Hi [[ session.user.profile.firstName ]]

Best Practices for Protecting Your Business from Cybercrime

Cybercrime has evolved from random activities being carried out by individuals into a billion dollar illegal industry that continues to grow. How is cybersecurity keeping up with the rise of cybercrime?

Join this panel of security experts to learn more about:
- Trends in cybercrime and lessons learned in 2018
- The cost of data breaches
- Rise of cryptojacking and ransomware
- Who are the players who make up the world of cybercrime (e.g. programmers, distributors, fraudsters, etc.)
- The CISO vs the cybercriminal
- Best practices for protecting your business

- Michelle Drolet, CEO, Towerwall
- Michael Thelander, Director of Product Marketing, Venafi
- William Peteroy, Security CTO, Gigamon
- Kalani Enos, Founder & CEO, kenos Technologies (Moderator)
Recorded Feb 19 2019 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michelle Drolet (Towerwall), Michael Thelander (Venafi), William Peteroy (Gigamon), Kalani Enos (kenos)
Presentation preview: Best Practices for Protecting Your Business from Cybercrime

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Day When 3rd Party Security Providers Disappear into Cloud Sep 26 2019 4:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    How should we prepare for this new brave world where many 3rd party security providers disappeared into cloud providers? This will greatly impact many 3rd party security vendors, organizations and investors.

    Cloud transformations are accelerating. By 2020, cloud will increase by 157% and on-premises ’traditional’ IT infrastructure will decrease by 54%, according to 452 Research, 2018.

    We will cover how many security solutions will change, including:
    - WAF – Web Application Firewalls
    - SIEM
    - Firewalls
    - Encryption
    - Tokenization
    - Key Management
    - AV – Anti Virus
    - Network
    - And more...

    Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
  • Best Practices for Securing Kubernetes Workload Configurations Across Clouds Sep 25 2019 5:00 pm UTC 45 mins
    Jim Bugwadia, Founder & CEO, Nirmata
    Kubernetes is the new cloud OS, and enterprises are rapidly migrating existing applications to Kubernetes as well as creating new Kubernetes-native applications. However, Kubernetes configuration management remains complex, and due to this complexity, most implementations do not leverage Kubernetes constructs for security.
    In this session you will learn:

    - Key Kubernetes constructs to use for properly securing application workloads in any cloud
    - How to manage Kubernetes configurations across multiple clusters and cloud providers
    - How to audit and enforce enterprise-wide Kubernetes best practices
  • Emerging Application and Data Protection for Multi-cloud Sep 25 2019 3:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

    Join this webinar to learn more about:
    - Data Protection solutions for the enterprise
    - Trends in Data Masking, Tokenization and Encryption
    - New Data Protection Standards from ISO and NIST
    - The new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds
    - The llatest developments in IAM technologies and authentication

    Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
  • Is Security a Hinderance to DevOps Sep 25 2019 10:00 am UTC 45 mins
    Simon Roe, AppSec Product Manager, Outpost24
    For busy development teams and information security professionals, it can be challenging to keep pace with DevOps code and cloud migration whilst staying on top of security. As we look at the 'shift left' approach and wok to locate defects early in the SDLC, Simon Roe, AppSec Product Manager at Outpost24 will discuss the pitfalls you may face when migrating to cloud and how to overcome them.
  • CCS [Ep. 3]: Succeeding in the Multicloud Sep 24 2019 5:00 pm UTC 60 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Cloud and Cybersecurity Series [Ep.3]: Succeeding in the Multicloud

    With most IT work being done in the cloud, what does it mean to be successful and what are the characteristics of highly successful cloud enterprises?

    We'll dig into the what it means to be successful in the cloud and what successful organizations do more of (and less of) than their less successful peers. We'll look across technologies adopted, organizational and operational practices, and vendors embraced.

    This webinar presents the highlights of Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries. Later episodes will discuss security topics as well as focusing in on application development and security.
  • [PANEL] Protecting & Maintaining Cloud Security Sep 24 2019 3:00 pm UTC 60 mins
    Ed Moyle (Prelude Institute) | Nathan Burke (Axonius) | Raef Meeuwisse, ISACA Expert Speaker (Cybersecurity for Beginners)
    As organizations are forced to adapt to the world around them, the amount and severity of threats continues to increase. In order to ensure security in the cloud, it is vital to protect and maintain IT systems and devices in the office and remotely. Join this panel of industry experts as they discuss cloud cyber hygiene strategies and solutions, including:

    - Cloud security protocol best practices
    - Strategies for cloud security success
    - IT Security hygiene in real time
    - Tools and technology to ensure cloud hygiene

    - Ed Moyle, General Manager and Chief Content Officer, Prelude Institute
    - Nathan Burke, CMO Axonius
    - Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners

    Join BrightTALK's LinkedIn Group for IT Security: http://bit.ly/2IsbauU
  • Livestream Discussion - Mitigating Business Risk in FinServ with Cybersecurity Sep 24 2019 1:00 pm UTC 60 mins
    Cheri McGuire, Standard Chartered | Tony Fish, AMF Ventures | Robert Prigge, Jumio | Steven Holt, EY
    Cyber-attacks have cost the financial services industry more than any other sector, especially due to the extremely sensitive data and assets that they are gatekeeping.

