Hi [[ session.user.profile.firstName ]]

IBM X-force Threat Trends Review 2009

James garnered Extensive pre- and post-sales consulting experience while working for US-based technology companies, providing a unique blend of deep technical knowledge with broad commercial, sales, and managerial experience. He is experienced in all aspects of IT security / risk management, with a particular emphasis on e-commerce security and payment authentication systems based on the 3-D Secure protocol. Presently managing pre-sales consulting activities for IBM Internet Security Systems following the acquisition of ISS by IBM in October 2006.
Recorded Sep 8 2009 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Rendell, IBM, Senior Technology Specialist
Presentation preview: IBM X-force Threat Trends Review 2009

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security on a Shoestring Oct 14 2021 1:30 am UTC 45 mins
    Ashwin Pal | Partner, Cyber Security and Privacy Risk Services | RSM Australia Pty Ltd.
    It is now widely known that SMBs are a key target for cyber criminals. They are now seen as the ‘low hanging fruit’ as SMBs generally cannot afford the same investment in cyber security initiatives when compared to larger firms. Unfortunately, as far as the cyber criminals are concerned, anyone on the internet is fair game. Unlike their larger counterparts, a cyber attack on an SMB can be very debilitating and can even cause the business to shut down. SMBs face their own unique challenges when it comes to defending against cyber-attacks. Within this presentation, you will hear about how the Invictus Games in Sydney in 2019 was secured using minimal funding and time as a case study. We will then explore some of the unique challenges faced by SMBs when it comes to cyber security. We will look at how focusing on your core business and risk management helps direct efforts to the right places in a cost effective manner. We will then explore what a typical attack looks like and discuss the basics that need to be covered to provide an SMB with an ability to defend itself from cyber-attacks while avoiding overspend.
  • Innovations in new Threats on the Cloud Sep 13 2021 8:00 am UTC 45 mins
    Shayak Tarafdar, Team Lead | Himanshu Dubey, Sr. Director, Engineering, SEQRITE
    Public cloud infrastructure has emerged as the backbone for innovation-driven growth. By embracing the cloud, enterprises can modernise their IT infrastructure and conjure solutions to serve customers digitally in new and innovative ways. Digital transformation & cloud adoption has further accelerated in recent times, as COVID-19 pandemic forced businesses to setup remote working at an unprecedented scale. Public Cloud services enabled fast & smooth migration to “working from home” by enabling connectivity from anywhere and supporting essential services such as video conferencing & real time communication.

    This rapid increase in cloud adoption has introduced numerous new security threats and challenges. Also, this has opened up new attack avenues for Cyber Attackers, and subsequently cyber-attacks against cloud installations are only going to increase in time to come.

    In this presentation we will discuss:
    • Cloud security risks & challenges
    o Multi vector attacks against cloud installations
    o Cloud jacking due to misconfigurations and using shared software
    o Among others
    • Impact of these threats
    • Preventive measures
  • Advanced Threat Prevention - Defending Against Sophisticated Threat Actors Aug 19 2021 5:00 pm UTC 45 mins
    Ondrej Krehel, PhD, CISSP, CEH, CEI , EnCE Digital Forensics Lead, CEO and Founder, LIFARS
    Advanced threat protection services and solutions are must in today’s business environment to protect data as well and the integrity of a business. Threat actors now have the resources to wage war like never before. Advanced Threat Prevention (ATP is made of several components and functions:

    • Continuous monitoring and real-time visibility - Threats are often detected too late. After the damage is done. Monitoring and quick action is a must or you will pay the price in resource utilization and reputation damage.
    • Context - Monitored threats must contain context for security teams to effectively prioritize threats and organize response.
    • Data awareness – Having an understanding of data, its sensitivity, value.
  • Application Security 2021 Aug 18 2021 3:00 pm UTC 60 mins
    Jo Peterson | Dustin Lehr | Derek Fisher | Les Correia | Nick Moy
    The notion that software runs the world and the world runs on software became even more of a reality during the pandemic. In addition to enabling work from home efforts, organizations hit the Fast Forward button on digital transformation efforts in the last 12-18 months. Gartner points out that the global expenditure on enterprise software will grow by approximately 10.8% and be $516.9 billion in 2021

