Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • Up and Running in AWS, Now What About Security? Up and Running in AWS, Now What About Security? Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Jul 21 2016 54 mins
    For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.

    Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Tradition is out: where traditional security does and doesn’t fit
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • How Blockchain Technology is Improving Compliance and Security How Blockchain Technology is Improving Compliance and Security Rob Laurence, Michael Gronager (Chainalysis), Lory Kehoe (Deloitte), John Erik Setsaas (Signicat), Leda Glyptis (Sapient) Recorded: Jul 21 2016 56 mins
    It goes without saying that compliance and security have the highest of priorities within an organisation. In the digital world, however, effective compliance and security comes at a high cost. In this session we consider the value of Blockchain technology in ensuring compliance and security in digital transactions.

    Join the panel where the following points will be discussed:
    · Where is Blockchain being used to deliver compliance and security?

    · Does Blockchain actually improve compliance and security?

    · What case studies exist to actually demonstrate this?

    · What role does Blockchain have with device-to-device communications and the IOT?

    · Can Blockchain improve the customer experience in user-centric digital services or is it just an underlying technology?

    · Is Blockchain better than existing technologies and approaches or is it really just hyped up by the tech industry?
  • Security practices for safe mobile money transfers Security practices for safe mobile money transfers Tom Meredith (SmartToken Chain), Ali Raza (CCG Catalyst) Recorded: Jul 20 2016 62 mins
    Every person on the planet has a mobile phone, but 2 Billion people are “Un-banked”.
    Banks and telecoms are in a Gold Rush to bank the unbanked, but many obstacles remain. Money transfers are some of the most popular transactions made by both the banked and the unbanked. However, building trust in this new service is definitely a challenge.

    Join this panel where discussion points will include:

    -Who has the upper hand: Banks or Carriers?
    -How can Fintech companies ensure trust and security when it comes to mobile money transfers?
    -Global ISO Standards Authenticate ID and Asset Verification
    -ISO Reduces Fraud and Speeds up Asset Transfers
    -What are some of the security challenges new payment services are able to overcome?
    -Are “Standards” emerging to reduce implementation and compliance costs?
    -How do you create cross-border and Inter-bank/carrier transactions?
    -How can banks and telecoms successfully bank the unbanked?
  • Bigger Bang for the Buck: Agility with Security for Financial Services Bigger Bang for the Buck: Agility with Security for Financial Services Maya Malevich - Director, Product Marketing Tufin and John Parmley- Area Vice President - US West, Tufin Recorded: Jul 19 2016 43 mins
    For many financial services organizations, security and risk management is a necessary evil that slows down IT's ability to keep up with business needs. The conflict between security and agility becomes even greater with adoption of hybrid cloud platforms. While agility should be maintained, security and compliance become even more challenging.

    By automating and orchestrating network security policies across physical and hybrid cloud platforms, it is possible to maximize both agility and security simultaneously.

