Hi [[ session.user.profile.firstName ]]

Your Cloud or Mine? Exploring Data Security in the Cloud

This discussion will tackle the complex issues around data ownership and control in the hands of cloud users at the consuming organization, cloud administrators at the cloud provider, law enforcement, intelligence agencies and a pantheon of adversaries.

When sensitive information exists outside of the traditional internal IT environment, it has the potential to deprecate the ability to properly protect and monitor it for indicators of compromise. Whether it’s the virtualization layer in a private cloud or the APIs and management layer of a public cloud, there is an entire new class of privileged infrastructure and privileged users—creating additional opportunity for failure. Adversaries clearly see cloud as an area of opportunity—all the eggs in one basket! Rather than optimally addressing these issues, most organizations try to (unsuccessfully) map legacy controls from traditional data centers into the cloud.

This session will cover the real issues and ideas in how we assess and manage security in these environments. If losing control and ownership of your data in the cloud is slowing down your cloud consumption, we discuss how to retain control in these new environments.
Recorded Oct 9 2013 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Etue, VP Corporate Strategy, SafeNet
Presentation preview: Your Cloud or Mine?  Exploring Data Security in the Cloud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Threat Landscape – Cybersecurity Trends in 2016 and Beyond Dec 7 2016 11:00 am UTC 45 mins
    Sian John (Chief Strategist) - Symantec
    We’re starting to see the refining of techniques that have been built over a number of years. The past 5 years have been dominated by ransomware and economic espionage. While they haven’t gone away, cybercrime has gotten bigger and bolder and the financial rewards have gotten much bigger. Cyber attacks have also started to become a part of the political landscape which has been particularly evident during US election where we have seen them being used for subversive purposes.

    This webcast will review the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.
  • It’s My Life but I no Longer Have Control Over it! Dec 7 2016 10:00 am UTC 45 mins
    Simon Bryden, Consulting Systems Engineer
    We all know that technology plays a role in our everyday life but do you know the extent of that role? Advertising tells us to spend more and more of our life online and embrace technology in our homes, cars and everywhere else a microchip can be placed.

    But nowhere is there a message about the consequences of the misuse of that technology. 2016 has seen a rise in the number of incidents involving ransomware, IoT, and simply well intentioned connectivity gone wrong. That momentum is set to continue into 2017 and beyond.

    Although past performance does not guarantee future results, this session will focus on what we have seen this year and what we expect to see in the near future.
  • Storm on the Horizon – 2017 Threats Both Foreign and Familiar Dec 6 2016 7:00 pm UTC 45 mins
    W. Jackson Schultz, Sr. Consultant & Nick DeLena, Sr. Manager - IT Audit & Security OCD Tech
    2016. What a year. Information Security professionals will certainly echo that sentiment. This year alone we’ve seen a four-fold increase in ransomware as reported by Symantec Security Response. Business e-mail compromise and wire transfer fraud were also prominent in year, with the FBI noting that businesses have lost $2.3 billion to this scam in the past three years.

    These are attacks that are only going to grow in number, with new threats on the horizon to our critical infrastructure. While a great boon to productivity and convenience, the Internet of Things (IoT) means that almost every device used in the United States will have an IP address.

    These devices may become susceptible to new forms of malware and represent avenues of compromise to our homes and businesses. Wearable devices are also increasing in popularity.

    The 2017 threatscape will provide malicious actors with many new attack vectors and alternative methods of compromising data and infiltrating networks. Tune in to our presentation to understand what attacks are on the rise, and some ways that your information security team can assist your organization in being proactive to help lock down infrastructure in 2017.
  • [Video Interview] The Cyber Year in Review: Ian Glover, President, CREST Dec 6 2016 4:00 pm UTC 45 mins
    Ian Glover, President, CREST & Josh Downs, Information Security Community Manager, BrightTALK
    Join this engaging session as BrightTALK conducts an in-depth interview with Ian Glover, President of CREST.

