Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Fast and Effective IT Security Analytics Use Cases Fast and Effective IT Security Analytics Use Cases Mike Paquette, VP Products Prelert Recorded: Jul 26 2016 53 mins
    Security professiona​​ls realize that analytics are becoming an increasingly important part of the IT Security technology arsenal. However, most security analytics solutions are complex, requiring the movement of data to the analytics platform, custom use case development involving professional services, and sometimes weeks of personnel and model training before useful results can be obtained. In this webinar, see how security use cases can be quickly and effectively deployed using analytics recipes pulled from Prelert’s “Hot Sheet” security use case library. This webinar will highlight examples of the use cases being deployed in an Elasticsearch environment.
  • CEO Fraud and the $2.3 Billion Mistake You Can’t Afford to Make CEO Fraud and the $2.3 Billion Mistake You Can’t Afford to Make Randy Luskey, Stu Sjouwerman, Dr. Christopher Pierson, Sam Masiello Recorded: Jul 26 2016 109 mins
    The FBI just issued a warning about a “dramatic” increase in CEO Email Scams. The Bureau estimates these scams have cost businesses more than $2.3 Billion in losses over the past three years. No matter how extensive your Security Awareness Training Program is, your company is vulnerable to these attacks. Employees are quick to act when a financial request comes from the CEO. What protocols do you have in place to make sure your team knows when an email is really coming from the C-Level? Join our panel to learn how to avoid falling victim to these phishing scams.
  • Fidye Yazılıma HAYIR! Fidye Yazılıma HAYIR! Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü Recorded: Jul 26 2016 63 mins
    Trend Micro Akdeniz Ülkeleri Kanal Müdürü Mehmet Dağdevirentürk, kendinizi ve firmanızı fidye yazılımlara karşı nasıl koruyacağınızı ve fidye yazılımlarla ilgili son gelişmelerin neler olduğunu sizlerle paylaşıyor. Fidye yazılıma karşı savunmanın sihirli bir formulü yok, ancak en yaygın saldırı yöntemlerini bilmeniz, en iyi korumayı sağlamak için atacağınız öncelikli adımları bilmenizi sağlar. Bu webinarda Trend Micro olarak sizlerle tecrübelerimizi paylaşarak karşılaşabileceğiniz olası risklere karşı planınızı şimdiden oluşturmanız için bir yol haritası sunuyoruz.
  • Using Predictive Analytics to optimize Application operations: Can you dig it? Using Predictive Analytics to optimize Application operations: Can you dig it? Lesley-Anne Wilson, Group Product Rollout & Support Engineer, Digicel Group Recorded: Jul 22 2016 23 mins
    Many studies have been done on the benefits of Predictive Analytics on customer engagement in order to change customer behaviour. However, the side less romanticized is the benefit to IT operations as it is sometimes difficult to turn the focus from direct revenue impacting gain to the more indirect revenue gains that can come from optimization and pro-active issue resolution.

    I will be speaking, from an application operations engineers perspective, on the benefits to the business of using Predictive Analytics to optimize applications.
  • The Foundation of Data Quality The Foundation of Data Quality Charlie Piper - CEO and Dan Ortega - VP of Marketing Recorded: Jul 22 2016 5 mins
    Blazent's CEO, Charlie Piper and Dan Ortega introduce the company strategy, vision and it's value to customer's and MSP partners. Together, Charlie and Dan describe how Blazent's platform finds the the most accurate data to improve decision manking in IT and beyond.
  • Ransomware - an Educated Response Ransomware - an Educated Response Stu Sjouwerman, Founder and CEO of KnowBe4 Recorded: Jul 21 2016 12 mins
    Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
  • Security in the Boardroom Series: Earning and Using Your Seat at the Table Security in the Boardroom Series: Earning and Using Your Seat at the Table Ashley Ferguson, Director, SecureWorks Governance, Risk & Compliance Recorded: Jul 21 2016 60 mins
    This webinar will provide tips for successfully navigating the expanding role of the Chief Information Security Officer as an essential business leader. Explore leading practices for managing cybersecurity risk as a people, process and IT leader. Get tips for building a working relationship with other executive stakeholders in audit, compliance and enterprise risk. And hear how other CISOs are establishing more productive reporting relationships with the board of directors. Whether you’d like to expand your role as a risk and security professional, gain more executive support for key initiatives, or improve your relationship with the board, you’ll take away actionable insights to apply to your own journey as an essential business leader.
  • The Agile Supply Chain: API-led Connectivity and B2B/EDI The Agile Supply Chain: API-led Connectivity and B2B/EDI Kent Brown, CTO, ModusBox David Chao, Industry Marketing, MuleSoft Recorded: Jul 21 2016 46 mins
    Today's supply chains are faced with an increasing number of distribution channels, a broader set of suppliers and ever decreasing product cycles. A new approach is required that delivers a step change in agility. MuleSoft's API-led approach delivers up to 200% faster development cycles through leveraging re-usable assets. Join us for a walkthrough of this approach, including a demo of Anypoint Platform and Anypoint B2B.
  • Briefings Part 1: Anatomy of a Ransomware Attack Briefings Part 1: Anatomy of a Ransomware Attack Barry Shteiman, Director, Threat Research, Exabeam; Brandon Dunlap, Brightfly Recorded: Jul 21 2016 60 mins
    Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
  • Effective Monitoring and Defense in Financial Services Effective Monitoring and Defense in Financial Services Dave Hoelzer (SANS) and Lawrence Chin (Palo Alto Networks) Recorded: Jul 21 2016 47 mins
    Cybersecurity Webcast co-hosted by SANS and Palo Alto Networks

