Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Priorisez et remédiez vos vulnérabilités avec Qualys ThreatPROTECT Priorisez et remédiez vos vulnérabilités avec Qualys ThreatPROTECT Leif Kremkow, Technical Account Manager, SEMEA, Imane Rouijel, Technical Account Manager, SEMEA Sep 27 2016 8:00 am UTC 60 mins
    Gérer le nombre croissant des vulnérabilités est devenu un véritable challenge pour les entreprises.
    Cependant, 97 % des attaques exploitent uniquement 10% des vulnérabilités connues.
    De toute évidence, il est devenu impératif d'arrêter de jouer aux devinettes et d’identifier les vulnérabilités les plus menaçantes de façon effective afin d’y remédier rapidement.

    ThreatPROTECT, dernière solution Qualys, corrèle en temps réel les données de vulnérabilités avec de multiples flux de menaces connues.
    Les résultats sont fournis sous forme de tableaux de bord faciles à appréhender et offrent ainsi une vision claire des vulnérabilités à traiter en priorité.

    L’objectif de ce webcast est de vous présenter en 3 points les usages et avantages de ThreatPROTECT.
    * Identifiez vos assets les plus importants
    * Détectez rapidement les vulnérabilités critiques via la corrélation en temps réel avec les menaces actives.
    * Priorisez les remédiations et intervenez sur les vulnérabilités à traiter sans tarder

    Démo en live et session de questions/réponses
  • Anatomy of a Ransomware Attack Anatomy of a Ransomware Attack Antonio Forzieri, Global Cyber Lead & Gabriele Zanoni, Incident Response Investigator Sep 27 2016 10:00 am UTC 60 mins
    Ransomware continues to evolve. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.

    Take this opportunity to learn directly about what can happen in a ransomware attack based on real-life events. Symantec’s Cyber Security Services experts will lead the discussion and will help you to understand how you can improve your line of defense against ransomware and minimise the loss of key data, money and intellectual property from your organisation.
  • 2016 Midyear Security Roundup: The Reign of Ransomware 2016 Midyear Security Roundup: The Reign of Ransomware Myla Pilao, Director, TrendLabs Marketing Communications Sep 27 2016 12:00 pm UTC 60 mins
    Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
  • Anatomie eines Ransomware-Angriffs Anatomie eines Ransomware-Angriffs Alexander Peters, Senior Manager Office of the CTO and Lars Kroll, Technical Lead - Symantec Germany Sep 27 2016 1:00 pm UTC 60 mins
    Wie können Sie angesichts des neuen Grads an Ausgereiftheit und Bedrohung, den Ransomware im vergangenen Jahr erreicht hat, sicher sein, dass Ihre Infrastruktur davor geschützt und Ihr Unternehmen ausreichend vorbereitet ist, um einen Angriff zu bewältigen?

    Sicherheitsverantwortliche haben heute mit diesen Problemen zu kämpfen:
    •Nicht genügend umsetzbare Threat Intelligence, um verstehen zu können, welche Akteure und Kampagnen eine Bedrohung für ihre Unternehmen darstellen.
    •Zu wenig geschulte Sicherheitsanalysten, die die zunehmende Zahl von Bedrohungen identifizieren können, die in ihre Unternehmen eindringen. Beispielsweise konnte der Einsatz von Crypto-Ransomware als Angriffstool im Jahr 2015 eine weitere Zunahme verzeichnen, und zwar um 35 %. Dennoch brauchen Unternehmen, in denen ein Angriff stattfindet, in der Regel mehr als 200 Tage, um sich dessen bewusst zu werden.
    •Zu wenig spezialisiertes Know-how hinsichtlich der Methoden, die erforderlich sind, um auf Bedrohungen zu reagieren und diese unschädlich zu machen, nachdem sie in ihrer IT-Umgebung Fuß gefasst haben.

    Die Taktiken von Ransomware-Gangs werden immer ausgefeilter und Unternehmen müssen sich der Gefahr, die sie darstellen, vollständig bewusst sein. Nehmen Sie an einem Webinar von Symantec teil, in dem ein konkreter Ransomware-Angriff behandelt wird. Sie erfahren, was geschehen ist und welche Maßnahmen das betroffene Unternehmen ergriffen hat, um die Bedrohung zu beseitigen.
  • Transform Your Agile Strategy to Deliver More Value Transform Your Agile Strategy to Deliver More Value Dan Rice Advisor, Agile Management, Americas & EMEA Sep 27 2016 1:00 pm UTC 60 mins
    Many companies experimenting with agile development methods in their engineering and IT groups are having only mixed success.

