Managing Security and Compliance in a Big Data World

Moderator: Brandon Dunlap. Panel: Dave Anderson (Voltage Security), Sree Rajan (CSA, Fujitsu), Vinay Shukla (Hortonworks)
**At the end of the session we're giving away a $2,950 guest pass of to the Cyber Security & Digital Forensics Exchange (http://www.cyber-securityexchange.com). The pass is for the entire 3 day event, and includes meals and two night hotel accommodation. The winner will be chosen at random. To be entered into the draw you must attend this live webcast.**

Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.

Fortunately, this model of enterprise computing doesn't have to be the high-risk proposition some IT professionals fear. Enterprises willing to create automated processes to identify and value business data can take control of information governance before the big-data onslaught swamps them. As a result, they can meet key corporate objectives, such as lowering costs, lowering risk and making better business decisions. By rethinking security to meet expanded requirements, you can ensure compliance in the big data world.
Aug 14 2013
59 mins
Managing Security and Compliance in a Big Data World
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5607)
  • Upcoming (136)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • A New IT Approach to GRC for Business Innovation Oct 22 2015 5:00 pm UTC 60 mins
    TBC
    The burden of the existing day-to-day IT workload has never been greater and continues to grow. The recent financial scandals and high profile data breaches have raised scrutiny to unprecedented levels. This scrutiny, together with new legislative changes, has resulted in an array of new compliance measures and related challenges, which have led to a melting pot of complexity that has seen organizations increase spend simply to 'keep the IT maintenance lights on'.

    Due to consumer demand, leaders are having to look hard at their IT strategy and ways to reduce expenditure so they can invest in innovation to future-proof the business. Many banks are considering whether a complete IT infrastructure overhaul would prove more beneficial as spending on basic maintenance and compliance does little to move the business forward, yet it consumes the vast majority of IT budget. Not complying is not an option, and reducing IT spend on compliance is difficult as associated projects have become high priority 'must haves' and budget 'must spends'. If organizations fail to adapt their approach it will remain impossible for IT departments to service the needs of the compliance office and still satisfy the business innovation agenda.

    Attend this webinar to learn more about:

    - Driving efficiencies to reduce the cost of compliance
    - Using compliance to enabling teams to focus their efforts more effectively
    - Automating business process to get ahead of compliance
    - Raising your organization's overall data privacy, compliance, and security profile
  • Realizing Effective Data Security Aug 11 2015 5:00 pm UTC 60 mins
    TBC
    Inadequate security and eager cyber attackers have led enterprise data breaches to increase at an alarming pace. Staggering numbers of affected customers—and financial losses—are sending shock waves through the business world, and creating a sense of urgency around identifying solutions.

    Finding a way to ward off cyber intruders has become a critical challenge. There is a need to create value around company data and one way to do this is to ensure that the workforce knows and understands the threats that are out there and the measures that are in place to protect against them.

    Data security is not one size fits all, nor is a data security communication plan. Finding the ideal fit for any company may take trial and error, but an educated and mindful workforce will serve to support the mission of IT security teams tasked with keeping confidential information secure. Join this educational panel webinar as our experts discuss how to realize effective data security across an enterprise.
  • A Business Risk Approach to IT Governance Jul 23 2015 5:00 pm UTC 60 mins
    TBC
    As corporate information technology infrastructure increases in size and complexity, corporations are recognizing the need for a better mechanism for assessing IT’s role and alignment to the key corporate initiatives. What began as a series of best practices has evolved into the field known as IT governance.

    IT governance is no longer just a theoretical concept, it is a fundamental business necessity, and an iterative process which requires requires senior management commitment over the long term in order to see results. By implementing a centralized IT governance program, corporations can deliver immediate benefits to the entire organization such as:

    • The ability to map IT and technology risks into business processes
    • Better visibility and decision support around IT risks
    • Improved IT efficiency
    • IT risk reduction

    This educational webinar is for business and technical people and introduces the key concepts and challenges with IT governance.
  • A Payment Breach Prevention Plan Jun 23 2015 5:00 pm UTC 60 mins
    Dr Branden Williams; PCI SSC, Terence Spies, HP Security Voltage; Chris Merritt, Lumension
    The total number of fraudulent payment card transactions has grown every year since 2006, and experts are calling 2014 "the year of the breach." The Ponemon Institute found that each breach cost the average retailer $8.6 million in related expenses, and the price tag connected with a data breach increased across the board, reaching $20.8 million for financial service firms, $14.5 million for technology companies and $12.7 for communications providers.

