Hi [[ session.user.profile.firstName ]]

Selecting an Endpoint Security Solution - Facing a New Threat Landscape

It wasn't that long ago that most threats came from "mass market" malware. However attackers are now attacking with custom malware. The threat environment has been evolving, becoming more complicated, thus more difficult to deal with. To improve their ability to defend themselves security professionals need to understand the threat environment. This webinar will provide information on the existing threat environment - the players - the attacks - the goals - and the successes. In addition to the external factors it will look at the role of authorized users, the impact of social media, and how expanding devices have changed the threat profile.
Recorded Dec 12 2012 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Charles Kolodgy, Reasearch VP, IDC
Presentation preview: Selecting an Endpoint Security Solution - Facing a New Threat Landscape

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Threat Hunting - An Indepth Explaination Jul 23 2018 4:00 pm UTC 60 mins
    Lance James, Andrew Johnston and Ulf Mattsson
    Threat Hunting is a complicated and often misunderstood cybersecurity activity that if properly used can add tremendous value to your cybersecurity posture.

    In this session you will learn:
    What is Threat Hunting?
    When do I use it?
    What will it tell me?
    How do I use it?
  • Cyber Strong: Preparing the Nation’s Cyber Workforce May 18 2018 5:00 pm UTC 60 mins
    Nancy Limauro, Deputy Branch Chief & Noel Kyle, Program Lead, Cybersecurity Education & Awareness Branch at DHS
    The Nation has an ever-growing need for cybersecurity professionals who can protect our networks and infrastructure from increasing cyber threats and attacks. According to a study by the Center for Cyber Safety and Education, there will be a shortage of 1.8 million information security workers by 2022. Building a skilled and agile cybersecurity workforce to fill these positions is a national challenge.

    To address the shortage of skilled workers, it is critical for all communities to work together to coordinate cybersecurity awareness, education, training, and workforce development efforts. Current initiatives across the Federal Government help advance the cybersecurity workforce, particularly through training and professional development. The Department of Homeland Security (DHS) is leading such efforts through its Cybersecurity Education and Awareness (CE&A) Branch.

    We will also share information about our Stop. Think. Connect.™ campaign to help promote safe online behavior. Stop. Think. Connect.™ resources provide partnership opportunities to academic institutions, government agencies/departments, as well as non-profit organizations.

    Join this webinar to learn:
    1.How to find CE&A awareness, education, and workforce development resources
    2.How to use National Cybersecurity Workforce Framework (NCWF) tools
    3.How to partner with our Stop. Think. Connect.™ Campaign

    This webinar is part of ISSA's Security Education and Awareness Special Interest Group Webinar Series.

    Speakers:
    - Nancy Limauro, DHS, Deputy Branch Chief, Cybersecurity Education & Awareness Branch
    - Noel Kyle, DHS, Program Lead, Cybersecurity Education & Awareness Branch
  • The Board’s Role: Balancing Risk and Reward Apr 24 2018 12:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF LTD
    The board's involvement is absolutely crucial for communicating cybersecurity strategies and overall cybersecurity success.
    When boards and CISOs successfully engage, organisations can take advantage of the opportunities presented by cyberspace, as well as address associated risks.

    In this webinar, Steve Durbin, Managing Director at the ISF will discuss how the board of directors should lead collaboration and security awareness across the organisation, to help IT and security teams focus on what matters the most to the business, and ensure cybersecurity is embedded into the organisations business strategy.


    About the presenter

    Steve Durbin is Managing Director at the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • The State of Cyber Insurance: Market Update & Trends Mar 22 2018 5:00 pm UTC 60 mins
    Susan Young, SVP & Advisor Marsh USA, Inc. E & O and Cyber Practice
    New cyber risks and threats are emerging at a pace faster than ever before. How are cyber risks evolving, and which risks can be managed through cyber insurance? 

    We’ll address these questions – and dig a bit deeper into the state of the cyber insurance market and the role of cyber insurance in your overall cyber risk management strategy.  Cyber risk can’t be eliminated – it must be managed.

    About the Speaker:
    Susan Young is a Senior Vice President and advisor with Marsh’s
    national Cyber & E&O Practice (part of Marsh’s Financial & Professional Liability Practice, FINPRO) in the Seattle office. She is primarily focused on cyber /security & privacy risk, media liability, and technology errors and omissions.
  • Using Behavioural Economics to Raise Digital Resilience Amongst Employees Mar 22 2018 9:00 am UTC 60 mins
    Robin Smith, Head of IT Security, South Yorks NHS
    This case study examines how a major NHS organiation used Richard Thaler’s Nudge strategies to redirect employee behaviour and create a culture of cyber vigilance.

