5 Steps to Overcome Compliance Challenges in the Cloud

Manage webcast
Varun Badhwar, Vice President of Product Strategy, CipherCloud
In this uncertain economy, the benefits of cloud computing are significant: the economies of scale, the potential cost savings, fast deployment and easy scalability. So, what's holding up adoption beyond inertia? According to the Goldman Sachs Equity Research Report of 2011, 70% of the CIOs surveyed express major concerns about data privacy in the cloud. Specific concerns include data privacy and breach notification, loss of governance, regulatory compliance and data sovereignty. How should organizations manage these challenges while leveraging the proven benefits of cloud computing?

In this webcast, you'll learn about:

• New threats that can impact your sensitive data in the cloud
• Impact of cloud migration to regulatory and compliance requirements
• 5 steps to overcome these challenges while providing your business a competitive edge.
May 23 2012
42 mins
5 Steps to Overcome Compliance Challenges in the Cloud
Join us for this summit:
  • Channel
  • Channel profile
  • Investigate Attacks Like Never Before: Pivoting through Attackers Infrastructure Jul 16 2015 5:00 pm UTC 45 mins
    Jeremy Lindon, Sr Product Manager and Meg Diaz, Sr Product Marketing Manger, OpenDNS
    Attackers break in and pivot through your infrastructure—making their way through critical systems, learning corporate secrets, and ultimately stealing your data. What if you could turn the tables and pivot through their infrastructure?

    Imagine finding one malicious domain or IP and using it to map out the attacker’s infrastructure in minutes. With OpenDNS Investigate, you get visibility into the related domains, IPs, and autonomous systems that may be leveraged for attacks now and in the future.

    Using examples of attacks, we will show how you can pivot through attackers’ infrastructures and stay ahead of attacks. Join this webcast to find out how you can use OpenDNS Investigate to:
    - Investigate attacks like never before
    - Gain global context to better prioritize incident response
    - Predict where future attacks are staged
  • Close Operational Gaps for Better Cybersecurity Jul 16 2015 4:00 pm UTC 60 mins
    Joerg Sieber, Senior Product Marketing Manager, Palo Alto Networks
    As security solutions become more sophisticated, the challenge is not a lack of data, but how to cut through the noise quickly to understand what is actionable and where to allocate resources.

    In this webinar, we discuss strategies that provide your organization the best protection against cyberthreats:

    •Reduce response times with visual actionable data
    •Discover the unknown with automated threat correlation
    •Streamline management with operational and policy control
  • For Security Sake: Consolidate Your Secure Remote Access Infrastructure Jul 14 2015 5:00 pm UTC 60 mins
    Prakash Mana, Director of Product Management, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, Citrix
    Securely managing a cohesive network infrastructure of essential enterprise apps and data has never been more challenging. In this webinar, we will cover day-in-the-life scenarios, highlighting challenges faced by IT teams in providing secure remote access to support mobility and security via centrally hosted applications, data and systems. We will then discuss how consolidating multiple access gateways, including mobile-specific gateways and classic SSL VPNs, with Citrix NetScaler with Unified Gateway helps provide One URL for secure remote access while reducing TCO, simplifying IT, strengthening security and ensuring a high-definition experience for both mobile and traditional application users.
  • Why Your Firewall Strategy Isn’t Working: All About Internal Network Firewalls Jul 9 2015 6:00 pm UTC 45 mins
    John Maddison, VP of Product Marketing, Fortinet
    No one is trying to reinvent the wheel here, but lets call a spade a spade. The level of threats are increasing, they are advanced, they are persistent and they are costly, so its no surprise traditional firewalls that focus on borders are just not working like they used to. The truth is the internal network is no longer a “trusted” environment, whether a malicious outsider, evil insider or unknowing participant, once inside, threats can spread and do maximum damage. Internal firewalls, while not a new concept, are finally taking hold and the results are a game changer for network protection.

    Fortinet is proud to present, Why Your Firewall Strategy Isn’t Working, Let’s Talk About Internal Network Firewalls, a deep dive into why INFW is the new “must have” in the ever shifting threat landscape.