    Software applications can be the weakest link when it comes to the security of the enterprise stack

    In this session, we’ll explore:

    • Current state of application security
    • Best practice guidance
    • Importance of a mature application security program

    Jo Peterson, Vice President, Cloud and Security Services, Clarify360
    Dustin Lehr, Director, Application Security, Fivetran
    Derek Fisher, VP Application Security, Envestnet|Yodlee
    Les Correia, Global Head of Application Security, The Estee Lauder Companies
    Nick Moy, CISSP, GCSA | VP Application Security, Fairway Independent Mortgage Corp.
  • Exploring Cyber Threats & Breach Prevention 2021 Aug 17 2021 3:00 pm UTC 60 mins
    Michelle Drolet, Towerwall | David LeBlanc, SecureCloudDB | Nasuni | CyberArk
    The last 12 months have been incredibly turbulent in the cybersecurity world. The move to a hybrid work model has seen many organisations turn their security on its head, with the adoption of security solutions like SASE and Zero Trust. Ransomware has also spiked: according to a new Group-IB report, in 2020 ransomware surged by 150%. As the security landscape evolves and new threats seem to be at every corner, it’s essential to re-evaluate your security posture to ensure that your organisation is as safe as possible.

    But what are the key trends thought leaders expect to face this year, and how can we navigate these security threats? Are security teams fully prepared to tackle new risks and breaches?

    Join our panel of expert thought leaders as we discuss:
    - The key cybersecurity trends of 2021, from SASE, ZTNA and beyond
    - Breach prevention, and how to find the right solution for your organisation
    - What the ‘new normal’ means for your security teams
    - Identity-first security, and why it’s so valuable today
    - And more

    Moderated by:
    Michelle Drolet, CEO, Towerwall
  • Staying Ahead of the Breach in 2021 Aug 16 2021 3:00 pm UTC 60 mins
    Kalani Enos, CEO, KEnos Technologies | Michelle Drolet, Towerwall, Christopher Kruegel, VMware
    Cyber attacks on companies, governments and individuals grew significantly in 2020. What can enterprises do to better protect their data? Is breach prevention even possible?

    Hear from the experts on what the new normal for organizations looks like, the cybersecurity best practices to adopt and what's in store for the rest of 2021.

    The topics up for discussion will include:
    - Cybersecurity in the new normal
    - How attackers have take advantage of the pandemic
    - Critical steps to take on the path to preventing data breaches
    - Why data protection and cybersecurity should not be separate functions
    - Best practices and solutions for breach detection and response
    - Lessons from the field and recommendations for CISOs

    Moderated by:
    Kalani Enos, CEO, KEnos Technologies

    Panelists include:
    Michelle Drolet, CEO, Towerwall
    Christopher Kruegel, VP Security Services - Network and Security Business Unit (NSBU) at VMware
  • Protecting Critical Web APIs: Evolution of Attack Vectors & Defense Strategies Recorded: Jul 15 2021 43 mins
    David Senecal, Sr. Director of Product Architecture & Research | Spandan Brahmbhatt, Sr. Data Scientist, Arkose Labs
    Web APIs that handle critical workflows like login or new accounts creation are constant targets of attacks. Web site owners need to protect these endpoints in order to prevent account takeover as well as the proliferation of fake accounts.

    In this presentation, we’ll look through real examples at how attackers evolve their strategies as soon as protections are in place. We’ll also provide some insights into the most effective detection methods in order to counter the evolution and to stay ahead.

