Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Are you ready for GDPR?
    Are you ready for GDPR? Lockpath Recorded: Nov 22 2017 1 min
    Visit https://lockpath.com/gdpr-checklist for more information on GDPR.

    Gophers Dance Practically Right?

    Giant Dinosaurs Prance Righteously?

    NO!

    General Data Protection Regulation. An EU data protection regulation that probably affects you and your business.
  • IT Security Attacken 2017 und 2018 in Deutschland, Österreich und der Schweiz: W
    IT Security Attacken 2017 und 2018 in Deutschland, Österreich und der Schweiz: W Candid Wueest, Symantec Recorded: Nov 22 2017 61 mins
    Die Bedrohungslage | November 2017

    Was Sie beachten sollten,um Ihre IT-Security 2018 zu stärken

    Was können Sie von den jüngsten Datenschutzverletzungen und Malware-Wellen lernen? Welche Schlüsse ziehen Sie, um die Sicherheitsvorfälle signifikant zu reduzieren? Wie bereiten Sie Ihre Netzwerke, Server und Endgeräte auf die neuen Angriffsmethoden vor, die 2018 kommen könnten und wie erfüllen Sie gleichzeitig die Regularien, wie GDPR?

    Das folgende Webinar von Orla Cox, Director Security Response Team, sollten Sie daher nicht verpassen!
    Das Webinar behandelt:
    •Analyse der grössten IT Security Vorfälle in 2017: Die Methodik und Hintergründe
    •Die wichtigsten Maßnahmen, die sie sofort ergreifen sollten
    •Eine Prognose für 2018 und besten Schutzmechanismen für 2018 und danach

    Heute noch registrieren
  • Are you Ready for Australia's Privacy Act? A Gemalto Case Study
    Are you Ready for Australia's Privacy Act? A Gemalto Case Study Jean -Pierre Mistral, Legal Counsel for Data Privacy and Graeme Pyper, Regional Director of Enterprise and Cybersecurity Recorded: Nov 22 2017 61 mins
    Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
    Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •The Mandatory Data Breaches scheme
    •Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • Equifax Breach and Managing Your Vulnerabilities
    Equifax Breach and Managing Your Vulnerabilities Carl Wright (AttackIQ), Igor Baikalov (Securonix), Chris Petersen (LogRhythm), Sam Abadir (LockPath) Recorded: Nov 22 2017 62 mins
    With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.

    What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?

    Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
    - The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
    - Managing IT risk and vulnerabilities
    - How to improve breach prevention, detection and response
    - What to expect in the future

    Speakers:
    - Igor Baikalov, Chief Scientist, Securonix
    - Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
    - Sam Abadir, Director of Product Management, LockPath

    Moderator:
    - Carl Wright, CRO, AttackIQ
  • Bringing Order to the Chaos of Audit Management
    Bringing Order to the Chaos of Audit Management Sam Abadir, Director of Product Management, LockPath Recorded: Nov 21 2017 56 mins
    Companies and organizations are subjected to multiple types of audits, from internal governance to regulatory requirements to industry standards. Within each, the organization must identify auditable entities, conduct numerous audit activities and communicate findings. Audit management has become a matrix too complex for organizations to rely on spreadsheets, email, or basic collaboration software to perform.

    This reality has created the demand for an automated solution that organizes and centralizes every step of the audit process: risk assessment, planning, fieldwork and testing, time and expense management, issue tracking, workpaper management, reporting and remediation.

    In this webinar, LockPath’s Sam Abadir demonstrates the audit management capabilities of the Keylight Platform to define the audit universe, initiate audit projects and tasks, and generate audit findings and corrective actions.
  • Streamline Your Audit Process With Lockpath Keylight
    Streamline Your Audit Process With Lockpath Keylight Lockpath Recorded: Nov 21 2017 2 mins
    Manage Internal Audits Effortlessly & Effectively with the Lockpath Keylight Platform.

