Cloud computing has exploded over the past few years, delivering a previously unimagined level of workplace mobility and flexibility. The cloud computing community on BrightTALK is made up of thousands of engaged professionals learning from the latest cloud computing research and resources. Join the community to expand your cloud computing knowledge and have your questions answered in live sessions with industry experts and vendor representatives.
Maranda Cigna, Director of Product Marketing, Rapid7Recorded: Nov 16 201847 mins
Wondering how your peers are solving some of today’s most common incident detection and response challenges? Struggling to implement a security orchestration and automation strategy that can complement your SIEM?
Join a group of Rapid7 customers as they discuss how they have built their incident detection and response programs to combat today’s most prevalent cybersecurity threats. No matter where you are in your cybersecurity journey, our panel of experts will be able to guide you to security success.
Our experts will cover a variety of today’s hottest security topics, including:
1. How they have built their incident detection and response programs with Rapid7
2. Today’s modern threat landscape and the most common threats they are facing
3. Metrics from detection and response programs that are most important to share with executive staff
Wade Woolwine, Director of Managed Services, Rapid7Recorded: Nov 16 201858 mins
Considering adding 24/7 SOC coverage to your incident detection and response programs? Experiencing challenges with operating your existing SOC? Simply adding a SOC to your portfolio without adequate preparation is going to result in poor performance in threat detection, high turnover in valuable resources, and a general underperformance of a heavy financial investment.
In order to get the most from your investment, SOC analysts require full visibility through the right technology, a well-defined mission, team structure, and leadership, and most importantly the SOC must augment existing high-performance security programs.
Join Wade Woolwine, Director of Rapid7’s MDR service and SOC, to learn some of the key considerations that should be in place before hiring your first SOC analyst.
Scott King, Senior Director, Advisory ServicesRecorded: Nov 16 201856 mins
Today’s security and IT teams are struggling to keep up. The digital landscape is constantly changing and between disparate, unintegrated systems and repetitive, manual processes, security teams are having a difficult time getting ahead. There are too many alerts, not enough time to investigate them all, and staff are on the verge of burnout.
Security orchestration and automation (SOAR) tools introduce ways for security teams to streamline and improve their everyday processes. But, is your organization ready for automation?
Join Rapid7 experts for an engaging discussion where you’ll learn:
1. Key considerations that should be in place before implementing automation
2. When is the right time to add automation (and when it isn’t)
3. Which common security tasks are ideal to automate
4. How to prepare your organization for SOAR
Eric O’Neill, Cybersecurity expertRecorded: Nov 16 201865 mins
The world’s fastest growing threat to user data – ransomware – is the notorious malware strain that locks computer files using encryption and demands an online payment to restore access. In fact, ransomware gangsters raked in $5 billion in extortion fees in 2017, and are predicted to loot nearly $12 billion from businesses and consumers by 2019.
Despite how wily and sophisticated ransomware developers are becoming, you can apply proven methods and technologies to fend off their attacks, keep your business up and running, and remain compliant with industry and other regulations.
Join ex-FBI operative and cybercrime expert, Eric O’Neill, to learn how ransomware became the world’s single largest security incident and what you can do to prevent these attacks, including:
•How the most virulent ransomware strains operate
•The most popular attack vectors used by ransomware
•How ransomware became such a fast-growing threat
•What steps you can take to defend against and recover from ransomware attacks
•Why security and law enforcement experts advise against paying the ransom
With a practical, proactive approach, you can fend off attacks and keep your data safe. Find out how so you don’t fall victim.
In this ten-minute talk you’ll find out who’s using it, why deployments are projected to grow over the next few years, and whether you ought to be leveraging it in your own IT environment. You’ll also learn what Cisco’s secret sauce is and why it’s critical to building a truly responsive, agile on-premises private cloud.
Multicloud is the new normal, connecting your on prem infrastructure with multiple public clouds is complex.
Hear how Cisco is creating a clear, actionable path to cloud success. We will give you a list of essential tools across- networking, security, analystics, and management, that you need to get you from wherever you are to wherever you want to go in your multicloud journey. We will also address questions you should be asking yourself, as well as a series of steps you can take to get from wherever you are right now to where want to go in your multicloud journey.
