Hi [[ session.user.profile.firstName ]]

A Global Perspective on Mobile Security, Privacy and Safety

Traditionally, when we think of mobile computing, we think about which of our employees we trust and what devices we allow onto our network. But what if we've been looking at this from the wrong end of the telescope? What if the bigger threats to our networks aren't the employees and their new devices, but telephone companies, technology vendors & governments?

Using case studies from around the world, this presentation discusses the challenges to privacy, security and safety posed by end-users, mobile devices, vendors, and governments.
Recorded Jul 11 2012 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Raj Goel, CISSP, Chief Technology Officer, Brainlink International, Inc.
Presentation preview: A Global Perspective on Mobile Security, Privacy and Safety

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Get Compete Threat Visibility with All-in-One Security Essentials Jul 14 2020 11:00 pm UTC 45 mins
    Senthil Palaniappan, Founder and CEO, Sennovate Inc.
    Any organization’s security depends on its ability to rapidly detect and respond to emerging threats across your cloud and on-premises environments. Yet, attack methods and strategies evolve constantly, making threat detection an always-moving target. If you are a CISO or key stakeholder and would like to learn ways to monitor, detect, and secure your environment, you should attend this webinar.
    You will learn
    • Collecting Security Events
    • Reviewing Log data
    • Performing Analysis
    • threat intelligence from the Open Threat Exchange® (OTX™)
    • Managed SOC - An effective and efficient way to compliment your Cyber Security team
    • AlienVault Case Study
  • How to stop criminals from using the latest major crises to hack your employees Jul 14 2020 9:00 pm UTC 45 mins
    Tony Lauro, Director of Technology & Security Strategy | Steve Winterfeld, Advisory CISO, Akamai Technologies
    Every time there is a major crisis I feel like the cybercriminals should cut us a break and yet every time it seems like they double down. You may recall over the years when a major natural disaster, health crisis or social issue dominate the news there are a flood of crisis related phishing campaigns using the topic as a pre-text for launching an attack.

    Using popular topics and references is a key way that attackers can increase the probability of getting someone to click on their phishing lure to launch something like a ransomware attack. In this talk will cover some of the ways we can prepare for the next calamity.

    • Phishing detection and defense practices
    • Techniques for ransomware prevention
    • Training your employees to be resistant to Social Engineering techniques

    Join us for a discussion on how to prepare both your people and security infrastructure for the next wave of attacks. The cybercriminals are phishing – let’s talk about how to stop your employees from clicking on the bait.

    Bios:
    · Tony Lauro is Director of Technology & Security Strategy for Akamai Technologies. Over the past seven years Tony has worked with Akamai’s top global clients to provide application security guidance, architectural analysis, web application and adversarial resiliency expertise.
    · Steve Winterfeld is our Advisory CISO. Before joining Akamai, he served as CISO for Nordstrom bank and Director of Incident Response and Threat Intelligence at Charles Schwab. Steve focuses on ensuring our partners are successful in defending their customers and determining where we should be focusing our capabilities.
  • Detecting & Responding To Ransomware Jul 14 2020 9:00 pm UTC 45 mins
    Eric A. Nielsen, Chief Executive Officer, Defense In Depth Cyber Security
    As an information security professional your knowledge of ransomware as well as the tactics & techniques to detect & respond effectively are critical to your organization. Data breaches threaten organizational financials and reputations. Strengthen your security through the use of actionable intelligence. Attendees will hear about:

    - What is Ransomware?
    - Leveraging Architecture Components to Detect & Respond to Ransomware
    - Ransomware Scenarios & Solutions
    - Tips to Protect Your Organization
  • Privacy-Preserving Computing and Secure Multi Party Computation Jul 14 2020 5:00 pm UTC 45 mins
    Ulf Mattsson, Chief Security Strategist | Protegrity
    An increased awareness about privacy issues among individuals. In many countries, databases containing personal, medical or financial information about individuals are classified as sensitive and the corresponding laws specify who can collect and process sensitive information about a person. The financial services industry has rich sources of confidential financial datasets which are vital for gaining significant insights.

    However, the use of this data requires navigating a minefield of private client information as well as sharing data between independent financial institutions, to create a statistically significant dataset. A major challenge that many organizations faces, is how to address data privacy regulations such as CCPA, GDPR and other emerging regulations around the world, including data residency controls as well as enable data sharing in a secure and private fashion.