    With attacks continually on the rise, it's more important than ever that merchants protect themselves from the potentially huge financial losses and damages to their brand and customer loyalty associated with a data breach. Join this educational session to gain insights and some key steps to prevent payment card breaches across your organization.
  • A Best Practice Blueprint for eGRC May 26 2015 6:00 pm UTC 60 mins
    Brandon Dunlap (Moderator); Renee Murphy, Forester; Mike Rost, MetricStream; Vivek Shivananda, Rsam.
    With the increased regulation and scrutiny of the past decade, it is important for organizations to implement best practices in order to maintain control and achieve compliance with evolving regulatory requirements.

    Compliance teams of the brave new world are set up to discuss risks with the key business leaders, and have sufficient resources to ensure company compliance programs are implemented effectively. Their software applications for managing enterprise governance, risk management, and compliance (eGRC) continue to mature with impressive features and functions, and they are making notable strategic advances by linking these three business functions for more informed decision-making, to reduce risk exposure, lower audit costs, and demonstrate compliance.

    To replicate similar success in your eGRC program, you will need to focus on selling GRC value, practicing good GRC project management, and embedding GRC into corporate culture. Join this educational panel webinar as our experts delve deeper into this, and identify the best practices for implementing an eGRC program in 2015.
  • Understanding EMV, End-to-end encryption, and Tokenization. Recorded: Mar 19 2015 60 mins
    Moderator: Branden Williams. Panel: Ralph Spencer Poore, PCI SSC; Terence Spies, HP Voltage; Scott Carcillo, Merchant Link
    Data breaches are a widespread problem with over 1.1 billion records compromised in the last 10 years. According to the Verizon 2014 Data Breach Investigations Report, the vast majority of breaches occurred against small to mid-sized companies.

    As a result many retailers are focused on bolstering payment security and reducing fraud by implementing solutions such us EMV, End-to-end encryption (E2EE), and Tokenization. These solutions can work in tandem to protect merchants, and enable them to exceed regulatory requirements by securing card data across all payment environments.

    In this session our experts will present and define the three technologies, address the drivers that are leading the United States to implement EMV, and explain the complementary role of Tokenization with respect to EMV and End-to-end encryption.
  • Preparing for PCI DSS 3.0 and VISA Mandates Recorded: Feb 19 2015 61 mins
    Moderated by Branden Williams. Emma Sutcliffe, PCI SSC; Terence Spies, Voltage Security; Matt Getzelman, Coalfire
    * On this webcast we're giving away a pass ($2,490 value) to our partner event: The 3rd Annual Stress Testing USA Congress being held in NYC on March 18-19, 2015. All attendees will be included in the draw.

    The clock is ticking for enterprises that have not yet upgraded their payment card processing systems to be compliant with Payment Card Industry Data Security Standard (PCI DSS) 3.0. Since Jan. 1, 2015 , there is increasing urgency to not only understand the most important changes in PCI DSS 3.0, but also to be ready for a rigorous QSA assessment against those changes. Since PCI 3.0 is bigger, harder and more expensive than the previous iteration, merchants have their work cut out for them.

    PCI DSS founding member, Visa Inc. recently changed its policy on compliance assessments for the PCI DSS. More specifically, Visa decided that merchants who meet a stringent set of criteria including processing 75% of transactions using "Chip and PIN" enabled terminals, may be able to apply for an exemption from PCI DSS assessment requirements. Unfortunately, not all merchants are aware of the change, and fewer understand what it means.

    In this special presentation, our expert panel will explain the changes and their implications, and offer a detailed review of PCI DSS 3.0 to help enterprises prepare for assessments and make PCI compliance a whole lot easier.
  • Top Guidelines for Hadoop Security and Governance in 2015 Recorded: Jan 21 2015 61 mins
    Brandon Dunlap, Brightfly; Vidya Phalke, MetricStream; Sudeep Venkatesh, Voltage; Rebecca Herold, The Privacy Professor
    In 2015 the size of the digital universe will be tenfold what it was in 2010. Large-scale data breaches are on the rise across all sectors, and enterprise data security initiatives must evolve to address new and growing threats. Consumer transactions, personally identifiable information, customer records, and the like, all flowing together into the Hadoop ‘data lake’, will enable critical business insights but also means Hadoop installations will be a rich target for cyber-crime.

    Organizations are now faced with more stringent and expanding regulations, and must implement better governance, more effective risk management policies, and smarter data management approaches to enable them to do a much better job of controlling their business through the information explosion. As companies look at GRC technology, they should assess the capability of these solutions to deliver continuous monitoring of controls, key risk and security indicators, policies, and ensure they are natively integrated with critical business systems.

    We invite you to attend this round-table webinar as our panel of experts will discuss top guidelines for Hadoop security and governance in 2015, and provide guidance for assessing new technology solutions to ensure they will achieve your objectives.
  • Top Security Guidelines for EMV and Mobile Payments in 2015 Recorded: Dec 4 2014 69 mins
    Branden Williams, Moderator; Ralph Spencer Poore, PCI SSC; Terence Spies; David Tushie; and Rajesh Sharma
    More than 100 million Americans have lost personal information in a data breach over the last year, and identity theft is the fastest growing crime in the US. As a result, President Obama has launched a government initiative to support the US migration to EMV and improve information sharing on cyberfraud threats, and nearly half of US merchant terminals are expected to accept EMV cards by the end of next year.