Dan Maier, VP of Marketing at CyrenRecorded: Nov 16 201844 mins
Ransomware such as Petya and WannaCry are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defences. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.
So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.
Download this webinar to learn how ransomware attacks happen and what you can do to protect your business from them.
George Crump, Storage Switzerland and W. Curtis Preston, DruvaRecorded: Nov 15 201855 mins
Ransomware, when it infiltrates an organization, causes most of its damage to user endpoints (laptops, tablets, and smartphones). Endpoints typically make up more than 60% of impacted data. The problem is those endpoints are often the most exposed because they are the least likely to be consistently protected. Those endpoints have an increasing amount of unique data on them that is not adequately backed up. Ransomware is just part of the problem, user error and malicious insiders account for a considerable amount of data loss.
External and internal threats to data combined with the increasing amount of unprotected unique data on endpoints mean that organizations need to reconsider their endpoint data protection strategy. The problem is that in many organizations, endpoint data protection is an ad-hoc process and is not adequately defined by IT. The reason? Most endpoint backup solutions start as consumer solutions and treat the enterprise as an afterthought. IT needs a solution that is designed from the ground up to provide enterprise-class endpoint data protection.
Join George Crump, Lead Analyst at Storage Switzerland, and W. Curtis Preston (a.k.a. Mr. Backup), Chief Technical Architect at Druva for a live webinar to learn the latest strategies for protecting your organization from a Ransomware Attack.
John Gudmundson, A10 NetworksRecorded: Nov 15 201847 mins
With the evolving nature of application deployment, it is critical that these services be dynamically allocable, fully portable, scale on-demand and procured by a simplified license.
You will see a live demonstration of FlexPool™, a software subscription for capacity pooling. This will allow you the flexibility to allocate and distribute secure application services whenever and wherever you need them.
Join A10 Networks and learn how to:
•Achieve on-demand provisioning of app services in seconds
•Maximize ROI with license portability and pay-as-you-grow
•Use modern DevOps tools to simplify license management
Valerie DiMartino Senior Product Marketing Manager, Sony Kogin Principle Product Marketing, Managed Service ProviderRecorded: Nov 15 201852 mins
Azure or adopting Office 365, it’s time to look at SD-WAN to securely connect branch users and deliver and optimized experience that’s eases cloud and SaaS migration. This webinar will explain the advantages that Citrix SD-WAN brings to your Microsoft deployment including tools such as Microsoft Azure Virtual WAN and Office 365 performance.
In this session, you will learn how Citrix SD-WAN helps:
• Securely connect branches to the cloud, SaaS, and the Internet
• Optimize Office 365 connectivity and performance
• Simplify and automate large-scale branch connectivity with Azure Virtual WAN
Omer Singer, Director of Security, Snowflake Computing; Dan Hubbard, Chief Product Officer at LaceworkRecorded: Nov 15 201831 mins
Security For Public Cloud + Security Analytics + Data Warehouse Innovation. Lacework and Snowflake Computing are redefining how data is managed and secured.
Lacework and Snowflake Computing are innovators in their respective markets; data warehousing and security for public cloud. Working together, they deliver powerful and actionable security insights, combined with the most flexible, scalable, easy to use data warehouse on the planet.
Please join Omer Singer, Director of Security, Snowflake Computing and Dan Hubbard, Chief Product Officer at Lacework Inc., to review and demonstrate their upcoming partnership.
Forrester Research and Comcast BusinessRecorded: Nov 15 201856 mins
Join us on November 15th at 2 p.m. ET for “Driving Digital Transformation Through 2019 and Beyond,” a webinar from Forrester Research and Comcast Business, where our expert panelists will explore the key considerations for successful advanced data network technology adoption and long-term strategy.
•Why Digital Transformation is not a “one-and-done” concept.
•The changing narrative around Digital Transformation, as we shift from adding digital features (1.0), to having digital become a core part of an ongoing enterprise strategy (2.0).
•The ways in which the continuous transformation and evolution of a company’s digital initiatives requires a complete re-think of your business’ go-to-market, including how you interact with your customers, how you drive operational excellence, how you approach innovation, and the technologies you use as the foundation.
•Why companies using advanced data networks to embrace Digital Transformation 2.0 experience proven gains in customer satisfaction, revenue, and employee productivity.
