Hi [[ session.user.profile.firstName ]]

Virtualization and Security - Getting a Seat at the Table

Security folks need a seat at the Cloud and Virtualization table for architecture and design, how do you get that seat? Security is not about ROI so to speak nor is it about compliance, but it is about protecting the data. Can you achieve security by meeting the minimum requirements of compliance. How can you get the most out of your security environment with very little cost. Reuse, Recycle, Rethink
Recorded Nov 9 2011 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Edward Haletky, Managing Director, The Virtualization Practice
Presentation preview: Virtualization and Security - Getting a Seat at the Table

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Earn 1 CPE] Enabling Cybersecurity: Ignite Your ERM Program Mar 22 2018 5:00 pm UTC 75 mins
    Colin Whittaker with Tim White, Qualys, Alon Yaffe, Barracuda; Cameron Jackson, Riskonnect; and Marc French, Mimecast
    Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.

    Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.

    Qualifying participants will earn 1 CPE credit.

    Learning Objectives:

    - Discover how to identify, catalog, and prioritize risks across the enterprise
    - Find out how to quickly measure critical activities and address inherited risk
    - Learn how to gain efficiency and effectiveness of current risk-management approaches
  • The State of Cyber Insurance: Market Update & Trends Mar 22 2018 5:00 pm UTC 60 mins
    Susan Young, SVP & Advisor Marsh USA, Inc. E & O and Cyber Practice
    New cyber risks and threats are emerging at a pace faster than ever before.
    - How are cyber risks evolving
    - Which risks can be managed through cyber insurance? 

    We’ll address these questions – and dig a bit deeper into the state of the cyber insurance market and the role of cyber insurance in your overall cyber risk management strategy.  Cyber risk can’t be eliminated – it must be managed.

    This webinar is brought to you in partnership with ISSA Financial Industry Special Interest Group.

    About the Speaker:
    Susan Young is a Senior Vice President and advisor with Marsh’s
    national Cyber & E&O Practice (part of Marsh’s Financial & Professional Liability Practice, FINPRO) in the Seattle office. She is primarily focused on cyber /security & privacy risk, media liability, and technology errors and omissions.
  • Using Behavioural Economics to Raise Digital Resilience Amongst Employees Mar 22 2018 9:00 am UTC 60 mins
    Robin Smith, Head of IT Security, South Yorks NHS
    This case study examines how a major NHS organisation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.

    Join this webinar presentation to learn:
    - Key lessons on the value of micro-marketing
    - Lessons from cybernetics
    - The value of cyber resilience in healthcare

    About the Presenter:
    Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.
  • Red vs. Blue: The Threatscape Predictions for 2018 Mar 21 2018 9:00 pm UTC 60 mins
    Adi Ashkenazy, VP Product for XM Cyber
    Analyzing cyber-attacks from last year, this session will cover leading trends, and identify potential evolution both in the defensive and offensive fields going forward. As we do so, we will explore the increasing importance of automation and the diminishing role of the human professional in large scale networks.

    About the Speaker:
    Adi Ashkenazy is the VP Product for XM Cyber, an innovative cyber security start-up developing a revolutionary breach and attack simulation solution, capable of identifying critical attack paths towards key organizational assets, while providing actionable prioritized remediation. Prior to XM Cyber, Adi served as deputy director of an elite cyber technology department in the prime minister's office in Israel, leading Israel's finest engineers and security professionals through some of the most complex cyber security challenges in the world today.
  • [Webcam Panel] Threats and Cyber Resilience Mar 21 2018 5:00 pm UTC 60 mins
    Dan Paltiel (US Bank) | Ben Johnson (Obsidian Security) | Roselle Safran (Rosint Labs)
    Cybersecurity is a key priority for CISOs in 2018. What are the cyber threats CISOs should be aware of? How can we build more resilient enterprises in an age of relentless cyber attacks?

