Identity is the New Perimeter Part I -The Evolution of Identity
(ISC)2 Security Briefings – Identity is the New Perimeter, Part 1
John Hawley, Senior Director, Security Strategy at CA Technologies will examine trends in Identity, how to position security as an enabler of innovation and set the foundation for the other parts of the series which will
(ISC)2 Security Briefings – Identity is the New Perimeter, Part 1
John Hawley, Senior Director, Security Strategy at CA Technologies will examine trends in Identity, how to position security as an enabler of innovation and set the foundation for the other parts of the series which will feature installments on a number of important and timely security topics such as Mobile Security, Big Data and Virtualization.
In this webinar we will explain how DevOps, powered by Chef automation, makes it possible to deliver infrastructure and new features at velocity within the highly regulated world of the UK Government sector.
Using Chef in conjunction with a platform such as Skyscape Cloud Services, which provides assured cloud services, enables the government sector to deliver software at speed without fear of compromising Official and Official Sensitive data. With a correctly provisioned and tested infrastructure, plus rules that automate rigorous security testing and policy assurance, you can reduce risk, provide a faster route to delivery and help enable DevOps within your organisation.
Hear from Seth Thomas, DevOps Evangelist at Chef Software and Peter Rossi, Head of Automation at Skyscape Cloud Services on how to automate your infrastructure in a secure cloud environment.
In addition, Viewdeck Consulting and Synyega will discuss their successes within this market sector, and offer tips on how you too can adopt DevOps practices.
Bez względu czy środowisko IT zbudowane jest w modelu tradycyjnym, czy też poddawane jest transformacji do modelu chmurowego wysoka dostępność jest niezmiennie ważna. Co więcej, oczekiwania w zakresie wysokiej dostępności, podobnie jak w zakresie zwinności IT, stają się coraz wyższe. Chcąc utrzymać elastyczność biznesową, szybkość reakcji, najwyższy poziom usług nasi Klienci oczekują rozwiązań, które zapewnią parametry RTO i RPO jak najbardziej zbliżone do 0. Podczas tej sesji zapoznamy Państwa z takimi rozwiązaniami EMC. Zaprezentujemy nowoczesne metody zabezpieczania danych i aplikacji przed awarią rozległą – praktyczne zastosowania rozwiązań EMC VPLEX, EMC RecoverPoint, EMC MetroPoint, EMC SRDF/Metro
With the average company experiencing unplanned downtime 13 times a year, the costs associated with continuing to invest in a legacy backup solution can be extensive. For this reason, more customers are switching to Veeam® and Quantum than ever before. Update to a modern data center and achieve Availability for the Always-On Enterprise™ with Veeam coupled with Quantum’s tiered storage that increases performance, reduces bandwidth requirements and executes a best practices for data protection.
Your customers are connected and in control like never before. Join us for a live Marketing Cloud demo to learn how you can create 1-to-1 journeys that keep your customers engaged from interested prospects to loyal brand advocates. See for yourself how the #1 Marketing Cloud platform helps brands of all sizes:
- Unify data into a single customer view
- Personalize journeys throughout the entire lifecycle
- Engage customers across all channels, including email, mobile, social and ads
- Analyze everything to make insight-driven decisions on marketing investments
We will also share real-world examples of customers like you who are achieving amazing results with Salesforce Marketing Cloud.
After a record-setting year in 2015, where will the tech M&A market go in 2016? What trends that pushed M&A spending to its highest level since the Internet Bubble burst will continue to drive deals and which ones will wind down? What other sectors are likely to see the most activity this year? And most importantly, what valuations will be handed out in deals over the coming year? Drawing on data and views from across 451 Research, the Tech M&A Outlook webinar maps many of the major developments in the IT landscape (IoT, Big Data, cloud computing) to how those influence corporate acquisition strategies. Join us for a look ahead to what we expect for tech M&A in 2016.
Every business has data, but only a few are treating it as a strategic asset for actionable insights. Many struggle with locating and aggregating data, while others wrestle with visualizing and interpreting the data. Join Clive Bearman and Ron Lunasin for an interactive and demo-focused session on how to leverage the latest technologies in the cloud analytics market to make every-line of business data-driven. You’ll see how companies from different industries are using the Informatica Cloud to make waves across their companies by connecting, aggregating and relating data from different sources. You’ll also discover how to achieve amazing insights with the Salesforce Analytics Cloud. Finally you’ll learn the 5 top tips that ensure that your data will always be clean, connected and contextual with Wave Analytics and Informatica.
Overhead power distribution in your data center offers many attractive possibilities, but is not without its challenges.
Join Starline's Director of Marketing, Mark Swift; CPI’s Senior Data Center Consultant, Steve Bornfield; and University of Florida's Joe Keena for an exploration of the options and some of the pitfalls, supported by real-life examples from the field.
