To combat increasingly sophisticated and frequent security threats from insiders and outsiders, organizations the world over are deploying Security Information/Event Management (SIEM) solutions By providing a centralized security intelligence gathering system that spans an enterprise’s critical inf
To combat increasingly sophisticated and frequent security threats from insiders and outsiders, organizations the world over are deploying Security Information/Event Management (SIEM) solutions By providing a centralized security intelligence gathering system that spans an enterprise’s critical infrastructure, SIEMs can offer deep visibility into suspicious activity and latent operational problems.
This presentation is designed for individuals who are generally familiar with the concepts of SIEM technology, but are looking to improve their understanding and skills for detecting and defeating insider threats.
This session will:
- Cover the main components of a SIEM deployment and explain the role each plays in gathering the data required for investigations.
- Explain how to utilize SIEM technology to detect and eliminate insider threats
- Demonstrate how to use SIEM technology to monitor insider activity including network utilization, web surfing, and data leakage, and changes made to critical files
In this webinar we will explain how DevOps, powered by Chef automation, makes it possible to deliver infrastructure and new features at velocity within the highly regulated world of the UK Government sector.
Using Chef in conjunction with a platform such as Skyscape Cloud Services, which provides assured cloud services, enables the government sector to deliver software at speed without fear of compromising Official and Official Sensitive data. With a correctly provisioned and tested infrastructure, plus rules that automate rigorous security testing and policy assurance, you can reduce risk, provide a faster route to delivery and help enable DevOps within your organisation.
Hear from Seth Thomas, DevOps Evangelist at Chef Software and Peter Rossi, Head of Automation at Skyscape Cloud Services on how to automate your infrastructure in a secure cloud environment.
In addition, Viewdeck Consulting and Synyega will discuss their successes within this market sector, and offer tips on how you too can adopt DevOps practices.
Bez względu czy środowisko IT zbudowane jest w modelu tradycyjnym, czy też poddawane jest transformacji do modelu chmurowego wysoka dostępność jest niezmiennie ważna. Co więcej, oczekiwania w zakresie wysokiej dostępności, podobnie jak w zakresie zwinności IT, stają się coraz wyższe. Chcąc utrzymać elastyczność biznesową, szybkość reakcji, najwyższy poziom usług nasi Klienci oczekują rozwiązań, które zapewnią parametry RTO i RPO jak najbardziej zbliżone do 0. Podczas tej sesji zapoznamy Państwa z takimi rozwiązaniami EMC. Zaprezentujemy nowoczesne metody zabezpieczania danych i aplikacji przed awarią rozległą – praktyczne zastosowania rozwiązań EMC VPLEX, EMC RecoverPoint, EMC MetroPoint, EMC SRDF/Metro
With the average company experiencing unplanned downtime 13 times a year, the costs associated with continuing to invest in a legacy backup solution can be extensive. For this reason, more customers are switching to Veeam® and Quantum than ever before. Update to a modern data center and achieve Availability for the Always-On Enterprise™ with Veeam coupled with Quantum’s tiered storage that increases performance, reduces bandwidth requirements and executes a best practices for data protection.
Your customers are connected and in control like never before. Join us for a live Marketing Cloud demo to learn how you can create 1-to-1 journeys that keep your customers engaged from interested prospects to loyal brand advocates. See for yourself how the #1 Marketing Cloud platform helps brands of all sizes:
- Unify data into a single customer view
- Personalize journeys throughout the entire lifecycle
- Engage customers across all channels, including email, mobile, social and ads
- Analyze everything to make insight-driven decisions on marketing investments
We will also share real-world examples of customers like you who are achieving amazing results with Salesforce Marketing Cloud.
After a record-setting year in 2015, where will the tech M&A market go in 2016? What trends that pushed M&A spending to its highest level since the Internet Bubble burst will continue to drive deals and which ones will wind down? What other sectors are likely to see the most activity this year? And most importantly, what valuations will be handed out in deals over the coming year? Drawing on data and views from across 451 Research, the Tech M&A Outlook webinar maps many of the major developments in the IT landscape (IoT, Big Data, cloud computing) to how those influence corporate acquisition strategies. Join us for a look ahead to what we expect for tech M&A in 2016.
Every business has data, but only a few are treating it as a strategic asset for actionable insights. Many struggle with locating and aggregating data, while others wrestle with visualizing and interpreting the data. Join Clive Bearman and Ron Lunasin for an interactive and demo-focused session on how to leverage the latest technologies in the cloud analytics market to make every-line of business data-driven. You’ll see how companies from different industries are using the Informatica Cloud to make waves across their companies by connecting, aggregating and relating data from different sources. You’ll also discover how to achieve amazing insights with the Salesforce Analytics Cloud. Finally you’ll learn the 5 top tips that ensure that your data will always be clean, connected and contextual with Wave Analytics and Informatica.
