Hi [[ session.user.profile.firstName ]]

UNISYS

  • Date
  • Rating
  • Views
  • ¿Por qué importa la seguridad?  Perspectivas de Latinoamérica de Unisys Security
    ¿Por qué importa la seguridad? Perspectivas de Latinoamérica de Unisys Security
    Leonardo Carissimi, Security Solutions Director, Unisys Latin America Recorded: Nov 14 2018 62 mins
    Unisys Security Index es una importante encuesta regular de las preocupaciones de seguridad llevada a cabo en todo el mundo. Lanzada a nivel mundial desde 2007, proporciona una medida regular y estadísticamente sólida de las preocupaciones que tienen los consumidores de 13 países con respecto a los principales aspectos de la seguridad, incluyendo seguridad nacional, financiera, personal y ciber seguridad.
    Únase a este webinar para escuchar a Leonardo Carissimi, director de Ciberseguridad para Unisys América Latina, compartir los resultados y realidades de la encuesta sobre de las preocupaciones de seguridad de los consumidores en Argentina, Colombia y México.
    Leonardo usará los resultados de este año, yuxtapuestos con más de una década de historial de encuestas realizadas para proporcionar un informe convincente sobre el estado de la seguridad desde la perspectiva que más importa: la del usuario.
  • Por que a segurança importa?  Perspectivas globais e locais do Unisys Security
    Por que a segurança importa? Perspectivas globais e locais do Unisys Security
    Leonardo Carissimi, Security Solutions Director, Unisys Latin America Recorded: Nov 14 2018 63 mins
    Unisys Security Index é uma importante pesquisa sobre preocupações de segurança realizadas em todo o mundo. Lançado globalmente em 2007, fornece uma medida regular e estatisticamente sólida das preocupações que os consumidores em 13 países têm sobre os principais aspectos da segurança, incluindo segurança nacional, financeira, pessoal e cibernética.
    Participe deste webinar para ouvir Leonardo Carissimi, diretor de Segurança Cibernética da Unisys América Latina, compartilhar os resultados e fatos da pesquisa sobre as preocupações de segurança dos consumidores do Brasil.
    Leonardo usará os resultados deste ano, justapostos com mais de uma década de histórico de pesquisas para fornecer um relatório convincente sobre o estado de segurança da perspectiva que mais importa: o usuário.
  • FBI Warning: Cyber Attacks on ATMs - Are you prepared?
    FBI Warning: Cyber Attacks on ATMs - Are you prepared?
    Joan McGowan, Senior Analyst at Celent and Steve Migliore, Head, Cybersecurity at Unisys Recorded: Nov 7 2018 46 mins
    A recent warning issued to banks by the FBI reads like the script for a Hollywood movie: cybercriminals are plotting a sophisticated, global “ATM cash-out” using cloned credit cards to fraudulently withdraw millions of dollars in just a few hours. A few days later, reports of a $13.5 million heist of 25 ATMs across the globe confirmed the reality that ATMs are a prime target for hackers.

    Are you prepared for when an ATM breach occurs, or more importantly, when a hacker gains access to your network and confidential customer information through your ATM networks?

    Join Unisys and Celent for this very critical, time sensitive topic that will help you understand this increasing threat and how to respond.

    In this webinar we will cover:

    •How global trends, such as open banking, will increase these threats
    •How ATM security fits in your end to end security and risk posture
    •We will be discussing Unisys Stealth®, which is a flexible software suite that leverages microsegmentation to secure critical assets
    •And so much more!
  • Software-Defined Microsegmentation for Regulatory Compliance
    Software-Defined Microsegmentation for Regulatory Compliance
    Bill Parkinson & Jack Koons, Unisys Recorded: Aug 2 2018 60 mins
    Network segmentation is one of the must-have strategies to limit the scope, cost and complexity of compliance. The challenge in segmenting a network with static controls such as firewalls, VLANs, etc is the complexity of management and change. Access Control Lists (ACLs) and firewall rules can easily run into thousands of rules that have to be manually reconfigured every time there is a new application to be rolled out, or changes are introduced in regulations. The result is increased cost and complexity - the very challenge that you were trying to solve.