    Join this interactive panel to learn more about:
    - The latest cyber threats
    - New attack trends
    - Fighting cyber crime in an age of breaches and stolen personal information
    - Understanding your cyber risk
    - CISO priorities for 2018

    - Dan Paltiel, Security Intelligence Analyst, ‎U.S. Bank
    - Ben Johnson, CTO and Co-founder of Obsidian Security
    - Roselle Safran, President of Rosint Labs
  • [Panel] Cyber Crime Protection in the Age of Breaches Mar 21 2018 1:00 pm UTC 60 mins
    Raef Meeuwisse (Cybersecurity for Beginners) | Dr. Vladlena Benson (University of W. London) | Griff James (Damrod)
    The cost of cyber crime is estimated to be around $600 billion globally. The lower cost of entry, along with technological advancements like machine learning and artificial intelligence, make for a fairly easy adoption.

    Join this interactive panel to learn more about:
    - How can enterprises defend their critical data assets from the financially motivated attacker?
    - What is the best defence against ransomware, phishing and other attacks?
    - The true cost of breach
    - The role of security education in fighting cyber crime

    - Raef Meeuwisse, CISM, CISA, Author of Cybersecurity for Beginners
    - Dr. Vladlena Benson, Chair in Cybersecurity, Director of the Cybersecurity and Criminology Research Centre at the University of West London
    - Griff James, Director, Damrod Analysis Ltd
  • Cyber Attack Trends from the Threatscape Mar 21 2018 11:00 am UTC 45 mins
    Peter Wood, CEO of First Base Technologies
    What are the latest trends in the cyber-criminal underworld?
    Which attacks are you likely to be preventing as we move further into 2018?
    Who’s looking for vulnerability on your network?

    These questions and more, answered by Peter Wood FBCS CITP MIEEE CISSP M.Inst.ISP
    Chief Executive Officer, First Base Technologies LLP
    Peter’s career spans 48 years, with experience in network security, social engineering, threat and risk analysis, red teaming, industrial control systems and electronics. He founded First Base Technologies, one of the UK’s first information security consultancies in 1989. Peter has provided security advice and guidance for businesses of all sizes for more than 28 years, leading a team of expert penetration testers and consultants unrivalled in the industry.
    He is also a world-renowned security evangelist, speaking at major conferences and delivering seminars and webinars. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
    He is a BCS Fellow, a Chartered IT Professional, CISSP and a member of IISP, ISACA, ISSA, IEEE, ACM and Mensa. He is a visiting lecturer at the University of Sussex, teaching cybersecurity and ethical hacking.
  • Information Warfare: The Social Media Edition Mar 21 2018 9:00 am UTC 45 mins
    Raj Samani, Chief Scientist, McAfee
    This keynote talk by Raj Samani, Chief Scientist at McAfee, explores the recent campaigns against prominent journalists and politicians, particularly into their social media lives as a tool to support the political agendas of adversaries. Join this webinar to learn more about the steps that we as professionals must take to protect our own brands, and those of the organizations we work for.

    About the Speaker:
    Raj Samani is a McAfee Fellow and Chief Scientist at McAfee. His prior roles include VP and Chief Technology Officer, EMEA, at Intel Security/McAfee and Chief Information Security Officer for a large public-sector organization in the United Kingdom. A leading international cybercrime expert, Samani has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3/EUROPOL).

    Samani volunteers as the Cloud Security Alliance EMEA Strategy Advisor, and is on the advisory councils for Infosecurity Europe and Infosecurity Magazine. Samani has published numerous security papers and is the author of 'Applied Cyber Security and the Smart Grid'. SC Magazine named Samani as one of the Top 10 Influencers in cyber security in 2016.
  • The State of Cyber Resiliency in the Age of Attacks Recorded: Mar 20 2018 61 mins
    Dave Klein (GuardiCore) | Craig Dods (Juniper) | Troy Vennon (Columbus Collaboratory) | Jeannie Warner (WhiteHat Security)
    Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.