Overhead power distribution in your data center offers many attractive possibilities, but is not without its challenges.
Join Starline's Director of Marketing, Mark Swift; CPI’s Senior Data Center Consultant, Steve Bornfield; and University of Florida's Joe Keena for an exploration of the options and some of the pitfalls, supported by real-life examples from the field.
Everything is getting digitized - everything is becoming “software empowered”. Who is writing all this software? It is central IT or is it business IT and the third parties they employ? How can central IT ensure that it is relevant this exciting new, software empowered, world?
The Chef DevOps Journey Assessment or Dojo is a tool that is used to assess both the current and desired state of your organization's DevOps progress. The goal of the exercise is to expose opportunities for continuous improvement by defining a baseline of where you are on your journey and the desired state you’re trying to get to. After we compile the results, patterns will emerge and be used to visualize goals and generate custom guidelines towards success.
In this webinar, Justin Redd, Customer Engineering Lead, and Thomas Enochs, VP Customer Success, will explain:
- Why we created the Dojo and how it can help your organization accelerate DevOps adoption
- What the DevOps Journey Assessment is and how it’s conducted
- Who in your organization should attend the Dojo exercise
- How to get it
Consumer engagement remains a priority for brands that are looking to build and maintain meaningful relationships with their customers. The challenge in today’s cross-channel, social, and mobile world is to develop enough, relevant content that will drive the desired levels of engagement.
User-generated content, or UGC, provides relevance and authenticity that brand- produced content cannot. Brands that incorporate consumer- produced content into their marketing are seeing greater performance within their existing channels and programs because of its
Our webinar, Increasing Consumer Engagement with User Generated Content, will discuss:
- Why UGC is so impactful with consumers
- How brands, like McCormick, are leveraging UGC to increase consumer engagement
- Tips for driving consumer participation with UGC campaigns
- Rights management and UGC curation
What is the essence of information security governance, risk & compliance? How do you meet your governance, risk and compliance requirements and prevent a data breach? The key is to understand the spirit of risk management and create a customised information security management system (ISMS) for your business. This presentation details a practical, step-by-step guide for designing and implementing a cost-effective ISMS to minimise your risk of a breach and meet your Association’s legislative (Data Protection Act), regulatory (Payment Card Industry), or industry standard (ISO-27001) compliance requirements to include:
On this webcast you will learn how to manage your information protection strategy better and we’ll also look at what this means for the CIO in the future.
Join your fellow professionals and sign up for the second in the series - discussing threat analysis, information sharing and providing tips for how to build an intelligent and responsive data-driven security strategy.
Adoption of data-driven security is set to rise threefold in 2016. Benefits include advanced security automation, accuracy and intelligence that enable mitigation capabilities to adapt in real time as threats change. However, solutions will only be as effective as the age, quality and quantity of the data available, meaning access to vast amounts of live attack traffic will be vital. Join us for this webinar to learn more about data-driven security and how it’s being deployed to bolster web defences.
Zach Boewer, Vice President of Information Technology, Scale Venture Partners
Scale Venture Partners committed to move 100% of its IT infrastructure to the cloud and Zach Boewer, VP of Information Technology lead the charge. While the cost, performance and flexibility benefits of moving to the cloud are undisputed, security fears still linger.
Zach believes recent advancements in Security-as-a-Service has made it possible to provide better security in the cloud than is possible in the typical corporate datacenter. The Cloud can actually be safer.
In this video, Zach will describe the tools and processes he is using to ensure end-to-end data security, detailing the strengths (and limitations) of security in the most popular SaaS/IaaS applications. He will cover the tools he has deployed to manage policy across all his cloud deployments and the lessons he has learned in selecting them.
Chris Nelson, Director of Security, Distl Networks
For centuries mankind’s greatest innovations came about through careful examination of natural systems. Information Security is no different. This presentation will explore how information security professionals can use the agricultural concept of “permaculture” (the practice of using design principles observed in natural ecosystems) to cultivate a sustainable, data-driven security program.
In this fast-paced, thought-provoking session you’ll learn:
- The basic tenets of permaculture and how they apply to information security strategy
- How to build a security program that fosters collaboration, coupled with feedback loops and metrics
- How embracing differences within an organization can lead to increases in productivity and security
- Effective policy and control designs that enhance business objections as opposed to stifling them
About the Speaker
Chris Nelson has a passion for security, especially building security programs and teams in incredibly dynamic organizations. Chris is currently the Vice President of ISSA’s Denver Chapter, and Director of Security for Distil Networks, where he continues to expand his theories on using Permaculture in the design and implementation of security programs and controls. Chris held a similar role at Rally Software after working with Aetna as a security, compliance and privacy lead. Previously, he held similar roles with Return Path and has served multiple Fortune 500 clients in a consulting capacity.
