahmbhatt, Sr. Data Scientist, Arkose Labs
    Web APIs that handle critical workflows like login or new accounts creation are constant targets of attacks. Web site owners need to protect these endpoints in order to prevent account takeover as well as the proliferation of fake accounts.

    In this presentation, we’ll look through real examples at how attackers evolve their strategies as soon as protections are in place. We’ll also provide some insights into the most effective detection methods in order to counter the evolution and to stay ahead.

    And finally, we’ll discuss how the evolution of the Internet ecosystem is affecting the web security world and make the task more complex.
  • Comprehensive Cloud Migration: Making Cloud SecOps a Success Jul 15 2021 1:00 pm UTC 60 mins
    Panelists to be confirmed
    Cloud migration has been a focus for many enterprises over the last few years, and this has only been accelerated and driven by the move to remote working and work from anywhere. According to Deloitte, more than 90% of global enterprises will rely on hybrid cloud by 2022. While cloud migration is increasing, the threat landscape is too, which is why cloud SecOps should be an organisational priority.

    Join security experts in this interactive panel as they discuss:
    - How the pandemic impacted the rate of cloud migration
    - Whether cloud migration was done properly during the pandemic or if it was rushed, and the impact of this on your security posture
    - How cloud SecOps can improve response time and mitigation
    - The future of cloud migration
    - Cloud SecOps best practices
  • The Future of IT Security: Best Practices for Adopting SASE Jul 15 2021 10:30 am UTC 60 mins
    Panelists to be confirmed
    SASE, or Secure Access Service Edge, is growing in popularity at a rate few had anticipated. According to Gartner, 40% of enterprises will consider SASE adoption by 2024, compared with only 1% in 2018. But what can SASE do for your network security that other network security solutions can’t, and what does the future of SASE look like?

    Join security experts as they discuss:
    - Why SASE has exploded in the network security space
    - SASE adoption best practices
    - Why private VPN technology is no longer sufficient
    - What SASE looks like in 2021
    - Whether SASE is here to stay, and if it truly is the ‘future of network security’
  • Cyber Authors Ep.5: Big Breaches: Cybersecurity Lessons for Everyone Jul 14 2021 5:00 pm UTC 60 mins
    Neil Daswani President of Daswani Enterprises | Sushila Nair VP Security Services NTT DATA
    The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone―not just techies―to become informed and empowered on the subject of cybersecurity.

    Knowing this, author Dr. Neil Daswani covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, and unencrypted data in his latest book, Big Breaches: Cybersecurity Lessons for Everyone.

    In this session, Neil Daswani is joined by Sushila Nair where they’ll discuss:
    - Effective prevention and detection countermeasures
    - Meta-level causes of breaches
    - Crucial habits for optimal security in your organization
    - and much more!

    Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, this webinar will answer your questions and prepare you for the future of cyber security.

    This episode is part of Cyber Authors, a new series with Sushila Nair. We welcome viewer participation and questions during this interactive interview.
  • How Moving to the Cloud Changed Security Strategy Forever Jul 14 2021 5:00 pm UTC 45 mins
    Nathan Wenzler | Chief Security Strategist | Tenable
    Organizations have been moving to the cloud for several years now, but in the last year, our world has forced nearly everyone to leverage the scalability and speed of cloud platforms to support a remote workforce. With so many critical business functions running from these providers, it's imperative to protect our data, systems and assets. But traditional strategies struggle to keep up with the scope and scale of the modern cloud environment, which is forcing a change in how we approach our security assessments and mitigation techniques.

    In this presentation, we'll discuss the benefits and challenges presented to many organizations by the sudden move to cloud-based services and a newly remote workforce focused on business continuity, not security. We'll also talk about some of the new ways we must evolve how we approach security and our internal programs to better align with the fast-paced and ever-changing nature of cloud services and assets and protect our organizations effectively, efficiently and at the speed required by today's modern attack surface.
  • The Dual Mission of the CISO in 2021 Jul 14 2021 3:00 pm UTC 60 mins
    Jo Peterson, Clarify360 | Dr Rebecca Wynn | Further panelists to be announced shortly
    The CISO community has demonstrated flexibility, tenacity and perseverance throughout the last 18 months.  As the world moves past the pandemic, CISOs are continuing to adapt their organizations.  For many there is a dual mission to enable organization growth as well as a need to prepare and protect for the unforeseen.

