Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Sony, Target and now Yahoo! -- you can't let this to happen to you or your business. Help your organization avoid being front page news due to a security breach.
Every organization large and small wants to avoid this all too common reality. From the unintentional sharing of data by employees through a rogue email, to losing data via a lost computer, to surviving hacker attacks, there's a lot to manage.
Join this webcast to learn the top 5 ways to protect your organization and make sure your company isn't the next one hacked.
This webcast is part of our Digital Security in the Modern World webcast series. Sign up for this session, or the entire series today!
This month’s webinar will focus on the mobile ransomware landscape including the evolution of the threat, where we’re seeing attacks occur, and how to protect your devices from this threat. We will also cover the threat statistics we gather from our Trend Micro™ Smart Protection Network™ and the top mobile ransomware threats observed.
The call from the auditor, like your dental cleaning and tax day, comes with dizzying regularity. For more than a decade, companies have been avoiding, eschewing or explicitly fibbing about their cloud use to step around the murky area of cloud compliance.
Why? Because the rules are ambiguous. Because the paperwork is unreal. Because cloud vendors are cagey. Because it was just easier.
And business continues to use the cloud, because it’s critical to growth, IT operations, agility and disaster protection. But you no longer have to pull a fast one on your audit team. Join iland's Director of Compliance to learn:
- What to look for in cloud reporting – in particular for HIPAA, SOC2 and ISO27001
- How your cloud vendor can support you
- What questions auditors typically ask
- How all this impacts your disaster recovery plans as well as your public cloud use
In the 25 years since the first PC viruses appeared, how has the threat landscape changed?
- What are the most vulnerable areas that cybercriminals look to exploit?
Join us for our webinar to get the latest information you need to know about how cyberthreats are evolving. We'll cover the areas of cybercrime that are growing the fastest and how businesses can stay ahead of the threats that most affect their businesses.
90% - Organizations who have experienced some form of external threat in the past 12 months.
We'll cover everything from the rise of ransomware to the greatest mobile security threats, as well as taking your questions on the topics you are most concerned about.
The Internet of Things (IoT) is already a huge deal and it's only going to get bigger
There are far more devices connected to the internet than there are people in the world and that number is projected to grow dramatically in the coming years. Whether you're an individual hobbyist or an enterprise developer, there's a great chance you'll find need for a cloud-based service to listen to the devices in your IoT solution, facilitate communication, and even communicate back to the devices telling them how to behave.
That's why there's Azure IoT. Azure IoT includes the dedicated IoT Hub service, IoT solution templates called IoT Suite, as well as many other general services for processing IoT data and turning them into real business insight. With a little time and learning, you’ll have a service designed to handle massive amounts of communication with devices, but also able to scale down to startup and even hobbyist scenarios.
Join this webcast to learn how to:
•Conceptualize why you might need a cloud-based hub solution
•Easily set up an IoT Hub in Azure
•Create simulated devices and communicate to your hub
The use of deception technologies to level the playing field against attackers sounds like a pretty compelling proposition for security teams. So why has adoption been limited to only the largest enterprises? What can security teams expect when deploying deception? What are the risks and what can be done to address them?
This presentation will provide attendees with an understanding of the challenges facing deception solutions to date, approaches for mitigating those challenges, and an introduction to vArmour’s deception solution: vArmour DSS Deception.
With so many different cyber risk metrics being used, how can cyber insurance underwriters and risk managers know how likely a company is to experience a data breach?
Join Ira Scharf, GM of Worldwide Insurance at BitSight, and Dave Bradford President, Research and Editorial at Advisen as they discuss new correlations between BitSight Security Ratings and data breaches.
Attendees will learn:
- Why security ratings are a clear indicator of cyber risk
- How likely companies with BitSight ratings of 400 or below are to experience a data breach
- How underwriters, policyholders, and applicants can use BitSight Security Ratings to lower their cyber risk
Is that activity you’re seeing a malicious user? Is it someone who made a mistake? Is it coming from an account whose credentials were compromised? Is it command and control traffic? How confident are you? As security programs are maturing, attention is turning to threats emanating from inside the network. Doug Copley will discuss seven profiles of highly risky users, outline how your organization can reduce insider risk, and present a real-world case study of how a software organization protected themselves.
