Hi [[ session.user.profile.firstName ]]

Revamp Your Supply Chain Risk Strategy

Supply Chain Risk Management doesn’t need to be complex or resource intensive. A well-designed approach to your risk strategy can save you time, money, and headache.

In this webinar, Security Assessment Specialist Brandon Ritze will share:
1. The key building blocks to an effective risk strategy
2. Common pitfalls organizations make that should be avoided
3. Practical, actionable steps to get you on the right path to managing third-party risk with confidence
Recorded Feb 4 2021 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brandon Ritze, Security Assessment Specialist, Covail
Presentation preview: Revamp Your Supply Chain Risk Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber Authors Ep.5: Big Breaches: Cybersecurity Lessons for Everyone Jul 14 2021 5:00 pm UTC 60 mins
    Neil Daswani President of Daswani Enterprises | Sushila Nair VP Security Services NTT DATA
    The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone―not just techies―to become informed and empowered on the subject of cybersecurity.

    Knowing this, author Dr. Neil Daswani covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, and unencrypted data in his latest book, Big Breaches: Cybersecurity Lessons for Everyone.

    In this session, Neil Daswani is joined by Sushila Nair where they’ll discuss:
    - Effective prevention and detection countermeasures
    - Meta-level causes of breaches
    - Crucial habits for optimal security in your organization
    - and much more!

    Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, this webinar will answer your questions and prepare you for the future of cyber security.

    This episode is part of Cyber Authors, a new series with Sushila Nair. We welcome viewer participation and questions during this interactive interview.
  • Federated Learning and Preserving Data Privacy Jun 23 2021 4:00 pm UTC 60 mins
    Eric Topham, The Data Analysis Bureau | Dr. Pedro Baiz, Imperial College London | Max Robbins, AI Market
    Businesses rely on AI models that transform data into actionable insights. Traditional methods for creating AI models require a lot of data that is collected at some central location. Federated Learning (FL), however, takes a different approach by turning the centralised paradigm on its head and moving models or functions to be executed to where the data is.

    As a distributed process that does not require a single depository of data and where different parties can train an AI model without having to share the data, FL can be used in situations where data privacy is paramount.

    This paradigm shift is also creating new opportunities to democratize AI, which has the potential to transform the data economy.

    Join this month's episode of the Business Intelligence Report with Eric Topham, Co-Founder & Data Science Director at The Data Analysis Bureau, to learn more about how FL works and what opportunities it creates for consumers and enterprises.

    Viewers will also hear from the experts about the different use cases for federated learning, especially in the context of customer privacy, regulatory compliance, and integrating siloed data. The topics up for discussion will include:
    - The emergence of FL
    - FL, the democratization of data and what this means for Big Tech
    - How FL can be used as a privacy-preserving technology
    - Business use cases for FL
    - How FL can be part of your data strategy

    Speakers
    - Dr. Pedro Baiz, Royal Society Entrepreneur in Residence, AESE: Adaptive Emergent Systems Engineering Group, Department of Computing at Imperial College London
    - Max Robbins, CEO of AI Market

    This episode is part of The Business Intelligence Report original series with Eric Topham, Co-Founder & Data Science Director at The Data Analysis Bureau. We welcome viewer participation and questions during this interactive panel session.
  • Zero Trust for the New Normal Jun 16 2021 4:00 pm UTC 60 mins
    Diana Kelley, SecurityCurve | Mari Galloway, Women's Society of Cyberjutsu | Jonathan Nguyen Duy, Fortinet
    Working remotely has become the new normal. This, and many other changes organizations adopted last year in response to the pandemic are likely to stay for the long term. According to Gallup, about two-thirds of U.S. remote workers want to continue to work remotely. So, how can organizations continue to support their growing distributed workforce at a time where reports of security threats have increased by 400% compared to pre-pandemic levels? 

    Here is where the zero-trust approach to security comes into play. 

    Join this month's episode of The (Security) Balancing Act with Diana Kelley and guests as they discuss the emergence of zero trust (“Trust Nothing, Verify Everything”) and what it helps achieve for enterprises in the age of cloud and remote work.

