Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Effective IT Security in a Connected Mobile World Effective IT Security in a Connected Mobile World Microsoft Recorded: Sep 27 2016 34 mins
    Learn how all employees can work and collaborate securely! The new world of work demands that people collaborate faster and more seamlessly than ever before.

    Your employees have access to cloud-based apps, personal devices, and pervasive internet connectivity. All these things are great for getting work done, but your company is still held to high standards around security, and auditing, and you can't afford to make a wrong move.

    Join this webcast to explore some common security scenarios such as:
    •How do you provide access when you can't always control the endpoint?
    •How do you know where all your company's files are right now?
    •If you terminate an employee, how would you know what files they had in their possession.?
    •Could you wipe a terminated employee's corporate data while leaving their personal content alone?

    This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
  • Building an Enterprise-Ready BI Platform for your IT Building an Enterprise-Ready BI Platform for your IT Kevin Orbaker, Technical Solutions Professional, Microsoft Recorded: Sep 27 2016 28 mins
    Is your BI platform enterprise-ready? Give your IT team a supercharge!

    IT oversees, facilitates, and orchestrates all BI solutions to make sure they integrate with existing systems and maximize resources. When you choose a comprehensive, enterprise-ready BI platform, IT is empowered to leverage data more effectively for your business.

    Join this webcast to learn how, with the right BI solution, IT can:
    •Control and monitor access to data and assets
    •Help ensure security and compliance
    •Partner with the business to help drive strategic projects

    This webcast is part of our Building a Data Culture Leveraging Power BI webcast series. Sign up for this session, or the entire series today!
  • Optimizing Hybrid Cloud Security in the Software-Defined Data Center Optimizing Hybrid Cloud Security in the Software-Defined Data Center Mike Smith, Director, Modern Data Center Solutions, Trend Micro Recorded: Sep 27 2016 29 mins
    Join us as we discuss how Trend Micro and VMware have partnered to deliver an optimized hybrid cloud security solution architected for VMware virtualized data centers, virtual desktops, and multi-cloud deployments that include AWS and Microsoft Azure.

    In this webinar you will learn how to….
    -Optimize data center resources with virtualization-aware security
    -Deliver automated security across environments
    -Manage and deploy security efficiently
    -Achieve cost effective compliance
  • La protection des terminaux au-delà des antivirus La protection des terminaux au-delà des antivirus Bertrand Le Bail and Cyril Simonnet, Cyber Security Solutions, Palo Alto Networks Recorded: Sep 27 2016 56 mins
    l est temps de protéger vos utilisateurs contre les menaces qui contournent facilement les antivirus.

    Assistez à notre webinar en direct sur la sécurité des terminaux

    •Les coûts cachés d'un antivirus classique pour votre entreprise
    •Comment déterminer la véritable valeur d'une solution de sécurité des terminaux
    •Les cinq fonctions indispensables à la protection de vos utilisateurs, systèmes et terminaux
    •Comment Traps v3.4 prévient les failles de sécurité dans votre entreprise sans antivirus classique

    Protégez-vous contre les antivirus.
  • Anatomie eines Ransomware-Angriffs Anatomie eines Ransomware-Angriffs Alexander Peters, Senior Manager Office of the CTO and Lars Kroll, Technical Lead - Symantec Germany Recorded: Sep 27 2016 64 mins
    Wie können Sie angesichts des neuen Grads an Ausgereiftheit und Bedrohung, den Ransomware im vergangenen Jahr erreicht hat, sicher sein, dass Ihre Infrastruktur davor geschützt und Ihr Unternehmen ausreichend vorbereitet ist, um einen Angriff zu bewältigen?

    Sicherheitsverantwortliche haben heute mit diesen Problemen zu kämpfen:
    •Nicht genügend umsetzbare Threat Intelligence, um verstehen zu können, welche Akteure und Kampagnen eine Bedrohung für ihre Unternehmen darstellen.
    •Zu wenig geschulte Sicherheitsanalysten, die die zunehmende Zahl von Bedrohungen identifizieren können, die in ihre Unternehmen eindringen. Beispielsweise konnte der Einsatz von Crypto-Ransomware als Angriffstool im Jahr 2015 eine weitere Zunahme verzeichnen, und zwar um 35 %. Dennoch brauchen Unternehmen, in denen ein Angriff stattfindet, in der Regel mehr als 200 Tage, um sich dessen bewusst zu werden.
    •Zu wenig spezialisiertes Know-how hinsichtlich der Methoden, die erforderlich sind, um auf Bedrohungen zu reagieren und diese unschädlich zu machen, nachdem sie in ihrer IT-Umgebung Fuß gefasst haben.

    Die Taktiken von Ransomware-Gangs werden immer ausgefeilter und Unternehmen müssen sich der Gefahr, die sie darstellen, vollständig bewusst sein. Nehmen Sie an einem Webinar von Symantec teil, in dem ein konkreter Ransomware-Angriff behandelt wird. Sie erfahren, was geschehen ist und welche Maßnahmen das betroffene Unternehmen ergriffen hat, um die Bedrohung zu beseitigen.
  • Transform Your Agile Strategy to Deliver More Value Transform Your Agile Strategy to Deliver More Value Dan Rice Advisor, Agile Management, Americas & EMEA Recorded: Sep 27 2016 54 mins
    Many companies experimenting with agile development methods in their engineering and IT groups are having only mixed success.