Everybody is joining the microservices bandwagon and only some enterprises truly see the benefits of adopting microservices. The real challenge is not only cultural adoption but also a question of choosing the right technical tools to enable and secure your microservices.
In this webinar we'll provide practical guidance on building and deploying a microservice architecture for speed, scale and safety.
Join this webinar to learn:
- Key considerations of enabling microservices within your enterprise
- How DevOps fits in the microservices lifecycle and how to align team culture
- How to use an API gateway for securing and governing your microservice architecture
Every one of our PPM customers is pursuing the same end goal – how to deliver the highest value to the organization. Working with hundreds of customers, we have learned that the answer requires a comprehensive approach across multiple disciplines. To drive bigger results and achieve greater PPM maturity, organizations need to improve PPM leadership, governance, change management, product management, development, support and other disciplines.
Please join us for this presentation that discusses how to achieve PPM excellence by building competencies across disciplines in-house with the option of augmenting that approach with Application Managed Services for CA PPM.
Consumers want payment options that function in all channels—research confirms it. They want to buy things with as little frustration as possible and merchants want to accept payments from legitimate customers. It seems so simple.
As digital wallets emerge, however, security remains the primary hurdle facing mobile payments. How do digital wallets fit into the formula of customer convenience and merchant confidence?
Join Hannah Preston, Solution Strategist, Payment Security Division, CA Technologies and D.J. Murphy, Editor-in-Chief, CardNotPresent.com as they discuss digital wallet adoption and how companies can keep pace with the demands of mobile commerce, while balancing fraud risks.
Learn the "must haves" for any digital wallet solution:
• Specifically designed to fuel the mobile economy, avoiding the frustration and complexity of legacy payment infrastructure
• Securely provisioned with the cardholder's credentials, a vital feature for card issuers who want to offer cardholders digital wallet platforms
• Industry sanctioned to effect a large scale shift in payment culture for merchants, issuers and customers
Every organization’s Agile transformation is different, however there are key landmines that can cause an organization’s Agile transformation to struggle. Join Andy Jordan, ProjectManagement.com as he discusses how you can avoid seven common Agile transformation mistakes and put your organization on the right path with Agile.
This session is approved for 1 Project Management Institute (PMI) PMP PDU Credit.
Privilege is at the centre of the attack lifecycle, yet removing Windows users’ local administration rights has a negative impact on the user experience and creates a desktop support headache.
Join this webinar to learn how least privilege, combined with the right application control technologies, can enable you to remove local administrator rights to reduce your attack surface, while keeping your users and support teams happy. The session will cover the technologies required to achieve this and demonstrate how their unique combination can protect you from ransomware.
SMBs have the same security needs and requirements as enterprises, but rarely have the resources or personnel that their larger competitors have. What are some strategies SMBs can take when it comes to next-generation firewalls, intrusion-protection systems, intrusion-detection systems, and other hybrid approaches? Listen to this webcast to learn more.
Having a single system of record of all program, portfolio, and project information reduces costs and allows governmental organizations to quickly snap to and comply with mandates and regulations.
Join this webcast to learn how integrated PPM solutions:
•Bring increased accountability across agency projects
•Facilitate real-time collaboration between project and program managers and their teams
•Reduce redundancy and manual effort
State Garden, a top producer of salad greens in the northeastern U.S., had two serious cybersecurity issues that needed to be addressed:
1.) Internet of Things (IoT) endpoints on the company’s network were undetectable.
2.) Vulnerability Assessment (VA) scans were missing mobile Bring Your Own Device (BYOD) systems that come and go from the network.
Both issues were creating an attack surface that was increasingly harder to monitor and protect.