    Join this webinar presentation to learn:
    - Key lessons on the value of micro-marketing
    - Lessons from cybernetics
    - The value of cyber resilience in healthcare

    About the Presenter:
    Robin Smith is a former cybersecurity lead analyst in UK Police Service. He has authored four books on cyber security and is currently working on a documentary feature examining the impact of cyber-crime on society for release in 2018. He has previously worked in UK health sector, telecommunications and was formerly a lecturer at Loughborough University in Information Risk Strategy.
  • Red vs. Blue: The Threatscape Predictions for 2018 Mar 21 2018 9:00 pm UTC 60 mins
    Adi Ashkenazy, VP Product for XM Cyber
    Analyzing cyber-attacks from last year, this session will cover leading trends, and identify potential evolution both in the defensive and offensive fields going forward. As we do so, we will explore the increasing importance of automation and the diminishing role of the human professional in large scale networks.

    About the Speaker:
    Adi Ashkenazy is the VP Product for XM Cyber, an innovative cyber security start-up developing a revolutionary breach and attack simulation solution, capable of identifying critical attack paths towards key organizational assets, while providing actionable prioritized remediation. Prior to XM Cyber, Adi served as deputy director of an elite cyber technology department in the prime minister's office in Israel, leading Israel's finest engineers and security professionals through some of the most complex cyber security challenges in the world today.
  • [Webcam Panel] Threats and Cyber Resilience Mar 21 2018 5:00 pm UTC 60 mins
    Dan Paltiel (US Bank) | Matt Wolfe (Obsidian) | Roselle Safran (Rosint Labs)
    Cybersecurity is a key priority for CISOs in 2018. What are the cyber threats CISOs should be aware of? How can we build more resilient enterprises in an age of relentless cyber attacks?

    Join this interactive panel to learn more about:
    - The latest cyber threats
    - New attack trends
    - Fighting cyber crime in an age of breaches and stolen personal information
    - Understanding your cyber risk
    - CISO priorities for 2018
  • Information Warfare: The Social Media Edition Mar 21 2018 8:00 am UTC 45 mins
    Raj Samani, Chief Scientist, McAfee
    This keynote talk by Raj Samani, Chief Scientist at McAfee, explores the recent campaigns against prominent journalists and politicians, particularly into their social media lives as a tool to support the political agendas of adversaries. Join this webinar to learn more about the steps that we as professionals must take to protect our own brands, and those of the organizations we work for.

    About the Speaker:
    Raj Samani is a McAfee Fellow and Chief Scientist at McAfee. His prior roles include VP and Chief Technology Officer, EMEA, at Intel Security/McAfee and Chief Information Security Officer for a large public-sector organization in the United Kingdom. A leading international cybercrime expert, Samani has assisted multiple law enforcement agencies in cybercrime cases, and is special advisor to the European Cybercrime Centre (EC3/EUROPOL).

    Samani volunteers as the Cloud Security Alliance EMEA Strategy Advisor, and is on the advisory councils for Infosecurity Europe and Infosecurity Magazine. Samani has published numerous security papers and is the author of 'Applied Cyber Security and the Smart Grid'. SC Magazine named Samani as one of the Top 10 Influencers in cyber security in 2016.
  • The Rise and Rise of Ransomware: Prepare and Protect Mar 20 2018 1:00 pm UTC 45 mins
    Nick Frost, Principal Consultant, ISF
    The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

    With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

    In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

    About the presenter:

    Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
  • Learn about Cybersecurity Training for Military Vets Mar 1 2018 11:00 pm UTC 60 mins
    Maxwell Shuftan-CyberTalent Program Director, SANS Institute and Jessica Gulick CEO of Katzcy Consulting
    Join the SANS Institute and Katzcy for an insightful presentation about the SANS CyberTalent Academy opportunities. This academy is designed to help qualified veterans in Maryland and Chicago - area receive training and certifications to quickly and effectively launch careers in cybersecurity. The Immersion Academy is an intensive, accelerated program designed for completion in a matter of months, depending upon program selected. The program is at NO COST to the selected veterans who attend and includes training and certification.