    Unless you’re implementing agile both upstream (through your portfolio) and downstream (through testing and operations,) you’re not harnessing agile’s full power through Digital Transformation. Being faster to market doesn’t help your bottom line if you deliver the wrong things, and failing to get the right things into production fast means you’re leaving money on the table.

    Join this web seminar to gain insight into the benefits of a digital transformation. You’ll discover a strategic, collaborative approach to channel the power of agile and deliver more value to your customers.
  • 2016 Midyear Security Roundup: The Reign of Ransomware 2016 Midyear Security Roundup: The Reign of Ransomware Myla Pilao, Director, TrendLabs Marketing Communications Recorded: Sep 27 2016 38 mins
    Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
  • Anatomy of a Ransomware Attack Anatomy of a Ransomware Attack Antonio Forzieri, Global Cyber Lead & Gabriele Zanoni, Incident Response Investigator Recorded: Sep 27 2016 63 mins
    Ransomware continues to evolve. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.

    Take this opportunity to learn directly about what can happen in a ransomware attack based on real-life events. Symantec’s Cyber Security Services experts will lead the discussion and will help you to understand how you can improve your line of defense against ransomware and minimise the loss of key data, money and intellectual property from your organisation.
  • Priorisez et remédiez vos vulnérabilités avec Qualys ThreatPROTECT Priorisez et remédiez vos vulnérabilités avec Qualys ThreatPROTECT Leif Kremkow, Technical Account Manager, SEMEA, Imane Rouijel, Technical Account Manager, SEMEA Recorded: Sep 27 2016 34 mins
    Gérer le nombre croissant des vulnérabilités est devenu un véritable challenge pour les entreprises.
    Cependant, 97 % des attaques exploitent uniquement 10% des vulnérabilités connues.
    De toute évidence, il est devenu impératif d'arrêter de jouer aux devinettes et d’identifier les vulnérabilités les plus menaçantes de façon effective afin d’y remédier rapidement.

    ThreatPROTECT, dernière solution Qualys, corrèle en temps réel les données de vulnérabilités avec de multiples flux de menaces connues.
    Les résultats sont fournis sous forme de tableaux de bord faciles à appréhender et offrent ainsi une vision claire des vulnérabilités à traiter en priorité.

    L’objectif de ce webcast est de vous présenter en 3 points les usages et avantages de ThreatPROTECT.
    * Identifiez vos assets les plus importants
    * Détectez rapidement les vulnérabilités critiques via la corrélation en temps réel avec les menaces actives.
    * Priorisez les remédiations et intervenez sur les vulnérabilités à traiter sans tarder

    Démo en live et session de questions/réponses
  • CISO Says: Interview with Istvan Rabai, CISO Signalhorn CISO Says: Interview with Istvan Rabai, CISO Signalhorn Speaker: Istvan Rabai, Chief Information Security Officer, Signalhorn, Moderator: Adrian Davis, Managing Director (ISC)² EMEA Recorded: Sep 26 2016 61 mins
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format. They provide insight into the path he took to become CISOs and how they are reinventing the role in the face of accelerating industry change.
  • Are you ready for the notification requirements of upcoming EU Legislation? Are you ready for the notification requirements of upcoming EU Legislation? Danielle Kriz, Sr Director, Global Policy at Palo Alto Networks and Emily Tabatabai, Privacy Counsel at Orrick Recorded: Sep 23 2016 49 mins
    Doing business in the European Union is changing. By May 2018, companies must comply with the new General Data Protection Regulation’s (GDPR) data breach notification requirements and the Network and Information Security (NIS) Directive’s security incident notification requirements.

    Notification requirements make it imperative to prevent incidents before they happen. To help you prepare for these new requirements, Palo Alto Networks is hosting a webinar with cybersecurity and data privacy lawyers from Orrick Herrington & Sutcliffe to discuss:

    · What are the requirements and the deadlines under each law?
    · What are the thresholds for notification, and who needs to be notified?
    · How should companies prepare for their oncoming obligations? What strategies should be in place? What have other international companies done to prepare and communicate?
    · What might be the legal consequences of non-compliance?
  • I-SOC, gérer la sécurité de manière proactive grâce à l'intelligence I-SOC, gérer la sécurité de manière proactive grâce à l'intelligence David Grout, Technical Director, Southern Europe, FireEye Recorded: Sep 23 2016 46 mins
    Les SOC D’aujourd’hui se détournent de leur métier de base en devenant des centres de gestion d’alertes. Nous vous présenterons comment l’apport de la cyberveille peut permettre aux équipes de passer d’un mode réactif qui gère des alertes à un modèle proactif axé sur la chasse aux indicateurs et aux groupes d’assaillants présents sur vos environnements IT.
  • Hacking Airwaves with Pineapples Hacking Airwaves with Pineapples Johan Hybinette, CISO at HOSTING Recorded: Sep 22 2016 39 mins
    With the widespread use of connected devices, hackers have configured new ways to access your smartphones and laptops, even without you knowing. The Pineapple is a router that stages a fake WIFI access point, compromising the security of any smart device that unknowingly connects to it. During the live webinar, Johan Hybinette, CISO at HOSTING, will be going over the following discussion points:

