Hi [[ session.user.profile.firstName ]]

Cavirin-Continuous Security for Hybrid Clouds

  • Date
  • Rating
  • Views
  • Closing the DevOps/SecOps Security Gap
    Closing the DevOps/SecOps Security Gap
    Bashyam Anant, Vice President Product Management, Cavirin Recorded: Dec 17 2018 33 mins
    As 2019 approaches, DevOps & SecOps are looking to minimize the risks due to change management delays and manual processes. Today's existing approaches are good at monitoring and presenting what is wrong, but don’t take that vital next step in automating the correction of any issues.

    In this Webinar we show you how to close the security gap through auto-remediation, combining AWS Lambda functions and Ansible Playbooks. Auto-remediation extends from your cloud security posture to your VMs and container instances, on-prem, or in the cloud.
  • Protecting Our Critical Infrastructure Starts with NIST CSF [NCSAM]
    Protecting Our Critical Infrastructure Starts with NIST CSF [NCSAM]
    Joe Kucic, Cavirin & Ken Williams, Nissan Motor Corporation Recorded: Oct 24 2018 49 mins
    Our day-to-day life depends on the country’s 16 sectors of critical infrastructure. From healthcare and financial services to energy and network systems, any disruption can be a threat to our democratic society. Security professionals are tasked with putting together a security program to protect our most valuable assets.

    We have asked Joe Kucic, creator of the Verizon Risk Report, and Ken Williams, security leader from Nissan Motor Corporation, to provide us with their top ten tips to creating a successful security program and where NIST CSF fits in.

    The discussion will include, but is not limited to:

    • Getting management buy-in
    • Mapping the NIST CSF Framework to your infrastructure
    • The importance of system hardening
  • Pacific Dental Cloud Migration Strategy on AWS
    Pacific Dental Cloud Migration Strategy on AWS
    Nemi George, Sr Director, Information Security & Service Operations, Pacific Dental Services & Thomas Robinson, AWS Solutions Recorded: Sep 25 2018 57 mins
    Pacific Dental Service (PDS) is one of the country’s leading dental support organizations, providing supported autonomy to more than 630 dental practices. As a support services provider in the healthcare space, PDS is subject to HIPAA and other regulations, which plays a vital role in their journey to the AWS cloud.

    Join us on September 25th as Nemi George, Sr. Director of Information Security and Service Operations at PDS, walks us through the AWS cloud journey: the required planning, timing, best practices, and their experience to-date. Plus, how Cavirin’s CyberPosture intelligence continues to strengthen Pacific Dental’s security posture and meet compliance regulations.

    Then we are lucky to have Thomas Robinson, Solution Architect for AWS look at the shared responsibility model, validating AWS responsibilities, and the tools available for building HIPAA workloads and maintaining compliance. Topics include AWS CloudTrail and Lambda Functions.

    If you are considering migrating to the cloud, this is a must-see event.
  • Putting Together a Successful Cloud Migration Strategy
    Putting Together a Successful Cloud Migration Strategy
    Nemi George, Sr Director, Information Security & Service Operations, Pacific Dental Services & Thomas Robinson, AWS Solutions Recorded: Sep 12 2018 57 mins
    Pacific Dental Service (PDS) is one of the country’s leading dental support organizations, providing supported autonomy to more than 630 dental practices. As a support services provider in the healthcare space, PDS is subject to HIPAA and other regulations, which plays a vital role in their journey to the AWS cloud.

    Join us on September 12th as Nemi George, Sr. Director of Information Security and Service Operations at PDS, walks us through the AWS cloud journey: the required planning, timing, best practices, and their experience to-date. Plus, how Cavirin’s CyberPosture intelligence continues to strengthen Pacific Dental’s security posture and meet compliance regulations.

    Then we are lucky to have Thomas Robinson, Solution Architect for AWS look at the shared responsibility model, validating AWS responsibilities, and the tools available for building HIPAA workloads and maintaining compliance. Topics include AWS CloudTrail and Lambda Functions.

    If you are considering migrating to the cloud, this is a must-see event.
  • California Consumer Privacy Act – A CSO’s Perspective
    California Consumer Privacy Act – A CSO’s Perspective
    Joe Kucic, Creator of Verizon Risk Report Recorded: Aug 29 2018 48 mins
    This summer, California passed a new privacy legislation implementing the strictest privacy controls of any state in the United States going into effect on January 1, 2020. We have asked security expert, Joe Kucic, creator of the Verizon Risk Report, to walk us through what this newest regulation means to a CSO, CISO, and other security professional. Plus what changes enterprises have made to address the GDPR regulations that went into effect earlier this year.