    - Discover how multiple layers of defense are the new standard for highly-sophisticated attacks that are getting past border defenses.
    - Learn how INFW is different as a compliment to existing Firewalls and various deployment scenarios
    - Understand how a single device can work efficiently in multiple segments

    Don’t Miss, Why Your Firewall Strategy Isn’t Working, Let’s Talk About Internal Network Firewalls, and learn how an Internal Network Firewall can provide the necessary inside-out network protection you need to protect your critical data against advanced threats.
  • Mac Security for Business Jul 8 2015 5:00 pm UTC 60 mins
    Dave Howard, Instructional Designer and Don Lewis, Solutions Marketing Manager
    Learn how to protect the Mac platform in your business.
  • Hackers, Attackers, and Criminals -The never ending, dynamic and evolving threat Jul 8 2015 3:00 pm UTC 45 mins
    Carlos A. Fernandes, CISSP, CEO, Agile Cybersecurity Solutions
    Cybercrime continues to increase, with nearly 100% of Forbes Global 2000 companies reporting data breaches within the last 12 months.
    It is estimated that over 200 nations have Intelligence capabilities and their #1 target is the United States. Cyber tools, used for exploitation, can also be used for cyber attacks. These capabilities are being built by the 1,000s. The result is that most US corporations have been penetrated. Furthermore, most network security appliances may stop a novice attack but they are no match for a sophisticated threat actor. The presentation will explore the evolving threat, why we should care, and what we can and cannot do to counter this never ending, dynamic and evolving threat.
  • Data Immunization: A New Approach to Protect Against the Insider Threat Jul 8 2015 3:00 pm UTC 45 mins
    Eyal Manor, VP Product Management, Secure Islands
    Organizations spend millions to protect data from outside threats, but are investing far less to protect themselves against attacked from inside. Security experts agree that there is currently no way of completely block hacks or prevent insiders from leaking information. But is the situation completely hopeless?

    This session will present a new paradigm for keeping sensitive data safe by classifying and protecting it at the source. How to enhance the performance of DLP? How to enable collaboration and BYOD in a secure manner? How can you track all organizational data and pinpoint risk? How can you make the threat of data theft and loss irrelevant?

    Join our session to learn the answer.
  • Cloud Attack: Unsharing Your Business in The Cloud Jul 8 2015 3:00 pm UTC 45 mins
    Jason Hart, VP Cloud Solutions - Gemalto
    In this presentation we will examine real cases that show how vulnerable cloud and virtual environments can be without the correct controls. You will see how easily controls can be bypassed and compromised, why software keys are simply not good enough, and how your personal life threatens your business and work life. Join us on July 8th to learn what we call, unsharing your data.
  • Myth or Reality: Insider Threat Victims DON'T Have Their Heads in the Cloud Jul 8 2015 2:00 pm UTC 45 mins
    Evelyn de Souza, Data Governance Workgroup Chair, Cloud Security Alliance & Data Privacy and Compliance Leader, Cisco Systems
    We can safely predict that an insider threat targeting cloud will be the cause of a major data breach over the next 12 months. While cloud insider threats consistently rank as a top concern, they have not been decomposed and mitigated like enterprise exploits. We will uncover threat vectors and behavioural traits and present new techniques for discovering and mitigating cloud insider threats. This webcast will also include a breakdown and comparison of different cloud models.

    Attendees will also learn:

    • Techniques for reconstructing audit trails to help with the deconstructing of an insider threat

    • Ways to quickly recover from the effects of an insider threat to minimize business disruption and impact
  • Complex Incident Response Investigations: How to Minimise Breach Impact Jul 8 2015 1:00 pm UTC 60 mins
    Rafe Pilling, Senior Security Researcher, Dell SecureWorks
    How prepared are you for a data breach?

    With the threat environment growing more complex, and the rise in advanced and targeted attacks, how does your response plan hold up? Threat actors have changed their tactics; so must you.