    - The technical makeup of the pineapple router
    - How the Pineapple hacks into connected devices
    - What personal information is at the most risk
    - What you can do to protect yourself from this malicious form of identity theft
  • Prevent Laptop Security Breaches, No Active Directory Required Prevent Laptop Security Breaches, No Active Directory Required Al Sargent Sr. Dir. Product Marketing, OneLogin and Tal Herman Lead Product Manager, Identity, OneLogin Recorded: Sep 22 2016 63 mins
    It only takes one unsecured laptop for a security breach to occur. OneLogin Desktop can fix that. Cloud-first companies can use it to secure laptops by connecting them to our cloud directory. Companies with Active Directory can use it to secure laptops that aren’t domain-joined -- Macs, or PCs used by non-employees.

    Join our live webinar to find out how OneLogin Desktop can help you:

    Extend strong authentication policies to all your laptops, including operating system password complexity, rotation, and uniqueness
    Implement frictionless multi-factor authentication that secures all SaaS application access without impacting employee productivity
    Reduce service desk loads by presenting end users with a simplified sign-in experience that reduces password-reset requests.
  • Exploring The Latest Cybersecurity Trends In Major Industries Exploring The Latest Cybersecurity Trends In Major Industries Jay Jacobs, Senior Data Scientist, Joel Alcon, Product Marketing Manager Recorded: Sep 22 2016 36 mins
    In 2015, large-scale data breaches have hit all industries, leading to millions of compromised records. According to the Identity Theft Resource Center, there were 780 data breaches in which 177,866,236 records were compromised. While no industry is immune to data breaches, some are more prepared than others.

    In this webinar, Jay Jacobs, Senior Data Scientist at BitSight explains how security posture differs in six key industries. This webinar will highlight new findings on:

    - The most common ransomware infections
    - The rate of ransomware infections found across major industries
    - The aggregate BitSight Security Rating for each industry
  • Contain your risk: Deploy secure containers with trust and confidence Contain your risk: Deploy secure containers with trust and confidence Brent Baude, Principle Software Engineer, Atomic and Docker Development, Red Hat; Randy Kilmon, VP, Engineering, Black Duck Recorded: Sep 22 2016 51 mins
    Organizations are increasingly turning to container environments to meet the demand for faster, more agile software development. But a 2015 study conducted by Forrester Consulting on behalf of Red Hat revealed that 53% of IT operations and development decision makers at global enterprises reported container security concerns as a barrier to adoption.

    The challenges of managing security risk increase in scope and complexity when hundreds or even thousands of different open source software components and licenses are part of your application code base. Since 2014, more than 6,000 new open source security vulnerabilities have been reported, making it essential to have good visibility into and control over the open source in use in order to understand if any known vulnerabilities are present.

    In this webinar, experts from Red Hat and Black Duck will share the latest insights and recommendations for securing the open source in your containers, including protecting them from vulnerabilities like Heartbleed, Shellshock and Venom. You’ll learn:
    • Why container environments present new application security challenges, including those posed by ever-increasing open source use.
    • How to scan applications running in containers to identify open source in use and map known open source security vulnerabilities.
    • Best practices and methodologies for deploying secure containers with trust and confidence.
  • State-of-the-Art Security Framework for Breach Prevention Response Strategy State-of-the-Art Security Framework for Breach Prevention Response Strategy Gregory Albertyn, Sr Director Cybersecurity & Privacy at PwC, Simon Mullis, Global Technical Lead GSIs at Palo Alto Networks Recorded: Sep 22 2016 49 mins
    Traditional approaches of detecting and remediating threats are becoming increasingly inadequate to effectively manage risk in today’s increasingly regulated, cyber threat landscape.

    Join a live webinar and Q&A to learn how PwC and Palo Alto Networks have formed a strategic partnership to help more customers achieve cyber resilience.

    The webinar will introduce

    •The emerging regulatory landscape that is driving the need for organizations to redesign their incident response and data compliance programs
    •A state-of-the-art security framework that serves as a guide for organizations to assess, develop, and implement a breach prevention security posture.
    •Recommended security architectures, organizational structures, and computing processes that enable breach prevention.
    •Live Q&A with cybersecurity experts from PwC and Palo Alto Networks, for practical insights and real world experiences.
  • Are you secure against threats with cyberinsurance? Are you secure against threats with cyberinsurance? Fred Streefland, Leaseweb Global and Dharminder Debisarun, Palo Alto Networks Recorded: Sep 22 2016 15 mins
    The cynical would suggest that cyber insurance is growing as some look for a cheaper route to manage risk. However many see the cyber insurance industry as potentially the new enforcer of good security practices.

