Increasing expectations for good governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance. Their thought leadership will provide you with practical advice on how to implement successful GRC strategies and processes for your organization.
DDoS Attacks: More Dangerous to You; Never Easier to LaunchChristina Richmond, Program Director, IDC and Joe Loveless, Product Marketing, NeustarIf your organization cannot afford downtime from DDoS attacks, join this timely discussion from Neustar, with special guest perspective from IDC’s Christina Richmond. Explore the complexity and purpose behind today’s attacks and what you can do to defend your Internet presence. You will learn:
· What the DDoS threat environment looks like today
· Why “smokescreening” is a particular danger
· Where attacks can have impact across your organization
· How you can take steps to thwart DDoS threatsRead more >
Our expert panel will discuss upcoming trends and best practices in infosec policy management for the IOT. The panel will include:
Jennifer Bisceglie, CEO, Interos Solutions
Robert Brese, Executive Partner, Gartner
Ryan Gillis, VP of Cybersecurity and Global Policy, Palo Alto Networks
Gary Hayslip, CISO, City of San Diego, Co-Chair, CyberTECH
Paul Rosenzweig, Principal, Red Branch Consulting
Join Forrester Vice President, Principal Analyst, John Kindervag and Fortinet to learn about how next generation firewalls (NGFW) are changing the way organizations protect themselves. Get a look at the latest research on how IT professionals are using NGFWs to combat today’s threat environment and the requirements for an effective NGFW.
Join Storage Switzerland and Accelerite for a live webinar “How To Prepare for the Disasters that Will Actually Happen”. In this webinar we will discuss how these types of man-made disasters differ from natural disasters, why they’re more costly than natural disasters and what steps IT professionals must take, right now, to make sure their businesses can recover from them.
All registrants attending the live webinar will also be entered into a drawing to win an Apple Watch given away after the webinar.
It’s not if, it’s when you will expand your enterprise footprint into Amazon Web Services (AWS). When organizations shift to a public cloud environment, security and compliance must remain top of mind. While AWS provides robust infrastructure-level protections, today’s attackers target the applications themselves.
This webinar will:
· Discuss inherent AWS security capabilities
· Review attack types that target the applications and why traditional security approaches can’t stop them
· Illustrate how Imperva SecureSphere for AWS stops these attacks and enables you to use the security infrastructure on-prem and in the cloud
Triple-A ratings are normally associated with chief financial officers keeping a tab on John Moody’s bond credit rating. But, in the technology world, how can a chief information officer or IT decision maker rate the efficiency of an IT security implementation?
A comprehensive security approach should encompass three factors. It should be adaptive to threats, business requirements and the ever-evolving use of the internet within the corporate network, have adapted to meet the specific requirements of an organization and have been adopted fully by end users.
These factors can be summarized as a “Triple-A” security approach. If you achieve this, you can strengthen your overall security posture.
Attend our webcast to see how your organization can have the best security possible, and use IT security to drive innovation – instead of blocking it.
With the mobile platform now outpacing desktop users it's important to be informed on what type of threats utilize the smartphone as a vector of attack. This presentation will look at the mobile threat landscape at a glance with statistics over the past couple years as well as its growth to what it is today. We'll also take a few specific threats and take an in-depth look to show the differences compared to PC that have been developed to take advantage of the Android.
Microsoft has announced Windows Server 2003 End of Support (EOS) on July 14, 2015. Many businesses will be forced by circumstances to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments. In addition to various logistical issues, an out-of-support component is vulnerable to attack and may leave the business vulnerable to significant security and compliance risks.
Learn how you can use Advanced Endpoint Protection as a compensating control, so that businesses can keep Windows Server 2003 systems compliant and secure, even after EOS.
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
Both insider and external threats will attempt to exploit highly privileged administrative accounts to perform unauthorized tasks that could lead to data theft or sabotage. In this session we will demonstrate how a SIEM can enable organizations to adopt best practices for managing privileged user activity such as:
Separation of Duties
Audit Privileged Sessions
Forbid All Access Accounts
Real Time Response to Suspicious Privilege Escalation