    Visit Lockpath.com/solutions/audit-management for more info.
  • IDC FutureScape: Worldwide Mobility 2018 Predictions
    IDC FutureScape: Worldwide Mobility 2018 Predictions Carrie MacGillvray, VP, Mobility, and John Jackson, Research VP, Mobile & Connected Platforms Recorded: Nov 21 2017 39 mins
    In this IDC FutureScape presentation, IDC's Carrie MacGillivray and John Jackson will discuss the key predictions that will impact enterprise mobility decisions over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • What I Learned About Risk and Control from “The Mouse” (2 Hour Ethics)
    What I Learned About Risk and Control from “The Mouse” (2 Hour Ethics) Don Levonius Recorded: Nov 21 2017 115 mins
    In this webinar, former Disney loss prevention and investigations leader Don Levonius shares what he learned about using internal controls to prevent fraud, mitigate risk, and protect the magic at the happiest place on earth. Disney, an extremely complex control environment, not only uses internal controls to achieve impressive operational and financial results, “The Mouse” also uses controls to protect intangible assets, promote ethical behavior, ensure business continuity, and mitigate the impact of tragedies.
    By the end of this webinar, participants should be able to:
    •Discuss how one of the most trusted brands in the world manages reputation risk
    •Describe why monitoring an ineffective control is like weighing yourself on a broken scale
    •Examine the relationship between unethical employee behavior and the failure of weak controls
    •Explain what business continuity looks like when catastrophic risk becomes reality
    The views expressed in this webinar are the recollections and opinions of the presenter and are offered in accordance with fair use doctrine. His stories are compiled from “common knowledge” and published media reports, which may or may not be factually accurate. They are presented as hypothetical situations and are included for illustrative teaching purposes only. The presenter is not responsible for errors or omissions. This webinar is not sanctioned, authorized, or endorsed by the Walt Disney Company or its affiliates.
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018
    Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Jeffrey Ritter Recorded: Nov 21 2017 52 mins
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • Understanding your Attack Surface - Research into FT30 organisations
    Understanding your Attack Surface - Research into FT30 organisations Terry Bishop, EMEA Technical Director, RiskIQ Recorded: Nov 21 2017 37 mins
    Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actorsand an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.

    In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.
  • IDC FutureScape: Worldwide Mining 2018 Predictions
    IDC FutureScape: Worldwide Mining 2018 Predictions Emilie Ditton, Research Director, IDC Energy Insights Recorded: Nov 21 2017 45 mins
    In this IDC FutureScape presentation, the IDC Worldwide Mining team discusses the key predictions that will impact CIOs and IT professionals in the worldwide mining industry over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • The 3 Pillars of Social Selling. Part 3:Social Selling Top Tips & Tricks
    The 3 Pillars of Social Selling. Part 3:Social Selling Top Tips & Tricks Daniel Disney Recorded: Nov 21 2017 46 mins
    This 3 part webinar series will give show you the 3 key pillars to achieving social success in sales. Learn how to create the ultimate profile, build a winning personal brand, create great and consistent content and build a winning strategy. The final session will be packed with the best industry tips and tricks to make social work for you.

    Part 3 - Social Selling Top Tips & Tricks

    From LinkedIn searching secrets all the way to email address generating hacks, these are the top tips and tricks that will give you a huge advantage in the world of social selling. This webinar will bring everything together in the social selling series and will give you the ultimate list of tools use social to dramatically enhance your pipeline and sales process.
  • Symantec Endpoint Protection Mobile – Was die SkyCure-Übernahme für Sie bedeutet
    Symantec Endpoint Protection Mobile – Was die SkyCure-Übernahme für Sie bedeutet Alexander Peters, Symantec (Deutschland) GmbH; Sven von Kreyfeld, Symantec (Deutschland) GmbH Recorded: Nov 21 2017 52 mins
    Im Webinar erfahren Sie:
    •Wie SEP Mobile Crowd-basierte Threat-Informationen mit Endpoint- und Server-basierte Analysen kombiniert, um bekannte und unbekannte Mobile Threats zuverlässig und proaktiv zu stoppen
    •Wie die Lösung Malware, Netzwerk-basierte Threats sowie Exploits auf Anwendungs- und OS-Ebene erkennt – und zwar sowohl auf iOS als auch auf Android-Geräten, egal ob online oder offline
    •Wie Sie mit vorausschauenden Analysen verdächtige Netzwerke und Anwendungen bewerten können, ehe sie Schaden im Netzwerk anrichten
    •Wie einfach und schnell das Onboarding mittels nativer iOS- und Android-Apps funktioniert und wie Sie die Lösung mit Ihren vorhandenen EMM-, MDM-, SIEM-, IAM- und VPN-Umgebungen verzahnen
    Darüber hinaus verraten wir Ihnen, wie die weitere Roadmap zur Integration der SkyCure-Produkte in unser bestehendes Portfolio aussieht, und geben Ihnen einen kurzen Überblick über alle anderen wichtigen Neuerungen in unserem Portfolio.