    Palo Alto Networks customer Leaseweb is an organization that recently purchased cyber insurance. We invite you to join us on Thursday September 22 for an interview with Fred Streefland, IT Security Manager at Leaseweb Global. Palo Alto Network’s Dharminder Debisarun interviews him to learn more their decision to purchase cyberinsurance. You will hear what is generally covered and how it can be part of a prevention strategy. There will also be a chance to answer questions at the end of the session.
  • Threat Prevention on Your Terms Threat Prevention on Your Terms Joerg Sieber, Director, Product Marketing, Palo Alto Networks Recorded: Sep 22 2016 38 mins
    A cloud-based community-driven approach for advanced threat detection and prevention is paramount to successfully combatting attackers. The scale, speed of enhancements, community leverage, and automated prevention that WildFire provides is unparalleled. At the same time, some organizations are concerned about data privacy and protection when dealing with cloud-based threat analysis.

    Palo Alto Networks is proud to introduce the WildFire EU cloud. Customers now have the option to submit unknown files and e-links to the WildFire EU cloud for analysis, where data is fully analyzed without ever leaving European borders. This is of particular interest to companies within the European Union and international organizations looking for localized clouds combined with the power of global cloud threat analytics.

    At this valuable and information webinar we will explore how WildFire EU cloud helps you:

    1. Address data privacy needs – Data analyzed by WildFire EU cloud remains within the boundaries of the EU. This alleviates data transfer concerns shared by some of our customers and addresses the needs of many international organizations.

    2. Leverage global threat intelligence – WildFire EU cloud leverages access to the largest threat analysis tool in the World used by more than 10,000 customers as part of the Palo Alto Networks next generation security platform, providing complete prevention capabilities.

    3. Take advantage of groundbreaking Threat Analytics and Correlation – Security teams can accelerate threat hunting, analytics and response efforts with globally correlated intelligence from the entire WildFire community, made directly accessible through the AutoFocus service.
  • Phishing Readiness: People can be the weakest link Phishing Readiness: People can be the weakest link Mr Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific and Japan, Symantec Recorded: Sep 22 2016 38 mins
    Technology has become so integrated into our lives that messaging has become a habitual action. Unfortunately, this lack of mindfulness allows attackers to circumvent even the strongest cybersecurity technologies and defenses, through phishing emails and malicious hyperlinks.

    In an organisation, people are often the weakest link in the chain of cyber-security. Even the most conscientious employee may fall victim to a well-crafted phishing email, which can appear legitimate to untrained eyes.

    Join our upcoming webinar and learn about:
    -Why individuals fall victim to cyber-attacks
    -How to measure each employee’s susceptibility
    -How to identify individuals/departments most at risk
    -How smarter, individualised training helps

    Turn your weakest links into your strongest defenders against cyber-attacks today.
  • 2016 Midyear Security Roundup: The Reign of Ransomware 2016 Midyear Security Roundup: The Reign of Ransomware Paul Oliveria, Technical Communications Manager, Trend Micro Recorded: Sep 22 2016 45 mins
    Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
  • Live Q&A with David Leighton, President, Women in Technology Live Q&A with David Leighton, President, Women in Technology Katie Broderick, 451 Research & David Leighton, President, Women in Technology International Recorded: Sep 21 2016 24 mins
    Live from the 2016 Hosting & Cloud Transformation Summit in Las Vegas, Katie Broderick of 451 Research will interview David Leighton, President of Women in Technology about a recent survey of 1,100 WITI members, which found that early STEM (science, technology, engineering and math) exposure is crucial and a variety of support mechanisms are needed to achieve women's goals in a predominantly male field.
  • Top 3 Critical Factors to Consider for Network Protection Top 3 Critical Factors to Consider for Network Protection Michael Ferguson, Strategic Security Solutions Consultant, Forcepoint Sep 28 2016 5:00 am UTC 60 mins
    Next Generation Firewalls are Next Generation Firewalls…or maybe NOT.

    In the light of new advanced attacks and the demands to lower security infrastructure costs, just how can one get the most out of the Next Generation Firewall (NGFW) solutions? Are all NGFW solutions the same?

    What criteria should one consider for a NGFW solution that is best for your distributed enterprise environment? Join Forcepoint™’s Michael Ferguson and find out key value points when selecting a network security solution catered to your environment:

    • Latest trends in NGFW
    • Addressing total cost of ownership
    • Security effectiveness in increasingly complex threat landscape
    • Challenges in policy management

    Also, find out why Forcepoint Stonesoft NGFW has won NSS Labs' coveted highest rating of “Recommended” for the 4th year in a row. Learn how it can provide the scalability, protection and visibility needed to effectively manage your distributed networks. Plus, rapidly and easily deploy, monitor and manage thousands of firewalls from a single pane of glass.
  • Anatomia di un attacco di ransomware Anatomia di un attacco di ransomware Antonio Forzieri, Global Cyber Lead & Gabriele Zanoni, Incident Response Investigator Sep 28 2016 8:00 am UTC 60 mins
    Lo scorso anno il ransomware ha raggiunto un nuovo livello di evoluzione e pericolosità: come essere certi che l'infrastruttura IT sia protetta e in grado di affrontare un attacco?

