To combat increasingly sophisticated and frequent security threats from insiders and outsiders, organizations the world over are deploying Security Information/Event Management (SIEM) solutions By providing a centralized security intelligence gathering system that spans an enterprise’s critical inf
To combat increasingly sophisticated and frequent security threats from insiders and outsiders, organizations the world over are deploying Security Information/Event Management (SIEM) solutions By providing a centralized security intelligence gathering system that spans an enterprise’s critical infrastructure, SIEMs can offer deep visibility into suspicious activity and latent operational problems.
This presentation is designed for individuals who are generally familiar with the concepts of SIEM technology, but are looking to improve their understanding and skills for detecting and defeating insider threats.
This session will:
- Cover the main components of a SIEM deployment and explain the role each plays in gathering the data required for investigations.
- Explain how to utilize SIEM technology to detect and eliminate insider threats
- Demonstrate how to use SIEM technology to monitor insider activity including network utilization, web surfing, and data leakage, and changes made to critical files
RecordedAug 26 2009
Your place is confirmed, we'll send you email reminders
In this live webinar, learn the five reasons why a private cloud storage system may be more cost effective and deliver a higher quality of service than public cloud storage providers.
In this webinar you will learn:
1. What Public Cloud Storage Architectures Look Like
2. Why Public Providers Chose These Architectures
3. The Problem With Traditional Data Center File Solutions
4. Bringing Cloud Lessons to Traditional IT
5. The Five Reasons IT can Do it Better
Learn how to leverage AWS and security ‘super’ friends like Trend Micro to create an impenetrable fortress for your workloads, without hindering performance or agility. Join this session and learn three cloud security super powers that will help you thwart villains interested in your workloads. We will walk through three stories of Amazon EC2 security superheroes who saved the day by overcoming compliance and design challenges using a (not so) secret arsenal of AWS and Trend Micro security tools.
Key takeaways from this session include how to:
· Design a workload-centric security architecture
· Improve visibility of AWS-only or hybrid environments
· Stop patching live instances but still prevent exploits
RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:
• Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
• Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
• Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
• Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
• Quickly get started with our 5 easy migration steps
More than 20% of MNCs we surveyed currently have plans to expand into the SE Asia region, and are now considering their options to use third-party colocation/cloud exclusively, or in combination with on-premise IT deployments.
Much of the current market activity is being driven by MNCs needing to build out their DC presence to serve as gateways to and from mainland China, and other high-growth markets in the region. Over a third of MNCs plan to increase their usage of colocation providers for their future IT deployments and are actively considering data center locations in established preferred locations of Singapore, Hong Kong or Tokyo - driven by factors such as regulations, geographical location, and the skills of the local workforce.
So what are the key selection criteria, and how do certain locations compare?
Singapore continues to be poised for solid growth, with an active supply pipeline, demand from local and international companies, and high-quality facilities. But do other factors, such as power supply costs, choice of bandwidth or the availability of carrier neutral space make it as an attractive location for datacenter investment as Hong Kong or Tokyo? Should MNCs look at Malaysia or Indonesia as possible areas for expansion as well, which could potentially offer lower-cost options for firms, as well as a way to target the local market in each country?
This session will answer all the key questions such as:
•Do Multinationals prefer to Own or Rent Datacenters in South-East Asia?
•Why Do Organizations Need More Datacenter Space?
•When Will They Need More Datacenter Space?
•How Much Datacenter Space Will They Need?
•What is Driving Datacenter Location Selection?
•What Would Organizations Likely Do if They Needed More
Datacenter Space/Power Capacity in SE Asia?
Health management in the data center has four main pillars. Monitoring, Analytics, Diagnostics and Remediation.
In this session we will cover these main pillars and why they are important. We will unveil how you can use embedded sensors in the silicon available through standardized interfaces on your servers to help IT professionals start to add these pillars to their environment and begin to leverage them to help with MTTR reduction to outage avoidance. In the case of actual server issues, we will explain the ways to access those machines remotely and fix them with Intel Virtual Gateway.
Highlights of the Four Main Pillars:
•Monitoring: automated server health monitoring, failure alerting, health dashboard, and more.
•Analytics: root cause with health details, failure device report severity indication, and health history.
•Diagnostics: Remote vKVM access, integrated in-band access, component level health details.
•Remediation: remote power on/off and remote vMedia
Hyperscale is here and its ability to support innovation and change has been grabbing the attention of businesses in the UK. But the 'journey to agile' is not straightforward for many businesses and the scale of transformation required is far from just technical. Psychology and culture play a massive role in the speed at which businesses are able to create competitive advantage through innovation - and adapting to hyperscale is a behavioural consideration that changes the way individual teams and the whole business work together. In this session, Adapt will demonstrate how they are helping customers make the most of the AWS cloud to drive innovation.
Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
1. How to approach the task of PCI DSS 3.1 compliance
2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
3. What key tools & approaches can be used to streamline and ease compliance impacts
Learn how Graze.com is testing the viability of new business models by leveraging AWS, Elastera and the Magento e-commerce platform, to create a Minimum Viable Site for their customers and lean how they respond.
Often it takes retailers several months to plan, build and launch a site, hoping that it will deliver the projected revenue. Join this session if you want to learn a more practical and straight-forward approach to test the viability of new e-commerce ideas, without sacrificing quality and scalability, and better plan with real data on hand.
The threat landscape is constantly changing and bad actors are making concerted efforts to exploit vulnerabilities to compromise cloud environments. Effectively managing vulnerabilities in the cloud can be challenging; traditional security tools are not built to enable you to fully exploit the agility and cost reduction benefits that the cloud offers.
The dynamic and flexible nature of AWS workloads can make it difficult, or impossible, for legacy tools to effectively identify exposures in your cloud environments. In this session, you will learn how Alert Logic Cloud Insight enables you to dramatically improve the way in which you identify vulnerabilities and misconfigurations for the applications you are running on AWS. By delivering deep insight into your AWS environment, enabling you to perform intelligent remediation, and providing continuous protection, Cloud Insight reduces your time and costs associated with vulnerability and configuration management.
•What techniques you can ditch when it comes to finding vulnerabilities
•How remediating vulnerabilities in the cloud will be faster
•How the cloud makes it easier to visualize your environment
•How tight integration with AWS APIs and CloudTrail can enable quick detection of changes as they occur
Listening to your feedback plus the high level of interest in this subject, we have created a free webinar for many unable to attend the recent live seminar.
As your company has at least one OptiView ®, you most likely know it as the tablet providing the fastest way to “Prove it’s not the network” and find root cause.
But here's an awesome tip about a “hidden” feature of the Optivew that you may not know about.
You can pair OptiView XG with TruView Live and extend it’s reach beyond a direct connection to troubleshoot cloud-based services, SaaS applications and now VoIP.
Join us and see how you can:
•Test web application transaction performance and connectivity
•Monitor VoIP service availability and call quality
•Baseline real-time network quality
And the great news is that if you are a new owner or purchaed Gold Product Support for OptiView® XG, you automatically qualify for a free CORE subscription of TruView Live
Every person on the planet has a mobile phone, but 2 Billion people are “Un-banked”.
Banks and telecoms are in a Gold Rush to bank the unbanked, but many obstacles remain. Money transfers are some of the most popular transactions made by both the banked and the unbanked. However, building trust in this new service is definitely a challenge.
Join this panel where discussion points will include:
-Who has the upper hand: Banks or Carriers?
-How can Fintech companies ensure trust and security when it comes to mobile money transfers?
-Global ISO Standards Authenticate ID and Asset Verification
-ISO Reduces Fraud and Speeds up Asset Transfers
-What are some of the security challenges new payment services are able to overcome?
-Are “Standards” emerging to reduce implementation and compliance costs?