    What is clear is that most organizations expect disruption, on some level, to continue for the foreseeable future.

    In this session, we’ll discuss a five pronged approach with tools and tips to help CISOs prepare:

    • Budget and Reserve Budget
    • Emerging Threat Mitigation
    • Maximizing Current Technology Investments
    • Utilization Review to include Optimization and Automation Efforts
    • Fostering Innovation with Emerging Tech

    Moderated by Jo Peterson, Vice President, Cloud and Security Services, Clarify360
    Panelists include: Dr Rebecca Wynn
  • Securing What’s Next: Exploring CISO Trends and Insights Jul 14 2021 1:00 pm UTC 60 mins
    Panelists to be confirmed
    Today’s CISO faces very different operational challenges than ever before. From securing remote workers and ensuring secure remote access, to navigating returns to the office and the onset of the hybrid-workforce. Other challenges include vendor consolidation. Gartner found that 78% of CISOs have 16 or more tools in their cybersecurity vendor portfolio, and too many vendors result in complicated security operations. But what are the main problems faced by CISOs today, and what tools are needed to navigate risks?

    Join security experts across the industry as they discuss:
    - How the pandemic shifted security operations
    - Securing the hybrid workforce
    - Vendor consolidation, and the ramifications of too many vendors
    - Identity-first security
    - What the next year has in store for security professionals
  • Arming Against Phishing, Ransomware & Social Engineering: A Modern Approach Jul 14 2021 10:30 am UTC 60 mins
    Panelists to be confirmed
    Cyber threats like phishing, ransomware and social engineering are more prominent today than ever before. In fact, 75% of organisations around the world experienced some form of phishing attack in 2020 (Proofpoint). But what is causing this increase, and what does 2021 hold in store for cyber crime?

    Join this interactive panel as security experts discuss:
    - The most imminent threats facing organisations worldwide
    - Why cyber attacks increased throughout 2020, and what to expect in 2021
    - Lessons from cyber attacks, and how to integrate these learnings into your security solutions
    - Best practices in the workplace to improve cyber security
  • Remote and Hybrid Workplace Endpoint Security Jul 13 2021 3:00 pm UTC 60 mins
    Panel of experts
    Endpoint security remains a major challenge for organizations, and in November 2020, Cybersecurity Ventures predicted that global cybercrime costs will reach $10.5 trillion USD a year by 2025. That’s more than triple the amount that it was in 2015. With remote working still very much the norm, and hybrid workforces emerging, it is becoming increasingly difficult to keep track of multiple endpoints and the risk they carry.

    With the threatscape continuing to evolve and cyber attacks becoming even more sophisticated, experts are here to share how security leaders can take the complication out of endpoint security.

    Join us to learn:
    - Common endpoint threats from the first half of 2021
    - Emerging endpoint threats and what to prepare for going forward
    - Leading endpoint protection strategies and how they can be integrated into your existing security solutions
    - And more

    Moderator: Masha Sedova, Co-Founder & President, Elevate Security
    Panelists: Ian Goodhart, Director of Security Operations, Maryland Department of Information Technology (DoIT)
    CyberArk (participant to be confirmed)
  • Rethinking DevSecOps in 2021 Jul 13 2021 1:00 pm UTC 60 mins
    Panelists to be confirmed
    While in the past, security was isolated to your security team, in the era of collaboration, security operations are now a shared responsibility. DevSecOps represents a huge area of corporate change, both culturally and to your infrastructure - a change that not all businesses are prepared to make. But if the pandemic and the events of the last year have taught us anything, it’s that we should always be prepared for change.

