The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
What is DevOps, and what does it mean for security? In this session, we’ll talk about trends driving adoption of DevOps, and what are the security challenges posed by automated, API-driven frameworks and agile application development. We’ll then jump into a demonstration of how Imperva SecureSphere can be leveraged in a DevOps environment to provide state of the art protections against application attacks.
Schools today require not only better education for tomorrow's leaders and cost-saving efficiencies, but always-on connectivity from their network solutions. This is becoming apparent as modern instructional practices have evolved with digital advancements such as digital textbooks, flipped classrooms, online testing, and cloud-based tools designed to enhance teaching methods.
With these changes comes the need to find affordable, easy to manage solutions for applications such as school bus WiFi, physical security, digital signage, network resiliency, and a myriad of other applications to help schools meet the changing needs of students, teachers, and the community.
Join Ed Walton, VP of the North Central, and Roger Billings, Global Solutions Architect at Cradlepoint, for a live webinar on March 15th, 2018, at 9:00 am PT and learn more about solutions for optimizing network connectivity for K-12 education.
Webinar attendees will learn about:
- The benefits of LTE connectivity in the classroom
- How WiFi on bus fleets helps students complete homework & tames bad behavior
- How to ensure network access is secure & CIPA compliant
- Always-on connectivity with reliable LTE failover for testing & administration
- Single-pane-of-glass cloud management for ease of use & network efficiencies
Worried that your business will be the next target of a ransomware attack? Wondering if your data backups are safe from the attack and can be restored? You’re not alone. A company is hit by ransomware every 40 seconds and despite paying the ransom, one in five businesses never get back their files. Join us to learn the basics about ransomware and how you can counter these attacks with the right data protection solution.
O Brasil iniciou a migração para o padrão EMV em 1999, hoje quase todos os cartões de crédito emitidos no país são protegidos com um chip e uma senha. Fabio Assolini e Thiago Marques, analistas de segurança da Kaspersky Lab irão mostrar nessa apresentação como criminosos brasileiros aprenderam a clonar esses cartões, usando a técnica conhecida como "golden ticket", válida na maioria dos sistemas de pontos de vendas no país.
Taking a workshop approach: GDPR compliance has been described in many ways, but often as confusing, difficult and even impossible. A recent Commvault survey revealed that only 21% of organisations said they felt they have a good understanding of what it means in practice, with only 17% saying they fully understood the impact on the overall business. For many then, it’s safe to say that it needs demystifying.
This session will show the benefits of running a workshop geared towards a greater understanding of the impact of GDPR on your organisation. By profiling the responses from key stakeholders in your security, legal, risk and IT teams, you can throw a spotlight on:
•Where you really are with regard to GDPR
•Areas of risk specific to your organisation
•What the most pressing gaps are, so you can develop a plan
Above all, for GDPR working groups struggling to set priorities or achieve consensus, this workshop approach will help you construct a path, unique to your organisation and tailored to your specific needs.
Prior to the implementation of the Keylight Platform, Claims Recovery Financial Services’s (CRFS) policies and procedures were scattered throughout the organization’s networks. With a vast number of compliance requirements and multiple client audits each year, the company’s existing policy and compliance management process was inefficient and costly.
In this 60-minute webinar, Deborah Cheek, CISO at CRFS, will discuss with Sam Abadir how implementing the LockPath Keylight Platform transformed CRFS’ policy management and compliance program, streamlined its internal policy management process, increased user adoption of its GRC program, and ultimately helped the company gain a competitive advantage.
Three primary storage challenges that keep IT up at night:
1. How to keep up with application performance demand
2. How to affordably manage and store the vast amount of data that IT has to store
3. How to protect that data so that applications can quickly return to service if a server, storage system or entire data center fails
To meet these challenges IT has either used multiple solutions from multiple vendors, creating cost overruns and massive complexity or they have to try to consolidate to a single vendor via hyperconvergence or cloud migration leading to inefficient use of resources and feature shortfalls.
Underground cybercriminal flora and marketplaces have a lot to hide – from recent trends to upcoming prospects, from leaked vulnerabilities to the newest financial malware samples. Sergey Lozhkin, security researcher at Kaspersky Lab, will show you what can be found there. Join the talk and learn what can be done with the help of proper underground threat intelligence – and how it could help your business before any attack takes place.
