A Master Class on IT Security: Roger Grimes Teaches you Phishing Mitigation
Thursday, February 8th | 1:00 PM GMT+8
Phishing attacks have come a long way from the spray-and-pray emails of just a few decades ago. Now they’re more targeted, more cunning and more dangerous. And this enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more.
Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist where he’ll share a comprehensive strategy for phishing mitigation. With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against ever-present IT security threats like phishing.
In this webinar you’ll learn:
- How to develop a comprehensive defense-in-depth plan for phishing mitigation
- Ideas for security policies you can implement now
- Technical controls all organizations should consider
- Gotchas to watch out for with cybersecurity insurance
- Why it’s critical to develop your organization’s human firewall
Get the details you need to know now to protect your organization from phishing and social engineering attacks.
Speaker: Roger A. Grimes, Data-Driven Defense Evangelist
He is a 30-year computer security professional, author of 12 books and over 1,000 national magazine articles. He frequently consults with the world’s largest and smallest companies, and militaries, and he has seen what does and doesn’t work. Grimes was a weekly security columnist for InfoWorld and CSO magazines from 2005 – 2019. He regularly presents at national computer security conferences, and has been interviewed by national magazines and radio shows, including Newsweek magazine and NPR’s All Things Considered. Roger is known for his often contrarian, fact-filled viewpoints.
About this talk
Anyone working with AI needs to consider the ethics and governance of their data and the models they build. But there are so many ‘ethical frameworks’ out there, many with ambiguous and impractical statements, that it is difficult to know how to approach the issue or even where to start. In this webinar, Andrew Burgess, author, AI strategist, and qualified data ethics facilitator will take you through a practical AI and data ethics approach using the Open Data Institute’s Data Ethics Canvas. Using real-life examples, Andrew will explain the different risks associated with AI and how they can be mitigated. Andrew will be joined by Simone Larsson from Dataiku, who will take you through the new governance tools available in the latest version of DSS.
A management consultant, author, and speaker with over 25 years of experience, Andrew is considered an authority on innovative and disruptive technologies, including Artificial Intelligence and Robotic Process Automation. He is regularly invited to speak at conferences on these subjects. He is the author of ‘The Executive Guide to Artificial Intelligence (Palgrave MacMillan, 2018), Visiting Senior Fellow in AI and RPA at Loughborough University, and Expert-in-Residence for AI at Imperial College’s Enterprise Lab. He is a prolific writer on the ‘future of work’ and is frequently published in industry magazines and blogs.
– Andrew Burgess (AI Strategist & Founder at Greenhouse Intelligence)
– Simone Larsson (AI Strategy & Evangelism at Dataiku)
A business case for a strategic initiative as a role play between Head of R&D and Head of Compliance in an innovative agricultural machinery manufacturer company. The debate centres on the business opportunities that the Company can leverage in the Agricultural Technology space by successfully embracing emerging technology such as Blockchain, IoT, Machine Learning and Big Data all bound together by Artificial Intelligence and the associated risks and ethical considerations to the company. Using an appropriate governance framework for enterprise IT (COBIT 2019) is discussed to address these concerns.
Information Assurance Auditor
Everett has served as Vice-President and Certification Director of the ISACA Ireland Chapter and is currently the Chapter training lead on CRISC and COBIT 2019. He holds the mainstream ISACA certifications including CGEIT. He has delivered numerous training sessions to Chapter Members on Enterprise Architecture, Risk Management at four levels (101, 201, 301 & 401), and Information Management. He also serves as Secretary of the Chapters Risk Management – Special Interest Group. Professionally he currently provides guidance to SME’s on Information Assurance and Compliance.
IT Risk Manager
Martin has over 25 years experience in Technical, Audit and Risk roles across different industries.
He currently serves as ISACA Ireland board Vice President and board representative on the Chapters Risk Management Special Interest Group. He holds a BSc. Information & Systems and the following ISACA designations: CISA, CRISC, CGEIT, CDPSE and is an accredited trainer for CISA, CDPSE, COBIT 5.0 / 2019 and Cybersecurity. He has delivered numerous ISACA Ireland Risk Management, COBIT and Cybersecurity courses. He has presented at ISACA conferences and Global webinars and has had IT Audit articles and blogs published in the ISACA Journal international magazine.
Finding patterns and matching strategies are well-known NLP procedures to extract information from text.
Spark NLP library has two annotators that can use these techniques to extract relevant information or recognize entities of interest in large-scale environments when dealing with lots of documents from medical records, web pages, or data gathered from social media.
In this talk, we will see how to retrieve the information we are looking for by using the following annotators:
- Entity Ruler, an annotator available in open-source Spark NLP.
