1. ThreatSpike Dome - File upload detection

    02:12

    from ThreatSpike Labs / Added

    13 Plays / / 0 Comments

    In this video we demonstrate how you can minimise the risk of data leakage by using ThreatSpike Dome and its file upload detection capabilities.

    + More details
    • #TEISS: Benchmarking your incident response strategy

      28:11

      from Lyonsdown / Added

      14 Plays / / 0 Comments

      Jon Bentley from The Gadget Show chairs this panel discussion on how to coordinate your response management. Panellists include James Billingsley, Senior Solutions Consultant at Nuix, who talks about the lack of visibility of data in organisations, and Ryan Jones, Managing Consultant for Incident Response for Trustwave Spiderweb EMEA. Joining them is Robert Morgan, UK CISO for BNP Paribas.

      + More details
      • #TEISS: Developing an agile information security strategy

        23:00

        from Lyonsdown / Added

        77 Plays / / 0 Comments

        Should businesses run their IT departments as a business consultancy? Edward Tucker, Head of Cyber Security and Response at HMRC places importance in this area on predictions for the business for the future, in order to predict needs. Mike Jolley, Head of Information Security and Risk at Yorkshire Building Society highlights the importance of implementing cyber information security plans into the overall business plan of the company. EJ Hilbert, Managing Director Cyber Division at Kroll says the starting point needs to be understanding; what's going on, what the business needs and what needs to be done. Prashant Jathwa, ISO at ABN Amro and Yann L'Hullier, Group CIO at Tradition also share their thoughts.

        + More details
        • #TEISS: Experts discuss new BYOD information security threats

          25:44

          from Lyonsdown / Added

          3 Plays / / 0 Comments

          This panel discussion from the European Information Security Summit focuses on mobile devices and ways of mitigating the risks. Nigel Stanley, CEO Incoming Thought thinks the mobile is the most intimate form of computing that we've ever had, and if a hacker can get it, there's even more personal data to gather. Kieron Shepherd, Field Systems Engineer, F5 highlighted that the change will grow, and education is the key cornerstone to dealing with the threat from mobile devices. Dr Simon Rice, Group Manager, Technology Information Commissioner's Office talks about the relevance of social media to information security threats, and advocates greater communication with employees about how they want to deal with the problems. Roy Vella, Managing Director, Vella Ventures says that the mobile has given us connectivity everywhere, and the proximity to strangers is even greater than ever before.

          + More details
          • #TEISS: Experts discuss simplifying information security and compliance

            35:55

            from Lyonsdown / Added

            4 Plays / / 0 Comments

            How can we make security and privacy simple and easy to understand? Keith Awock, Head of IS at ASA Group said we need to involve everyone in information security from the very beginning, so it is a regular process to them. Avichai Eigavish, Sales and Business Development Director at Checkpoint that the question needs to be embedding security into our day-to-day life to make it understandable, but in a secure manner. Jitender Arora, Director of Professional Services at Cyberark says that a focus on the people and employees is vital, and embedding privacy into security data and practice.

            + More details
            • #TEISS: When fighting cyber attacks, work as a team or perish

              10:53

              from Lyonsdown / Added

              9 Plays / / 0 Comments

              Working together with internal and external stakeholders to respond to cyber threats is the key to fighting security breaches, as discussed here by the panel in relation to the example of banks. Yuval Moss, Director of Professional Services at Cyberark and Richard Neaton, co-chair of the European Advisory Board for ISC2 explain the processes in place. Robert Morgan, UK CISO, BNP Paribas says the government does enough in the financial sector and higher levels to fight cyber attacks, but not for SMEs. Dave Clemente, Senior Research Analyst for the Information Security Forum backs him up, saying that the best examples of these practices lie in financial services, and emphasises the trust and time needed to succeed.

              + More details
              • #TEISS: Is your cyber security better with a Chief Trust Officer?

                00:51

                from Lyonsdown / Added

                7 Plays / / 0 Comments

                Justin Somaini, Box.com, tells about the importance and role of a Chief Trust Officer.

                + More details
                • #TEISS: Is human error the biggest problem in information security?

                  00:45

                  from Lyonsdown / Added

                  13 Plays / / 0 Comments

                  Justin Somiani, Chief Trust Officer of Box.com explains why human error is one of the biggest threats to the security of your organisation.

                  + More details
                  • #TEISS: Is there a conflict between security and privacy?

                    00:36

                    from Lyonsdown / Added

                    9 Plays / / 0 Comments

                    Justin Somaini, Chief Trust Officer at Box.com talks about the conflict. Nowadays, he says not so much. They work together today.

                    + More details
                    • #TEISS: How to spot a good cloud provider

                      01:07

                      from Lyonsdown / Added

                      14 Plays / / 0 Comments

                      Justin Somaini, Chief Trust Officer of Box.com, gives tips about how to tell the difference between a trustworthy and a feeble provider. First, certifications on the ability to implement security are key. Secondly, it's the ability to engage in an open dialogue in the things they do, their processes and security - have they incorporated security into their DNA?

                      + More details

                      What are Tags?

                      Tags

                      Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."