    In financial institutions, investments in cybersecurity may occur in fits and starts due to actual incidents, media coverage, or perceived risk. This presents challenges in maintaining a consistent security posture, especially as the threats and the attack surfaces evolve continuously.

    In this webcast you will learn about the value of constant monitoring and awareness of your network traffic, the role and relevance of anomalies, and the benefits of an overall security architecture for financial institutions.
  • Is IT feeling the heat? Try iland’s cool summer console release Is IT feeling the heat? Try iland’s cool summer console release Jeff Polczynski, Solutions Architect at iland and Lilac Schoenbeck, VP Product Management & Marketing at iland Recorded: Jul 21 2016 60 mins
    It may be summer, but IT never takes a vacation. As business projects slow, IT takes advantage of the downtime to shore up the infrastructure and overhaul systems. With all eyes on technology these days, everything from security breaches to system outages get outsized attention. It’s a lot to contend with.

    While any old cloud can provide a bit of shade, the iland cloud can do more. Our purpose built – and consistently enhanced – iland cloud console provides a welcome reprieve from the pain of managing cloud workloads, ensuring their security – and even answer questions from the executive suite.

    Join a webinar from our product experts, showing how the iland cloud console integrates:
    - A full complement of proactive security technologies
    - Tools to provision and manage VMs, vApps, network and more
    - 12 months of performance and capacity data
    - On-demand reporting for your executives and auditors
    - A host of “bonus features” to make your life easier

    Join this webinar to see how the iland cloud, with it’s innovative console, does more than outsource infrastructure. We’ll pour you a tall glass of virtual ice water, turn on the A/C, and make sure that your cloud operation is cool as a cucumber.
  • Up and Running in AWS, Now What About Security? Up and Running in AWS, Now What About Security? Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Jul 21 2016 54 mins
    For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.

    Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Tradition is out: where traditional security does and doesn’t fit
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • The Digital Boardroom in the Public Sector The Digital Boardroom in the Public Sector MyXa Elgstedt Recorded: Jul 21 2016 32 mins
    In 2010, a proposal was put to the UK Government to transform the delivery of its public services to be ‘digital by default’. But achieving a paperless public sector takes real organisational change. It has to start from the top: senior-level internal processes and business structures can be enhanced and improved by a digital approach, moving away from long-held paper-based systems. It just isn’t feasible to deliver public-facing services digitally and still retain old systems internally.

    Electronic board portals can drastically transform the way board, trustee and committee meeting materials are produced and consumed. Hundreds of public sector organisations around the world have kicked paper packs and emailed PDFs to the curb and made the lives of both administrators and directors much easier and more productive.

    Join us for a 30 minute webinar to learn more about switching to a digital board portal can:
    • Facilitate better communication and collaboration among board members
    • Save administrative time and reduce production costs
    • Upgrade the security of your most sensitive data
    • Make good governance easier
  • What makes a Next Gen SOC? What makes a Next Gen SOC? Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec Recorded: Jul 21 2016 52 mins
    As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.

    In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.

    Join our upcoming webinar and learn about:

    - Core requirements for a Next Gen SOC
    o Flexible Log Collection
    o Big Data Processing
    o Advanced Analytics
    o Real-Time Intelligence
    - SOC-centric services: Incident Response and Advanced Intelligence
    - SOC operating models – Building your own SOC, Operating Models & Extending Services
    - Developing the next generation of security professionals
  • Financial Services & GDPR – The Path to Compliance Financial Services & GDPR – The Path to Compliance Andrew Joss, Financial Services Industry Consultant Recorded: Jul 20 2016 58 mins
    An industry no stranger to compliance and regulation, Financial Services organisations face one of their biggest challenges yet as they consider how to tackle Europe’s newest data initiative GDPR (General Data Protection Regulation). Failure to comply will not only result in hefty fines never before seen in the industry – but presence in national headlines for all the wrong reasons.