-How do you create cross-border and Inter-bank/carrier transactions?
-How can banks and telecoms successfully bank the unbanked?
With more and more people using their phones to conduct business and make transactions, concerns around security have also increased.
During the session, we will discuss:
Is hardware security a thing of the past?
Will tokenisation solve security issues or introduce new problems?
How do you secure your app?
How do you balance security with convenience?
Will biometrics make secure solutions easier to use?
The end user perspective - are consumers driven by security or by trust?
Future outlook - are we heading in the right direction security wise?
John Morgan (Sales Representative), Jeff Melnick (Manager of Sales Engineering)
According to the Global State of Information Security Survey 2016, in 2015, the number of security incidents grew by 38% compared to 2014’s levels. Today, it is clear that traditional security measures are no longer as effective as they need to be and that even advanced techniques can be bypassed. Companies have realized the need to develop new security strategies that will help them address contemporary cyber-threats.
Join Netwrix experts John Morgan (Sales Representative) and Jeff Melnick (Manager of Sales Engineering) to learn how IT auditing helps solidify your security strategy. During the session, we will talk about:
• Today’s data breaches and security experts’ predictions;
• How auditing complements cyber-threat defense mechanisms;
• Proven recommendations for what should be audited and why.
Stick around for a live Q&A session for answers to your questions!
Don Smith, SecureWorks, Ian Glover, CREST & Peter Wood, First Base Technologies
The rise in targeted threats means that security teams must move beyond a general understanding of the threat landscape, to a detailed understanding of their own context and the ability to spot threats targeted at their specific organisation.
In a world of information-overload and an explosion in communication channels, how do you sift through the noise and identify true threats to your business?
•The challenges faced by organisations from the rise in targeted threats
•Limitations of security processes in protecting from targeted threats
•How to gain early visibility into the threats targeting your particular organisation
Don Smith leads the CTU™ Cyber Intelligence Cell: a team of experienced threat analysts who, through the application of established intelligence practices, deliver actionable and timely intelligence products on the threats most relevant to SecureWorks clients. Don also leads the CTU research team in EMEA.
Don joined SecureWorks in 2005 and, since then, has been instrumental in establishing a CTU presence in EMEA and building important relationships for SecureWorks in the region. His enthusiasm and threat expertise means that he regularly represents SecureWorks at industry events in EMEA. Don has 24 years’ experience in the IT industry and was previously responsible for security architecture and operations for a multi-billion enterprise, where he took a lead role in successfully integrating 14 acquisitions. He is a recognized subject-matter expert many areas of cybersecurity and advises SecureWorks and SecureWorks’ clients globally.
Patrick Grillo, Senior Director, Security Strategy
More and more solutions are crowding into the market but data breaches are still happening and there’s no end in sight. Is an over reliance of technology creating a false sense of “everything’s okay”? This session will focus on the three key aspects of comprehensive advanced threat protection; technology, awareness and in particular the role of threat intelligence.
Today’s threat environment is too complex and there is no way to prevent infection in the organization. The question now is how are you handling the threats already in your network? The presentation will focus on the changing security mindset; from ‘keep them out’ to ‘they’re in! Find them and deal with them.’ We will present the most advanced deception and detection technologies aimed at minimizing the time between infection and resolution, along with lessons learned from real-life deployments.
Distributed Denial of Service (DDoS) Attacks are a real threat for today’s organizations. Current trends indicate that these attacks are becoming increasingly more sophisticated, persistent and larger in scale, causing potential damage to your revenue, brand and productivity. Is your organization prepared for the next evolution of DDoS attacks?
Join Nishit Sawhney, Director, Product Management, Verisign to learn about the latest DDoS attack trends including attacker behavioral shifts, attack vectors and increased attack sizes. Nishit will also dissect a real-world example of a recent DDoS attack and best practices on how to prepare and defend against increasingly complex and sophisticated DDoS attacks that can overwhelm even the best equipped systems.
