Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit ...Amazon Web Services
Atlassian runs a global SaaS platform where security and customer privacy are critical. This talk focuses on the solution they built using KMS and IAM to provide resilient cross-region encryption and decryption, optimised for performance. Come and learn how Atlassian approached this challenge, and built a solution using a combination of AWS services and the AWS Encryption SDK.
Secure by Design - Security Design Principles for the Rest of UsEoin Woods
Security is an ever more important topic for system designers. As our world becomes digital, today’s safely-hidden back office system is tomorrow’s public API, open to anyone on the Internet with a hacking tool and time on their hands. So the days of hoping that security is someone else’s problem are over.
The security community has developed a well understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isn’t included in the training of software developers, assuming that it’s only relevant to security specialists.
In this talk, we will briefly discuss why security needs to be addressed as part of architecture work and then introduce a set of proven principles for the architecture of secure systems, explaining each in the context of mainstream system design, rather than in the specialised language of security engineering.
This version of the talk was presented at GOTO London in October 2016.
Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit ...Amazon Web Services
Atlassian runs a global SaaS platform where security and customer privacy are critical. This talk focuses on the solution they built using KMS and IAM to provide resilient cross-region encryption and decryption, optimised for performance. Come and learn how Atlassian approached this challenge, and built a solution using a combination of AWS services and the AWS Encryption SDK.
Secure by Design - Security Design Principles for the Rest of UsEoin Woods
Security is an ever more important topic for system designers. As our world becomes digital, today’s safely-hidden back office system is tomorrow’s public API, open to anyone on the Internet with a hacking tool and time on their hands. So the days of hoping that security is someone else’s problem are over.
The security community has developed a well understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isn’t included in the training of software developers, assuming that it’s only relevant to security specialists.
In this talk, we will briefly discuss why security needs to be addressed as part of architecture work and then introduce a set of proven principles for the architecture of secure systems, explaining each in the context of mainstream system design, rather than in the specialised language of security engineering.
This version of the talk was presented at GOTO London in October 2016.
The 15 Most Common Body Language MistakesBernard Marr
Body language matters. Our brain relies on snap judgements to categorize another person and predict whether they are trustworthy, threatening, competent, likeable, etc. Here are the top 15 body language blunders to watch out for.
Chapter 8 - Case Study - Identifying a CIA Agent - JNL-2105 - Journalism Ethi...Linda Austin
This presentation details how to apply the 10-question template on page 113 of The Ethical Journalist to the case study in Chapter 8 on whether to identify the CIA agent.
Experian and 41st Parameter - 2015 CNP Expo SessionExperian
A Customer Lifecycle View of Fraud Prevention: CNP merchants are susceptible to fraud. Experian and 41st Parameter focus on viewing fraud prevention through t the entire customer lifecycle. Learn how to spot fraudsters at account opening and emerging risks. Understand techniques that can identify account takeovers and learn the right way to handle login/authentication of returning customers. See how new developments like EMV, NFC and tokenization are affecting individual transactions and how fraudsters are attacking them. Be able to Spot opportunities for growth by leveraging the insight and information of loyal customers
The Intersection of Social Media, Personal Brand, and Reputation ManagementKathleen Hessert
Are you an emerging star, or have aspirations to become one? Are you dedicated to defining your personal brand and want to understand how that differs from a digital brand? Then learn how personal brands, digital brands, and reputation management intersect. Whether your focus is on your own brand or your organizations there are key lessons to learn before its too late.
Cyber Crime: Preparing Your Organization for the New NormalSandra Fathi
Cyber crime is rampant and every organization must prepare itself for the when, not if, they will have a data breach. This presentation was given at Pworld's Crisis Communications Boot Camp in Ottawa, CA June 13, 2019
Lawyers are being held responsible for an increasing amount of client-held data. Failure to understand client collection and storage of electronically-stored information (ESI) can have dire consequences for clients and the lawyers that represent them.
Rather than wait for litigation to occur and having to scramble under discovery requests, law firms should begin guiding and organizing their clients' ESI to identify and prevent problems before they occur.
Investigation turns turn discovery on it's head by centralizing and storing information to produce on demand.
The 15 Most Common Body Language MistakesBernard Marr
Body language matters. Our brain relies on snap judgements to categorize another person and predict whether they are trustworthy, threatening, competent, likeable, etc. Here are the top 15 body language blunders to watch out for.
Chapter 8 - Case Study - Identifying a CIA Agent - JNL-2105 - Journalism Ethi...Linda Austin
This presentation details how to apply the 10-question template on page 113 of The Ethical Journalist to the case study in Chapter 8 on whether to identify the CIA agent.
Experian and 41st Parameter - 2015 CNP Expo SessionExperian
A Customer Lifecycle View of Fraud Prevention: CNP merchants are susceptible to fraud. Experian and 41st Parameter focus on viewing fraud prevention through t the entire customer lifecycle. Learn how to spot fraudsters at account opening and emerging risks. Understand techniques that can identify account takeovers and learn the right way to handle login/authentication of returning customers. See how new developments like EMV, NFC and tokenization are affecting individual transactions and how fraudsters are attacking them. Be able to Spot opportunities for growth by leveraging the insight and information of loyal customers
The Intersection of Social Media, Personal Brand, and Reputation ManagementKathleen Hessert
Are you an emerging star, or have aspirations to become one? Are you dedicated to defining your personal brand and want to understand how that differs from a digital brand? Then learn how personal brands, digital brands, and reputation management intersect. Whether your focus is on your own brand or your organizations there are key lessons to learn before its too late.
Cyber Crime: Preparing Your Organization for the New NormalSandra Fathi
Cyber crime is rampant and every organization must prepare itself for the when, not if, they will have a data breach. This presentation was given at Pworld's Crisis Communications Boot Camp in Ottawa, CA June 13, 2019
Lawyers are being held responsible for an increasing amount of client-held data. Failure to understand client collection and storage of electronically-stored information (ESI) can have dire consequences for clients and the lawyers that represent them.
Rather than wait for litigation to occur and having to scramble under discovery requests, law firms should begin guiding and organizing their clients' ESI to identify and prevent problems before they occur.
Investigation turns turn discovery on it's head by centralizing and storing information to produce on demand.
Emotion Drives Behavior: Building a Data Narrativeevolve24
Suffering from data overload? Looking for better answers from all that data? Seth Howell, evolve24's Director of Data Science, walks through a new approach to Big Data analysis and how to transform "all that data" into a compelling narrative.
Principles of Holistic Information Governance (PHIGs) presentation for the January 15, 2014 ARMA Edmonton Chapter lunch event.
PHIGs are a business centric way of looking at managing corporate information.
Integrity Matters Guide to Internal WhistleblowingYatish Mamniya
Praising the bearers of bad news:
The most powerful weapon against fraud is not an algorithm or a checklist but a whistle-blower. The Association of Certified Fraud Examiners calculates that three times as many frauds are discovered by tip-offs than by any other method. It also notes that firms with fraud hotlines, which staff can call anonymously, suffer smaller losses from fraud, and cut by seven months the “exposure gap” between the start of an illicit scheme and its discovery.
A robust internal whistle-blowing mechanism is critical in detecting and deterring internal fraud. It is also a leading corporate governance tool and has one of the highest ROI's among various risk management measures.