Hi [[ session.user.profile.firstName ]]

GDPR Panel: What May 2018 Means to Your Business

A global survey on the European Union’s new General Data Protection Regulation (GDPR) commissioned by SonicWALL in September 2016, reveals that surveyed organizations ‒ both SMBs and large enterprises ‒ lack general awareness of the requirements of the new regulation, how to prepare for it, and the final impact of non-compliance on data security and business outcomes.

Don’t wait until it is too late: join Kristian Norsgaard Rieper-Holm from Globalsequr, Florian Malecki from SonicWALL, Jonathan Armstrong from Cordery and moderated by First Base Technologies’ Peter Wood as they shed some light on the ins and outs of the new GDPR requirements and how to increase your overall data security posture to minimise the cyber risks and potential financial fines.
Recorded Nov 10 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Wood, First Base Technologies; Florian Malecki, Dell; Jonathan Armstrong, Cordery & Kristian Norsgaard Rieper-Holm
Presentation preview: GDPR Panel: What May 2018 Means to Your Business

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Data Privacy in 2020 and Beyond Jun 17 2020 3:00 pm UTC 60 mins
    Panelists TBA
    Is your organization aware of the main differences in data regulations around the world?

    Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.

    Viewers will learn more about:
    - What's new on the data privacy and compliance landscape
    - Main differences between data regulations around the world and what this means for your organization
    - Expert recommendations regarding best tools and practices for achieving and maintaining compliance
    - The future of data privacy
    - What to expect in 2020 and beyond
  • [PANEL] How to Simplify Cyber Risk Management? May 13 2020 3:00 pm UTC 60 mins
    Panelists TBA
    In today’s multi-cloud and hybrid environments, CISO's are struggling to secure assets, manage security policies across clouds, monitor and mitigate risks, while also supporting the business. How are CISOs solving the challenge of complexity?

    Join this panel of experts to learn how to simplify cyber risk management as well as maximize the value of your team and technology.
    - Risk scoring and security controls
    - How to identify risks for organizations and their third-party vendors
    - How to prevent, detect, and respond to, privacy and network security incidents
    - Best of vulnerability and risk management in a multi-vendor environment
    - Best practices and use cases across industries
  • [PANEL] Email Security Strategies and Solutions Apr 15 2020 3:00 pm UTC 60 mins
    Panelists TBA
    With email security breaches constantly making headlines, it is crucial for organisations to be ahead of the curve. Join this interactive panel of industry experts as they discuss the latest trends in email security and how to prevent becoming the next international headline.

    Join this Q&A panel to learn more about:

    - Emerging trends in email attacks
    - How to stay on top of the latest threats
    - Best solutions to protect your organization
  • [PANEL] Insider Threats Apr 14 2020 3:00 pm UTC 60 mins
    Panelists TBA
    As there have been countless insider threat breaches recently, it’s no surprise that research suggests that up to 60% of cyberattacks are due to insider threats. With so much at stake, it's vital for organizations to protect against insider threats.

    Join this interactive panel of industry experts as they discuss:

    -How to protect your organisation from insider threats
    -Latest technologies and solutions
    -Benefits of early and timely detection
  • [PANEL] Security as a Service Apr 13 2020 3:00 pm UTC 60 mins
    Panelists TBA
    As in-house security becomes increasingly complex and costly, organizations are in need of a reliable and safe security provider. Join industry experts as they discuss the latest trends in SEaaS, including:

    -Why your organisation needs to move towards SEaaS
    -The different models of security as a service
    - SEaaS solutions and strategies
  • Deepfakes, Social and Impact on Elections Mar 26 2020 5:00 pm UTC 60 mins
    David Morris | John Bambenek
    AI-generated fake videos, or deepfakes, are becoming more common, more convincing and easier to create. In the era of social, technically manipulated videos can spread like wildfire.

    This is a particularly sensitive issue in today's politically charged environment. With the 2020 U.S. presidential election on the horizon, foreign interference in elections is a real problem and social media the perfect gateway for sowing misinformation, discord and mistrust.

    Can deepfakes impact the outcome of elections? How easy are they to spot, and do you need a tool for that?

