Escape the Data Torture! Finding the Purpose of Big Data
At present, we have started to fit hypothesis to data. This is a flawed approach designed to obtain a result no matter as to its veracity. We have all heard the term, if you torture data long enough, it'll tell you what you want to hear. What we need to do is inject scientific rigour back into the data analysis process. Finding spurious correlations and short term patterns does little to help build and develop value. In this session, we will look at the requirements around testing and causal statements and how we can ensure that we obtain valuable information from the increasing volumes of data. In this session, we will look at the main flaws and irregular processes that are used to make data fit an assumption and to get a result no matter how little this actually helps in the long run.
Following this session, you will know the basic statistical requirements needed to make sense of data. We will detail the scientific processes for testing data and allow you to better make a set of tests that find causal and not simply correlational relationships. In this, we teach you to take the where, what and when and use this to discover the how and why.
RecordedSep 10 201346 mins
Your place is confirmed, we'll send you email reminders
Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
Dynamic, volatile, innovative. Cloud security is all of these and more. How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty? How can customers gain trust in their service vendors despite the parade? Learn how in this webcast.
As organizations continue to ramp-up their migration to cloud-based environments, they will need to account for the associated security and control risks. There are hidden dangers and blind spots that arise through the use of virtualization technology in the data center. These hidden dangers and blind spots become more prevalent as business-critical applications are increasingly deployed on the public cloud. This is a problem considering that an organization’s operations are dependent on a cloud environment that inherently has a huge visibility gap.
Many are now making the necessary changes to keep data secure in the cloud. This talk will focus on how to pragmatically accomplish cloud security through increased emphasis on cloud network visibility and cloud access security brokers. Enterprises that can properly implement appropriate cloud network visibility and cloud access security brokers will experience a third fewer security failures. Learn about practical steps and tools that you can use for accomplishing cloud security in your organization.
While autonomous driverless cars are still a work-in-progress connected cars and the IoT are becoming the norm. Whether that relates to communications infrastructure, on-board services for vehicle management, or mobile device connectivity, more and more new cars come equipped as standard with some sort of "connected" element. Typically the cost of new technology is in the buying price, but with modern cars it could be insurance hikes, loss of privacy, or even loss of life.
Ken Munro, Partner and Security Consultant and Pen Test Partners, breaks down the key technologies and examines the security implications for drivers, insurers and manufactures alike.
Viewers will learn about:
- The attack surface that a connected car presents
- What those attacks look like
- The implications for everyday drivers
- What manufacturers need to be doing
Bad things happen, but the potential of IoT will be limited if those in any connected system of devices cannot share data of adverse incidents more effectively. This webcast introduces 5 keys to doing so successfully, all toward improving security across those systems.
Indy Dhami, Director & Independent Security Consultant
Focus of the talk:
The current global political climate and the increased number of cyber attacks associated with nation states and revelations from whistleblowers such as WikiLeaks. The strategies and potential reasons for such attacks – We are seeing a focus shifting from financial gain
to political power, control and mass surveillance.
A view of the technologies utilised and targeted to perform the attacks such as malware targets such as iPhones, Android devices and smart TVs and malware on Windows, Osx, Linux etc
The talk is aimed at those with a general interest in Cyber Security and how political gain is firmly intertwined and a tool utilised in state sponsored cyber attacks indiscriminately against corporations, criminals and citizens alike.
Indy possesses over 14 years’ experience, having worked in both
operational and consulting positions at FTSE100 and Fortune 500
organisations including AXA, Deutsche Bank, PwC, Accenture,
Mercedes-Benz, Jaguar Land Rover and many other world leading
His experience includes leadership positions in information/
cybersecurity transformation, risk assurance, crisis management
(pre and post incident), assurance, audit, governance, risk and
Contrary to the fear around malicious insiders and external hackers, the Information Commissioner's Office recently reported that the most common data security incidents reported to them are all due to inadvertent human error (incidents like misaddressed emails and laptops being left on trains).
In the face of game-changing regulatory changes like GDPR, it's crucial that information security and data protection professionals prioritise addressing the most prevalent risks first, not the ones that appear the scariest.
This webinar is ideal for any security professionals looking to understand the regulatory and data protection landscape; reduce vulnerabilities; respond to threats more effectively and remediate breaches more effectively.
Global FinTech innovations challenge institutions and customers to navigate how to align the innovations to complex privacy and data protection rules, both in law and in contract. Key questions need to be asked, and answered, to achieve success. Learn how to make the answers useful to conforming to those requirements.
Threat-based testing, accurately simulating criminal attacks, is a critical approach in securing FinTech. Attackers constantly evolve their attack methods and strategies in response to changing technologies, making it essential that security tests match the threat landscape.
Cyber risk must be measures using a top-down approach to understand the business impact of cyber risk in dollars and cents and the effectiveness of cyber controls. Bottom-up approaches stop at the system level and do not tie the business processes to the data assets and the systems, hence they lack the ability to demonstrate the effect a missing control, or a discovered vulnerability has on cyber risk.
Bottom-Up methods have proved themselves to be extremely inaccurate as they measure controls on the technology level and only describe the control maturity and not its effectiveness. Control maturity is a term that is commonly used by IT to measure their ability to perform and is derived from IT governance methodologies such as CobIT, ITIL and CMMI models. From a Risk Management perspective, controls maturity has no effect on Risk because it only describes the implementation status of the control. For example, an Anti-Malware solution can be 90% mature because it is installed on 90% of the end-points. But from a Risk perspective, the policy this control is enforcing could be irrelevant to the Risk. So its effectiveness could be 0%.
