Carol Alexander, Sr. Dir Security, CA Technologies; Rob Marti, Princ, Prod. Mgr, CA.; Brandon Dunlap
Making it easy for your customers to engage with you requires frictionless security. Begin by ensuring you have modern single sign-on and authentication to provide compelling, simple, yet non-intrusive environments for your customers. Join CA and (ISC)2 on October 6, 2016 at 1:00PM for Part 2 of our Briefings series where we'll examine how to employ analytics to streamline the path to your applications, address hybrid environments (both SaaS and on premise) and ensure AA and SSO are meeting continually emerging challenges of the digital enterprise.
Your business is part of a new digital reality and the digital relationships you have with individuals are your greatest assets. They are also the new perimeter, where identities are the unifying control point across apps & data and users demand access and insight with an exceptional user experience. While all this drives your business, it also opens you up to attacks and breaches. Join CA Technologies and (ISC)2 on September 1, 2016 at 1:00PM Eastern for this first event of a six-part webcast series where you will learn how leaders can adapt to the new digital reality -- embrace new identity and access management strategies that allow you to innovate in ways you never imagined.
Like all cyber threats, ransomware continues to evolve and its effects will cause significantly greater impact to corporate organizations and networks. Just as computer viruses caused more damage as they grew in sophistication, ransomware is increasing its way to enter networks and wreak more havoc. Newer strains now know to look for networked file shares as encryption targets. Do you know what signals to look for to detect ransomware as it begins to attack? Exabeam researchers have analyzed nearly 100 strains of malware and have categorized some of the more aggressive techniques being used. Join Exabeam and (ISC)2 on August 18, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms ransomware might use to propagate and how to detect signs of these mechanisms in use.
The cloud's promise of on-demand functionality for a lower cost has arrived to business applications. The use of Microsoft Office 365 across the globe is growing rapidly, with a clear value proposition to re-invent productivity for organizations of all sizes. But the transition to the cloud is not without challenges. Office 365 offers concerns in terms of privacy, compliance and security which can be addressed through the use of end-to-end encryption for all e-mails and files sent to Office 365. Join HPE and (ISC)2 on August 4, 2016 at 1:00PM Eastern for an examination of the steps for an Office 365 migration, security and privacy concerns for the cloud environment and how to achieve end-to-end encryption.
Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
A global telecoms company ingests 300 million customer records in < 1.5 minutes today. A mid-size firm handles 3.7 billion transactions annually. With Big Data analytics at the heart of all these systems-driving transformation, innovation and new customer insights-these projects include massive quantities of sensitive data that flow across multiple systems. Adding to the complexity of securing your data, these systems are spread across multiple data centers, on premise, and in the cloud. Join HPe Security - Data Security and (ISC)2 on July 19, 2016 at 1:00PM Eastern to understand how enterprises can leverage end-to-end data-centric protection in conjunction with their Big Data systems and view a technical deep dive into how enterprises can gain Big Data Insights - without the risk.
Incident rate. Mean time to discovery. Patch management coverage. These are terms that infosecurity professionals use on a daily basis, but have little to no meaning to those who measure performance in terms of dollars and cents. It's important for infosecurity practitioners to be able to communicate effectively with other departments, particularly the C-Suite and board level. CyVaR allows for the ability to quantify an organization's financial risk exposure to cyber attacks. Join PivotPoint Risk Analytics and (ISC)2 on July 12, 2016 at 1:00PM Eastern for a discussion and demonstration of the CyVaR service and how to reduce financial risk, as well as build a security budget based on ROI.
In the borderless world of Cloud computing, everything changes from anywhere access to anything as-a-service. While organizations are keen to reap the benefits the cloud offers, many fall shy of adoption for two reasons: security and control. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do organizations maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world when the distribution of data may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role? Join HPE Security - Data Security and (ISC)2 on June 28, 2016 at 1:00PM Eastern for Part 1 of a 3 part Security Briefings series examining the key security challenges faced when moving to the Cloud.
In the world of increasing security risks, do you know which threats are most critical to your network? Using actionable intelligence, you can not only identify but resolve immediate threats by applying proactive analytics to your enterprise and create in-depth views of areas of access. This intelligence allows the application of custom analytics to massive amounts of data and provides a comprehensive, real-time view of the multi-dimensional relationships between identities, access rights, policies, resources, vulnerabilities, and more across enterprise systems. Join Core Security and (ISC)2 on June 9, 2016 at 1:00PM Eastern for a Security Briefings that will examine the opportunities for using actionable insight with your data to deter, detect, and remediate vulnerability and access risk.
The volume, size, and sophistication of DDoS attacks have increased rapidly over the years. Is your organization prepared for today’s modern, multi-vector DDoS offensives? Join Imperva and (ISC)2 on May 19, 2016, at 1:00 PM Eastern for the final part of a three-part Security Briefing series where we’ll specifically explore the anatomy and timeline of a complex DDoS attack, as well as the steps used to mitigate each phase of the assault.
As organizations migrate to services like Google Apps and Office 365, there is a growing need to secure data both in the cloud and across mobile devices. With CASB, IT administrators can distinguish between managed and unmanaged mobile devices without invasive agents, yet are able to limit access to sensitive data using granular policy controls. CASBs even enable control over data once downloaded to an end-user's device. Join Bitglass and (ISC)2 on May 5, 2016 at 1:00PM Eastern for the final part of our three-part webinar series, where we discuss the drawbacks of existing mobile security solutions and the ease of deploying a CASB to secure BYOD without hassles.