    Unless you’re implementing agile both upstream (through your portfolio) and downstream (through testing and operations,) you’re not harnessing agile’s full power through Digital Transformation. Being faster to market doesn’t help your bottom line if you deliver the wrong things, and failing to get the right things into production fast means you’re leaving money on the table.

    Join this web seminar to gain insight into the benefits of a digital transformation. You’ll discover a strategic, collaborative approach to channel the power of agile and deliver more value to your customers.
  • La protection des terminaux au-delà des antivirus La protection des terminaux au-delà des antivirus Bertrand Le Bail and Cyril Simonnet, Cyber Security Solutions, Palo Alto Networks Sep 27 2016 2:00 pm UTC 60 mins
    l est temps de protéger vos utilisateurs contre les menaces qui contournent facilement les antivirus.

    Assistez à notre webinar en direct sur la sécurité des terminaux

    •Les coûts cachés d'un antivirus classique pour votre entreprise
    •Comment déterminer la véritable valeur d'une solution de sécurité des terminaux
    •Les cinq fonctions indispensables à la protection de vos utilisateurs, systèmes et terminaux
    •Comment Traps v3.4 prévient les failles de sécurité dans votre entreprise sans antivirus classique

    Protégez-vous contre les antivirus.
  • Optimizing Hybrid Cloud Security in the Software-Defined Data Center Optimizing Hybrid Cloud Security in the Software-Defined Data Center Mike Smith, Director, Modern Data Center Solutions, Trend Micro Sep 27 2016 5:00 pm UTC 60 mins
    Join us as we discuss how Trend Micro and VMware have partnered to deliver an optimized hybrid cloud security solution architected for VMware virtualized data centers, virtual desktops, and multi-cloud deployments that include AWS and Microsoft Azure.

    In this webinar you will learn how to….
    -Optimize data center resources with virtualization-aware security
    -Deliver automated security across environments
    -Manage and deploy security efficiently
    -Achieve cost effective compliance
  • Building an Enterprise-Ready BI Platform for your IT Building an Enterprise-Ready BI Platform for your IT Kevin Orbaker, Technical Solutions Professional, Microsoft Sep 27 2016 6:00 pm UTC 60 mins
    Is your BI platform enterprise-ready? Give your IT team a supercharge!

    IT oversees, facilitates, and orchestrates all BI solutions to make sure they integrate with existing systems and maximize resources. When you choose a comprehensive, enterprise-ready BI platform, IT is empowered to leverage data more effectively for your business.

    Join this webcast to learn how, with the right BI solution, IT can:
    •Control and monitor access to data and assets
    •Help ensure security and compliance
    •Partner with the business to help drive strategic projects

    This webcast is part of our Building a Data Culture Leveraging Power BI webcast series. Sign up for this session, or the entire series today!
  • Effective IT Security in a Connected Mobile World Effective IT Security in a Connected Mobile World Microsoft Sep 27 2016 8:00 pm UTC 60 mins
    Learn how all employees can work and collaborate securely! The new world of work demands that people collaborate faster and more seamlessly than ever before.

    Your employees have access to cloud-based apps, personal devices, and pervasive internet connectivity. All these things are great for getting work done, but your company is still held to high standards around security, and auditing, and you can't afford to make a wrong move.

    Join this webcast to explore some common security scenarios such as:
    •How do you provide access when you can't always control the endpoint?
    •How do you know where all your company's files are right now?
    •If you terminate an employee, how would you know what files they had in their possession.?
    •Could you wipe a terminated employee's corporate data while leaving their personal content alone?

    This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
  • Top 3 Critical Factors to Consider for Network Protection Top 3 Critical Factors to Consider for Network Protection Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint Sep 28 2016 5:00 am UTC 60 mins
    Next Generation Firewalls are Next Generation Firewalls…or maybe NOT.

    In the light of new advanced attacks and the demands to lower security infrastructure costs, just how can one get the most out of the Next Generation Firewall (NGFW) solutions? Are all NGFW solutions the same?

    What criteria should one consider for a NGFW solution that is best for your distributed enterprise environment? Join Forcepoint™’s Michael Ferguson and find out key value points when selecting a network security solution catered to your environment:

    • Latest trends in NGFW
    • Addressing total cost of ownership
    • Security effectiveness in increasingly complex threat landscape
    • Challenges in policy management

    Also, find out why Forcepoint Stonesoft NGFW has won NSS Labs' coveted highest rating of “Recommended” for the 4th year in a row. Learn how it can provide the scalability, protection and visibility needed to effectively manage your distributed networks. Plus, rapidly and easily deploy, monitor and manage thousands of firewalls from a single pane of glass.
  • Anatomia di un attacco di ransomware Anatomia di un attacco di ransomware Antonio Forzieri, Global Cyber Lead & Gabriele Zanoni, Incident Response Investigator Sep 28 2016 8:00 am UTC 60 mins
    Lo scorso anno il ransomware ha raggiunto un nuovo livello di evoluzione e pericolosità: come essere certi che l'infrastruttura IT sia protetta e in grado di affrontare un attacco?