    2018, when the legislation comes into law, may seem far off just now – however the complexity of the GDPR data challenge makes this a major business imperative which requires a plan in place for full compliance now.

    Join us on this webinar to learn:

    1.What GDPR actually is, and what it means to you and your organisation

    2.The Data Privacy Challenges GDPR creates, and the repercussions if you fail to meet them

    3.Key software approaches which address GDPR Challenges, and helps you get your customer data under control
  • Bringing Shadow Devices into the Light Bringing Shadow Devices into the Light Mike Rothman, Securosis Analyst and President Recorded: Jul 19 2016 48 mins
    Shadow Devices and Cybersecurity

    Along with the burgeoning Internet of Things comes a new reality: billions of invisible devices connected to private networks. These “shadow devices” enlarge your attack surface and, if left in the dark, expose your organization to malware propagation and theft of critical resources.

    In this webinar, Mr. Rothman defines the classes of shadow devices—everything from sensors to medical devices to industrial control systems—and discusses how to gain visibility and control of these potentially dangerous endpoints. In addition, he’ll talk about next-generation access control and the strategies and technologies that reveal shadow devices through:

    • Visibility and risk profiling
    • Controls to protect vulnerable agentless devices
    • Automation and integration of existing security technologies

    --

    Mike Rothman, Analyst & President, Securosis, Inc. started his career as a programmer and a networking consultant. Today, he specializes in protecting networks and endpoints, security management, and compliance, or what he calls “the sexy aspects of security.” Mike is one of the most sought-after speakers and commentators in the security field and, after 20 years in the business, he’s one of the guys who “knows where the bodies are buried.”
  • The Rise of Threat Actor Groups: What You Need to Know The Rise of Threat Actor Groups: What You Need to Know Christopher Ahlberg, CEO of Recorded Future, and Teresa Shea, Director of Cyber Reboot at In-Q-Tel Recorded: Jul 19 2016 62 mins
    As we’ve seen targeted threats increase in recent years, we’ve also witnessed the rise of the threat actor group. Not a lone hacker, but a team of individuals with a specific mission to compromise technology. Whether these groups are focused on compromising and leaking information, stealing financial data, or hacktivists driven to disrupt service or deface websites, what they have in common is the willingness to pursue and attack very specific targets often using unique or brand new TTPs.

    In this “virtual fireside chat,” Recorded Future Chief Executive Officer Christopher Ahlberg will be joined by Teresa Shea, director of cyber reboot at In-Q-Tel, to discuss how the actions of threat actor groups bear direct relevance to any organization's cyber security strategy.

    Their discussion will focus on the following questions:

    • Should companies research threat actors? Or just harden their defenses?
    • What types of threat actors should companies be aware of?
    • Is cyber terrorism a real threat?
    • Does attribution of actors matter for businesses rather than just government agencies?
    • How will the landscape change over the next five to ten years, and which countries are on the rise?
  • Why do you need 24X7 SOC at your service Why do you need 24X7 SOC at your service New Corporate Video Recorded: Jul 19 2016 4 mins
    Watch this 4-min video to better understand what is MDR (Managed Detection and Response), and how AWN CyberSOC delivers vigilant cybersecurity through 24X7 monitoring, cloud-based SIEM and customer-dedicated security engineers.
  • Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention Michael Moshiri | Director, Advanced Endpoint Protection at Palo Alto Networks Recorded: Jul 19 2016 61 mins
    Your endpoint security should easily prevent known threats. But can it also prevent unknown threats from compromising your environment? More importantly, can it automate this prevention so you don’t have to assign scarce resource to investigate alerts?

    In this webinar, you’ll discover a revolutionary approach to defeating zero-day exploits. We’ll examine current approaches to exploit prevention, discuss the top 10 zero-day exploits of 2015, and analyze unknown threats on the day they became known.