    We will present solutions that can reduce and remove the legal, risk and compliance processes normally associated with data sharing projects by allowing organizations to collaborate across divisions, with other organizations and across jurisdictions where data cannot be relocated or shared. We will review solutions that are driving faster time to insight by the use of different techniques for privacy-preserving computing including k-anonymity and differential privacy. We will discuss multi-party computation where the data donors want to securely aggregate data without revealing their private inputs. We will also review industry standards, implementations, key management and case studies for hybrid cloud (Amazon AWS, MS Azure and Google Cloud) and on-premises.
  • Dissecting Cybercrime – Journey of a Stolen Credit Card Jul 14 2020 4:00 pm UTC 60 mins
    Alex Holden
    We often don’t realize the full impact of cyber crime, which then relapses us into repeating the same mistakes. Even large companies do not completely understand how their data and services are being abused. I want to take you on a journey of observing credit card fraud and abuse from stealing a credit card to trafficking of stolen goods. Learning about these vectors of abuse will help you and your organization to mitigate a number of common attacks and abuses.
  • Email Security Strategies & Solutions Jul 14 2020 3:00 pm UTC 60 mins
    Michael Thoma | Arif Hameed, Equifax | Chris Wallace, CISO | Panelist TBA
    With email security breaches constantly making headlines, it is crucial for organisations to be ahead of the curve. Join this interactive panel of industry experts as they discuss the latest trends in email security and how to prevent becoming the next international headline.

    Join this Q&A panel to learn more about:

    - Emerging trends in email attacks
    - How to stay on top of the latest threats
    - Best solutions to protect your organization

    Moderator: Michael Thoma, Principal Consultant at the Crypsis Group
    Panelist: Chris Wallace, Chief Information Security Officer
    Arif Hameed, Senior Director, Client Security at Equifax
    Panelist to be confirmed
  • 3 Actionable Steps to Minimize Successful Phishing Attacks Jul 14 2020 1:00 pm UTC 45 mins
    Pat McDonald, Senior Solutions Engineer, GreatHorn
    Description to follow
  • Know the Threat to Stop the Threat: The Perils of Phishing in 2020 Jul 14 2020 12:00 pm UTC 45 mins
    Mollie MacDougall, Product Manager, Intelligence | Aaron Riley, Cyber Threat Intelligence Analyst, Cofense
    To defend against phishing, your organization needs to understand the key trends and top threats. Cofense’s Intelligence Team spends every day analyzing phishing threats including credential theft, ransomware campaigns, and more. Learn about the top threats that define today’s phishing landscape and how to defend your organization against them.

    - See what tactics are successfully evading secure email gateways and reaching enterprise end users.
    - Learn what is trending when it comes to malware delivered via phishing, including ransomware.
    - Receive tips for ensuring your phishing defense strategy is proactive and well-coordinated.
  • Ransomware: It Is Not Just Delivered By Email Anymore! Jul 13 2020 5:00 pm UTC 45 mins
    Presenter to be announced
    Join us for an interactive discussion on different methods used to deliver ransomware and new tactics attackers are using to gain a foothold and deliver their payloads. We will cover:

    New strategies and tactics cybercriminals are using
    Steps of a ransomware attack - what you may be missing
    Ransomware in 2020 and into the future - what you need to know now
  • [PANEL] Security as a Service Jul 13 2020 3:00 pm UTC 60 mins
    Moderated by Stephanie Olsen, Customer Trust Manager, Product & Application Security, Netflix & WiCyS Silicon Valley Affiliat
    As in-house security becomes increasingly complex and costly, organizations are in need of a reliable and safe security provider. Join industry experts as they discuss the latest trends in SEaaS, including:

    -Why your organisation needs to move towards SEaaS
    -The different models of security as a service
    - SEaaS solutions and strategies


    Stephanie Olsen, Customer Trust Manager, Product & Application Security, Netflix & WiCyS Silicon Valley Affiliate President
  • AWS Security JAM x WiCyS | Interactive Learning Series Jul 9 2020 6:00 pm UTC 60 mins
    AWS experts
    Are you interested in learning how YOU can build securely on AWS? Join us for the AWS Security Jam learning series - a hands-on, team-oriented, gamified learning experience which will enable you to leverage a wide range of AWS security services. If you get excited about securing workloads in the cloud, come and challenge your skills while learning new techniques. AWS will host three Security Jam sessions (beginners, intermediate, and advanced), so join us for all three or pick the session most relevant to you. We will have a number of AWS experts virtually available to discuss ideas, provide guidance, and help your team get through any challenges.
  • How Companies Are Using Data Analytics to Prioritize Cyber Spend Jul 8 2020 6:30 pm UTC 45 mins
    Jerry Caponera, VP of Products and Cyber Risk Management, Nehemiah Security
    Choosing which cybersecurity projects to implement is more challenging than ever. Cyber risk changes daily and budgets are changing too as the COVID-19 pandemic continues to unfold. Register to see why leading companies are using a data-driven approach to make better decisions about which projects to prioritize, and learn how modeling risk helps optimize cyber spend.

