Browse communities
Browse communities
Presenting a webinar?

The State of IT Security and GRC in 2012

Ronald Ross, NIST; Anton Chuvakin, Gartner; Andrea Hoy, ISSA; Dr. Said Tabet, OCEG
At this year's San Francisco BSides conference, BrightTALK gathered together thought leaders in the fields of IT security and GRC to get their perspectives on the challenges and opportunities facing their communities and industries in 2012.

After a series of enlightening interviews we've decided to bring the thought leaders back for an in-depth discussion. Join us for what will be a lively conversation among the top minds in their fields on cloud security, BYOD, PCI compliance and the GRC challenges that apply across them all.

The Panel:

Ron Ross, Computer Scientist, NIST Fellow (moderator)
Anton Chuvakin, Research Director, Gartner
Andrea Hoy, Director - International Board, ISSA International
Dr. Said Tabet, Chair of GRC-XML Project, OCEG
May 1 2012
63 mins
The State of IT Security and GRC in 2012
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5497)
  • Upcoming (136)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • New Thinking About Identity Management May 12 2015 4:00 pm UTC 45 mins
    Penny Crossman, Banking Technology News, Stephen Lange Ranzini, University Bank, Thomas Hardjono
    From massive security breaches to redundant entering of information to the privacy concerns raised by data brokers, it is clear that today's identity infrastructure is ill-suited for the digital age.

    How can identity management be retooled to serve the (sometimes conflicting) imperatives of security, privacy, convenience and compliance?

    Hear from FinTech industry experts from American Banker and learn:
    - What it will take to cross the digital chasm 
    - What role can and should financial service providers play in the transformation

    Find out how to retool your identity management by registering for this live webinar.
  • Preparing for 2015: Internet security best practices from the Global 1000 May 12 2015 4:00 pm UTC 45 mins
    Jim Reavis, CEO at the Cloud Security Alliance & Dan Druker, CMO at Zscaler
    The world of IT security is undergoing tremendous change. The unstoppable momentum of the Internet and cloud computing, the ubiquity of mobile devices and the emergence of Internet of things have together turned the IT security landscape upside down. So what can you do today to keep your security ahead of these trends? In this webcast, we will share actionable best practices gleaned from more than 5,000 leading global organizations - including United Airlines, Humana, Sealed Air, British American Tobacco, the United States Marines and NATO. We will also talk about the latest strategies and techniques cyber-criminals are using today and the concrete steps you can take to keep your organization safe.
  • The Virtual World Exposed: Hacking the Cloud May 12 2015 3:00 pm UTC 45 mins
    Jason Hart, VP Cloud Solutions, SafeNet, Larry Ponemon Chairman and Founder of the Ponemon Institute
    Join Gemalto in collaboration with Ponemon on May 12th as we reveal recent study results on how hackers are attacking the cloud.

    This presentation will use live demos to show how vulnerable cloud and virtual environments can be without the correct controls. Examples will include how password controls can be bypassed and compromised, why software keys are not good enough, and how personal life threatens your business and work life.
  • The Magnificent Seven – Best Practices for Cloud Security May 12 2015 2:00 pm UTC 45 mins
    James Brown, Director of Cloud Computing and Solutions Architecture, Alert Logic
    If you’re using or considering cloud, you should also be considering security in the cloud. Join our webinar where we will talk through seven practical best practice ideas for ensuring security in any cloud environment, from securing code and creating access management policies to understanding your cloud providers security model and where you need to assume security responsibility.

    We will explore real-world data about security incident threats identified in Alert Logic’s Cloud Security Report. This will help you understand the types of attacks happening in the cloud today, how the threat landscape has evolved as cloud adoption has accelerated in the last several years, but also how you can secure your organisation and avoid them.

    Key Takeaways:

    · 7 Practical actions you can take today for your cloud security

    · Understand the threat landscape

    · Insight into 2-3 recent high-profile breaches

    This webinar is essential for anyone who wants to understand how to build a plan for security and compliance in the cloud.
  • Securing Identity in the Cloud May 12 2015 12:00 pm UTC 45 mins
    Hans Zandbelt, Senior Technical Architect, Ping Identity
    - How to extend your IAM infrastructure to support Cloud based apps
    - The check list you need to get started
    - How to provide web single sign-on and API security for customers, partners, and employees
  • The Cloud - What are the Challenges and Opportunities for Law Enforcement? May 12 2015 11:00 am UTC 45 mins
    Philipp Amann, Senior Strategic Analyst, Europol's European Cybercrime Centre (EC3)
    After a brief introduction to the Europol’s European Cybercrime Centre, this webinar will discuss the challenges and opportunities that law enforcement face in relation to the Cloud.