    Join this episode of the Election Hacking series to learn more about the emergence of deepfakes and what can be done to mitigate its impact on elections.
    - The current state of deepfakes
    - How deepfakes can be used in misinformation campaigns
    - Use of deepfakes in cyber crime
    - Social media and the spread of fake videos
    - How to spot a deepfake
    - How tech companies are addressing the scourge of deepfakes (Facebook, Twitter, YouTube)
  • 2020 Election – Hacking The Vote Feb 24 2020 5:00 pm UTC 60 mins
    David Morris | Cameron Koffman | Tinatin Japaridze | Lance James
    The inaugural episode of the Election Hacking series will introduce the topic of who, how and why the upcoming 2020 election will be hacked.

    Join this interactive Q&A session to learn more about election hacking, its impact, the various stakeholders, and what if anything, can be done.

    Our unique panel of individuals will bring diverse perspectives to this topic.

    - Cameron Koffman, who, if elected, would be the youngest candidate since Theodore Roosevelt running for the NY State Assembly
    - Tinatin Japaridze, former United Nations correspondent for the Russian and Ukrainian media, with expertise in bi-lateral US-Russian relations on cyber security.
    - Lance James, CEO of Unit 221B and noted cyber security expert who has assisted various law enforcement and government agencies on some of the most highly publicized hacking investigations.

    Moderator: David Morris, Executive Director at Digital Risk Management Institute
  • Social Engineering Threats to Enterprise Security Recorded: Feb 18 2020 58 mins
    Diana Kelley | Tyler Cohen Wood | Stephanie Carruthers | Samantha Davison
    Join us as we review social engineering tactics and attack methods. Learn about the latest trends in social engineering, the risk to your organization's cybersecurity and what steps to take to mitigate it.

    Viewers will learn more about:
    - How social engineers exploit human behavior
    - Most common types of social engineering attacks
    - New in phishing, baiting, tailgating and more
    - Managing access and insider threats

    This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.
  • [PANEL] IoT Security in 2020 Recorded: Feb 12 2020 61 mins
    Peter Wood, Terence Jackson, Brian Russell & Alexandre Blanc
    With the proliferation of the Internet of Things, IoT devices are often added into enterprise environments without due consideration for the security and privacy risks they pose to the business. Oftentimes, IT security teams do not have full visibility into how many IoT devices are connected to the network. This creates security gaps, as IoT devices are notoriously vulnerable to hacks and attacks.

    Join this interactive panel experts to learn about how enterprises can enhance endpoint, and therefore IoT security.

    Attendees will learn more about:
    - IoT and today's enterprise
    - What's on your network? How do you evaluate IoT devices?
    - Why visibility is key
    - Controlling access to your IoT environment
    - Vendor risk and holding vendors accountable for their IoT equipment
    - Areas for automation and where to reduce your IT security team's involvement
    - Patching and upgrading
    - Expert recommendations for enhancing IoT security

    Speakers:
    Peter Wood, Partner, Naturally Cyber LLP (Moderator)
    Terence Jackson, CISO, Thycotic
    Brian Russell, IoT Working Group Co-Chair, Cloud Security Alliance (CSA)
    Alexandre Blanc, Director of Security, Adaware (an Avanquest company)
  • [PANEL] Proactive Security Strategies and Best Practices Recorded: Feb 11 2020 60 mins
    Roselle Safran, Sean Webb, Michelle Drolet & Chris Calvert
    In today’s business landscape it is important to take a proactive approach to security rather than a reactive approach. Join leading security experts as they discuss the safest ways to protect your organisation in 2019 and beyond.

    Join this Q&A panel to learn more about:

    - Key organisational benefits to practising proactive security
    - Technologies powering security
    - Best practices and recommendations for a more secure organization