    Viewers will learn about:
    - The evolution of the security perimeter and the shift to zero trust
    - Why zero trust is an approach and not a product
    - Zero Trust Network Access (ZTA) vs. corporate VPN
    - Real-world stories and practical hands-on guidance from people who have deployed a ZTA

    Speakers:
    - Mari Galloway, CEO, Women's Society of Cyberjutsu
    - Jonathan Nguyen Duy, Vice President, Global Field CISO Team, Fortinet
    - Other Panellist TBA

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • The need for Deception in the Enterprise May 12 2021 9:00 pm UTC 45 mins
    Dr. Rafael L. Torres Jr, Portfolio Manager, Verizon
    This presentation will describe the value added by deploying honeypots in an enterprise. How honeypots assist defenders across the MITRE ATT&CK matrix and their role in a Zero-Trust Architecture.
  • Cyber Authors Ep.4: Stopping Losses from Accidental and Malicious Actions May 12 2021 5:00 pm UTC 60 mins
    Ira Winkler President at Secure Mentem | Sushila Nair VP Security Services at NTT DATA
    As users cost organizations billions of dollars due to simple errors or malicious actions, organizations believe that they have to improve their awareness efforts to make more secure users. The reality is that it takes a multilayered approach that acknowledges that users will inevitably make mistakes or have malicious intent, and the failure is in not planning for that.

    Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, join Sushila Nair with author Ira Winkler on how to determine the appropriate countermeasures to implement and prevent cybersecurity breaches and other user-initiated losses. Join now and learn how to:

    -Minimize business losses associated with user failings
    -Proactively plan to prevent and mitigate data breaches
    -Optimize your security spending
    -Cost justify your security and loss reduction efforts
    -Improve your organization’s culture

    Business technology and security professionals will benefit from the information provided by these two well-known and influential cybersecurity speakers and experts.


    This episode is part of Cyber Authors, a new series with Sushila Nair. We welcome viewer participation and questions during this interactive interview.
  • Threat Modeling with the VERIS A4 Threat Model May 12 2021 5:00 pm UTC 45 mins
    John Grim, Head (Distinguished Architect) | Research, Development, Innovation Verizon Threat Research Advisory Center
    VERIS, the Vocabulary for Event Recording and Incident Sharing, is a set of metrics designed to provide a common language for describing cybersecurity incidents (and data breaches) in a structured and repeatable manner. VERIS provides cyber defenders and intelligence practitioners with the ability to collect and share useful incident-related information - anonymously and responsibly – with others.

    VERIS underpins the annual Data Breach Investigations Report. VERIS and its A4 Threat Model – Actors, Actions, Assets, Attributes – help codify incident-related information for threat modeling, intelligence analysis, breach mitigation, and detection / response improvement.

    Key takeaways for this session include:
    • Understanding cybersecurity incidents through the VERIS lens
    • Recognizing the VERIS A4 Threat Model: Actors, Actions, Assets, Attributes
    • Getting started in Threat Modeling with VERIS
  • Ransomware in the Remote Work Era May 12 2021 4:00 pm UTC 60 mins
    Diana Kelley, SecurityCurve | Jessica Gulick, Katzcy
    Phishing and ransomware attacks continue to rise, according to Proofpoint’s State of the Phish report for 2020. Organizations in the U.S. are at risk, the increase in remote work due to the pandemic has fueled a spike in attacks, and phishing attempts are up by 14 percent compared to the previous year.

    Email continues to be the number 1 delivery vehicle, but other social engineering schemes that rely on social media, voicemail (“vishing"), SMS phishing (“smishing”), and malicious USB drops are also of concern for organizations. Ransom demands are also on the rise, but according to the report, paying the ransom is not guaranteed to work as many companies that paid the ransom failed to receive a decryption key.

