Hi [[ session.user.profile.firstName ]]

Understanding Cloud Security: Finding the Boundaries

With more than 20 years Financial Services experience, I have successfully directed many large change programmes, & been instrumental in the launch of new products/ services (e.g. Mortgages, Debit and Credit Cards, Investments, General Insurance, Business Banking) as well as managing Process Ree
With more than 20 years Financial Services experience, I have successfully directed many large change programmes, & been instrumental in the launch of new products/ services (e.g. Mortgages, Debit and Credit Cards, Investments, General Insurance, Business Banking) as well as managing Process Reengineering consultancy teams.
Currently Head of Payment Security at Barclaycard, I am responsible for security compliance of circa 100,000 customers and their third parties. Our sustained dedication resulted in my team scooping up two awards at the Feb. 2012 Merchant Payments Ecosystem conference (MPE, formerly ECAF) for "Data Security" & "Merchants". In April 2011, my team won the Information Security Team of the Year award from SC Magazine & I was inducted to the Infosecurity Europe Hall of Fame. Other awards include the 2010 European Card Acquiring Forum (ECAF) award for Data Security (PCI DSS) and in October 2010, I was voted number 4 of the top 10 most influential people in infosec in the UK by SC Magazine and ISC2. In addition, I have been on the PCI Security Standards Council Board of Advisors since 2009.

Past achievements included:
•Managed the programme to launch of streamlined straight through Mortgage Process Platform for Abbey for Intermediaries. Achieved in 10 months.
•Managed the programme to centralise Mortgage Underwriting from a network of 700 branches to one centralised area. Achieved in 9 months.
•Managed the programme to support the insourcing of the Abbey credit card from MBNA and implementation of the new Santander platform. Also managed the migration of the existing debit card to the new Santander platform.
•Other programmes in my portfolio included all people/ process & technology aspects of the following: Investments, Business Banking, General Insurance, International & Domestic Payments.
Recorded May 23 2012 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Neira Jones, Head of Payment Security, Barclaycard
Presentation preview: Understanding Cloud Security: Finding the Boundaries
Recommended for you:
  • Date
  • Rating
  • Views
  • A major company has been hacked, suffering a data breach. How do companies the size of Sony handle such situations? Various departments, including legal, tech and PR come together to meet with the management and workout a plan on how to handle the crisis. This presentation will focus on both -- companies with a data breach response plan and those without one. We'll shed some light on what the first 24 hours post-breach looks like for a major company.
  • Understanding the cybersecurity posture of vendors, suppliers, and third-parties is now a necessity for businesses in all industries. Yet, many businesses do not have a formalized vendor risk management program. There are multiple components needed to create a comprehensive vendor risk management program. These span governance and control, as well as security controls and technology.

    Join Jake Olcott, VP at BitSight on February 9 as he highlights best practices and industry standards for vendor risk management programs. Attendees will learn:

    - Which frameworks and methodologies can help get you started
    - Vital questions you should be asking your vendors
    - Why continuous monitoring and verifying vendor security is crucial to mitigate cyber risk
  • Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?

    If you answered yes to any of these questions, you need to register for this webcast. You will learn:
    •How to replicate any workloads to Microsoft's global datacenters
    •How to back up data and protect workloads with nearly infinite scalability
    •How to implement a hybrid replication using both cloud and on-premises solutions
    •How to create a backup without needing to buy more tape
    •How to back up your Windows clients (including Windows 10) to remote storage

    Register now to watch live or receive notification when this program is available on-demand.
  • NRF 16 attracted over 33,000 attendees and focused on retail technology, trends, and areas of focus for the coming fiscal year. Hortonworks and Microsoft were visible booth presences, hosting large volumes of visitors. Together, the partnership is uniquely qualified to accelerate retail data collection and management.

    Join Hortonworks VP of Industry Solutions, Eric Thorsen, and Microsoft’s Retail Industry Solutions Director, Shish Shridhar, to learn how Data-Centric Retail Trends can impact your business and how Hadoop can help you gain actionable insight from your data. Understand how your peers are using data to drive new levels of customer centricity, real-time inventory predictions, and personalized marketing. Learn about how consumer goods companies are using Hadoop to gain insight from demand signals and analyze data flow.
  • See how you can get ahead of the new wave of mobile access and security challenges with the newly released Secure Mobile Access 11.3 firmware in this webcast.

    You’ll learn about some of the new features:

    •Dell EMM/DMM integration: SSO with Dell Mobile Workspace container (supports IOS and Android)
    •New Console Management System (CMS)
    •Kerberos Constrained Delegation
    •Clientless access to SharePoint
    •Chrome OS support
    •More HTML 5 clients supported
    •Better control over SSL protocols and Ciphers
  • In this webinar we will explain how DevOps, powered by Chef automation, makes it possible to deliver infrastructure and new features at velocity within the highly regulated world of the UK Government sector.

    Using Chef in conjunction with a platform such as Skyscape Cloud Services, which provides assured cloud services, enables the government sector to deliver software at speed without fear of compromising Official and Official Sensitive data. With a correctly provisioned and tested infrastructure, plus rules that automate rigorous security testing and policy assurance, you can reduce risk, provide a faster route to delivery and help enable DevOps within your organisation.

    Hear from Seth Thomas, DevOps Evangelist at Chef Software and Peter Rossi, Head of Automation at Skyscape Cloud Services on how to automate your infrastructure in a secure cloud environment.

    In addition, Viewdeck Consulting and Synyega will discuss their successes within this market sector, and offer tips on how you too can adopt DevOps practices.
  • The Identity Management market continues to be heavily influenced by several important trends – cloud, mobile, the rise of the user, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. How will these trends continue to impact the identity landscape, and what should organizations do to prepare for it? Join CA Technologies and (ISC)2 on February 4, 2016 at 1:00PM Eastern as we look at the next phase of identity management, and how these and other emerging trends will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Understanding Cloud Security: Finding the Boundaries
  • Live at: May 23 2012 12:00 pm
  • Presented by: Neira Jones, Head of Payment Security, Barclaycard
  • From:
Your email has been sent.
or close
You must be logged in to email this