    Hintergrund:
    Angriffe auf mobile Endgeräte nehmen rasant zu: Immer öfter nutzen Angreifer maßgeschneiderte Malware und Advanced Persistent Threats, um Smartphones und Tablets zu kompromittieren und auf diese Weise Zugriff auf sensible Daten oder Unternehmensnetz zu erlangen.
    Symantec trägt diesen steigenden Sicherheitsanforderungen mit der Akquisition des Mobile-Security-Spezialisten SkyCure Rechnung – und integriert dessen innovative Technologie jetzt als Symantec Endpoint Protection Mobile (SEP Mobile) in das marktführende Endpoint-Security-Portfolio.

    Wir freuen uns auf Sie!
  • Official Launch of Symantec Control Compliance Suite 12.0
    Official Launch of Symantec Control Compliance Suite 12.0 Anand Visvanathan, Principal Product Manager, Symantec Recorded: Nov 21 2017 44 mins
    The release of Symantec Control Compliance Suite version 12.0 is here! Please join us for a special webinar on Tuesday, November 21 to find out what’s new in this release and how it will better help you to:

    Measure and prove compliance with security regulations, mandates, and best practices

    Determine risk and prioritise remediation

    Don’t miss this great opportunity to get the latest news and information on Control Compliance Suite!
  • How the State of Arizona Took a Proactive Stance Against Cyber Risk Management
    How the State of Arizona Took a Proactive Stance Against Cyber Risk Management Morgan Reed, Mike Lettman, and Dr. Srinivas Mukkamala Recorded: Nov 20 2017 52 mins
    In this webinar, Morgan Reed (CIO) and Mike Lettman (CISO) from the State of Arizona will discuss with RiskSense CEO Srinivas Mukkamala a case study on how the State of Arizona has implemented a proactive cyber risk management program that uses a credit score like model for assessing threats and remediating those that matter most.

    Mr. Reed, Mr. Lettman, and Dr. Mukkamala will continue and expand on their conversation initially started during a learning lounge panel at this year's 2017 NASCIO Conference. They will dive into the details of how their risk management approach has enabled IT to better measure and communicate risk to business leaders, and strategically focus on the most imminent cyber vulnerabilities in their environment.
  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 46 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Reynolds, CTO, Imagine Communications

    Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

    Host: Limor Schafman, Content Development Director, TIA


    NOT BICSI accredited.
  • Best Practices for GDPR when hosting data off-premises
    Best Practices for GDPR when hosting data off-premises Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity Recorded: Nov 17 2017 49 mins
    GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.

    But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?

    Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:

    1) Organisational best practices when working with cloud service providers to adhere to GDPR

    2) Key factors organisations to take into account when complying to GDPR

    3) The steps global enterprises are taking get themselves #fit4GDPR
  • Data Loss Prevention (DLP) v15 - The Information Centric Security Generation
    Data Loss Prevention (DLP) v15 - The Information Centric Security Generation Salah Nassar, Director Product Marketing, Symantec and Ben Yang, Director of Product Management, Symantec Recorded: Nov 17 2017 47 mins
    Symantec launched a major release for DLP, version 15, that focuses on expanding core DLP technology and Information Centric Security.

    In today’s cloud generation, data is shared through personal email, created and shared on cloud apps, and accessed via BYO devices by employees, partners, and vendors. With the persistent threat of a breach looming, maintaining visibility, protection, and control over your sensitive data is key for business and maintaining compliance.

    Join us on this webinar to review what’s new with Symantec DLP 15 and get first-hand view of the revolutionary Information Centric Security approach.

    Register Today
  • The Evolving Role of CISOs
    The Evolving Role of CISOs Ray Pompon, Michael Hamilton, Kip Boyle Recorded: Nov 16 2017 65 mins
    In every organization, the executive who leads cyber-defense efforts is becoming a key player in their long-term survival. But what do we really know about CISOs and how they operate? Join F5’s own Principal Threat Research Evangelist, Ray Pompon, and CISO guest speakers Kip Boyle and Michael Hamilton for a lively discussion about the findings of the recent F5 commissioned report, The Evolving Role of CISOs and Their Importance to the Business.