    Join this month's episode of The (Security) Balancing Act as Diana Kelley and guests discuss why ransomware is surging again, which sectors are most at risk, the threat to enterprises and how it is being used for more than just ransom (ex: distractionware, destructionware, etc).
    - The rise in ransomware under the cloak of the pandemic
    - Why email continues to be the channel of choice
    - The difference between fully automated and human-operated campaigns
    - How to decide whether or not to pay or not to pay the ransom
    - Why your backups may not be immune to ransomware
    - Addressing the threat with best practices

    Speakers
    - Jessica Gulick, Founder & CEO of Katzcy Consulting
    - Other panelists TBA

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Breach detection – Lessons learnt from mountaineers May 12 2021 8:00 am UTC 45 mins
    Renaud Bidou, Technical Director, Southern Europe, Trend Micro
    Breach detection efficiency is all about consistent monitoring, organization and communication, experience (and expertise), training and proper tooling.

    So is mountain rescue.

    If you fall in a crevasse, get caught in an avalanche or come off a ridge, your survival depends only on time.

    And in a mountaineer's career you know this will happen, as you should know, working in IT Security, that you will be breached.

    So let’s be prepared, and learn from 200 years of mountain exploration how to quickly and efficiently get out of a worst case scenarios.
  • Pull your SOC up with continuous validation and optimization May 11 2021 5:00 pm UTC 45 mins
    Mike DeNapoli, Lead Solution Architect at Cymulate
    Protecting your organization requires vigilance and skills combined with effective controls and detections, just having a SOC is not enough.

    SOCs vary in size, scope and staffing across various industries, outsourced and in-house, they exist to monitor, detect, and respond to evolving threats.

    Guarding against failures in the security architecture is not just about selecting the right tools and suppliers, it requires constant validation of your people processes and technology.

    Attend this session to learn:
    · Why SOC validation is crucial in confronting threat evolutions.
    · The elements of a continuous SOC validation and improvement program.
    · How continuous and automated red teaming and BAS make SOC validation achievable with existing resources.
  • Preventing the Big One: Staying Ahead of the Breach May 11 2021 3:00 pm UTC 60 mins
    Michelle Drolet, Towerwall | Nico Fischbach, Forcepoint | Micheal Meyer, MRSBPO | Further panelists TBA
    Over 37 billion records were exposed in breach events in 2020 - by far the most records exposed in a single year, according to a recent report by Risk Based Security. How has remote working impacted your organization's security posture? What lessons can security professionals learn from the recent wave of breaches and what steps can enterprises take to strengthen security in 2021?

    This keynote panel of security experts and industry leaders will explore the best practices for breach prevention, as well as share real-life lessons from the frontlines on what works and doesn't work.

    Viewers will learn more about:
    - The reality of data breaches
    - Why data breach severity is rising
    - Ransomware attacks on the rise (doubling from 2019 to 2020) and the threat to businesses
    - Technologies that help with breach prevention, detection and response
    - Why security awareness matters and best practices for educating employees to be cyber secure

    Moderated by:
    Michelle Drolet, CEO, Towerwall
    Nico Fischbach, Global CTO, Forcepoint
    Micheal Meyer, Chief Risk and Innovation Officer, MRSBPO
    Further panelists TBA
  • What's next? OWASP top 10 2021 May 11 2021 8:00 am UTC 45 mins
    Gábor Pék, CTO and Co-Founder, Avatao
    This talk introduces the main security pitfalls that every developer needs to know about before writing and shipping code.

    A recent non-official proposal of OWASP top 10 helps us better understand what weaknesses our contemporary systems face and how we can manage our daily job to avoid them. The new candidate, SSRF (Server-side Request Forgery), will also be highlighted in more detail.

    What you will learn:

    - What are the biggest mistakes we make while writing and shipping code?
    - Why is OWASP top 10 relevant for our daily jobs?
    - How can we avoid the most critical vulnerabilities?
  • Safeguarding your Data: Need & How To May 11 2021 7:00 am UTC 45 mins
    Shriram Munde, Team Lead | Himanshu Dubey, Director, Security Labs, Quick Heal Technologies Ltd.
    We are living in Data Age. Most organizations these days, in one form or other, rely on data to drive decisions & run their business. Thus, any data loss would mean considerable business impact to such organizations. Additionally, organizations’ collect certain data from users of their products, which is used for variety of purposes. If this data is lost / stolen, it may pose serious risks for the affected individuals and likely, tarnish the organization’s reputation.

