Web 2.0 and Beyond - Technology challenges, risks and rewards
A webinar to answer these questions: Where is your security perimeter when many endpoints are mobile handheld devices? How do you enable good governance whilst taking advantage of the cloud? What are the legal, confidentiality and availability issues in the cloud and in Web 2.0? What happens when your interaction with customers is immediate and intimate through Web 2.0?
RecordedDec 15 201061 mins
Your place is confirmed, we'll send you email reminders
Peter Wood, First Base Technologies; Florian Malecki, Dell; Jonathan Armstrong, Cordery & Kristian Norsgaard Rieper-Holm
A global survey on the European Union’s new General Data Protection Regulation (GDPR) commissioned by SonicWALL in September 2016, reveals that surveyed organizations ‒ both SMBs and large enterprises ‒ lack general awareness of the requirements of the new regulation, how to prepare for it, and the final impact of non-compliance on data security and business outcomes.
Don’t wait until it is too late: join Kristian Norsgaard Rieper-Holm from Globalsequr, Florian Malecki from SonicWALL, Jonathan Armstrong from Cordery and moderated by First Base Technologies’ Peter Wood as they shed some light on the ins and outs of the new GDPR requirements and how to increase your overall data security posture to minimise the cyber risks and potential financial fines.
The results of all the network penetration tests conducted by the First Base team over the past year have been analysed by Peter Wood. The annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business. Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
Ransomware is dominating the headlines, and with good reason - it is one of the biggest threats to business in 2016. It has evolved into a self-replicating and network-aware criminal attack that can destroy smaller organisations and cause havoc in businesses of all sizes. Learn how ransomware is developing, the attack vectors and what you can do to minimise your exposure.
What will be the impact on cybersecurity in the UK when Brexit becomes a reality? Cyber security professionals and UK government have voiced their opinions and Peter Wood has distilled the key arguments into this independent analysis.
Don Smith, SecureWorks, Ian Glover, CREST & Peter Wood, First Base Technologies
The rise in targeted threats means that security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.
In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?
•The challenges faced by organisations from the rise in targeted threats
•Limitations of security processes in protecting from targeted threats
•How to gain early visibility into the threats targeting your particular organisation
Don Smith leads the CTU™ Cyber Intelligence Cell: a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients. Don also leads the CTU research team in EMEA.
Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA and building important relationships for SecureWorks in the region. His enthusiasm and threat expertise means that he regularly represents SecureWorks at industry events in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise, where he took a lead role in successfully integrating 14 acquisitions. He is a recognized subject-matter expert many areas of cybersecurity and advises SecureWorks and SecureWorks’ clients globally.
Peter Wood, CEO & Founder, First Base Technologies & Josh Downs, Community Manager, BrightTALK
- Infosecurity Europe 2016 -
BrightTALK legend Peter Wood swung by the temporary studio to answer key questions on the information security landscape.
Peter answered questions on topics such as the developments in the IoT and how network security will adapt to prevent vulnerabilities; risk management and the value of running a solid risk analysis focused on the threat actors; cyber security in the critical and national infrastructure space and the elements that he's optimistic about regarding the human factor.
Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
Threat intelligence is a thorny subject. Vendors will tell you that it’s key to your defensive strategy, but is it a worthwhile investment and does it really help you protect your business?
Understanding the threat actors who may be targeting you is definitely useful, as is identifying your critical information and your specific vulnerabilities. Would a threat intelligence feed really help you react and respond, or are you better investing your budget in staff education and technology?
Peter Wood will discuss the pros and cons of ‘cyber clairvoyance’.
A traditional penetration test is a snapshot of vulnerabilities for an environment that is in constant flux. The snapshot may also be an incomplete picture, addressing only a portion of a more complex system. To give a view of real business risk, can we link the vulnerabilities to real-world threats and, more importantly, vice versa? Wouldn’t it be better to start with the threats and work forward down the kill chain to the target? How feasible is it to take up-to-date threat intelligence and use that to scope our penetration tests? Peter Wood will try to answer these questions and provide a strategy better suited to today’s attacks.
We seem to be struggling to get to grips with risk-based security, especially where it concerns defensive strategy. Few if any organisations have sufficient budget to protect and test every part of the business, so how do we choose where to put our effort and money? The skills, knowledge and techniques needed to defend against an agile and devious attacker are available but infrequently deployed properly. In this webinar, Peter Wood will describe some case studies where risk-based security has made a real difference to organisations’ defences and response to cyber-attack.
Peter Wood has analysed the results of all the network penetration tests conducted by the First Base team over the past year. This annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business.
Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
Malicious attacks and accidental breaches by insiders present a real threat to organisations of all types. Insiders are uniquely positioned with legitimate access to data, networks and premises, allowing them to effectively bypass firewalls and intrusion detection systems. Pete and his team have conducted hundreds of simulated insider attacks and have found common themes emerge, regardless of business sector or size of business. In this presentation, discover the critical weaknesses that insiders exploit and the key, practical steps to defending against the insider threat.
Peter Wood (moderator); Prof. John Walker, James Brown (Alert Logic), Bernd Jaeger (Cloud Security Alliance)
Join this exciting panel session with some of the industry's leading thought leaders including:
Peter Wood, CEO, First Base Technologies
Prof. John Walker, Researcher, Feature Writer for SC Magazine UK & International Speaker
James Brown, Director of Cloud Computing and Solution Architecture at Alert Logic
Bernd Jaeger, Co-Chair to the Telecom Working Group at the Cloud Security Alliance
The panelists will discuss topics ranging from predictive security, real-time threat intelligence, combining structured and unstructured data sources and more.
Risk-based security is a popular concept, but what about applying it to penetration testing, reporting and remediation? Pete Wood and his team have been working on this concept. Blending threat and risk analysis with traditional penetration testing to produce techniques, results and guidance tailored to an individual organisation’s risk profile and attack surface. Learn more with case studies and real-world results.
Peter is a world-renowned security evangelist, speaking at conferences and seminars on ethical hacking and social engineering. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics.
Ethical hackers from First Base Technologies conduct red team tests to help organisations understand where they are vulnerable to advanced attacks. This presentation describes each step of a real-world exercise: planning and recon, spear phishing, telephone social engineering, building access, network exploitation and data exfiltration. As the story develops, you will discover how an attacker thinks, why they choose a particular strategy and what you can do to minimise your organisation’s vulnerability to advanced threats.
Peter Wood and his team analysed the results from a series of network penetration tests over the past two years, in a variety of sectors including banking, insurance and retail. They identified the most common vulnerabilities, how they can be exploited and the consequences for each business. This presentation demonstrates in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
We spend millions every year on security products, but still we get hacked, have our critical intellectual property stolen, and suffer public embarrassment and loss of revenue. Pete will demonstrate how some fundamental issues continue to leave organisations vulnerable, using real case studies to illustrate the information security risks to your business. Using the same models that criminals use, he will illustrate how to minimise your vulnerabilities using pragmatic, people-focused solutions