Hi [[ session.user.profile.firstName ]]

Business Continuity: Small Business

Business Continuity: Small Business
Recorded Oct 6 2009 14 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ian Skidmore, Dudley Council, Head of Contingency & Disaster Management
Presentation preview: Business Continuity: Small Business

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Emerging PCI DSS and NIST Standards Jan 28 2020 4:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    The Payment Card Industry Data Security Standard (PCI DSS) and the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework share the common goal of enhancing data security. This session maps PCI DSS to the NIST Framework and discuss how to align security efforts to meet objectives in both PCI DSS and the NIST Framework.

    PCI DSS is focused on the unique security threats and risks present in the payments industry

    The NIST Framework provides an overarching security and risk-management structure with security Functions, Categories, and Subcategories of actions. These Subcategories reference globally recognized standards for cybersecurity.

    Both PCI DSS and the NIST Framework are solid security approaches that address common security goals and principles as relevant to specific risks.

    We will discuss how the NIST Framework identifies general security outcomes and activities, and how PCI DSS provides specific direction and guidance on how to meet security outcomes for payment environments.

    This session will also discuss the interesting attribute based access control (ABAC) as a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes. This session also provides considerations for using ABAC to improve information sharing within organizations and between organizations while maintaining control of that information.
  • Data Privacy Day - Privacy 2020: A Millennial Perspective Jan 28 2020 3:00 pm UTC 41 mins
    Deveeshree Nayak, IT Security Professional
    Webinar Take-Aways:

    - What millennials think about privacy and What’s their expectation?
    - Diversity in Privacy in 2020
    - Impact on Criminology and Criminal Justice System in Privacy.
    - Career in Privacy

    About the Speaker:
    Deveeshree Nayak
    Faculty, School of Engineering & Technology (SET)
    University of Washington, Tacoma

    Disclaimer: My views in this webinar are my own.
  • Data Privacy Day - A Practical Approach to FFIEC, GDPR & CCPA Compliance Live 62 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.

    This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.

    Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.
  • When Privacy Compliance "Gets Stuck": Dos and Don'ts of Privacy Operations Recorded: Jan 28 2020 22 mins
    Adrienne Allen, Head of Security GRC and Privacy, Coinbase
    Companies today are increasingly aware of their privacy compliance obligations, including the emerging requirements from recent regulations like GDPR and California's CCPA. Most companies that invest in a privacy compliance uplift spend time on policy revisions, data subject rights tooling, training, and data discovery. But after the first rush of compliance activities, the challenges of privacy operations evolve:

    - How do you get beyond point in time compliance into managing repeatable processes?
    - What existing teams and operations should privacy leverage right away, and how should this change over time?
    - How do you prioritize updates to your data subject rights tooling, whether you've custom built or outsourced?
    - How do you avoid privacy fatigue?

    This webinar will cover common areas where privacy compliance can "get stuck," and discuss ways to successfully operationalize a growing privacy program at the speed of business.

    Presenter Info: Adrienne Allen, Head of Security GRC and Privacy, Coinbase
  • Holistic InfoSec: Achieving Real Information Security Program Results Recorded: Jan 23 2020 38 mins
    Diane Jones, Director of Cyber Risk, Kalles Group
    Too often, Information Security means technical point solutions. This approach leaves enterprises exposed and management and customers disillusioned.

    Join us to learn:

    - Why security programs remain on the margins of business adoption in spite of heightened threats and acknowledged need
    - Why security by technology alone is a dead end
    - The secret sauce for a vibrant, effective information security program
  • [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense Recorded: Jan 23 2020 77 mins
    Panelists: Dr. Anton Chuvakin, Google Cloud; with Sumedh Thakar, Qualys; Roger Grimes, KnowBe4; and Vivian Tero, Illumio.
    The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

    Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

    - Understand the changing cyberattack landscape,
    - Create a company-wide cybersecurity task force,
    - Evaluate your security budget against your threat level,
    - Fortify your cybersecurity defense with systems hardening, adaptive authentication, and endpoint protection.
  • Data De-identification: Protecting Privacy While Preserving Utility Recorded: Jan 23 2020 49 mins
    John Noltensmeyer, Head of Privacy and Compliance Solutions, TokenEx
    As organizations evaluate their de-identification and data minimization practices to satisfy an expanding landscape of regulatory obligations there are a number of factors to consider. Various technologies will be considered as part of a data-centric security strategy for de-identifying and securing sensitive information such as statistical tools, cryptographic solutions, suppression, pseudonymization, generalization, and randomization. Further, we will examine the capability of these technologies to preserve business utility within a Zero Trust data security model.