    The webinar will specifically focus on those challenges and opportunities that present themselves to law enforcement in the fight against cybercrime. This will cover, among other things, the need for strong security and protection for privacy while finding the right balance between these essential requirements and the need to investigate criminal activities abusing Cloud services.
  • Taking a Data-Centric Approach to Cloud Data Protection May 12 2015 10:00 am UTC 45 mins
    Bob West, Chief Trust Officer, CipherCloud
    Organizations are moving to the cloud aggressively but many have concerns about security, more basically, how to approach this significant transition. This presentation will cover the leading practices in cloud strategy and cloud data protection.
  • CyberTECH Securing the Internet of Things Forum San Francisco - Part 2 May 6 2015 6:00 pm UTC 60 mins
    Expert Panel
    This panel of security experts will discuss the internet of things and what's keeping them up at night when they think about security in 2015. After an in-depth discussion, there will be live Q&A from the audience.

    This week's panelists include:
    Ron Gula, CEO and Founder, Tenable Network Security
  • The Mobile Security Problem for Small Businesses May 6 2015 5:00 pm UTC 60 mins
    Cameron Camp, Security Researcher
    Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
  • Rethinking Remote Office Backup May 6 2015 5:00 pm UTC 45 mins
    Nick Kotterman, Product Marketing
    Remote office backup presents numerous challenges, including ever-increasing data volumes, network bandwidth constraints, overtaxed IT administrators and complicated, time-consuming backup processes. Compounding all this is a reliance on older technologies that are inefficient and costly. And the more sites your organization has, the challenges multiply.

    It's time for businesses to rethink remote office backup; one that meets data and regulatory retention requirements, is easy to deploy and maintain, and is secure and cost effective. Its time to look to the cloud.

    Join backup experts Druva to learn how remote office server backup has evolved. Discover how the cloud offers a new, and in most cases, a better approach. In this session you’ll learn:
    - How the latest advancements in cloud storage technology scale globally for enterprises of all sizes
    - Why advances in cloud security models are addressing stringent global security and data privacy issues, including data residency requirements and more
    - How an 'infinite data snapshot model' combined with cost-optimized flexible retention eliminates traditional vendor restrictions.

    Hear real-life use cases of how others are leveraging the cloud for remote server backup. Live Q&A will follow to answer your specific questions.
  • Cloud Security: It’s in the cloud - but where? May 6 2015 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF Ltd
    Organisations are becoming increasingly dependent in their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions.

    However, while these services can be implemented quickly and easily, with increased legislation around data privacy, the rising threat of cyber theft and the requirement to access your data when you need it, organisations will need to have a clearer understanding of where their information is stored and how reliant these services are.

    During this webcast, Steve Durbin, Managing Director of ISF Ltd, will provide insights into how you can manage the risks associated with cloud computing to ensure maximum benefit.
  • CyberTECH Cyber+IoT eWeek Roundtable Recorded: May 5 2015 61 mins
    Expert Panel
    The CyberTECH Cyber+IoT eWeek Roundtable features top industry experts sharing critical updates and information regarding IoT Security. The roundtable will be moderated by eWeek Editor, Chris Preimesberger and includes top cyber, IoT and InfoSec professionals. Special guest speakers include Michael Daniel, Special Assistant to the President and US Cybersecurity Coordinator for the White House, Mark Weatherford, Principal at the Chertoff Group, Enrique Salem, former CEO at Symantec.
  • NGFW 101: What is it and why should you care? Recorded: May 4 2015 49 mins
    Deena Thomchick, Director of Product Marketing, Fortinet
    What makes a firewall a next generation firewall? How can next gen capabilities help you and what are the gotchas you should know before you turn it all on? Get your basic education on NGFW and some tips you should know before you get started.
  • Best Practices in Major Incident Management Communications Recorded: Apr 29 2015 61 mins
    Scott Bowler, Manager of IT Delivery Management Services, NBN Co. and Abbas Haider Ali, Chief Technology Officer, xMatters
    If your data, services and processes become compromised, your business can suffer irreparable damage in minutes. The clock is ticking, and how fast you communicate to your major incident resolution team is everything.

    Join Scott Bowler, Manager of IT Delivery Management Services, NBN Co, and Abbas Haider Ali, CTO of xMatters and learn how NBN Co identifies major incidents and uses best practices for automating their communication processes to resolve major IT incidents quickly and effectively.