    Join this panel of experts as they discuss:
    - The biggest trends in cyber crime
    - Impact of Cryptocurrencies
    - Breaches and preventing future fraud and cyber attacks
    - Advancements in security technology
    - Why security awareness training should be a key part of your overall data protection strategy

    - Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
    - Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory
    - Jeannie Warner, Security Manager, WhiteHat Security
    - Craig Dods, Chief Architect for Security, Juniper Networks' Strategic Verticals
  • The Rise and Rise of Ransomware: Prepare and Protect Recorded: Mar 20 2018 49 mins
    Nick Frost, Principal Consultant, ISF
    The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

    With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

    In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

    About the presenter:

    Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
  • SD-WAN is Dead. Long Live Secure SD-WAN! Recorded: Mar 20 2018 46 mins
    Ronen Shpirer, Security Solutions Architect, Fortinet
    In the age of Digital Transformation, SD-WAN is on the lips of all enterprises and service providers. While the operational and commercial benefits of SD-WAN are clear, the focus on these as THE consideration is dangerous, as along its benefits comes a greater cyber security risk.

    This session will focus on Secure SD-WAN and the built-in benefits it provides, from both the operational and security points of view.
  • Basic Security with Cryptocurrencies Recorded: Mar 14 2018 56 mins
    Travin Keith, Managing Director at Agavon, Co-Founder at SICOS, and Administrator at BitcoinMarkets
    With the burst of interest into cryptocurrencies, there have been a lot of new users into this innovative world. However, the rush into the space has caused many users to skip key steps in joining the cryptocurrency community, such as understanding what basic security practices they should follow in order to keep themselves and their money secure.

    While there are technical steps to take to secure one's funds, there's also a number of things to keep in mind while interacting with the community.

    This webinar discussion aims to give beginners in the world of cryptocurrencies tips to better protect themselves, their money, and their sanity.
  • [Ep.4] Ask the Expert: Getting Serious About Cybercrime Recorded: Mar 7 2018 61 mins
    Joseph Carson (Thycotic) | William Leichter (Virsec) | Chenxi Wang
    This webinar is part of BrightTALK’s "Ask the Expert" Series. As attacks increase and start to have a significant impact, not just on companies’ bottom lines, but on their ability to carry out everyday business, cybersecurity has become much more of a boardroom issue than ever before. Increasingly this is causing forward looking organizations of all sizes to examine how security can be better integrated into business as normal.

    No business is immune from cybercrime and the theft of personal information and intellectual property will increase as the ability to turn raw data into money-spinning opportunities increases. The response to cybercrime is a business decision – and is all about risk management. Between human error and malicious insiders, time has shown us the majority of data breaches originate inside company walls. Employees and negligence are the leading causes of security incidents but remain one of the least reported issues. The fightback starts not in the organization but with people and increasingly in the home. More and more security professionals need to be re-assessing the risks to company data at a personal level - mobile/consumer devices, internet connected devices, cloud access and storage both inside and outside the corporate environment.

    - Joseph Carson, Chief Security Scientist, Thycotic
    - William Leichter, VP Marketing, Virsec
    - Dr. Chenxi Wang, Founder of The Jane Bond Project & Vice Chair, Board of Directors, OWASP

    Audience members are encouraged to send questions to the expert, which will be answered during the live session.
  • Learn about Cybersecurity Training for Military Vets Recorded: Mar 1 2018 61 mins
    Maxwell Shuftan-CyberTalent Program Director, SANS Institute and Jessica Gulick CEO of Katzcy Consulting
    Join the SANS Institute and Katzcy for an insightful presentation about the SANS CyberTalent Academy opportunities. This academy is designed to help qualified veterans in Maryland and Chicago - area receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in a matter of months, depending upon program selected. The program is at NO COST to the selected veterans who attend and includes training and certification.

    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • How this training academy and related certifications can help your career

    Speaker Bio:
    Maxwell Shuftan
    CyberTalent Program Director, SANS Institute

    Max leads the CyberTalent division of the SANS Institute, the most trusted and the largest provider of information security training and certification in the world. In this role, he directs business development and stakeholder engagement to support the various SANS CyberTalent programs and develop strategic partnerships. He also oversees CyberTalent program operations and staff management. SANS CyberTalent helps organizations address their cybersecurity workforce development needs through initiatives such as the VetSuccess and Women's Immersion Academies as well as the Assessment tools. Max has worked in the public affairs and stakeholder engagement arena of cybersecurity for the past eight years, working with Government, corporate, and not-for-profit organizations, most recently as a Vice President at Cambridge Global Advisors, a homeland security strategic advisory services firm.
  • GDPR and Security: De-Identifying Personal Data Recorded: Mar 1 2018 49 mins
    Ashwin Chaudhary, President of Accedere
    Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.