    Join us for this session to understand how network security change automation with inherent policy controls can help you stop the balancing act between agility and security and maximize both for your business.
  • Best Practices to Protect Your Organization from a Cyber Attack Best Practices to Protect Your Organization from a Cyber Attack Mac McMillan, CEO and Co-Founder of CynergisTek Recorded: Jul 14 2016 64 mins
    As data breaches are becoming more prevalent, and more organizations are becoming targets for malicious attacks, the stakes are especially high for the healthcare industry.
    Join this presentation to learn about the current cybersecurity threats and the tactics for defense organizations need to deploy for early detection and incident response. Mac McMillan, CEO and co-founder of CynergisTek will illustrate what an attack looks like, the phases of the hack, and how to use technology as well as policy to aid in detection, and then how to construct a disciplined incident response process. Lastly, learn how all of this should be integrated into a comprehensive information security strategy.
  • Applying Web Isolation to Prevent Advanced Threats Applying Web Isolation to Prevent Advanced Threats Dan Amiga, CTO and Co-Founder, Fireglass Recorded: Jul 14 2016 43 mins
    Conventional security solutions have been failing in preventing advanced threats. Join to learn how web isolation is revolutionizing cyber-security by indisputably eliminating critical attack vectors including browsers, emails and documents
  • Cloud Object Storage 101 Cloud Object Storage 101 Nancy Bennis, Director of Alliances, Cleversafe an IBM Company, Alex McDonald, Chair, SNIA Cloud Storage Initiative, NetApp Recorded: Jul 14 2016 63 mins
    Object storage is a secure, simple, scalable, and cost-effective means of embracing the explosive growth of unstructured data enterprises generate every day.
    Many organizations, like large service providers, have already begun to leverage software-defined object storage to support new application development and DevOps projects. Meanwhile, legacy enterprise companies are in the early stages of exploring the benefits of object storage for their particular business and are searching for how they can use cloud object storage to modernize their IT strategies, store and protect data while dramatically reducing the costs associated with legacy storage sprawl.
    This Webcast will highlight the market trends towards the adoption of object storage , the definition and benefits of object storage, and the use cases that are best suited to leverage an underlying object storage infrastructure.
    In this webcast you will learn:
    •How to accelerate the transition from legacy storage to a cloud object architecture
    •Understand the benefits of object storage
    •Primary use cases
    •How an object storage can enable your private, public or hybrid cloud strategy without compromising security, privacy or data governance
  • Office 365 Security and Compliance – Enforcing the 4 Layers of Trust Office 365 Security and Compliance – Enforcing the 4 Layers of Trust Brandon Cook and Srini Gurrapu of Skyhigh Networks Recorded: Jul 13 2016 50 mins
    Office 365 usage has tripled in the last 9 months as more and more companies enable anytime, anywhere access to Microsoft’s suite of cloud services. But security and compliance require a new level of granularity when users access cloud-based systems of record from a variety of networks, locations, and devices.

    In today’s cloud-first, mobile-first world, IT Security teams are creating variable trust models based on user, device, activity, and data sensitivity. In this session, we’ll share the proven 4-layer trust model for security and compliance in O365.
  • How the Latest Trends in Data Security Can Help Your Data Protection Strategy How the Latest Trends in Data Security Can Help Your Data Protection Strategy Ulf Mattsson, CTO, Compliance Engineering Recorded: Jul 13 2016 58 mins
    Data breaches are on the rise. The constant threat of cyber attacks combined with the high cost and a shortage of skilled security engineers has put many companies at risk. There is a shift in cybersecurity investment and IT risk and security leaders must move from trying to prevent every threat and acknowledge that perfect protection is not achievable. PCI DSS 3.2 is out with an important update on data discovery and requirements to detect security control failures.
    In this webinar, cybersecurity expert Ulf Mattsson will highlight current trends in the security landscape based on major industry report findings, and discuss how we should re-think our security approach.
  • Protecting employees on the move with cloud-friendly application segmentation Protecting employees on the move with cloud-friendly application segmentation Paul German of Certes Networks Recorded: Jul 13 2016 52 mins
    Changed business practices, such as employees working on the move and the adoption of the cloud and cloud resources, should be mirrored by a change in security strategies. Organizations are commonly reluctant to adopt cloud technologies over concerns with security and control over enterprise data. However at the same time, many of these same organizations opened up access to applications for employees on the move, users on personal devices, external contractors, and other third parties that created a significantly larger attack surface than cloud services would have. To combat these threats, a number of cloud-friendly segmentation and application isolation techniques can be deployed to allow organizations to safely use the cloud whilst reducing their attack surface. Specifically, application segmentation via software-defined security represents a technique to accommodate borderless applications, adoption of the cloud, and modern user behaviours.

    Paul German, VP in EMEA, will discuss how the challenges presented by the next generation of information security can be overcome with practical examples and best practice tips.

Embed in website or blog