Billy Lewis, State Garden Director of IT, will share the challenges he faced to:
•Maximize efficiency of limited IT security resources and personnel
•Protect company assets from unauthorized or non-compliant devices connecting to the network
•Automate endpoint compliance and remediation
•Orchestrate multisystem security
In addition, Lewis will explain the role the ForeScout-Rapid7 solution played in reducing the attack surface and accelerating remediation on State Garden’s network.
IT organizations have hit a breaking point in siloed management tools to address one of the most critical issues today - cybersecurity hygiene. In particular, numerous point solutions targeting the endpoints drive cost, complexity, and other challenges. New investments in cloud, distributed workforces and increasing numbers of connected devices only exasperate this problem. Addressing cybersecurity hygiene means that critical actions must be made on demand versus scheduled. Teams must also have confidence that assessment results and remediation actions are complete.
Come learn about the key issues why cybersecurity hygiene fails in most organization. We’ll discuss in depth how the platform approach and speed of Tanium are poised to fix this critical problem. Eric Hanselman, 451 Chief Analyst, and Erik Kristiansen, Senior Director of Product Marketing at Tanium will discuss.
Watch this EMC Webcast and learn how to enhance compliance by establishing an application decommissioning factory.
You've achieved success with your first app decommissioning project with InfoArchive. The projected savings from the project will help to fund new initiatives. What if you could replicate those successes to drive more benefits from your investments on InfoArchive and your team? This session will describe proven approaches where your project experience can be used to scale the benefits of application decommissioning that will drive further savings and opportunities to reuse your application data in new ways.
Your Big Data strategy is only as good as the quality of your data. Today, deriving business value from data depends on how well your company can capture, cleanse, integrate and manage data.
Deriving business value from data depends on how well your company can capture, cleanse, integrate and manage data. During this webinar, we will discuss how to eliminate the challenges to Big Data management inside Hadoop including how to drive faster access to usable information across the enterprise. We’ll also discuss how to create an enterprise data lake where data is captured, cleansed, linked and structured in a consistent way. The speakers will be Justin Sears, Senior Manager, Product Marketing from Hortonworks and Jamie Keeffe, Product Marketing Manager from RedPoint Global.
Gartner recently placed Big Data in its “trough of disillusionment,” reflective of many leaders’ struggle to prove the value of Hadoop within their organization. While the promise of enhanced data integration and enrichment is obvious, measurable results have remained elusive. This episode of The Briefing Room will outline how to successfully tie Big Data to existing business applications, preventing your next Hadoop project from being another “Big Data letdown.”
Learn from veteran Analyst Dr. Robin Bloor as he discusses the importance of converging enterprise data integration with intelligence and scalability. He’ll be briefed by George Corugedo of RedPoint Global, who will provide concrete examples of how the convergence of scalable cloud platforms, ever-expanding data sources and intelligent execution can turn the Big Data hype into demonstrable business value.
CMDB Implementation is one of the most complicated of any ITSM programmes an organisation can undertake. The difficulties in creating a toolset, capable of linking hundreds of thousands of interconnected bits of data together in a meaningful manner while also supporting a highly fluid environment with dozens of changes each week, are formidable indeed.
Join Peter Hubbard, Principal ITSM Consultant at Pink Elephant EMEA, as he discusses the Pink Elephant approach to create a CMDB in the real world. He will demonstrate the critical importance of the scoping session and understanding the organisations requirements to ensure the CMDB supports the business. Peter will then show you how to turn those requirements into concrete actions to map and create your CMDB.
Faisal Usmani, Business Development and Strategy Lead for Comms at Cyient EMEA, will build on Peter’s theme; detailing how an effective CMDB implementation forms the basis for ITSM solutions. He will cite a case study that shows how this translates into a real world operational scenario that utilises actionable dashboards and provide valuable insights into your service performance at different levels within your organisation.
At the end of the session you should know the importance of being able to ask your ITSM organisation ‘For our CMDB, do we need a battle tank or body armour?’’