    In recent past, we have seen many data breaches across the globe, which have affected organizations of all shapes & sizes. So, it is imperative that organizations take steps to safeguard themselves against data breaches.

    In this presentation, we will discuss:

    - Recent data breaches & their impact
    - Attack approaches used by Cyber Attackers
    - Prevention steps to safeguard data
  • Cybersecurity of AI: Essential Pillars to building AI systems securely Recorded: Apr 15 2021 38 mins
    Pamela Gupta, Trusted AI Leader, AI Ethics World
    As AI adoption increases and becomes a competitive and operational efficiency advantage, managing AI-related risks poses the top challenge for AI initiatives. Cybersecurity along with AI failures, misuse of personal data, and regulatory uncertainty are also top areas of concern.
  • Network Security in the Age of Remote Working Recorded: Apr 15 2021 64 mins
    Kalani Enos, Kenos Technologies | Mike Ichiriu, Zentera | Mike Grimshaw, Moovweb | Robinson Delaugerre, Orange Cyberdefense
    The pandemic and the shift to remote working has strained networks and pushed organizations to speed up their digital transformation journeys. With more users on the network than ever before, security has become a key priority.

    Discover how organizations are addressing the security challenges of remote working and the latest trends in network security.

    Join this panel of security experts and industry leaders to learn more about:
    - The impact of COVID on networks and security
    - The emergence of secure access service edge (SASE)
    - The need for smart network monitoring technology
    - New and old threats, and common vulnerabilities
    - Lessons from the SolarWinds hack
    - Best practices and recommendations for strengthening security in 2021


    Kalani Enos, Kenos Technologies
    Mike Ichiriu, VP, Zentera
    Mike Grimshaw, Sre & Security Manager, Moovweb
    Robinson Delaugerre, Investigations Manager (Computer Security Incident Response Team), Orange Cyberdefense
  • Building a Threat Detection Framework for the future Recorded: Apr 15 2021 43 mins
    Grant Paling, Product Manager, Orange Cyberdefense
    When it comes to building or updating your strategy for detecting threats to your business, it is important to know the direction you are headed in.

    Many Managed Detection and Response providers align themselves to a very short term strategy that would appear to solve all of your problems, when in fact what is needed is a more pragmatic approach that helps model out the different options you have for gaining visibility and also allowing for an understanding of the impact of limitations specific to your environment (for example a missing data or security event types).

    Join our Global Service Area Owner for Managed Detection and Response, Grant Paling, for an insight into how to build a strategic plan for improvements in security monitoring.

    Key takeaways:

    • Understand the different options for getting started with detection and response (including endpoint, log and network-based approaches).

    • Learn how they differ and the pros and cons of different approaches.

    • Find out how to model the impacts on visibility when choosing different approaches, and balancing that out against the time to value

    • See examples of where we’ve used our Threat Detection Framework to build business cases for expansion and to illustrate the impact caused by challenges from non-security parts of the business.
  • Cyber Threats of Today: Attack Approaches, Motivations & Protection Mechanisms Recorded: Apr 15 2021 38 mins
    Himanshu Dubey, Director, Security Labs | Sandeep Pimpale, Technical Architect, Quick Heal Technologies Ltd.
    Cyber threats are constantly and rapidly changing. With time, as security products have evolved, threat actors have also evolved and have found newer ways of infiltrating networks and hijacking devices. Also, as more and more organizations go through digital transformation, the opportunity for Cyber Attackers is only increasing. In addition, many Critical Infrastructure organizations, across the globe, are going digital; which substantially increases the stakes around successful Cyber Attacks, and has given rise to Nation State backed Cyber Attacks.

    In this talk we will discuss some major cyber-attacks of recent times, their motivation, & techniques used. We will also talk about best practices that organizations should adopt to protect against such threats.