    Oggi i leader della sicurezza hanno importanti sfide da risolvere:
    •Un’intelligence sulle minacce insufficiente a individuare gli aggressori e le campagne che potrebbero attaccare la loro azienda.
    •La penuria di analisti di sicurezza competenti in grado di identificare il numero crescente di minacce che penetrano all’interno delle aziende. Nel 2015, ad esempio, l’uso del crypto-ransomware come strumento di aggressione è aumentato del 35%, ma le aziende aggredite impiegano ancora più di 200 giorni per accorgersi del problema.
    •Scarsa conoscenza specializzata delle tecniche di incident response e remediation per gli ambienti IT colpiti.

    Gli autori dei ransomware continuano ad affinare le proprie tattiche, e le aziende devono imparare a conoscere bene le nuove minacce. Partecipa al webinar Symantec che descrive un attacco di ransomware, le sue conseguenze e la strategia di remediation adottata dall’azienda colpita.
  • Anatomía de un ataque de ransomware Anatomía de un ataque de ransomware Ramsés Gallego - Symantec Strategist Sep 28 2016 9:00 am UTC 45 mins
    El año pasado, el ransomware alcanzó un nivel de peligrosidad y profesionalidad nunca visto hasta ahora: ¿cómo puede estar seguro de que su infraestructura informática está protegida y de que está preparado para gestionar un ataque?

    En la actualidad, los líderes de los equipos de seguridad se enfrentan a los siguientes desafíos:
    •Una falta de inteligencia procesable sobre amenazas para mejorar su comprensión sobre los ciberdelincuentes y campañas que podrían tener como objetivo a su empresa.
    •Muy pocos analistas de seguridad cualificados que puedan identificar el creciente número de amenazas que se infiltran en su organización. Por ejemplo, el uso del ransomware de cifrado como herramienta de ataque por parte de los ciberdelincuentes continuó aumentando en 2015, con un crecimiento del 35 %. Sin embargo, las empresas que sufren un ataque siguen tardando más de 200 días en conocerlo.
    •Pocos conocimientos especializados en las técnicas necesarias para responder a las amenazas y repararlas una vez han invadido su entorno informático.

    Los grupos de cibercriminales especializados en ransomware continúan evolucionando sus tácticas, por lo que las organizaciones deben ser plenamente conscientes de las amenazas que estos representan. Únase a Symantec en un webinar que se centrará en un ataque de ransomware para conocer más detalles sobre el incidente y sobre las medidas que tomó la empresa para reparar la amenaza.
  • Anatomie d’une attaque par ransomware Anatomie d’une attaque par ransomware Hervé Doreau, Directeur Technique – Symantec France Sep 28 2016 12:00 pm UTC 60 mins
    Avec le degré de maturité et le niveau de menace atteint par les ransomwares au cours de l’an dernier, comment pouvez-vous être sûrs que votre infrastructure IT est réellement protégée et que vous êtes prêt à parer à une attaque ?

    Aujourd’hui, les responsables sécurité sont confrontés à :
    •un manque de renseignements exploitables sur les menaces, qui leur permettraient de mieux cerner les acteurs et les campagnes susceptibles de viser leurs entreprises
    •une carence en analystes de sécurité qualifiés, capables d’identifier le nombre croissant de menaces pénétrant leurs organisations. Par exemple, les cryptoransomwares sont en augmentation constante (+35 % en 2015 ) et il faut encore en moyenne plus de 200 jours à une entreprise pour découvrir qu’elle victime d’une attaque.
    •peu d’expertise spécialisée dans les techniques requises pour réagir à des menaces et les neutraliser une fois que celles-ci ont pénétré leur environnement IT

    Les gangs de rançonneurs ne cessant d’affiner leurs tactiques, les entreprises ont besoin d’être parfaitement au courant des menaces et des risques qu’elles encourent. Symantec vous donne rendez-vous pour un webcast consacré aux attaques par ransomware. Vous y découvrirez ce qui est arrivé à une société et les mesures qu’elle a prises pour remédier à la menace.
  • State of the Hack: Nordics State of the Hack: Nordics Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Sep 28 2016 12:00 pm UTC 45 mins
    The cyber threat landscape has never been more dynamic, than what we are seeing today. With an expanding surface area for attacks and a cybercriminal ecosystem worth billion of dollars on a global scale, cybercriminals are constantly pursuing new methods to obtain financial funds.

