Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Insights with Cyber Leaders series brings you a fascinating Interview with Patrik Heuri former Global Head of Information Security Risk at HSBC Private Bank.
Moving from an information security role into a cyber security role has been challenging. Patrik explains his thoughts in that when you think about information security, you think of it as a technical subject, and that’s correct. In fact, most project leads will, when they start as juniors, learn the necessary techniques and methodologies they will need to develop their expertise as an IT security officer. However, further down the line of their careers, Patrik believes that there is a requirement to better understand the legal aspects to cyber and information security, such as regulations and compliance, and the information production within the organisation. He adds that it will be of great benefit to anyone entering the information security/cyber security space to train and work with the legal teams on IT matters.
Muchas nuevas tendencias y realidades están acaparando los medios especializados en el sector de las TIC. Todos los actores relacionados de alguna manera con este mundo aseguran tener mensajes, productos, servicios o cualquier tipo de oferta para cada uno de los casos. La realidad suele ser más compleja, y con frecuencia los mensajes son inconexos.
Tendencias como la nube (en cualquiera de sus formas) y retos como la adopción de GDPR y el riesgo de amenazas de tipo ransomware pueden parecen a priori muy distantes entre sí. Sin embargo, la realidad es diferente.
Al fin y al cabo, estos tres conceptos están basados en datos. La nube nos permite mover, acceder o servir nuestros datos de una forma diferente; GDPR nos obliga a tener una visibilidad completa de todos nuestros datos para poder identificarlos, eliminarlos o presentarlos según demanda este marco legal, y por último el ransomware es una amenaza que secuestra y pide un rescate a cambio de devolvernos nuestros datos.
Los datos, por lo tanto, están en la raíz de estos retos, riesgos y oportunidades. Esto significa que una gestión y protección eficientes de dichos datos van a permitir estar mejor preparados para afrontar estas situaciones. Por ello, la visión unificada de Commvault aporta un valor diferencial.
Acompáñenos en este webinar, donde analizaremos:
•Cómo aplicar esta visión para mitigar los riesgos asociados con los ataques cada vez más frecuentes de ransomware
•Qué valor aportamos tanto a aquellos que quieran mover sus cargas a nube pública como a los que están transformando su modelo de IT interna hacia el “As a Service”
•Cómo ayudamos a estar más preparados para el cumplimiento de GDPR gracias a nuestro indexado de contenido y conocimiento detallado del dato corporativo
Today's enterprises need broader access to data for a wider array of use cases to derive more value from data and get to business insights faster. However, it is critical that companies also ensure the proper controls are in place to safeguard data privacy and comply with regulatory requirements.
What does this look like? What are best practices to create a modern, scalable data infrastructure that can support this business challenge?
Zaloni partnered with industry-leading insurance company AIG to implement a data lake to tackle this very problem successfully. During this webcast, AIG's VP of Global Data Platforms, Carlos Matos, and Zaloni CEO, Ben Sharma will share insights from their real-world experience and discuss:
- Best practices for architecture, technology, data management and governance to enable centralized data services
- How to address lineage, data quality and privacy and security, and data lifecycle management
- Strategies for developing an enterprise-wide data lake service for advanced analytics that can bridge the gaps between different lines of business, financial systems and drive shared data insights across the organization
Cyber Security is on everybody’s minds these days. You can’t log in to your favorite web-based news site, it seems, without seeing a warning about ransomware, spear phishing, social engineering attacks or CEO fraud. Attackers have all the time in the world to create very targeted attacks, yet employees have seconds to decide if they will open an email, click on an attachment or even worse, install an “upgrade” supposedly sent by their IT department or software vendor.
Today’s 20/20 panel discussion webcast will focus what you can do to train not only your users, but also your management team about these threats and how they can defend against them.
Banks, credit unions and insurance companies may have differing business models, but they all have a common goal: better conversion and retention rates.
Fortunately, better customer onboarding usually translates to better conversion and retention. For this reason, organizations continue to invest in digital technologies to streamline operations and eliminate time-consuming online interactions in areas such as new account opening, loan origination and policy applications.
Those first information-intensive interactions, of course, are the most critical: you usually only get once chance to win a new customer’s business. But winning is only part of the equation. What if you could win—and wow—customers from those first moments and keep them engaged throughout the onboarding process?