•The technologies you can put to work on your own Digital Transformation journey.
Our panelists include”
•Andre Kindness, principal analyst at Forrester Research, serves IT Infrastructure & Operations Professionals. He is a leading expert on enterprise network operations and architecture. His research focuses on networking technology and strategy—such as software defined networking and network function virtualization—for private cloud, remote locations, and hybrid cloud.
•Allan Langfield, executive director, product management at Comcast Business, is responsible for Product Management, Development and Deployment of the Comcast NFV platform, ActiveCore. Allan’s group is focused on delivering a customer-oriented Digital Experience, enabling and integrating services including SD-WAN.
Michael Ferranti, VP, Marketing, Portworx and Anubhav Sharma, VP, Business Development, Nirmata,Recorded: Nov 15 201860 mins
Ready to learn how to manage persistent storage for containers in the multi-cloud environment?
Kubernetes is enabling multi-cloud strategies for the Enterprise like never before. As data is a fundamental element of all Enterprise applications, without a consistent data management strategy, companies have been able to containerize 5-10% of applications, mostly stateless workloads. With Kubernetes adoption, Enterprises have to think about data management strategies because, without it, companies cannot truly adopt multi-cloud. Data backup, data portability, and DR are critical requirements that have to be addressed as part of any robust Kubernetes solution stack.
In this webinar, will be talking about best practices on managing persistent storage in a multi-cloud environment and demonstrate application portability across the clouds leveraging Nirmata and Portworx.
Anubhav Sharma, VP, Business Development, Nirmata
Michael Ferranti, VP, Marketing, Portworx,
Mark Carlson, CGI, Carl Brooks, 451 Research & Jeff Kelly, PivotalRecorded: Nov 15 201861 mins
How is managing a massive cloud-native transformation effort different than the "application modernization factories" that have been around for years? Transforming or modernizing a portfolio consisting of hundreds of existing (aka, “brownfield”) applications is an enormous undertaking that requires a highly talented, cross-functional team.
Attend this webinar with Pivotal, CGI, and 451 Research’s Carl Brooks to learn about the nuts and bolts of managing cloud-native application transformation at scale. After an overview from 451 Research, we’ll dive deep on the roles, tools, and processes required to create a well-run, cloud-native application transformation.
Join us to hear how to replicate this success in your own organization!
Storage Switzerland, Micro FocusRecorded: Nov 15 201857 mins
The number of applications in organization’s data centers is growing rapidly. No longer does IT need to worry about a few mission and business critical applications, it needs to worry about dozens. While all these applications are important to the organization, some are more critical than others.
Establishing service levels greatly improves the organization's ability to meet application recovery expectations. Selecting a service level driven backup application enables IT to manage to those service levels instead of managing jobs. The problem is most backup applications provide little help in enabling IT to maintain service level consistency.
By attending this webinar you’ll learn how to:
* Implement service levels like RPO and RTO throughout the data center
* Establish NEW service levels for copy management and recovered performance
* Fix the disconnect between service levels and data protection applications
Peter Mackenzie, Malware Escalations Manager, SophosRecorded: Nov 15 201847 mins
Join Peter Mackenzie as he discusses the rise of targeted ransomware and why attacks like SamSam, Dharma and BitPaymer are making headlines. Watch a live demo of a ransomware payload being unleashed and the steps you need to protect your organization from similar attacks.
Christopher Liljenstolpe, Chief Technical Officer, Solutions at TigeraRecorded: Nov 15 201845 mins
Kubernetes is widely used to re-architect traditional applications. Many organizations first set up Kubernetes within their on-prem environment and then later expand to the public cloud. This hybrid environment often creates security and compliance challenges with workloads. Join this webinar to learn how to leverage universal security policy definition that works across a hybrid environment.
Charles Milo, Nic Bellinger, Narasimha Valiveti, Bill Borsari, Sailesh MitalRecorded: Nov 15 201861 mins
Have questions on how to automate your data environment at scale and want answers? No presentations, no scripts, no marketing gimmicks, just your questions answered straight up without intervention by corporate hacks. Special guest, Charles Milo, Senior Solutions Architect at Intel joins our senior team of geeks from Datera to answer your questions on how to massively scale and automate a high-performance data environment using applied machine learning to achieve a software defined data infrastructure. You'll learn about what works and doesn't work with a 100% software-driven infrastructure used to power cloud-native applications, get the most out of new technologies like new flash drives and NVMe and not just what Datera does, but why we built the system the way we did and how it operates to powers your data.