    Listen to this session and you will take away:

    • An understanding of the definition of de-identification as it relates to international and industry privacy regulations, including the difference between pseudonymization and anonymization
    • A strategy for balancing privacy and security concerns with business needs, such as evaluating and prioritizing risk
    • How various methods of de-identification can help meet the privacy requirements of applicable compliance obligations
  • When Privacy Compliance "Gets Stuck": Dos and Don'ts of Privacy Operations Recorded: Jan 22 2020 23 mins
    Adrienne Allen, Head of Security GRC and Privacy, Coinbase
    Companies today are increasingly aware of their privacy compliance obligations, including the emerging requirements from recent regulations like GDPR and California's CCPA. Most companies that invest in a privacy compliance uplift spend time on policy revisions, data subject rights tooling, training, and data discovery. But after the first rush of compliance activities, the challenges of privacy operations evolve:

    - How do you get beyond point in time compliance into managing repeatable processes?
    - What existing teams and operations should privacy leverage right away, and how should this change over time?
    - How do you prioritize updates to your data subject rights tooling, whether you've custom built or outsourced?
    - How do you avoid privacy fatigue?

    This webinar will cover common areas where privacy compliance can "get stuck," and discuss ways to successfully operationalize a growing privacy program at the speed of business.

    Presenter Info: Adrienne Allen, Head of Security GRC and Privacy, Coinbase
  • Offensive vs Defensive Security Recorded: Jan 22 2020 26 mins
    Rhonda Bricco (UnitedHealth Group), Deb Doffing (Optum), Sue Perkins (Optum), Cat Goodfellow (Optum)
    US Cyber Command has undergone a significant shift in strategies away from defense and deterrence to engagement and forward disruption. We’ll discuss whether offensive cyber actions deter or invite retaliatory attacks, impacts to private industry (both positive and negative), and whether enterprise security offices should take offensive measures and if so – how far should we go?
  • Privacy-2020: A Millennial Perspective Recorded: Jan 22 2020 42 mins
    Deveeshree Nayak, IT Security Professional
    Webinar Take-Aways:

    - What millennials think about privacy and What’s their expectation?
    - Diversity in Privacy in 2020
    - Impact on Criminology and Criminal Justice System in Privacy.
    - Career in Privacy

    About the Speaker:
    Deveeshree Nayak
    Faculty, School of Engineering & Technology (SET)
    University of Washington, Tacoma

    Disclaimer: My views in this webinar are my own.
  • [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020 Recorded: Jan 22 2020 77 mins
    Panelists: K Royal, TrustArc; Ilia Sotnikov, Netwrix, Dr. Else van der Berg, Datawallet; and Harold Byun, Baffle.
    The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

    The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

    On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.

    Learning objectives are to gain insights on:

    - Understanding the nuances, ambiguities and challenges of the CCPA;
    - Creating compliance programs in the midst of the unknowns;
    - Developing a strategic action plan to become CCPA compliant;
    - How to avoid expensive fines, class-action lawsuits, and injunctions;
    - Getting ahead of the curve and enabling your business with alternate data sharing and privacy preserving techniques.
  • What to expect in 2020: Regulatory Compliance in Privacy & Cybersecurity Recorded: Jan 21 2020 47 mins
    Kevin Kim, CIPP/C, CIPT, CIPM, FIP former Chief Privacy Officer, Canadian Western Bank Financial Group
    The General Data Protection Regulation (GDPR) has been making far more influence on the privacy landscape online than expected since its enactment by the European Union (EU) on May 25th, 2018.

    Google and Facebook, two of the most powerful digital platforms, were heavily scrutinized and penalized with hefty fines for their non-compliance in the European market. GDPR has also driven many countries, such as Japan, Brazil, and South Korea, to follow suit by strengthening their privacy laws. All 50 states in the United States have also joined the camp by amending their privacy laws - albeit to varying degrees - to make privacy breach reporting mandatory.