    Join us as Kucic, who held security management leadership roles at Citigroup and GM and is currently the CSO at Cavirin, shares his thoughts on what organizations need to do to survive during this major movement to user privacy and transparency. Joe will be available to answer all your questions and take on a few of ours too. This is 45 minutes of insight through a CSO's eyes that you are not going to want to miss..
  • Practical Full-stack Container Security
    Practical Full-stack Container Security
    banant@cavirin.com, dave@cavirin.com, vrao@cavirin.com, robemar4@cisco.com Recorded: Aug 2 2018 50 mins
    Just when you thought you had container security covered, a vulnerability appeared in the Docker container runtime—an insecure opening of the file-descriptor allowing privileged escalation—Now what?

    Yes, container hardening and image scanning are essential for container security, but automating anomaly detection and threat defenses in the container runtime is now essential. Watch this technical webinar, to learn more about the threat to the evolution of the container runtime layer as well as a simplified approach to container runtime protection as well as how automation enables DevSecOps.

    In this technical webinar/demo, hosted by ISSA (the Raleigh Chapter) you will learn:

    * How container runtime protection complements image, instance, and orchestration security

    * How to automate full stack container security across multiple public clouds even on-prem

    * Automating code promotion through scripting
  • Can Hybrid Cloud Security Posture be Monitored by a “Credit Rating Like" Score
    Can Hybrid Cloud Security Posture be Monitored by a “Credit Rating Like" Score
    Anupam Sahai (VP Product Management) & Bashyam Anant (Sr. Director, Product Management) Recorded: Jun 29 2018 48 mins
    The credit rating single score is used to represent consumer credit risk. While easy to understand, a credit rating score incorporates several signals of consumer credit risk. We believe hybrid cloud infrastructures will benefit from an easily-understood “CyberPosture Score” that provides a meaningful, comprehensive, defensible and extensible view of Security and Compliance risk.

    Join us as Cavirin experts discuss what’s required to obtain a CyberPosture Score—Learn about Cavirin’s breakthrough approach to Security Posture assessment and scoring including:

    >> Verify where your risks are coming from

    >> Identify the differences and correlations of risk and compliance

    >> Determine the criticality of your assets, using the CIA (confidentiality, integrity, and availability) framework across your hybrid infrastructure

    >> Remediate risks utilizing actionable intelligence

    >> Manage configuration drift and maintain golden posture
  • Finding Out Your Cybersecurity Posture Doesn’t Take a Genius
    Finding Out Your Cybersecurity Posture Doesn’t Take a Genius
    Mukul Kumar, CISO & VP of Cyber Practice Recorded: May 23 2018 48 mins
    3.5 million unfilled security jobs in the coming years coupled with increasingly sophisticated attacks doesn’t paint a pretty picture. As Cisco’s SVP security said at RSA this year, ‘we are completely screwed.’ But we don’t have to be, and you don’t have to be a genius either!

    Join us, as we share results of recent surveys from ESG, Cybersecurity Insiders, and Cavirin that look at key concerns when migrating to the hybrid cloud, things like DevSecOps, container monitoring, and continuous compliance.

    We will then provide you a sneak peek into Cavirin’s CyberPosture Intelligence and its simplicity which provides you with a real-time view across your hybrid cloud, both account security posture as well as workload continuous compliance. One button assessments and immediate comparisons to your desired ‘golden posture’ help you maintain control without hiring more security experts.
  • GDPR – An Action Plan to Address the New Regulation
    GDPR – An Action Plan to Address the New Regulation
    Brajesh Goyal (BG), Vice President, Engineering, Cavirin Recorded: Mar 23 2018 32 mins
    Summer is quickly approaching and unfortunately, many organizations let the GDPR deadline slip away. If you are one of the thousands of organizations that missed the deadline, then this is the webinar for you. Download this on-demand Webinar, to find out from experts on GDPR means to US companies and an action plan to automate your compliance and address this global regulation.
  • Cyber Threats are Looming - Leverage NIST CSF
    Cyber Threats are Looming - Leverage NIST CSF
    dave@cavirin.com, rosella@cavirin.com, anupam@cavirin.com, byron@securitist.com Recorded: Mar 7 2018 46 mins
    Cyber threats are looming in 2018. Join Byron Acohido, Pulitzer Prize winner and executive editor of lastwatchdog.com, to learn about the current threat landscape and how your organization can utilize current frameworks and guidelines to become better prepared to handle these threats. Cavirin will demonstrate how customers have incorporated the NIST CSF to strengthen their cybersecurity infrastructures against these looming threats.

    Watch this webcast to learn:

    - The spectrum of cyber threats looming in 2018
    - The major forces in motion to mitigate cyber threats
    - The implications for company decision makers
    - How the NIST Cybersecurity Framework will strengthen your cybersecurity infrastructure

Embed in website or blog