security - CISO Webinars - CISO Platform2024-03-28T23:59:07Zhttps://www.cisoplatform.com/videos/feed/tag/securityIf I Were a Nation-State Hacker Looking to Conduct Supply Chain Attackshttps://www.cisoplatform.com/videos/if-i-were-a-nation-state-hacker-looking-to-conduct-supply-chain2021-02-10T19:55:09.000Z2021-02-10T19:55:09.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/8670057256?profile=RESIZE_400x&width=400"></div><div>Cyber threats are racing to find and exploit the next big Supply-Chain hack. Compromises like that of SolarWinds represent a tectonic shift in the Cybersecu...</div>Disrupted but Not Dead – Law Enforcement Scores a Big Win Against EMOTET Botnethttps://www.cisoplatform.com/videos/disrupted-but-not-dead-law-enforcement-scores-a-big-win-against2021-01-29T23:56:57.000Z2021-01-29T23:56:57.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/8670056287?profile=RESIZE_400x&width=400"></div><div>Congrats to the multinational authorities who collaborated to defang the infrastructure of EMOTET, a hugely successful cybercriminal malware platform.Unfortu...</div>Cautious Optimism and Grave Concerns as Intel Integrates Cybereason into Chipshttps://www.cisoplatform.com/videos/cautious-optimism-and-grave-concerns-as-intel-integrates2021-01-27T17:49:15.000Z2021-01-27T17:49:15.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/8670055469?profile=RESIZE_400x&width=400"></div><div>Intel and Cybereason just announced that they are working to integrate the Cybereason to collect data from hardware to software levels, with the goal of prot...</div>New U S Cybersecurity Leadership Needs More Experience Diversityhttps://www.cisoplatform.com/videos/new-u-s-cybersecurity-leadership-needs-more-experience-diversity2021-01-25T17:59:08.000Z2021-01-25T17:59:08.000ZMatthew Rosenquisthttps://www.cisoplatform.com/members/MatthewRosenquist<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/8670055696?profile=RESIZE_400x&width=400"></div><div>President Biden has been quick to name a number of cybersecurity leadership positions to greatly strengthen the nations capabilities, but there are concerns ...</div>5 Real ways to destroy business by breaking SAP Applicationshttps://www.cisoplatform.com/videos/5-real-ways-to-destroy-business-by-breaking-sap-applications2015-02-09T10:42:49.000Z2015-02-09T10:42:49.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/8670053087?profile=RESIZE_400x&width=400"></div><div>Do you know where all the critical data of your company is stored? Is it possible for attacker to commit sabotage or espionage against your company by breaking into just one of your business critical systems? And if so - what kind of systems could be under attack? Is it easy to break them? Is it a myth that SAP systems could be accessed only internally? Time has come not only to answer all of these questions. This time the real examples of different attacks on Enterprise Business application systems will be shown, based on eight-year research experience in that field. First of all we will cover all possible business risks related to each end every type of systems such as ERP, SRM, HR, Business Intelligence, PLM’s and Industry solutions so that every high level executive will get the full understanding of what could happen. After that, we will show examples of how easy is it to do such critical actions in different systems by exploiting vulnerabilities and misconfigurations from more business-related - such as Abusing SRM systems - to win the bid, for example. From frauds in HR system and salary-increasing to more technical things, such as drilling into corporate network via SAP Portal or delivering backdoors, which look like official updates via SAP Router. Our presentation will be the first to show real threats for business during those attacks with demo of the most interesting ones, and a guide to avoid them.</div>Ants and Elephants in the CISO's Officehttps://www.cisoplatform.com/videos/ants-and-elephants-in-the-ciso-s-office2015-02-09T10:38:26.000Z2015-02-09T10:38:26.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/8670053663?profile=RESIZE_400x&width=400"></div><div>I will show how ISO 9001 and ISO 27001 can be used together to deliver business value and demonstrate to executive management and key stakeholders that you are exercising due diligence in protecting your organisation's information assets. The talk will briefly discuss the requirements of the two standards and show how ISO 27001 and ISO 9001 can be used to address both the tactical challenges of information security (the ants) as well as the strategic challenges of delivering business value (the elephants).</div>How to Embed Risk Assessment into your Project Workstreamhttps://www.cisoplatform.com/videos/how-to-embed-risk-assessment-into-your-project-workstream2015-02-09T10:35:01.000Z2015-02-09T10:35:01.000Zprithahttps://www.cisoplatform.com/members/pritha<div><img src="https://storage.ning.com/topology/rest/1.0/file/get/8670052695?profile=RESIZE_400x&width=400"></div><div>Embedding risk assessment into your project workstream by Michael Calderin - Security Officer, Bupa Global Latin America Position information security more s...</div>