The Future of Cybersecurity

Ted Schlein, Partner, KPCB
Ted Schlein, partner at Kleiner Perkins Caufield & Byers covers the top security threats, when it's right for a security company to begin thinking about working with government and shifting the cyber security paradigm.
Aug 2 2012
3 mins
The Future of Cybersecurity
More from this community:

IT Security

  • Live and recorded (5260)
  • Upcoming (144)
  • Date
  • Rating
  • Views
  • Join Tom Kellerman, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who need to develop and implement a comprehensive cyber security strategy. Tom will highlight critical information including 2015 cyber threat trends and how risk management strategies have changed.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
    • And more...
  • A new category of threat is emerging – a threat designed to evade traditional signature-based technologies such as Anti-Virus and Intrusion Detection. Attempting to meet the challenge is a new class of technology, “Advanced Malware Protection” or “AMP,” which is an industry term for technology designed to continuously monitor for, offload and detonate files in a sandbox - safely away from the main environment - to observe and detect malicious objects.

    If a security device produces an alert in the forest, who’s there to hear it?

    The challenge is these next generation advanced malware detection solutions produce so much detail about the suspicious activity that most organizations do not have the resources to thoroughly investigate/analyze. The best technology means nothing if you don’t have the right expertise to react to the alert, quickly decipher complex reports, investigate the threat, and determine the right response. And meanwhile, the threat actors aren’t standing still – they’re developing measures to circumvent controls in some traditional sandbox environments.

    You will learn:
    1.How the threat is evolving and how actors are employing evasive practices to overcome traditional and even some more sophisticated security defenses
    2.Why next generation sandboxing and full-system emulation are the keys to combatting evasive malware threats
    3.The expertise needed to accurately identify and diagnose the threat once the alert is received
    4.How to ensure your organization has the ability to respond effectively to the incident and close all the backdoors a threat actor may have opened
  • 2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they?

    Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now.

    Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn
    · Possible gaps left by the compliance-first approach to security
    · How to limit vulnerabilities across traditional, virtual and cloud infrastructures
    · Five best practices to avoid a major security breach in 2015
  • The bring-your-own-device (BYOD) movement has been a huge boon for businesses that put a premium on productivity. File sync and share solutions have emerged to help employees work from anywhere, at any time, on any device. In this BrightTALK exclusive, eFolder explores the top seven features that business should consider when adopting a file sync and share solution. Learn what is required for a file sync and share solution to improve collaboration, maximize productivity, and ensure security.
  • Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • The Internet of Things (the new buzzword for the tech industry) is increasing the connectedness of people and things on a scale that was once beyond imagination. Connected devices outnumber the world's population by 1.5 to 1.It is expected to eventually touch some 200 billion cars, appliances, machinery and devices globally, handling things like remote operation, monitoring and interaction among Internet-connected products.

    In combination with the fact that there are almost as many cell-phone subscriptions (6.8 billion) as there are people on this earth (seven billion), we have all the ingredients for a Perfect Cyber Storm.

    Join me for an informal discussion of the challenges for our profession, and some possible solutions.
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

    Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

    In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

    Join us for a dynamic discussion with subject matter experts where you will learn:

    •What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
    •Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
    •How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
  • Channel
  • Channel profile
  • SINET IT Security Entrepreneurs' Forum 2013 Recorded: Apr 23 2013 3 mins
    This year marked the Seventh Annual SINET IT Security Entrepreneurs' Forum (ITSEF) at Stanford University. The Forum's theme, Inspire - Innovate - Engage, resonated strongly throughout the day in a collegial setting that fostered robust, high level and energetic dialogue. View highlights from industry thought leaders on this year's forum and the value of SINET.
  • Security and Privacy in Big Tech Trends Recorded: Apr 23 2013 44 mins
    Mobile, Social, Cloud and Big Data are creating tectonic shifts within industry and government markets that are changing the way we interact with technology. But is the very technology that is empowering also imperiling us? When you think about all the data being generated by the sharing of personal information through the use of social networking and cloud services, as well as the user tracking features on mobile devices, there are tremendous opportunities for organizations to tailor their offerings for customer profiling. What potential abuses of this data do we see today? If you look to the future, what emerging technology trends will magnify the existing risks to individuals’ privacy? This panel will discuss the security and privacy concern by-products that come hand-in-hand with this technology revolution.
  • Cybersecurity M&A and IPO’S: Trends and Lessons Recorded: Apr 23 2013 28 mins
    The pending Presidential Executive Order relative to Cybersecurity legislation, disruptive technologies, record cash, aggressive new buyers, and attractive valuations are stimulating entrepreneurs in this domain to consider selling their companies in 2013. Many entrepreneurs are taking advantage of this moment--but are you ready? What are the trends and lessons one needs to know? Should you contemplate an IPO or conduct an auction? What actions should be considered when selling to a strategic buyer versus a private equity firm? What is the process to achieve an optimal outcome? Hear from Chad Sweet, Co-Founder and CEO of The Chertoff Group, as he leads a panel of both advisors and entrepreneurs who have successfully navigated the sale process and can share with you their secrets to success.
  • “How Successful Security Companies Entered the Federal Market to Design the Righ Recorded: Apr 23 2013 46 mins
    Terremark and ArcSight had two of the largest acquisitions of recent times:

    Terremark went public in March 2007 and was acquired by Verizon for $1.4 Billion in early 2011.

