Lessons Learned: Zero Trust for Segmentation in IOT Based Smart Buildings
Smart buildings are the hottest topic of 2021. But the thought of system integrations to make this a reality is enough to give most network security teams heartburn. The planning, design, and implementation of IOT based “smart” buildings can be eased in its complexity, to realize ROI quicker, while ensuring that devices on the network are prevented from endangering the network or each other.
Through exploring lessons learned from successful projects, this session demonstrates how to start in your approach to a practical implementation of Securing a Smart Building, applying an interpretation of Zero Trust. It will cover methods used when security is of the utmost importance, and universal segmentation of threats is a requirement.
RecordedMay 11 202148 mins
Your place is confirmed, we'll send you email reminders
Ashwin Pal | Director Cybersecurity | Unisys Asia Pacific
It is now widely known that SMBs are a key target for cyber criminals. They are now seen as the ‘low hanging fruit’ as SMBs generally cannot afford the same investment in cyber security initiatives when compared to larger firms. Unfortunately, as far as the cyber criminals are concerned, anyone on the internet is fair game. Unlike their larger counterparts, a cyber attack on an SMB can be very debilitating and can even cause the business to shut down. SMBs face their own unique challenges when it comes to defending against cyber-attacks. Within this presentation, you will hear about how the Invictus Games in Sydney in 2019 was secured using minimal funding and time as a case study. We will then explore some of the unique challenges faced by SMBs when it comes to cyber security. We will look at how focusing on your core business and risk management helps direct efforts to the right places in a cost effective manner. We will then explore what a typical attack looks like and discuss the basics that need to be covered to provide an SMB with an ability to defend itself from cyber-attacks while avoiding overspend.
David Senecal, Sr. Director of Product Architecture & Research | Spandan Brahmbhatt, Sr. Data Scientist, Arkose Labs
Web APIs that handle critical workflows like login or new accounts creation are constant targets of attacks. Web site owners need to protect these endpoints in order to prevent account takeover as well as the proliferation of fake accounts.
In this presentation, we’ll look through real examples at how attackers evolve their strategies as soon as protections are in place. We’ll also provide some insights into the most effective detection methods in order to counter the evolution and to stay ahead.
And finally, we’ll discuss how the evolution of the Internet ecosystem is affecting the web security world and make the task more complex.
Cloud migration has been a focus for many enterprises over the last few years, and this has only been accelerated and driven by the move to remote working and work from anywhere. According to Deloitte, more than 90% of global enterprises will rely on hybrid cloud by 2022. While cloud migration is increasing, the threat landscape is too, which is why cloud SecOps should be an organisational priority.
Join security experts in this interactive panel as they discuss:
- How the pandemic impacted the rate of cloud migration
- Whether cloud migration was done properly during the pandemic or if it was rushed, and the impact of this on your security posture
- How cloud SecOps can improve response time and mitigation
- The future of cloud migration
- Cloud SecOps best practices
SASE, or Secure Access Service Edge, is growing in popularity at a rate few had anticipated. According to Gartner, 40% of enterprises will consider SASE adoption by 2024, compared with only 1% in 2018. But what can SASE do for your network security that other network security solutions can’t, and what does the future of SASE look like?
Join security experts as they discuss:
- Why SASE has exploded in the network security space
- SASE adoption best practices
- Why private VPN technology is no longer sufficient
- What SASE looks like in 2021
- Whether SASE is here to stay, and if it truly is the ‘future of network security’
Neil Daswani President of Daswani Enterprises | Sushila Nair VP Security Services NTT DATA
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone―not just techies―to become informed and empowered on the subject of cybersecurity.
Knowing this, author Dr. Neil Daswani covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, and unencrypted data in his latest book, Big Breaches: Cybersecurity Lessons for Everyone.
In this session, Neil Daswani is joined by Sushila Nair where they’ll discuss:
- Effective prevention and detection countermeasures
- Meta-level causes of breaches
- Crucial habits for optimal security in your organization
- and much more!
Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, this webinar will answer your questions and prepare you for the future of cyber security.
This episode is part of Cyber Authors, a new series with Sushila Nair. We welcome viewer participation and questions during this interactive interview.
Organizations have been moving to the cloud for several years now, but in the last year, our world has forced nearly everyone to leverage the scalability and speed of cloud platforms to support a remote workforce. With so many critical business functions running from these providers, it's imperative to protect our data, systems and assets. But traditional strategies struggle to keep up with the scope and scale of the modern cloud environment, which is forcing a change in how we approach our security assessments and mitigation techniques.
In this presentation, we'll discuss the benefits and challenges presented to many organizations by the sudden move to cloud-based services and a newly remote workforce focused on business continuity, not security. We'll also talk about some of the new ways we must evolve how we approach security and our internal programs to better align with the fast-paced and ever-changing nature of cloud services and assets and protect our organizations effectively, efficiently and at the speed required by today's modern attack surface.
Jo Peterson, Clarify360 | Dr Rebecca Wynn | Further panelists to be announced shortly
The CISO community has demonstrated flexibility, tenacity and perseverance throughout the last 18 months. As the world moves past the pandemic, CISOs are continuing to adapt their organizations. For many there is a dual mission to enable organization growth as well as a need to prepare and protect for the unforeseen.