Today’s cutting-edge companies are viewing their customers within the context of a decade or more of interactions across multiple customer channels. Real-time integration with social media and other customer channels can now result in actionable insights with game-changing potential. Attend this webinar to hear veteran Analyst Dr. Robin Bloor describe the changing landscape of data flow, and how that impacts enterprise responsiveness. George Corugedo, CTO, RedPoint Global will explain how companies are leveraging Hadoop’s YARN architecture to deliver a whole new array of highly responsive, data-driven enterprise applications.
Last week Yahoo was hit with the biggest data breach of all time; with an estimated 500 million customer accounts compromised by hackers. The attack will have significant rippling effects on consumer trust, data protection standards and information security practices. The legal battle is now also only just beginning, with two key cases being heard in California, as Yahoo is sued for data-protection negligence.
But what will does all this mean to your business? Do you feel compromised professionally or personally? Were key mistakes made that you can avoid? How can you best prepare (in terms of incident response) to such a breach? Will the attack have lasting effects or will it disappear into the annuls of history alongside the Ashley Maddison, Target and Linkedin hacks. All these questions and more will be answered live, over webcam by Security expert and Managing Director of the ISF Steve Durbin.
Tune in, ask your burning questions and join the conversation on BrightTALK.
The “(ISC)² EMEA reacts” are ad-hoc webinars scheduled in reaction to major Information security events and breaches. Here we bring together leading Industry experts to join Adrian Davis, Managing Director, (ISC)2 EMEA to explore the impact, potential responses, and implications for the future, offering professionals much-needed perspective as the dust settles.
What can Space Invaders teach us about attack path analysis? Mario about defending your users that are the weakest link? Even Pac Man about focusing on the right goals? Join Gavin Millard, EMEA Technical Director, who will explore the lessons to be learned from the games many of us played years ago that are still valid in the reduction of security risks within all of our infrastructures. Key takeaways from the webinar include:
How to game the system to get a high score in security.
How to gain insight into the attack path used by hackers to gain access to your data.
What cheats can be used to reduce the risk of data loss.
According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyber attack.
Register for this impactful webinar presented by Richard Cassidy, UK Cyber Security Evangelist at Alert Logic as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets, what they are looking for, and how they extract valuable data.
In this webinar, we will take a look at:
• The ever-changing threat landscape, and how it affects your business
• Tactics, techniques and procedures (TTPs) used by cyber criminal actors
• Strategies and tools for mitigating the risk of cyber attack
• Insight into Real-life case studies
Conformarse vs Orquestar.
Las soluciones de IT que selecciona deberían ayudarle a dar el mejor soporte posible a su negocio. Pero hay algunas que heredamos, o que seleccionamos con una visión parcial de nuestros sistemas, y que acaban frenando nuestra capacidad de dar valor a nuestra empresa como Departamento de IT.
Las soluciones de protección de datos suelen encontrarse en este segundo caso. El hecho de que sus fabricantes, como Veritas, Veeam o IBM, no invierten lo suficiente en innovación para convertirlas en auténticas herramientas de gestión de datos empresariales, o de que están pensadas sólo para cubrir una parte de los sistemas, trae como consecuencia que Usted, que las tiene integradas en sus plataformas, sufra algunos o todos estos problemas:
• Gastos de administración y operación excesivos
• Inversión en plataformas de soporte de protección de datos costosas y propietarias
• Riesgos financieros asociadas a la incapacidad de cumplir SLAs y dar valor a su negocio
• Limitación en la libertad para elegir cuáles serán los sistemas de producción que mejor soporten su negocio, simplemente porque no tendrá cómo protegerlos.
Es hora de liberarse de esta carga, y apostar por el líder al que el mercado aclama como un socio tecnológico innovador que le devuelve el control sobre sus decisiones de IT. Si va a renovar su actual software de protección de datos, es hora de decidirse por el mejor.
Únase a nosotros en este webinar y descubra cómo Commvault le garantiza que su software de copia de seguridad no le limitará la capacidad de elegir proveedores de sistemas de producción, y reducirá sus riesgos financieros de cara a la Dirección de su empresa disminuyendo la complejidad de su infraestructura y aumentando su productividad.