Want to know more about credit card hijacking? Join our next webinar (in Portuguese): https://kas.pr/9a1x
Recent trends suggest a continued increase in popularity of ATM “jackpotting” operations leveraging various tactics, techniques and procedures (TTPs). While we have observed an increase in the use of ATM malware in underground communities since 2011, highly publicized events demonstrating the potential for lucrative profits from ATM jackpotting operations have undoubtedly sparked more interest in this attack vector. Join this webinar to learn about the marketplace dynamics enabling ATM jackpotting, common TTPs used by criminals, and what organizations can do to mitigate risk associated with these operations.
The art of cyber-threat hunting keeps businesses aware of recent or upcoming threats, and enables them to protect the organization from attacks and breaches before it's too late. But what if criminals go totally under the radar? Vicente Diaz, security researcher at Kaspersky Lab, will present the most recent trends in the world of cybercriminals and how they avoid even the most sophisticated threat hunters. Join the webinar to learn how to harvest intelligence when the criminals are completely in the shadows.
Want to know more about challenges to cyber-threat intelligence? Join our next webinar:
Join us for a webinar on how to approach the modernization of your existing.NET Framework web or service-oriented applications. App modernization, commonly referred to as “lift and shift”, is the action of moving a workload to a newer or more modern environment without altering the application's code and basic architecture.
We’ll examine how to move your existing .NET Framework server-applications directly to Azure by modernizing specific areas, without re-architecting or recoding entire applications.
We’ll also highlight the benefits of moving your apps to the cloud and partially modernizing apps by using a specific set of new technologies and approaches, like Windows Containers and orchestrators in Azure.
At the end of the hour, you’ll see:
- An intro to the cloud migration maturity levels (Cloud-Infrastructure Ready, Cloud-DevOps Ready and Cloud-Optimized)
- How to containerize existing .NET Framework apps with Windows Containers (e.g., -
- Monolithic WebForms and ASP.NET MVC web apps)
- Deploying and running your containerized app into an Azure VM
- Deploying and running your containerized app into Orchestrators in Azure (Kubernetes and Service Fabric)
- DevOps and CI/CD pipelines in VSTS deploying to the same environments in Azure
- Demos for each scenario
As a healthcare provider, it's essential to perform machine reasoning analysis on-demand with Splunk. Wouldn't it be nice to have a solution that allows you to get to the cloud, scale on-demand and reduce costs?
ClearSky Data and Gemini can help. Join us on March 13th from 1-2pm ET to learn how we plan to help you increase your top line revenue and save over 50% on your Splunk investments.
Personal health information is private and precious. Medical organizations and healthcare professionals hold this data in trust – but is that trust justified? Yuri Namestnikov and Denis Makrushin, security researchers at Kaspersky Lab, have analyzed public sources and uncovered a number of vulnerabilities in healthcare organizations that threaten data. Join the webinar to learn how to secure your business perimeter.
Please find more by the link – https://securelist.com/time-of-death-%D1%81onnected-medicine/84315/
Want to know more about underground financial threats? Join our next webinar:
Didn’t make it to the Security Analyst Summit to catch the latest intelligence on advanced cyber threats? Join our jargon-free kick-off session to find out what some of the most sophisticated threat actors are up to: their tools, techniques and targets, and how to spot and combat them and keep your business safe.
Want to know more about cybersecurity in healthcare? Join our next webinar: https://kas.pr/1ryh
Druga część prezentacji odnośnie Commvault Edge Protection - pokaz możliwości rozwiązania w kontekście self-service dla użytkownika, działania aplikacji na smartfony, samodzielnego włączania zabezpieczeń przed wyciekiem danych etc.
In our uncertain regulatory climate, complying with regulations and managing policies demand that organizations be adaptable. For firms that are still using office tools like word processors, spreadsheets and emails, the challenge to adapt is even greater. In this live webinar, Lockpath’s Sam Abadir will share a roadmap to smarter compliance and policy management.
