The Next Generation is NOW! Forget the Hype and Secure Your Network
With Cyber Security and Data Breaches moving from the trade press to the general news community, the focus on hype has caused enterprises to lose sight of the end game; the elimination of security vulnerabilities in their networks.
This session will break down the network into its functional areas, identify the potential vulnerabilities and close the security loopholes.
RecordedAug 12 201437 mins
Your place is confirmed, we'll send you email reminders
Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
What have we learned from 2017's biggest breaches and how will we deal with 2018's emerging threats? Attempting to look both backward and forward over the cyber landscape, Peter Wood will review lessons learned and apply them to the evolving threatscape.
Dynamic, volatile, innovative. Cloud security is all of these and more. How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty? How can customers gain trust in their service vendors despite the parade? Learn how in this webcast.
As organizations continue to ramp-up their migration to cloud-based environments, they will need to account for the associated security and control risks. There are hidden dangers and blind spots that arise through the use of virtualization technology in the data center. These hidden dangers and blind spots become more prevalent as business-critical applications are increasingly deployed on the public cloud. This is a problem considering that an organization’s operations are dependent on a cloud environment that inherently has a huge visibility gap.
Many are now making the necessary changes to keep data secure in the cloud. This talk will focus on how to pragmatically accomplish cloud security through increased emphasis on cloud network visibility and cloud access security brokers. Enterprises that can properly implement appropriate cloud network visibility and cloud access security brokers will experience a third fewer security failures. Learn about practical steps and tools that you can use for accomplishing cloud security in your organization.
If your processing and data is in the cloud, how can you deliver assurance, compliance and governance? How do you find the flaws and soft spots that criminals will exploit? From browser to database, through human factors and end points, this presentation will take a threat-based approach to securing the cloud.
Paolo Balboni, Founding Partner of ICT Legal Consulting
Paolo Balboni will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Balboni will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
9 months until the GDPR deadline - are you completely up-to-speed?
Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.
We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.
GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.
It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.
Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
Wieland Alge - GM EMEA - Barracuda Networks, Mark Harrison - Consultant - Pen Test Partners
Would a hack on one Internet connected thermostat stop a nation? Maybe not, but imagine hundreds of connected devices being meddled with in order to cause havoc?
Join our IOT experts to discuss the real impact of an IOT device hack. Wieland Alge, GM EMEA at Barracuda Networks and Mark Harrison, Consultant at Pen Test Partners, will look into why cyber criminals are interested in hacking IOT devices and the true impact of such an attack to organisations. Join this webinar to learn:
• The true impact of an IOT hack
• Methods used by hackers
• Demos of IOT devices being hacked
• Major challenges in protecting smart cities
• How to mitigate these threats
Josh Downs, BrightTALK & Giovanni Vigna, Professor & CTO, University of Santa Barbara & Lastline
BrightTALK caught up with Giovanni Vigna from University of Santa Barbara & Lastline for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.
Topics up for discussion:
- The difference between traditional AI & Machine Learning and the tools when applied to cyber security
- Whether the buzz surrounding the tools is legitimate
- How the human still needs to fit into the picture when using machine learning based security techniques
- How AI & Machine learning can be used for threat hunting purposes
- The WannaCry virus and what it means for the ransomware landscape and how we protect ourselves from attacks
- The value of security culture in an organisation
- Trends in the techniques used in cyber warfare
- The exponential growth of the IoT and what it means for securing the connected devices
Bad things happen, but the potential of IoT will be limited if those in any connected system of devices cannot share data of adverse incidents more effectively. This webcast introduces 5 keys to doing so successfully, all toward improving security across those systems.
The Internet of Everything affects everyone from multi-nationals to private citizens. The universal adoption of machine to machine communications in every aspect of our lives offers criminals a hugely expanded attack surface. How do we defend ourselves without undermining the benefits of the IoE?