    Oggi i leader della sicurezza hanno importanti sfide da risolvere:
    •Un’intelligence sulle minacce insufficiente a individuare gli aggressori e le campagne che potrebbero attaccare la loro azienda.
    •La penuria di analisti di sicurezza competenti in grado di identificare il numero crescente di minacce che penetrano all’interno delle aziende. Nel 2015, ad esempio, l’uso del crypto-ransomware come strumento di aggressione è aumentato del 35%, ma le aziende aggredite impiegano ancora più di 200 giorni per accorgersi del problema.
    •Scarsa conoscenza specializzata delle tecniche di incident response e remediation per gli ambienti IT colpiti.

    Gli autori dei ransomware continuano ad affinare le proprie tattiche, e le aziende devono imparare a conoscere bene le nuove minacce. Partecipa al webinar Symantec che descrive un attacco di ransomware, le sue conseguenze e la strategia di remediation adottata dall’azienda colpita.
  • Anatomía de un ataque de ransomware Anatomía de un ataque de ransomware Ramsés Gallego - Symantec Strategist Sep 28 2016 9:00 am UTC 45 mins
    El año pasado, el ransomware alcanzó un nivel de peligrosidad y profesionalidad nunca visto hasta ahora: ¿cómo puede estar seguro de que su infraestructura informática está protegida y de que está preparado para gestionar un ataque?

    En la actualidad, los líderes de los equipos de seguridad se enfrentan a los siguientes desafíos:
    •Una falta de inteligencia procesable sobre amenazas para mejorar su comprensión sobre los ciberdelincuentes y campañas que podrían tener como objetivo a su empresa.
    •Muy pocos analistas de seguridad cualificados que puedan identificar el creciente número de amenazas que se infiltran en su organización. Por ejemplo, el uso del ransomware de cifrado como herramienta de ataque por parte de los ciberdelincuentes continuó aumentando en 2015, con un crecimiento del 35 %. Sin embargo, las empresas que sufren un ataque siguen tardando más de 200 días en conocerlo.
    •Pocos conocimientos especializados en las técnicas necesarias para responder a las amenazas y repararlas una vez han invadido su entorno informático.

    Los grupos de cibercriminales especializados en ransomware continúan evolucionando sus tácticas, por lo que las organizaciones deben ser plenamente conscientes de las amenazas que estos representan. Únase a Symantec en un webinar que se centrará en un ataque de ransomware para conocer más detalles sobre el incidente y sobre las medidas que tomó la empresa para reparar la amenaza.
  • Anatomie d’une attaque par ransomware Anatomie d’une attaque par ransomware Hervé Doreau, Directeur Technique – Symantec France Sep 28 2016 12:00 pm UTC 60 mins
    Avec le degré de maturité et le niveau de menace atteint par les ransomwares au cours de l’an dernier, comment pouvez-vous être sûrs que votre infrastructure IT est réellement protégée et que vous êtes prêt à parer à une attaque ?

    Aujourd’hui, les responsables sécurité sont confrontés à :
    •un manque de renseignements exploitables sur les menaces, qui leur permettraient de mieux cerner les acteurs et les campagnes susceptibles de viser leurs entreprises
    •une carence en analystes de sécurité qualifiés, capables d’identifier le nombre croissant de menaces pénétrant leurs organisations. Par exemple, les cryptoransomwares sont en augmentation constante (+35 % en 2015 ) et il faut encore en moyenne plus de 200 jours à une entreprise pour découvrir qu’elle victime d’une attaque.
    •peu d’expertise spécialisée dans les techniques requises pour réagir à des menaces et les neutraliser une fois que celles-ci ont pénétré leur environnement IT

    Les gangs de rançonneurs ne cessant d’affiner leurs tactiques, les entreprises ont besoin d’être parfaitement au courant des menaces et des risques qu’elles encourent. Symantec vous donne rendez-vous pour un webcast consacré aux attaques par ransomware. Vous y découvrirez ce qui est arrivé à une société et les mesures qu’elle a prises pour remédier à la menace.
  • State of the Hack: Nordics State of the Hack: Nordics Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Sep 28 2016 12:00 pm UTC 45 mins
    The cyber threat landscape has never been more dynamic, than what we are seeing today. With an expanding surface area for attacks and a cybercriminal ecosystem worth billion of dollars on a global scale, cybercriminals are constantly pursuing new methods to obtain financial funds.

    It is no different in the Nordics – a region that is well known for its natural resources, innovations in renewable energy and healthcare, proximity to the Arctic, and emphasis on transparency in government is also a prime target for cybercriminals. These unique attributes make the region a prime target for cyber threat groups looking to capitalize on Nordic countries’ robust economies and distinct geopolitical concerns.

    Join Jens Monrad, Senior Intelligence Account Analyst at FireEye, who will discuss:

    * The Threat Landscape in the Nordics
    * Trends and Insights in Malware detections across the Nordics
    * Geopolitical situations which can influence the threat landscape in the Nordics
    * How having accurate and enriched threat intelligence can enable organisations to make tactical, operation and strategic decisions.