Attendees will learn:
• What compliance and policy management encompasses
• Communication strategies for working with cross-functional teams
• How organizations are bringing automation to manual processes
• Low-hanging fruit for quick wins and ideas for sustained growth
The road ahead is uncertain and demands that organizations adapt. Why stop there? Keep going to reach a better place with your compliance and policy management program. Explore what you need to know in this educational webinar.
2017 was a historic year for women and feminists around the world. With the #metoo and #knowno campaigns, gender gaps and disparities were brought to light in ways they hadn't been before.
Now it's a new year and with it comes new challenges for women in hi-tech careers: whether it be navigating your career through these times, finding or becoming a mentor, building your personal and professional brand as a leader, dealing with office politics or maintaining work-life balance, the challenges and opportunities for women in the workplace are endless.
Join this expert panel with moderator Jeanne Morain and panelists Emerald de Leeuw, Executive Director, EuroComply Data Protection Technology, Jill Donahue, Sr. Director of Marketing, PC Connection, and Andrea Short, Director, Supplier Marketing at Tech Data.
They will share personal stories and experiences, tips and best practices, problems and solutions around these and other topics for women in tech leadership.
Bots. They generate over half of the internet traffic and over half of the bots are malicious (or of questionable value). Bots can make your systems vulnerable to scraping bots, account takeover bots, impersonators, spammers and hackers.
Impreva will share data gathered from their security research team about the most recent bot trends, how bot traffic is changing, where it’s coming from, and the top actions you should be taking to mitigate the effects of bad bots on your websites. Join us for Part 1 of a 3 Part Security Briefings series and understand how commercial services take a multi-layer approach to bot mitigation and management and whether one of these services may be appropriate for you.
Ever encounter requests from application owners that are not aligned with your change templates?
IT operations teams often experience communication gaps with application teams that may result in delays and productivity losses.
Join Maya Malevich and Erez Tadmor as we discuss the current landscape and how application-driven automation will:
•Bridge the language gaps between operations and applications ’ teams
•Increase the speed and efficiency of processing changes
•Improve security posture and enforce policy compliance
•Ensure connectivity of business-critical applications
This webinar is the third in the Tufin Automation Journey series.
Whether you are looking to refresh your protection strategy at your enterprise's remote office locations or you are looking to bring cloud enablement to your business’ small or mid-sized IT environment for the very first time – you know that you can trust your mission critical data to Dell EMC. Join us to learn about Dell EMC Data Domain DD3300, the newest member of the modernized Data Domain family. DD3300 delivers simple and comprehensive protection storage that is cloud ready with support for DD Cloud Tier for long-term retention & DD Cloud DR for disaster recovery. DD3300 enables you with efficient multi-site scalability – all at entry-level pricing. Mark your calendars now!
One of the challenges that people face when using LinkedIn for business, is knowing what to say to their connections and ideal potential clients.
We will share with you some of the proven messages that we and our clients use on LinkedIn, so that you will know what to say to your ideal potential clients in order to generate more leads, appointments and sales for your business.
Organisations around the world are embracing cloud solutions like Office 365 at a breakneck pace, but online collaborative platforms can leave an unprepared organisation vulnerable to cyber-attacks. Who is accessing your cloud applications? Are they truly authorised users, and are they conducting illegitimate activities?
Without sufficient visibility, detection and protection, it can be easy for a cyber-criminal, or rogue employee to slip through the cracks – and when they do, your sensitive data won’t be their only target. Cyber-criminals have been known to load partial payloads for ransomware attacks, access email accounts for targeted phishing campaigns, host malware on SharePoint, and more.
On 6 March 2018, Symantec will be hosting the ‘Securing the Cloud Generation: Who’s Using My Cloud’ webinar. Join our speaker and panel of experts as they discuss:
•The state of today’s cloud security landscape
•How to detect unauthorised access or risky user activity
•How to protect your cloud from cyber threats
Sign up for the webinar now, and gain critical insights on cyber security in the era of cloud applications and services.
