Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Do You Really Know Your Users? How Security Analytics Can Detect User Threats Do You Really Know Your Users? How Security Analytics Can Detect User Threats David Gorton, Senior Product Manager, LogRhythm & Mark Settle Product Marketing Manager, LogRhythm Recorded: Jul 27 2016 59 mins
    As a cybersecurity pro, you already know that users are both an organization’s greatest asset and its greatest vulnerability. Users can do great damage—and they’re notoriously difficult to catch.

    If you’re focused on addressing user threats, User Behavior Analytics (UBA) can be a powerful tool in your kit. In this webcast David Gorton and Mark Settle from LogRhythm, discuss the elements of an effective user threat detection program. You’ll learn:

    - Why detecting user threats is so important—and so difficult
    - Different approaches to UBA
    - The value of data from across your enterprise
    - How to maximize the efficiency of your security analysts

    Watch the webcast to learn how UBA can help you discover hidden user threats, reduce false-positives, and properly prioritize the most concerning threats.
  • Virtualization Unwrapped – How to Scale While Remaining Secure Virtualization Unwrapped – How to Scale While Remaining Secure Chris Olive, Vormetric & Adam Sekora, SimpliVity Recorded: Jul 27 2016 57 mins
    There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/compliance issues. Join us for the insightful webcast where we will show how many organizations are tackling these concerns faster and easier than they thought possible. Come away from the webcast with your action plan on how you can start or continue your journey to the cloud without the challenges that may have been holding you back.
  • Webcast:  Mid-Year Threat Review Webcast: Mid-Year Threat Review Stephen Cobb, Senior Security Researcher, ESET Recorded: Jul 27 2016 59 mins
    ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
    •Ransomware
    •Regulatory risk
    •PoS malware
    •PCI and two-factor authentication
    •PUAs and scamware
    •IoT vulnerabilities
    •Privacy by design
    •General Data Protection Regulation (GDPR)
  • Ransomware: The Darker Side of Bitcoin Ransomware: The Darker Side of Bitcoin JP Vergne (Scotiabank Lab, Ivey B-School), Alexander Hinchliffe (Palo Alto), Samee Zafar (Edgar Dunn) Mark Lavender (BT) Recorded: Jul 27 2016 61 mins
    Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.

    However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
    Join this panel of industry-leading speakers, who'll be discussing the following:

    -Why has Bitcoin-related ransomware become more popular in recent years?

    -How can you prevent a Ransomware outbreak in your organisation?

    -Is it possible to catch and subsequently prosecute blockchain criminals?

    -How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?
  • SANS Health Care Provider Breaches and Risk Management Roadmap SANS Health Care Provider Breaches and Risk Management Roadmap Sandeep Kumar, Director of Product Marketing, Forescout Recorded: Jul 27 2016 62 mins
    This webcast will look at health care security from the top down, focusing on what the survey tells management in terms of priorities, breach management, controls and budgets. Attendees will learn about:

    - Supporting operational priorities and business drivers (including mobile and cloud computing priorities)
    - Reducing risk while supporting new business drivers
    - Educating leadership and getting them on your team
    - Efficacy of controls, desired improvements and wish lists
    - Budgets and best practices
  • More than Digital Board Papers More than Digital Board Papers Nathan Birtle Recorded: Jul 27 2016 31 mins
    Most people know that a board portal is an intuitive, efficient and, above all, secure way of distributing and viewing confidential board and committee meeting materials. But did you know that board portals can help you with more than just document distribution? A sophisticated tool should enhance your board member's experience and improve overall collaboration- leading to better business decisions.

    Join our free 30 minute webinar “More than Digital Board Papers” to learn how features such as archiving, note-sharing, electronic voting and questionnaires can help your board take the next step towards secure digital collaboration.
  • Fast and Effective IT Security Analytics Use Cases Fast and Effective IT Security Analytics Use Cases Mike Paquette, VP Products Prelert Recorded: Jul 26 2016 53 mins
    Security professiona​​ls realize that analytics are becoming an increasingly important part of the IT Security technology arsenal. However, most security analytics solutions are complex, requiring the movement of data to the analytics platform, custom use case development involving professional services, and sometimes weeks of personnel and model training before useful results can be obtained. In this webinar, see how security use cases can be quickly and effectively deployed using analytics recipes pulled from Prelert’s “Hot Sheet” security use case library. This webinar will highlight examples of the use cases being deployed in an Elasticsearch environment.
  • CEO Fraud and the $2.3 Billion Mistake You Can’t Afford to Make CEO Fraud and the $2.3 Billion Mistake You Can’t Afford to Make Randy Luskey, Stu Sjouwerman, Dr. Christopher Pierson, Sam Masiello Recorded: Jul 26 2016 109 mins
    The FBI just issued a warning about a “dramatic” increase in CEO Email Scams. The Bureau estimates these scams have cost businesses more than $2.3 Billion in losses over the past three years. No matter how extensive your Security Awareness Training Program is, your company is vulnerable to these attacks. Employees are quick to act when a financial request comes from the CEO. What protocols do you have in place to make sure your team knows when an email is really coming from the C-Level? Join our panel to learn how to avoid falling victim to these phishing scams.
  • Fidye Yazılıma HAYIR! Fidye Yazılıma HAYIR! Mehmet Dağdevirentürk, Trend Micro Akdeniz Ülkeleri Kanal Müdürü Recorded: Jul 26 2016 63 mins
    Trend Micro Akdeniz Ülkeleri Kanal Müdürü Mehmet Dağdevirentürk, kendinizi ve firmanızı fidye yazılımlara karşı nasıl koruyacağınızı ve fidye yazılımlarla ilgili son gelişmelerin neler olduğunu sizlerle paylaşıyor. Fidye yazılıma karşı savunmanın sihirli bir formulü yok, ancak en yaygın saldırı yöntemlerini bilmeniz, en iyi korumayı sağlamak için atacağınız öncelikli adımları bilmenizi sağlar. Bu webinarda Trend Micro olarak sizlerle tecrübelerimizi paylaşarak karşılaşabileceğiniz olası risklere karşı planınızı şimdiden oluşturmanız için bir yol haritası sunuyoruz.
  • Using Predictive Analytics to optimize Application operations: Can you dig it? Using Predictive Analytics to optimize Application operations: Can you dig it? