SC Webcasts

  • Privileged Users: Functional. Not Fraudulent

    14 November 2013

    ESG recently conducted research around insider threats, privileged users and APTs. While the security community remains fixated on advanced malware, tried-and-true insider threats are becoming more difficult to detect and prevent.

    Register for "Privileged Users: Functional. Not Fraudulent" to learn why many organisation are vulnerable to these type of threats in spite of their existing cyber security. Key takeaways will include:

    ·         Key trends around Insider Threats

    ·         Major gaps between existing security processes and available technologies

    ·         Critical components that help to reduce the attack surface

    Join us for this must attend webcast to learn how privileged users can get their jobs done - without viewing or compromising data.

    Charles Goldberg, Senior Director, Vormetric
    Martin Jordan, Head of Cyber Response, KPMG LLP

    60 mins

    Sponsored by: vendor/vormetric
    - - - - -
  • This Is How to Secure Data in the Cloud

    02 October 2013

    As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

    Enterprises must protect their data from (i) system administrators who don’t need to see the data in the clear and (ii) adversaries who become system administrators from stolen credentials. In short, enterprises must take control of their data: The best way to do this is by firewalling the data using cutting edge access controls and policies, advanced encryption and centralised key management.

    When an outside party owns, controls, and manages infrastructure and computational resources, how can you be assured that sensitive data remains private and secure, that your organization is protected from damaging data breaches, and that you can still satisfy the full range of reporting, compliance and regulatory requirements?

    Highlights of this session include:

    • How to proactively address security in the cloud so that your organisation isn't next week's data breach headline.
    • How to protect intellectual property and comply with data privacy and system integrity regulations.
    • How to combine context-aware user access, high performance encryption for data-at-rest and operational control into a single system that seamlessly interacts with existing IT systems.

    C.J. Radford, VP Cloud, Vormetric
    Tim Burnett, IT Security Manager, Atos
    Sponsored by: vendor/vormetric
    - - - - -
  • The Future of Secure File Sharing: Post PRISM Enterprise Tools

    10 September 2013

    File sharing whether on a PC or mobile makes workers more productive, that's undebatable, but what does an effective enterprise file sharing platform actually look like? More importantly what will it look like in 10 years time?

    Tune into this upcoming SC Magazine webcast to hear from Clive Longbottom, Founder at Quocirca, Accellion - a top ranked Enterprise File Sharing & Sync supplier according to Gartner, as well as further to be confirmed industry experts.

    Expect cutting edge discussion on:
    * Data Sovereignty: the fall-out from the PRISM
    * Alternatives to cloud architectures for modern file sharing platforms
    * The part mobile devices play in data leakage and how to suppress this
    * The policies you should have in place.

    This session is essential viewing for all IS professionals needing to keep up to date with BYOD and file sharing

    Clive Longbottom, Co-Founder & Industry Analyst, Quocirca
    Jes Breslaw, Director of Cloud Solutions EMEA, Accellion
    Sponsored by: vendor/accellion
    - - - - -
  • Security Beyond the Corporate LAN

    05 September 2013

    An evaluation and dissection of SC Magazine survey: Security beyond the corporate LAN.

    Tune in to hear from Graham Thomson: CISO, Think Money Group, Justin Somaini: Chief Trust Officer, Box, Mark Brown, Director - Risk Advisory at EY. Expect to learn:

    * What fellow infosec pro's currently consider the most serious threats to the cloud
    * Predictions for how these threats will evolve in coming months/years
    * Strategies for minimising the risks posed by such threats
    * Where pressure to implement file sharing tools for outside the corporate LAN is coming from across the enterprise

    This webcast is essential viewing for all information security professionals who need to keep up to date with advancements and trends in threats to data outside the corporate network.

    Graham Thomson, Chief Information Security Officer, Think Money Group
    Justin Somaini, Chief Trust Officer, Box
    Mark Brown, Director - Risk Advisory, EY (Ernst & Young)
    Sponsored by: vendor/box
    - - - - -
  • 2013’s Invisible Network Threats: Identify And Respond

    11 June 2013

    In a recent SC survey, when asked ‘Do you think your current network is secure?’ 43% of IS professionals said Not Sure.

    At first glance, this appears a surprisingly high figure – but a closer look at today’s threat matrix soon tells us why. Technology developments such as multi-point cloud solutions, consumerisation, BYOD uptake and even Windows 8 are a major headache in network security for IT leaders. Plus organisations face a growing number of ‘invisible threats’ that they are often not aware of, and which present a very real risk to corporate security.

    So what can be done to identify, monitor, respond and report these network security threats in real time?