    You’ll learn:
    •How to future-proof your endpoint security to protect your users from unknown threats
    •Why other approaches to endpoint protection cannot prevent zero-day exploits
    •Which applications were targeted by the top 10 zero-day exploits discovered in 2015
    •How to automate threat prevention through a natively-integrated, next-generation security platform
  • Overcoming Ransomware (Editorial webinar by SC Magazine) Overcoming Ransomware (Editorial webinar by SC Magazine) Brian NeSmith, Arctic Wolf Networks CEO and Co-founder Recorded: Jul 19 2016 33 mins
    Ransomware is hardly new, but it’s evolved into a very dangerous trend. Hosted by SC Magazine, this editorial webinar invited Brian NeSmith, CEO from Arctic Wolf for a Q&A style conversation about:

    - Why traditional backup strategies fail
    - 5 Things IT should do if exposed
    - Latest technologies for email security
  • Briefings Part 2: Integrate Data Security with Your Big Data Platform Briefings Part 2: Integrate Data Security with Your Big Data Platform Praveen Jain, Systems Engineer, Partner Engineering, HPE Big Data Platform - Vertica: Reiner Kappenberger, Global Prod Mgmt, Recorded: Jul 19 2016 59 mins
    A global telecoms company ingests 300 million customer records in < 1.5 minutes today. A mid-size firm handles 3.7 billion transactions annually. With Big Data analytics at the heart of all these systems-driving transformation, innovation and new customer insights-these projects include massive quantities of sensitive data that flow across multiple systems. Adding to the complexity of securing your data, these systems are spread across multiple data centers, on premise, and in the cloud. Join HPe Security - Data Security and (ISC)2 on July 19, 2016 at 1:00PM Eastern to understand how enterprises can leverage end-to-end data-centric protection in conjunction with their Big Data systems and view a technical deep dive into how enterprises can gain Big Data Insights - without the risk.
  • WhiteHat Security's 2016 Web Applications Security Stats Report Explained WhiteHat Security's 2016 Web Applications Security Stats Report Explained Ryan O'Leary, VP Threat Research Center & Technical Support, and Tamir Hardof, CMO, WhiteHat Security Recorded: Jul 19 2016 50 mins
    In this insightful and data-rich one-hour webinar Ryan O'Leary, Vice President of WhiteHat Security's Threat Research Center and Technical Support, and Tamir Hardof, Chief Marketing Officer, will present findings from our 2016 Web Applications Security Statistics Report.

    The Report, compiled using data collected from tens of thousands of websites, reveals that on average the majority of web applications exhibit two or more serious vulnerabilities per application for every industry at any given point in time. We will provide unique perspectives on the state of website security. Data by industry will be presented and accompanied by expert analysis and recommendations.


    Why Attend

    - Learn which industries declined, improved, or greatly improved their remediation rates
    - Learn how many vulnerabilities are typically remediated and the average time to resolve
    - Learn why knowing your risk rating can help you prioritize which vulns to fix first
    - Discover the 3 most common web application vulnerabilities
  • What Going Digital Really Means to IT What Going Digital Really Means to IT Bill Briggs, CTO, Deloitte Consulting LLP Ross Mason, Founder and VP of Product Strategy, MuleSoft Recorded: Jul 19 2016 64 mins
    Almost everyone is undergoing digital transformation, but not everyone knows the right way to do it. In a recent MuleSoft survey, 96 percent of respondents are executing on digital transformation initiatives or planning to do so in the near future. However, the results also showed that just 18 percent of IT decision makers are confident that they will succeed in meeting this year’s digital transformation goals. To do this effectively, IT teams need different skill sets, tools, and more importantly, different mindsets. Join Bill Briggs, CTO at Deloitte, and Ross Mason, Founder and VP of Product Strategy at MuleSoft, to learn how IT can grow beyond “business as usual".
  • Transaction Monitoring Model Basics: Management, Selection and Security Transaction Monitoring Model Basics: Management, Selection and Security Robert Colatarci, Peter D. Wild, Rebecca Schauer Robertson, and Shannon Cox Recorded: Jul 19 2016 58 mins
    Join Experis Finance for a complimentary, virtual panel webinar focused on whether or not your AML models for transaction monitoring perform according to regulatory expectations.

    Regulatory guidance requires independent validation of models used for risk management purposes, including AML systems. Greater emphasis is being placed on institutions to identify suspicious activity and ensure that the models used are effective. This panel, which includes both community bank and large bank perspectives, will discuss the independent validation of transaction monitoring systems, examples of typical validation findings, and the development of an action plan to address the results of a validation.