    What You'll Learn

    - How much experience, education and business/technical background most CISOs have
    - Who the CISO is reporting to and how the structure can affect security practices
    - How security initiatives are rolled out across organizations
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Nov 23 2017 5:00 am UTC 60 mins
    Three major trends define the Cloud Generation chaos that organisations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organisations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for organisations who face a severe shortage of skilled IT security personnel.

    Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:

    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security

    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response

    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • Wie CASB sich weiterentwickeln muss
    Wie CASB sich weiterentwickeln muss Martin Kroemer, Symantec Nov 23 2017 9:00 am UTC 60 mins
    Wie CASB sich weiterentwickeln muss, um sich in Ihre Security-Infrastruktur zu integrieren

    Die schnelle Akzeptanz von Cloud-Anwendungen und -Diensten erhöht die Notwendigkeit von Cloud Access Security Brokers (CASB)

    Es ist Zeit, dass CASB-Systeme sich in Ihre gesamte Security-Infrastruktur einfügen. Dabei müssen zahlreiche Schnittstellen berücksichtigt werden, u. a. DLP, Advanced Malware Protection, Web Security und Endpoint Security. Daher überlegen Unternehmen, wie sie cloudbasierte Security-Lösungen am besten in ihre Umgebung integrieren können, um die Sicherheit zu erhöhen und den operativen Aufwand zu reduzieren.

    Der Webcast sondiert diesen nächsten Schritt, den CASB-Lösungen machen müssen.

    Jetzt anmelden
  • APTs - Cómo funcionan y cómo protegerse
    APTs - Cómo funcionan y cómo protegerse Ferran Orosola, Solutions Architect FireEye; Alvaro Culebras Sanchez & Noa Blanco Fernandez, Cybersecurity Engineers, Minsait Nov 23 2017 3:30 pm UTC 45 mins
    Crees que estas protegido frente a las APTs? Te explicamos cómo funcionan y como protegerse

    Los ataques de hoy en día se han vuelto cada vez más sofisticados, lo que ha provocado que las medidas de seguridad tradicionales ya no sean eficaces. Las organizaciones deben adoptar nuevas estrategias de Ciberseguridad que permitan una mayor protección, adaptándose a estas nuevas amenazas.

    En este webinar FireEye y Minsait, la unidad de negocio de Indra encargada de la transformación digital de las empresas, muestran qué son las Amenazas Persistentes Avanzadas (Advanced Persistent Threats), cómo funcionan y qué medidas se deben implementar en las organizaciones para protegerse ante las APTs que utilizan el correo electrónico como principal vector de ataque.
  • SafeNet Authentication Service Live Product Demo
    SafeNet Authentication Service Live Product Demo Ms. Mukta Gupta - Technical Consultant Engineer, Identity & Data Protection, India & SAARC, Gemalto Nov 24 2017 5:30 am UTC 30 mins
    SafeNet Authentication Service (SAS) delivers fully-automated, highly secure strong authentication-as-a service. A new product demo webinar is now available.

    Register now for our 30 minute demo and see how easy and simple it is to:
    - Set up a strong authentication account on SAS
    - Add users to an account
    - Assign tokens to users
    - Generate reports

    Please email us at InfoAPAC@gemalto.com if you have any questions or problems registering.
  • Rôle crucial du proxy dans la protection de votre entreprise
    Rôle crucial du proxy dans la protection de votre entreprise Hervé Doreau, Directeur Technique, Symantec France Nov 24 2017 1:00 pm UTC 60 mins
    Pour relever les défis de sécurité les plus complexes, il vous faut une approche avancée bâtie sur une architecture proxy.
    Une telle approche vous permet de vous appuyer sur les meilleures technologies pour offrir sécurité et confiance aux utilisateurs cloud et réseau.
    Symantec Secure Web Gateway vous apporte une solution de sécurité optimale sous la forme qui vous convient le mieux : appliance sur site, appliance virtuelle, solution dans le cloud ou une architecture hybride unifiée.
    L'architecture proxy unique de cette solution lui permet de surveiller, contrôler et sécuriser le trafic pour offrir une expérience sécurisée sur le Web et dans le cloud.
    Ce webcast vous explique :
    - Pourquoi l’architecture proxy est plus importante que jamais dans la composition de votre sécurité réseau
    - Comment un proxy web peut servir de plate-forme de détection des menaces et de protection des données
    - En quoi un filtrage en amont du sandbox via l’architecture proxy permet d’optimiser votre SOC sans grever votre budget

    Inscrivez-vous dès aujourd'hui
  • Maîtriser le chaos du cloud
    Maîtriser le chaos du cloud Hervé Doreau, Directeur Technique, Symantec France Nov 24 2017 2:00 pm UTC 45 mins
    Sécuriser l’accès au web et protéger les données avec une solution de sécurité mise en œuvre dans le cloud.