Everything is getting digitized - everything is becoming “software empowered”. Who is writing all this software? It is central IT or is it business IT and the third parties they employ? How can central IT ensure that it is relevant this exciting new, software empowered, world?
The Chef DevOps Journey Assessment or Dojo is a tool that is used to assess both the current and desired state of your organization's DevOps progress. The goal of the exercise is to expose opportunities for continuous improvement by defining a baseline of where you are on your journey and the desired state you’re trying to get to. After we compile the results, patterns will emerge and be used to visualize goals and generate custom guidelines towards success.
In this webinar, Justin Redd, Customer Engineering Lead, and Thomas Enochs, VP Customer Success, will explain:
- Why we created the Dojo and how it can help your organization accelerate DevOps adoption
- What the DevOps Journey Assessment is and how it’s conducted
- Who in your organization should attend the Dojo exercise
- How to get it
Consumer engagement remains a priority for brands that are looking to build and maintain meaningful relationships with their customers. The challenge in today’s cross-channel, social, and mobile world is to develop enough, relevant content that will drive the desired levels of engagement.
User-generated content, or UGC, provides relevance and authenticity that brand- produced content cannot. Brands that incorporate consumer- produced content into their marketing are seeing greater performance within their existing channels and programs because of its
Our webinar, Increasing Consumer Engagement with User Generated Content, will discuss:
- Why UGC is so impactful with consumers
- How brands, like McCormick, are leveraging UGC to increase consumer engagement
- Tips for driving consumer participation with UGC campaigns
- Rights management and UGC curation
Christian Macdonald, Solutions Architect, Intel Security; Brad Antoniewicz, Principal Consultant, Foundstone; B. Dunlap
It's an infosecurity department's worst nightmare. There's been a breach and information is missing. After determining what's been compromised, you need to discover how the data was accessed and exfiltrated from your enterprise. Threats vary from system to system and include malicious insiders, organized crime and accidental disclosure. Data involved can include customer and/or employee information, intellectual property and financial records. Join Intel Security and (ISC)2 on March 17, 2016 at 1:00PM Eastern for a look into Intel Security's recent Data Exfiltration Study and discover how data is being stolen, what the bad guys are focusing on and what detection and prevention technologies might be working.
Mike Pittenger, VP, Product Strategy, Black Duck; John Overbaugh, CISSP, Dir of Security Healthagen; Brandon Dunlap
Open source software and code has become common place in application development, as have the use of vulnerability assessment tools. After all, no one wants to be the victim of the next Heartbleed, Poodle or Logjam. But vulnerability assessment tools, while helpful, have blind spots. How can you ensure that you are protecting your networks and applications from newly disclosed vulnerabilities? Join Black Duck Software and (ISC)2 on February 18, 2016 at 1:00PM Eastern for a discussion on VA Tools, Open Source Assets and secure application development.
Spencer Wilcox, Constellation Energy; Patrick Miller, EnergySec; Chris Walcutt; Black & Veatch; Brandon Dunlap
Train like you fight. Fight like you train. We could do well to heed this old military axiom and regularly drill for a variety of incident scenarios in the most realistic means as possible. During this (ISC)2 roundtable, we will explore the role of incident management simulation and testing from the world of critical infrastructure and provide some concrete and immediately actionable methods you begin incorporating into your own preparedness program. As the saying goes, “No plan survives first contact with the enemy,” so please join us On February 11, 2016 at 1:00PM Eastern in learning how to become a more resilient organization in the face of disaster.
Regional Directors Dan Waddell (NCR), Clayton Jones (APAC); Adrian Davis (EMEA) & Gina Van Dijk (LATAM)
As a truly global organization, (ISC)2 membership stretches to over 110,000 members in over 160 countries. To help serve the needs of the membership, (ISC)2 has regional offices to oversee the operations and efforts in North America (NA), Asia-Pacific (APAC), Europe, Middle East, & Africa (EMEA) and Latam America (Latam). These offices are managed by regional directors with their own teams to offer regional support and resources and to be the voice of the region. On January 28, 2016 at 1:00PM Eastern you'll have the opportunity to discover what's going on in each of these regions as we gather our three Regional Directors Dan Waddell (NA), Clayton Jones (APAC), Adrian Davis (EMEA) and Gina Van Dijk (Latam) for a view into what they have planned for 2016.
Mike Flouton, VP & Global Head of Solutions Marketing, BAE Systems; Robert Westervelt; IDC; Sonny Discini; Brandon Dunlap
Corporate e-mail. It’s safe to say that no organization can survive without it. Making sure it’s available, compliant and secure can be challenging for any security team. Add Office 365 and the Cloud to the mix and the potential issues multiply significantly. E-Mail protection services can make the tasks much less complicated by providing protection against inside and outside threats, reducing downtime and adding encryption. Join BAE Systems and (ISC)2 on January 21, 2016 at 1:00PM Eastern – our first ThinkTank of the year – where we’ll discuss e-mail protection services, Office 365 and the Cloud and how to keep your e-mail up and running.