Mark your calendars for this upcoming webinar, where industry experts will share six best practices to help your organization win and wow customers:
• Easy—Enable instant image and data capture via web and mobile technology
• Accurate—Extract data from pictures of physical documents without error-prone manual entry
• Automated—Invest in workflow tools to automate and track completion of process steps
• Visible—Empower staff and customers with process transparency and timely communication
• Consistent—Ensure data is complete and integrated across internal systems
• Efficient—Meet expectations for speed, while effectively managing regulatory risks
Speakers will include:
•Sheryl Kingstone, Director, 451 Research
•Sarah Johnson, Industry Solutions Architect, Kofax
•Jim Marous, Owner and Publisher, Digital Banking Report
The marketing team’s goal is to acquire new customers and grow existing customer spend. To do this, they must have customer data that is relevant, timely and trusted. Data-driven marketers don’t just manage their new marketing applications; they actively manage their data as a strategic asset. And, as with all strategic assets, that means putting in place rigorous systems of governance to define key dimensions and the metrics to control the data that defines them.
In this session, John Donlon, Senior Research Director, at SiriusDecisions discusses a seven-step process required within the marketing department for auditing, cleansing and managing data that is sustainable and delivers tangible results.
Private and public cloud security are logical extensions of securing managed, unmanaged and IoT devices in the physical world. ForeScout security solutions help enhance security and compliance of your virtual assets, regardless of where they are located. In addition, ForeScout’s heterogeneous platform lets you to leverage your on-premises security operations team’s skills and maximize your existing security investments. In this webinar, you’ll learn how ForeScout integrates with third-party solutions to:
• Discover and classify virtual instances (and cloud workloads) and assess their security posture
• Gain consolidated visibility and provide unified policy management across Data Center and cloud environments
• Proactively identify and manage underutilized or shadow VMs
• Allow, deny or segment virtual machines and cloud instances based upon policy compliance
Learn how you can enforce security across your hybrid campus and cloud deployments using one solution. Join us for this live online webinar.
Is your cybersecurity protection making the grade? Healthcare rates a 'C' in security, almost half of US residents have been compromised, and the end-user impact is tens of billions of dollars a year.
An easy first step is understanding the attack vectors and automating HIPAA technical controls. This automation lets you quickly understand your baseline security posture both on-premise and within the public cloud, where you have gaps, and how to remediate them.
Are you considering in earning the Security+ certification from CompTIA? A new version of the Security+ exam debuts this fall - version SYS-501. In this webinar, cybersecurity training provider, CyberVista, dissects the structure of the new Security+ exam. We will explain the 6 Domains that comprise the test while also providing valuable strategies for test day.
Darwinism theorizes that a species must adapt to its environment, or risk extinction. Businesses face a similar dilemma when it comes to middleware: adapt to support today’s new digital transformation technologies or lose out to more evolved competitors.
Big data, the cloud, and the Internet of Things are disrupting the integration space in ways never seen before and legacy technologies such as Enterprise Service Bus (ESB) are holding many organizations back.
Explore possible paths forward with 451 Research Analyst Bill Fellows and Liaison CRO Rob Consoli. In this webinar, Bill and Rob will exposes the weaknesses of legacy middleware in the face of today's integration complexities and illustrate how modern cloud solutions such as Liaison's integration platform will ensure your organization not only survives this age of rapid digital transformation, but thrives!
If you are considering a CASB or email MTA gateway, you should see this video first. Securing Office 365, GSuite, Amazon and every other SaaS and IaaS has never been easier. Protect your data from malware, data leakage and malicious users.
In this webinar, we will describe the next generation Security-as-a-Service platform that makes it easy to protect your data with the industry's highest rated technology for anti-phishing, sandboxing, antivirus, file sanitization, data leak prevention, compliance and more.
About Avanan: Any SaaS | Any Security | One Click
Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry's most trusted security vendors, Avanan offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.
Join LockPath’s Sam Abadir and Harland Clarke’s Joe Filer in this session from Compliance Week 2017, as they discuss how to how to go from managing risk to creating value, including:
• Ways to quantify the business value potential of compliance decisions.
• The difference between metrics and risk-adjusted metrics.
• How to transform a team or department from a necessary cost to a competitive advantage.