    Join this panel to learn:
    -What is the current state of the cybersecurity in financial services?
    -Why is cybersecurity more of a business risk than a technology issue?
    -Best practices for detecting and preventing threats

    Robert Prigge, President, Jumio
    Tony Fish, Founder, AMF Ventures
    Steven Holt, Practice Lead - EMEIA FS Cybersecurity, EY
    Cheri McGuire, Group Chief Information Security Officer, Standard Chartered Bank
  • Ask the Expert: How to Automate Identity Verification in Financial Services Sep 24 2019 9:30 am UTC 30 mins
    Mohan Mahadevan, VP of Research, Onfido & Tony Fish, Founder, AMF Ventures
    The interplay of Humans and Machines in AI-based Automation

    Machine learning systems are now routinely performing complex tasks at unparalleled levels of performance across a wide range of applications. However, mission-critical applications such as those in financial services have a minimum tolerance for errors and error correction. Resultantly, the design of machine learning-based systems for such applications requires unprecedented levels of oversight and adaptability.

    An optimal system has the right level of interplay between humans and machines. Onfido employs a large number of machine learning models to deliver scalable, secure and frictionless identity verification for their clients, whilst giving clients accurate data they need to remain KYC compliant—so ensuring their models deliver real-world results is business-critical. In this interview we talk with Mohan Mahadevan, VP of Research at Onfido, to learn about how the constraints on these applications, the tradeoffs in an optimal system, and what the future looks like.

    Mohan Mahadevan, VP of Research, Onfido
    Tony Fish, Founder, AMF Ventures

    About Mohan

    Mohan is an expert in computer vision, machine learning, AI, data and model interpretability, previously leading research efforts at Amazon as Head of Computer Vision and Machine Learning for Robotic Applications. He has over 15 patents in areas spanning optical architectures, algorithms, system design, automation, robotics and packaging technologies. As Onfido’s VP of Research he leads Onfido’s team of specialist machine learning engineers and is focused on ensuring their systems work both in the lab and the real world.
  • A unified strategy on multi-cloud security Sep 23 2019 10:00 pm UTC 45 mins
    Jeremy Snyder, VP Business Development & International Strategy, DivvyCloud
    In this session, we'll discuss various approaches to managing multi-cloud security,

    Presented by:
    Jeremy Snyder, VP Business Development & International Strategy
    Jeremy has been in SaaS since 2002 and in the cloud since 2010. His career has been 5 startups (3 co-founded) and Amazon Web Services. Jeremy's been with DivvyCloud since 2016 and has worked with cloud customers in 4 continents to improve their security posture. Jeremy has a BA in Linguistics from the UNC and an MBA from GMU. Jeremy has lived in 5 countries and speaks more than 5 languages. Jeremy once went 3 days without seeing another human (although he saw dozens of reindeer) and another time got kicked off a train in central Sweden.
  • Why Multi-cloud Requires a “Zero Trust” Approach Sep 23 2019 9:00 pm UTC 45 mins
    Sandy Bird, CTO & Co-Founder, Sonrai Security
    Join Sonrai Security CTO & Co-Founder Sandy Bird present why a zero-trust security program is critical to public cloud platforms like AWS, Azure, & GCP

    Applications built on a public cloud requires a security model based on trust relationships between consumers of data and the data itself. Public clouds like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) all provide the ability to build applications with strong Identity and Access Management (IAM) policies.

    Unfortunately, the numerous IAM configuration options can quickly turn a unique opportunity to build security into applications into a security nightmare. Enterprises building in public cloud must ensure their security programs tightly control trust relationships to ensure adherence to the principles of least privilege and the segregation of duties. During this webcast you will learn:

    - A historical perspective on zero trust
    - Why the foundation of zero trust is critical for applications built in a public cloud
    - The potential risk that can be introduced by public cloud IAM configuration options
    - The importance of baselining and monitoring trust relationships in public cloud
    - Highlights of different public cloud IAM models
  • Strategies to Architect Security for Private, Hybrid, and Public Clouds Sep 23 2019 6:00 pm UTC 60 mins
    Predrag "Pez" Zivic, Sr. Security Solutions Architect
    World of kubernetes and cloud is very different from traditional data center world. This talk will address the differences between the two worlds for security professionals.