With a strong track record in Education, find out how Snow Software provides a consolidated view of all licenses, enabling staff to use just one interface to manage multiple software vendors, device types and locations across all platforms.
The digitization of businesses and the way that IT supports the needs of these businesses has changed significantly over time. Today, different IT workloads can be deployed on different types of cloud services, depending upon the business requirements. As a result, many IT departments are moving their infrastructure to the cloud and multi-cloud virtual environments. A multi-cloud management platform allows enterprises to manage workloads and applications across all cloud deployment models, including public, private, and hybrid. Using the right platform for this workload enables enterprises to drive favorable business results. The multi-cloud approach facilitates transition to the IT-as-a-Service (ITaaS) model, where IT departments act as service brokers and support organizations in optimizing their IT infrastructure consumption. In this webinar, we'll discuss the key features of a multi-cloud management platform and also discuss the benefits, challenges, and opportunities in the existing market.
Building a strong culture of security is the key to ensuring that your users care enough about the security of your company to protect it. Every day, in every interaction, we want our users to do the right thing when it comes to security.
In this webinar we will discuss:
- Symantec’s Employee Trust Program
- How we go beyond basic security awareness training to continuously cultivate our security culture.
Help your employees take personal responsibility for IT security!
From biometrics to multi-factor authentication, how do you help your employees be protected at a personal level?
We’ll explore how you can go beyond mere password strength to help prevent your employees' identities and your business from being compromised. Join this webcast to learn how cloud services and operating systems are designed with security in mind, while preserving natural, friendly user interactions.
This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
From May 2018, the new EU General Data Privacy Regulation (GDPR) will require all Public Sector organisations to more effectively understand how they manage data on their citizens, contractors and staff. Citizens will have significantly more rights and powers on how their data is used and consumed, with large fines available for any breaches of the regulation.
Join this webinar to understand:
- What GDPR is and what it means to Public Sector bodies
- The potential impact of Brexit
- The range of data challenges and opportunities the new regulation will create
- What data capabilities agencies will need to consider
- Learn what best practice approaches commercial organisations are already taking to ensure timely compliance
As Windows support requirements continue to dominate the focus of enterprise endpoint management efforts, an increasing number of Apple device users are becoming frustrated with being treated as second-class citizens. At the heart of the problem are Windows-centric practices and solutions that do not comprehensively translate to supporting Mac and iOS platforms. However, adoption of Apple management point solutions that operate independent of existing Windows administration platforms only add to management complexity and fail to achieve service reliability and cost-effectiveness.
Join Steve Brasen, EMA Research Director from analyst firm, Enterprise Management Associates, and Tim Williams, Director Product Marketing at HEAT Software for a one-hour presentation identifying the optimal practices and solutions that will enable comprehensive management of Apple devices side-by-side with Windows endpoints.
Key topics of discussion include:
•What is the current state of Apple device adoption and use in the enterprise?
•What specific Apple requirements are not being serviced by traditional Windows-targeted management solutions?
•Which methods should be employed to maintain consistent user experiences across different endpoint architectures?
•What effect has increased workforce mobility had on emerging Apple support requirements?
•How can enterprise security requirements be maintained across disparate software and hardware ecosystems?
Companies across a wide gamut of industries and regions all strive to effectively manage risk and compliance, but too few actually achieve it. As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight.
During this webcast, guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° will cover how you can:
· Move up the maturity curve through better program coordination and technology integration.
· Establish the right metrics to build the business case and showcase continual progress.
· Bolster future success by prioritizing business agility and data mastery as top strategic objectives.
Build intelligence into your eDiscovery processes!
Did you know the median litigation budget in the US is $1.2M (2015 - Norton Rose Fulbright) and that over 40% of large companies have one or more lawsuits with $20M+ at issue? With data being created at exponential rates, reviewing necessary documentation can and will become one of the biggest challenges legal teams face. It’s time to build intelligence into your discovery processes. Microsoft Office 365 Advanced eDiscovery may be the answer for you.