    It's been a crucial year for cyber security with big breaches and newsworthy hacks. BrightTALK's Information Security Community Manager Josh Downs will be quizzing Ian for his thoughts on the cyber security industry and in particular:

    - The big breaches of 2016 and lessons to be learnt
    - The current threatscape
    - The big vulnerabilities on the horizon
    - Ian's insights into how to keep your company secure in 2017

    We look forward to you joining us for the session.
  • The 2017 Threatscape Dec 6 2016 2:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF Ltd
    The pace and scale of information security threats continues to accelerate, endangering the integrity of trusted organisations. Although cyberspace offers opportunities for leading organisations, this environment is uncertain and potentially dangerous. It is a place where hacktivists and cybercriminals are honing their skills and governments are introducing new regulation and legislation in response to major incidents and public concerns. Organisations are forced to continually adapt and rapidly respond.

    In this webinar, Steve Durbin Managing Director at the ISF, will discuss the rapidly changing threat landscape, identify the key cyber challenges for 2017 and suggest ways of managing the associated risks.
  • [Cybersecurity] Our Indigenous Apps: Securing Critical Business Data Dec 6 2016 1:00 pm UTC 45 mins
    Senior Security Consultant, Christopher Cooper
    Despite the rise of the cloud and increased reliance on web applications, native desktop applications are still highly relevant and often the delivery method of choice in enterprise IT. As penetration testers, we still see a number of very poorly architected native applications being used to protect extremely sensitive information.

    This webcast will discuss some of the core issues relating to native desktop applications, why they are so frequent, and the severe impact that their insecurity can cause.

    In the 2017 threat landscape, we propose that these flaws are not going away, and the industry isn't currently in a position to help developers resolve them effectively.
  • Akamai Q3 2016 State of the Internet Security Report Dec 6 2016 12:00 pm UTC 45 mins
    Jay Coley, Senior Director, Enterprise Security Architecture, Akamai Technologies
    Akamai sees more than 2 trillion Internet interactions every day and mitigates 40 – 50 DDoS attacks every month. Our security experts analyse this information and share trends, observations, and findings in the quarterly State of the Internet Security report.

    Join Jay Coley, Senior Director, Enterprise Security Architecture at Akamai Technologies for an overview of what we found after analysing data from Q3 of 2016.

    Key topics covered will include:
    · Why DDoS of over 100 Mbps increased over the past quarter
    · Which country is the new leader for most sourced Web application attacks
    · Tactics Akamai used to mitigate two of the largest DDoS attacks we’ve seen
  • Live Demo: Advanced Endpoint Protection Recorded: Dec 2 2016 53 mins
    Christiaan Groenhof, Inside Systems Engineer at Palo Alto Networks
    Attackers are getting more targeted and advanced, deploying unknown exploits and unique malware that current day endpoint security is not equipped to prevent or even detect. Existing approaches simply can’t protect against these attacks because they don’t have known signatures, known strings –and in many cases, no previously known behavior-so they go straight through, resulting in compromised endpoints waiting for detection and remediation to step in, which is too little too late.

    Palo Alto Networks Advanced Endpoint Protection is a complete paradigm shift from detection remediation to pure prevention, designed to close the door on these threats, which manage to evade detection by network-based security or take advantage of blind spots, well before any damage can be done.

    Join Palo Alto Networks® for a Live Webinar to learn about the breakthrough advanced endpoint technology that redefines endpoint security as we know it
  • Live Demo: AutoFocus Recorded: Dec 2 2016 45 mins
    Ronald den Braven, Consulting Engineer at Palo Alto Networks
    Join us for a live demo and learn how AutoFocus threat intelligence service helps security teams identify and prevent targeted attacks. We will explain the key concepts of AutoFocus and benefits the service provides.
  • Live Demo: VM-Series for AWS Recorded: Dec 2 2016 37 mins
    Tom Welling, Systems Engineer at Palo Alto Networks
    Securing public cloud environments has never been more challenging. Cyberattacks are on the rise, targeting your business-critical data using applications commonly found on every network. Compounding your data security challenge is the lack of application visibility and control features available in existing cloud security offerings.

    The VM-Series for AWS addresses these challenges with a complete set of next-generation firewall and advanced threat prevention features that allow you to identify and control your AWS-based applications and protect your data from known and unknown threats.
  • Live Demo: Safely Enable SaaS Applications with Aperture Recorded: Dec 2 2016 45 mins
    Omar Amarin, Inside Sales Engineer at Palo Alto Networks
    The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.

    Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:

    •Gain visibility and granular, context-based control of SaaS applications.
    •Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
    •Protect against new insertion and distribution points for malware.
    •Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.

    The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
  • The Big Challenge of Big Data: Untangling the Security Conundrum Recorded: Dec 1 2016 39 mins
    Alex Hanway, Marketing Manager for Encryption at Gemalto
    Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they break many of the traditional security approaches and spark questions like:

    With massive volumes of data, how are organizations going to ensure that their customer information is safe from people looking to exploit it?

    Is it possible to adopt big data technologies while demonstrating compliance with industry regulations?

    Will security get in the way of the analytics tools?

    How can security apply to different data consumption technologies like Hadoop and NOSQL?

    Join Gemalto on Thursday, December 1, 2016 as we discuss what’s in store for the ‘big data’ technologies of the future and how security models like encryption can solve the security conundrum.
  • Cyber Supply Chains: Risks & Protection Recorded: Nov 30 2016 36 mins
    Curtis KS Levinson, VP Strategic Cyberspace Science, US Cyber Defence Advisor to NATO
    Cyber space is composed of, and dependent on, supply chains. Our hardware and software are created in multiple locations by a multitude of suppliers and vendors. A single PC board may contain chips from many different nations, each with their own companies and manufacturing plant. Software is highly dependent on updates, which we receive mostly automatically and is directly incorporated in the software we depend on daily.

    We, as a society are getting more skilled at protecting our technology from cyber-attack by hardening our network perimeters, improving anti-virus/malware tools and encrypting everything we can. The one thing we DO NOT do is evaluate what our cyber supply chain(s) are. We understand their importance to our daily tasks, to our lifestyles, and to our incomes. We need to looking into what our supply chains really are, understand their functionality and investigate ways to begin protecting them.

    Viewers will:
    • Understand the basic nature of cyber supply chains
    • Gain insight into cyber supply chain vulnerabilities
    • Learn how to begin protecting our cyber supply chains

    Curtis KS Levinson
    VP Strategic Cyberspace Science, US Cyber Defence Advisor to NATO
  • Intelligence: The Planners Strategic Edge Recorded: Nov 30 2016 45 mins
    David Swan, EVP Defence Intelligence Group, CSCSS
    This presentation is an overview of “Making Intelligence Work,” a training program offered by the Cyber Intelligence Defence Centre. When correctly employed, intelligence provides direction for long-term planning (strategic intelligence), direction in the current cyber battlefield (operational intelligence) as well as direct support to defend against current attacks (tactical intelligence). This guidance is developed in the executive suite and is deployed into the organization. The program provides executives with the tools to deploy and utilize intelligence in their organizations.

    David Swan, Executive Vice President, Defence Intelligence Group, Director CSCSS Cyber Intelligence Defence Centre (CIDC)
  • Cyber-Intelligence: Protecting Yourself Against Your Own Worst Enemy Recorded: Nov 30 2016 44 mins
    David Nordell, SVP International Cyber Strategy, CSCSS
    In order to protect your organization from cyber attacks, you need to understand who your enemies are, and how they see you as a target. This means turning your vision and your intelligence capabilities on yourself and taking a very hard look at what makes you worth attacking and what your vulnerabilities are.

    Key points to consider:
    - Looking beyond current cyber defenses
    - How well trained and prepared is your staff for an eventual attack?
    - How much financial, reputation and regulatory damage can you afford to suffer?
    - Is your organizational culture built to learn and adapt rapidly without wasting time and energy on blaming others?
    - How would your external stakeholders respond to your being attacked?
    - How would you be affected by attacks on other parties in your ecosystem (or vice versa)?

    This all takes hard work, but is likely to ensure that when – not if – you are attacked, you will have a much higher chance of survival.