Jeffrey Ritter, External Lecturer, University of Oxford
Security demands countless decisions to determine whether or not log data or other surveillance data are positive indicators of adverse activity or merely false positives. Knowing when, and how, to make and document those decisions can be critical to how legal and compliance sanctions may be imposed. Designing your security controls to do so effectively can make all of the difference. Learn how rules-based design can transform your design frameworks and keep lawyers and regulators away.
Jules Pagna Disso, Head of Research and Development, Nettitude
The success of cyber threat intelligence is measured by its effectiveness in reducing the impact of malicious actors. It is therefore important to understand the economy of malware in order to break the chains of success of such economy. Such success needs to be materialised by a change in attitude, policies and configurations.
Whilst applicable to most organisations, most examples used during this seminar will feature the financial sector and aim to:
· Analyse the core components of the economy of malware
· Analyse how to gather intelligence to reduce the impact of malicious actors
· Show how to use the intelligence gathered to improve the security posture of the organisation
Ayse Kaya Firat, Director of Customer Insights and Analytics; Bernd Leger, VP Marketing, CloudLock
As recently reported in the WSJ, 1% of users represent 75% of cybersecurity risk. We know, we were surprised too. This and other shocking truths about the causes and consequences of cloud vulnerabilities are uncovered in our latest cybersecurity report - gathered from our findings across over 10 million users, 1 billion cloud assets, and 91,000 unique apps.
Get the inside scoop in our webinar where you’ll learn what it all means directly from our customer insights and data guru, Ayse Kaya Firat:
– Top cloud cybersecurity trends that fly under your radar
– What the distribution of cloud cybersecurity risk means for your ability to act on it
– Three key security skills you should master for an immediately safer cloud environment
Merritt Maxim, Senior Analyst at Forrester Research
Despite the rapid enterprise adoption of SaaS, many organizations still rely on a hybrid mix of on-premise and SaaS apps to run their business, creating administrative challenges and inefficiencies.
Identity-as-a-service (IDaaS) solutions have evolved to provide business and security professionals with a viable and compelling alternative to traditional IAM options. Besides delivering all the great cloud benefits, cloud-based IAM offerings can integrate with on-premise environments to increase business agility, reduce operational inefficiencies, mitigate identity risks, and improve real-time visibility for today's hybrid enterprise.
Join featured speaker Merritt Maxim, Senior Analyst at Forrester Research, as he discusses the state of IDaaS in the context of new architectures and real world use-cases, including:
– Current IDaaS Market Trends
– Critical considerations for building an IDaaS architecture & strategy
– Challenges in extending on-premises
– IAM approaches to the cloud
– Key benefits from deploying IDaaS in hybrid environment
– Quick Demo of OneLogin IDaaS solution for hybrid environment
Jack Nichelson and Kevin Merolla, Chart Industries and Barry Fisher, OpenDNS
We all know that security gaps are widening due to technology shifts and advanced threats. Whether you are in finance, energy, tech, or manufacturing, the infosec challenges are much the same.
Chart Industries — a global manufacturer with 5,000 employees and 45 locations — was facing a huge volume of malicious activity every day resulting in excessive break-fix work for their small security team. They had thousands of unmanaged mobile and guest devices connecting to their networks. And neither web proxies nor endpoint security could fully protect them. They needed a new layer of malware and breach protection. But it also had to be a painless deployment and it needed to be a transparent experience for their employees and guests.
Hear directly from Jack Nichelson, Chart’s Director of IT Infrastructure and Security to learn:
-Why they use a layered approach to security and how OpenDNS complements their security stack
-How long it took to deploy OpenDNS Umbrella globally
-How his security analyst, Kevin Merolla, quickly responds to incidents or false positives using OpenDNS Investigate
Chanel Suggs, IT Security Manager, Professor and Advisory board member, EC-Council
The future for women in Cyber Security is NOW.
Despite the growing demand and tremendous opportunities in the job market, cyber security remains an area where there is a significant shortage of skilled professionals regionally, nationally and internationally.
At EC-Council University we want to empower and recognize women who are results-driven and able to manage multiple disparate tasks while leading groups to achieve positive outcomes and astonishing professional successes.
Even worse, women’s representation in this male-dominated field of security is alarmingly low. Women are detail oriented with an analytical mind that quickly assess and achieve solutions to the most difficult problems, prioritizing and executing in a rapid, dynamic environment.