    As of October 1 of 2015, merchants and acquirers—not card issuers—will bear the financial burden resulting from fraudulent use of counterfeit, lost and stolen cards. It's a risk that's only mitigated by demonstration and documentation of EMV compliance. Beyond the liability shift, EMV holds promise as an enabler of secure mobile and e-commerce payments, with attractive PCI (Payment Card Industry) Security Standards-related benefits for merchants. Those who implement EMV contact- and contactless-enabled POS devices may be excused from PCI audits and the costs associated with them, creating further incentive to adopt EMV.

    In this webinar, we'll discuss the details behind the migration to EMV, how the technology works, and some top security guidelines for EMV and Mobile Payments in 2015.
  • Don't Be the Next Headline: Data Security Best Practices for 2015 and Beyond Recorded: Nov 4 2014 65 mins
    Moderator: Brandon Dunlap. Panel: Bob Russo, PCI SSC; Terence Spies, Voltage; Yo Delmar, MetricStream; Rick Dakin, Coalfire
    Albert Einstein once observed: "Technological progress is like an axe in the hands of a pathological criminal." His words were eerily prophetic of the continuous news of data breaches in the retail and banking sectors.

    Data breaches can be financially catastrophic as they drive costs to repair the damage, costs to secure their systems, costs to repay the consumers, losses in profits, losses in consumer confidence, and lawsuits seeking damages for alleged negligence. Intense media and Congressional scrutiny have classified all data breaches as direct attacks on privacy, and any company that has possession of personal identification information should consider itself in possession of potentially explosive material.

    Although the headline-making breaches are highly sophisticated, most attacks simply exploit lax security practices. In fact, Verizon's 2014 Data Breach Investigations Report found that 78 percent of the attacks were of very low or low difficulty. That means that in more than three-quarters of all breaches, attackers used basic methods that required few resources and no software customization. That's the bad news. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices with proven technologies.

    Join our panel of experts as they discuss how to implement data security best practices, and how to prepare your experts with a crisis response plan to avoid being another headline.
  • Evolution of Encrypting Ransomware Recorded: Oct 23 2014 48 mins
    Tyler Moffitt-Senior Threat Research Analyst, Webroot
    Encrypting ransomware is a key term in the title as just ransomware is broad and can include threats that are very different, easy to detect, and don't encrypt files at infection - the key differentiation point that gives these threats the upper hand against AV.

    The presentation is going to be on all the encrypting ransomwares we've seen thus far. It will cover in-depth features of each one and how malware authors made improvements as time went on. There is quite a few so it will be a full presentations worth (cryptolocker, dir-crypt, cryptowall, cryptodefense, zero-locker, critroni, synolocker, cryptographic locker). I'll show from start to finish of an infection and what a user will experience and will highlight social engineering tactics along with the methods of payment circumventing money mules.
  • Securing Hadoop – the Data-Centric Approach Recorded: Oct 1 2014 62 mins
    Adrian Lane, Security Analyst – CTO, Securosis; and Sudeep Venkatesh VP, Solutions Architecture, Voltage Security
    If you’re embarking on Hadoop adoption you know that sensitive customer and corporate data will be in the ecosystem – transactional data, intellectual property, customer files, and more. As Adrian Lane of Securosis has noted, “High quality data produces better analysis results—which is why a key ingredient is sensitive data.” Now the question becomes how to keep sensitive data secure as it moves into and beyond Hadoop, and—most importantly—how to protect the data but still make it accessible by many different users with varying analytic needs and ad-hoc processes.

    Join us for an insightful discussion on data-centric security approaches for multi-platform enterprise environments, including Hadoop. Learn about techniques such as format-preserving encryption, tokenization, storage-level encryption, and data masking.

    RSVP Now if you need to understand how to enable analytics and insights without security risk, and how to neutralize data breaches through data-centric technologies that can integrate with Hive, Sqoop, MapReduce and other Hadoop specific interfaces.
  • The Case for Building Your Own Secure, Compliant Cloud Recorded: Sep 24 2014 61 mins
    David Chapa, CTO at EVault (Seagate); Jean-Louis Fritz Y. CRISC, Governance, Risk and Compliance leader
    *On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on October 22-23*

    What is driving expansion to the cloud? In most cases, it’s cost. But for many enterprise IT organizations, it is about agility, efficiency, and productivity.