    And finally, we’ll discuss how the evolution of the Internet ecosystem is affecting the web security world and make the task more complex.
  • Secure Win10 desktops & apps in the cloud while defending against ransomware Recorded: Jul 14 2021 40 mins
    Brad Peterson, VP Marketing, Workspot
    Cloud desktops help IT teams secure their Windows 10 desktops and applications for medium and large size companies globally. Centralizing and virtualizing the Windows 10 desktop and the applications running on it help control OS and app versioning, patching, deployment, access and with backups – which can be a significant plus against ransomware.
  • How Moving to the Cloud Changed Security Strategy Forever Recorded: Jul 14 2021 50 mins
    Nathan Wenzler | Chief Security Strategist | Tenable
    Organizations have been moving to the cloud for several years now, but in the last year, our world has forced nearly everyone to leverage the scalability and speed of cloud platforms to support a remote workforce. With so many critical business functions running from these providers, it's imperative to protect our data, systems and assets. But traditional strategies struggle to keep up with the scope and scale of the modern cloud environment, which is forcing a change in how we approach our security assessments and mitigation techniques.

    In this presentation, we'll discuss the benefits and challenges presented to many organizations by the sudden move to cloud-based services and a newly remote workforce focused on business continuity, not security. We'll also talk about some of the new ways we must evolve how we approach security and our internal programs to better align with the fast-paced and ever-changing nature of cloud services and assets and protect our organizations effectively, efficiently and at the speed required by today's modern attack surface.
  • Cyber Authors Ep.5: Big Breaches: Cybersecurity Lessons for Everyone Recorded: Jul 14 2021 55 mins
    Neil Daswani President of Daswani Enterprises | Sushila Nair VP Security Services NTT DATA
    The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone―not just techies―to become informed and empowered on the subject of cybersecurity.

    Knowing this, author Dr. Neil Daswani covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, and unencrypted data in his latest book, Big Breaches: Cybersecurity Lessons for Everyone.

    In this session, Neil Daswani is joined by Sushila Nair where they’ll discuss:
    - Effective prevention and detection countermeasures
    - Meta-level causes of breaches
    - Crucial habits for optimal security in your organization
    - and much more!

    Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, this webinar will answer your questions and prepare you for the future of cyber security.

    This episode is part of Cyber Authors, a new series with Sushila Nair. We welcome viewer participation and questions during this interactive interview.
  • The Dual Mission of the CISO in 2021 Recorded: Jul 14 2021 61 mins
    Jo Peterson | Dr Rebecca Wynn | Konrad Fellmann | Jason Thomas | Sujeet Bambawale
    The CISO community has demonstrated flexibility, tenacity and perseverance throughout the last 18 months.  As the world moves past the pandemic, CISOs are continuing to adapt their organizations.  For many there is a dual mission to enable organization growth as well as a need to prepare and protect for the unforeseen.

    What is clear is that most organizations expect disruption, on some level, to continue for the foreseeable future.

    In this session, we’ll discuss a five pronged approach with tools and tips to help CISOs prepare:

    • Budget and Reserve Budget
    • Emerging Threat Mitigation
    • Maximizing Current Technology Investments
    • Utilization Review to include Optimization and Automation Efforts
    • Fostering Innovation with Emerging Tech

    Moderated by Jo Peterson, Vice President, Cloud and Security Services, Clarify360
    Panelists include:
    Dr Rebecca Wynn, Global CISO & Privacy and Risk Officer
    Konrad Fellmann, VP and Chief Information Security Officer, Cubic Corporation
    Jason Thomas, CISO, Cole, Scott, Kissane
    Sujeet Bambawale, CISO, 7-11
  • Managing Multi-Cloud Security in 2021 Recorded: Jul 14 2021 53 mins
    Simon Ratcliffe | Stephen Archer | Peter Wood | James Johnson
    93% of enterprises already have a multi-cloud strategy in place (Flexera 2020 State of Cloud Report). Multi-cloud security protects data and applications from advanced, sophisticated security threats. Some other benefits include reduced costs and better service delivery. But what are the main multi-cloud security trends you can expect to see in 2021?