    Speakers:
    Roselle Safran, President, Rosint Labs (Moderator)
    Sean Webb, Information Security Manager, Patriot One Technologies Inc.
    Michelle Drolet, CEO & Co-Founder, Towerwall
    Michelle McLean, VP Marketing, StackRox
    Chris Calvert, VP of Product Strategy, Respond Software
  • Healthcare Security – It Stinks Recorded: Jan 30 2020 53 mins
    Christos Simotas, Senior Information Security Consultant, I.T. Security Corp
    Healthcare is a goldmine for hackers. Not just any kind of hacker though but for almost all kinds of levels. From the NOOB script kiddes sending out ransom ware emails to the advanced reverse engineer creating push to kill insulin pump and heart defibrillators exploits which can be triggered from half a kilometer away.
    This industry's cyber security cost is expected to rise from 7 billion in 2018 to 27 billion by 2026, yet from 2005 to today over 268 million records have been reported breached in the United States alone. That's 85%.
    Financial gain is the main motivator for hackers because healthcare records are highly valued for their personal, financial, and medical data. This type of information is worth roughly 50 times more than credit card or Social Security data, since it can be used for Medicare fraud – the most profitable type of identity theft.
    We will look at some of the most common attacks the healthcare industry has been exposed to and a live demonstration of exploiting one of the oldest technologies that was implemented 1959 and is still being used today.
    Let’s dive deep into the underground world of healthcare.
  • How Private is My Healthcare Data? Surprise! Recorded: Jan 28 2020 59 mins
    Debra Baker | Ellie Daw | Michelle Finneran Dennedy | Karen Schnell | Anna Kirkland Smith
    Join well-known women in privacy and cybersecurity for an exclusive keynote panel on ransomware and IoT threats to healthcare data, and steps to take in 2020 to better secure it.

    Viewers will also learn about Google’s Project Nightingale, as well as have the opportunity to ask questions during the live webinar.

    Speakers:
    - Debra Baker, CISSP CCSP, Host and Technical Program Manager at RedSeal
    - Ellie Daw, Research Scientist at Crimson Vista, Inc.
    - Michelle Finneran Dennedy, CEO at DrumWave
    - Karen Schnell, Cybersecurity Business Architect and Adjunct Professor in Computer Science
    - Anna Kirkland Smith, Data Scientist, MetLife

    This keynote panel is part of International Data Privacy Day 2020 and will be available Live on January 28th, as well as an on-demand.

    Data Privacy Day is an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust.
  • How To Prevent Bias in Machine Learning Recorded: Jan 23 2020 58 mins
    Diana Kelley, Microsoft I Deveeshree Nayak, University of Washington, Tacoma I Marcae Bryant-Omosor, USAA
    Machine Learning is not immune to bias. In fact, often times it can actually amplify bias.

    As organizations are increasingly turning to ML algorithms to review vast amounts of data, achieve new efficiencies and help make life-changing decisions, ensuring that bias does not creep in ML algorithms is now more important than ever.

    So, how can we protect ML systems from the “garbage in, garbage out” syndrome?

    If undetected or left unchecked, feeding "garbage" biased data to self-learning systems can lead to unintended and potentially dangerous outcomes.

    Join us as we discuss bias in Machine Learning. Learn about the risk of ML bias, how to detect it and how to prevent it.
  • Privacy: Regulatory Pressure is the Consequence of a Broader Problem Recorded: Jan 22 2020 48 mins
    Matthew Karnas, Senior Manager, Cybersecurity at EY
    Many organizations are feeling the pressure to find privacy compliance solutions as an ever-increasing number of regulatory requirements are being introduced locally, nationally, and globally. In their attempts to demonstrate prompt compliance with multiple regulations, organizations could be speeding past their actual privacy problems. To avoid a “tail wagging the dog” situation with a compliance-driven approach, organizations should focus on examining why these privacy regulations are being introduced in the first place In this webinar, we will discuss common privacy problems facing organizations through examples with an emphasis on the privacy needs of customers over compliance checklists.

    In this presentation, you will learn:
    The current state and drivers of organizational privacy programs.
    How to identify areas of focus within privacy programs based on customer needs which drives compliance requirements.
    How to lead discussions with colleagues in support of a customer focused, need-based privacy program at your organization.
  • Why Does It Take So Long to Find a Job? Thoughts for Your 2020 Career Search Recorded: Jan 22 2020 48 mins
    Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com
    A recent CyberSecJobs.Com survey found that 45% of information security professionals did not know how to find a job. And while this is a staggering number, it is more than likely under-representing how proficient most information security professionals feel in the area of career search and professional development. Putting together a strategy on how to find a new opportunity and support your career is not something most are taught and most often it is a struggle to pull together all the key components to create the next step in your career.