On Thursday, 21 September, from 14.00 to 15.30 BST/15.00 to 16.30 CET, Kaspersky Lab will be joined by senior business and IT experts at the Kaspersky CyberSecurity Summit 2017, to debate the top threats facing enterprises – and what they mean for CISOs in terms of incident response, business continuity and risk management. Participants will leave armed with clear, actionable intelligence.
Speakers: Duncan Brown, Associate Vice President, European Security Practice, IDC; Christian Toon, Chief Information Security Officer, Pinsent Masons LLP; Roderick Clayton, EVP and Co-lead, Global Issues and Crisis, Weber Shandwick; Juan Andres Guerrero-Saade, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab; and Alessio Aceti, Head of Enterprise Division, Kaspersky Lab.
The event will be moderated by Geoff White, Television news reporter (BBC and Channel 4 News) and investigative journalist.
The cyberthreat landscape is becoming ever more complex and destructive. Over the last 12 months, attacks targeting enterprises have increased significantly in both number and range – with a measurable impact on operations, revenue, customers and reputation.
In this summit, experts from IT and business will discuss the most dangerous cyberthreats targeting enterprises, how to stay protected even when breached, as well as threat intelligence, incident response, the legal, insurance and communications challenges – and more.
Participants will be able to join in the debate and ask questions. They will leave armed with clear, actionable intelligence.
Recent investigations by FireEye’s Mandiant incident response consultants combined with FireEye iSIGHT Threat Intelligence analysis have given us a more complete picture of a suspected Iranian threat group, that we believe has been operating since at least 2013.
Join us in a live webinar as we discuss this threat group whom we asses to be involved in a long-term, resource intensive cyber espionage operation motivated by the prospect of collecting strategic intelligence, including information related to the aviation and energy industries, which would ultimately benefit a nation-state or military sponsor.
Register today to gain deeper insights into this threat group!
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.
What you will learn:
- What breach response will look like under the GDPR
- What tools and processes a data privacy officer will rely on in case of a breach
- What departments and entities will be involved beyond IT
- What activities are currently happening within organisations to prepare for the GDPR
- What the consequences of the breach could be
As you plan the move to Microsoft Office 365, make sure you have a good handle on the security capabilities you will need to ensure advanced email protection and continuity.
Join Richard Davis, Proofpoint, and Roy Murdoch to hear how you can mitigating security and compliance risks to secure your Office 365 email environment.
Hear how to take advantage of the bottom-line benefits of Office 365 while mitigating security risks with an integrated approach including:
• Superior blocking of advanced threats
• Immediate threat visibility and rapid response
• Greater protection from compliance violations and information loss
• Uninterrupted access to live and historic email
To raise a question to Roy or Richard prior to the event email: O365questions@proofpoint.com
With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.
What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?
Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
- The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
- Managing IT risk and vulnerabilities
- How to improve breach prevention, detection and response
- What to expect in the future
- Igor Baikalov, Chief Scientist, Securonix
- Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
- Sam Abadir, Director of Product Management, LockPath
The public cloud offers undeniable benefits for organizations including agility, cost savings, and competitive advantages. In fact, some enterprises are choosing to abandon their on-premises data centers altogether and go “all-in” with the public cloud. The reality, however, is that most companies are pursuing a “hybrid” approach, using a combination of public cloud, private cloud, and on-premises resources and infrastructure to deliver applications and services to their employees and customers. But how can you efficiently protect all of your workloads against the latest data breach threats and ransomware attacks across such diverse environments and infrastructures? Tune in to our webcast and learn:
•How to discover, secure, and monitor all of your hybrid cloud workloads from a single console
•How to respond to alerts and update policy across your hybrid cloud without hiring an army of experts
•How to manage virtualized and physical on-premises servers protected by Symantec Data Center Security (DSC) agents from the Cloud Workload Protection (CWP) console
When we first had Pete and Bill present on the topic of Forensics, we had feedback from our members that we should bring them back and focus on specific modern technologies. Well, we heard and brought them back. Bill and Pete are going to provide an overview of some of the latest and up and coming technologies being employed by investigators. This seminar will cover topics including: cell phone data recovery and analysis, social media geo-fencing, and artificial intelligence engines that analyze non-structured data (photos, video, etc...). We will also discuss how data locations are shifting towards cloud based applications and how investigators are finding and making use of this information.
The journey to cloud is an evolution not a revolution Data management issues get amplified in the cloud because of a complex landscape across cloud and on-premise applications. When you are moving data around, data security, data governance and data quality should be a top priority. Join Joe McKendrick from Forbes and Anthony Smith, Head of Technology Solutions at JLL to discover:
•How to get the architecture right and understand what data goes to cloud and what stays on-premises, and what data management brings to the table around data quality, data security, and data governance.
•Best practices on embracing both cloud and on-premises to scale flexibly and innovate faster to meet with accessible, secure and relevant data
•How JLL is embracing both cloud and on-premise worlds for flexibility and faster development of best of breed solutions irrespective of where they are hosted. Hybrid is about digital innovations at JLL helping us scale flexibly and innovate faster to meet our customers’ needs with innovative solutions.
Organizations have spent massive amounts of money to protect the perimeter of their networks, but if your business exists on the internet, there really is no perimeter. In this presentation, we'll discuss Digital Footprints in understanding your company’s external attack surface. We will discuss social, mobile, web attacks and analyze and review lessons learned recently publicized attacks (Polish banking institutions, Apache Struts Vulnerability or WannaCry ransomware. The speed of business and cybercrime isn't slowing down, so how can you be prepared to address and defend against these types of threats? Attend our session to find out how.
Reducing Your Digital Attack Surface and Mitigating External Threats - What, Why, How:
What is a Digital Footprint?
Breakdown of External Threats (Social, Mobile, Web)
What are blended attacks?
What is actually being targeting at your company?
How are your brands, customers, and employees being attack outside of your company?
How to become proactive in threat monitoring on the internet?
Considerations in External Threat solutions
Threat correspondence tracking considerations
Is legal cease and desist letters adequate in stopping attacks?
Examination of a phishing attack campaign
How phishing kits work
Analysis and lesson learned from recent published attacks
What are the most important capability in a digital risk monitoring solution?
Real estate developers, owners and tenants are rethinking the office building experience. Not only are buildings becoming increasingly efficient in in-door energy management and operations, they are also beginning to interact with the people who work within the walls, and with the out of doors environment.
This type of sentient building design is making use of increased connectivity to and in buildings, as well as the use of sensors and IoT applications. This webcast will discuss communications and connectivity infrastructure that is being deployed in and to current real estate developments; what buiding owners, operators and tenants expect; the impact smart community development is having on smart buildings; and sample smart building IoT applications.
Yann Palmore, Vice President, Smart Building Solutions, JLL
Ray Moya, COO/CTO, Argent Associates, Inc.
>> Yann Palmore helps CRE investors, owners, and operators understand how to rethink building system infrastructure to support Internet of Things (IoT) technologies and drive smart building strategies. Yann’s key responsibilities are to guide clients through a structured process that prioritizes program goals, defines specific smart building strategies, specifies appropriate technologies, and oversees program implementation.
>> Ray Moya has over 25 years of network engineering and organizational management experience. His specializations include, wireline and wireless voice and data networks, network security, software development, and finance. He has designed, engineered and installed hundreds of Fortune 500 Company and Government networks. He leads network-consulting teams in LAN/WAN, software development, wireless technologies, and Network security.
For more about the speakers, please visit: http://www.tiaonline.org/webcast-iot-and-smart-buildings-new-construct
The clock is ticking until MiFID II is implemented. January 3rd 2018 is just over 100 days away. How confident are you that your business can comply with the new record-keeping requirements?
We're working with our customers to help ensure they will meet their MiFID II recording requirements. In this webinar we will share practical advice on how you can be ready on time.
We will discuss:
•Market insight into where businesses are in their MiFID II journey
•What to do about data storage post MiFID II
•Planning to grow despite more compliance
•How to tackle the increased record keeping requirements
The session will be hosted by:
Vicky Ryder – Microsoft Practice Lead
Andrew Fawcett – MiFID II Product Manager
Senior compliance and IT professionals in businesses impacted by MiFID II.
•Sales cycles dragging on?
•Not getting in front of enough on-profile prospects?
•Frustrated by prospects haggling on price?
•Tired of hearing the same old excuses from your sales team?
If you manage sales people, and any of these types of challenges resonate with you, then sign up for this webinar.
•Learn the importance of having a system for selling, and coaching your people to stick to it.
•Find out why selling features, advantages, and benefits wastes everyone's time.
•Discover how closing for a decision, YES or NO, can improve your sales teams effectiveness and efficiency.
Like many other attacks, the high-profile cyberattacks this year (Wannacrry, NotPetya) have exploited vulnerabilities for which patches and updates already existed.
Register for this short webinar for an overview on the biggest attacks of the year and learn more about how Symantec Patch Management provides visibility and compliance across today’s heterogenous environments to protect against similar attacks in the future.
GDPR is only one year away. The major reform in data protection and breach notification will require smart preparation for the changes to avoid possible penalties. This webinar will help you prepare for and understand the scope of the changes in these impending regulations.
Hear from cyber security experts Ted Julian and Larry Ponemon, as well as privacy expert Gant Redmon, who will look ahead to the EU’s General Data Protection Regulation (GDPR). During the webinar, you’ll learn:
• What you can do to best prepare your organization in the next 12 months to address these new obligations and avoid stiff penalties
• How IBM Resilient can help your business comply with GDPR obligations
• How the Resilient IR Platform orchestrates and prescribes a data breach response in compliance with specific regulations
• Ted Julian, VP of Product Management, IBM Resilient
• Gant Redmon, Program Director, Data Governance, and Risk, IBM Security
• Dr. Larry Ponemon, Founder & Chairman, the Ponemon Institute
• Moderator: Maria Battaglia, CMO, IBM Resilient
Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?
Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
•Securing blockchain from the edge to the core
•The operational benefits and pitfalls of blockchain technology
•Our 4 step qualification process for blockchain business opportunities:
1.Is there an established business process?
2.Are there more 3 parties involved – i.e. is it a distributed problem?
3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
4.Would automation improve the performance of the process?
The public cloud is a critical asset for enabling business agility, but the new rapid pace of cloud deployments cannot come at the expense of security. In a time when risks are regularly introduced through the diffusion of ownership of the cloud, security teams need to develop ways to identify the risks introduced to their network, understand how to measure those risks, and devise and employ risk mitigation strategies.
This Tufin-hosted webinar will feature Maurice Stabila, CISO of Harmon International, a Fortune 500 company. Maurice is an award-winning, published, and internationally renowned leader in IT security. Attendees of this webinar will gain a better understanding of what risks are persistent in the public cloud, how your organization can measure cloud-specific risk, and gain exposure to some techniques for successfully managing cloud risk.
Join us to hear an industry expert’s approach to solving these new security problems.
SentinelOne recently released a report with De Montfort University to examines the differing levels of sophistication on the part of the attackers and trends and tactics use to commission a payment from organizations.
Join this session as we discuss the common trends highlighted in the report including:
- Time criticality and deadline sensitivity
- Consequences for not paying or missing the demand
- The Customer Service Approach on how to pay the ransom
- The use of a variety of imagery
- Preferred mechanism for payment
About the presenter:
Jeremiah’s InfoSec career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry’s biggest names. At SentinelOne, Jeremiah is responsible for designing effective defense strategies against ever-evolving attacks including ransomware. Prior to joining, Jeremiah was the Founder & CEO of WhiteHat Security, specializing in website risk management.
Antivirus (AV) protection has been the foundation for endpoint security for decades despite its known gaps. To address evolving threats, organizations need an integrated endpoint solution that can fortify their defenses.
On September 26, Jim Waggoner, Sr. Director, Product Management for FireEye will detail:
•Why endpoint security products have not provided complete protection
•Capabilities required for a comprehensive endpoint protection solution
oAV with threat intelligence
oDetection and response
oBehavior and exploit analysis
oVisibility and automation
•How the latest FireEye Endpoint Security solution enables you to go from detection to investigation and remediation quickly, all with a single agent
Attend this webinar as the first step toward a smarter, more adaptive approach to endpoint security.
The new release of the TIA-942-B has many great improvements. Other webinars have addressed the changes to the network chapters. But what about all the other important chapters? This webinar will address changes made to the Rating (a.k.a. Tier) system as well as other non-network related changes. This webinar will cover the important updates critical to those who design, build, and own/operate data centers.