    Join cloud and security leaders as they discuss:
    - The benefits of multi-cloud solutions for your security posture
    - The challenges associated with a multi-cloud strategy and how to navigate and overcome these challenges
    - The cloud security landscape of 2021

    Moderated by:
    Simon Ratcliffe, CIO Advisor and Mentor, IT Evangelist, Ensono
    Stephen Archer, Senior Specialist Solutions Engineer (Cloud & Automation), F5 Networks
    Peter Wood, Partner, Naturally Cyber LLP
    James Johnson, Cloud & Data Security Specialist - ATG - EMEA, Proofpoint.
  • Stay ahead of the game: automate your threat hunting workflows Recorded: Jul 13 2021 43 mins
    Christopher Van Der Made, Security Developer Advocate, Cisco
    It is very important nowadays to stay up to date with all of the cyber threats that are posing all over the world. It is widely known that there are not enough resources to be found to fill up every Security Operation Center (i.e. SOC). Therefore, many organizations struggle with coping with the massive amount of new type of attacks and generated alerts from their tooling. During this session, you will learn how to hunt (and automate your hunt) for active cyber threats in your environment and contain them using integrated connections to network, endpoint, and cloud products. This session is targeted at SOC management, cyber security engineers, threat hunters, and analysts. It will touch on threat detection, investigation and response. All the code will be made available after the session.
  • Remote and Hybrid Workplace Endpoint Security Recorded: Jul 13 2021 51 mins
    Masha Sedova, Elevate Security | Ian Goodhart, Maryland Department of Information Technology | Matt Balderstone, CyberArk
    Endpoint security remains a major challenge for organizations, and in November 2020, Cybersecurity Ventures predicted that global cybercrime costs will reach $10.5 trillion USD a year by 2025. That’s more than triple the amount that it was in 2015. With remote working still very much the norm, and hybrid workforces emerging, it is becoming increasingly difficult to keep track of multiple endpoints and the risk they carry.

    With the threatscape continuing to evolve and cyber attacks becoming even more sophisticated, experts are here to share how security leaders can take the complication out of endpoint security.

    Join us to learn:
    - Common endpoint threats from the first half of 2021
    - Emerging endpoint threats and what to prepare for going forward
    - Leading endpoint protection strategies and how they can be integrated into your existing security solutions
    - And more

    Moderator: Masha Sedova, Co-Founder & President, Elevate Security
    Panelists: Ian Goodhart, Director of Security Operations, Maryland Department of Information Technology (DoIT)
    Matt Balderstone, Cybersecurity Advisor, CyberArk
  • Stay ahead of the game: automate your threat hunting workflows Recorded: Jul 13 2021 43 mins
    Christopher Van Der Made, Security Developer Advocate, Cisco
    It is very important nowadays to stay up to date with all of the cyber threats that are posing all over the world. It is widely known that there are not enough resources to be found to fill up every Security Operation Center (i.e. SOC). Therefore, many organizations struggle with coping with the massive amount of new type of attacks and generated alerts from their tooling. During this session, you will learn how to hunt (and automate your hunt) for active cyber threats in your environment and contain them using integrated connections to network, endpoint, and cloud products. This session is targeted at SOC management, cyber security engineers, threat hunters, and analysts. It will touch on threat detection, investigation and response. All the code will be made available after the session.
  • 2021: The Ultimate Reality Check for Cybersecurity Recorded: Jul 12 2021 51 mins
    Michael Kennedy | Paul Dobbins | Heidi J.K. Fessler | Mike Thompson
    We all hear about the large-scale data hacks events that have made global headlines recently. But far from the glare of media attention, organizations of all sizes are increasingly being targeted by cybercriminals due to insecure endpoints.

    In this session, our panel of cybersecurity experts will share how real-life threat events during the pandemic have forever changed the cyber threat landscape, and strategies for combating new-age threats in the face increasing endpoint visibility and control challenges.

    We’ll also share how recent high-profile cyber attacks are still impacting the business world, and what changes organizational leaders can anticipate from recent public hearings and governmental actions.