    ArcSight went public in February 2008 and was acquired by HP for $1.5 Billion in September 2010.

    Join this Fireside chat where these very successful CEOs will discuss and share how they entered the Federal Government market, the lessons learned, understand how to overcome barriers to entry, how to create the appropriate eco-system to successfully deploy solutions, how to best qualify opportunities and how to deal with the Federal Government procurement and acquisition processes. At the end, how they use these experiences to achieve success on the global market.
  • Panel: Securing Smart Devices in the Age of Modern Mobility Recorded: Feb 13 2013 59 mins
    It took an acronym, BYOD, to focus the market’s attention on the impact mobile had on security and productivity as employees at every level began to Bring Their Own Device to the workplace. Now, both industry and government network security professionals face an onslaught of mobile devices permeating the enterprise and creating havoc.

    This panel will discuss the ramifications of this trend and explore the role of technology and policy to contain the threats to security posed by mobility.

    Panel:

    Robert Rodriguez, Chairman and Managing Principal, Security Innovation Network (moderator);
    James Beeson, Chief Information Security Officer, GE Capital Americas;
    Jason Hoffman, Head of Group Security, Chief Information Security Officer, Autonomy;
    Leslie K. Lambert, VP and Chief Information Security Officer, Juniper Networks;
    Mike Siegal, VP of Products, Services and Operations, Mocana
  • SINET 2012 Recorded: Nov 15 2012 3 mins
    Highlights from the SINET Showcase 2012.
  • SINET 16: Seculert Recorded: Nov 15 2012 3 mins
    SINET Innovator: Seculert
  • SINET 16: ReversingLabs Recorded: Nov 15 2012 3 mins
    SINET Innovator: ReversingLabs
  • SINET 16: CipherPoint Recorded: Nov 14 2012 3 mins
    SINET Innovator: CipherPoint
  • SINET 16: WatchDox Recorded: Nov 8 2012 4 mins
    SINET Innovator: WatchDox
  • SINET 16: AirPatrol Recorded: Nov 8 2012 3 mins
    SINET Innovator: AirPatrol
  • SINET 16: Solera Networks Recorded: Nov 8 2012 3 mins
    SINET Innovator: Solera Networks
  • SINET 16: Kinamik Data Integrity Recorded: Nov 8 2012 3 mins
    SINET Innovator: Kinamik Data Integrity
  • SINET 16: Fixmo Recorded: Nov 8 2012 4 mins
    SINET Innovator: Fixmo
  • SINET 16: Oculis Labs Recorded: Nov 8 2012 4 mins
    SINET Innovator: Oculis Labs
  • SINET 16: Damballa Recorded: Nov 8 2012 3 mins
    SINET Innovator: Damballa
  • SINET 16: Allgress Recorded: Nov 8 2012 4 mins
    SINET Innovator: Allgress
  • Cybersecurity Challenges Recorded: Aug 2 2012 5 mins
    Join:

    Bob Bragdon, Publisher, CSO Magazine;
    Joe Gottlieb, President and CEO, Sensage;
    Matt Greorgy, CEO, Endgame Systems;
    Douglas Maughan, Division Director, Cyber Security Division, Department of Homeland Security
    Ted Schlein, Managing Partner, KPCB;
    Nicko van Someren, CTO, Good Technology
    Sergio Thompson-Flores, CEO, Modulo;

    as they discuss the top cybersecurity challenges of 2012 - from new threat vectors to perennial issues of people and process.
  • Social Media and Privacy Threats Recorded: Aug 2 2012 3 mins
    Join:

    Bob Bragdon, Publisher, CSO Magazine;
    Joe Gottlieb, President and CEO, Sensage;
    Robert Lentz, Partner, SINET
    Nicko van Someren, CTO, Good Technology

    as they discuss the threats and opportunities of social media and the role privacy needs to play in policy and legislation.
  • Leveraging Public - Private Collaboration Recorded: Aug 2 2012 4 mins
    Join a star studded cast as they cover the value of public - private collaboration in the cybersecurity field.

    Bob Bragdon, Publisher, CSO Magazine
    Matt Greorgy, CTO, Endgame Systems;
    Rob Mancini, CTO, District of Columbia
    Richard Schaeffer, Principal, SINET;
    Ted Schlein, Partner, KPCB;
    Sergio-Thompson Flores, CEO, Modulo
    Robert Rodriguez, Chairman, SINET
Advancing collaboration between the public and private sectors
The mission of the Security Innovation Network™ (SINET) is to advance innovation and enable global collaboration between the public and private sectors to defeat Cybersecurity threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Future of Cybersecurity
  • Live at: Aug 2 2012 7:15 pm
  • Presented by: Ted Schlein, Partner, KPCB
  • From:
Your email has been sent.
or close
You must be logged in to email this