    This webinar highlights the challenges that most information security professional face when looking for their next career opportunity, explains why these happen and how to over come them. This session will also highlight the key tools every information security professional should be working on daily to insure that they are not left stranded when needing to find their next opportunity.
  • Balancing Data Privacy & Security in 2020 Recorded: Jan 21 2020 58 mins
    Dr. Christopher Pierson | Shahrokh Shahidzadeh | Michelle Drolet | George Wrenn
    How has the compliance landscape changed in 2020? Is your organization aware of the main differences in data regulations around the world?

    Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.

    Viewers will learn more about:
    - CCPA is now in effect and what this means for you
    - The main differences between GDPR and CCPA
    - Best tools, practices, required policies and cultural game changers for commercial and government environments
    - Other data regulations on the horizon
    - Recommendations for 2020

    Speakers:
    - Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
    - Shahrokh Shahidzadeh, CEO, Acceptto
    - Michelle Drolet, CEO, Towerwall
    - George Wrenn, CEO & Founder, CyberSaint Security

    This Q&A panel is part of Privacy Month.
  • Intrusion Analysis Foundation for SoC Analysts Recorded: Jan 14 2020 64 mins
    Kevin Cardwell
    The first step in developing an effective incident response capability is learning the methods of attack that can be used to compromise systems and networks. In this webinar you will learn the fundamentals of incidents, and how information can be extracted to determine the extent of the attack. The webinar will show the latest types of attacks, and what to look for when these types of attacks are carried out against the enterprise.

    Within the webinar, you will learn the characteristics of a number of attacks, and a process to evaluate these attacks for the possibility of an intrusion. The section on intrusion analysis will show the data that can be scavenged after a variety of different types of attacks. These attacks can be from the most basic type all the way through advanced emerging threat attacks. The systematic process you will not only learn, but also see demonstrated will allow you to analyze virtually all types of intrusions.
  • Privacy: Regulatory Pressure is the Consequence of a Broader Problem Recorded: Dec 2 2019 49 mins
    Matthew Karnas
    Many organizations are feeling the pressure to find privacy compliance solutions as an ever-increasing number of regulatory requirements are being introduced locally, nationally, and globally. In their attempts to demonstrate prompt compliance with multiple regulations, organizations could be speeding past their actual privacy problems. To avoid a “tail wagging the dog” situation with a compliance-driven approach, organizations should focus on examining why these privacy regulations are being introduced in the first place In this webinar, we will discuss common privacy problems facing organizations through examples with an emphasis on the privacy needs of customers over compliance checklists.

    In this presentation, you will learn:
    The current state and drivers of organizational privacy programs.
    How to identify areas of focus within privacy programs based on customer needs which drives compliance requirements.
    How to lead discussions with colleagues in support of a customer focused, need-based privacy program at your organization.
  • How to Prevent 81% of Phishing Attacks from Sailing into Your Inbox with DMARC Recorded: Nov 7 2019 59 mins
    Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist
    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.


    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.


    What you’ll learn:

    How to enable DMARC, SPF, and DKIM

    Common configuration mistakes

    How to best configure DMARC and other defenses to fight phishing

    Techniques to empower your users to identify and avoid phishing attempts that make it through your surface-level defense
  • When Machines Fight Machines: Cyberbattles and the New Frontier of AI Recorded: Oct 16 2019 50 mins
    Marcus Fowler, Director of Strategic Threat at Darktrace
    AI is sometimes spoken about like something that will, in the future, secure networks. However, AI cyber security is already deployed by numerous companies to detect and autonomously respond to increasingly advanced, fast-moving, and stealthy threats. At the same time, attackers are developing malicious AI, which will be almost impossible to detect. Companies that fail to deploy AI today may find themselves unable to detect the threats of tomorrow. In this session, learn about how the use of unsupervised machine learning allows companies to benefit from cyber AI within weeks, why building trust with security teams is so essential, and use cases of cyber AI beyond threat detection and response.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: GDPR Panel: What May 2018 Means to Your Business
  • Live at: Nov 10 2016 2:00 pm
  • Presented by: Peter Wood, First Base Technologies; Florian Malecki, Dell; Jonathan Armstrong, Cordery & Kristian Norsgaard Rieper-Holm
  • From:
Your email has been sent.
or close