    Register today and learn what tools, processes and information organisations need in order to allow them to fully reconstruct the attack scenario and help make the right decisions based on the attack, as well as prepare for the next one.
  • CMDB Implementation Approach & Case Study CMDB Implementation Approach & Case Study Peter Hubbard, Principal ITSM Consultant at Pink Elephant EMEA & Faisal Usmani, Business Development and Strategy Lead for Co Sep 28 2016 3:30 pm UTC 60 mins
    CMDB Implementation is one of the most complicated of any ITSM programmes an organisation can undertake. The difficulties in creating a toolset, capable of linking hundreds of thousands of interconnected bits of data together in a meaningful manner while also supporting a highly fluid environment with dozens of changes each week, are formidable indeed.

    Join Peter Hubbard, Principal ITSM Consultant at Pink Elephant EMEA, as he discusses the Pink Elephant approach to create a CMDB in the real world. He will demonstrate the critical importance of the scoping session and understanding the organisations requirements to ensure the CMDB supports the business. Peter will then show you how to turn those requirements into concrete actions to map and create your CMDB.

    Faisal Usmani, Business Development and Strategy Lead for Comms at Cyient EMEA, will build on Peter’s theme; detailing how an effective CMDB implementation forms the basis for ITSM solutions. He will cite a case study that shows how this translates into a real world operational scenario that utilises actionable dashboards and provide valuable insights into your service performance at different levels within your organisation.

    At the end of the session you should know the importance of being able to ask your ITSM organisation ‘For our CMDB, do we need a battle tank or body armour?’’
  • IT Security Hygiene On The Brink: Fix Security Posture With On-Demand Visibility IT Security Hygiene On The Brink: Fix Security Posture With On-Demand Visibility Eric Hanselman, 451 Chief Analyst, and Erik Kristiansen, Tanium Sr. Director of Product Marketing Sep 28 2016 5:00 pm UTC 60 mins
    IT organizations have hit a breaking point in siloed management tools to address one of the most critical issues today - cybersecurity hygiene. In particular, numerous point solutions targeting the endpoints drive cost, complexity, and other challenges. New investments in cloud, distributed workforces and increasing numbers of connected devices only exasperate this problem. Addressing cybersecurity hygiene means that critical actions must be made on demand versus scheduled. Teams must also have confidence that assessment results and remediation actions are complete.

    Come learn about the key issues why cybersecurity hygiene fails in most organization. We’ll discuss in depth how the platform approach and speed of Tanium are poised to fix this critical problem. Eric Hanselman, 451 Chief Analyst, and Erik Kristiansen, Senior Director of Product Marketing at Tanium will discuss.
  • Real-Time Vulnerability Assessment for Rapid Response to Security Threats Real-Time Vulnerability Assessment for Rapid Response to Security Threats Bill Lewis, Dir. of IT, State Garden, Erick Ingleby, PM. Forescout & Jorhn Schimelpfenig, Sr. Business Dev. Manager, Rapid7 Sep 28 2016 6:00 pm UTC 60 mins
    State Garden, a top producer of salad greens in the northeastern U.S., had two serious cybersecurity issues that needed to be addressed:

    1.) Internet of Things (IoT) endpoints on the company’s network were undetectable.
    2.) Vulnerability Assessment (VA) scans were missing mobile Bring Your Own Device (BYOD) systems that come and go from the network.

    Both issues were creating an attack surface that was increasingly harder to monitor and protect.

    Billy Lewis, State Garden Director of IT, will share the challenges he faced to:
    •Maximize efficiency of limited IT security resources and personnel
    •Protect company assets from unauthorized or non-compliant devices connecting to the network
    •Automate endpoint compliance and remediation
    •Orchestrate multisystem security

    In addition, Lewis will explain the role the ForeScout-Rapid7 solution played in reducing the attack surface and accelerating remediation on State Garden’s network.
  • Best Practices for Project Portfolio Management in State and Local Government Best Practices for Project Portfolio Management in State and Local Government Rob Hirschmann Sep 28 2016 8:00 pm UTC 60 mins
    Having a single system of record of all program, portfolio, and project information reduces costs and allows governmental organizations to quickly snap to and comply with mandates and regulations.

    Join this webcast to learn how integrated PPM solutions:
    •Bring increased accountability across agency projects
    •Facilitate real-time collaboration between project and program managers and their teams
    •Reduce redundancy and manual effort
  • Combining Least Privilege + App Control to Protect from Malware and Ransomware Combining Least Privilege + App Control to Protect from Malware and Ransomware Gil Rapaport, CyberArk, Adrian Davis, (ISC)² EMEA Sep 29 2016 11:00 am UTC 60 mins
    Privilege is at the centre of the attack lifecycle, yet removing Windows users’ local administration rights has a negative impact on the user experience and creates a desktop support headache.