    During this webcast, Rafe Pilling, Senior Security Researcher for Dell SecureWorrks Counter Threat Unit (CTU), will share advice based on real-world examples to help ensure your organisation is infinitely better prepared to respond to a security breach.

    Key topics covered include:

    · A view of the evolving threat landscape and how this could impact you

    · Examples of critical mistakes Dell SecureWorks has viewed in real-world cases

    · Developing a robust incident response plan

    · Maximising the value of current controls and improving your overall security posture
  • Insider Threats – Real Problems and Real Solutions Jul 8 2015 10:00 am UTC 45 mins
    Peter Wood, CEO, First Base Technologies
    Malicious attacks and accidental breaches by insiders present a real threat to organisations of all types. Insiders are uniquely positioned with legitimate access to data, networks and premises, allowing them to effectively bypass firewalls and intrusion detection systems. Pete and his team have conducted hundreds of simulated insider attacks and have found common themes emerge, regardless of business sector or size of business. In this presentation, discover the critical weaknesses that insiders exploit and the key, practical steps to defending against the insider threat.
  • Data-centric Security & Encryption: Keeping Your Critical Data Safe Jul 7 2015 4:45 pm UTC 45 mins
    Albert Biketi, VP & GM, HP Security, Atalla
    Data’s coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you’re at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable – get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.
  • Verisign iDefense 2015 Cyber Threats and Trends Jul 7 2015 3:00 pm UTC 45 mins
    Dee Richartz, Technology Strategist, Verisign & Rob Coderre, Director – Product Management, i-Defense
    Our personal and professional attack surfaces have never been greater, and they are only expected to grow as organizations and individuals continue to increase their reliance on the digitally connected world for a variety of tasks.

    Throughout 2014, and into 2015, Verisign iDefense® Security Intelligence Services observed cyber criminals increasing their focus on attacking point-of-sale (PoS) systems and developing and deploying new banking malware. Global events continue to drive a higher frequency and severity of hacktivist activities and pro-state cyber operations. Vulnerable legacy and open-source operating systems continued to complicate the security of critical networks.

    This report presents an overview of the key cyber security trends Verisign has noted and expects to see throughout the remainder of 2015. It features conclusions drawn from Verisign iDefense research and analysis covering cyber-crime, hacktivism and vulnerabilities.
  • The first 24 hours after a breach Jul 7 2015 3:00 pm UTC 45 mins
    Ondrej Krehel, CTO and Founder, LIFARS, LLC
    This session will be about the process that takes place once a data breach occurs. The pressure is extremely high and various teams have to come together in this time of emergency, including incident response team, the board and the executive management, the PR team, risk management and legal. Goals are to strategize and minimize the damage, contain the threat, and ensure that the business continues running in spite of a major incident and at the same time public concerns and pressure are addressed in an efficient manner.

    Talk points:

    Getting the call
    Arriving on scene (first observations and attacker profile analysis)
    Crisis management with key internal tenants
    Evidence collection and preservation, digital forensic investigation and analysis
  • BYOx: developing and deploying effective strategies to safeguard data Jul 7 2015 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF Ltd
    As the trend of employees using smartphones and tablets as corporate access devices in the workplace grows, businesses of all sizes continue to see information security risks being exploited. These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications.

    During this webinar Steve Durbin, Managing Director of ISF, will explain why it is important for organisations to embrace these new technologies to develop and deploy effective enterprise-wide strategies and to safeguard their data.
  • Detecting Malicious Insiders Through Behavioural and Operational Analytics Jul 7 2015 12:00 pm UTC 45 mins
    Vinoth Sivasubramanian, CISO, Alaacart
    Combating insider threats is an extremely daunting task. Even more challenging is to unearth and defend crimes that could be committed by potential malicious insiders who are organized and enjoy a high degree of trust. This presentation shall discuss the current state of insider threats, the detection mechanisms available, why they are not enough and also suggest practical methods that can help detect and prevent potential frauds. Elucidated through a case study, this presentation shall walk you through on how we developed and implemented a framework using BIG DATA technology, user attributes and proven methods of behavioral science to unearth potential malicious insiders. With a detection rate of 90 percent, this is a highly adaptable model and gets easily integrated within your SIEM/Incident management and delivers great Return on Investment.
  • Promoting an Information Security Culture Jul 7 2015 12:00 pm UTC 45 mins
    Shan Lee, Head of Information Security, Just Eat
    Shan Lee is the Head of Information Security at JUST EAT Plc where he is passionate about promoting a "Security Culture" in what is a fast moving and rapidly expanding, multinational environment.