Measuring cyber risk by evaluating controls maturity puts the insurer in a very high exposure for loss. Learn how to quantify cyber risk in dollars and cents.
This webinar includes a live demo of real incident response play-books in action!
Join Amar Singh and his special guests in this highly informative and educational webinar on:
* How to design play-books (aka run-books) for different attack scenarios.
* How to align your incident response to official standards.
* Learn more about a day in the life of an investigator.
* How to create an effective triage process that works for every type of attack.
* Discover the various types of data enrichment attributes to apply to every incident.
Nope this is NOT another webinar on How to Protect Against Ransomware blah blah blah.
If you reckon that users (yes that includes you and me) are the first line of defence against ransomware! Sorry to break it to you but you are WRONG! We are all humans and we make mistakes and ransomware creators know that.
You have a choice.Hope and or pray that your awareness training protects your employees and your business from becoming a ransomware victim OR attend this webinar and learn what you can do to protect your business.
Note: This is not your typical webinar. Cyber Management Alliance’s unique and interactive approach to webinar’s allows everyone to have a say and share their knowledge. The host, Amar Singh firmly believes that every member of the audience has valuable input and that each attendee brings their own context and perspective. So, join in, share and learn.
Chenxi Wang, Founder of The Jane Bond Project & Josh Downs, Community Manager, BrightTALK
BrightTALK caught up with Chenxi Wang, Founder of The Jane Project and Twistlock's Chief Strategy Officer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The Yahoo Breach and some of her suspected reasons why
- The influence of the supposed Russian US election hack and what it means for cyber warfare
- Diversity in the cyber industry and how it can be improved
- AI & Machine learning and use cases for security
- The key vulnerabilities in IoT networks that we should be thinking about
Mark Weatherford, Chief Cybersecurity Strategist at vArmour and Josh Downs, Community Manager at BrightTALK
BrightTALK caught up with vArmour's Chief Strategist, Mark Weatherford for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The rise of Ransomware and where companies are more vulnerable
- DDoS and why it's still a key threat to businesses
- The increased vulnerability of the IoT
- Challenges for Donald Trump and his new cyber team
- How to boost equality and diversity in the information security industry
- How cloud and virtualization are changing the security game
About the Speaker:
Mark Weatherford is Chief Cybersecurity Strategist at vArmour, the data center and cloud security company. He was formerly a Principal at the Chertoff Group, was Deputy Under Secretary for Cybersecurity at DHS, was Chief Security Officer at the North American Electric Reliability Corporation (NERC) and was the CISO for the states of California and Colorado. He also served as a cryptologic officer in the US Navy. Weatherford is a Director on the Boards of Coalfire, the Center for Cyber and Homeland Security (CCHS) at the George Washington University, and the National Cybersecurity Center (NCC) in Colorado Springs. He is also on the Advisory Board at both Cylance and AlertEnterprise.
Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
Europe’s General Data Protection Regulation (GDPR) will come into effect on 25th May 2018, leaving all organisations that process the data of EU residents with less than 18 months to meet the stringent requirements of the regulation. Organisations must implement a cloud security strategy that supports compliance and minimises their organisation’s exposure to the new breach notification requirements and financial penalties, as high as 20 million Euros or 4% of total annual turnover.
Still figuring out how your organisation is going to comply? What actionable steps you should be taking today? Look no further. Join Oliver Pinson-Roxburgh, EMEA Technical Director from Alert Logic for an in-depth discussion about GDPR, highlights include:
- Cutting through the ambiguity and focusing on the key cloud security considerations
- Data breach responsibilities and what that means to your organisation
- What is the role and expectation of your cloud provider when it comes to GDPR
- Insight into real-life case studies
Register for this must-attend webinar as we provide you with a way to help reduce risk and keep the regulators happy.
Learn how intelligence-led organizations globally apply threat intelligence to prioritize vulnerability patching, accelerate incident response, reveal strategic risks and plan cyber security investments.
Amongst other things this webinar will provide insight into:
1. Importance of visibility over an entire attack lifecycle
2. How NATO military doctrine for intelligence collection & analysis can be applied in a commercial environment
3. Key Threat Hunting skills and requirements
As the scale and sophistication of cyber attacks increases, businesses need to manage risk in ways beyond those traditionally handled by the information security function.
In this webinar, Steve Durbin, Managing Director, ISF will offer insights into how security and business teams across the organisation can work together to minimise the impact of cyber attacks on shareholder value and business reputation.
Cybercriminals have refined their attacks to increase frequency, efficiency and profits. Cybercrime costs will reach $6 trillion per year globally by 2021, up from $3 trillion in 2015. Every industry and government is at risk, highlighting the need for stronger cyber defence.
This live panel will focus on the tools and techniques threat hunters use to patrol your networks, mitigate threats and remove unwanted presence.
Jenny Radcliffe, Director, Jenny Radcliffe Training
For the Threat Hunters in Action series, this webinar presents a guide to how social engineering forms a large part of insider threats within organisations.
Learn how insider threats are created and manipulated by external parties as well as how organisations help create their own insider threats through cultural and behavioural factors.
The webinar will give advice on how to spot individuals "within the family" who may have malicious intentions towards the business, and gives advice on how to manage the problem within an organisation.
New threats and new defenses constantly challenge the rules for managing security across third party cloud services. In this webcast, you will learn 7 strategies for how to structure and adapt the complex commercial agreements to assure both vendors and customers new risks are being controlled.
Your Resource for Information Security Trends & Education
With over 280,000 members, the Information Security Community is the largest community of cybersecurity professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.