Daniel Keidar, AVP of International Pre-Sales at Allot
The rapid growth of the Internet of Things (IoT) has led to a major increase in threats to network security. The proliferation of weakly secured connected devices has enabled recent DDoS attacks to become some of the largest and most destructive on record. They have significantly compromised network services, disrupted the quality of experience for millions of users, and threatened data security.
Existing network security solutions have not proved effective enough to mitigate such large and aggressive attacks. Operators need to fight this phenomenon with a new, comprehensive, multi-layered solution. So join us to learn:
•The impact of massive IoT-driven attacks
•How service providers can protect their assets and their users
•How multi-layered solutions provide networks with the strongest defense
•The opportunities for operators to sell security as a services to customers
John Pironti, president of IP Architects, and Michael Dalgleish, director of sales engineering at LogRhythm
The perils of security breaches are widely publicised, but do you know exactly how an attack or breach would affect your business?
In this webinar John Pironti, president of IP Architects, and Michael Dalgleish, director of sales engineering at LogRhythm, will discuss the costs of recent data breaches and illustrate the best ways to determine your organisation’s cyber risk profile. The duo will also teach you about the security tools and processes you can implement to strengthen your security operations.
Watch now to learn how to take your security operations to the next level.
Josh Downs, BrightTALK [moderator]; John Smith, ExtraHop Networks & Tim Sadler, CheckRecipient
According to the latest Verizon Data Breach Investigations Report, 93% of compromises occur within minutes. Traditional security tools do not have the "shutter speed" to detect and remediate these threats fast enough. By analyzing network behavior on the wire as it happens, correlating it with threat intelligence, and then orchestrating remediation actions, organisations gain the capabilities needed to conduct "hand-to-hand" combat against cyber adversaries.
Josh Downs, BrightTALK, Darren Thomson, Symantec; Chris Ross, Barracuda Networks
- BrightTALK at Infosecurity Europe 2017 -
One month on from the WannaCry attacks, we'll be discussing their influence on the cyber security industry; whether it was a success for the cyber criminals and what organisations could've done to be better protected.
This expert panel will cover how the ransomware spread, why there's been an explosion over the last few years, why businesses are especially vulnerable and how the malware is more and more intertwined with crypto currencies.
Fighting Ransomware was a top priority on security professionals' minds in 2016 and that will only continue into 2017. Tune into this live panel to get insights and takeaways to protect your business from the threat of ransomware.
Josh Downs, BrightTALK, Patrick Grillo, Fortinet, Danielle Cattedu, CSA & Marc Laliberte, WatchGuard
- BrightTALK at Infosecurity Europe 2017 -
IoT networks grow by the day - prompting sleepless nights from security professionals the world over. As more and more devices join the network, how can we ensure that they're not becoming the latest weak link in the network?
This expert panel will look at vulnerabilities in the IoT, those that are more obvious and those that perhaps aren't. It'll also cover the latest threats targeting IoT networks; the mechanisms and techniques that are being used and how to stop them.
The IoT will be critical to business and consumer life from hospitals to connected cars to factory floors. Security and privacy remain key concerns and this panel will break down what the explosion of IoT networks will mean for security professionals.
Girish Bhat, Splunk Director of Security Product Marketing; Kelly Kavanaugh, Research Analyst,Info Security & Privacy,Gartner
Description : It's no longer a question whether an organization will be breached -- it's a matter of when. According to Gartner, organizations are failing at early breach detection, with fewer than 20% of breaches detected internally.* The time to detect a compromise can takes days, or even months.
Join this webinar to hear Splunk and Gartner discuss the strategic role of SIEM as a centralized solution and why organizations need to move from prevention only solutions to detection, response and remediation.
In this session, Gartner research analyst Kelly Kavanagh will address:
- Challenges facing organizations when it comes to advanced threats
- The resources and technologies needed
- Best practices on how organizations can leverage SIEM and lean-forward technologies like user and entity behavior analytics
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.