    Michael Kennedy, Co-Founder & CTO, Ostra Cybersecurity
    Paul Dobbins, Chief Growth Officer, Ostra Cybersecurity
    Mike Thompson, Cyber Security Incident Response Team - Incident Case Manager - Team Lead, FR Secure
    Heidi J.K. Fessler, Founder, Innova Law Group, PLLC
  • Walking the tightrope - Balancing Usability with Security Recorded: Jul 12 2021 48 mins
    Zoe Mora, Information Security Manager, Iron Mountain Data Centers
    Endpoint security is a balancing act between security and privacy controls, and providing usability to the end user. Endpoint security should be invisible to the user and not get in the way of daily tasks. If we apply too many security controls users will find ways around them effectively removing the control.
  • Federated Learning and Preserving Data Privacy Recorded: Jun 23 2021 62 mins
    Eric Topham | Dr. Pedro Baiz | Max Robbins | Rajeshwar Bhandaru
    Businesses rely on AI models that transform data into actionable insights. Traditional methods for creating AI models require a lot of data that is collected at some central location. Federated Learning (FL), however, takes a different approach by turning the centralised paradigm on its head and moving models or functions to be executed to where the data is.

    As a distributed process that does not require a single depository of data and where different parties can train an AI model without having to share the data, FL can be used in situations where data privacy is paramount.

    This paradigm shift is also creating new opportunities to democratize AI, which has the potential to transform the data economy.

    Join this month's episode of the Business Intelligence Report with Eric Topham, Co-Founder & Data Science Director at The Data Analysis Bureau, to learn more about how FL works and what opportunities it creates for consumers and enterprises.

    Viewers will also hear from the experts about the different use cases for federated learning, especially in the context of customer privacy, regulatory compliance, and integrating siloed data. The topics up for discussion will include:
    - The emergence of FL
    - FL, the democratization of data and what this means for Big Tech
    - How FL can be used as a privacy-preserving technology
    - Business use cases for FL
    - How FL can be part of your data strategy

    - Dr. Pedro Baiz, Royal Society Entrepreneur in Residence at Imperial College London and Head of AI at eXate
    - Max Robbins, CEO of AI Market
    - Rajeshwar Bhandaru, Enterprise Data Architect at Suez

    This episode is part of The Business Intelligence Report original series with Eric Topham, Co-Founder & Data Science Director at The Data Analysis Bureau. We welcome viewer participation and questions during this interactive panel session.
  • Cloud Security Trends Recorded: Jun 17 2021 46 mins
    Leena Bongale, Manager – Data Analytics & Governance, TD Bank | Pankul Chitrav, Sr. Developer, TD Bank
    Cloud trends change with the introduction of new technology and evolving business requirements. When cloud technology first came into the picture, there was both a sense of anticipation and major questions about security. The hyperactive cybercrime industry kept some end users conflicted about adopting cloud technology. Still, the technology has come a long way since its inception in overcoming concerns related to security. As we have seen in the recent years security breaches in large organizations point out that some of these security problems present as data breaches while others deal with access control.

    Whatever the issue, it concerns decision makers greatly when making a choice of software or solution. Cloud Security will continue to evolve on several levels.

    For more insights into trends in cloud security and the current issues around cloud security and their solutions, join our presentation to understand the Cloud Security Trends and what your organization can do to stay ahead in the game!

    About the presenters:
    Leena Bongale, Manager – Data Analytics & Governance, TD Bank.
    Leena has extensive IT experience, with specialization in IT Security & Risk Management. Leena has been invited to several virtual conferences to speak on various technical topics round IT Risk & Control.
    Pankul Chitrav, Sr. Developer, TD Bank.
    Pankul is a versatile developer, with expertise in .NET, DevOps, Jenkins, Octopus and recently Azure Cloud.
  • A Top-Down View of Cloud Risk Recorded: Jun 17 2021 45 mins
    Roselle Safran, CEO & Founder, KeyCaliber
    The migration to the cloud comes with risks and rewards. Understanding the risks early on and addressing them proactively can allow an organization to reap the benefits of the rewards without facing unreasonable risk. To assess risk effectively, organizations should take a top-down approach where they focus on the high value cloud assets first. This session we will discuss the top-down approach and cover:

    * How to define a high value cloud asset
    * How to determine which cloud assets are high value
    * How to assess the risks to high value cloud assets
    * How to develop baseline controls for high value assets
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IBM X-force Threat Trends Review 2009
  • Live at: Sep 8 2009 9:00 am
  • Presented by: James Rendell, IBM, Senior Technology Specialist
  • From:
Your email has been sent.
or close