What is clear is that most organizations expect disruption, on some level, to continue for the foreseeable future.
In this session, we’ll discuss a five pronged approach with tools and tips to help CISOs prepare:
• Budget and Reserve Budget
• Emerging Threat Mitigation
• Maximizing Current Technology Investments
• Utilization Review to include Optimization and Automation Efforts
• Fostering Innovation with Emerging Tech
Moderated by Jo Peterson, Vice President, Cloud and Security Services, Clarify360
Panelists include: Dr Rebecca Wynn
Today’s CISO faces very different operational challenges than ever before. From securing remote workers and ensuring secure remote access, to navigating returns to the office and the onset of the hybrid-workforce. Other challenges include vendor consolidation. Gartner found that 78% of CISOs have 16 or more tools in their cybersecurity vendor portfolio, and too many vendors result in complicated security operations. But what are the main problems faced by CISOs today, and what tools are needed to navigate risks?
Join security experts across the industry as they discuss:
- How the pandemic shifted security operations
- Securing the hybrid workforce
- Vendor consolidation, and the ramifications of too many vendors
- Identity-first security
- What the next year has in store for security professionals
Cyber threats like phishing, ransomware and social engineering are more prominent today than ever before. In fact, 75% of organisations around the world experienced some form of phishing attack in 2020 (Proofpoint). But what is causing this increase, and what does 2021 hold in store for cyber crime?
Join this interactive panel as security experts discuss:
- The most imminent threats facing organisations worldwide
- Why cyber attacks increased throughout 2020, and what to expect in 2021
- Lessons from cyber attacks, and how to integrate these learnings into your security solutions
- Best practices in the workplace to improve cyber security
Endpoint security remains a major challenge for organizations, and in November 2020, Cybersecurity Ventures predicted that global cybercrime costs will reach $10.5 trillion USD a year by 2025. That’s more than triple the amount that it was in 2015. With remote working still very much the norm, and hybrid workforces emerging, it is becoming increasingly difficult to keep track of multiple endpoints and the risk they carry.
With the threatscape continuing to evolve and cyber attacks becoming even more sophisticated, experts are here to share how security leaders can take the complication out of endpoint security.
Join us to learn:
- Common endpoint threats from the first half of 2021
- Emerging endpoint threats and what to prepare for going forward
- Leading endpoint protection strategies and how they can be integrated into your existing security solutions
- And more
Moderator: Masha Sedova, Co-Founder & President, Elevate Security
Panelists: Ian Goodhart, Director of Security Operations, Maryland Department of Information Technology (DoIT)
CyberArk (participant to be confirmed)
While in the past, security was isolated to your security team, in the era of collaboration, security operations are now a shared responsibility. DevSecOps represents a huge area of corporate change, both culturally and to your infrastructure - a change that not all businesses are prepared to make. But if the pandemic and the events of the last year have taught us anything, it’s that we should always be prepared for change.
Join this panel as industry experts discuss:
- Key principles and best practices for integrating security into your DevOps teams
- The future of DevSecOps, and why it’s more important now than ever before
- The trends and challenges faced by DevSecOps leaders
- How to initiate and support a cultural change within your DevOps teams
- Where DevOps and security overlap, and how to find a common goal
- Recommendations for improving your security posture in 2021
93% of enterprises already have a multi-cloud strategy in place (Flexera 2020 State of Cloud Report). Multi-cloud security protects data and applications from advanced, sophisticated security threats. Some other benefits include reduced costs and better service delivery. But what are the main multi-cloud security trends you can expect to see in 2021?
Join cloud and security leaders as they discuss:
- The benefits of multi-cloud solutions for your security posture
- The challenges associated with a multi-cloud strategy and how to navigate and overcome these challenges
- The cloud security landscape of 2021
Michael Kennedy | Paul Dobbins | Heidi J.K. Fessler | Mike Thompson
We all hear about the large-scale data hacks events that have made global headlines recently. But far from the glare of media attention, organizations of all sizes are increasingly being targeted by cybercriminals due to insecure endpoints.
In this session, our panel of cybersecurity experts will share how real-life threat events during the pandemic have forever changed the cyber threat landscape, and strategies for combating new-age threats in the face increasing endpoint visibility and control challenges.
We’ll also share how recent high-profile cyber attacks are still impacting the business world, and what changes organizational leaders can anticipate from recent public hearings and governmental actions.
Michael Kennedy, Co-Founder & CTO, Ostra Cybersecurity
Paul Dobbins, Chief Growth Officer, Ostra Cybersecurity
Mike Thompson, Cyber Security Incident Response Team - Incident Case Manager - Team Lead, FR Secure
Heidi J.K. Fessler, Founder, Innova Law Group, PLLC
Zoe Mora, Information Security Manager, Iron Mountain Data Centers
Endpoint security is a balancing act between security and privacy controls, and providing usability to the end user. Endpoint security should be invisible to the user and not get in the way of daily tasks. If we apply too many security controls users will find ways around them effectively removing the control.
