Cyber-Security Webinar Archive

The Key Role of Organisation Culture in Cyber-Security Effectiveness

View now 

The benefits of digitization are varied. For example, successful incorporation of a digital strategy into business operations can result in cost savings, enhanced organisational agility through rapid and accurate response to operating conditions, as well as improvement in the storage and sharing of information. However, comprehensive and balanced understanding of the value of a digital transformation needs to recognise and act on what is needed for effective attention to the threat of cyber intrusions.

This webinar will address a “Technology and More” commitment as necessary ingredients for effective response to attempts of digital breaches. The fundamentals require an acceptance that cyber-attack is a permanent threat that requires cyber culture to become a part of the personality of organisations. Keys to effectively transitioning to such an end state will be identified and addressed as well as a three-phase implementation suggestion. Cyber culture needs to become as much of an organisation and work force imperative and commitment as features such as quality, safety, and environmental stewardship.

Dr Kenneth Ferguson has operated his own consultancy, Ken Ferguson, LLC, providing new direction setting and implementation support to a variety of organisations for over twelve years. He has been Vice President of Global Nuclear Associates since June 2017, and has been developing new nuclear technology attending to details such as economics, cyber-security, construction management and effective regulatory reviews, etc.

Dr Ferguson’s work in cyber-security currently includes providing advice on planning for an integrated approach to intrusion management, program development, staffing, and related program management with an emphasis on technology, work management, and people.

Understanding the "Human Factor" in Cyber-Attacks

View now 

The "Human Factor" - how we behave when using technology - often determines whether we'll be victim of a cyber-attack. Regardless of how advanced technology has become in efforts to protect Users of Technology (UoT), one factor has not been sufficiently addressed: the ways we all behave when accessing technology that leave us vulnerable to being manipulated through social engineering used by cybercriminals.

By raising awareness about how to determine the legitimacy of electronic communications, being able to recognize when we are being socially engineered, and mistakes we make in responding to trickery used by cybercriminals incorporating social engineering, rates of cyber-victimization can be effectively reduced.

Referencing his new theory RESCAT (Required Elements of a Social Engineered Cyber Attack Theory), Chris Kayser will explain how our decision processes when exposed to a socially engineered cyberattack, based on human nature and curiosity, can determine whether or not we will become a cybervictim.

A sought after consultant and presenter in the field of cybercrime and cybersecurity, Chris is the founder, president and CEO of Cybercrime Analytics Inc., a cybercrime consulting and research company. An active member of CATA alliance, CATA's eCrime Cyber Council, the Academy of Criminal Justice Sciences and other organisations, Chris has co-authored two research papers in the field of cybercriminology.


How can we regulate cyber-security for critical energy infrastructure?

View now 

Across the world, attention to cybersecurity threats to critical energy infrastructure (CEI), including electric power, natural gas and petroleum pipelines, oil refineries and petrochemical plants, is growing rapidly. This is especially true as these have become the targets of geopolitical warfare threats (and actual attacks).

Because of perceived cybersecurity deficiencies on the part of CEI owners, some governments are considering (or even implementing) regulations on owners and operators of CEI. What lessons can be learned from the North American experience with the NERC CIP standards for cybersecurity of the electric power grid?

Hear from expert Tom Alrich in the fifth episode of our Cyber-Security webinar series who gives some great insights into cyber-security for CEI.

A well-known consultant on compliance with the North American Electric Reliability Corporation, Tom writes a blog (available at on developments in the CIP standards which is highly regarded by power industry professionals and regulators.


Security Operations Now: What you need to know

View now 

Security Operations are changing by necessity. Sophisticated attacks are increasing and overwhelming systems as well as analysts in a Securities Operations Center (SOC). Now is the time for us to take control of threats and protect our businesses and assets.

Hear from Kerry Matre (Head of Security Operations Strategy, Palo Alto Networks) in the fourth episode of our Cyber-Security webinar series who gives some really helpful insights into Security Operations Centers.

An expert in SOC strategy, Kerry has been defining the steps for customers to transform their architecture and security operations to the next level: increasing prevention, reducing risk and enabling smart people to do smart things within their operations. Kerry’s webinar, Security Operations Now: What you need to know explores:
•    The evolution of SOs in the changing threat landscape
•    Why the “people problem” in Security Operations Centers (SOCs) isn’t about people
•    What is and isn’t working for SOCs


Understanding Insider Threat Detection

View now 

Insider threats are near impossible to discover using conventional methods of threat detection. Instead, data science or machine learning-centric methods are the only way to identify them both on premise and in the cloud.

Hear from Derek Lin (Chief Data Scientist, Exabeam) in the third episode of our Cyber-Security webinar series who gives a fantastic insight into difficult to detect insider threats.

An expert in anomaly detection, insider threat detection and behaviour analytics, Derek’s webinar, Understanding Insider Threat Detection explores:
•    Insider threat detection by applying data science
•    How machine learning algorithms work in detecting insider threats
•    Cases to bring data science concepts to life


Fixing the IoT Security Fail

View now 

Hear from Babak Pasdar (Chief Executive Officer, Acreto) in the second of the webinar series discuss the latest security risks associated with IoT devices and technology.

Learn about: 
•    The current IoT security challenge
•    Why current approaches are failing
•    The fix: Ecosystem Security 

Effective Foundational Security Principles 

Andrea Radu

View now 

Join Andrea Radu (Director of EMEA Cyber-Strategy, Deloitte) in the first edition of this brand new webinar series. 

Cyber-attacks, threat vectors and cyber espionage are no longer just buzz-words or occasional encounters. Cyber-security has become an everyday part of our reality. Businesses, governments and individuals need to incorporate this mind-set into their daily routines. Organizations are preparing for extreme but plausible cyber-security scenarios and people are becoming more vigilant with their privacy.

But how are decisions being made? How should priorities be set and which guidelines should be used? What is the foundation we need to build to support decision-making and reduce the risk of cyber-attacks?