    It is no different in the Nordics – a region that is well known for its natural resources, innovations in renewable energy and healthcare, proximity to the Arctic, and emphasis on transparency in government is also a prime target for cybercriminals. These unique attributes make the region a prime target for cyber threat groups looking to capitalize on Nordic countries’ robust economies and distinct geopolitical concerns.

    Join Jens Monrad, Senior Intelligence Account Analyst at FireEye, who will discuss:

    * The Threat Landscape in the Nordics
    * Trends and Insights in Malware detections across the Nordics
    * Geopolitical situations which can influence the threat landscape in the Nordics
    * How having accurate and enriched threat intelligence can enable organisations to make tactical, operation and strategic decisions.

    Register today and learn what tools, processes and information organisations need in order to allow them to fully reconstruct the attack scenario and help make the right decisions based on the attack, as well as prepare for the next one.
  • CMDB Implementation Approach & Case Study CMDB Implementation Approach & Case Study Peter Hubbard, Principal ITSM Consultant at Pink Elephant EMEA & Faisal Usmani, Business Development and Strategy Lead for Co Sep 28 2016 3:30 pm UTC 60 mins
    CMDB Implementation is one of the most complicated of any ITSM programmes an organisation can undertake. The difficulties in creating a toolset, capable of linking hundreds of thousands of interconnected bits of data together in a meaningful manner while also supporting a highly fluid environment with dozens of changes each week, are formidable indeed.

    Join Peter Hubbard, Principal ITSM Consultant at Pink Elephant EMEA, as he discusses the Pink Elephant approach to create a CMDB in the real world. He will demonstrate the critical importance of the scoping session and understanding the organisations requirements to ensure the CMDB supports the business. Peter will then show you how to turn those requirements into concrete actions to map and create your CMDB.

    Faisal Usmani, Business Development and Strategy Lead for Comms at Cyient EMEA, will build on Peter’s theme; detailing how an effective CMDB implementation forms the basis for ITSM solutions. He will cite a case study that shows how this translates into a real world operational scenario that utilises actionable dashboards and provide valuable insights into your service performance at different levels within your organisation.

    At the end of the session you should know the importance of being able to ask your ITSM organisation ‘For our CMDB, do we need a battle tank or body armour?’’
  • IT Security Hygiene On The Brink: Fix Security Posture With On-Demand Visibility IT Security Hygiene On The Brink: Fix Security Posture With On-Demand Visibility Eric Hanselman, 451 Chief Analyst, and Erik Kristiansen, Tanium Sr. Director of Product Marketing Sep 28 2016 5:00 pm UTC 60 mins
    IT organizations have hit a breaking point in siloed management tools to address one of the most critical issues today - cybersecurity hygiene. In particular, numerous point solutions targeting the endpoints drive cost, complexity, and other challenges. New investments in cloud, distributed workforces and increasing numbers of connected devices only exasperate this problem. Addressing cybersecurity hygiene means that critical actions must be made on demand versus scheduled. Teams must also have confidence that assessment results and remediation actions are complete.

    Come learn about the key issues why cybersecurity hygiene fails in most organization. We’ll discuss in depth how the platform approach and speed of Tanium are poised to fix this critical problem. Eric Hanselman, 451 Chief Analyst, and Erik Kristiansen, Senior Director of Product Marketing at Tanium will discuss.
  • Real-Time Vulnerability Assessment for Rapid Response to Security Threats Real-Time Vulnerability Assessment for Rapid Response to Security Threats Bill Lewis, Dir. of IT, State Garden, Erick Ingleby, PM. Forescout & Jorhn Schimelpfenig, Sr. Business Dev. Manager, Rapid7 Sep 28 2016 6:00 pm UTC 60 mins
    State Garden, a top producer of salad greens in the northeastern U.S., had two serious cybersecurity issues that needed to be addressed:

    1.) Internet of Things (IoT) endpoints on the company’s network were undetectable.
    2.) Vulnerability Assessment (VA) scans were missing mobile Bring Your Own Device (BYOD) systems that come and go from the network.

    Both issues were creating an attack surface that was increasingly harder to monitor and protect.