    Most notably, the State of California developed its own GDPR-style privacy law called “California Consumer Protection Act” (CCPA) and will enact in January 2020. Moreover, two federal privacy bills were recently submitted to the Congress aiming to be the very first federal-level, comprehensive privacy law in the U.S. Canada is no exception in this privacy-aware trend. The ruling liberal party made clear that modernizing privacy legislation to protect citizens online will be one of the party’s priorities.

    This presentation will talk about current trends in privacy field in terms of regulatory requirements in the U.S., Canada, and Europe, discuss what to expect in 2020, and what to do to make sure that all the organizations and institutions are compliant with applicable laws and regulations in their jurisdiction.
  • Balancing Data Privacy & Security in 2020 Recorded: Jan 21 2020 58 mins
    Dr. Christopher Pierson | Shahrokh Shahidzadeh | Michelle Drolet | George Wrenn
    How has the compliance landscape changed in 2020? Is your organization aware of the main differences in data regulations around the world?

    Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.

    Viewers will learn more about:
    - CCPA is now in effect and what this means for you
    - The main differences between GDPR and CCPA
    - Best tools, practices, required policies and cultural game changers for commercial and government environments
    - Other data regulations on the horizon
    - Recommendations for 2020

    Speakers:
    - Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
    - Shahrokh Shahidzadeh, CEO, Acceptto
    - Michelle Drolet, CEO, Towerwall
    - George Wrenn, CEO & Founder, CyberSaint Security

    This Q&A panel is part of Privacy Month.
  • Data Privacy in 2020: Data Management for a Multi-Regulation Environment Recorded: Jan 21 2020 37 mins
    Jill Reber, CEO & Chair | Kina Ratanjee, Delivery Director, Primitive Logic
    When GDPR first arrived, some companies addressed it by implementing data privacy measures solely for their EU data subjects — only to have to go through the same exercise for California residents when CCPA came along. With major data privacy laws now in effect on both sides of the Atlantic and more on the way (possibly including U.S. federal legislation), organizations must adopt a holistic approach to managing personal data in an ethical, compliant manner.

    Join the data privacy experts from Primitive Logic to explore data management strategies for achieving and maintaining readiness for CCPA, GDPR, and other current and future privacy regulations.

    You will learn:

    - Why traditional master data management (MDM) can lay the groundwork for multi-regulation readiness, but won’t make you compliant on its own
    - How to address common threads in data privacy legislation while maintaining flexibility to adapt to future requirements
    - How to build a single source of truth for personal data as a cornerstone of your data privacy strategy
    - Governance strategies for adapting to “triggers” in maintaining data privacy readiness
  • A Practical Approach to FFIEC, GDPR & CCPA Compliance Recorded: Jan 21 2020 63 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.

    This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.

    Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.
  • STORAGE LIMITATION under GDPR: Overcoming compliance challenges in 2020 Recorded: Jan 21 2020 49 mins
    Virgilio Cervantes, Data Protection Compliance Manager, Countrywide PLC
    The GDPR principle of storage limitation determines that personal data must be erased (or anonymised) when 'no longer necessary'.

    As such, data controllers must embed appropriate technical and organisational measures into operations, to allow for the periodical review of personal data and to the erasure (or anonymisation) of any 'non-necessary' data, thus achieving compliance with GDPR's data storage requirements.

    An overview on the impact of the 'storage limitation' principle on organisations' operations will be undertaken, considering:

    - Storage limitation (structured, unstructured data);
    - Data minimisation (data collection, data hygiene);
    - Time limitation (retention policies, procedures and time schedules);
    - Risks of non-compliance (Data subject rights, data breaches).

    This session will thus provide a holistic and pragmatic framework-based approach to storage limitation and its ongoing compliance.


    Presenter:
    Virgilio Lobato Cervantes holds an LLB Honours degree in Law and a Master of Arts degree in International Tourism and Aviation Management. He is a certified Data Protection Officer by the University of Maastricht (ECPC-B DPO). Currently pursues a Doctorate degree in law at the University of Reading. Virgilio’s research focus is in EU data protection and privacy law.

