title

Networks & Security

Plymouth University

1
Followers
1
Plays
Networks & Security
Networks & Security

Networks & Security

Plymouth University

1
Followers
1
Plays
OVERVIEWEPISODESYOU MAY ALSO LIKE

Details

About Us

Latest Episodes

Insider Misuse Identification - Applying Transparent Biometrics

Nathan Clarke describes two approaches to utilising transparent biometrics for investigating and attributing insider misuse: a proactive approach that embeds biometrics within digital objects (to identify and attribute the source of any stolen information); and a reactive measure that seeks to identify users from network meta-data. The talk was part of the panel session at the 16th Annual Security Conference, held in Las Vegas from 18-20 April 2017. [(CC) BY-NC-SA 2.0 UK]

11 MIN2017 MAY 11
Comments
Insider Misuse Identification - Applying Transparent Biometrics

Developing Cyber Skills: A Job Role Centric Approach

Jane Dickinson talks about CompTIA's approach to supporting individuals and businesses with security readiness, including the CyberSecure certification (which empowers individuals to keep themselves – and organisations they work for – safe online), and the Cybersecurity Pathway, which supports development of the security skills each IT professional requires, according to job role. The talk was part of Secure South West 8 at Plymouth University on 7 February 2017. [(CC) BY-NC-SA 2.0 UK]

23 MIN2017 MAR 13
Comments
Developing Cyber Skills: A Job Role Centric Approach

Not Quite Dead Yet - Password authentication revisited

While it is tempting to write off passwords, research suggests that weaknesses relating to user behaviour can be addressed by more effective guidance and feedback. Related findings are presented as scene-setting for a panel discussion, considering the pros and cons of sustaining password-based approaches, and the feasibility of moving to alternatives. The session was part of the 50th Hawaii International Conference on System Sciences from 5 January 2017. [(CC) BY-NC-SA 2.0 UK]

30 MIN2017 JAN 15
Comments
Not Quite Dead Yet - Password authentication revisited

An Architectural Approach to Information Security

This presentation addresses the complexity, scale and depth of information security challenges within an environment; it defines a methodical approach that can be transferred to other organisations to remediate the problems identified. Craig Douglas and Paul Ferrier introduce the Enterprise Architecture approach to consolidate, evolve and orchestrate Information Security developments at Plymouth University. The session was part of Secure South West 7 on 5 October 2016. [(CC) BY-NC-SA 2.0 UK]

27 MIN2016 OCT 31
Comments
An Architectural Approach to Information Security

Cyber Attacks

John Finch examines the anatomy of a cyber-attack that caused a breach of public sector data, considering the impact assessment, the remediation applied, and future implications. This details a type of data breach that has been happening for years, but is now becoming more widely publicised. The talk considers what you can do about it, how to spot it and what can be done nationally. The session was part of Secure South West 7 at Plymouth University on 5 October 2016. [(CC) BY-NC-SA 2.0 UK]

27 MIN2016 OCT 24
Comments
Cyber Attacks

The 800lb Gorilla meets the Elephant in the room

Delt Shared Services Ltd provides IT services to over 6500 public sector users across the South West. Recognising that compliance with security directives is only half the story, it formed a partnership with Babcock Managed Security Services to enable best in class security monitoring and analysis across its estate. This presentation describes the changes in the threat landscape that led from developing a SOC through to the partnership between Babcock MSS and Delt. [(CC) BY-NC-SA 2.0 UK]

19 MIN2016 APR 16
Comments
The 800lb Gorilla meets the Elephant in the room

A look into the Payment Card Industry

Pete Woodward, Chief Information Officer of Securious Limited, explains what PCI DSS means to SMEs and large corporations. Pete discusses some of his experiences gained through working within large retail as well as smaller merchants, to help understand and get to grips with the latest PCI DSS standard. As Pete demonstrates, it isn't all plain sailing... The talk was part of Secure South West 6, which was held at Plymouth University on 9 February 2016. [(CC) BY-NC-SA 2.0 UK]

23 MIN2016 APR 7
Comments
A look into the Payment Card Industry

Security and Privacy - All under control?

Privacy settings are available on many devices and services, but the available options can often frustrate attempts to control privacy. Steven Furnell examines the settings in iOS 8 as an example. The potential for misconfiguration can affect individuals and organisations, and it is desirable to have a better system-level overview of their privacy posture. The presentation was the opening guest talk at the 14th Annual Security Conference in Las Vegas on 19 May 2015.

32 MIN2015 SEP 20
Comments
Security and Privacy - All under control?

Professionalisation - Security qualifications and what they can tell you

The security field offers a bewildering array of qualifications, certificates and letters that individuals can hold. As a customer or consumer, it's difficult to understand what these mean and how they relate to the ability to get the job done. Adrian Davis of (ISC)2 provides an overview of the most common qualifications, their requirements and the breadth of subjects covered. The session was part of Secure South West 5, at Plymouth University on 2 April 2015. [(CC) BY-NC-SA 2.0 UK]

26 MIN2015 JUN 18
Comments
Professionalisation - Security qualifications and what they can tell you

Enabling Security Awareness and Education with Employees

In this talk, Melanie Oldham focuses upon bringing our weakest links from an information security point of view, our employees, and making them our frontline, stalwart defenders against the current dangers we face within the information security industry effectively bringing our human firewall up to par with the rest of our systems. The session was part of Secure South West 5, which was held at Plymouth University on 2 April 2015. [(CC) BY-NC-SA 2.0 UK]