    After attending this webinar,

    •You will begin to understand the necessary components of Data Management as it relates to the set-up of Transaction Monitoring Systems
    •You will understand the current rules-based systems, the newer behavioral-based systems, and how they work
    •You will understand the basics of how to select a new transaction monitoring system
    •You will understand the next generation of Cyber Threats and how they differ from traditional attacks

    Presenters include:
    - Robert Colatarci, Senior Manager, Financial Institution Services, Experis Finance
    - Peter D. Wild, Internal Audit Partner, Wild AML Services
    - Rebecca Schauer Robertson, Sr. Vice President - Director of AML Compliance, South State Bank
    - Shannon Cox, Sr. Vice President - Enterprise BSA Officer, First National Bank of Santa Fe
  • Ransomware: The Darker Side of Bitcoin Ransomware: The Darker Side of Bitcoin JP Vergne (Scotiabank Lab, Ivey B-School), Alexander Hinchliffe (Palo Alto), Samee Zafar (Edgar Dunn) Mark Lavender (BT) Jul 27 2016 4:00 pm UTC 60 mins
    Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.

    However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
    Join this panel of industry-leading speakers, who'll be discussing the following:

    -Why has Bitcoin-related ransomware become more popular in recent years?

    -How can you prevent a Ransomware outbreak in your organisation?

    -Is it possible to catch and subsequently prosecute blockchain criminals?

    -How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?
  • Virtualization Unwrapped – How to Scale While Remaining Secure Virtualization Unwrapped – How to Scale While Remaining Secure Chris Olive, Vormetric & Adam Sekora, SimpliVity Jul 27 2016 5:00 pm UTC 60 mins
    There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/compliance issues. Join us for the insightful webcast where we will show how many organizations are tackling these concerns faster and easier than they thought possible. Come away from the webcast with your action plan on how you can start or continue your journey to the cloud without the challenges that may have been holding you back.
  • Webcast:  Mid-Year Threat Review Webcast: Mid-Year Threat Review Stephen Cobb, Senior Security Researcher, ESET Jul 27 2016 5:00 pm UTC 60 mins
    ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
    •Ransomware
    •Regulatory risk
    •PoS malware
    •PCI and two-factor authentication
    •PUAs and scamware
    •IoT vulnerabilities
    •Privacy by design
    •General Data Protection Regulation (GDPR)
  • Do You Really Know Your Users? How Security Analytics Can Detect User Threats Do You Really Know Your Users? How Security Analytics Can Detect User Threats David Gorton, Senior Product Manager, LogRhythm & Mark Settle Product Marketing Manager, LogRhythm Jul 27 2016 6:00 pm UTC 60 mins
    As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.

    If you’re focused on addressing user threats, User Behavior Analytics (UBA) can be a powerful tool in your kit. In this webcast David Gorton and Mark Settle from LogRhythm, discuss the elements of an effective user threat detection program. You’ll learn:

    - Why detecting user threats is so important—and so difficult
    - Different approaches to UBA
    - The value of data from across your enterprise
    - How to maximize the efficiency of your security analysts

    Watch the webcast to learn how UBA can help you discover hidden user threats, reduce false-positives, and properly prioritize the most concerning threats.
  • Driving Higher Performance in Online Gaming Applications Driving Higher Performance in Online Gaming Applications Paul Garstang and Steve Holyer, Informatica Data Security Consultants Jul 28 2016 10:00 am UTC 60 mins
    As online gaming applications become more sophisticated and consumer transactions continue to sky rocket, our customers are finding that data volumes are also spiraling and that all too often customer experience is going in the opposite direction as performance levels start to drop off.

    Join us on this webinar to find out how Informatica has already helped a number of online gaming organization's tackle this problem.
  • Their Cloud. Your Data. The Global State of Cloud Data Security Their Cloud. Your Data. The Global State of Cloud Data Security Dr. Larry Ponemon Chairman & Founder The Ponemon Institute, Joe Pindar Director of Strategy, CTO Office Gemalto Jul 28 2016 2:00 pm UTC 45 mins
    This webinar will discuss the recent findings of a global cloud data security study conducted by the Ponemon Institute on behalf of Gemalto. The study surveyed 3,476 IT and IT security professionals in the United States, United Kingdom, Australia, Germany, France, Japan, Russian Federation, India and Brazil about the governance policies and security practices their organizations have in place to secure data in cloud environments. The findings will reveal adoption trends for IaaS, PaaS and SaaS; the prevalence of Shadow IT; the role of data governance; and data security practices in the cloud, including the usage of encryption and multi-factor authentication. In addition, participants will also learn new data security strategies that can help them realize the benefits of the cloud while protecting sensitive applications and information in cloud.
  • What Do You Mean You Aren’t Agile Yet? 1 PMI PMP PDU Credit What Do You Mean You Aren’t Agile Yet? 1 PMI PMP PDU Credit Andy Jordan, ProjectManagement.com Jul 28 2016 2:00 pm UTC 60 mins
    Every time you turn around, you hear about yet another organization’s successful Agile transformation – so what are you waiting for? Join Andy Jordan, ProjectManagement.com as he discusses the benefits of Agile (even if your organization is predominantly waterfall-focused) and how you can help get your organization on the path to Agile success. By attending, you will gain practical knowledge on how to help your organization quickly and confidently respond to change, deliver value faster than your competition, and build high-quality products - that your customers really want!