Join this webcast to learn:
•How Microsoft Office 365 Advanced eDiscovery can help you analyze data within Office 365, streamline document reviews and make decisions for efficient eDiscovery
•How this solution differs from traditional eDiscovery software
•Why there's no better time than today to start thinking about this topic
File sharing, collaboration on documents and the influx of data in the cloud will pose new challenges and opportunities. Save your seat in this session to learn more!
Resource Management is a relatively straight forward concept with significant benefits. However, some organizations choose to postpone those benefits and focus on other aspects of PPM. How can we extend organizational maturity for PPM with high value outcomes from Resource Management?
Please join Erich Kissel, CA Services Architect for PPM, and Lars Matzerath, Head of Sales from itdesign GmbH for an insightful discussion on Resource Management on Friday, Oct.7th.
CA Services will provide tips for getting started and for expanding into new Resource Management use cases. Our partner, itdesign, will share some insights of two powerful packaged work products
for CA PPM: itd Assignment Editor and itd Allocation Editor which enhance project and resource managers’ visibility and editing options of resources.
From assigning and aligning resources to projects, evaluating and normalizing demand, to gaining a better understanding of available skills, it’s time to fulfill your resource management aspirations!
Today, advanced cyber threats form part of the risk landscape we encounter every day in our increasingly digital lives. Cybercrime is known for its complex, chameleon characteristics – it’s a highly lucrative industry with fast-paced innovation at its core. The evolution of cybercriminal techniques enables it to thrive, and we need to sprint to keep up. Organizations must respond with security solutions nimble enough to compete with the bad guys. Sounds like a job for MRTI, and we think we’ve got just the ticket.
This webinar intends to be an educational piece for any Security team in need of having a better understanding of the value provided by Threat Intelligence feed in order to complement traditional security real estate. This is not intended for those who already have a strong expertise and understanding of the fundamentals of threat intelligence delivered via a feed.
In May 2018 the EU’s General Data Protection Regulation (GDPR) will take effect. The GDPR upholds the protection of personal data and increases the accountability of organisations processing any personal details belonging to EU citizens- with severe penalties for those who do not comply.
In this webinar Steve Durbin, Managing Director at the ISF, discusses why it is important for the security and data privacy teams to work together to run risk assessments on their most critical information assets and to develop checklists, policies and procedures that can be implemented internally and with third party suppliers. Only by taking this approach will organisations be able to remain agile, maintain customer confidence and demonstrate that they are ‘GDPR ready.’
Database-as-a-service offers multiple potential benefits, including lower database licensing and infrastructure costs, faster time to application development, and reduced administration overheads. These benefits are most likely to be experienced by database administrators and architects, although senior decision-makers and business users also stand to gain from having on-demand access to database services, rather than waiting for databases to be configured and deployed on dedicated physical or virtual server infrastructure.
While 451 Research anticipates growing adoption of database-as-a-service (DBaaS), adoption is currently nascent compared with other cloud services, as enterprises look to make the most of their investments in on-premises database deployments, and also to identify the most appropriate workloads for transition or migration to DBaaS. This webinar explores the factors shaping those adoption trends, including the potential benefits and challenges to DBaaS adoption, the economics of the cloud as they relate to database workloads, and adoption lifecycles.
Based on research involving enterprises currently deploying database workloads in the cloud, the webinar will:
• Highlight the trends driving enterprises to move database workloads to the cloud
• Identify the challenges causing enterprises to be hesitant about migrating database workloads to the cloud
• Identify the use-cases that are prime candidates for migrating database workloads to the cloud
• Highlight the critical success factors for database migration to the cloud
Recent DDoS attacks trends indicate that DDoS attacks are becoming more sophisticated and persistent. What do these DDoS trends mean for your organization, especially during the upcoming holiday season?
Join Rohit Kinra, Director, Product Technology, Verisign, as he discusses the behavioral shifts observed by Verisign in recent DDoS attacks and what should concern you. Rohit will also share recommendations on how your organization can prepare and defend against DDoS attacks.