    L’accroissement de l’adoption du cloud, l’usage du mobile et la croissance spectaculaire du télétravail met les infrastructures de sécurité existantes sous pression.
    Dans un tel environnement, les équipes de sécurité de l’entreprise doivent faire face aux préoccupations suivantes :
    - Comment harmoniser l’application des politiques encadrant l’usage du web et du cloud ?
    - Comment protéger efficacement les utilisateurs des menaces web ?
    - Comment sécuriser les données sensibles et respecter les réglementations ?
    Pour relever ces défis, les entreprises se tournent vers une solution de sécurité mise en œuvre dans le cloud.

    Assistez à ce webcast pour apprendre à tirer parti de Symantec Cloud Security Services pour protéger les utilisateurs, les données et les terminaux, et relever les défis de la génération cloud.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities
    Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Nathaniel Ford, Moderator, (ISC)² EMEA, Membership Services Team, (ISC)² EMEA Nov 27 2017 12:00 pm UTC 60 mins
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • In-house or Outsourced Security Operations Center?
    In-house or Outsourced Security Operations Center? Oliver Rochford, VP of Security Evangelism - DFLabs, Sebastian Hess, AIG Cyber Risk Exec Nov 27 2017 3:00 pm UTC 45 mins
    The need to have a Security Operations Center (SOC) is becoming increasingly evident with each passing day, with data breaches being a common occurrence for many organizations around the globe. But, when organizations start thinking about setting up a SOC, they face a big dilemma - whether to build one in-house, or go with an outsourced or managed services model.

    This webinar offers a deeper look into the factors that should play a role in deciding which option is a better fit for organizations, based on their needs and the resources at their disposal.

    Key takeaways:
    - A SOC must strike a proper balance between people, processes and technology
    - People are the key to any SOC, but are scarce due to a skills shortage
    - The right technologies are a key enabler for any SOC, but can often also be remotely delivered
    - Getting processes right in an outsourced SOC model can be challenging, but the unavailability of skilled resources may be the bigger challenge

    Join us on this webinar as we try to answer the question of how best to handle your security needs, by explaining the pros and cons of both an in-house SOC and an outsourced one, so you can make an informed decision that would be best suited for your organization.
  • Are you Prepared for the General Data Protection Regulations?
    Are you Prepared for the General Data Protection Regulations? Ilias Chantzos, Senior Director EMEA and APJ, Global CIP and Privacy Advisor, Government Affairs, Symantec Corporation Nov 28 2017 5:00 am UTC 60 mins
    On 25 May 2018, the European General Data Protection Regulation (GDPR) will come into effect – and while it is an European Union’s regulation, it may still affect your organisation here in the Asia Pacific.

    But how do you know if your organisation needs to comply with the GDPR, and what is required for compliance? With top level fines of over $20 million for non-compliance, it is better to be safe and sure than sorry.

    Join us at our webinar as we discuss:

    • How to find out if your company will be impacted by the GDPR
    • What is needed to comply with the GDPR
    • How the GDPR will be enforced in Asia Pacific
    • Capitalising on the GDPR to improve your business
    • Real-life issues faced by organisations and how technology can help fix them