    Join this webinar to learn how least privilege, combined with the right application control technologies, can enable you to remove local administrator rights to reduce your attack surface, while keeping your users and support teams happy. The session will cover the technologies required to achieve this and demonstrate how their unique combination can protect you from ransomware.
  • The 7 Things I Wish I Knew Before I Started Down the Agile Path - 1 PDU The 7 Things I Wish I Knew Before I Started Down the Agile Path - 1 PDU Andy Jordan, ProjectManagement.com Sep 29 2016 2:00 pm UTC 60 mins
    Every organization’s Agile transformation is different, however there are key landmines that can cause an organization’s Agile transformation to struggle. Join Andy Jordan, ProjectManagement.com as he discusses how you can avoid seven common Agile transformation mistakes and put your organization on the right path with Agile.

    This session is approved for 1 Project Management Institute (PMI) PMP PDU Credit.
  • The CISO as a Transformational Role in Risk Management The CISO as a Transformational Role in Risk Management Michael Rasmussen- GRC 20/20 Sep 29 2016 2:00 pm UTC 60 mins
    Mike Rasmussen of GRC 20/20 explores the ever changing role of the CISO in a modern organization.

    This presentation offers a prescription for managing information security risk as it permeates business operations, processes, transactions, and relationships in the digital world.
  • Driving PPM Excellence–Insights from CA Services with Application Managed Svcs Driving PPM Excellence–Insights from CA Services with Application Managed Svcs George Starr, Sr. Director Practice Services Adam Frary, Services Marketing Sep 29 2016 3:15 pm UTC 60 mins
    Every one of our PPM customers is pursuing the same end goal – how to deliver the highest value to the organization. Working with hundreds of customers, we have learned that the answer requires a comprehensive approach across multiple disciplines. To drive bigger results and achieve greater PPM maturity, organizations need to improve PPM leadership, governance, change management, product management, development, support and other disciplines.

    Please join us for this presentation that discusses how to achieve PPM excellence by building competencies across disciplines in-house with the option of augmenting that approach with Application Managed Services for CA PPM.
  • Keeping Insider Risk at Bay Keeping Insider Risk at Bay Doug Copley, Deputy CISO and Senior Security & Privacy Strategist at Forcepoint Sep 29 2016 4:00 pm UTC 60 mins
    Is that activity you’re seeing a malicious user? Is it someone who made a mistake? Is it coming from an account whose credentials were compromised? Is it command and control traffic? How confident are you? As security programs are maturing, attention is turning to threats emanating from inside the network. Doug Copley will discuss seven profiles of highly risky users, outline how your organization can reduce insider risk, and present a real-world case study of how a software organization protected themselves.
  • Building Your Microservice Architecture for Speed, Scale and Safety Building Your Microservice Architecture for Speed, Scale and Safety Dinesh Chandrasekhar - Director Product Marketing, Jay Thorne - Director APIM Engineering, Stephen Mak - Product Manager Sep 29 2016 4:00 pm UTC 60 mins
    Everybody is joining the microservices bandwagon and only some enterprises truly see the benefits of adopting microservices. The real challenge is not only cultural adoption but also a question of choosing the right technical tools to enable and secure your microservices.

    In this webinar we'll provide practical guidance on building and deploying a microservice architecture for speed, scale and safety.

    Join this webinar to learn:

    - Key considerations of enabling microservices within your enterprise
    - How DevOps fits in the microservices lifecycle and how to align team culture
    - How to use an API gateway for securing and governing your microservice architecture
  • Sending Attackers Down the Rabbit Hole: Introducing vArmour DSS Deception Sending Attackers Down the Rabbit Hole: Introducing vArmour DSS Deception Jesse McKenna, Director of Product Management, Cyber Security Sep 29 2016 5:00 pm UTC 60 mins
    The use of deception technologies to level the playing field against attackers sounds like a pretty compelling proposition for security teams. So why has adoption been limited to only the largest enterprises? What can security teams expect when deploying deception? What are the risks and what can be done to address them?

    This presentation will provide attendees with an understanding of the challenges facing deception solutions to date, approaches for mitigating those challenges, and an introduction to vArmour’s deception solution: vArmour DSS Deception.
  • How To Gain Actionable Insight Into Cyber Risk With Security Ratings How To Gain Actionable Insight Into Cyber Risk With Security Ratings Ira Scharf, GM of Worldwide Insurance, BitSight, Dave Bradford, President, Advisen Sep 29 2016 5:00 pm UTC 60 mins
    With so many different cyber risk metrics being used, how can cyber insurance underwriters and risk managers know how likely a company is to experience a data breach?

    Join Ira Scharf, GM of Worldwide Insurance at BitSight, and Dave Bradford President, Research and Editorial at Advisen as they discuss new correlations between BitSight Security Ratings and data breaches.

    Attendees will learn:

    - Why security ratings are a clear indicator of cyber risk
    - How likely companies with BitSight ratings of 400 or below are to experience a data breach
    - How underwriters, policyholders, and applicants can use BitSight Security Ratings to lower their cyber risk
  • Assertions and Attestations - Nailing Your Next Cloud Audit Assertions and Attestations - Nailing Your Next Cloud Audit Frank Krieger, Director of Compliance and Lilac Schoenbeck, VP of Marketing Sep 29 2016 6:00 pm UTC 60 mins
    The call from the auditor, like your dental cleaning and tax day, comes with dizzying regularity. For more than a decade, companies have been avoiding, eschewing or explicitly fibbing about their cloud use to step around the murky area of cloud compliance.