This webinar will introduce participants to the BCI Good Practice Guidelines 2018 Edition, which is the leading global guidance for business continuity and resilience professionals since it was first issued in 2001. Key Objectives: 1.Introducing the Business Continuity Management (BCM) lifecycle that provides a framework to structure the approach to business continuity. 2. An overview of the six professional practices within the BCM lifecycle 3. A review of key changes between the GPG 2013 and the new GPG 2018 Edition. 4. An overview of the BCI CBCI Certification Course based on the GPG 2018 Edition. Who is the webinar for? This webinar is relevant to anyone with a business continuity and resilience related role, which can include, but is not limited to, those working in risk management, information security, physical security, emergency management, facilities management, health and safety, communications and human resources.
As the ‘public profile’ of cybercrime continues to increase, enterprises are encouraged to look at how they keep their businesses and customers safe by sharing intelligence, best practice and defense measures.
Join Nahim Fazal, Head of Cyberthreat Intelligence at Blueliv, for a webinar reflecting on the incidents and trends discussed in Blueliv’s annual cyberthreat report, and guidance on how organizations of all sizes can protect themselves in an ever-more sophisticated threat landscape.
The report combines intelligence gathered through Threat Compass with insight from the Blueliv analyst team, leading to informed assessments about the current state of play and areas which require immediate attention.
Register today to reserve your spot.
Blueliv is leading a new wave of proactive, real-time threat monitoring that protects organizations from the outside in, radically reducing attack success rates and improving incident response performance through fresh, actionable intelligence. The in-house team is bolstered by the Blueliv Threat Exchange Network, a global community of thousands of security experts united in the fight against cybercrime.
With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.
Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.
" Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
" Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
"Understand how these regulations can enable you to gain trust and enhance customer experiences
Découvrez la simplicité et l'efficacité de la nouvelle console d'administration et d'exploitation de la solution Commvault
Comment gérer la protection de vos machines virtuelles, serveurs de fichiers et application en quelques clics avec Commvault ? Laissez-nous vous montrer la nouvelle interface de Commvault pour les serveurs, applications et machines virtuelles.
Dans ce Webinaire, vous allez découvrir une interface simple et intuitive pour réaliser vos opérations d’ajout d’environnement à protéger, vos accès aux données pour les restaurer, le suivi des jobs et alertes, les rapports proposés et un tableau de bord qui vous permet en une vue de vous faire une idée sur le bon fonctionnement de votre solution Commvault.
C’est le moment d’utiliser Commvault Admin Console pour vous simplifier la vie, avec depuis toujours la solution de sauvegarde la plus performance du marché !
Commvault, simplicité et performance.
I will share my thoughts on how we overcome a lot of objections by creating certainty around our products/services, us and our companies. Increase credibility, position ourselves as the expert or authority figure to gain control of an inquiry so we may find it easier to close. I will also look at how this will have a positive impact upon your prospect.
The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.
With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?
In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.
About the presenter:
Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
87% ankietowanych dyrektorów działów IT jest przekonanych, że ich obecne zasady i procedury narażą ich na ryzyko po wejściu w życiu RODO
Największym wyzwaniem związanym z zachowaniem zgodności z RODO jest fakt, że dane osobowe mogą znajdować się w dowolnym miejscu. Pomyśl tylko, ile kopii czyichś danych osobowych może być rozsianych po Twojej organizacji.
W jaki sposób zagwarantujesz zgodność z RODO we wszystkich źródłach niestrukturyzowanych danych? Laptopy, urządzenia mobilne i inne punkty końcowe? Poczta elektroniczna? Chmury osobiste? Serwery plików i systemy zarządzania treścią z setkami lub tysiącami uprawnionych użytkowników? Kopie dev/test? Aplikacje business intelligence (BI) i analityczne?
Aby zapewnić zgodność z RODO, najprawdopodobniej trzeba będzie dokonać fundamentalnych zmian w sposobie zbierania i przechowywania danych oraz zarządzania nimi. Będzie to czasochłonne, dlatego ważne jest, aby podjąć odpowiednie działania juz teraz.
In today’s connected world, devices and data can be found far outside traditional data centers or offices, in places like oil wells, hospitals or factory floors. For these businesses, connectivity can be expensive and unreliable and get in the way of implementing effective IoT solutions.