Anurag Kahol, CTO, BitGlass; Adam Gordon, CISSP, CISO/CTO, New Horizons Computer Learning Center; Mike Webb, SmartVault
As more companies jump on the cloud bandwagon and migrate core services to cloud apps like Office 365, native app security has proved lacking. Enter Cloud Access Security Brokers. CASBs augment corporate identity and access controls to Cloud services, enabling better visibility, more granular data security, threat protection and compliance. What are the best strategies when making the move to public cloud applications? Join Bitglass and (ISC)2 on December 3, 2015 at 1:PM where we will discuss CASBs and how they can help secure cloud apps like Office 365.
Dan Kennedy, Research Director for Information Security at 451 Research
Last year we spoke about enterprise perceptions towards advanced persistent threats, or as 451 Research terms them adaptive persistent threats. The acknowledgement that there are threat classes that can not be rebuffed by preventative security controls has led to a refocus on security monitoring for many enterprise heads of information security, but the approach is not without its challenges, including notably complexity and manpower. Join Dan Kennedy, Research Director for Information Security at 451 Research on November 10, 2015 to review portions of two end user studies on enterprise perception towards major security monitoring platforms: SIEM and IDS/IPS. The presentation will draw on results of over two thousand surveys conducted with enterprise information security managers.
Javvad Malik CISSP®, Security Advocate, Alien Vault
I used to be a security professional, but even my boss didn’t remember my name. My brilliant ideas weren’t listened to, I was never invited to speak at conferences and not even my mother visited my blog." In this talk, we've distilled the key skills and traits taken from personal experience as well as industry professionals to present strategies you can employ to increase your stock internally within an organization as well as within the industry. Simply being hard working and skilled in your job is not enough.
Ismael Valenzuela, IR Technical Practice Mgr, Foundstone; Mat Gangwer, Rook Security; Jack Walsh, ICSA Labs;
While some indicators of compromise (IoCs) can be incredibly helpful in gaining visibility into the details and breadth of a breach, others can be noise. How do you decipher the difference between the good, the bad and the just plain ugly? Join Intel Security and (ISC)2 on November 5 at 1:00PM Eastern for a discussion on IoCs as we discuss what threat intelligence provides the most value along with where IoCs are going and should go next to better enable investigations and defend organizations.
Dave Lewis, CISSP, Global Security Advocate, Akamai Technologies
This talk will examine the tools, methods and data behind the DDoS attacks that are prevalent in news headlines. Using information collected, the speaker will demonstrate what attackers use to cause their mischief and mayhem and examine the timeline and progression of attackers as they move from the historical page defacers to the motivated DDoS attacker. We'll also look at motivations and rationale to detect patterns and build better protections.
It’s probably not too often that you’ll get this perspective. Star Wars was really all about information disclosure threats! You’ll want to find out more as noted presenter and author Adam Shostack, references one of George Lucas’ epic sagas to deliver lessons on threat modeling. Not only was the Death Star badly threat modeled, the politics between Darth Vader and Gran Moff Tarkin distracted incidence response after the plans were stolen. This session will provide you with proven foundations for effective threat modeling as you develop and deploy systems. Adam will help you understand what works for threat modeling and how various approaches conflict or align. The force is strong with this session.
Jim Taylor, Oracle; Darin Reynolds, John Carnes, Brandon Dunlap, Moderator
By 2020, more than 7bn inhabitants of Earth will be using over 35bn devices to communicate, collaborate, negotiate and perform transactions.
To put it into perspective, there are only about 8.7bn connected devices now.
The surge will come quickly and organizations will scramble to take advantage of monetizing this digitally connected world. Identities are at the forefront as the digital passport to an online world of goods and services because a single view of an individual customer is the key to knowing that person better and building a deeper personal and business relationship with them. Join Oracle and (ISC)² on October 8, 2015 at 1:00PM Eastern to learn about the new identity economy.
Michelle Waugh, VP Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Rarely has the landscape of security changed as dramatically as in the past year. Applications are now rightfully driving security strategy across organizations of all sizes. Attacks against your critical systems and information are more insidious than ever before. Your customers are demanding access from a variety of devices, across access channels, along with a consistent, intuitive, and convenient user experience. If that wasn't enough, you need to engage with your developer communities to help build those complementary solutions that you need to grow your business. Join CA Technologies for this first part of a six-part webcast series on September 17, 2015 at 1:00PM Eastern to learn how security leaders can rise to the top of the pack by leveraging these new realities, and grow their business through an innovative security vision and strategy.