    Don’t be caught unaware by the GDPR. Register for our webinar today and learn how Symantec technologies help to facilitate GDPR compliance.
  • Les 5  conseils essentiels sur la restauration des données du cloud
    Les 5 conseils essentiels sur la restauration des données du cloud Bruno Gauthier Nov 28 2017 8:30 am UTC 45 mins
    « Votre cloud a un problème ! » : c’est l’appel que redoute tout service informatique, qu’est-ce que vous pouvez faire, quand est-ce qu’il sera de nouveau disponible ?
    De ce fait, vous avez absolument besoin d’une protection et d’un plan de reprise de vos données dans le cloud, car chaque indisponibilité se traduit par une baisse de votre activité et/ou de votre chiffre d’affaire. La majorité des organisations ont mis en place des politiques de sauvegarde efficaces on-premises, mais la plupart n’étendent pas ces politiques au cloud.
    Que vous ayez des données critiques à travers différents clouds ou seulement quelques informations, il est essentiel pour un service informatique de comprendre les mécanismes de récupération des données du cloud.
    Participez au webinaire Commvault présentant les 5 conseils essentiels sur la restauration du cloud, pour vous permettre de mieux contrôler la disponibilité de vos données depuis les environnements clouds et on-premises.
  • What's New: The Latest Proofpoint Email Security Release
    What's New: The Latest Proofpoint Email Security Release Jeff Burstein, Sr. Director, Product Management Nov 28 2017 11:00 am UTC 45 mins
    Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.

    The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:

    * Email Authentication
    * Attachment Sandboxing
    * Data Loss Prevention
    * Encryption
  • The Forrester Total Economic Impact of Palo Alto Networks Traps
    The Forrester Total Economic Impact of Palo Alto Networks Traps Bob Cormier, VP, Principal Consultant at Forrester Consulting & Dal Gemmell, Head of Endpoint Marketing at Palo Alto Networks Nov 28 2017 12:00 pm UTC 45 mins
    Guest Speaker Bob Cormier, VP & Principal Consultant of Forrester, will discuss the results of The Total Economic Impact™ of the Palo Alto Networks Traps solution, an October 2017 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks. Watch this Webinar to see how companies:

    • Attained economic total benefits with Traps
    • Realized a ROI and the payback period.
    • Prevented malicious executables (malware) and prevented vulnerability exploits.

    Deep dive with Forrester to discover the findings of how Palo Alto Networks Traps achieved the above benefits, and how Traps advanced endpoint protection replaced antivirus solutions and secured endpoints with a multi-method approach.
  • 5 practical steps to implement your GDPR project
    5 practical steps to implement your GDPR project Robert O'Brien and Shane Fuller Nov 28 2017 2:00 pm UTC 45 mins
    There is so much material out there claiming to be the ultimate guide to your GDPR project, but a lot of this is complex jargon that doesn’t offer a pragmatic solution to the GDPR conundrum.

    Ensuring a successful GDPR project requires financial investment as well as time. With the May 2018 deadline getting closer, there is an increasing unease within organisations regarding their ability to mitigate the risk and demonstrate compliance.

    With this Webinar, we will provide you with 5 practical steps to implement your GDPR project. By the end of the Webinar you will be in possession of structured and practical solutions that lead to GDPR compliance.

    As a bonus for attending the Webinar, you will also receive a copy of the official GDPR for Dummies guide. We understand that GDPR is a complex issue, that’s why we worked with subject matter experts and the Wiley brand to create the official GDPR for Dummies guide that offers a practical approach to GDPR.
  • Simplifying Security across your Universal I.T. Infrastructure
    Simplifying Security across your Universal I.T. Infrastructure Alan Conboy, Scale Computing, Office of the CTO | James LaPalme, WinMagic, VP of Business Development | Scott Van Woudenberg Nov 28 2017 3:30 pm UTC 60 mins
    The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models. Join leaders from Scale Computing, WinMagic and Google as they unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment – so that you can keep compliant within increasing data privacy regulations.

    Key Learnings:

    • Simplicity: Discover why managing infrastructure and security across a disparate array of platforms doesn’t need to be difficult
    • Scalability: Learn how you can start with a small deployment, and then flexibly and securely scale out to support dynamic workloads and evolving business needs
    • Portability: Virtualization and cloud offer a whole new realm of possibilities, so why limit your business to a single platform? Learn how to securely and efficiently move data from node to node, cluster to cluster, cloud to cloud.
    • Availability: Identify best practices for using and managing the data security within local, remote, and cloud-based backups to achieve high-availability and resiliency
    • Affordability: Find out how to achieve enterprise-grade hyper-convergence and data security on an SMB budget
  • IDC FutureScape: Worldwide Retail 2018 Predictions
    IDC FutureScape: Worldwide Retail 2018 Predictions Leslie Hand, Research Vice President, Ivano Ortis, Vice President, Greg Girard, Program Director, IDC Retail Insights Nov 28 2017 4:00 pm UTC 60 mins
    In this IDC FutureScape presentation, the IDC Worldwide Retail team discusses the key predictions that will impact CIOs and IT professionals in the worldwide retail industry over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • Bringing Security to DevOps with Veracode Integrations
    Bringing Security to DevOps with Veracode Integrations Austin Britt, CA Veracode Solution Architect Nov 28 2017 5:00 pm UTC 30 mins
    Keep in pace with the speed of DevOps and reap the benefits.