    Join this panel as industry experts discuss:
    - Key principles and best practices for integrating security into your DevOps teams
    - The future of DevSecOps, and why it’s more important now than ever before
    - The trends and challenges faced by DevSecOps leaders
    - How to initiate and support a cultural change within your DevOps teams
    - Where DevOps and security overlap, and how to find a common goal
    - Recommendations for improving your security posture in 2021
  • Managing Multi-Cloud Security in 2021 Jul 13 2021 8:30 am UTC 60 mins
    Panelists to be confirmed
    93% of enterprises already have a multi-cloud strategy in place (Flexera 2020 State of Cloud Report). Multi-cloud security protects data and applications from advanced, sophisticated security threats. Some other benefits include reduced costs and better service delivery. But what are the main multi-cloud security trends you can expect to see in 2021?

    Join cloud and security leaders as they discuss:
    - The benefits of multi-cloud solutions for your security posture
    - The challenges associated with a multi-cloud strategy and how to navigate and overcome these challenges
    - The cloud security landscape of 2021
  • 2021: The Ultimate Reality Check for Cybersecurity Jul 12 2021 9:00 pm UTC 45 mins
    Michael Kennedy | Paul Dobbins | Heidi J.K. Fessler | Mike Thompson
    We all hear about the large-scale data hacks events that have made global headlines recently. But far from the glare of media attention, organizations of all sizes are increasingly being targeted by cybercriminals due to insecure endpoints.

    In this session, our panel of cybersecurity experts will share how real-life threat events during the pandemic have forever changed the cyber threat landscape, and strategies for combating new-age threats in the face increasing endpoint visibility and control challenges.

    We’ll also share how recent high-profile cyber attacks are still impacting the business world, and what changes organizational leaders can anticipate from recent public hearings and governmental actions.

    Michael Kennedy, Co-Founder & CTO, Ostra Cybersecurity
    Paul Dobbins, Chief Growth Officer, Ostra Cybersecurity
    Mike Thompson, Cyber Security Incident Response Team - Incident Case Manager - Team Lead, FR Secure
    Heidi J.K. Fessler, Founder, Innova Law Group, PLLC
  • Walking the tightrope - Balancing Usability with Security Jul 12 2021 5:00 pm UTC 45 mins
    Zoe Mora, Information Security Manager, Iron Mountain Data Centers
    Endpoint security is a balancing act between security and privacy controls, and providing usability to the end user. Endpoint security should be invisible to the user and not get in the way of daily tasks. If we apply too many security controls users will find ways around them effectively removing the control.
  • Federated Learning and Preserving Data Privacy Recorded: Jun 23 2021 62 mins
    Eric Topham | Dr. Pedro Baiz | Max Robbins | Rajeshwar Bhandaru
    Businesses rely on AI models that transform data into actionable insights. Traditional methods for creating AI models require a lot of data that is collected at some central location. Federated Learning (FL), however, takes a different approach by turning the centralised paradigm on its head and moving models or functions to be executed to where the data is.

    As a distributed process that does not require a single depository of data and where different parties can train an AI model without having to share the data, FL can be used in situations where data privacy is paramount.

    This paradigm shift is also creating new opportunities to democratize AI, which has the potential to transform the data economy.

    Join this month's episode of the Business Intelligence Report with Eric Topham, Co-Founder & Data Science Director at The Data Analysis Bureau, to learn more about how FL works and what opportunities it creates for consumers and enterprises.

    Viewers will also hear from the experts about the different use cases for federated learning, especially in the context of customer privacy, regulatory compliance, and integrating siloed data. The topics up for discussion will include:
    - The emergence of FL
    - FL, the democratization of data and what this means for Big Tech
    - How FL can be used as a privacy-preserving technology
    - Business use cases for FL
    - How FL can be part of your data strategy

    Speakers
    - Dr. Pedro Baiz, Royal Society Entrepreneur in Residence at Imperial College London and Head of AI at eXate
    - Max Robbins, CEO of AI Market
    - Rajeshwar Bhandaru, Enterprise Data Architect at Suez

    This episode is part of The Business Intelligence Report original series with Eric Topham, Co-Founder & Data Science Director at The Data Analysis Bureau. We welcome viewer participation and questions during this interactive panel session.
  • Cloud Security Trends Recorded: Jun 17 2021 46 mins
    Leena Bongale, Manager – Data Analytics & Governance, TD Bank | Pankul Chitrav, Sr. Developer, TD Bank
    Cloud trends change with the introduction of new technology and evolving business requirements. When cloud technology first came into the picture, there was both a sense of anticipation and major questions about security. The hyperactive cybercrime industry kept some end users conflicted about adopting cloud technology. Still, the technology has come a long way since its inception in overcoming concerns related to security. As we have seen in the recent years security breaches in large organizations point out that some of these security problems present as data breaches while others deal with access control.

