Hi {{ session.user.profile.firstName }}

BrightTALK webinars and videos

  • In this webinar I will discuss what security culture is, where it belongs in the organisation, and how good security culture can reduce the likelihood of being breached. I will point to research on culture, human behaviours, and how to motivate people to do the right thing.
  • Following another year characterised by low growth and depressed inflation, the ‘secular stagnation’ scenario in Europe has gained significant popularity amongst investors. Please join us for a live webcast with Paras Anand, Head of European Equities, who will reflect on the Outlook for the European Equity market in 2016 and the potential for a shift from ‘secular stagnation’ to a ‘surprisingly normal’ cycle in Europe in the upcoming year. Paras will also address volatility issues, the role of disruptive business models and their consequent investment implications.
    There will be also be a chance for Q&A during the webcast.
  • We're seeing a massive shift in cyber security activity from internal threats to organised gangs and targeted state sponsored activities. Recent news items suggest there is an overwhelming need for organisations to understand their "Situational Awareness".

    In this webinar, (ISC)² and IBM will explore what to expect in 2016, focusing on the following key questions:

    - How do organisations understand what threats are real?
    - How much risk appetite do boards have in this complex, mobile, interconnected near real-time world?
    - As more and more devices are connecting to an ever-increasing number of communication channels, how do you ensure you can protect, prevent and respond to cyber security issues, yet provide a transparent easy to use multi-channel experience?

    Adrian Davis, Managing Director (ISC)² EMEA
    Peter Jopling, Executive Security Advisor, Deputy WW Tiger Team Leader, IBM
    Simon Moores, Information Security Futurist
  • It’s no secret that there are botnets for hire, groups of computers that can, and are, used against our organizations on a daily basis. But what is the nature of these botnets? What abilities do each of the installed toolkits offer to the attacker? Most importantly how do their capabilities change the defenses necessary to protect yourself?

    We’ll cover two of the most recent toolkits that have been seeing wide usage. Learn a little about the people behind the attacks, where the attacks are coming from and what you might expect to see in the near future. You might be a bit surprised at where a lot of the traffic is coming from (hint: it’s closer than you think).
  • The increased complexity and frequency of attacks, combined with reduced effectiveness of detective or preventative control frameworks, elevate the need for organisations to roll out enterprise wide incident response initiatives to ensure rapid containment and eradication of threats.

    In this webcast, Don Smith, Technology Director at Dell SecureWorks, describes three organisation’s experience with “APT” actors, examining techniques deployed for intrusion, persistence, lateral expansion and exfiltration.

    Don will highlight where changes to the detective or preventative control frameworks could have prevented the attackers from achieving their objectives and outline key steps to building a robust incident response plan.

    Webcast takeaways include:

    · Real-world examples of APT attacks from the coalface

    · The latest tools and techniques that advanced threat actors are using

    · Recommendations for preventing and responding to APTs
  • Penetration testing is just one element in the overall process of obtaining confidence in the cyber security of the organisation. Consideration to security must be given in the architectural design of networks and the coding of applications and website. Where this is not the case penetration testing will provide an indication of what should be done to retrospectively apply security or to provide a ‘patch’ to make things better.

    Many investigations of cyber attacks have highlighted that the system has been compromised for some time, often years, without the system owner knowing. The penetration test provides an insight into the internal controls and the ability of the SOC or NOC to identify attacks. If the test is conducted and there is no indication that it has been detected, it is highly likely that real attacks have not been detected either and further analysis is required.

    It must be recognised that no security is impenetrable and therefore the ability to react to a cyber security incident is really important. The penetration testing is essential to test the organisation’s ability to respond. The statement that a penetration test will be quickly out of date is valid to some extent but without it the organisation is blind to the types of threats it is exposed to and the vulnerabilities in the systems. To be effective the testing programme must be placed in context and the links between assurance activities fully understood.
  • Propelled by the need to personalize medical care, more and more targeted therapies and companion diagnostics are being developed. What are the key considerations for successful co-development of companion diagnostics and targeted therapies? Join Abigail McElhinny PhD, Vice President Development, Ventana Medical Systems Inc., and Steffan Ho, MD, PhD, Executive Director, Early Development, Translational and Immuno-Oncology, Pfizer Oncology, Pfizer Inc., on November 12, 2015, 9 AM Phoenix time as they address biological, development, regulatory, and other considerations that are indispensable for success.
  • Red Hat Enterprise Linux 7.2 is on its way to the market. It includes a number of new features and enhancements – while continuing to provide the stability, reliability, and security required to meet the demands of both modern data centers and next-generation IT environments. A focus on security, system administration and manageability, as well as a continued emphasis on the functionality to build and deploy Linux containers, helps Red Hat Enterprise Linux 7.2 to provide enterprises with a trusted path forward.

    George Drapeau will walk through the main points in the RHEL 7.2 release, the Intel features that can be found in the release and touch on linkages to other Red Hat products in its infrastructure software portfolio, including the OpenShift Platform-as-a-Service (PaaS) and Red Hat Enterprise Linux OpenStack Platform (RHEL-OSP) products.