    Join us to learn:
    + What’s changed in how companies look at risk remediation and ROI pre- and post-COVID
    + Why the prioritization of cyber spend is more important than ever
    + How to take a data-driven approach and what data you need to get started
    + Why modeling is important and how you can do this easily (demo)
  • IT Manager's Series: Top 3 Ways to Protect from Ransomware Jul 8 2020 5:00 pm UTC 45 mins
    Troy Vennon, Director, Cybersecurity & Trustworthiness at Covail
    Join us for an informative webinar on how IT managers and small security teams can prevent ransomware from infecting their company’s networks. Ransomware on the rise and no longer focused only on large enterprise (average-sized company impacted in 2019 around 650 employees). Organizations with small security teams or that leverage their IT teams to manage security need help to protect from the growing wave of cybercrime. Here’s what to expect from our webinar on ransomware:
    - How to identify where you are exposed so you can fix your vulnerabilities
    - Why and how to segment your network and identity management programs
    - What kind of a response and recovery process you need in place
  • THREAT INTEL IN THE REAL WORLD: An Expert Roundtable Recorded: Jul 1 2020 54 mins
    Chase Cunningham, Kurtis Minder, Rick Holland, Chris Camacho, Allan Liska, John Grim
    Find out what happens…when intel analysts stop being polite…and start getting real.

    Today’s typical enterprise security team subscribes to at least four, often more, intelligence feeds, which analysts must comb through to find relevant information for operationalization. As a result, most threat intel has become “yet another tool to manage.” It’s simply not practical to expect every security organization to be able to hire threat intelligence analysts to make sense out of the feeds. Vendors need to deliver “threat-analyst-in-a-box” capabilities, so intelligence can be operationalized with minimal intervention.

    In this session, a blue-chip panel of cyber threat experts will discuss the state of current threat intel offerings, and dive into the future of this space to help you understand how it will evolve to meet the needs of enterprise security teams. They will discuss how the next generation of threat intelligence will conform to the conventions of government intelligence operations, where the right information goes to the right people and systems in the right form factor.

    Attendees will learn:

    ​Why general-purpose threat intelligence won’t cut it and how it needs to be customized to each organization’s risk profile.

    What enterprises need to do to make the market mature in this evolving industry.

    ​How to take the right approach to threat intelligence and big data.
  • CISO Pandemic Response: Next Steps Recorded: Jul 1 2020 60 mins
    Dan Lohrmann | Earl Duby | Vinod Brahmapuram | Scott Larsen
    By popular demand, this CISO Insights webinar is a follow-up to the immensely successful sessions held in March and May. The webcasts (links in Attachments): "Coronavirus Actions and Risks for Tech and Security Leaders" & "Back to the Office – Or Not? Next Steps in Pandemic Technology Response" were viewed thousands of times, and numerous attendees asked for this update.

    Join this roundtable discussion to learn more about:
    - Back to the office timing, decisions, strategies and tactics on the ground
    - Quick Sector updates for government, manufacturing and healthcare
    - Unemployment fraud
    - Noticeable spike in phishing in June (related to civil unrest/Anonymous?)
    - Team chemistry through the lockdown (how has onboarding been)
    - Revenue loss impact on teams (downsizing? How has off-boarding been accomplished?)
    - Overall CISO mental health through the quarantine and civil unrest

    Speakers:
    - Dan Lohrmann, CSO & Chief Strategist, Security Mentor, Inc.
    - Earl Duby, CISO, Lear Corporation
    - Vinod Brahmapuram, CISO, State of Washington
    - Scott Larsen, CISO, Large healthcare provider
  • Securing the Remote Workforce Recorded: Jun 30 2020 59 mins
    Diana Kelley | David Sherry | Lee Imrey | Nathan Howe
    Remote working has been a growing trend for the last few years, especially in the tech sector. However, the COVID19 outbreak has really pushed businesses to adopt or accelerate their remote integration plans. How has this affected security? What are the steps companies need to take to better protect their remote workforce?