    David Nordell, Senior Vice President, International Cyber Strategy, CSCSS
  • Securing the Cloud: Trends in Cloud, Collaboration & Security Recorded: Nov 30 2016 40 mins
    Megan Lin, Solutions Architect Team Lead, Dropbox
    The "old way" of enterprise IT was top-down, systems and process centric -- not end user centric. Collaboration at work has since changed. People are getting work done in a much more fluid fashion, often with a broad ecosystem that includes employees, contractors, customers, partners, and suppliers. This discussion focuses on security trends in cloud and collaboration, and how Dropbox is leading the strategy behind secure sharing models.
  • Best Practices for Preparing for Breaches Recorded: Nov 30 2016 44 mins
    Dr Phoebe Fletcher, VP International Policy and Political Science, CSCSS
    With malware, phishing and zero day attacks becoming more sophisticated, it’s impossible as a business to be 100% secure against a breach. As numerous high profile cases have demonstrated over the past year, breaches can cause serious reputational damage, particularly if customer’s personal details have been jeopardised or private business information has been leaked.
    Preparing for breaches is part of good governance and requires close coordination between management, cyber security professionals and your communications department. This presentation will discuss the best practices for preparing for breaches.

    Viewers will learn about:
    • Provides models for best practice governance, including the coordination of governance, cyber security professionals and communications.
    • Explains how to put together a risk management plan.
    • Examines different strategies for communicating breaches and their merits.
  • Cyber Attackers and the Law - Threats, Challenges & Regulations Recorded: Nov 30 2016 49 mins
    Dr. Virginia Greiman, Sr. Advisor and Chair, CSCSS
    With cyber attacks increasing in frequency and impact, it is critical to understand the barriers to the development of international norms of behavior in cyberspace, the deficiencies in the law and the challenges faced by governments, the private sector, and international organizations including the United Nations and the North Atlantic Treaty Organization (NATO) in defining thresholds for a domain with various levels of entry.

    This presentation will define the various aggressors in cyberspace based on the type, purpose and impact of the attack, and then analyze how they are regulated by existing laws including international treaties, the law of war, and domestic civil and criminal law.

    Viewers will learn:
    • Legal models for threat analysis
    • How cyber attackers are treated under various legal systems
    • The outcome of some of the world's largest cyber-attacks and the responses of the international community and nation states

    Dr. Virginia Greiman, Sr. Advisor & Chair of the Centre for Strategic Cyberspace and Security Science (CSCSS) Cyberlaw and International Policy Centre
  • How is Data Analytics Reducing Payments Fraud? Recorded: Nov 30 2016 59 mins
    Ina Yulo (BrightTALK), Andrew Davies (Fiserv), Martin Koderisch (Edgar Dunn)
    Predictive Analytics and the study of Big Data has helped many institutions to detect fraudulent practices before they become a hazard to the business. This is especially evident in the Financial Services sector where deploying an efficient prevention and detection strategy is of utmost importance.

    Join this panel where experts will discuss:
    -Which analytics to look at to stop fraudulent payments in real-time
    -Using trends and behavioural analytics to detect anomalies
    -How to implement a holistic strategy that's right for your organisation
    -The challenges in maintaining compliance standards
    -Use cases and applications of analytics to prevent financial crime
  • An Analysis of Recent Data Breaches in the Banking Industry Recorded: Nov 30 2016 42 mins
    Lawrence Chin - Financial Services Security Market Architect - Palo Alto Networks
    They say that hindsight is 20/20 and in recent months, news of data breaches at several SWIFT (Society for Worldwide Interbank Financial Telecommunications) members has seen many reassessing their cybersecurity strategies.

    Palo Alto Networks invites you to join a webinar where Lawrence Chin, Security Market Architect, will discuss:

    ● A review of these attacks and some of the commonalities
    ● The role of cyber security hygiene, and subsequent recommendations from SWIFT, FS-ISAC (Financial Services Information Sharing and Analysis Center), and US FFIEC (Federal Financial Institutions Examination Council).
    ● Best practices that may prevent similar cyberattacks on financial institutions from succeeding in the future.

    Register today and learn how the confidence and trust can be protected in the increasingly complex digital world in which we live.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Your Cloud or Mine? Exploring Data Security in the Cloud
  • Live at: Oct 9 2013 2:00 pm
  • Presented by: David Etue, VP Corporate Strategy, SafeNet
  • From:
Your email has been sent.
or close