Please join us for a special 2020 Hacking The Election episode where we will go beyond the traditional bits and bytes of hacking the upcoming election.
In this episode we will explore the other side of Hacking The Election; the Human side, covering such topics as:
- Manipulating the electorate
- Seeding mistrust in the election process and results among the voters
- Fermenting anger and disenfranchisement
- Polarizing the electorate
A soft preview of what's to come in the November election.
- Neal O'Farrell, Founder at The PsyberResilience Project
- Barak Engel, CEO, EAmmune
- Harrison Morris, PhD Candidate Georgia Tech researching the intersection of Cybersecurity and Cognitive & Brain Sciences
Moderator: David Morris, Executive Director at Digital Risk Management Institute
This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.
RecordedAug 28 202061 mins
Your place is confirmed, we'll send you email reminders
Cyber threats continue to increase and cyber attacks are accelerating in frequency as well as the damage they cause. Each attack leads businesses to implement new and ever more sophisticated technologies to defend themselves. Despite spending ever increasing amounts, most businesses appear to be as vulnerable as ever.
This webinar discusses cyber risk and why that should form the foundation of your security approach. Understanding your risk profile and what is important to your business allows you to focus on the issues that matter most to you. The results provide the basis for your business to implement cost effective strategies that are practical and pragmatic and ultimately are bespoke to you.
In this webinar you will learn:
1. How to understand cyber risk in the context of the business
2. How to identify what matters to you
3. How to use the above in order to achieve cost effective cyber security
A former partner at KPMG LLP and BDO LLP. A certified security and data privacy professional with extensive experience gained across consulting, advisory and audit roles
George has over 20 years’ experience in technology risk, information security and privacy. He works with clients to help them understand their risk appetite, their overall security exposure and the specific issues that matter to them. He helps clients achieve cost effective security, including alignment with regulatory and other compliance and certification standards.
Sean O’Neil L.Lb (Hon), MSyl | Carl Chapman, TiG | David Clarke, Guildhawk
Cybercrime is at an all-time high.
Businesses in the UK are under the constant threat of cyber security attacks, and there is an increasing risk of losing your data, money, and even the business itself. Hackers are experts at choosing vulnerable targets. Learn about the risks and best methods of defence by joining our security briefing with experts from the police, TiG and Guildhawk.
In this briefing you will:
- Hear how other businesses have been targeted
- Understand the risks through real-life examples
- Learn how to implement some simple defence strategies
- Have the opportunity to ask questions
Garry Scobie, Deputy Chief Information Security Officer for The University of Edinburgh
Threats abound and barely a day goes by without a new cyber-attack causing security professionals to reassess their controls and consider new technology to bolster their defences.
This webinar discusses current attack trends from the perspective of The University of Edinburgh, a world-leading research-intensive University. It is suggested that attack trends are not that different to those we have previously faced, and our efforts should focus less on the headline grabbing events and more on the daily basics of good cyber hygiene.
In this webinar you will learn:
1/. Real cyber-attack trends as seen from The University of Edinburgh
2/. How attack trends influence a security awareness program
3/. Promoting good cyber hygiene and improving the security posture
Garry Scobie is the Deputy Chief Information Security Officer for The University of Edinburgh. He is a Certified Information Systems Security Professional and ITIL Expert. He regularly presents on computer security including sessions on Ransomware, Mobile Security and Cyber in the Movies. Prior to this he was responsible for Microsoft Windows server infrastructure and Active Directory. He has a particular interest in vulnerability assessment and penetration testing and promoting security awareness.
James Alexander Grandoff, Senior Researcher, CyberPulse inc.
In this webinar viewers will learn what about what is going on within the cyber-crime community. Most importantly they will gain an understanding of current trends so blue teamers can adjust their security model.
Historically it has always been a complication for defenders to keep up with seasoned exploit developers and bug hunters. However, I’m going to do my best to fill that gap.
John Bambenek, Bambenek Consulting, Etay Maor, IntSights and Luke Hull, BlackBerry
With the current threat landscape evolving at a rapid pace and based on everything that has happened throughout 2020, businesses need to take a more proactive approach to cybersecurity in 2021.
Join this panel of security experts and industry leaders to learn more about:
- 2020: The year of COVID, remote working and breaches
- Biggest lessons from 2020 and the path forward
- New threats on the horizon
- Strategies for dealing with ransomware, phishing attacks
- Recommendations for CISOs for the year ahead
Himanshu Dubey, Director of Security Labs and Harshad Bhujbal, Technical Architect, Quick Heal Technologies Ltd.
2020 has seen many Cyber Attacks using the COVID-19 pandemic as the central theme. For most
part though these have been the same attacks that have existed since the last few years; just
the packaging was changed.
We expect the real cyber security repercussions of changes brought in by the COVID-19
pandemic to be felt in 2021. In this talk we explore what the repercussions might be and what we
can do to prepare and protect ourselves against them.