The speaker, Edward van Leent, Chairman & CEO of EPI Group of Companies, is a long-standing TIA-942 committee member and active contributor. He is a highly experienced data center veteran with over 30 years of experience and has personally audited and overseen the audits of hundreds of data centers all over the world.
One of the most frustrating threat innovations of the last decade has been ‘ransomware’ malware. Initially considered just a consumer threat, financial, government and commercial enterprise networks can now be listed among its victims. Our security experts examine the technical and business threats that ransomware continues to pose to organizations for which IT security teams must be prepared to address and overcome.
During the session, Carl Leonard and Neil Addleton will discuss the latest on WannaCry, Petya, Jaff and Cradlecore as well as examining the concept of “have-a-go” cybercrime. Highlights include:
- Which ransomware should you defend against?
- Should you pay the ransom?
- What can you do to protect your data and network? (research-based)
- How is your organization using the Cloud in a risky way, putting your data more at risk?
In Philip K. Dick's 1956 "The Minority Report," murder ceased to occur due to the work of the "Precrime Division," that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed.
In this webcast, we will examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Security Operations Centers, or SOCs, were invented to enable ease of collaboration among security personnel across different technologies and location, providing a full view of an attack. Most traditional SOC practices and tools, where established in a time when cyberattacks were primarily manual in nature. Nowadays, machine-based automated cyberattacks, with multi-steps approach leveraging variety of entry points are the norm and are challenging enterprises to ‘re-think’ their SOC and InfoSec team’s strategy.
Join Matt Mellen from our PMM team, and Rinki Sethi, who leads our InfoSec team, for an educational webinar on defining and building your Next-Generation SOC, sharing insights and providing best practice from our own experiences.
Join this information session to understand:
•Why traditional SOCs fail.
•What defines a Next-Gen SOC.
•How to shift in focus from detection to prevention
•The business value of building a Next-Gen SOC in your organization.
How to make sure a CISO's work isn't dumped when they leave.
A CISO's departure can leave a company vulnerable and its security posture at risk. Having a plan to manage a CISO succession is critical to business continuity. In this webinar, outgoing Imperva CISO Shahar Ben-Hador and his successor Bo Kim provide key steps to successful succession planning, including:
* Building a transition timeline
* Evaluating which projects should be completed and which handed off
* Determining where to draw the line on investments
About the Speakers:
Shahar Ben-Hador, CISO, Imperva
As the CISO of Imperva (NASDAQ: IMPV) Shahar's team was responsible for Cyber Security and Compliance of the enterprise footprint and Cloud Operations activities for Imperva and Incapsula SaaS product lines.
Bo Kim, Sr. Dir. Information Security, Imperva
Bo’s team is responsible for developing and maintaining Imperva’s security posture. He is assuming responsibility from Shahar for cybersecurity and compliance.
IT environments have gotten markedly faster, helped by technologies such as public and private clouds, and automation tools. As a result, maintaining compliance with regulations such as PCI, HIPAA, SOC2, etc has become much more difficult if you continue to use old-style compliance thinking and tools. In this webinar, you’ll learn the friction points caused by old tools and the new best practices that will allow you to maintain compliance in any environment, no matter how fast-paced.
There seems to be no shortage of threats these days with attackers constantly innovating and combining different techniques with classic malware. New ransomware variants, targeted espionage campaigns, and attacks that don’t use malware at all are just a few threats that put your organization at risk. As each new attack generates global headlines, it can feel a bit overwhelming.
It’s increasingly clear that the signature-based approach of traditional antivirus (AV) can no longer provide the protection needed to keep attackers off your endpoints. Join John Collins, SecureWorks Counter Threat Unit Principal Architect and Mike Viscuso, Carbon Black CTO, as they discuss how managed Next-Generation Antivirus (NGAV) goes beyond malware prevention to ensure that organizations of all sizes stay out of the security headlines and one step ahead of emerging cyber threats.
You will learn:
• What are the indicators that I need NGAV?
• How do I know when it is time to make the move from traditional AV to NGAV?
• Why is managed NGAV better able to address Ransomware, PowerShell and WMI threats?