    Key takeaways from this session:

    - Cyber Attack trends & motivations.
    - Insights into recent noteworthy Cyber Attacks.
    - Protection mechanisms.
  • We’d all like to forget 2020, but the phishing landscape provided great insights Recorded: Apr 14 2021 32 mins
    Tonia Dudley, CISSP, CISA Strategic Advisor Cofense
    The rapid removal of threats has never mattered more. In our Annual State of Phishing report, we discuss how 2020 saw the emergency of new threat actors, the appearance of some old ones and changes in malware and phishing attacks.

    What you will learn:

    - How over 50% of phishing reported by Cofense customers are credential phish
    - An effective phishing defense program enables organizations to quickly reduce risk
    - Tactics used by threat actors to make it to the inbox
  • Taking Down Nation State Botnets Recorded: Apr 14 2021 59 mins
    Diana Kelley, SecurityCurve | Johna Till Johnson, Nemertes Research | Craig Harber, Fidelis | Derek Manky, Fortinet
    This month's episode of The (Security) Balancing Act will focus on botnets as a growing threat to the enterprise, examples from the real world, and what enterprises can do to better protect against botnet-fueled state sponsored attacks.

    Join this interactive roundtable discussion with security experts and industry leaders to learn more about:
    - How botnets have become a tool for cyber criminals and nation state actors
    - Real-world examples & known botnet attacks
    - Nation state ransomware attacks
    - DDoS attacks
    - Cyber espionage
    - ATPs
    - The trouble with attribution
    - What enterprises and governments can do to address the threat

    Panelists:
    - Johna Till Johnson, CEO and Founder of Nemertes Research
    - Derek Manky, Chief, Security Insights & Global Threat Alliances, Fortinet
    - Craig Harber, Chief Customer Success Officer, Fidelis

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Mitigating Email Threats and Securing the Enterprise in 2021 Recorded: Apr 14 2021 35 mins
    Michelle Drolet, Towerwall | Rodrigo Araujo, Bell | JP Bourget, BlueCycle
    Phishing attacks related to working from home and the pandemic are on the rise, and email continues to be the primary vehicle. With so much on the line, how are enterprises addressing the risk of email-based attacks? What are the latest trends in email security and how to keep up with the old and new threats?

    Join this panel of security experts and industry leaders to learn more about the email security challenges enterprises are facing and the best practices for a stronger, more resilient enterprise:- Amplification of old attacks and email security challenges we will continue to see in 2021:

    - How are organizations dealing with phishing and spear-phishing
    - COVID-related phishing and social engineering attacks
    - Common red flags - how to spot a phishing email from a mile away- Protecting against business email compromise (BEC) attacks
    - Preventing credential theft
    - Lessons from the SolarWinds attack- Best practices for improving email security and protecting the enterprise


    Moderated by:
    Michelle Drolet, CEO, Towerwall
    Panelists:
    Rodrigo Araujo, Security Advisor, Bell
    JP Bourget President, BlueCycle
  • The future of email security: AI vs human Recorded: Apr 14 2021 45 mins
    Paul Tolmer, Chief Product Officer, Mailinblack
    With 90% of cyberattacks starting with a human error and phishing attacks having more than tripled since the start of the Covid-19 pandemic, involving and training 100% of staff is becoming a major leverage for companies. In this new deal of cybersecurity, the human brain is often the best (or only) tool to detect these social engineering attacks.

    The availability of tools and data are making the hackers' job easier: AI-driven software and social network data are starting to make large scale, individually personalized phishing attacks possible, including through phone or even video calls. Cyberattacks are increasing in sophistication and targeting staff in order to steal information and money or cause mayhem.

    In this webinar, we will share our views on:

    • Current and future technological trends around email protection
    • How AI is impacting the potential of massive social engineering attacks
    • How companies and software vendors are reacting to this trend with innovative training strategies
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Revamp Your Supply Chain Risk Strategy
  • Live at: Feb 4 2021 6:00 pm
  • Presented by: Brandon Ritze, Security Assessment Specialist, Covail
  • From:
Your email has been sent.
or close