Hi [[ session.user.profile.firstName ]]

How Big is Your Company’s Digital Shadow?

2012 will see organisations and their employees exposing more information online than ever before, be that through social media or through the technologies used by an organisation. They may perceive this information to be benign, however many have unintentionally and unknowingly exposed themselves
2012 will see organisations and their employees exposing more information online than ever before, be that through social media or through the technologies used by an organisation. They may perceive this information to be benign, however many have unintentionally and unknowingly exposed themselves to compromise by a cyber attack or may have leaked damaging or confidential information. Hackers are increasingly researching their target organisations and their employees before making focused, targeted attacks.

This presentation examines how companies' digital shadows are growing, and puts forward steps organisations can adopt to help get this information sprawl under control.

James Chappell is CTO for managed security service firm, Digital Shadows. James, builds on a technical infosec consulting career of 12 years looking at the security of large private sector and government organisations. During this time he became fascinated by the growth of crime and fraud in computer networks, with a particular focus on effective ways of measuring of managing the big picture of information security for large public and private sector organisations.
Recorded Jun 21 2012 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Chappell, Chief Technology Officer, Digital Shadows
Presentation preview: How Big is Your Company’s Digital Shadow?
Recommended for you:
  • Date
  • Rating
  • Views
  • Planning for SOC 3.0 Planning for SOC 3.0 Moderator: Stephen Pritchard - Speakers: Haim Goldshtein & Brian Honan Live 75 mins
    What is the next-generation Security Operations Centre (SOC)? Security operations are challenged with threat complexity, alert fatigue, prioritization and skill shortage. Security operations are required to be more closely aligned with business processes. A SOC should not only be able to contain an incident, but to manage the complete incident workflow across business units in the entire organization, as well as outside the organization.

    In this webinar we will examine the foreseen challenges in managing next-generation security operations and present a case study demonstrating the tools and processes being used by a forward-looking enterprise to prepare for SOC 3.0.

    Key takeaways:

    • Which challenges should enterprises prepare for when planning security operations?
    • [case study] which tools and processes do forward-looking enterprises use to build the next-generation SOC?
    • How can enterprises who are not in position to build their own SOC manage security incidents effectively?
  • IBM Government Analytics Forum Livestream IBM Government Analytics Forum Livestream IBM Live 560 mins
    Wherever you are in the mission space – IT, development, program management, research or analysis – we all have one thing in common: We strive to meet mission outcomes that will transform and improve government services. But in a world of exponential change, federal agencies must continue to be innovative, agile and informed in order to make the best possible decisions to achieve results.

    Analyzing and understanding data allows federal agencies to generate predictive insights that lead to impactful actions and ultimately create a smart, efficient and highly-capable government. At the 2016 Government Analytics Forum, we’ll explore ways to:

    - Build a better understanding of the data acquired anywhere from social interactions to sensors, weather patterns to wearables, transactions to interactions and more
    - Develop informed decisions that drive mission performance and innovation in the areas of citizen programming, operational management, and threat mitigation
    - Expand and apply advanced analytics to enhance mission outcomes, reduce risks, and operate more efficiently
  • Assumption of Attack Webinars series #5: Central Management (Italian) Assumption of Attack Webinars series #5: Central Management (Italian) Alberto Malerba, Senior Sales Engineer, Trend Micro. Recorded: May 5 2016 15 mins
    Il 18 febbraio abbiamo lanciato la nostra serie di webinar dal titolo Assumption of Attack e abbiamo parlato di come le Smart Protection Suite ti assicurano una protezione completa e avanzata che costituisce uno scudo protettivo estremamente difficile da penetrare per i criminali informatici.

    Il nostro quinto webinar guarderà dietro la porta n. 5, Gestione centralizzata. Come puoi riuscire a gestire a livello centrale i criteri su minacce e dati per tutta l’infrastruttura IT? Quali sono i vantaggi di una visibilità utente-centrica in tutto il tuo ambiente?
  • Data, the new oil: Find out why and what it means for your organization Data, the new oil: Find out why and what it means for your organization Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto Recorded: May 5 2016 62 mins
    Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
    More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
    Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
    In this interactive webinar we will also discuss:
    - Why your data is wanted
    - The new data Protection paradigm
    - Live Hacking demo
    - What’s next and what to do now to remain on the safe side

    Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
  • Data, the new oil: Find out why and what it means for your organization Data, the new oil: Find out why and what it means for your organization Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto Recorded: May 5 2016 62 mins
    Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
    More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
    Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
    In this interactive webinar we will also discuss:
    - Why your data is wanted
    - The new data Protection paradigm
    - Live Hacking demo
    - What’s next and what to do now to remain on the safe side

    Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
  • Data, the new oil: Find out why and what it means for your organization Data, the new oil: Find out why and what it means for your organization Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto Recorded: May 5 2016 62 mins
    Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
    More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
    Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
    In this interactive webinar we will also discuss:
    - Why your data is wanted
    - The new data Protection paradigm
    - Live Hacking demo
    - What’s next and what to do now to remain on the safe side

    Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
  • Assumption of Attack Webinars series #5: Central Management (German) Assumption of Attack Webinars series #5: Central Management (German) Torsten Westphal , Senior Sales Engineer, Trend Micro. Recorded: May 5 2016 23 mins
    Am 18. Februar haben wir unsere Webinar-Serie namens „Assumption of Attack“ gestartet und erläutert, wie Ihnen die Smart Protection Suite umfassenden und fortschrittlichen Schutz bietet. Es entsteht ein Schutzschild, das von Cyberkriminellen nur äußerst schwer zu überwinden ist.

    In unserem fünften Webinar werfen wir einen Blick hinter Tür 5, Zentrale Verwaltung. Wie können Sie Bedrohungs- und Datenrichtlinien zentral für Ihre IT-Infrastruktur verwalten? Welche Vorteile bietet eine anwenderzentrierte Transparenz in Ihrer Umgebung?
  • Dridex: The Financial Threat Clogging Our Mailboxes Dridex: The Financial Threat Clogging Our Mailboxes Orla Cox, Director Security Response, Symantec and Dick O'Brien, Senior Information Developer, Symantec Recorded: May 5 2016 31 mins
    Dridex is one of the most persistent and prevalent threats facing organizations today. Configured to collect victim's banking credentials, it is now one of the most active and dangerous pieces of financial malware in circulation.

    Join this webcast as we discuss:

    •Dridex propagation methods, in particular its massive spam campaigns.
    •How Dridex attempts to steal banking information.
    •Guidance on how to protect against Dridex infections

    (This webinar is sponsored and brought to you by Symantec.)
  • Meeting international requirements and leveraging CSA STAR for supply chain mana Meeting international requirements and leveraging CSA STAR for supply chain mana John DiMaria, BSI Recorded: May 4 2016 52 mins
    When an organization adopts cloud services, it is in fact expanding its operations from a local or regional presence to a more global one. As a result, the corresponding organizational operations’ strategy needs to be adjusted to align with these changes. You need to be in line with international requirements as well as your supply-chain. A more formal analysis of the supply-chain as part of a more comprehensive due diligence review also needs to be considered.1

    It is not always clear how the CSP handles incidents, encryption, and security monitoring. Organizations are rarely aware of all the risks they take when working with a CSP. In fact, the risks are multifaceted and are far more complex than those they experienced before moving to the cloud.

    An organization that rushes to adopt cloud services may subject itself to a number of business impacts including

    - Contractual issues over obligations regarding liability, response, and/or transparency
    - Mismatched expectations between the CSP and the customer
    - Lack of internal training and awareness within the user organization
    - Potential for software designers/engineers that are developing software to be unaware of associated risks

    Many organizations are turning to the cloud because of the resources required to manage complex supply chains. It can be challenging for most organizations to understand the supply-chain structure of the CSP’s environment; however, an increase in transparency will increase trust.

    At this session we will discuss:

    -Quick review of module 1
    -How CSA STAR maps to international requirements
    -How you can use CSA STAR to manage and monitor your supply-chain.
  • HPE and Hortonworks Partner to Transform Manufacturing Operations HPE and Hortonworks Partner to Transform Manufacturing Operations HPE, Hortonworks Recorded: May 4 2016 62 mins
    Optimizing manufacturing processes ultimately revolves around increasing output at reduced cost and improved quality. Manufacturers try to minimize inventory levels by scheduling just-in-time delivery of raw materials, but even the smallest miscalculation can cause stock-outs that lead to production delays. Sensors and RFID tags can capture supply chain data, but this creates a large, ongoing flow of data. Hadoop can cost-effectively store this unstructured data, providing manufacturers with greater visibility into their supply chain history, and greater insight into longer term supply chain patterns. This gives manufacturers more lead time to adjust to supply chain disruptions, as well as helps reduce costs and improve margins on finished products.

    Hewlett Packard Enterprise and Hortonworks have a strategic partnership to help manufacturers realize their modern data architecture. Join us for this webinar and learn how Hortonworks leading enterprise-ready open data platform in combination with HPE’s leadership position in the worldwide x86 server market provides manufacturing organizations with proven solutions to help transform manufacturing processes.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How Big is Your Company’s Digital Shadow?
  • Live at: Jun 21 2012 2:00 pm
  • Presented by: James Chappell, Chief Technology Officer, Digital Shadows
  • From:
Your email has been sent.
or close
You must be logged in to email this