Bring your questions, and challenge Nic Bellinger, Chief Architect, Bill Borsari, Field Technical Leader, Shailesh Mittal, Senior Software Architect, and Narasimha Valiveti, our Head of Engineering and Charlie will sit down, geek out with you and get all your questions answered on data today.
Cherie Martin, Sr. Solutions Marketing Manager - ArubaRecorded: Nov 15 201848 mins
The industry is buzzing about the soon-to-be released 802.11ax Wi-Fi standard that will greatly increase wireless speed and optimize client battery life. Are you ready to take your network to the next level? Join us as Aruba’s Cherie Martin, Sr. Solutions Marketing Manager, shares the top three things you need to consider in deciding which technology to choose to give your business, employees, and guests, simple, business-class networking without sacrifice
Sujay Doshi, Sr. SIEM Solution EngineerRecorded: Nov 15 201851 mins
Gaining unauthorized access to internal systems is one of the top mechanisms employed by hackers. Access control systems, however, are not yet equipped with the advanced analytics needed to detect the sophisticated techniques used by hackers. By integrating your SIEM with your SSO/IDM solution, SOC analysts can gain the visibility needed to prevent these access based attacks.
Attend this webinar to hear about:
- Why password access based attacks in cloud environments?
- Threat detection and threat hunting use cases for password-based attacks
- User account based orchestration and incident response actions
- Walkthrough of Securonix - Okta integration with a live demo
How to Get the Right Security Coverage for the Right Resources
There’s a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM (security incident and event management), or expensive traditional security outsourcing vendors.
Get the inside scoop on a new approach to threat management that gives you the right level of coverage for the right resources. Learn how Alert Logic’s seamless combination of platform, threat intelligence, and expert services can provide a simpler, more cost-effective approach to security for all your infrastructure and workloads – including across physical, virtual and cloud environments. Learn also how our flexible packaging and pricing will help you get the right level of leverage for the optimal level of investment.
Join our experts in this webinar to learn more about this new approach to cybersecurity and see a demo of it in action.
Konstantin Kiess & Wayne SeguinRecorded: Nov 15 201841 mins
In this webinar, you will explore Kibosh and learn to deploy Helm Charts as Services on Kubernetes via Kibosh' Open Service Broker API. Experience on-demand dedicated services the easy way. With this introduction by Stark & Wayne, you will create a Rabbit-MQ service offering on Kibosh from a base chart and use Kibosh to provision an instance of your Rabbit-MQ service.
Sometimes you may not want to implement a ServiceBroker API. You have existing Services packaged as Helm Charts but want an easy way to offer them via an OSB API. Or more general, you want a containerized General Service Solution hosted on Kubernetes. The solution is Kibosh.
- Understanding the ServiceBroker API.
- Understanding how Kibosh uses HelmCharts
- Learning how to create a service from a helm chart basis (e.g. from https://github.com/helm/charts/tree/master/stable)
Timothy Fong, Security Product Expert at Cloudflare | John Esterline, Solutions Engineer at CloudflareNov 19 20182:00 pmUTC45 mins
As the web application security landscape evolves, companies are facing increased pressures to strengthen their security posture. Recently, the world’s largest distributed denial of service (DDoS) recorded attacked GitHub at 1.35 Tbps. While the big attacks get all the headlines, at Cloudflare we have learned about other forms of attacks that can unexpectedly bring your site down.
Join this webinar to learn about:
- How small DDoS attacks can still bring your site down
- A little known way attackers can bypass traditional DDoS protections
- Why TCP services may make you vulnerable to a DDoS attack
- Pros and cons of multiple solutions: BGP, MPLS, and building your own
- How to augment Cloudflare’s unmetered DDoS solution with Spectrum, Rate Limiting, and Argo Tunnel
Yoni Geva, Product ManagerNov 19 20183:00 pmUTC60 mins
Are you still implementing firewall changes manually? Are you still trying to keep track of all the changes and their ramifications with spreadsheets?