    Come listen to learn:
    • What the selection process includes and important application tips
    • Understand what kind of training is provided (length and format)
    • How this training academy and related certifications can help your career

    Speaker Bio:
    Maxwell Shuftan
    CyberTalent Program Director, SANS Institute
    mshuftan@sans.org

    Max leads the CyberTalent division of the SANS Institute, the most trusted and the largest provider of information security training and certification in the world. In this role, he directs business development and stakeholder engagement to support the various SANS CyberTalent programs and develop strategic partnerships. He also oversees CyberTalent program operations and staff management. SANS CyberTalent helps organizations address their cybersecurity workforce development needs through initiatives such as the VetSuccess and Women's Immersion Academies as well as the Assessment tools. Max has worked in the public affairs and stakeholder engagement arena of cybersecurity for the past eight years, working with Government, corporate, and not-for-profit organizations, most recently as a Vice President at Cambridge Global Advisors, a homeland security strategic advisory services firm.
  • API Cyber Attacks and Hacker Techniques Used to Breach APIs Feb 27 2018 7:00 pm UTC 45 mins
    Bernard Harguindeguy, CEO, ElasticBeam
    What do oBike, a bicycle rental company, Instagram, and the IRS have in common? Answer -- hackers used APIs to access their customers sensitive information forcing these organizations to announce breaches. Although these API attacks were exposed, most API-based attacks go undetected these days – particularly attacks that used compromised credentials.

    This webinar will discuss API cyberattack examples and the techniques used by hackers to breach APIs. It will also review how AI-based security ​solutions can effectively stop these attacks and provide deep visibility into your API sessions for forensic and compliance reporting. Topics covered in this webinar include:
    - API cyberattack trends
    - Review of recent API attacks
    - How to monitor and protect your API activity
    - How to detect and block API attacks on your data/apps (live demo)
    - How to deliver reports with detailed traffic insight for any API
    - Best practices for securing APIs
  • GDPR: Brace for Impact or Not? Feb 22 2018 6:00 pm UTC 60 mins
    Lance James | Mark Rasch | Martyn Hope | David Morris
    The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?

    Join this panel of world-class experts:

    Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

    Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.

    Martyn Hope: Founder of the EU-GDPR Institute.

    In this session you will learn:
    - What will happen if I'm not Compliant by May 25, 2018
    - Where do I Begin to start my compliance effort
    - Who should I trust to advise me through my compliance program

    If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
  • GDPR and Security: De-Identifying Personal Data Feb 22 2018 4:00 pm UTC 60 mins
    Ashwin Chaudhary, President of Accedere
    Anonymization and Pseudonymization are ways GDPR recommends to De-Identify personal data. By making it impossible or impractical to connect personal data to an identifiable person, data controllers and processors may be able to do the processing and storage of personal data outside the scope of the GDPR.

    Join this webinar to learn the GDPR requirements for managing personal information and digital identity.
  • Practical Approach to GDPR Feb 22 2018 1:00 pm UTC 60 mins
    Tarun Samtani, Group GDPR Lead for Vectura Group Plc, & SkyePharma
    We all know that the EU General Data Protection Regulation (GDPR) will bring a massive change in the way businesses operate and handle personal data. This short discussion will give you to tips to jumpstart your GDPR programme and some easy approaches to take to achieve success in a short space of time.

    1) GDPR short summary
    2) Focus on the goals not vendors
    3) ICO & Data subject expectations - May 2018 onwards
    4) GDPR practical approach
    5) Takeaways

    About the Presenter:
    Tarun Samtani is the Group GDPR Lead for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Telecommunications, ISP's, Financial Services, Gambling, Retail and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments. He has a wealth of experience in Cyber security & Data privacy and is passionate about securing business information landscape. During the course of his career Tarun has been involved in the strategy & planning, design, architecture and implementation of a significant number of information security programmes.
  • GDPR's influence on security Feb 22 2018 11:00 am UTC 45 mins
    Rob Shapland
    Will GDPR have the desired effect? Will it increase security, or see companies regularly hit with catastrophic fines for poor compliance.
  • GDPR Is Coming - Is Your Organization Ready? Key Steps to Help You Prepare Feb 21 2018 1:00 pm UTC 60 mins
    Amar Singh (Cyber Management Alliance) | Guy Cohen (Privitar) | Punit Bhatia (Author)
    On May 25 the long-awaited General Data Protection Regulation (GDPR) will go into effect across Europe. GDPR is the biggest overhaul of data protection laws in more than two decades. How prepared is your organization for GDPR?