    During the event you will learn how to:
    - Immediately Identify a major incident
    - Instantly locate available major incident managers and target notifications to them
    - Get the right resolution team on the job fast based on the required expertise
    - Utilize one-click conference bridge technology to get key stakeholders together instantly
    - Conduct reviews to identify improvements and prevent similar incidents from reoccurring
  • Layered Security Infrastructure: Enterprise Case Studies Recorded: Apr 29 2015 36 mins
    Icaro Vazquez, Senior Product Line Manager, Security
    As bad actors relentlessly continue to take advantage of the many innovations and trends in our current world, network security professionals are realizing that the passive mode of checking for threats is no longer adequate. As BYOD is now the norm rather than the exception in the corporate world and most organizations have a significant presence in the cloud, bad actors are more than happy to take advantage of the new conduits into the corporate network. Therefore, the need to catch, repair and eliminate security threats as early as possible has never been greater. With this in mind, VSS Monitoring has been helping various enterprise customers to deploy an inline layered security infrastructure that provides multiple lines of defense against the bad actors.

    This webinar will present some of the use cases we have been involved in, what were the motivations that led to the deployment of layered security and how a layered security architecture, anchored by VSS Monitoring, allowed enterprises to become more nimble in their never ending fight against bad actors. Join us for a safari tour of an exciting and evolving space!
  • The Hybrid WAN for Your Data Center Recorded: Apr 29 2015 31 mins
    Mark Byers, Director of Product Marketing, Fortinet
    Almost every organization is challenged by the increasing need for more bandwidth. Cloud-based services, content-rich applications, and access to internet sites is putting more and more strain on the limited pipes coming in to your data centers. WAN Optimization had been the tool of choice to connect and manage branch office traffic. It's now more and more being used to bridge multiple Internet connections for organizations large and small to create more bandwidth in and out of their data centers. Traditional WAN Link Load Balancing has evolved from simple back up and VPN connectivity to a robust traffic management tool that seamlessly adds bandwidth using virtually any ISP technology. In this webinar you’ll learn the basics of Hybrid WANs, what they and Link Load Balancing can do for your organization, and discover more about Fortinet’s Hybrid WAN solutions.
  • SDN and NFV: Protecting the Next Wave of Infrastructure Recorded: Apr 29 2015 41 mins
    Talbot Hack, Senior Product Manager, Arbor Networks
    As traditional network architectures come under increasing strain, Software Defined Networking (SDN) and Network Functions Virtualization (NFV) hold the promise of making networks more open, predictable, flexible, user- and service-friendly and lower cost to operate. These virtualized, software-controlled networking environments, however, do not yet benefit from the range and sophistication of DDoS protections and security available for traditional networks. This presentation focuses on how the delivery of traffic intelligence, threat detection and attack blocking is evolving, regardless of whether BGP and flow or future SDN/NFV-based techniques are in use.

    Attend this session to learn how Arbor Networks is adopting its DDoS solution suite to advance protections in SDN- and NFV-based networks.
  • Surveillance: Protect Your IP From Watching Eyes Recorded: Apr 29 2015 39 mins
    Stan Mesceda, Product Manager of High Speed Encryption, Gemalto
    Join Gemalto on April 29th to hear Stan Mesceda, Senior Product Manager at Gemalto give his expertise on data in motion and the importance of High Speed Encryption
  • Deploying Flowspec in a Service Provider Environment Recorded: Apr 29 2015 37 mins
    Steve Walsh, Senior Security Engineer, AOL
    Flowspec is an important tool in combating DDoS attacks, especially in large networks. Arbor provides valuable intelligence on how to craft your Flowspec routes, as well as a handy interface for managing the routes.

    In this session, Steve Walsh, Senior Security Engineer at AOL, describes what Flowspec is, how it came about, and how it works. Learn about some of the tests performed by Juniper and others on scalability, and the discovered limitations that were overcome with the implementation of Flowspec.

    Join this session to learn:
    •Some of the different methods of deploying Flowspec
    •How Flowspec compares with alternative filtering methods
    •Best practices for secure traffic routing
  • Best Practices for DDoS Protection Recorded: Apr 29 2015 46 mins
    Julio Arruda, Sales Engineering Manager, Arbor Networks
    DDoS attacks have been around for more than a decade, and in that sense they are old news. However, what a DDoS attack actually is has been constantly changing. There are several persistent misconceptions about DDoS attacks and DDoS defense that leave too many organizations vulnerable today. One misconception is that a DDoS attack is all about size. While certainly true, modern DDoS attacks can enormous, DDoS today is more frequently targeting your applications and security infrastructure, such as your firewall and IPS. Another misconception is that DDoS defense is an either-or proposition. You handle it in the cloud through a provider, or you have DDoS defense on premise. In fact, one layer of protection is not protection at all.

    Join us for a session that will cover:
    • An overview of the current attack landscape and implications
    • Best practice defense against modern DDoS attacks
    • Lessons learned by global enterprises struck by attacks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The State of IT Security and GRC in 2012
  • Live at: May 1 2012 5:00 pm
  • Presented by: Ronald Ross, NIST; Anton Chuvakin, Gartner; Andrea Hoy, ISSA; Dr. Said Tabet, OCEG
  • From:
Your email has been sent.
or close
You must be logged in to email this