Network security policy automation gives you quick, accurate change management across even the most complex hybrid networks, avoiding security holes, compliance issues and costly outages. With automation, you don’t have to choose between agility and security. You can have both.
In this webinar, Yoni Geva, Product Manager at AlgoSec, explains how security policies can be updated automatically and accurately.
Join our webinar to learn how to take advantage of:
•Automated security policy automation with zero touch
•Security policy management that keeps up with business requirements
•Automatic identification of risk
•Enhanced compliance with quick audit reports on demand
Anthony Giandomenico, Senior Security Strategist; Damien Lim, ATP Product Marketing; Aamir Lakhani, Sr. Security StrategistNov 19 20186:00 pmUTC61 mins
A recent threat landscape assessment reports a double-digit growth of cryptojacking. Organizations will soon be facing a phenomenon similar to ransomware if their security posture is not ready to address this new issue.
Join our panel of experts for a round table discussion around these types of threats and the tactics cybercriminals are leveraging today plus learn about how Fortinet’s advanced threat protection (ATP) Fabric-enabled approach stops the delivery of malicious crypto-mining malware across the dynamic attack surface targeting end-users and servers from the campus to the cloud.
Matthew Gyde, Group Executive, Cybersecurity at Dimension DataNov 19 20186:30 pmUTC60 mins
CyberConversations around the strength of a company’s cybersecurity has never been more pertinent. We’re generating more data than we know how to deal with, and as the opportunities for cybercriminals proliferate, so does their approach to attacks mature.
A key piece of advice? Trust no-one. With the cloud continuing to aid digital transformation, and AI/machine learning finally realising their potential, cybersecurity defences are beginning to migrate to a more predictive model. This will allow companies to create digital fingerprints of their employees, improve access to data and applications, and predict attacks before they happen.
Join Matthew Gyde, Group Executive, Cybersecurity at Dimension Data, as he reveals the main findings from Dimension Data’s Technology Trends 2019 report, exploring how the cybersecurity landscape will shift in 2019, and what measures companies can take to keep the bad guys out.
This webinar will cover:
•How zero trust is maturing into digital trust, and the evolution of predictive threat detection.
•Why organisations are focusing on cloud-based security platforms.
•Why organisations now aim to be secure by design.
•How cybersecurity is becoming intelligence driven.
•Why tighter regulation is affecting risk profiles.
Ettienne Reinecke, Group CTO at Dimension DataNov 20 20186:00 amUTC60 mins
Until now, the tech sector has spoken about innovative technologies somewhat theoretically, without providing a clear picture of how these powerful innovations will be used and what they will look like in practice. This has left people without a solid understanding of how these solutions will ultimately manifest in our work and personal lives.
Join Ettienne Reinecke, Group CTO at Dimension Data, as he reveals the game-changing approaches that will transform the tech landscape during 2019 and beyond, and how companies can ensure emerging solutions – such as AI, machine learning, robotics and AR/VR – become firmly embedded in their core processes. Ettienne will explore:
•Why easier access will accelerate the adoption of game-changing technologies.
•How identity will emerge as the killer app for blockchain.
•How companies can extract value from data, while respecting privacy.
•Why the Internet of Things (IoT) will change our lives for the better.
•How disruption will drive consolidation among tech vendors.
Lionel Meoni, Systems Enginee Manager, Rubrik FranceNov 20 20189:00 amUTC33 mins
Rubrik a développé la première plateforme Cloud Data Management conçue pour la gestion de données convergées avec la protection des données, la recherche, l’analyse, l’archivage et la copie de données pour le cloud hybride entreprise
Rejoignez Lionel Meoni pour assister à une présentation et une démo et découvrir comment Rubrik remplace les logiciels de sauvegarde par une appliance « plug-and-play » capable d'assurer l'orchestration des données, la gestion des catalogues et la déduplication du stockage. Il vous présentera également la plate-forme SaaS Polaris.
John Wagnon - Senior Solution Developer - DevCentral, F5 NetworksNov 20 20189:00 amUTC14 mins
Perfect Forward Secrecy allows your encrypted communications to stay secure even if a bad guy were to steal the private key of the websever you were communicating with. But, how is that possible? And, how can a web server be configured to achieve this level of security? In this video, we talk about the concept of Perfect Forward Secrecy, describe how it all works, and then show how you can configure your BIG-IP to make sure you take advantage of this really cool security functionality.