    Join this episode as we explore the security challenges in the time of COVID, why a strong security culture is important, and what steps to take today.
    - What are the security challenges associated with remote working
    - Examples of changes in cyber-attacks during COVID
    - Managing patching, VPNs, and backups for large and small remote workforces
    - How to maintain auditability and visibility
    - How to enable and keep your remote team secure
    - ​Tips for training end users to help themselves
    - Why a strong security culture matters now more than ever

    Panelists:
    - David Sherry, CISO, Princeton University
    - Lee Imrey, Cybersecurity Advisor, Splunk
    - Nathan Howe, Head of Transformation Strategy, EMEA, Zscaler

    This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.
  • Making The Leap: From An Individual Contributor to Leader in Cyber Recorded: Jun 25 2020 60 mins
    Elena Steinke, Director & Founding Board Member
    About this webinar:
    Join the Women's Society of Cyberjutsu for a conversation with our distinguished leadership professionals Margot Halstead and Sarah Moffat to explore the different strategies and tactics towards transitioning into a leadership role. This seminar will focus on the common challenges with this transition focusing on the specific tendencies and habits women encounter through this transition.

    About Margot Halstead
    Margot's work focuses on helping leaders realize their greatest potential by identifying how they are potentially getting in their own way. She has coached, written and published articles, as well as designed and delivered 100’s of team and leader development programs for and with a diverse spectrum of organizations. Margot is an engaging facilitator noting the key to her success has been the ability to relate to all members of the team, forge immediate trust and connection, and relate the goals of the team to desired business outcomes. She has developed and delivered courses, workshops, and presentations on leadership transitions, emotional intelligence, communication skills, management, mentoring, executive presence and handling difficult people.

    About Sarah Moffat
    Sarah is a talent development expert, and both an 'ideas person' and strategic initiator. Sarah’s passion is working with people, strengthening the culture of learning and leadership development, and finding new ways to engage, empower, and excite learners. When leading teams, Sarah employs transformational and servant leadership to engage them and create space for team members to build their strengths and contribute in a way that brings fulfillment and job satisfaction. Sarah has more than 15 years in talent development with a B.S. in Psychology, and is an Independent Certified Coach, Trainer, and Speaker with the John Maxwell Team.
  • [*CPE] Automated Integrations for Third-Party Risk Management Recorded: Jun 25 2020 75 mins
    Panelists: Emily Affinito, LogicGate, Allan Liska, Recorded Future; Jonathan Ehret, RiskRecon; and Todd Boehler, ProcessUnity
    High-Profile Data Breaches have placed a spotlight on the risk of cyber security breaches with vendors and subcontractors, expanding the need to have greater rigor in third-party risk management and ongoing risk assessments. By integrating third-party risk management systems with other enterprise systems, external data sources, and analysis and reporting applications, and organization can deliver significant benefits and centralize processes into a single, automated platform that standardizes workflows and reduces manual effort.

    On this CPE accredited webinar our panel of experts will address how to strengthen your third-party risk management process for improved efficiency and effectiveness, and get more from your platform investment through automated integrations with a broader digital ecosystem. Attendees will learn:

    - How integrations with external data sources accelerate the assessment process and improve security, financial, and reputation risk reviews,
    - Where to connect to internal systems — ERP, GRC, CRM, Contracts, and more — throughout the third-party management lifecycle,
    - The pros and cons of various integration methods and how to make a best-fit choice,
    - How to strengthen and streamline your third-party risk management efforts.
  • Security Frenemies: Red & Blue Boosting Each Other Recorded: Jun 24 2020 62 mins
    Matt Linton, Detection and Response, and Niru Ragupathy, Offensive Security
    Matt Linton, a member of Google's Detection and Response team and Niru Ragupathy, a member of Google's Offensive Security team pair up to showcase how red and blue teamers can learn from each other. They walk through a hypothetical attack from start to finish, at each step switching between the point of view of Attackers and Defenders to highlight what each side sees and does, showcasing what makes each side rewarding and fun.
  • Q&A: Racial Equity and Inclusion, Cybersecurity and What it Means to be an Ally Recorded: Jun 23 2020 62 mins
    Jessica Robinson, CEO, PurePoint International
    We are committed to racial equity within WiCyS and the cybersecurity profession. Join us for a candid conversation on what it means to be an ally for the BIPOC cybersecurity community. Jessica Robinson will host a Q&A session to share more about her experience in infosec through the lens of race and gender and how we can all be allies.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Global Perspective on Mobile Security, Privacy and Safety
  • Live at: Jul 11 2012 8:00 pm
  • Presented by: Raj Goel, CISSP, Chief Technology Officer, Brainlink International, Inc.
  • From:
Your email has been sent.
or close