Azure IoT Edge is a service that allows cloud intelligence to run on your IoT devices locally. With Azure IoT Edge, you can deploy cloud workloads such as Artificial Intelligence, Azure Machine Learning, Azure Stream Analytics, Azure Functions or custom code via containers directly on your IoT device to enable real-time insights.
Curious to learn more? Join us in this webinar, presented by IoT engineering experts, to learn:
- Why and when you should use edge computing as important part of your IoT solution
- How to get started with Azure IoT Edge
- How to create and deploy containers using IoT Edge portal
- Securing your edge devices and solution
Ransomware was the word on everybody’s mind in 2017 with Petya, WannaCry and more. Will this continue into 2018? And if so, how can you ensure your business is protected from the threat of ransomware?
This session will cover:
- An overview of how Ransomware works.
- Can you realistically prevent Ransomware from infiltrating your organization?
- What can you do to protect yourself from an attack?
One of the many benefits of best-of-breed object storage solutions is the ability to scale on demand and pay as you grow. How do you predict your capacity needs and determine your roadmap for scaling your storage? VP of Product Tony Barbagallo and Sr. Consultant John Bell will provide concrete guidance to help you predict your needs so you can accurately map out and budget for your organization’s data growth.
Muchos departamentos de TI no se dan cuenta de que más del 70% de sus datos vive en almacenamiento secundario. Pero conocen de primera mano los dolores de cabeza asociados con el enfoque scale-up para lidiar con el crecimiento de ese almacenamiento y la necesidad de migrar a sistemas cada vez más grandes a medida que se expanden los datos.
La alternativa es una arquitectura scale-out que le permite simplemente expandir la capacidad a medida que la necesita. Además de resolver el problema de escalabilidad, este enfoque es más barato, más fiable y ofrece un coste de rendimiento predecible.
Gartner dice que el 30%1 de los datos ya se ha movido a una infraestructura scale-out, principalmente para almacenamiento primario. Su éxito ahora está impulsando el interés en aplicar los mismos principios al almacenamiento secundario.
En este webinar examinaremos cómo la infraestructura Scale-Out:
•Simplifica la gestión del almacenamiento
•Reduce los costes de infraestructura
•Mejora la fiabilidad y disponibilidad
•Dirige el rendimiento
•Expande el almacenamiento sin fisuras
1Gartner Magic Quadrant for Distributed File Systems and Object Storgae, October 2017
Fellow Cybersecurity Practitioner:
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
This month's theme: Protected Health Information
Do you think security is overdue for actionable forecasts rather than security dogma? Are you a security leader tired of worrying about the next vulnerability with a logo and a web site? If we can forecast the weather, we can use similar models to foresee which vulnerabilities attackers are likely to weaponize.
Join Kenna Security's Michael Roytman, Chief Data Scientist and Ed Bellis, CTO, Co-Founder and ex-CISO at Orbitz for a live webinar where they will debut Kenna Security's new Exploit Prediction, the industry's first vulnerability exploit prediction capability, a significant breakthrough for security professionals looking to develop a more mature proactive approach to vulnerability management.
In this webinar cover:
"How Kenna Exploit Prediction has delivered 94 percent predictive accuracy
"How to adopt a proactive approach to contextualize, prioritize and remediate vulnerabilities, based on risk
"How the Kenna Security Platform with Exploit Predictions can help align security, IT operations, and executive management with a single view of risk
"A demonstration of the Kenna Security platform with the new Exploit Prediction capabilities
Examining 2017 to prepare for what's coming in 2018
The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.
Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
While every organization needs to keep data protected and accessible for its users, many are unaware of the risky protection and recovery gaps when malicious attacks occur or point-in-time recovery is required. Many organizations are asking themselves, “Is Microsoft O365 good enough protection and recovery?” or “Is my on-premises backup solution enough?” Join this webinar to learn where your biggest risks are and how to mitigate them.
Shane Harris - Director Product Marketing, Mimecast
Shane Harris has had varied experience spanning 20 years across IT, Product Management, Sales, Engineering and Research Analyst roles in the areas information management, eDiscovery, archive and compliance. Prior to Mimecast , Shane was the lead analyst for the Enterprise Information Archiving Magic Quadrant at Gartner and has held executive leadership positions at kCura, Commvault and Johns Hopkins. In these roles, he has held countless customer conversations across all verticals and was a frequent speaker, presenter and thought-leader at industry events.