    Join this interactive panel of experts as they discuss:
    - What is GDPR?
    - Why should you be GDPR-compliant?
    - How to achieve compliance?
    - Steps your organization should take today to prepare for GDPR
    - Other GDPR considerations

    Speakers:
    - Amar Singh, Founder, Cyber Management Alliance
    - Guy Cohen, Strategy and Policy Lead, Privitar
    - Punit Bhatia, Author of "Be Ready for GDPR"
  • GDPR - Security at the Service of Privacy Feb 20 2018 10:00 pm UTC 60 mins
    Michelle Dennedy (Cisco) | Ariel Silverstone (Data Protectors) | Paul Rosenzweig (Red Branch Consulting)
    The General Data Protection Regulation (GDPR), a key legislation covering privacy rights, data security, data control, and governance, is going into effect in May 2018. As organizations are scrambling to achieve GDPR compliance before the May 25th deadline, some are still not clear on the exact GDPR requirements.

    Join this panel of experts as they discuss:
    - The regulatory landscape in 2018
    - What GDPR means for you and your organization
    - GDPR requirements around data collection and governance, exposure and breach disclosure, identity and privacy
    - Evaluating your cyber risk
    - Last minute changes your organization needs to make
    - Failure to comply & fines
    - Recommendations for achieving compliance and other regulation on the horizon.

    Speakers:
    - Michelle Dennedy, VP & Chief Privacy Officer at Cisco
    - Ariel Silverstone, Managing Partner, Data Protectors
    - Paul Rosenzweig, Principal at Red Branch Consulting
  • Threat Hunting Series: Rethinking Persistency Feb 20 2018 10:00 pm UTC 45 mins
    Adi Ashkenazy, VP Product for XM Cyber
    In this episode of the Threat Hunting series, Adi Ashkenazy will follow some of the approaches hackers use to counter the methods of defenders trying to remove them from their target networks. Adi Ashkenazy will also discuss the evolution of persistency in cyber-attacks, and focus on modern and predicted trends.

    About the Speaker:
    Adi Ashkenazy is the VP Product for XM Cyber, an innovative cyber security start-up developing a revolutionary breach and attack simulation solution, capable of identifying critical attack paths towards key organizational assets, while providing actionable prioritized remediation. Prior to XM Cyber, Adi served as deputy director of an elite cyber technology department in the prime minister's office in Israel, leading Israel's finest engineers and security professionals through some of the most complex cyber security challenges in the world today.
  • Career Conversations w/ Mary Chaney - Expert in Cybersecurity Law Recorded: Feb 16 2018 60 mins
    Mary Chaney, Expert in Cybersecurity Law and WSC VP Jessica Gulick
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guests: Mary Chaney, Attorney At Law, The Law Offices of Mary N. Chaney, P.L.L.C.
    Threat Intelligence and Forensics Expert, Founder of Horton Technologies, LLC

    Hosted by Jessica Gulick, VP of the Women's Society of Cyberjutsu

    About the Speaker:
    Mary N. Chaney, Esq., CISSP, has 20+ years of experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law. She spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve by becoming a Special Agent for the FBI where she investigated cybercrime as their Information Systems Security Officer.
    Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. She has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital. As an adjunct professor with the University of Cincinnati, she assisted with the establishment of their Cybersecurity Certificate program.
    Currently, Ms. Chaney practices cyber security law for her own firm, The Law Offices of Mary N. Chaney, P.L.L.C. where she specializes in helping the CIO, CISO and General Counsel understand each other to legally protect the enterprise from cyber security risk.
  • Will Artificial Intelligence Strengthen Your Security Stance? Recorded: Feb 15 2018 59 mins
    Chris Roberts, Acalvio | Chris Morales, Vectra | Vikram Kapoor, Lacework | Willy Leichter, Virsec
    The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.

    Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.

    Join this Q&A panel on how AI can help improve your organization's overall security.

    Speakers:
    - Chris Roberts, Chief Security Architect, Acalvio
    - Chris Morales, Head of Security Analytics, Vectra
    - Vikram Kapoor, Co-Founder and CTO, Lacework
    - Willy Leichter, Vice President of Marketing, Virsec
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Selecting an Endpoint Security Solution - Facing a New Threat Landscape
  • Live at: Dec 12 2012 6:00 pm
  • Presented by: Charles Kolodgy, Reasearch VP, IDC
  • From:
Your email has been sent.
or close