• What managed NGAV can do for you
Cloud apps such as Dropbox, Box, Salesforce, Office 365 and Google Apps enhance productivity and collaboration between teams, but IT professionals have difficulty taking away access to these apps once users start relying on them. Taking them away is not the solution; instead, you should understand how to leverage the cloud’s operational benefits and cost advantages while simultaneously providing your IT team with visibility into cloud app usage.
Using CASB (Cloud Access Security Broker) technology, organizations gain visibility into cloud app usage, identify high-risk activities and enforce policy and controls for cloud apps to prevent account-centric threats, meet compliance requirements and protect data.
Join Shan Zhou, Sr. Director of CASB Engineering at Forcepoint, for an overview on CASB and as he addresses:
• What are the gaps in cloud app security and how does CASB address them?
• How do you identify the risky applications your employees are using?
• What are the key CASB features to consider when implementing it into your environment?
The goal of higher education is “to create prepared minds”. But recently, universities and colleges are finding that they have to defend themselves from cyber-attacks that put everything at risk— their brand, reputation, and intellectual property.
The ability to respond quickly and effectively is incredibly important, especially for higher education organizations that need to protect a huge amount of confidential data which ranges from proprietary research projects to personally identifiable information. Adding to the complexity is the fact that many end users are accessing networks with personally owned devices, which are not managed by the IT/security teams.
How prepared is your team to prevent detect and respond to these cyber threats?
In this webcast you will hear from Tim Gallo, a sales engineer on the Cyber Security Services team, who works with organizations to strengthen their cyber defense.
Register for this webcast to:
• Hear about the threats and challenges facing higher education
• Learn about the stages of the attack lifecycle and how to prepare for each stage
• Understand how to increase your resiliency and train your team
• Discover how to optimize your cyber security operations with expertise and threat intelligence
Organizations face increasing volumes of network data across their expanding physical, virtual and cloud networks. At the same time, dangerous malware, data breaches and ransomware continue to successfully penetrate their networks. Yet, network security, monitoring and analysis tools are overloaded, Security Operations teams are understaffed and overwhelmed and incident response is becoming more cumbersome and time-consuming.
Learn how Gigamon, the industry leader in network visibility solutions, can help you optimize incident response and effectively secure your organization’s network using your existing security and monitoring tools.
Today’s technology decisions require “next-level” business case justification. Forrester’s Total Economic Impact™ framework identifies all factors that affect a significant technology investment decision. For this commissioned study, Forrester Consulting recently examined inputs from a Forcepoint Web Security Cloud and Email Security Cloud client to determine the benefits, costs, flexibility and risks. The results are notable.
This webcast outlines a three-year impact, including:
• 122% ROI
• $895,000 benefits
• $492,000 NPV
• 6 month payback
Join this webcast to understand the framework and how Forcepoint delivers value.
Data security is a never-ending battle to keep up with the latest regulations and protect intellectual property from targeted attacks and accidental exposure—all while adapting to evolving IT environments of cloud applications. Understandably, most enterprises want to meet their compliance demands and data protection needs with integrated, built-in DLP features that come with cloud applications like Office 365. Most take the seemingly logical approach to chase the data in your Office 365, other cloud apps and IT systems—find it, catalogue it, control it. But this ignores the biggest threat to data security—your people. By ignoring how your people interact with the data, who touches it and who has access to it, data protection teams limit their perspective to IT systems and don’t actually reduce the risk of data loss. Data security shouldn’t start and stop with the data. By focusing on your people and how they interact with the data, data security teams can deliver actual data protection that eases the burden of compliance, identifies risk based on user behavior and stops data loss by applying the appropriate control based on user risk and sensitivity of the data.
We live in a zero-perimeter world, transformed by cloud, remote workers and BYOD. Your sensitive and proprietary data is now everywhere. As a result, security teams are playing catch-up and relying on point product-based technology solutions. Not only do these products create overwhelming amounts of alert noise, but they also neglect to focus on your most important line of defense – your people. This webcast will explore how User and Entity Behavior Analytics (UEBA) enables security teams to proactively protect your data by identifying high risk behavior inside the enterprise. Effectively integrated UEBA provides unparalleled context into your people by fusing structured and unstructured data to identify and disrupt malicious, compromised and negligent users. Join this webcast to learn:
•What data sources to integrate for visibility into human risk
•How to Identify and prioritize high risk users and critical data
•How to Investigate and act to reduce risk and protect data