Glenn Brown - Director Product Management, Mimecast
Glenn joined Mimecast in 2007 and is responsible for Mimecast’s archiving, compliance and data resilience products group. He is tasked with defining and bringing the product roadmap from vision to reality and is a passionate advocate of cloud technology enabling strong data resilience strategies.
Knapp 70 Prozent der Unternehmen und Institutionen in Deutschland sind in den Jahren 2016 und 2017 Opfer von Cyber-Angriffen geworden. In knapp der Hälfte der Fälle waren die Angreifer erfolgreich und konnten sich Zugang zu IT-Systemen verschaffen, die Funktionsweise von IT-Systemen beeinflussen oder Internet-Auftritte manipulieren.
Aufgrund der hohen Anzahl von Risiken und Lösungen brauchen Unternehmen zunächst Klarheit, welchen Grad an Sicherheit sie erreichen möchten, um Budget und Ressourcen optimal einzusetzen. Wollen Sie lediglich die gesetzlichen Vorgaben einhalten, den Branchenstandard erfüllen oder Sicherheit als Alleinstellungsmerkmal für Ihr Unternehmen definieren?
Wir erläutern Ihnen unseren Ansatz zum Aufbau einer effektiven Sicherheitsarchitektur, die auf die individuellen Bedürfnisse Ihres Unternehmens abgestimmt ist und bieten Entscheidungshilfen zur Festlegung des notwendigen Grads an Sicherheit. Dabei fokussieren wir folgende Themen:
Bewertung der Ausgangssituation (bestehende Sicherheitsarchitektur)
"Bewertung von Sicherheitsprogrammen
"Fazit: Erstellung eines Aktionsplans in Abhängigkeit von Budget und Ressourcen
Zielgruppe: Geschäftsführer, Sicherheitsbeauftragte, IT-Leiter, Datenschutzbeauftragte und Fachabteilungen, die an der Ausarbeitung von nachhaltigen Sicherheitskonzepten beteiligt sind.
Wielu integratorów technologicznych zastanawia się jak rozwinąć swój biznes o dodatkowe usługi. Przedstawimy pomysł na usługi zarządzalne (Managed Services) oparte o rozwiązania chmurowe. Krok po kroku pokażemy jaki jest rynek w Polsce, jakie daje możliwości, jak zbudować swoje portfolio usługowe, ile to kosztuje i czy da się na tym zarobić.
Les plateformes de sécurité présentent aujourd'hui beaucoup de challenges qui les rendent difficiles à gérer : manque de visibilité, trop volume d'alertes, peu de contextualisation… Le résultat est une perte d'efficacité, et de vitesse dans la prise en compte des incidents de sécurité.
FireEye a conçu une plateforme de gestion des opérations de sécurité avec ces objectifs en tête, plus de visibilité, une meilleure lisibilité et une contextualisation de la menace, le but ultime étant de fournir une plateforme facile à déployer, à administrer et qui répond aux besoins d'aujourd'hui.
Lors de ce webinaire nous couvrirons les points suivants :
Comment HELIX centralise les opérations de sécurité :
- Améliore la visibilité de bout en bout
- Aide à la Priorisation et la contextualisation des alertes
- Accompagne à la prise Prise de décisions et à la levée de doutes
Nous terminerons par une démonstration de la plateforme à travers un Business Case réel et nous laisserons le temps aux différentes questions en live.
Sebbene il GDPR sia soprattutto una questione legale e di compliance, un evento di "data breach" evidenzia la presenza di carenze nel sistema aziendale di protezione dei dati e più in generale nella security posture.
L'articolo 33 del GDPR richiede la notifica delle brecce informatiche entro 72 ore dalla scoperta.
Un tempo decisamente limitato per notificare la natura della breccia, il numero di record e soggetti coinvolti e le possibili conseguenze. Ogni ora conta ed è fondamentale disporre di una visibilità del proprio ambiente completa ed approfondita.