- Contextual Parser, an annotator available only in Spark NLP for Healthcare.
- In addition, we will enumerate use cases where we can apply these annotators.
After this webinar, you will know when to use a rule approach to extract information from your data and the best way to set the available parameters in these annotators.
About this event
Internet of Things (IoT) devices are creating cyber risks to organizations across all industries. From industrial operations to building controls to healthcare services these proliferating, often-unmanaged devices open new threat vectors into traditional IT systems. John Livingston, CEO – Verve Industrial Protection, discusses the biggest threats created by IoT device proliferation, why these systems and devices are unique to protect, and what organizations can do to address these risks. Tammy Klotz, Chief Information Security Officer – Covanta, will share an executive point of view on the challenges and solutions perspectives on IoT.
John Livingston is the CEO at Verve Industrial Protection, a leading cybersecurity software and services firm. John has extensive experience with IoT and securing IoT environments. Verve’s software platform provides an integrated approach to IoT security, and the company’s services team helps clients develop holistic security management for these “cyber physical systems”. He’s also become a leading contributor to the DOD’s efforts in securing their supply chain through his role at the DOD’s cyber hub for manufacturing.
Tammy Klotz is the Chief Information Security Officer at Covanta (CVA). Tammy’s background includes Information Risk Management, Plant/OT Cyber Security as well as IT Security, Risk & Compliance activities.
5:15PM – Meeting Room Opens
5:30 – 6:30PM: Welcome and Presentation
6:30 – 7:00PM: Open networking/ Breakout rooms
About this event
This webinar is a replay
Companies store their data in a database, and SQL is a common database query language that helps you to build your database, retrieve the data, and work with that data in a structured manner.
In this course, you’ll learn to extract and analyze data stored in databases. You’ll first learn to extract data and work with simple queries to pull specific data you need for your analysis. Join us for a fun interactive workshop that will get you on your way to using SQL.
What you will learn:
- What is SQL?
- Managing an SQL Database
- SQL statements like SELECT and WHERE
- And so much more…
About the webinar
The analysis of time series and other sequences extends traditional, predictive modeling and machine-learning approaches.
There is information in the order of the data.
Join this webinar to learn about the SAS tools and approaches that have been developed for analysts to extract, model and forecast sequence information.
Governments around the world are trying to forge data cultures and democratize data throughout their agencies. In the middle of 2020, the Federal Data Strategy 2020 Action Plan was released, outlining a multiyear, holistic approach to government information that includes building a culture that values data, growing data skills, and promoting efficient and appropriate use of data in decision making. In this discussion, we sit down with Major Bryan Fagan, Chief – Community Outreach Branch at the United States Air Force – Analytics Community to discuss the importance of building data culture and skills in government agencies, and some of the challenges and opportunities of democratizing data skills and data culture in a government setting.
- The importance of building data culture and data literacy in government
- Best practices launching data culture programs within a government setting
- Effective ways to spread data skills and data literacy across government agencies
Key points of discussion
- Introduction of AI and its impact
- Application of AI in health care
- Specific use cases and innovations
- Typical challenges of using AI in healthcare
- Building a career in AI
Every organization in the US is at risk from cyber threats from Russia, warned the US Department of Homeland Security on Tuesday, February 22. This warning comes in response to the escalation of Russia’s invasion of Ukraine, which includes boots-on-the-ground tactics as well as cyber-attacks.
Russian cyber operations have targeted Ukraine with destabilization efforts for years, by way of infrastructure attacks, influence operations, website defacement, and attacks on Ukrainian banks and military networks.
US organizations find themselves potential targets for cyber attacks as Russia responds to sanctions the US imposed on Russia for violating international law. According to the DHS, “Russia maintains a range of offensive cyber tools that it could employ against US networks—from low-level denials-of-service to destructive attacks targeting critical infrastructure.”
Given all the fast-moving pieces involved, what exactly is the threat from Russia?
In this urgent webcast, top cybersecurity experts Tim Conway, Kevin Holvoet, Rob Lee, and Jake Williams will give an overview of current Russian Threat Actor capabilities, discuss critical infrastructure attacks on Ukraine, and possible escalation spillover into the EU and/or the US. Join us to get the answers to the key questions surrounding this conflict.
Register now and join us to get answers to key questions surrounding this conflict and its implications on your cybersecurity strategy.
If you are unable to attend the webcast live, please register anyway and you will be able to view the recording on demand once it’s available. While the original broadcast is in the English language, the on-demand recording will be translated to Japanese, Korean, Portuguese, and Spanish.