    The information about what security architects need to think about when designing overarching security architecture will be explored. Important foundational comparisons of different cloud-native architecture design and data center architecture will be reviewed. Distributed and centralized characteristics of the two different environments will be considered for security architecture design.

    Architecture attributes of cloud-native security architecture versus legacy data center security architecture will be reviewed. Ideas on how to alter security architecture models to meet dynamic nature of cloud technologies will be explored.

    This session will equip security architects with facts that will help them design future security implementations.

    Join BrightTALK's LinkedIn Group for IT Security: http://bit.ly/2IsbauU
  • [PANEL] Multiple Clouds, Multiple Concerns - Best Practices for Cloud Security Sep 23 2019 3:00 pm UTC 60 mins
    Clarify360 | Nuvalo| Optimized Channel | Palo Alto Networks | SonicWall
    According to Forrester's Cloud Security Solutions Forecast 2018 to 2023 report, the global spend for cloud security technologies will reach $12.7 billion by 2023, mostly driven by financial services organizations. This spend likely won't flow into a single vendor, as organizations are increasingly relying on several options for securing their clouds.

    Join this keynote panel of experts to learn more about the biggest trends in cloud security, as well as the best practices for securing your multi clouds:
    - Crucial steps companies should be taking as they move data and processes to multiple cloud environments
    - Understanding the shared responsibility model in the context of infrastructure-as-a-service (IaaS), software-as-a-service (SaaS), and platform-as-a-service (PaaS)
    - Protecting and planning for the future

    - Jo Peterson, Vice President, Cloud and Security Services, Clarify360

    - Manon Buettner, CEO & Co-Founder, Nuvalo
    - Michelle Ruyle, CEO & Founder, Optimized Channel
    - Fred Streefland, Chief Security Officer (CSO) for North & East-Europe (NEEUR), Palo Alto Networks
    - John Aarsen, Benelux & Nordics Solutions Architect, SonicWall

    Join BrightTALK's LinkedIn Group for IT Security: http://bit.ly/2IsbauU
  • [PANEL] Getting Ready for CCPA Recorded: Sep 17 2019 59 mins
    Guy Cohen | Lisa Hawke | Joanne Furtsch | Laura Koulet
    The California Consumer Privacy Act (CCPA) is going into effect on January 1, 2020, making it America’s first-ever state data privacy law. It is also the most far-reaching privacy regulation in the U.S. to date.

    Join this panel of experts for an interactive Q&A session to learn more about what businesses need to do to prepare for CCPA. Attendees will also learn about the CCPA checklist, as well as dive into:
    - GDPR vs. CCPA
    - Which organizations need to plan for CCPA compliance
    - What to do to avoid the risk of fines
    - How to develop a strategy and start implementing tools to achieve compliance
    - More privacy legislation on the horizon

    - Guy Cohen, Strategy and Policy Lead, Privitar
    - Lisa Hawke, VP Security and Compliance, Everlaw
    - Joanne Furtsch, Director, Deputy Data Governance Officer, TrustArc
    - Laura Koulet, Vice President, Head of Legal & Privacy, Tapad
  • Seeking a SOC Recorded: Sep 17 2019 49 mins
    Johna Till Johnson, CEO and Founder, Nemertes Research
    Seeking a SOC? The Time is Right!

    If you're like most enterprise security professionals, you know you need a security operations center (SOC). But should you build out your own, engage a third party, or take a hybrid approach? This webinar provides you with the answers. Nemertes helps you make that decision, based on objective data from our research studies. And we provide a detailed playbook and roadmap for taking action.
  • Pivoting to a Career in Cybersecurity Recorded: Sep 12 2019 61 mins
    Teresa Merklin, Lockheed Martin Aeronautics Company
    This Lockheed Martin presentation introduces the concepts of career pivots for women who are contemplating or executing a pivot as well as anyone who might have the need to navigate a career pivot in the future. Keys to successful career pivots are identified and the general steps to be performed are described. Specific considerations for pivoting into careers in cybersecurity are also provided.
  • CCS [Ep.2]: Mastering Multicloud - Architectures, Organizations, Building Blocks Recorded: Sep 12 2019 57 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Cloud and Cybersecurity Series [Ep. 2]: Mastering Multicloud - Architectures, Organizations, Building Blocks

    In 2019 the balance tipped, and for the first time the majority of enterprise IT workloads are running in the cloud, not in a data center.

    Enterprise IT staff need to stop thinking of cloud solutions as islands of function and special cases and begin to think of pulling it all together into a cohesive multicloud. We'll lay out the major categories of tools and systems and how they fit together, and at the organizational structures and operational practices needed to support multicloud operations.