“At EC-Council University we wish to highlight these prestigious women and set examples for others to follow suit.”
Harris D. Schwartz, Head, Global Cyber Security, Levi Strauss & Co.
Levi Strauss & Co., one of the world’s largest brand name apparel companies and a global leader in jeanswear, enhances its security with threat intelligence to better protect its worldwide operations — including its online and physical stores.
Listen to Harris D. Schwartz, Head of Global Cyber Security at Levi Strauss & Co., explain how Levi Strauss applies real-time threat intelligence to monitor the most critical risks, direct threats, and emerging trends that could impact the organization. Schwartz explains how threat intelligence is used for:
* Real-time alerts on direct cyber threats made on the deep and dark Web including hacker forums.
* Monitoring threats against IT infrastructure, domain, or IPs (CIDR).
* Notifications about breached/exposed credentials.
* Warnings about exploits/attacks/threats/breaches related to suppliers, industry peers, and vendors.
* Creating a daily email digest of top trending and emerging observables: TTPs, including malicious IPs, CVEs, hackers, and more.
Levi Strauss & Co. products are sold in more than 110 countries worldwide through a combination of chain retailers, department stores, online sites, and a global footprint of approximately 2,700 retail stores and shop-in-shops.
Harris D. Schwartz is a global security, risk and investigations professional, with over 20 years of private sector experience; experience in the design, development and implementation of comprehensive security, investigations and threat intelligence strategies in a variety of business climates and organization cultures. Schwartz has developed security and risk programs for a variety of business sectors, designing comprehensive threat mitigation solutions, coordination and managing and mentoring of direct reports and multiple departments.
The second in our Lowering Cyber Risk series with a focus on the Financial Services and helping to meet SOX compliance requirements.
Cyber Risk is the Risk most underestimated by businesses according to the 2015 Allianz Risk Barometer.
Learn how organisations are able to lower Cyber Risks associated with Loss Reputation, Business Interruption, and Loss of Customer Data, and thus improving Detection and Response capability.
Discover how you can help to meet SOX compliance requirements by utilising User Behavioural Analytics, monitoring the user’s access to critical systems with required surveillance, forensics and reporting user access.
Plus, see a LIVE DEMO with an example of an internal employee attempting to exfiltrate data from critical systems on a Financial Services environment.
Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.
You can't have a discussion on the next generation of information security without talking about securing the cloud. The “move to the cloud” has long been considered a key initiative by organizations worldwide. With this move, there’s a level of increased risk that enterprises must address. What’s different is using cloud services requires abdicating some control over how systems and data are being protected. We begin this discussion on this footing.
Join Scott Hogrefe, VP of Market Data for Netskope, who will lead this discussion about what security professionals need to know about:
- Their cloud risk
- How to quantify it for their corporate leadership and board of directors
- How to convey it in the context of their overall cloud strategy
- 6 steps to take right now to address cloud security risk
Jeffrey Ritter, External Lecturer, University of Oxford
Security, information governance, and public regulation all share a core value--creating digital information that can be trusted as the truth. But an effective economic business case has eluded security advocates. Making that case succeed requires a new way of counting the value of effective security and measuring the trust that can be achieved.
Something is seriously wrong here. Businesses spend millions every year on the latest security technologies to keep their businesses safe – and then they still get attacked! Why does this continue to happen over and over again, and what can we do about it? This presentation – loaded with compelling research data from many different industry sources – provides revealing statistics on how bad this cyber security problem really is, and why it has continued to get worse despite your best efforts. But, if you’re willing to think differently about network security, there is now a way you can eliminate a huge number of attacks on your network, improve productivity of your IT staff, keep your business safe, and save a significant amount of money in the process. Skeptical, right? Well attend this session, learn the facts, then decide for yourself.
Gemalto surveyed 900 IT decision makers from around the globe on the subject of securing user mobility. Our findings reveal that although most organizations (97%) recognize the importance of mobility in their work practices, 92% still restrict access to resources from mobile devices. Not only were mobile access challenges uncovered, but with 20% of support tickets resulting from lost or forgotten passwords, identity management hurdles were uncovered, as well. Based on the Gemalto 2015 Authentication and Identity Management Index survey results, this webinar covers obstacles encountered by IT leaders in their quest for greater mobility, and four takeaways on how they are overcome.
Big Data has come from nowhere to become an integral part of our daily lives. It is a new and compelling way to see and understand the world we live in. Sadly, the information security industry has yet to harness the power of big data because we just don’t understand it.
This presentation provides a clear, simple and useable perspective on big data to include:
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.