    This session is approved for 1 Project Management Institute (PMI) PMP Credit.
  • From Signal to Action: Security Metrics that Drive Business Decisions From Signal to Action: Security Metrics that Drive Business Decisions Stephen Boyer, Jay Jacobs Jul 28 2016 4:00 pm UTC 60 mins
    How can companies effectively measure their company’s risk of a data breach? Which security metrics are most important when it comes to determining cyber risk? How do different types of security compromises, whether botnet infections or brand name SSL vulnerabilities, contribute to an organization’s risk profile?

    In this presentation, BitSight’s Chief Technology Officer Stephen Boyer and Senior Data Scientist Jay Jacobs answer these questions and more. This data-driven webinar will highlight the extensive analysis that the BitSight Data Science team undertakes to make security signals into concrete risk mitigation actions. Perhaps most importantly, the speakers will give guidance on how security and risk professionals at every level - from the board room to the server room - can drive positive change throughout their organizations.
  • GDPR - Brexit Means More Changes GDPR - Brexit Means More Changes Darrin Reynolds, Reynolds Privacy; Graham Jackson, General Counsel, (ISC)2; Harvey Nusz, CISO, 4IT Security Jul 28 2016 5:00 pm UTC 75 mins
    The EU's General Data Protection Regulation (GDPR) was adopted on April 14, 2016 and threw infosecurity and privacy teams into chaos. While teams were trying to get their arms around the new regulations and rules, the UK voted to leave the EU, throwing another big wrinkle into the mix. What does all of this mean to you and your compliance and regulation efforts? What does the Brexit vote mean for the GDPR and for the UK's infosecurity and privacy rules? Imperva sponsors an (ISC)2 From the Trenches webinar discussion on this and answers questions from the audience on July 28, 2016 at 1:00PM Eastern.
  • Continuous Delivery For The Distributed Enterprise Continuous Delivery For The Distributed Enterprise Doug Robinson Jul 28 2016 5:00 pm UTC 60 mins
    Over the last decade, many organizations have created global development teams for delivering applications, which creates unique challenges in automating and accelerating delivery cycles. In this webinar, we will describe the challenges of Distributed Continuous Delivery and how leading organizations are addressing these issues.
  • Keep mobile employees and data safe with SonicWALL's Secure Mobile Access Keep mobile employees and data safe with SonicWALL's Secure Mobile Access Steven Sanderson Jul 28 2016 6:00 pm UTC 60 mins
    Companies used to know where their data was at all times: It was in the data center, surrounded by physical walls. But today, your data is everywhere your employees and customers are — on phones, on tablets, on laptops, in the cloud. Anywhere, anytime access provides more work-life balance and helps employees stay productive, but it also puts data security at considerable risk. The challenge companies consequently face is how to provide fast, simple access to enterprise applications, data and resources without compromising security.

    Join Mark Hewett, senior product manager for Dell SonicWALL Secure Mobile Access, and Steven Sanderson, senior product marketing manager for Dell SonicWALL Secure Mobile Access, for a webcast on how to manage and provision mobile devices to protect company data and networks from cyber attacks, viruses, malware and other threats.

    •Ensure that only authorized users have access to appropriate data and through approved devices
    •Quickly and easily provision secure mobile access and role-based privileges
    •Keep company data secure in-flight and at-rest on devices
  • Applying the Scientific Method to Threat Intelligence Applying the Scientific Method to Threat Intelligence Tim Helming, Director of Product Management, DomainTools Jul 28 2016 6:00 pm UTC 75 mins
    It has been said that there are two types of companies: those who have discovered they have been breached, and those who have not discovered it yet. Although unsettling, this rationale is conducive to constructing a healthy attitude towards your organization’s’ security practices. This hour long webinar will help guide your security process to protect your organization’s most valuable assets by applying the scientific method—specifically, forming and testing hypotheses about potential incursions, and then acting upon the results.
    In this webinar, you will learn:

    1. How to apply a hypothesis-driven approach to security activities
    2. Applying this mindset across time past, present and future—to enhance defenses
    3. How DomainTools data and tools enable you to apply this strategy to your own organization
  • IDaaS: Modernize Your IAM in the Cloud IDaaS: Modernize Your IAM in the Cloud Nathan Chan, Solutions Architect at OneLogin and Al Sargent, Senior Director of Product Marketing at OneLogin Aug 2 2016 5:00 pm UTC 60 mins
    IT, Security, and IT infrastructure teams are faced with a complex set of challenges, and identity and access management (IAM) done the old way tends to compound things. Companies who haven’t modernized their IAM infrastructure can spend months dedicated to setting up each new business application, both on premises and in the cloud, and another several months launching it to their users. It doesn’t have to be this way, with cloud-based solutions such as OneLogin reducing the time, effort, and risk of IAM modernization.

    Join us for an informative webinar with OneLogin presenters Nathan Chan, Solutions Architect, and Al Sargent, Sr. Director of Product Marketing.
  • HIPAA Compliance as a Service: Powered by Chef Compliance & AWS HIPAA Compliance as a Service: Powered by Chef Compliance & AWS Gerry Miller, Cloudticity & Joseph Fontes Amazon Web Services Aug 2 2016 5:00 pm UTC 60 mins
    Healthcare organizations face increasing regulatory pressure to maintain compliance with HIPAA regulations, while also needing to significantly modernize their technology to comply with ACA, Meaningful Use, and other federal, state, and local requirements. At the same time, the Healthcare field has never had a better opportunity to increase personalized care, lower costs, and leverage technology for measurably better outcomes. Cloud computing offers nearly unlimited computing and storage capacity - but with great power comes great responsibility. The agility Healthcare is enjoying in the cloud comes with increased risk and exposure to security breaches due to lack of compliance with Healthcare regulations and industry best practices.

    Cloudticity's HIPAA Compliance as a Service, powered by Chef Compliance, is a fully automated software-as-a-service solution. In this webinar, you will see firsthand how Cloudticity has mapped Chef Compliance's CIS profiles directly to HIPAA CFR regulations, providing a powerful automated solution to leverage the cloud's agility while minimizing risk. Governance + agility = powerful outcomes at reduced costs.
  • Building Modern Business Applications in a Mobile First, Cloud First Universe Building Modern Business Applications in a Mobile First, Cloud First Universe John Wilson, Sales and Business Process Executive Aug 2 2016 6:00 pm UTC 60 mins
    An overview of a secure, fast solution to building user apps that takes advantage of existing Microsoft collaboration tools like Office 365 in a mobile first, cloud first universe.
  • A New Approach to Data Security A New Approach to Data Security Ted Hendriks, Data Security Pre-Sales Architect, APJ, HP Enterprise Security Aug 3 2016 6:00 am UTC 60 mins
    With the phenomenal growth of data and the IT trends toward cloud and mobility adoption, enterprises are facing rising threats to sensitive data from both inside and outside the organization. They need to be able to protect data end to end without introducing complexities to users, while lowering the implementation and management costs of security solutions.

    Join Hewlett Packard Enterprise and (ISC)2 on Aug 03 (Wednesday) at 2:00p.m. (Singapore time) for a Security Briefing on how to protect data from end to end.
  • Demystifying the Cloud Series - Business Benefits of the Cloud Demystifying the Cloud Series - Business Benefits of the Cloud Mark Skoog, Technical Solutions Professional Aug 3 2016 6:00 pm UTC 60 mins
    In a digital economy, we shift to empowering employees and customers to innovate while embracing new business models and approaches. The new world requires reevaluation of how you improve productivity, move faster, do more with your infrastructure, and do it all securely.

    In this webcast, viewers will learn:
    •Key reasons why businesses are moving to the cloud
    •How to empower employees through improved productivity
    •Optimizing operations through leveraging cloud solutions
  • Skype for Business Enterprise Voice Vs compliance and security Skype for Business Enterprise Voice Vs compliance and security TeleWare Aug 4 2016 10:00 am UTC 45 mins
    Cloud technology is transforming the communications landscape faster than ever before, but it can be difficult to keep up if you’re operating in a heavily regulated industry. We will explain how your business can get to grips with the latest Microsoft Office 365 technology, whilst maintaining FCA, Dodd Frank and other regulatory and governance requirements. We will also explain how your business can save up to 60% compared to your existing voice estate, by adopting Skype for Business. Register today (45 mins).
  • Intelligent Endpoint Security: Why Taking A Modern Approach Matters Intelligent Endpoint Security: Why Taking A Modern Approach Matters Robert Westervelt is a Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec Aug 4 2016 4:00 pm UTC 60 mins
    Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.