    This webinar presents the highlights of Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries. Later episodes will discuss cloud organizations and operational practices, and success metrics and best practices for cloud organizations.
  • [Earn CPE] Preventing Data Breaches with a Scalable Verification Program Recorded: Sep 10 2019 75 mins
    Panelists: Nathan Rowe, Evident ID; Jeremy Grant, the Better Identity Coalition; Jon Lehtinen, Thompson Reuters.
    Consumer demand is driving the corporate IT environment. Business demands for IT are changing rapidly — so too are the demands on IAM — resulting in the requirement to adopt emerging technologies (e.g., mobile and cloud computing, data loss prevention, and social media) earlier and more quickly. Scalability is critical for any business that wants to catalyze short- and long-term success. A flexible workflow for identity verification can help organizations of all sizes with limited time, resources, and funding to focus their efforts on initiatives that support positive growth. While your business might be conducting background checks today, it could have different verification needs in the future to ease onboarding friction, prevent data breaches, and demonstrate regulatory compliance.

    It’s important to begin laying the groundwork now for a more sophisticated and intricate verification program so you can be proactive, not reactive, but what does a scalability strategy look like? In this CPE accredited panel webinar our experts will address how to create identity and credential verification workflows that can scale with your organization as it grows, including how to:

    - Gain a better understanding of the digital identity landscape,
    - Ensure accuracy of both data sources and verification records,
    - Centralize verification of multiple data sources into a unified platform,
    - Evaluate new developments like biometrics, AI, and blockchain, and how they can impact identity and data management,
    - Save money in the long-term by laying the groundwork for adaptable online verification workflows,
    - Adapt and respond to new regulations.
  • Breach Detection and Response - The whole business challenge Recorded: Sep 10 2019 30 mins
    Ade Taylor, CTO, ITC Secure
    Technical detection is now just the starting point for a series of exercises which will see the entire business work together to identify what happened and to mitigate the results.

    In this session, you will learn:

    - How EDR and MDR are morphing into BDR
    - Why BDR is a challenge for the whole business
    - How technology can help, and how it doesn’t

    In this 30 minute webinar Ade will discuss how the world of cyber-security detection and response is changing, fast. From IT and technical analysts to the CEO via HR, this is a problem for the whole business to solve together.
  • CCS[Ep1]: Next-Generation Cybersecurity - Success Metrics, Best Practices & More Recorded: Sep 5 2019 59 mins
    Johna Till Johnson, CEO & Founder, Nemertes Research
    Cloud & Cybersecurity Series [Ep.1]: Success Metrics, Best Practices & More

    What does it take for enterprise cybersecurity teams to "up their games" to the next level of cybersecurity? What does it mean to be a "successful" cybersecurity organization, and what technologies and practices does it take to become one?

    This webinar presents the highlights of Nemertes' in-depth research study of 335 organizations in 11 countries across a range of vertical industries.

    We separated the best from the rest, and took an in-depth look into what made the most successful organizations that way. Participants will come away with best practices, tools, technologies, and organizational structures that contribute to success. Most importantly, they'll learn how to measure cybersecurity success--and their progress towards it.
  • Why Cybersecurity and Physical Security Belong Together Recorded: Sep 4 2019 51 mins
    Min Kyriannis, Head of Cybersec, Jaros, Baum & Bolles & Valerie Thomas, Exec Information Security Consultant, Securicon
    In this webinar from Women in CyberSecurity (WiCyS) and the Security Industry Association (SIA), cybersecurity consultants Min Kyriannis (Jaros, Baum & Bolles) and Valerie Thomas (Securicon) will explore the important relationship between cybersecurity and physical security.

    Drawing lessons from real-world threats and attacks, our speakers will look at how cybersecurity vulnerabilities can be used to compromise physical security systems and why cybersecurity of IT systems depends on controlling physical security. We’ll discuss why CSOs, IT leaders, cybersecurity professionals and vendors/service providers all need to be paying attention to the cybersecurity of physical systems, and we’ll discuss what it means to drive security convergence at both strategic and operational levels, and how new technologies like AI factor into today’s converged security models.

    Key Focuses:
    •How to evaluate and improve the cybersecurity of cyber-physical systems
    •How threat actors are targeting cyber weaknesses in physical security systems
    •Why security convergence matters and what the relationship between cybersecurity and physical security teams can look like
    •How new technologies like AI are evolving security

    Key Topics: Cybersecurity, Physical security, Security convergence, Hacking, Hackers, cyber-physical systems, Security management
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Protecting Your Business from Cybercrime
  • Live at: Feb 19 2019 4:00 pm
  • Presented by: Michelle Drolet (Towerwall), Michael Thelander (Venafi), William Peteroy (Gigamon), Kalani Enos (kenos)
  • From:
Your email has been sent.
or close