    Billy Lewis, State Garden Director of IT, will share the challenges he faced to:
    •Maximize efficiency of limited IT security resources and personnel
    •Protect company assets from unauthorized or non-compliant devices connecting to the network
    •Automate endpoint compliance and remediation
    •Orchestrate multisystem security

    In addition, Lewis will explain the role the ForeScout-Rapid7 solution played in reducing the attack surface and accelerating remediation on State Garden’s network.
  • Best Practices for Project Portfolio Management in State and Local Government Best Practices for Project Portfolio Management in State and Local Government Rob Hirschmann Sep 28 2016 8:00 pm UTC 60 mins
    Having a single system of record of all program, portfolio, and project information reduces costs and allows governmental organizations to quickly snap to and comply with mandates and regulations.

    Join this webcast to learn how integrated PPM solutions:
    •Bring increased accountability across agency projects
    •Facilitate real-time collaboration between project and program managers and their teams
    •Reduce redundancy and manual effort
  • Combining Least Privilege + App Control to Protect from Malware and Ransomware Combining Least Privilege + App Control to Protect from Malware and Ransomware Gil Rapaport, CyberArk, Adrian Davis, (ISC)² EMEA Sep 29 2016 11:00 am UTC 60 mins
    Privilege is at the centre of the attack lifecycle, yet removing Windows users’ local administration rights has a negative impact on the user experience and creates a desktop support headache.

    Join this webinar to learn how least privilege, combined with the right application control technologies, can enable you to remove local administrator rights to reduce your attack surface, while keeping your users and support teams happy. The session will cover the technologies required to achieve this and demonstrate how their unique combination can protect you from ransomware.
  • The CISO as a Transformational Role in Risk Management The CISO as a Transformational Role in Risk Management Michael Rasmussen- GRC 20/20 Sep 29 2016 2:00 pm UTC 60 mins
    Mike Rasmussen of GRC 20/20 explores the ever changing role of the CISO in a modern organization.

    This presentation offers a prescription for managing information security risk as it permeates business operations, processes, transactions, and relationships in the digital world.
  • The 7 Things I Wish I Knew Before I Started Down the Agile Path - 1 PDU The 7 Things I Wish I Knew Before I Started Down the Agile Path - 1 PDU Andy Jordan, ProjectManagement.com Sep 29 2016 2:00 pm UTC 60 mins
    Every organization’s Agile transformation is different, however there are key landmines that can cause an organization’s Agile transformation to struggle. Join Andy Jordan, ProjectManagement.com as he discusses how you can avoid seven common Agile transformation mistakes and put your organization on the right path with Agile.

    This session is approved for 1 Project Management Institute (PMI) PMP PDU Credit.
  • Driving PPM Excellence–Insights from CA Services with Application Managed Svcs Driving PPM Excellence–Insights from CA Services with Application Managed Svcs George Starr, Sr. Director Practice Services Adam Frary, Services Marketing Sep 29 2016 3:15 pm UTC 60 mins
    Every one of our PPM customers is pursuing the same end goal – how to deliver the highest value to the organization. Working with hundreds of customers, we have learned that the answer requires a comprehensive approach across multiple disciplines. To drive bigger results and achieve greater PPM maturity, organizations need to improve PPM leadership, governance, change management, product management, development, support and other disciplines.

    Please join us for this presentation that discusses how to achieve PPM excellence by building competencies across disciplines in-house with the option of augmenting that approach with Application Managed Services for CA PPM.
  • Keeping Insider Risk at Bay Keeping Insider Risk at Bay Doug Copley, Deputy CISO and Senior Security & Privacy Strategist at Forcepoint Sep 29 2016 4:00 pm UTC 60 mins
    Is that activity you’re seeing a malicious user? Is it someone who made a mistake? Is it coming from an account whose credentials were compromised? Is it command and control traffic? How confident are you? As security programs are maturing, attention is turning to threats emanating from inside the network. Doug Copley will discuss seven profiles of highly risky users, outline how your organization can reduce insider risk, and present a real-world case study of how a software organization protected themselves.
  • Building Your Microservice Architecture for Speed, Scale and Safety Building Your Microservice Architecture for Speed, Scale and Safety Dinesh Chandrasekhar - Director Product Marketing, Jay Thorne - Director APIM Engineering, Stephen Mak - Product Manager Sep 29 2016 4:00 pm UTC 60 mins
    Everybody is joining the microservices bandwagon and only some enterprises truly see the benefits of adopting microservices. The real challenge is not only cultural adoption but also a question of choosing the right technical tools to enable and secure your microservices.

    In this webinar we'll provide practical guidance on building and deploying a microservice architecture for speed, scale and safety.

    Join this webinar to learn:

    - Key considerations of enabling microservices within your enterprise
    - How DevOps fits in the microservices lifecycle and how to align team culture
    - How to use an API gateway for securing and governing your microservice architecture