Hi [[ session.user.profile.firstName ]]

Information Security Community

  • Date
  • Rating
  • Views
  • What Does “Next Generation Security” Mean To You?
    What Does “Next Generation Security” Mean To You?
    Patrick Grillo, Senior Director, Security Solutions, Fortinet Recorded: Jul 3 2018 31 mins
    Although overused, Next Generation Security still means keeping up with the challenges of securing today’s networks. The fundamental rule of keeping up with those challenges is having both a vision and an architecture that provides the foundation, regardless of how the market or the threats themselves change.

    This session will focus on what is needed in an evolving security architecture to provide Next Generation Security in a constantly changing environment.
  • What Can You Do When You Can’t Stop Malware?
    What Can You Do When You Can’t Stop Malware?
    Teresa Wingfield, Director of Product Marketing and Robert Zamani, Director, Solution Architects Recorded: Jun 28 2018 31 mins
    Malware detection and prevention solutions are necessary in any organization. But, antivirus and even next-generation antivirus solutions can miss unknown threats, giving malicious software free reign to your systems and data. During this presentation, Nyotron’s Director of Product Marketing, Teresa Wingfield and Director, Solution Architects, Robert Zamani, will discuss why endpoint protection solutions relying on signatures, machine learning models and threat hunting can’t always cope with a never ending number of new attack methods and malware variants.

    While you won’t be able to stop all malware using endpoint security, you can stop the damage it intends to cause. Join us to learn how.
  • Modern Vulnerability Management : Knowledge, Automation, Analytics 
    Modern Vulnerability Management : Knowledge, Automation, Analytics 
    Syed Abdur, Brinqa, Director of Product Recorded: May 24 2018 60 mins
    With growing numbers of new vulnerabilities disclosed every year, increasing attacker sophistication, and a myriad of tools and teams that have to be synchronized for effective response, most organizations struggle with designing and implementing an effective vulnerability management program. In this webinar we discuss 3 key components that all modern vulnerability programs must address :

    - Knowledge: How to create actionable intelligence from business context, threat intelligence, and any other relevant data source
    - Automation: How to implement automation to streamline significant parts of the VM process
    - Analytics: How to effectively engage and inform all stakeholders
  • Machine Learning and AI for Healthcare Fraud Detection and Prevention
    Machine Learning and AI for Healthcare Fraud Detection and Prevention
    Aleksandar Lazarevic, Senior Director, Aetna Recorded: May 16 2018 49 mins
    The United States spent around $3.5 trillion or 18% of GDP on healthcare. According to FBI, the amount of this spending lost due to fraud, waste, and abuse (FWA) ranged between $90 billion and $330 billion!

    This talk will offer practical advice on how to effectively organize and join various healthcare data sources such as claim and clinical data, how to set-up the problem, and how to design an effective machine learning solution to identify FWA leads and expedite investigator review using intuitive visualization to understand the risk factors contributing to those leads.
  • The Future of Payment Fraud Prevention
    The Future of Payment Fraud Prevention
    Rodrigo Camacho, CCO, Nethone Recorded: May 16 2018 35 mins
    Payment fraud prevention tools have existed since the end of the 90s and have improved continuously since. In the last 2 to 3 years we have seen a new paradigm come into the space - machine learning.

    This new technology is perfectly fitted for identifying fraud and is slowly being adopted by the market. Moving forward, using tools like this will no longer be a choice but rather an obligation for merchants. An obligation, as it will be at the origin of a competitive advantage which goes way beyond fraud prevention and will bleed into business intelligence fields.

    In this session, Rodrigo Camacho, CCO at Nethone will walk you through the evolution fraud prevention touching on the following key points;

    How the problem is solved by a large part of the industry today
    The revolution that is happening in the space today
    The halo effect that this revolution is going to have on the rest of business processes
  • Cloud Security - 5 Best Practices To Use in 2018
    Cloud Security - 5 Best Practices To Use in 2018
    Rich Campagna and Salim Hafid Recorded: Mar 21 2018 61 mins
    As corporate data moves into cloud applications like Office 365, Box, and Salesforce, organizations are forced to rethink their security posture. Modern threats to cloud data range from unauthorized access to uncontrolled BYO devices. IT leaders need a forward-thinking approach to cloud security and must consider best practices when expanding the enterprise's cloud footprint, including proper identity management, comprehensive visibility, and zero-day control to name a few.

    Join cybersecurity experts Rich Campagna, Bitglass, Chief Marketing Officer and Salim Hafid, Bitglass, Product Marketing Manager for a deeper dive on these cloud security best practices.

    •Explore the tools and training you need to protect data in any application
    •Learn how cloud-first organizations are securing corporate data
    •Gain insights to better enable employee productivity and mobility
  • SD-WAN is Dead. Long Live Secure SD-WAN!
    SD-WAN is Dead. Long Live Secure SD-WAN!
    Ronen Shpirer, Security Solutions Architect, Fortinet Recorded: Mar 20 2018 46 mins
    In the age of Digital Transformation, SD-WAN is on the lips of all enterprises and service providers. While the operational and commercial benefits of SD-WAN are clear, the focus on these as THE consideration is dangerous, as along its benefits comes a greater cyber security risk.

    This session will focus on Secure SD-WAN and the built-in benefits it provides, from both the operational and security points of view.
  • Basic Security with Cryptocurrencies
    Basic Security with Cryptocurrencies
    Travin Keith, Managing Director at Agavon, Co-Founder at SICOS, and Administrator at BitcoinMarkets Recorded: Mar 14 2018 56 mins
    With the burst of interest into cryptocurrencies, there have been a lot of new users into this innovative world. However, the rush into the space has caused many users to skip key steps in joining the cryptocurrency community, such as understanding what basic security practices they should follow in order to keep themselves and their money secure.

    While there are technical steps to take to secure one's funds, there's also a number of things to keep in mind while interacting with the community.

    This webinar discussion aims to give beginners in the world of cryptocurrencies tips to better protect themselves, their money, and their sanity.
  • Securing Permissioned Blockchains
    Securing Permissioned Blockchains
    David Huseby, Security Maven at Hyperledger Recorded: Mar 13 2018 49 mins
    Multi-party permissioned blockchains present a set of new security challenges for dev ops and system and network administration.

    This webinar will cover why a lot of what we already know from securing N-tier architectures also applies to securing permissioned blockchains. It will also cover what is different and new and discuss strategies for the practical defense of these distributed systems.
  • GDPR's influence on security
    GDPR's influence on security
    Rob Shapland Recorded: Feb 22 2018 43 mins
    Will GDPR have the desired effect? Will it increase security, or see companies regularly hit with catastrophic fines for poor compliance.

Embed in website or blog