    Whatever the issue, it concerns decision makers greatly when making a choice of software or solution. Cloud Security will continue to evolve on several levels.

    For more insights into trends in cloud security and the current issues around cloud security and their solutions, join our presentation to understand the Cloud Security Trends and what your organization can do to stay ahead in the game!

    About the presenters:
    Leena Bongale, Manager – Data Analytics & Governance, TD Bank.
    Leena has extensive IT experience, with specialization in IT Security & Risk Management. Leena has been invited to several virtual conferences to speak on various technical topics round IT Risk & Control.
    Pankul Chitrav, Sr. Developer, TD Bank.
    Pankul is a versatile developer, with expertise in .NET, DevOps, Jenkins, Octopus and recently Azure Cloud.
  • A Top-Down View of Cloud Risk Recorded: Jun 17 2021 45 mins
    Roselle Safran, CEO & Founder, KeyCaliber
    The migration to the cloud comes with risks and rewards. Understanding the risks early on and addressing them proactively can allow an organization to reap the benefits of the rewards without facing unreasonable risk. To assess risk effectively, organizations should take a top-down approach where they focus on the high value cloud assets first. This session we will discuss the top-down approach and cover:

    * How to define a high value cloud asset
    * How to determine which cloud assets are high value
    * How to assess the risks to high value cloud assets
    * How to develop baseline controls for high value assets
  • Managing Cloud Risk and Security in 2021 Recorded: Jun 17 2021 60 mins
    Jo Peterson | Nicolas Moy | Stan Lowe | Jim Fulton
    Cloud adoption is skyrocketing. The Hyperscale providers are reporting double digit increases in revenues. Cloud can be more secure than on premises environments, but the optimal word is can. Cloud security is a shared responsibility model. How business approach their part of the security, management and oversight of cloud is a critical part of the success puzzle.

    In this session we’ll explore:

    • Biggest Cloud Security Challenges of 2021
    • Adopting a Risk Management Framework
    • A life cycle approach that includes Security by Design and Privacy by Design
    • Regulatory considerations and cloud privacy
    • Tools that can help


    Jo Peterson, Vice President, Cloud & Security Services, Clarify360)
    Nicolas Moy, VP Security Engineering, Fairway Independent Mortgage
    Stan Lowe, Former CISO of Zscaler
    Jim Fulton, Senior Director of Product Marketing, Forcepoint
  • Cloud Risk Management Recorded: Jun 17 2021 45 mins
    James Johnson, Cloud Information Security Specialist, Proofpoint (North Europe)
    Today’s digital workforce is agile, highly available, automated. Where human and artificial intelligence coincide. Managing the risks of cloud IT services is always changing. This track discusses the evolving workforce and the cloud computing risks these changes bring with it.

    Today we’ll discuss;

    1. The 4 different types of connected worker
    2. Cloud visibility
    3. Identity and access
    4. Business risks associated with cloud
    5. Mitigating cloud risks
  • Threat and Risk Analysis for the cloud Recorded: Jun 17 2021 51 mins
    Peter Wood, Partner and Lead Consultant, Naturally Cyber LLP
    No organisation can defend against every conceivable attack in the cloud, thus it makes sense to prioritise threats by the most likely to target your specific business and then make informed decisions on how to prevent and detect those threats.

    This webinar will introduce the concepts of Threat and Risk Analysis for cloud security, how to identify the most likely attacks, and how to best focus your efforts and budget to protect your cloud services.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Vetting a Cloud Service Provider
  • Live at: Jun 16 2011 10:00 am
  • Presented by: Emma Webb-Hobson, Information Assurance Consultant, QinetiQ
  • From:
Your email has been sent.
or close