We will cover:
- Major Cyber Attack trends of 2020
- What can be expected to continue in 2021
- Potential repercussions of COVID-19 induced changes and new attack types in 2021
Neurodivergent people have unique abilities and skills that make them particularly successful in cybersecurity jobs. Learn how tech companies like IBM are building neurodiversity programs and leveraging the untapped neurodivergent talent pool to help fill a cybersecurity skills shortage and make their teams more diverse and inclusive.
Join a dynamic duo -- Diane Delaney and Megan Roddie -- as they talk about neurodiversity and cybersecurity at IBM. Diane Delaney is IBM’s Neurodiversity Program Manager, and Megan Roddie is a Cyber Threat Researcher at IBM and co-founder of IBM’s Actually Autistic Task Force.
Together, they will talk about the importance of having neurodivergent teams. Diane will discuss how to attract and retain neurodivergent talent, and the importance of having diversity on a cyber team. Megan will discuss how her abilities as an autistic person have helped her be a successful cyber threat researcher, and how other organizations can attract and retain neurodivergent talent. For those looking to build skills, Diane and Megan will discuss how neurodivergent talent can begin building skills and training in cyber to land a job in high-tech.
Claudio DeSanti, Dell; Ariel Kit, NVIDIA; Cesar Obediente, Cisco; Brandon Hoff, Broadcom; Alex McDonald, SNIA NSF Vice Chair
Whether traveling by car, plane or train, it is critical to get from here to there safely and securely. Just like you, your data must be safe and sound as it makes its journey across an internal network or to an external cloud storage device. It's well known that data is often considered less secure while in motion, and attackers are finding increasingly innovative ways to compromise data in flight. And the risks associated with data in transit are dependent on the security measures that are in place. So how do you adequately protect data in transit?
In this webcast, we'll cover what the threats are to your data as it's transmitted, how attackers can interfere with data along its journey, and methods of putting effective protection measures in place for data in transit. Included in this webinar will be:
•What you should expect to happen to secure data in transit; what are the trade-offs
•What transport layer security protocols (SSL, TLS, etc.) are best for protecting data in transit?
•Different encryption technologies and their role in protecting data in transit
•Which criteria should be used?
•How do you know which encryption to use?
•What’s applicable to different workloads?
•Best practices for data protection in transit
Join us on a journey to provide safe passage for your data by registering today!
Already a popular platform, WhatsApp, the Facebook-owned smartphone instant messaging service, posted the biggest gains due to COVID-19 according to Tech Crunch. Learn why this ubiquitous messaging app could be a security risk and what you need to know to secure WhatsApp.
In this session, you’ll discover:
+ How metadata and message data storage expose you to critical risk
+ Why the legal agreement should give you pause
+ Why WhatsApp is an effective platform for spreading disinformation
+ How the phones and humans using them increase your vulnerability
+ How to increase secure use of the app and mitigate your risk
+ Why WhatsApp leveraged by sophisticated threat actors
Speaker: Cosimo Mortola is a senior intelligence analyst at GroupSense. Cosimo previously tracked threat actors at MassMutual, and Russian disinformation and associated threat activity at FireEye. Cosimo is fluent in Russian, French, and Italian.
Theresa M Payton - CEO & Founder of Fortalice Solutions & Sushila Nair - VP, Security Services NTT DATA
Theresa Payton, leading cybersecurity expert and first female Whitehouse CIO, discusses her book "Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth."
Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots.
In this session, Theresa is joined by Sushila Nair where they will take a look inside the Cyberwar to hijack elections & distort the truth.
Join this webinar and learn:
- About our new era of hacked elections and non-stop disinformation campaigns
- From battlefront stories the effect of cyber conflict and its risks
- Who are the cyberwarriors who are planning tomorrow’s attacks
- The attacks of tomorrow including Artificial Intelligent mutations, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots
- To build a plan so that individual citizens, big tech corporations, governments and the international community can push back
This episode is part of Cyber Authors, a new series with Sushila Nair. We welcome viewer participation and questions during this interactive interview.
Alex Nette, President & CEO, Hive Systems + Michael Cardman, CFO, Hive Systems
The pressure is on to maximize - possibly reduce - your IT spend, but you know that cybersecurity is critical. As many as 60% of hacked small and medium-sized businesses go out of business after six months. But, how much is right to spend? This 30-minute live discussion between Alex Nette, one of the leading cybersecurity experts for small-medium businesses, and Michael Cardman, a results-oriented financial expert will help you determine:
+ What are the must-haves for your 2021 cybersecurity budget? How do you calculate what to spend?
+ Given your business and your systems, applications and software, what’s the right approach for you?
+ How do you do more with less?
This webinar draws on years of experience in working with business and IT professionals to help them craft the right spend strategy. Both Alex and Michael will provide a number of best practices for you to consider, but also show you the behind the scenes tools they’ve used for years! See what happens when IT and cybersecurity gets real with a CFO.