    The research firm, 451 Group says, “Cloud is a way of using technology, not a technology in itself,” and, in many cases, IT organizations have chartered new courses on their own to reach the same value as the hyper-scale cloud solution providers. Although, as with any DIY solution, comes caveat emptor. As any do-it-yourselfer will attest, at some point you must make adjustments, fixes, and, in some cases, scrap it and build it all over again. This is the nature of DIY. However, in today’s competitive marketplace, time and resources are limited, and for IT to be more agile, efficient, and productive, DIY may not be the best course of action moving forward.

    In this webinar, we will look at the trends of cloud and how building a secure, compliant cloud based on validated and converged infrastructures will be the way IT expands its way beyond the data center, into the cloud.
  • Panel Discussion: Why EMV is Not the Only Answer to Payment Security Recorded: Sep 16 2014 77 mins
    Brandon Dunlap, Bob Russo (PCI SSC), Jeff Cherrington, Bernard Vian, Terence Spies
    *On this webcast we're giving away a pass to our partner event: Governance, Risk and Compliance for Financial Services on October 22-23*

    2013 was the worst year yet in terms of data breaches, with over 740 million records exposed, and 2014 is shaping up to be more of the same. Security analysts estimate the costs of the data breach that hit U.S. retailer Target are approaching half a billion dollars for the company. The total cost of the breach including losses incurred by banks, consumers and others–could easily reach into the billions of dollars, and the incidents continue.

    With the Target incident seen as a watershed many financial institutions are planning to begin issuing EMV cards in the next two years, although many are still hesitant to commit to EMV because of uncertainty around retailer adoption of chip card point-of-sale terminals, questions about the viability of the business case for migrating from magnetic stripe cards to chip cards, as well as unresolved issues related to regulation and support for merchant routing choice. Meanwhile, the official release of PCI DSS v3.0 is here, delivering a fresh set of regulatory concerns for retailers.

    Clearly, traditional IT defenses are no longer working. But you can take control. Join us as we discuss key lessons learned from the recent breaches, and the latest developments in payment security.
  • Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection Recorded: Aug 20 2014 63 mins
    Andrew Hicks, Healthcare Practice Director at Coalfire; and Mark Bower, VP Product Mgt, Voltage Security
    With the emergence of big data healthcare analytics, electronic health information exchange, clinical data warehousing, and other technologies for optimizing patient care, the healthcare industry has never been more reliant on electronic data and the strict requirements associated with the data. The advances in business processes, technology and regulations require that data security initiatives evolve to address new and growing threats. Coincidentally, in a recent survey, 69% of organizations felt that provisions of the Affordable Care Act (ACA) have the effect of increasing or significantly increasing risks to patient privacy and security.

    Chasing compliance is an expensive proposition that doesn’t adequately address the current security threats and vulnerabilities. Organizations that simply want to comply with the regulations are already at risk. A more effective program is risk-based -- one where incremental changes to controls can be made in real-time to more effectively combat current threats to your security program. Join us for this webinar where you’ll learn:

    - Why compliance is an outcome of an effective data protection program.
    - Risk assessment, analysis and management – what’s the difference and why you need them.
    - What is considered ‘reasonable’?
    - What leading healthcare organizations are doing today to protect data, with a focus on securing Big Data for healthcare analytics?
    - How data protection can help without getting in the way of patient care.
    - How do you protect from your healthcare organization public loss of confidence?
  • EMV & Payment Security: Evolving Beyond the Mag Stripe Recorded: Jul 15 2014 61 mins
    George Peabody (Glenbrook Partners), Terence Spies (CTO at Voltage Security)
    * On this webcast we're giving away a guest pass to 'Data Analytics for Manufacturing' in Chicago on August 18-19.

    Everything changed six months ago. The Target data breach caused us all to rethink payment security. The U.S. transition to EMV chip and pin cards, is around the corner. Tune into this webinar for a complete update on where EMV is today – lessons learned from Europe and Canada’s experience of EMV adoption, and the latest about the liability shift in the U.S. How and when will EMV be augmented by new approaches to card data in mobile wallets, online, and at the point of sale? Learn what you need to know about tokenization and the latest developments which are sure to impact your payment security and payment processing. Find out how you can build in flexibility during this time of transition and rapid evolution in technologies.

    Join us to find out what this evolution in payment architectures means for your business–with no single payment architecture in place any time soon.
Empowering the GRC Community
The IT GRC Forum produces online events and provides professional networking facilities and market intelligence to Governance, Risk Management and Compliance professionals.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Managing Security and Compliance in a Big Data World
  • Live at: Aug 14 2013 6:00 pm
  • Presented by: Moderator: Brandon Dunlap. Panel: Dave Anderson (Voltage Security), Sree Rajan (CSA, Fujitsu), Vinay Shukla (Hortonworks)
  • From:
Your email has been sent.
or close
You must be logged in to email this