    In this presentation he will touch upon the following subjects: security culture, awareness, education, and the problems around the real threat being the (non-malicious) employees that don't even realise their online behaviour is a problem.
  • Get Results from Your Awareness Activities Using the Security Culture Framework Jul 7 2015 11:00 am UTC 45 mins
    Kai Roer, Founder The Roer Group, Security Culture Coach and Author
    For more than two decades organizations worldwide have failed at creating the security awareness we have aimed for. Instead of continuing doing things we already know are failing to give us the results we need, Mr. Roer and his team set out to analyse what the key elements in successful awareness programs are, and what the major reasons for failure are. The research project was the basis to create the Security Culture Framework, a free and open methodology on organizing successful awareness campaigns that creates lasting cultural change. Today, the framework is being used by a large number of organizations around the world, to build and maintain security culture. In this talk, Mr. Roer will walk you through the four basic principles of the Security Culture Framework, and explain how to be successful when building security culture.
  • CyberSecurity: It's time to be prepared - Cyber Defence Strategies & Cyber Resil Jul 7 2015 10:00 am UTC 45 mins
    Tarun Samtani CISSP, Information Security Architect, Ebuyer UK
    It's not about IF, but WHEN - This statement has been over hyped by media and Sales people love it as they want to sell you something. There is a lot of negative news around cyber security and rightly because Data breaches have become a part of our daily news. BUT 90% of the breaches could have been avoided according to a recent report by Online Trust Alliance 2015 had best practices and security controls been applied correctly.

    So what can we do about it?

    From this webinar, I would like to bring some cyber defence strategies into play which i have been researching on lately. There is no silver bullet to Cyber Security. "You dont need another Security product".

    Prepare for the worse by having a sound cyber resilience strategy in place.

    Takeaways from this webinar -

    a) Best Practice - Defence in Depth
    b) Cyber Defence strategy models
    c) Cyber Resilience Framework
  • Into the breach: Lessons learned from targeted attacks Jul 7 2015 10:00 am UTC 45 mins
    Stuart Davis, Director, Mandiant
    This presentation will highlight lessons learned from many years of responding to targeted attacks by nation state actors and other groups. We will highlight why adversaries continue to successfully compromise their targets at-will, and provide insight to the investigative techniques and security controls that can keep-pace with attacker methodologies. (Hint: there are no silver bullets, and buying more security widgets is not always the answer to these challenges!) We’ll discuss the benefits, and potential pitfalls, of the emerging market for “threat intelligence”. Finally, we'll take the risk of predicting the future and provide some thoughts on how targeted attacks and state-sponsored threats may continue to evolve.

    - Identify frequently-missed blind-spots and operational failures that help attackers persist in a compromise environment
    - Discover how to better utilise existing resources and technologies to reduce the time gaps between successful compromise, detection, and remediation
    - Identify which approaches to remediation have been most successful at driving attackers out of a compromised environment and limiting the likelihood of re-compromise
    - Understand how targeted and state-sponsored attackers are evolving their methodologies in response to increased exposure and analysis
    - Learn practical ways in which threat intelligence can be utilised to detect and respond to attackers
Your Resource for Information Security Trends & Education
With over 200,000 members, the Information Security Community is the largest community of infosec professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 5 Steps to Overcome Compliance Challenges in the Cloud
  • Live at: May 23 2012 6:00 pm
  • Presented by: Varun Badhwar, Vice President of Product Strategy, CipherCloud
  • From:
Your email has been sent.
or close
You must be logged in to email this