Hi [[ session.user.profile.firstName ]]

Web 2.0 and Beyond - Technology challenges, risks and rewards

A webinar to answer these questions: Where is your security perimeter when many endpoints are mobile handheld devices? How do you enable good governance whilst taking advantage of the cloud? What are the legal, confidentiality and availability issues in the cloud and in Web 2.0? What happens when your interaction with customers is immediate and intimate through Web 2.0?
Recorded Dec 15 2010 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Peter Wood
Presentation preview: Web 2.0 and Beyond - Technology challenges, risks and rewards

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The 2018 Threatscape: Cyber clairvoyance and divination Nov 14 2017 11:00 am UTC 45 mins
    Peter Wood
    What have we learned from 2017's biggest breaches and how will we deal with 2018's emerging threats? Attempting to look both backward and forward over the cyber landscape, Peter Wood will review lessons learned and apply them to the evolving threatscape.
  • The Future of Cloud Security: Next Generation Threat-based Testing Oct 10 2017 10:00 am UTC 45 mins
    Peter Wood
    If your processing and data is in the cloud, how can you deliver assurance, compliance and governance? How do you find the flaws and soft spots that criminals will exploit? From browser to database, through human factors and end points, this presentation will take a threat-based approach to securing the cloud.
  • Securing the Internet of Everything: The war of the coffee machines Jun 20 2017 10:00 am UTC 45 mins
    Peter Wood
    The Internet of Everything affects everyone from multi-nationals to private citizens. The universal adoption of machine to machine communications in every aspect of our lives offers criminals a hugely expanded attack surface. How do we defend ourselves without undermining the benefits of the IoE?
  • Securing FinTech: Threat-based testing along the kill chain May 16 2017 10:00 am UTC 45 mins
    Peter Wood
    Threat-based testing, accurately simulating criminal attacks, is a critical approach in securing FinTech. Attackers constantly evolve their attack methods and strategies in response to changing technologies, making it essential that security tests match the threat landscape.
  • Hackers, Threats & Cyber Defence: Reporting from the front line Mar 14 2017 11:00 am UTC 45 mins
    Peter Wood
    Cyber attack trend reporting from the front line of cyber security
  • Cybersecurity Strategy: Success Cases and Avoidable Mistakes Recorded: Feb 21 2017 48 mins
    Peter Wood, CEO, First Base Technologies LLP
    Our cybersecurity consultancy practice works with multinational businesses through to medium-sized UK organisations. We see cybersecurity strategies that are impressive, comprehensive, misguided and non-existent. This webinar will distil some of the most creative and successful approaches, as well highlighting the mistakes to avoid. Our analysis is based on cyber readiness, cyber risks stress testing, cyber hygiene assessments and security gap analysis. Threat and risk assessments and red team exercises also provide an insight into the effectiveness of cybersecurity strategies.
  • GDPR Panel: What May 2018 Means to Your Business Recorded: Nov 10 2016 60 mins
    Peter Wood, First Base Technologies; Florian Malecki, Dell; Jonathan Armstrong, Cordery & Kristian Norsgaard Rieper-Holm
    A global survey on the European Union’s new General Data Protection Regulation (GDPR) commissioned by SonicWALL in September 2016, reveals that surveyed organizations ‒ both SMBs and large enterprises ‒ lack general awareness of the requirements of the new regulation, how to prepare for it, and the final impact of non-compliance on data security and business outcomes.

    Don’t wait until it is too late: join Kristian Norsgaard Rieper-Holm from Globalsequr, Florian Malecki from SonicWALL, Jonathan Armstrong from Cordery and moderated by First Base Technologies’ Peter Wood as they shed some light on the ins and outs of the new GDPR requirements and how to increase your overall data security posture to minimise the cyber risks and potential financial fines.
  • Network security, seriously? 2016 Network Penetration Tests Recorded: Sep 7 2016 46 mins
    Peter Wood
    The results of all the network penetration tests conducted by the First Base team over the past year have been analysed by Peter Wood. The annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business. Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • Ransomware: All your files now belong to us Recorded: Jul 12 2016 49 mins
    Peter Wood
    Ransomware is dominating the headlines, and with good reason - it is one of the biggest threats to business in 2016. It has evolved into a self-replicating and network-aware criminal attack that can destroy smaller organisations and cause havoc in businesses of all sizes. Learn how ransomware is developing, the attack vectors and what you can do to minimise your exposure.
  • The Cyber Security Impact of the UK Leaving the EU Recorded: Jun 22 2016 301 mins
    Peter Wood
    What will be the impact on cybersecurity in the UK when Brexit becomes a reality? Cyber security professionals and UK government have voiced their opinions and Peter Wood has distilled the key arguments into this independent analysis.
  • You’re The One That They Want: Targeted Threats and You Recorded: Jun 15 2016 46 mins
    Don Smith, SecureWorks, Ian Glover, CREST & Peter Wood, First Base Technologies
    The rise in targeted threats means that security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.

    In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?

