Hi [[ session.user.profile.firstName ]]

Web 2.0 and Beyond - Technology challenges, risks and rewards

A webinar to answer these questions: Where is your security perimeter when many endpoints are mobile handheld devices? How do you enable good governance whilst taking advantage of the cloud? What are the legal, confidentiality and availability issues in the cloud and in Web 2.0? What happens when your interaction with customers is immediate and intimate through Web 2.0?
Recorded Dec 15 2010 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Wood
Presentation preview: Web 2.0 and Beyond - Technology challenges, risks and rewards

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Smarter Cyber Defence through TARA and red-teaming Jan 16 2018 11:00 am UTC 45 mins
    Peter Wood
    Advanced Cyber Security: Data-driven Defense Summit: SMARTER SECURITY STRATEGY
  • The 2018 Threatscape: Cyber clairvoyance and divination Recorded: Nov 14 2017 47 mins
    Peter Wood, CEO, First Base Technologies
    What have we learned from 2017's biggest breaches and how will we deal with 2018's emerging threats? Attempting to look both backward and forward over the cyber landscape, Peter Wood will review lessons learned and apply them to the evolving threatscape.
  • The Future of Cloud Security: Next Generation Threat-based Testing Recorded: Oct 24 2017 48 mins
    Peter Wood
    If your processing and data is in the cloud, how can you deliver assurance, compliance and governance? How do you find the flaws and soft spots that criminals will exploit? From browser to database, through human factors and end points, this presentation will take a threat-based approach to securing the cloud.
  • Petrified by the Petya Ransomware? Live Q&A session with Pete Wood Recorded: Jul 5 2017 46 mins
    Pete Wood, CEO, First Base Technologies LLP
    - Interactive audience Q&A -

    Fresh of the heels of WannaCry this week has seen the Petya / notPetya / Goldeneye attacks strike many global organisations in a wave of devastating ransomware attacks.

    Questions need to be raised though:

    - Where did Petya originate and who was responsible?

    - What halted the spread?

    - Why was it such an effective and newsworthy cyber attack?

    - Should you be worried about something similar happening to your business?

    - What you do to be better prepared to defend against similar ransomware striking again?

    Tune in live to this interactive ask the expert webinar with First Base Technologies CEO Pete Wood as he takes your questions on the attacks and suggests ways that you can defend yourself from similar variations in the future.

    Tune in and ask away, we'd love to hear your questions!
  • Securing the Internet of Everything: The war of the coffee machines Recorded: Jun 20 2017 47 mins
    Peter Wood
    The Internet of Everything affects everyone from multi-nationals to private citizens. The universal adoption of machine to machine communications in every aspect of our lives offers criminals a hugely expanded attack surface. How do we defend ourselves without undermining the benefits of the IoE?
  • Securing FinTech: Threat-based testing along the kill chain Recorded: May 16 2017 46 mins
    Peter Wood
    Threat-based testing, accurately simulating criminal attacks, is a critical approach in securing FinTech. Attackers constantly evolve their attack methods and strategies in response to changing technologies, making it essential that security tests match the threat landscape.
  • Hackers, Threats & Cyber Defence: Reporting from the front line Recorded: Mar 14 2017 48 mins
    Peter Wood
    Peter's presentation uses the latest research combined with experience from real-world client engagements to highlight current cyber threats. He describes how a threat-led approach works and how to change your defence and response posture to minimise your attack surface.
  • Cybersecurity Strategy: Success Cases and Avoidable Mistakes Recorded: Feb 21 2017 48 mins
    Peter Wood, CEO, First Base Technologies LLP
    Our cybersecurity consultancy practice works with multinational businesses through to medium-sized UK organisations. We see cybersecurity strategies that are impressive, comprehensive, misguided and non-existent. This webinar will distil some of the most creative and successful approaches, as well highlighting the mistakes to avoid. Our analysis is based on cyber readiness, cyber risks stress testing, cyber hygiene assessments and security gap analysis. Threat and risk assessments and red team exercises also provide an insight into the effectiveness of cybersecurity strategies.
  • GDPR Panel: What May 2018 Means to Your Business Recorded: Nov 10 2016 60 mins
    Peter Wood, First Base Technologies; Florian Malecki, Dell; Jonathan Armstrong, Cordery & Kristian Norsgaard Rieper-Holm
    A global survey on the European Union’s new General Data Protection Regulation (GDPR) commissioned by SonicWALL in September 2016, reveals that surveyed organizations ‒ both SMBs and large enterprises ‒ lack general awareness of the requirements of the new regulation, how to prepare for it, and the final impact of non-compliance on data security and business outcomes.