    Join us for an interactive discussion and learn more about:

    • How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection

    • What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack

    • Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems

    • How risk assessment plays a role in strengthening your security to preempt future attacks
  • ClearCase to Subversion: Get More Agile ClearCase to Subversion: Get More Agile Doug Robinson Aug 4 2016 5:00 pm UTC 60 mins
    For years ClearCase was the standard for enterprise SCM. If you had a large number of developers and lots of projects ClearCase was a great choice, while ClearCase MultiSite provided basic support for distributed teams. Now industry trends are converging toward a new generation of development tools and processes. Today, continuous delivery brings agile development and DevOps together, promising much shorter development cycles and higher quality.

    Join us to learn how moving from ClearCase to Subversion/MultiSite can improve your development processes and significantly reduce deployment cost and complexity. You'll also learn practical ClearCase to Subversion/MultiSite migration techniques.

    Topics covered include:

    - Differences and similarities between Subversion and ClearCase
    - Continuous delivery using Subversion: bringing agile and DevOps together for faster delivery and higher quality
    - ClearCase vs. Subversion in a distributed development environment
    - Migrating from ClearCase to Subversion
  • Briefings Part 3: Secure in the Cloud - Securing Email Migration to Office 365 Briefings Part 3: Secure in the Cloud - Securing Email Migration to Office 365 Michael Osterman, President, Osterman Research; Marcelo Delima, Global Product Mktg Mgr, HPE SecureMail Aug 4 2016 5:00 pm UTC 75 mins
    The cloud's promise of on-demand functionality for a lower cost has arrived to business applications. The use of Microsoft Office 365 across the globe is growing rapidly, with a clear value proposition to re-invent productivity for organizations of all sizes. But the transition to the cloud is not without challenges. Office 365 offers concerns in terms of privacy, compliance and security which can be addressed through the use of end-to-end encryption for all e-mails and files sent to Office 365. Join HPE and (ISC)2 on August 4, 2016 at 1:00PM Eastern for an examination of the steps for an Office 365 migration, security and privacy concerns for the cloud environment and how to achieve end-to-end encryption.
  • Demystifying the Cloud Series - Top 5 Ways to Transition to the Cloud Demystifying the Cloud Series - Top 5 Ways to Transition to the Cloud Mike Gannotti & Todd Furst, Technical Solutions Professionals, Microsoft Aug 4 2016 6:00 pm UTC 60 mins
    With so much information floating around, how should you get started with the cloud transition in your organization?

    In this webcast, viewers will learn:
    •How to properly evaluate your potential needs
    •What are the top 5 ways to get started with your transition to the cloud
  • An Unvarnished Assessment of ForeScout Visibility An Unvarnished Assessment of ForeScout Visibility Robert Smithers, Miercom President and CEO Aug 4 2016 6:00 pm UTC 60 mins
    When a disruptive technology emerges, it is often met with skepticism. A good case in point is ForeScout CounterACT®. It’s gaining a lot of traction in cybersecurity circles, with more than 2,000 large and medium enterprises and government agencies worldwide using the product as of April 2016. But for those IT professionals who might think its capabilities are too good to be true, ForeScout enlisted Miercom, a leading independent testing and consultancy, to provide unbiased, hands-on testing of CounterACT capabilities. Miercom’s findings are what this webinar is all about.
    Please join us as Miercom President and CEO Rob Smithers talks about his lab’s findings with regard to CounterACT’s:

    • Visibility (discovery, classification and compliance assessment) of network-connected corporate, BYOD, guest and IoT endpoints without use of agents or previous device knowledge
    • Detection and full classification of hundreds of endpoints in seconds
    • Policy-based control of devices by enabling IT staff to grant the appropriate level of network access to people, applications and devices
    • Ability to integrate with leading network infrastructure and endpoint protection technologies
  • Is Your SQL Server Database Secure & Compliant? Is Your SQL Server Database Secure & Compliant? Rodney Landrum, Consulting Services Manager, Ntirety Aug 4 2016 7:00 pm UTC 60 mins
    Join Rodney Landrum, Consulting Services Manager at Ntirety, a division of HOSTING, as he demonstrates the various reports available for SQL Server database security and compliance, both scheduled and automated. During the webinar, Rodney will be showing how to:

    - Monitor changes to activity as the schema/table, code, database and instance level
    - Review user and role security and reporting (meets SOX compliance needs)
    - Capture and report on user access and modification of data down to the column level
    - Uncover security weaknesses