    Why? Because the rules are ambiguous. Because the paperwork is unreal. Because cloud vendors are cagey. Because it was just easier.

    And business continues to use the cloud, because it’s critical to growth, IT operations, agility and disaster protection. But you no longer have to pull a fast one on your audit team. Join iland's Director of Compliance to learn:

    - What to look for in cloud reporting – in particular for HIPAA, SOC2 and ISO27001
    - How your cloud vendor can support you
    - What questions auditors typically ask
    - How all this impacts your disaster recovery plans as well as your public cloud use
  • Navigating the Threat Landscape: Developments in Cybercrime & How To Stay Ahead Navigating the Threat Landscape: Developments in Cybercrime & How To Stay Ahead Michael Mimoso, Editor-in-chief, Threatpost Sep 29 2016 6:00 pm UTC 45 mins
    In the 25 years since the first PC viruses appeared, how has the threat landscape changed?
    - What are the most vulnerable areas that cybercriminals look to exploit?

    Join us for our webinar to get the latest information you need to know about how cyberthreats are evolving. We'll cover the areas of cybercrime that are growing the fastest and how businesses can stay ahead of the threats that most affect their businesses.

    90% - Organizations who have experienced some form of external threat in the past 12 months.

    We'll cover everything from the rise of ransomware to the greatest mobile security threats, as well as taking your questions on the topics you are most concerned about.
  • Intro to Microsoft Azure's Internet of Things (IoT) Intro to Microsoft Azure's Internet of Things (IoT) Jeremy Foster, Senior Technical Evangelist, Microsoft Sep 29 2016 6:00 pm UTC 60 mins
    The Internet of Things (IoT) is already a huge deal and it's only going to get bigger

    There are far more devices connected to the internet than there are people in the world and that number is projected to grow dramatically in the coming years. Whether you're an individual hobbyist or an enterprise developer, there's a great chance you'll find need for a cloud-based service to listen to the devices in your IoT solution, facilitate communication, and even communicate back to the devices telling them how to behave.

    That's why there's Azure IoT. Azure IoT includes the dedicated IoT Hub service, IoT solution templates called IoT Suite, as well as many other general services for processing IoT data and turning them into real business insight. With a little time and learning, you’ll have a service designed to handle massive amounts of communication with devices, but also able to scale down to startup and even hobbyist scenarios.

    Join this webcast to learn how to:
    •Conceptualize why you might need a cloud-based hub solution
    •Easily set up an IoT Hub in Azure
    •Create simulated devices and communicate to your hub
  • How Not to Get Hacked like Yahoo! How Not to Get Hacked like Yahoo! Microsoft Sep 29 2016 8:00 pm UTC 60 mins
    Sony, Target and now Yahoo! -- you can't let this to happen to you or your business. Help your organization avoid being front page news due to a security breach.

    Every organization large and small wants to avoid this all too common reality. From the unintentional sharing of data by employees through a rogue email, to losing data via a lost computer, to surviving hacker attacks, there's a lot to manage.

    Join this webcast to learn the top 5 ways to protect your organization and make sure your company isn't the next one hacked.

    This webcast is part of our Digital Security in the Modern World webcast series. Sign up for this session, or the entire series today!
  • LIVE Interactive Q&A: Steve Durbin on the Yahoo Data Breach LIVE Interactive Q&A: Steve Durbin on the Yahoo Data Breach Steve Durbin, Managing Director, ISF Ltd Sep 30 2016 10:00 am UTC 45 mins
    Last week Yahoo was hit with the biggest data breach of all time; with an estimated 500 million customer accounts compromised by hackers. The attack will have significant rippling effects on consumer trust, data protection standards and information security practices. The legal battle is now also only just beginning, with two key cases being heard in California, as Yahoo is sued for data-protection negligence.

    But what will does all this mean to your business? Do you feel compromised professionally or personally? Were key mistakes made that you can avoid? How can you best prepare (in terms of incident response) to such a breach? Will the attack have lasting effects or will it disappear into the annuls of history alongside the Ashley Maddison, Target and Linkedin hacks. All these questions and more will be answered live, over webcam by Security expert and Managing Director of the ISF Steve Durbin.

    Tune in, ask your burning questions and join the conversation on BrightTALK.
  • (ISC)² EMEA Reacts: Yahoo – a case study for GDPR? (ISC)² EMEA Reacts: Yahoo – a case study for GDPR? Adrian Davis, Jason Hart, Nigel Hawthorn Sep 30 2016 10:00 am UTC 45 mins
    The “(ISC)² EMEA reacts” are ad-hoc webinars scheduled in reaction to major Information security events and breaches. Here we bring together leading Industry experts to join Adrian Davis, Managing Director, (ISC)2 EMEA to explore the impact, potential responses, and implications for the future, offering professionals much-needed perspective as the dust settles.