By watching this video, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy). You also are signing up to be contacted about F5 products and services but you can unsubscribe at any time.
Whit Crump, Global Head, AWS Marketplace ChannelsNov 20 201810:00 amUTC60 mins
We are excited to announce a new feature that allows Partners to resell software solutions directly to customers in AWS Marketplace.
Many AWS Customers prefer to purchase software solutions through Partners, benefiting from their knowledge of the customer’s business, localized support, and expertise. Partnering with Consulting Partners ensures that customers can deploy the right product at the right price for their business. Additionally, ISVs rely on Consulting Partners for scale, reach, specialization, and value-add services for their customers.
This new feature combines these benefits and enables Consulting Partners to work with customers from the start of their procurement process all the way to purchase.
Join this webinar to learn about the feature and how to get started with AWS Marketplace.
This webinar is intended for:
- All partners interested in Enterprise Software Procurement
Tom Berry, Adenike Cosgrove, Swati Lay, Naveen Vasudeva, Graham Edwards and Clive RoomNov 20 201810:00 amUTC60 mins
In today's ever evolving threat landscape, the attackers are increasingly targeting people rather than technology.
For CISOs and security professionals, the top priority is to strike the perfect balance between technology and employee empowerment. You need to build defences that start with and work for your organisation's most important asset - your people!
Join us and our line up of industry experts at this live panel discussion, part of our Hacking Human Nature Summit to hear how they are building people centric strategies.
•Swati Lay, CISO, Funding Circle
•Graham Edwards, Former Head of Group Security, Nationwide
•Naveen Vasudeva, MD & Co-founder, CyberCorre
•Clive Room, Chairman, White Hat Ball
•Adenike Cosgrove, International Cybersecurity Strategist, Proofpoint
Moderated by: Tom Berry, Advisory Board Member, ClubCISO
Nathan Haines Managing Director Element 26. Kate Aldridge Senior Producer Element 26.Louis Tsamados Editing Colorist ElementNov 20 201810:00 amUTC39 mins
Join us to learn how Nathan Haines, Managing Director at Element 26 empowers a team of 20 to deliver a fast, seamless experience across marketing, sales and service. See first-hand how Quip is used to enable cross-functional collaboration for the sales process, and then on to service delivery.
On this webinar we will share successes and best practices using Quip to:
1- Create collaborative sales processes that keep everyone on the same page
2 - Track filming, scheduling and service deliverables
3 - Review opportunity management and deal creation use cases
Mark Bowker, Sr. Analyst, ESG; P.J. Hough, Chief Product Officer, CitrixNov 20 201811:00 amUTC48 mins
Just a few short months ago, Citrix announced the unveiling of the industry’s first digital workspace to enable people-centric computing within organizations. Join us for this webinar and learn how the new Citrix Workspace unifies and secures all apps and content for all devices.
Discover how Citrix Workspace:
• Delivers a consistent and unified experience across all devices and provides users SSO access to virtual apps, desktops, mobile apps, SaaS apps and their data
• Extends the perimeter into cloud apps and across multiple devices and networks
• Automates image management and provisioning to move workloads from datacenters to any cloud
• Enables choices of devices from a single endpoint management solution
• Provides user-centric analytics combined with machine learning to provide actionable intelligence to manage threats
• Improves the experience of mobile apps with secure email integrated with Slack
Sie benötigen schnell umfassende und aktuelle Informationen über die Kubernetes Plattform? Dieses Webinar liefert Ihnen alle wichtigen Informationen und zeigt Ihnen den Einstieg in die Kubernetes-Distribution von Canonical.
Nutzen Sie dieses Webinar, um ...
> zu erfahren, wie Unternehmen Geld und Zeit mit Kubernetes sparen
> zu lernen, wie Sie erfolgreich einsteigen, von der Implementierung bis zu ersten Workloads
> Initiale Konfiguration, Installation und Validierung
Robert Holmes, VP Email Security ProductsNov 20 201811:30 amUTC43 mins
In our recent market study, we found that 77% of businesses expect to fall victim to Email Fraud in the next 12 months. Call it business email compromise (BEC) or phishing, the multi-faceted Email Fraud threat is always lurking and continues to grow. However, unlike most cyberthreats these socially engineered attacks seek to exploit people rather than technology.