    Developers and security teams are both challenged to meet security goals in complex environments. Developers already need to manage many separate tools; new AppSec tools that do not integrate well or lack flexible APIs and customizable integrations are met with low adoption, high distraction and a steep learning curve.

    Join this 20 minute webinar to see how the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use. Get a first-hand look at how our flexible API allows you to create your own custom integrations or use community integrations. Make security developer-friendly so you can go faster, without sacrificing security.
  • Protect and Prevent: 3 strategies for blocking fileless attacks and exploits
    Protect and Prevent: 3 strategies for blocking fileless attacks and exploits Jack Danahy, CTO, Barkly Nov 28 2017 6:00 pm UTC 60 mins
    Ransomware continues to experience record growth in 2017. Traditional solutions aren't enough and can't keep up with hundreds of thousands of new malware versions created daily. File-less attacks and exploits are now the most common vectors for successful ransomware attacks and most companies aren't protected.

    Learn the three strategies Avidia Bank implemented to shut out today's sophisticated threats and how you can apply them to protect your own organization:

    Register now to learn more on:

    - How ransomware is going fileless to get past protection
    - What makes everyone a target
    - Three protection strategies to minimize the risk to your organization


    Jack Danahy is the co-founder and CTO of Barkly, the Endpoint Protection Platform that delivers the strongest protection with the fewest false positives and simplest management. A 25-year innovator in computer, network and data security, Jack was previously the founder and CEO of two successful security companies: Qiave Technologies (acquired by Watchguard Technologies in 2000) and Ounce Labs (acquired by IBM in 2009). Jack is a frequent writer and speaker on security and security issues, and has received multiple patents in a variety of security technologies. Prior to founding Barkly, he was the Director of Advanced Security for IBM, and led the delivery of security services for IBM in North America.
  • Ransomware: The Billion-dollar Innovation Industry 
    Ransomware: The Billion-dollar Innovation Industry  Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Nov 28 2017 6:30 pm UTC 60 mins
    Since ransomware exploded on the scene, the bad guys are constantly coming out with new versions of ransomware strains to evade detection. Having earned a billion dollars in 2016, they have the resources to keep innovating and now ransomware is being leveraged in ways it has never been before.
     
    Join us for this 45-minute webinar as we discuss the latest innovations in ransomware and how you can reduce damage from ransomware and fortify your last line of defense—your end users.

    Key topics covered in this webinar:
    • How Ransomware started
    • What led to its explosion in growth
    • Where Ransomware is heading
    • Techniques for dealing with Ransomware
    • How to create a "Human Firewall"
  • 진화하는 봇(Bot)의 공격을 방어하라
    진화하는 봇(Bot)의 공격을 방어하라 정덕진, Technical Project Manager II, Akamai Korea Nov 29 2017 5:00 am UTC 60 mins
    Bot은 자동화된 프로그램으로, 웹사이트의 정보를 수집하거나, credential abuse와 같은 악성행위를 수행합니다. Bot으로 인한 피해는 IT 측면의 퍼포먼스 저하 뿐만 아니라, 매출 감소, 경쟁력 저하, 비즈니스 기회 상실과 같이 비즈니스에 심각한 영향을 끼치는 경우까지 퍼져 있습니다. Bot을 운영하는 쪽은 심지어 차단을 회피하기 위한 여러 가지 기술까지 활용하여 지속적으로 대응하기 때문에, 차단만이 모든 문제를 해결해 주는 방법은 아닙니다. 점점 다양해지고 지속적으로 변화하고 발전하는 Bot의 공격 방법 등을 알아보고, 이를 효과적으로 관리하기 위한 접근방법 및 기술에 대해 알아봅니다.
  • Thwarting Hackers with Single Agent Endpoint Security
    Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Nov 29 2017 11:00 am UTC 60 mins
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • Webinar in italiano - The Next Level of Smarter Endpoint Protection
    Webinar in italiano - The Next Level of Smarter Endpoint Protection Marco Rottigni, Senior Manager, Product Marketing, FireEye Nov 29 2017 1:30 pm UTC 45 mins
    Per decenni, la protezione antivirus (AV) è stata la base per la sicurezza degli endpoint, nonostante tutti i suoi limiti. Per affrontare le minacce sempre piu evolute, le organizzazioni devono dotarsi di una soluzione integrata di endpoint che possa migliorare le loro difese.
     