    In this webcast, Unisys cybersecurity experts will introduce you to a new software-defined network microsegmentation that enables dynamic perimeters to isolate the critical assets without the cost and complexity of static controls. This approach reduces attack surface while also reducing audit scope, cost and management complexity. Microsegmentation is not segmentation. Segmentation is done for network optimization and performance, and should not be confused or conflated with security. Microsegmentation is a security concept first and foremost. Unisys experts will elaborate on microsegmentation concepts with particular emphasis on its use in support of compliance issues. They will then take you through illustrative examples of isolating and securing systems in the context of HIPAA, HITECH and PCI-DSS regulations.

    Attendees of this session will:

    * Gain understanding of key challenges in achieving and maintaining compliance

    * Know the different types of network segmentation and their role - primary, secondary and microsegmentation, etc.

    * Gain ccomprehensive understanding of software-defined network microsegmentation and how it can save you cost, effort and the frustration that static controls introduce

    * Apply software-defined network microsegmentation to HIPAA, HITECH and PCI-DSS regulations using illustrative examples
  • Digital Trust in a Perimeter Less World
    Digital Trust in a Perimeter Less World
    Jack Koons, Global Director for Unisys Stealth, and Mark Alba, Vice President of Product Marketing Recorded: Apr 10 2018 62 mins
    Protecting assets critical to an organizations continued operations, without impeding productivity, is a boardroom balancing act. Traditional approaches to security attempt this balance using fixed security perimeters bolted onto existing IT infrastructure. This approach relies on an outdated model that assigns trust to the device, and not to the user. This approach fails in a perimeter less world where cloud, mobility and purpose-built devices are fluid and dynamic, while the identity of the user is unchanging

    You need a new, preemptive approach to security that creates a perimeter less network that is resilient and survivable. This approach requires you to identify assets critical to your continued operations and making them accessible to only protected communities of trusted users. It requires risk management through the implementation of policies and controls that are translatable across organizational silos each with competing tactical objectives. Finally, the new approach must scale to support dynamic and transformative IT needs, regardless the size of the organization.

    By the end of the session, attendees will:

    - Understand the failures of the bolt-on security approach.

    - Learn key characteristics of a survivable network

    - Key steps to building resilience and survivability with microsegmentation, without dismantling the existing network investments

    - Get an overview of the tools required to align threat response with business objectives.

    - A live demo of Stealth Microsegmentation.
  • Building Zero Trust Model with Microsegmentation in the Cloud
    Building Zero Trust Model with Microsegmentation in the Cloud
    Salvatore Sinno & Jonathan Payne Recorded: Feb 9 2018 63 mins
    The historical approach to business security has focused on defending a fixed perimeter. The objective was to keep threats on the outside of the perimeter like a wall around a castle. However, today the reality is that these same boundaries are harder to define and very porous.

    The assumption that systems and traffic within a data center can be trusted if flawed because once a single host is compromised, moving within a trusted zone is often easy. While it is often hard to directly attack high-value assets from outside the network, using an indirect attack using systems inside the network is much simpler, although more time-consuming.

    The Zero Trust architecture is an ideal solution for the cloud where it is not possible to trust the network. The ability to authenticate and secure communication without relying on the location of the endpoints or the security of the network means that our clients can adopt the cloud paradigm and embrace its benefits of cost and flexibility while maintaining control of their data and compliance in virtual environments.

    By the end of this session, attendees will

    - Understand how the zero-trust model embeds security within the cloud

    - Examine the fundamental benefits and tenants of the zero-trust model in the cloud (security persistence, security ubiquity and scalability).

    - Understand how this new paradigm accelerates the cloud adoption.

    - Learn how software-defined microsegmentation delivers zero-trust in the cloud
  • Managing Security and Risk for Digital Transformation in Financial Services
    Managing Security and Risk for Digital Transformation in Financial Services
    Nicholle Lindner, Industry Director; Leon Manson, Lead Cybersecurity Architect; Ian Selbie, Solution Director, Unisys Recorded: Nov 30 2017 75 mins
    Consumers are enjoying a rapidly expanding choice of how, when and where they bank. However, banks must now manage the extra responsibilities and risks these new channels bring.

    In APAC, the Unisys Security Index™ revealed consumers are more concerned about bankcard fraud, ID theft and cyber security than about physical threats like the threat of war/terrorism and natural disasters.

    So how can banks balance the need to digitally transform, maintain privacy and security but still provide a seamless, personalized and trustworthy customer experience?

    We will cover:
     The 10 steps banks need to take to get digital transformation right, and how to improve customer experience and trust during this journey.

     How the CISO’s office can be part of the digital transformation journey, embedding security as part of the development lifecycle from the start as a value added component and not a burden as an afterthought.