Kurtis Minder, GroupSense and Jessica Gulick (Host), Katzcy
No one ever expects it to happen to them. But with ransomware and cybercrime on the rise, it’s more likely than ever to discover that ransomware has locked down your system and cybercriminals are holding your data hostage. Kurtis Minder, an expert ransomware negotiator, advises executive teams when their worst cybersecurity nightmares come to life. Join us for an interview with Kurtis as we discuss:
+ What most people don’t realize about ransomware and the cybercriminals that run these exploits
+ Immediate do’s and don’t if your systems are being held captive
+ How to limit potential damage like data loss, overpaying threat actors, tarnished brand reputation, and compliance violations
+ Team Event: who to involve and when
Daniel Clayton, VP of Global Support and Services, Bitdefender
It's well known that security is not just a technology problem, but a people problem too. In this session we'll examine the latest ways that bad actors can exploit information found online about your team, and use it to weaponize their email against the business. We'll also explore the ways that businesses can protect themselves and when necessary fight back.
In this webinar we will:
- Examine some of the latest uses of social engineering in phishing and spear phishing campaigns
- Explore some options to manage the risk
- Take a look at how we can protect the business when our defensive mechanisms fail
Daniel Clayton has been responsible for building and delivering global operations for the National Security Agency (NSA), the Government Communications Headquarters (GCHQ), Rackspace and Bitdefender over a 30-year career.
As VP of Global Support and Services, he is responsible for Bitdefender’s global operations in support of customers, including the strategy, service delivery and oversight of Services and Support Operations, including the Security Operations Center, Customer Success Operations and associated engineering functions.
Jo Peterson, Clarify 360; Dr Richard Ford, Cyren; Geoff Vaughan, Security Innovation & Mariana Pereira, Darktrace
There are an estimated 1.5 billion people working remotely due to COVID-19 and email is one of the ways businesses are communicating and staying connected with customers, employers and vendors. Ransomware, phishing and email exploits are continuing to rise. According to Security Magazine, over 96% of all security attacks begin with an email.
Today’s panel will focus on:
- the current state of email security and tools,
- best practices for email safety, resilience planning, brand protection and thoughts on training
Aligning the need for Cyber defense technology has to be with business goals that define the problem statement today, the impacts to the business, and how the investments not only mitigate those risks but will include an ROI in the Security Roadmap Strategy.
In this webinar you will learn how to:
- identify and articulate those gaps convincingly
- make implementation quick to keep the C-suite audience interested
- do Defense in depth for threats presented via email
- maintain and continually monitor a defense in depth strategy
- demonstrate ROI to C-suite/stakeholders
Sawan Joshi – Information Security Executive | Speaker | Blogger
Qualifications held – CISM, TOGAF, CND, CYSA+ GDPR
Practitioner, ISO 27001 LI, MCSE x3 AWS Architect
Ritesh Agarwal, Co-Founder and CEO, Airgap Networks
COVID-19 has slowed the economy down, but hackers are busy as usual—looking to take advantage of the pandemic to breach systems, steal data, and profit by holding both systems and data hostage.
More than 51% of the organizations have been impacted with Ransomware in the last 12 months.
What is your defense strategy? How do you fight against the most potent lateral threat propagation within your network during outbreak? In the virtual session, learn how Zero Trust isolation provides the best defense against Ransomware. It’s time to get to the root causes in your network and introduce the agentless Zero Trust Isolation platform that protects your
organization even if your endpoints are breached, even if you have vulnerable and unpatched applications, and even if you are operating legacy and insecure protocols.
Companies accelerate software development and release new features that delight their customers and help them gain market share in large part through leveraging open source code. Nearly all modern applications are built at least in part with open source code, yet recent research by Veracode revealed that 70% of applications have open source security flaws. With the third-party code introduced by developers directly as they build an application comes vulnerabilities introduced indirectly. Use of open source libraries helps developers and sparks innovation - the security threat comes with a lack of awareness into whether open source vulnerabilities are impacting applications.
Attendees will learn what open source software is, understand risks that open source software introduces, and how their organization can mitigate these risks with secure code and improve overall security.
Christopher Peters, Application Security Engineer, Premiere Global Services
Security teams can become overwhelmed with vulnerability reports. A myriad of tools exist that provide all kinds of reporting on suspected vulnerabilities in software. False positives (and negatives) are usually present in the data. For the security team, this can create a situation where more time is spent managing the data and reports than fixing things or helping other teams focus their patching efforts.
In order to triage and focus effort on the greatest risk to the business, a different approach may be
needed than the traditional compliance-based ones or systems based on CVSS scores.
In this webinar we’ll start out by defining what exactly the term vulnerability means, how to measure that, and then explore a more risk-based approach.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.