    England and Wales Qualified Paralegal Lawyer, member of the Professional Paralegal Register (PPR Tier 3) and the Institute of Paralegals (Q.Inst.Pa.), specialised in Data Protection and Privacy Law, Virgilio presently takes on the role of Data Protection Compliance Manager at Countrywide PLC, the UK’s largest property services group.
  • PCI Dream Team: Ask Us Your Toughest Questions [Part 8] Recorded: Jan 14 2020 61 mins
    Ben Rothke | David Mundhenk | Jeff Hall | Arthur Cooper "Coop"
    The PCI Dream Team is back for another interactive Q&A session.

    Join us with your toughest questions and learn more about the various Payment Card Industry (PCI) standards and requirements, with a focus on PCI DSS v4.0.

    Our panelists are some of the top PCI QSA’s in the country, with decades of combined PCI and card processing experiences. They’ve seen it all: the good, bad and ugly; and lived to tell the tale.

    Join Ben Rothke, David Mundhenk, Arthur Cooper, and Jeff Hall for an interactive Q&A session, and get answers to your most vexing PCI questions. No PCI question is out of bounds.

    Speakers:
    - Ben Rothke, Senior Information Security Specialist at Tapad
    - David Mundhenk, Senior Security Consultant at Herjavec Group
    - Jeff Hall, Senior Consultant with Online Business Systems
    - Arthur Cooper "Coop", Senior Security Consultant at NuArx
  • The Top 20 Security Predictions for 2020 Recorded: Jan 8 2020 61 mins
    Dan Lohrmann (Security Mentor, Inc.) | Marija Atanasova (BrightTALK)
    Every year the top security companies, industry thought-leaders and tech media publications come out with their predictions for the coming year. And every year Dan Lohrmann publishes his roundup of these security industry reports, forecasts and trends.

    This BrightTalk webinar will dig into the 2020 report in detail.

    Link to the report: https://www.govtech.com/blogs/lohrmann-on-cybersecurity/the-top-20-security-predictions-for-2020.html

    There is huge career value for technology and security professionals who understand where the cybersecurity industry predictions, and you can read about those benefits in this CSO Magazine article: https://www.csoonline.com/article/3021951/why-more-security-predictions-and-how-can-you-benefit.html

    In addition to counting down (and referencing) the top 20 security prediction reports from the leading vendors, this webinar will examine:
    - Where is their agreement on what’s coming next?
    - Where is their major disagreement?
    - Where will cyberattacks come from next?
    - Which vendors have the best reports (and why)?
    - Who are the award-winners for most creative, most likely, most scary and other security industry predictions?

    We will discuss security and tech predictions on AI, autonomous vehicles, cloud solutions, cyberthreats, ransomware, IoT, malware, multi-factor authentication, business priorities, data breaches, spending, new vulnerabilities to watch for, mobile threats, 5G, new announcements, major security incidents, government contracts, election security, attacks on global events (like the 2020 Olympics), cyber incident response and much, much more.

    At the end, we will take your questions on all of this, and may even ask you to vote for your favorite predictions (or offer one of your own to share.)

    Join us.
  • The CCPA is Here: Are You Ready? Recorded: Jan 7 2020 12 mins
    Bob Canaway, CMO, Privitar & Guy Cohen, Strategy & Policy Lead, Privitar
    Join Bob Canaway, CMO, Privitar & Guy Cohen, Strategy & Policy Lead, Privitar as they discuss all things privacy and what to expect from the CCPA.

    Bob and Guy will share, amongst other things, unmissable insights into:

    - What data is covered by the CCPA
    - What the key privacy provisions in the CCPA are
    - What the CCPA means for security
    - Predictions for what the CCPA in practice will mean
  • Threat Hunting - An Introduction Recorded: Dec 19 2019 67 mins
    David Morris, Reid Eastburn and Skeet Spillane
    This Session will be the first in a series on Threat Hunting. This kick-off session will introduce the concept of Threat Hunting as there is a lot of confusion about this important activity. Specifically, we will cover what it is, how it is performed, its’ role and some of the best Tools to use as a Threat Hunter.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Business Continuity: Small Business
  • Live at: Oct 6 2009 11:00 am
  • Presented by: Ian Skidmore, Dudley Council, Head of Contingency & Disaster Management
  • From:
Your email has been sent.
or close