Eric Topham | Dr. Pedro Baiz | Max Robbins | Rajeshwar Bhandaru
Businesses rely on AI models that transform data into actionable insights. Traditional methods for creating AI models require a lot of data that is collected at some central location. Federated Learning (FL), however, takes a different approach by turning the centralised paradigm on its head and moving models or functions to be executed to where the data is.
As a distributed process that does not require a single depository of data and where different parties can train an AI model without having to share the data, FL can be used in situations where data privacy is paramount.
This paradigm shift is also creating new opportunities to democratize AI, which has the potential to transform the data economy.
Join this month's episode of the Business Intelligence Report with Eric Topham, Co-Founder & Data Science Director at The Data Analysis Bureau, to learn more about how FL works and what opportunities it creates for consumers and enterprises.
Viewers will also hear from the experts about the different use cases for federated learning, especially in the context of customer privacy, regulatory compliance, and integrating siloed data. The topics up for discussion will include:
- The emergence of FL
- FL, the democratization of data and what this means for Big Tech
- How FL can be used as a privacy-preserving technology
- Business use cases for FL
- How FL can be part of your data strategy
- Dr. Pedro Baiz, Royal Society Entrepreneur in Residence at Imperial College London and Head of AI at eXate
- Max Robbins, CEO of AI Market
- Rajeshwar Bhandaru, Enterprise Data Architect at Suez
This episode is part of The Business Intelligence Report original series with Eric Topham, Co-Founder & Data Science Director at The Data Analysis Bureau. We welcome viewer participation and questions during this interactive panel session.
Leena Bongale, Manager – Data Analytics & Governance, TD Bank | Pankul Chitrav, Sr. Developer, TD Bank
Cloud trends change with the introduction of new technology and evolving business requirements. When cloud technology first came into the picture, there was both a sense of anticipation and major questions about security. The hyperactive cybercrime industry kept some end users conflicted about adopting cloud technology. Still, the technology has come a long way since its inception in overcoming concerns related to security. As we have seen in the recent years security breaches in large organizations point out that some of these security problems present as data breaches while others deal with access control.
Whatever the issue, it concerns decision makers greatly when making a choice of software or solution. Cloud Security will continue to evolve on several levels.
For more insights into trends in cloud security and the current issues around cloud security and their solutions, join our presentation to understand the Cloud Security Trends and what your organization can do to stay ahead in the game!
About the presenters:
Leena Bongale, Manager – Data Analytics & Governance, TD Bank.
Leena has extensive IT experience, with specialization in IT Security & Risk Management. Leena has been invited to several virtual conferences to speak on various technical topics round IT Risk & Control.
Pankul Chitrav, Sr. Developer, TD Bank.
Pankul is a versatile developer, with expertise in .NET, DevOps, Jenkins, Octopus and recently Azure Cloud.
The migration to the cloud comes with risks and rewards. Understanding the risks early on and addressing them proactively can allow an organization to reap the benefits of the rewards without facing unreasonable risk. To assess risk effectively, organizations should take a top-down approach where they focus on the high value cloud assets first. This session we will discuss the top-down approach and cover:
* How to define a high value cloud asset
* How to determine which cloud assets are high value
* How to assess the risks to high value cloud assets
* How to develop baseline controls for high value assets
Jo Peterson | Nicolas Moy | Stan Lowe | Jim Fulton
Cloud adoption is skyrocketing. The Hyperscale providers are reporting double digit increases in revenues. Cloud can be more secure than on premises environments, but the optimal word is can. Cloud security is a shared responsibility model. How business approach their part of the security, management and oversight of cloud is a critical part of the success puzzle.
In this session we’ll explore:
• Biggest Cloud Security Challenges of 2021
• Adopting a Risk Management Framework
• A life cycle approach that includes Security by Design and Privacy by Design
• Regulatory considerations and cloud privacy
• Tools that can help
Jo Peterson, Vice President, Cloud & Security Services, Clarify360)
Nicolas Moy, VP Security Engineering, Fairway Independent Mortgage
Stan Lowe, Former CISO of Zscaler
Jim Fulton, Senior Director of Product Marketing, Forcepoint
James Johnson, Cloud Information Security Specialist, Proofpoint (North Europe)
Today’s digital workforce is agile, highly available, automated. Where human and artificial intelligence coincide. Managing the risks of cloud IT services is always changing. This track discusses the evolving workforce and the cloud computing risks these changes bring with it.
Today we’ll discuss;
1. The 4 different types of connected worker
2. Cloud visibility
3. Identity and access
4. Business risks associated with cloud
5. Mitigating cloud risks
Peter Wood, Partner and Lead Consultant, Naturally Cyber LLP
No organisation can defend against every conceivable attack in the cloud, thus it makes sense to prioritise threats by the most likely to target your specific business and then make informed decisions on how to prevent and detect those threats.
This webinar will introduce the concepts of Threat and Risk Analysis for cloud security, how to identify the most likely attacks, and how to best focus your efforts and budget to protect your cloud services.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Lessons Learned: Zero Trust for Segmentation in IOT Based Smart BuildingsPatrick Lloyd, Solutions Architect, Cisco Security Services[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]48 mins