Torry Campbell, CTO, Endpoint & Mgmt Tech Intel; JJ Thompson; Rook Security; Michael Cloppert, Chief Analyst, Lockheed Martin
Emergency responders often talk about the "Golden Hour", the period of time where there is the greatest likelihood that prompt attention will mitigate impact and damage. The same holds true for the Cyber Attack Chain. At what phase in the chain should you concentrate on to get the best protection for your organization or credible threat intelligence information? Join Intel Security and (ISC)2 on Thursday, September 10, 2015 at 1:00PM Eastern for a discussion on the chain and where it might be best to focus your attention on the links of the chain to best defend your organization.
Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO, (ISC)²
(ISC)² and CSA recently developed the Certified Cloud Security Professional (CCSP) credential to meet a critical market need to ensure that cloud security professionals have the required knowledge, skills and abilities to audit, assess and secure cloud infrastructures. Join Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO, (ISC)² on August 20, 2015 at 1:00PM Eastern to learn more about the CCSP, the qualifications for it and the future of cloud security.
Madhu Reddy, Global Product Manager, HP Security Voltage; Michael Osterman, Principal, Osterman Research
Enterprises receive, create and store enormous amounts of email data each year: roughly 30,000 emails for every information worker, a large proportion of which contains attachments that are often sensitive or confidential. Increasingly, this information must be encrypted to ensure that data breaches are prevented and that data protection obligations are satisfied. At the same time, information must be retained for long periods in compliance with corporate, legal and regulatory obligations.
However, encryption and archiving are often at odds with one another: data that must be encrypted can be rendered difficult or impossible to access when archived. Data that is archived, but not encrypted, can be more susceptible to data breaches. As a result, the use of an integrated eDiscovery solution becomes more critical than ever. Join HP/Voltage Security and (ISC)2 on August 13, 2015 at 1:00PM Eastern to learn how to protect your enterprise communications with data-centric email encryption ands make it easy to access encrypted and archived content in support of eDiscovery, regulatory and other requirements.
Mitchell Bezzina, Sec Product Mktg Mgr, Guidance; Dr. Randy Burkhead, Sen. Sec Consultant: Rafal Los, Director, Optiv
Due to the widespread adoption and use of cloud applications, a burgeoning mobile workforce and the rise in APTs, endpoint risks have become more prevalent and a challenge to manage. Indeed, endpoint penetrations and breaches take only minutes to occur. An effective endpoint detection & response solution is critical to a timely response, as is properly trained incident response team. Join Guidance Software and (ISC)2 on August 6, 2015 at 1:00PM Eastern for a discussion on EDR and the need for effective Incident Response and automation to hasten mitigation.
Michael Santarcangelo, Founder, Security Catalyst; Philip Casesa, CISSP, CSSLP, Dir of Service Ops, (ISC)2
The biggest challenge in security is no longer technology. We need to rise from recognition as security experts and experts within security teams to leaders protecting information from a world of risk and vulnerabilities.
Michael Santarcangelo cracked the code on the pathway to becoming an exceptional security leader. On July 30, 2015 at 1:00PM Eastern Michael will share the Exceptional IT Leadership Framework, including the 5 foundational elements, 9 competencies, and 5 essential habits. The webcast will explore the benefits of a framework-based, competency-driven approach to developing your leadership and how to assess where you really are in your leadership journey.
Sandy Borthick, Stratecast|Frost & Sullivan; Reiner Kappenberger, HP Security Voltage
Large enterprises want to use all the data they can get to earn the trust and the dollars of their customers. At the same time, they must secure this data, which is increasingly the target of sophisticated cyber-attacks. Traditional triple A (access, authentication and audit) security solutions are no longer sufficient-data-centric security must be added to the mix. In this webinar, join Stratecast | Frost & Sullivan, HP Security Voltage and (ISC)2 on July 16, 2015 at 1:00PM Eastern for an examination of ICT technology trends and business policies that have brought us to this point and how format preserving encryption can be used to protect data at rest, in motion and in use.
Michael Shaulov, Head of Mobility Product Mgmt, CheckPoint; Frank Aiello, CISO, American Red Cross; Raj Goel, CTO, Brainlink;
The rapid rise of mobile computing has caused more sleepless nights for security professionals than they would care to admit. Laptops, smart phones, tablets… most employees have one of each, and each needs to be protected. What are the best strategies to enable threat prevention for your mobile workforce? What exactly are the threats being seen today, and what could be around the corner tomorrow? Join Check Point Software and (ISC)2 on July 9, 2015 at 1:00PM Eastern for a roundtable discussion on tackling mobile security challenges to keep on-the-go employees productive and your enterprise secure.