Join this webinar to learn:
- Findings from our latest Email Fraud study
- Email Fraud trends from 2017 and threats to look out for in 2018
- Helpful tips to protect your people, data and brand against Email Fraud
- Live Q&A with the speakers
Email Fraud is one of the oldest yet most successful threats against your organization. Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication.
Join this product demo to discover how you can protect your organization and people by leveraging the power of EFD.
• Block malicious emails spoofing your domains before they reach your employees and customers
• Monitor all emails (inbound and outbound) from your domains and those of third parties
• Accurately distinguish between legitimate emails and fraudulent emails
Paul Down, Wombat SpecialistNov 20 20181:30 pmUTC45 mins
Organizations today are facing increased attacks using social engineering tactics – In fact, 76% of organizations experienced a phishing attack in 2017. With Proofpoint’s recent acquisition of Wombat Securities organizations can better prevent and stop targeted threats through phishing simulation and training to change end-user behavior.
Join us for this webinar where you will learn:
* About the latest trends and tactics used by threat actors that target your organization
* How to assess your users’ susceptibility to phishing attacks
* To respond to threats through end-user training and reporting
Jen Gough, Sales Engineer, ProofpointNov 20 20183:00 pmUTC45 mins
What are the key components of a best-in-class solution for phishing simulation and training?
Join us for a live demo of Wombat Security to see for yourself!
Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.
You’ll learn how to:
- Assess your users’ susceptibility to phishing and spear phishing attacks
- Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
- Allow your employees to report suspicious messages with a single mouse click
George Anderson, Director of Product Marketing at WebrootNov 20 20183:00 pmUTC60 mins
Recently, new and established security vendors have upped their use of the fancy-sounding term "machine learning". While the technology isn't new (Webroot won an innovation Edison Award for work in the field over 6 years ago in 2012), it has resurfaced as a marketing buzzword and created some confusion in the industry.
We’d like to invite you to join Webroot director of product marketing George Anderson for a 30-minute webinar to learn how Machine Learning is used in cybersecurity and how Webroot has been applying it for more than 10 years to create actionable threat intelligence for stopping a wide range of threats.
• Understanding Machine Learning (ML)
• How ML can stop zero-day and never-before-seen threats
• The importance of contextual analysis and predictive analytics
• Real-world results from the “new” ML technology
• How ML Directly Benefits your Customers
Kiran Khokhar, Product Marketing ManagerNov 20 20184:00 pmUTC45 mins
Right now, email is the #1 vector of choice for cyber criminals. To protect your organization, you need technology and information.This event focuses on both.
Join us for a live demo that will explore Proofpoint Email Protection and Target Attack Protection. Learn about:
•Today’s threat landscape and to how to build your defense against spam, malware and non-malware threats
•Approaches for identifying suspicious messages
•The latest in security software to fight against advanced threats
Christian Posta, Chief Architect, Red HatNov 20 20184:00 pmUTC60 mins
As we build distributed systems on cloud platforms (like Kubernetes, or public clouds), we must understand where the responsibility of the developer teams lies with respect to the platform. The platform provides some useful abstractions to make us more productive, but the correctness and safety of our applications and business requirements is still the responsibility of the developer and development teams. Tools like Istio, and service mesh in general, solve for some difficult problems like observability, security, and resilience and are highly encouraged for cloud-native application deployments. In this talk, we'll take a look at how Istio can help build resilient distributed-systems applications, but we'll also be very specific about Istio's boundaries and where application frameworks built for integrating systems like Apache Camel fit into the picture. One does not remove the need for the other.
Shawn Meyers, Principal ArchitectNov 20 20185:00 pmUTC60 mins
So you have your Availability Groups (AG) configured and everything reports green. Learn how to measure for Service Level Agreement (SLA) compliance! Know when replication is delayed! Get notified when a failover occurs! In this session, we will teach the attendee how to implement proper monitoring and alerting. We will also show you what metrics and reports you should be reviewing regularly to ensure there are no surprises, such as pauses replication or unacceptable delays. For example, we will look at the DMVs, extended event sessions, perfmon counters, SQL agent jobs and alerts. We will show what to monitor in your AG, and how to setup alerting so you know when to take action.