In questo scenario, la rapidità di risposta diventa un fattore critico. Per questo è necessario potersi affidare ad un partner che abbia un'elevata competenza nell'incident response, che disponga di soluzioni di threat intelligence di qualità e di tecnologia atta non solo a garantire una prima notifica rapida, ma anche a supportare le notifiche successive sullo stato di avanzamento del processo di risposta e di rimedio all'incidente.
Ne parliamo il 22 marzo con Marco Rottigni, Sr. Product Marketing Manager EMEA, per comprendere come FireEye possa:
"aiutarti a soddisfare il requisito di notifica incidente entro le 72 ore dalla scoperta della breccia
"ridurre il rischio e l'impatto di una potenziale breccia con la messa in sicurezza di dati sensibili e confidenziali, migliorando le capacità di risposta agli incidenti prima, durante e dopo un cyber attack
Although GDPR is primarily a legal and compliance issue, a data breach is the point of failure that will highlight any deficiencies in an organization’s data protection and larger security posture.
GDPR Article 33 requires breaches to be reported within 72 hours of discovery. With just 72 hours after breach discovery to report the nature of the breach, number of records and subjects affected, and likely consequences, every hour matters, and visibility across the environment becomes a must.
With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.
Join the conversation with Stuart McKenzie, Vice President Mandiant EMEA, to talk about :
· How FireEye can help you meet the GDPR 72-hour breach reporting requirement, should you be breached, and
· How FireEye can help reduce the risk and impact of a breach by securing sensitive and confidential data and improving breach response readiness—before, during, and after a cyber-attack.
This webinar will provide an overview of the future of passwords. Passwords have become very important, protecting a treasure trove of information. You will get an inside look at the techniques and tactics used conduct password attacks. We will discuss the various countermeasures available, new improvements made to the latest operating systems to prevent successful password attacks, and how the industry is trying to eliminate passwords. We will conclude by discussing ways we can potentially circumvent new countermeasures.
Hamza Sirag Hamza is currently an Information Security consultant. He has spent the majority of his time immersed in the world of cybersecurity. He has had the opportunity to lead complex penetration tests for a variety of federal and commercial clients. He is the founder of Beltway Hackers, a Northern VA based meetup group focused on offensive cybersecurity. https://www.meetup.com/Beltway-Hackers
Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.
Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.
Qualifying participants will earn 1 CPE credit.
- Discover how to identify, catalog, and prioritize risks across the enterprise
- Find out how to quickly measure critical activities and address inherited risk
- Learn how to gain efficiency and effectiveness of current risk-management approaches
When it comes to cyber-risk, the most exposed part of any organization is also the least protected; endpoints. Much of the data on laptops and other devices is unique and not stored on storage owned by the organization, but endpoints are often the first casualties of a cyber-attack. Given the new threat organizations need to provide complete protection, which not only includes protection from device failure but also ransomware attacks, device theft and litigation response.
The challenge for IT is providing this protection without disrupting the user. If the protection solution gets in the way of the user, they will disable it, putting not only their data at risk but leaving the organization open to data loss and cyber-breach.
In this live webinar, learn the four requirements of complete endpoint data protection:
1. Truly Transparent Protection (silent deployment, bandwidth optimization, quick cache)
2. Deployment Flexibility - On-premises, Public Cloud or Private Cloud
3. Total Encryption - Protect data in-flight and at rest
4. Beyond Backup Features - Remote wipe, Legal hold
Want to learn from your peers and have real valuable feedback on IT Management and Goals? Join this peer-to-peer webcast!
This webcast has been created as a space to hold conversations with IT Infrastructure professionals who share similar concerns and challenges, as well as success stories and a real-world case study from George Barreto, Enterprise Architect at BFL Canada, on how he addressed the following:
1. Meet IOPS requirements
2. Spend time in labor-intensive operations such as VM Recovery
3. Lack of team expertise for complex operations required his personal time in completing tasks
Join us for live Q&A and discussion with fellow IT professionals!
Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.
With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.
This webinar will consider:
• Key security considerations for a digital transformation strategy
• Why a proactive data defence strategy is crucial
• The benefits of maximising the level of control over data irrespective of where it is created, store or shared.