    Join this webinar to learn the GDPR requirements for managing personal information and digital identity.
  • Tracking Hackers - AI cybersecurity for APIs Recorded: Feb 27 2018 49 mins
    Bernard Harguindeguy, CEO, ElasticBeam
    What do oBike, a bicycle rental company, Instagram, and the IRS have in common? Answer -- hackers used APIs to access their customers sensitive information forcing these organizations to announce breaches. Although these API attacks were exposed, most API-based attacks go undetected these days – particularly attacks that used compromised credentials.

    This webinar will discuss API cyberattack examples and the techniques used by hackers to breach APIs. It will also review how AI-based security ​solutions can effectively stop these attacks and provide deep visibility into your API sessions for forensic and compliance reporting. Topics covered in this webinar include:
    - API cyberattack trends
    - Review of recent API attacks
    - How to monitor and protect your API activity
    - How to detect and block API attacks on your data/apps (live demo)
    - How to deliver reports with detailed traffic insight for any API
    - Best practices for securing APIs
  • How to get started with Security Automation and Orchestration Recorded: Feb 27 2018 47 mins
    Kumar Saurabh, CEO & Co-founder of LogicHub
    Security Automation can significantly improve investigations, reduce tedious busy work, and strengthen defenses. However, it is not always clear where to start, and which use cases to apply automation to.

    In this webinar, we will provide a primer and discuss best practices. Topics discussed will include:
    - What is security automation and orchestration?
    - Different automation models
    - Examples of how automation has helped others
    - Assessing your automation readiness
    - Steps to get started - picking your first use cases

    The discussion will be led by Kumar Saurabh, a 15 year veteran of Security Operations, and CEO & Co-founder of LogicHub.
  • GDPR: Brace for Impact or Not? Recorded: Feb 22 2018 64 mins
    Lance James | Mark Rasch | Martyn Hope | David Morris
    The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?

    Join this panel of world-class experts:

    Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

    Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.

    Martyn Hope: Founder of the EU-GDPR Institute.

    In this session you will learn:
    - What will happen if I'm not Compliant by May 25, 2018
    - Where do I Begin to start my compliance effort
    - Who should I trust to advise me through my compliance program

    If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
  • Practical Approach to GDPR Recorded: Feb 22 2018 51 mins
    Tarun Samtani, Group GDPR Lead for Vectura Group Plc, & SkyePharma
    We all know that the EU General Data Protection Regulation (GDPR) will bring a massive change in the way businesses operate and handle personal data. This short discussion will give you to tips to jumpstart your GDPR programme and some easy approaches to take to achieve success in a short space of time.

    1) GDPR short summary
    2) Focus on the goals not vendors
    3) ICO & Data subject expectations - May 2018 onwards
    4) GDPR practical approach
    5) Takeaways

    About the Presenter:
    Tarun Samtani is the Group GDPR Lead for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Telecommunications, ISP's, Financial Services, Gambling, Retail and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments. He has a wealth of experience in Cyber security & Data privacy and is passionate about securing business information landscape. During the course of his career Tarun has been involved in the strategy & planning, design, architecture and implementation of a significant number of information security programmes.
  • GDPR's influence on security Recorded: Feb 22 2018 43 mins
    Rob Shapland
    Will GDPR have the desired effect? Will it increase security, or see companies regularly hit with catastrophic fines for poor compliance.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Virtualization and Security - Getting a Seat at the Table
  • Live at: Nov 9 2011 3:00 pm
  • Presented by: Edward Haletky, Managing Director, The Virtualization Practice
  • From:
Your email has been sent.
or close