    Key themes:

    •The challenges faced by organisations from the rise in targeted threats
    •Limitations of security processes in protecting from targeted threats
    •How to gain early visibility into the threats targeting your particular organisation

    Don Smith leads the CTU™ Cyber Intelligence Cell: a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients. Don also leads the CTU research team in EMEA.

    Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA and building important relationships for SecureWorks in the region. His enthusiasm and threat expertise means that he regularly represents SecureWorks at industry events in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise, where he took a lead role in successfully integrating 14 acquisitions. He is a recognized subject-matter expert many areas of cybersecurity and advises SecureWorks and SecureWorks’ clients globally.
  • Infosecurity 2016: The Risk of the Human Factor when Protecting a Business Recorded: Jun 15 2016 6 mins
    Peter Wood, CEO & Founder, First Base Technologies & Josh Downs, Community Manager, BrightTALK
    - Infosecurity Europe 2016 -

    BrightTALK legend Peter Wood swung by the temporary studio to answer key questions on the information security landscape.

    Peter answered questions on topics such as the developments in the IoT and how network security will adapt to prevent vulnerabilities; risk management and the value of running a solid risk analysis focused on the threat actors; cyber security in the critical and national infrastructure space and the elements that he's optimistic about regarding the human factor.
  • Social Engineering: Is that a Pwn Plug in Your Pocket? Recorded: May 24 2016 44 mins
    Peter Wood
    Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
  • Top 5: Vulnerabilities Below Your Radar Recorded: Feb 10 2016 8 mins
    Peter Wood, CEO, First Base Technologies LLP
    Peter Wood, CEO of First Base Technologies, breaks down his Top 5 vulnerabilities that are flying below your radar.
  • Information Security: The Next Generation - Intelligence or guesswork? Recorded: Jan 19 2016 46 mins
    Peter Wood, CEO, First Base Technologies LLP
    Threat intelligence is a thorny subject. Vendors will tell you that it’s key to your defensive strategy, but is it a worthwhile investment and does it really help you protect your business?

    Understanding the threat actors who may be targeting you is definitely useful, as is identifying your critical information and your specific vulnerabilities. Would a threat intelligence feed really help you react and respond, or are you better investing your budget in staff education and technology?

    Peter Wood will discuss the pros and cons of ‘cyber clairvoyance’.
  • Penetration Testing – Keeping It Real Recorded: Dec 1 2015 47 mins
    Peter Wood, CEO, First Base Technologies LLP
    A traditional penetration test is a snapshot of vulnerabilities for an environment that is in constant flux. The snapshot may also be an incomplete picture, addressing only a portion of a more complex system. To give a view of real business risk, can we link the vulnerabilities to real-world threats and, more importantly, vice versa? Wouldn’t it be better to start with the threats and work forward down the kill chain to the target? How feasible is it to take up-to-date threat intelligence and use that to scope our penetration tests? Peter Wood will try to answer these questions and provide a strategy better suited to today’s attacks.
  • Risk-Based Security - Where Next? Recorded: Nov 4 2015 45 mins
    Peter Wood, CEO, First Base Technologies LLP
    We seem to be struggling to get to grips with risk-based security, especially where it concerns defensive strategy. Few if any organisations have sufficient budget to protect and test every part of the business, so how do we choose where to put our effort and money? The skills, knowledge and techniques needed to defend against an agile and devious attacker are available but infrequently deployed properly. In this webinar, Peter Wood will describe some case studies where risk-based security has made a real difference to organisations’ defences and response to cyber-attack.
  • Network Security - Real and Present Dangers Recorded: Sep 15 2015 45 mins
    Peter Wood, CEO, First Base Technologies LLP
    Peter Wood has analysed the results of all the network penetration tests conducted by the First Base team over the past year. This annual review covers clients in a variety of sectors including banking, insurance and retail. This presentation identifies the most common vulnerabilities, how they can be exploited and the consequences for each business.

    Learn in detail how criminals can take advantage of these weaknesses and how you can secure your networks using straightforward techniques.
  • Insider Threats – Real Problems and Real Solutions Recorded: Jul 8 2015 46 mins
    Peter Wood, CEO, First Base Technologies
    Malicious attacks and accidental breaches by insiders present a real threat to organisations of all types. Insiders are uniquely positioned with legitimate access to data, networks and premises, allowing them to effectively bypass firewalls and intrusion detection systems. Pete and his team have conducted hundreds of simulated insider attacks and have found common themes emerge, regardless of business sector or size of business. In this presentation, discover the critical weaknesses that insiders exploit and the key, practical steps to defending against the insider threat.
  • Infosecurity Europe 2015: Peter Wood, ISACA Recorded: Jun 12 2015 3 mins
    Peter Wood, Member of the ISACA London security Advisory Group & Joshua Downs, Senior Community Manager, BrightTALK
    Infosecurity Europe 2015: Peter Wood, ISACA
Webcasts from the leading cyber security firm
Ethical hacking case studies and real-world cyber security issues

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Web 2.0 and Beyond - Technology challenges, risks and rewards
  • Live at: Dec 15 2010 3:00 pm
  • Presented by: Peter Wood
  • From:
Your email has been sent.
or close