    Don’t wait until it is too late: join Kristian Norsgaard Rieper-Holm from Globalsequr, Florian Malecki from SonicWALL, Jonathan Armstrong from Cordery and moderated by First Base Technologies’ Peter Wood as they shed some light on the ins and outs of the new GDPR requirements and how to increase your overall data security posture to minimise the cyber risks and potential financial fines.
  • Network security, seriously? 2016 Network Penetration Tests Recorded: Sep 7 2016 46 mins
    Peter Wood
    The results of all the network penetration tests conducted by the First Base team over the past year have been analysed by Peter Wood. The annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business. Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • Ransomware: All your files now belong to us Recorded: Jul 12 2016 49 mins
    Peter Wood
    Ransomware is dominating the headlines, and with good reason - it is one of the biggest threats to business in 2016. It has evolved into a self-replicating and network-aware criminal attack that can destroy smaller organisations and cause havoc in businesses of all sizes. Learn how ransomware is developing, the attack vectors and what you can do to minimise your exposure.
  • The Cyber Security Impact of the UK Leaving the EU Recorded: Jun 22 2016 301 mins
    Peter Wood
    What will be the impact on cybersecurity in the UK when Brexit becomes a reality? Cyber security professionals and UK government have voiced their opinions and Peter Wood has distilled the key arguments into this independent analysis.
  • You’re The One That They Want: Targeted Threats and You Recorded: Jun 15 2016 46 mins
    Don Smith, SecureWorks, Ian Glover, CREST & Peter Wood, First Base Technologies
    The rise in targeted threats means that security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.

    In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?

    Key themes:

    •The challenges faced by organisations from the rise in targeted threats
    •Limitations of security processes in protecting from targeted threats
    •How to gain early visibility into the threats targeting your particular organisation

    Don Smith leads the CTU™ Cyber Intelligence Cell: a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients. Don also leads the CTU research team in EMEA.

    Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA and building important relationships for SecureWorks in the region. His enthusiasm and threat expertise means that he regularly represents SecureWorks at industry events in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise, where he took a lead role in successfully integrating 14 acquisitions. He is a recognized subject-matter expert many areas of cybersecurity and advises SecureWorks and SecureWorks’ clients globally.
  • Infosecurity 2016: The Risk of the Human Factor when Protecting a Business Recorded: Jun 15 2016 6 mins
    Peter Wood, CEO & Founder, First Base Technologies & Josh Downs, Community Manager, BrightTALK
    - Infosecurity Europe 2016 -

    BrightTALK legend Peter Wood swung by the temporary studio to answer key questions on the information security landscape.

    Peter answered questions on topics such as the developments in the IoT and how network security will adapt to prevent vulnerabilities; risk management and the value of running a solid risk analysis focused on the threat actors; cyber security in the critical and national infrastructure space and the elements that he's optimistic about regarding the human factor.
  • Social Engineering: Is that a Pwn Plug in Your Pocket? Recorded: May 24 2016 44 mins
    Peter Wood
    Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
  • Top 5: Vulnerabilities Below Your Radar Recorded: Feb 10 2016 8 mins
    Peter Wood, CEO, First Base Technologies LLP
    Peter Wood, CEO of First Base Technologies, breaks down his Top 5 vulnerabilities that are flying below your radar.
  • Information Security: The Next Generation - Intelligence or guesswork? Recorded: Jan 19 2016 46 mins
    Peter Wood, CEO, First Base Technologies LLP
    Threat intelligence is a thorny subject. Vendors will tell you that it’s key to your defensive strategy, but is it a worthwhile investment and does it really help you protect your business?

    Understanding the threat actors who may be targeting you is definitely useful, as is identifying your critical information and your specific vulnerabilities. Would a threat intelligence feed really help you react and respond, or are you better investing your budget in staff education and technology?

    Peter Wood will discuss the pros and cons of ‘cyber clairvoyance’.
  • Penetration Testing – Keeping It Real Recorded: Dec 1 2015 47 mins
    Peter Wood, CEO, First Base Technologies LLP
    A traditional penetration test is a snapshot of vulnerabilities for an environment that is in constant flux. The snapshot may also be an incomplete picture, addressing only a portion of a more complex system. To give a view of real business risk, can we link the vulnerabilities to real-world threats and, more importantly, vice versa? Wouldn’t it be better to start with the threats and work forward down the kill chain to the target? How feasible is it to take up-to-date threat intelligence and use that to scope our penetration tests? Peter Wood will try to answer these questions and provide a strategy better suited to today’s attacks.
  • Risk-Based Security - Where Next? Recorded: Nov 4 2015 45 mins
    Peter Wood, CEO, First Base Technologies LLP
    We seem to be struggling to get to grips with risk-based security, especially where it concerns defensive strategy. Few if any organisations have sufficient budget to protect and test every part of the business, so how do we choose where to put our effort and money? The skills, knowledge and techniques needed to defend against an agile and devious attacker are available but infrequently deployed properly. In this webinar, Peter Wood will describe some case studies where risk-based security has made a real difference to organisations’ defences and response to cyber-attack.
  • Network Security - Real and Present Dangers Recorded: Sep 15 2015 45 mins
    Peter Wood, CEO, First Base Technologies LLP
    Peter Wood has analysed the results of all the network penetration tests conducted by the First Base team over the past year. This annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business.

    Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
Webcasts from the leading cyber security firm
Ethical hacking case studies and real-world cyber security issues

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Web 2.0 and Beyond - Technology challenges, risks and rewards
  • Live at: Dec 15 2010 3:00 pm
  • Presented by: Peter Wood
  • From:
Your email has been sent.
or close