24 MIN2015 MAY 2
Comments
Enabling Security Awareness and Education with Employees

Latest Episodes

Insider Misuse Identification - Applying Transparent Biometrics

Nathan Clarke describes two approaches to utilising transparent biometrics for investigating and attributing insider misuse: a proactive approach that embeds biometrics within digital objects (to identify and attribute the source of any stolen information); and a reactive measure that seeks to identify users from network meta-data. The talk was part of the panel session at the 16th Annual Security Conference, held in Las Vegas from 18-20 April 2017. [(CC) BY-NC-SA 2.0 UK]

11 MIN2017 MAY 11
Comments
Insider Misuse Identification - Applying Transparent Biometrics

Developing Cyber Skills: A Job Role Centric Approach

Jane Dickinson talks about CompTIA's approach to supporting individuals and businesses with security readiness, including the CyberSecure certification (which empowers individuals to keep themselves – and organisations they work for – safe online), and the Cybersecurity Pathway, which supports development of the security skills each IT professional requires, according to job role. The talk was part of Secure South West 8 at Plymouth University on 7 February 2017. [(CC) BY-NC-SA 2.0 UK]

23 MIN2017 MAR 13
Comments
Developing Cyber Skills: A Job Role Centric Approach

Not Quite Dead Yet - Password authentication revisited

While it is tempting to write off passwords, research suggests that weaknesses relating to user behaviour can be addressed by more effective guidance and feedback. Related findings are presented as scene-setting for a panel discussion, considering the pros and cons of sustaining password-based approaches, and the feasibility of moving to alternatives. The session was part of the 50th Hawaii International Conference on System Sciences from 5 January 2017. [(CC) BY-NC-SA 2.0 UK]

30 MIN2017 JAN 15
Comments
Not Quite Dead Yet - Password authentication revisited

An Architectural Approach to Information Security

This presentation addresses the complexity, scale and depth of information security challenges within an environment; it defines a methodical approach that can be transferred to other organisations to remediate the problems identified. Craig Douglas and Paul Ferrier introduce the Enterprise Architecture approach to consolidate, evolve and orchestrate Information Security developments at Plymouth University. The session was part of Secure South West 7 on 5 October 2016. [(CC) BY-NC-SA 2.0 UK]

27 MIN2016 OCT 31
Comments
An Architectural Approach to Information Security

Cyber Attacks

John Finch examines the anatomy of a cyber-attack that caused a breach of public sector data, considering the impact assessment, the remediation applied, and future implications. This details a type of data breach that has been happening for years, but is now becoming more widely publicised. The talk considers what you can do about it, how to spot it and what can be done nationally. The session was part of Secure South West 7 at Plymouth University on 5 October 2016. [(CC) BY-NC-SA 2.0 UK]

27 MIN2016 OCT 24
Comments
Cyber Attacks

The 800lb Gorilla meets the Elephant in the room

Delt Shared Services Ltd provides IT services to over 6500 public sector users across the South West. Recognising that compliance with security directives is only half the story, it formed a partnership with Babcock Managed Security Services to enable best in class security monitoring and analysis across its estate. This presentation describes the changes in the threat landscape that led from developing a SOC through to the partnership between Babcock MSS and Delt. [(CC) BY-NC-SA 2.0 UK]

19 MIN2016 APR 16
Comments
The 800lb Gorilla meets the Elephant in the room

A look into the Payment Card Industry

Pete Woodward, Chief Information Officer of Securious Limited, explains what PCI DSS means to SMEs and large corporations. Pete discusses some of his experiences gained through working within large retail as well as smaller merchants, to help understand and get to grips with the latest PCI DSS standard. As Pete demonstrates, it isn't all plain sailing... The talk was part of Secure South West 6, which was held at Plymouth University on 9 February 2016. [(CC) BY-NC-SA 2.0 UK]

23 MIN2016 APR 7
Comments
A look into the Payment Card Industry

Security and Privacy - All under control?

Privacy settings are available on many devices and services, but the available options can often frustrate attempts to control privacy. Steven Furnell examines the settings in iOS 8 as an example. The potential for misconfiguration can affect individuals and organisations, and it is desirable to have a better system-level overview of their privacy posture. The presentation was the opening guest talk at the 14th Annual Security Conference in Las Vegas on 19 May 2015.

32 MIN2015 SEP 20
Comments
Security and Privacy - All under control?

Professionalisation - Security qualifications and what they can tell you

The security field offers a bewildering array of qualifications, certificates and letters that individuals can hold. As a customer or consumer, it's difficult to understand what these mean and how they relate to the ability to get the job done. Adrian Davis of (ISC)2 provides an overview of the most common qualifications, their requirements and the breadth of subjects covered. The session was part of Secure South West 5, at Plymouth University on 2 April 2015. [(CC) BY-NC-SA 2.0 UK]

26 MIN2015 JUN 18
Comments
Professionalisation - Security qualifications and what they can tell you

Enabling Security Awareness and Education with Employees

In this talk, Melanie Oldham focuses upon bringing our weakest links from an information security point of view, our employees, and making them our frontline, stalwart defenders against the current dangers we face within the information security industry effectively bringing our human firewall up to par with the rest of our systems. The session was part of Secure South West 5, which was held at Plymouth University on 2 April 2015. [(CC) BY-NC-SA 2.0 UK]

24 MIN2015 MAY 2
Comments
Enabling Security Awareness and Education with Employees