Jason Garbis of CyxteraNov 20 20185:00 pmUTC60 mins
Want to transition on-premises workloads to the cloud, but are concerned about consistently securing access? Join us for a webinar where we discuss how you can easily and effectively apply secure access policies throughout your cloud migration, regardless of your infrastructure complexity or architectural starting point. By utilizing a modern, cloud-ready security architecture, you can maintain – and in fact, improve – your enterprise security controls throughout the entire migration process.
In this webinar, Jason Garbis, CISSP – Vice President of Products at Cyxtera, will discuss
- Challenges (real and perceived) that enterprises face when moving to the cloud
- Managing policies and permissions for cloud vs. on-premises workloads
- The pitfalls of inconsistent security
- How to secure any application, on any platform, anywhere.
This webinar is for IT / Security leadership (director, VP, CISO, CIO).
Joe Catalanotti, Dell EMC; Eric Sheppard, IDC; Mark Geel, Dell EMCNov 20 20185:00 pmUTC30 mins
With its flexible architecture, simplified IT operations and a path to delivering cloud services, the VxBlock 1000 is changing the way you think of CI. Learn what sets Dell EMC Unity apart from other storage options, hear what a leading analyst has to say about converged systems, and see why you should consider a VxBlock 1000 for your next IT infrastructure purchase.
Sonya Koptyev, Director of Evangelism and Keith Mokris, Product Marketing LeadNov 20 20186:00 pmUTC60 mins
If you ask DevOps engineers about the benefits of containers and microservices, their responses will center on the agility, modularity, and scalability that microservices-based architectures provide.
Security is a crucial and often overlooked advantage of migrating to containers and microservices.
Containers allow enterprise to secure applications and environments at a more granular and nuanced level. They also empower enterprises to identify and resolve potential security threats before they disrupt workflows, rather than having to adopt a defensive stance oriented around addressing attacks once they are fully underway.
Watch this webinar to learn:
•Challenges with traditional security strategies
•What a proactive approach to security for a microservices-based environment looks like
•How your organization can adopt a proactive security stance when it makes the migration to containers.
John McCumber, Director of Cybersecurity Advocacy, North America, (ISC)2Nov 20 20186:00 pmUTC75 mins
The 2018 (ISC)² Cybersecurity Workforce Study finds the cybersecurity skills shortage continues to grow. But the news isn’t all doom and gloom. Our latest deep dive into the issues and challenges facing cybersecurity professionals adopts a new approach to more broadly define the cybersecurity workforce. The study reveals a relatively satisfied, younger and more diverse field of practitioners focused on developing their skills and advancing their careers. Join (ISC)² Director of Cybersecurity Advocacy, North America, John McCumber On November 20, 2018 at 1:00PM Eastern as we examine how practitioners are dealing with the workforce gap while balancing skills development, hiring priorities and everyday threats they face.
Jacquie Touma, Chaitra Vedullapalli, Terri StephanNov 20 20188:00 pmUTC60 mins
We live in a truly amazing time. Technology is changing almost every aspect of our lives at breathtaking speed. Advances in medicine, education, communication, and productivity have increased life expectancy around the globe and lifted hundreds of millions of people out of poverty.
The ability to connect to people and information instantly is so commonplace that many take it for granted and now, we’ve arrived at the beginning of an era of even more profound transformation, all centered on the cloud. We’re excited to bring more opportunities through cloud computing to address issues in healthcare, the environment, cybersecurity, and underserved communities. And we’ve seen the incredible good that can come from the cloud, but with it also come challenges. For women in technology, there are increased challenges in a cloud-based world.
Women in Cloud initiative is designed to empower female tech entrepreneurs by providing Access, Acceleration, and Actions so women entrepreneurs can take Actions every day to achieve their business goals!
In this webinar, we will share experiences and tips for female tech entrepreneurs in building their cloud B2B with enterprise companies in a simple and predictable way. This is going to be a panel discussion with great conversation with female tech entrepreneurs in driving customer traction.
Also, learn how you can participate in the next cohort of women in cloud accelerator to build your business with enterprise brands!