    Il 29 novembre, Marco Rottigni, Senior Manager, Product Marketing di FireEye, offrirà una panoramica di dettaglio sui seguenti punti:
    • Perché i prodotti per la sicurezza degli endpoint non sono sufficienti a fornire una protezione efficace
    • Le funzionalità necessarie per dotarsi di una soluzione completa per la protezione degli endpoint:
    -AV con Threat Intelligence
    -Detection e Response
    -Behaviour e Exploit
    -Visibilità e automazione
    • Come la soluzione FireEye Endpoint Security consente di passare rapidamente dall'individuazione all'indagine e alla remediation, tutto con un solo agente
     
    Partecipa a questo webinar come primo passo verso un approccio più intelligente e flessibile alla sicurezza degli endpoint.
  • Data Breach Under GDPR: How threat intelligence can reduce your liabilities
    Data Breach Under GDPR: How threat intelligence can reduce your liabilities Nahim Fazal and Pedro López Nov 29 2017 3:00 pm UTC 45 mins
    There has been an important clarification around what constitutes a data breach listen in to update yourselves and ensure you don’t fall foul of the regulation.

    When the legislation comes into effect in May 2018, compromised data will be among the most seriously regulated and highly penalized issues a company can face, so a practical and coherent understanding of the regulation is critical to mitigating any penalties your organization will face.

    In our latest webinar, Blueliv’s Head of Cyber Threat Intelligence, Nahim Fazal, and Legal Expert Pedro López will be providing specialist insight and guidance around aspects of GDPR specifically relating to a data breach. Building on our recent whitepaper, they will explain how to plan and manage the impact of the incoming updated legislation on your business.

    Pedro López is an expert in legislation relating to cybersecurity. When it comes to GDPR, the devil is truly in the detail, and he’ll be explaining how to ensure compliance without getting lost in jargon.

    Nahim Fazal’s experience in the industry enables him to explain not just how to mitigate the consequences of a data breach, but how to reduce the risk of exposure and ensure that any losses – from customers to financial to reputational – are minimal.

    The webinar will be followed by a short Q&A and demonstration of how threat intelligence can shield your organization from the worst impact of the updated GDPR.

    Presenters:
    Pedro López, Legal Advisor and GDPR expert at Martin Andino Law firm
    Nahim Fazal, Cyber Security Development Manager at Blueliv
  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Nov 29 2017 4:00 pm UTC 60 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • Veracode Integrations For .NET Environments
    Veracode Integrations For .NET Environments Austin Britt, CA Veracode Solution Architect Nov 29 2017 5:00 pm UTC 30 mins
    Developers work best when tools don’t get in their way.

    Join this 20 minute webinar to see how Veracode integrates with .NET tools including Visual Studio. Veracode offers a Visual Studio extension that can compile .NET applications so developers can scan and review security findings before checking in code. Ensure that you catch security issues before they get further downstream by integrating Veracode into your Visual Studio Team Services or Team Foundation Server build or release pipelines. In addition, learn how you can easily see which findings violate your security policy and view the data path and call stack information to understand how your code may be vulnerable to attack.
  • Deception at the Scale and Speed of Large Enterprises
    Deception at the Scale and Speed of Large Enterprises Chad Gasaway, Director of Sales Engineers at Illusive Networks Nov 29 2017 5:00 pm UTC 30 mins
    Distributed deception technologies are purpose-built for early detection of APTs, but to be effective, they must be tailored to each environment to fool attackers, adjust as the business changes, and adapt to attacker behavior. So is it practical to deploy deception at scale? This 30-minute webinar assumes familiarity with basic deception concepts, and takes a deep dive into how Illusive Networks creates a scalable, dynamic deception environment using AI-driven automation to meet the needs of even the largest global financial services companies.