    SC’s latest webcast will share expert advice, practical testing regimes and examples of proven results in overcoming invisible threats. Insights include:

    -Detailed analysis of the evolving threat landscape including the top 3 network security threats you don’t know about

    -The knowledge you need to know when choosing a bespoke unified threat management solution for your business

    -Real life examples showing why a rigorous, real-time testing environment  is needed to make well-informed buying decisions

    -Take-home advice on how to make sure the product you use protects against network security threats

    James Lyne, Director of Technology Strategy, Sophos
    Richard Thomas, Labs Manager, West Coast Labs
    Moderated by Dan Raywood, Executive Editor, SC Magazine

    60 mins

    * * * * *
  • Employee File Sharing: the Good, the Bad and the Ugly

    04 June 2013

    In a recent SC Survey of information security professionals 99% of those asked said it was ‘important’ that their organisation has secure file sharing. But 50% said they had ‘no real visibility’ of how data is being sent within and outside the company.                                                                                   

    That said, even IT security professionals resort to using  unsecure file transfer systems so they can get their job done, with many saying they have used the following to transfer sensitive information: 

    ·  Email – 82%

    ·  USB device – 64%

    ·  Consumer cloud service (e.g. Dropbox) – 28% 

    If IT professionals – who know the risks – are prepared to use such systems, what are employees not versed in security prepared to do? 

    Tune in to hear our experts discuss these and the other quite surprising results, plus a look at how best to protect files shared inside and outside your organisation, while benefitting from the productivity boost such sharing can allow.

    Craig Goodwin, Director Information Security,
    Jeff Whitney, VP Global Marketing, Ipswitch File Transfer
    Tim Burnett, IT Security Manager, Atos

    60 mins

    * * * * *
  • The Human Factor: Why IT Security is more than just skin deep

    28 May 2013

    With SC’s annual conference taking place later in the year, we have invited some of the speakers to run the rule over a few of the key human factors affecting information security risk.

    • Where do human factors rank in relation to other security risks?
    • Is it feasible to identify key human risk factors and if so, how can they be successfully integrated into an IT risk matrix?
    • Is it true that people value the security of data differently to tangible goods? If so, what can be done to change perceptions?
    • To what extent is IT security seen as a board level issue - what steps can be taken to effectively communicate IT risk to the Board?
    • Train the trainer – when it comes to communicating, does your average IT security professional err towards Martin Luther King or Hal from 2001? 
    • How important are communication skills to the IT security professional
    • Spread the love – or at least, the message. Why do staff consistently ignore IT security messages and what can you do, to hit the message home?
    • Pa$$word5! Digestible take home tips you can share with your staff on how to choose and remember multiple secure passwords

    Pamal Sharma, Global CIO, Fujifilm
    Phil Cracknell, Head of Information Security, TNT Express
    Sarah Lewis, Organisational Psychologist, Appreciating Change
    Stephanie Daman, Chief Executive Officer, Cyber Security Challenge UK
    - - - - -
  • IT Security at board level: 3 Essential Strategies To Secure Funding & Save Time

    12 December 2012

    In a recent SC Magazine survey 88% of IT pros asked told us that security costs were undoubtedly rising. Shockingly two thirds also told us they were already under resourced.

    Does this sound all too familiar?

    Tune into this SC webcast for 3 essential strategies every IT professional should follow:

    • How to do more with less by streamlining installation and system administration processes.
    • How to successfully secure further funding by demonstrating, in language the board will understand, why your role is BUSINESS CRITICAL
    • How to develop a cost effective information security strategy worthy of internal investment, including best practices for incident response.

    Without properly articulating the business case for further investment, information security professionals will never get the funding they need to match rising costs in a recession.

    Tune into this SC webcast to discover what you need to be doing going forward. After all, if the company’s data gets stolen, on your head be it.

    Angie Beswick, Head of IT Risk, DLA Piper LLP
    Trey Ackerman, Director Systems Engineering, AlienVault

    60 minutes

    - - - - -
  • How to Take Action - ICO’s Latest Guidance on the Secure Use of Cloud Computing

    06 December 2012

    The ICO (Information Commissioners Office) recently clarified its guidance for securing data in the cloud under the UK Data Protection Act. This served as a reminder that organisations can shift responsibility but not accountability in protecting personal information in cloud applications.

    What does every IT professional need to know?

    In this interactive SC Magazine webcast, you’ll hear:
    •ICO guidance on protecting data in the cloud
    •The penalties associated with failure to comply
    •ICO recommendations on encryption and key management
    •Case studies on how UK organizations are securing their data in the cloud

    Don’t miss this informative webcast!

    Paul Simmonds, Co-founder and Board Member, Jericho Forum, and Former CISO, AstraZeneca,
    Richard Olver, Regional Director, EMEA, CipherCloud


    * * * * *
  • Defeat your Database Demons – How to Monitor and Protect Your Key Assets

    04 December 2012

    Database breaches accounted for 98% of all records breached in 2012. It’s time to monitor and protect your database assets.

    Are you 100% sure your database is secure?

    This SC webcast investigates:
    • How the threat landscape has changed and what’s coming in 2013
    • Case studies: How large enterprise companies are defeating threats and staying compliant
    • What should you be monitoring and why?
    • Encryption techniques that ensures any stolen data is totally worthless.

    As corporate data assets become more and more valuable on the open market, high profile data breaches will only increase. Any IT professional who still wants a job in 12 months time should sit up and take notice.

    Tune in to ensure you have the right systems in place to monitor and protect your database in 2013.

    Derek Tumulak, Vice President of Product Management, Vormetric
    Raphael Reich, Senior Director, Imperva
    Tim Wilson, Information Governance Project Manager, NHS London

    60 minutes

    - - - - -