     Innovative technologies like predictive analytics and biometrics can help provide a seamless, frictionless experience for customers. But how can they be applied without seeming invasive?

    Speakers:
    Nicholle is an experienced senior financial services executive with almost 20 yrs experience working in financial institutions and corporates. She has extensive knowledge across financial services, payments, consumer and business banking, IT, analytics, marketing and strategy. 

    Leon Manson, Lead Cybersecurity Architect for Unisys APAC, is responsible for the range of real-time protection solutions delivered through Unisys Managed Security Services. Leon has over 25 years IT security industry experience in consulting and systems engineering for startups, tier-one vendors, and as a business owner.

    Ian Selbie is responsible for Unisys Financial Industry solutions in APAC focused on enhancing business processes and compliance in financial institutions including omnichannel, financial crime prevention, enterprise payments and case management solutions.
  • Machine Learning Analytics for Financial Services
    Machine Learning Analytics for Financial Services
    Rodrigo Fontecilla,Vice President and Global Lead for Analytics, Unisys & Maria Allen, Senior Director & Global Head, Unisys Recorded: Oct 25 2017 61 mins
    Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.

    About the Speakers:
    Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.

    Maria L. Allen is Senior Director and Global Head of Unisys' Financial Services Portfolio Solutions. In this role, Maria is responsible for building new products and services across all regions, platforms and channels ensuring that solutions and services are delivered in a way that enable our clients to meet their strategic goals and objectives.

    For more information on our Advanced Analytics offerings contact us at advancedanalytics@unisys.com and visit http://www.unisys.com/analytics
  • Isolate the Critical: How to Deploy Microsegmentation for Operational Resiliency
    Isolate the Critical: How to Deploy Microsegmentation for Operational Resiliency
    Erin Kelly & Chip Yeager (Unisys) Recorded: Oct 11 2017 61 mins
    It's time for a new approach. In an environment of complex multi-variant threats, targeted attacks on personally identifiable information and regulatory penalties that have the potential of bringing a business down, assumption of compromise is the norm. In fact, security professionals who must balance the delivery of productivity enhancing IT innovation with the requirement to maintain a solid security posture, have found a new approach.

    Join us on this webinar to learn how having immediate visibility into the critical engagements between your organization's assets, and being able to isolate the critical, will allow your organization to be resilient against attacks.

    In this webinar, we will discuss:

    - The basics of microsegmentation
    - How security professionals implement an intelligent segmentation strategy
    - Real use cases and practical considerations when implementing microsegmentation
    - Available technologies that provide total network visibility and help you define and implement security policies in complex environments

    Speaker Bios

    Erin Kelly
    Erin is the Director of Product Management for Unisys Stealth software. Erin has worked in the security product management space for years, focusing on cloud, mobile and on-premise security solutions. Prior to that Erin managed products in the Windows server and mainframe spaces.

    Chip Yeager
    Chip is the Sr. Product Manager for Unisys Stealth software. He is an experienced security technologist with a background in systems programming and security software. In his current role, Chip is dedicated to working with Unisys clients to demonstrate practical micro-segmentation, and how to implement within each client’s custom environment.
  • Seus clientes confiam na segurança da sua empresa, produtos e serviços?
    Seus clientes confiam na segurança da sua empresa, produtos e serviços?
    Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys Recorded: Oct 5 2017 61 mins
    Saiba mais sobre as preocupações dos seus consumidores!

    O Unisys Security Index mede as preocupações dos consumidores em questões relacionadas à segurança nacional, pessoal, financeira e da Internet. O Unisys Security Index mostrou um aumento de 20% na preocupação de segurança geral em 2017. Saiba mais neste webinar onde iremos apresentar os detalhes do estudo e falar sobre como lidar com ameaças cibernéticas, o que os consumidores pensam sobre Internet das Coisas, e como aumentar a confiança de seus consumidores enquanto sua empresa avança na Transformação Digital.

    Leonardo Carissimi, Especialista em Segurança e Diretor de Soluções de Cybersecurity para América Latina da Unisys. Possui mais de 20 anos de experiência no setor de segurança. Na Unisys, ajuda a construir um mundo mais seguro, ao mesmo tempo em que transforma o setor de segurança com uma inovadora abordagem de microssegmentação, bem como a arquitetura de segurança adaptativa e a inteligência de ameaças cibernéticas.

Embed in website or blog