Every year, enterprises spend record levels of money on new IT security technology – yet major breaches and compromises are more prevalent than ever. The concept of “layered security” – in which enterprises support a wide variety of security technologies in order to discourage attackers – doesn’t seem to be working.
It’s time to rethink IT security – not just the technology, but the way enterprises approach it from a strategic, architectural perspective. There are ways for organizations to build a comprehensive set of defenses – a security architecture – that can not only discourage attackers, but actually prevent them from penetrating your IT environment.In this webcast, you will learn some of the basics of building a next-generation IT security architecture, including:
How the foundational architecture of a next-gen firewall and security platform “matters” in enabling the business, and protecting it against a wide variety of attacks.
How the architecture enables unique and specific security scenarios.
How the architecture supports a prevention-oriented approach.
Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The fourth webinar in the series will cover the topic of Leadership from an IS executive perspective. Technical expertise is a critical component of security leadership; however, the modern CISO must possess a myriad of fundamental business to run a successful program. This session will focus on non-technical areas in which the CISCO should be competent and communicate effectively: strategic planning, financial management, contracting, and vendor management.
Patrick Grillo, Senior Director, Security Solutions, Fortinet
IoT is everywhere these days and like most new and shiny things our attention is focused on its coolness factor.
However, behind that pleasing and shining exterior lurks a potentially devastating menace. In the rush to bring product to market, very few if any manufacturers are security conscious, and as more and more of these products are deployed in the enterprise, the risk of a successful network breach increases exponentially.
This session will focus on the potential dangers with IoT and look at the question of how and why IoT security is different from traditional IT security.
The discussion on privacy and security of mobile devices has become an explosive topic. With the Snowden revelations leading the way and mobile vulnerabilities like Stagefright and XcodeGhost following behind, the question of is it necessary or even possible to secure voice and data on mobile devices remain the subject of hot debate. With the focus of attackers shifting to these devices, organizations need to be ready to protect their employees and themselves.
This seminar examines the security risks associated with mobile computing devices and infrastructures, and suggested controls for mitigating those risks. It examines the key guidelines from NIST and other organizations and the best practices for mobile security.
Dynamic analysis of android apps is all about analyzing apps in real time, for the purpose of detecting application level vulnerabilities and for the sake of manipulating applications while they execute. It is often used as a last resort due to its complexity, when other pentesting techniques mainly focused on static analysis are not enough. Common usages of dynamic analysis are extraction of sensitive data from application memory variables, stealing encryption keys, manipulating signature mechanisms and so on.
During this talk we will focus on memory dumps, remote debugging, small debugging, native debugging, usage of ReFrameworker platform and other interesting things.
This talk is based on a similar chapter as part of the Android application hacking course given by the speaker at recent BlackHat USA 2015
Today's workforce is mobile, with employees demanding access to more resources from more remote devices and platforms than ever before. Global networks connect employees, partners and customers over multiple Internet, intranets and VoIP channels. Even the smallest organization is now competing globally. IT organizations are struggling to keep up with mobile worker demand for access to more resources from more device types without compromising security and data.
Join this panel discussion where info security leaders Florian Malecki and Amar Singh will be covering how you can get ahead of the next wave of mobile access and security challenges.
Most organisations are surprised by the ease with which social engineering defeats their security. The human factor provides a simple and effective route to bypass even the best hardware and software security controls, yet is commonly overlooked or considered too difficult to solve. Peter will share a number of real examples to reinforce his opinion: as more and more data breaches are published, perhaps it’s time to become creative and strengthen the human firewall.
Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council
Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The third webinar in the series will cover the topic of Business Continuity Management from an executive perspective. This session focuses on the most important concerns related to business continuity management. CISO isn’t always the leader of an organization’s business resilience efforts, but the CISO offers significant influence to ensure an effective program that support business impact analysis, business continuity planning, and disaster recovery for an organization’s critical information assets.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.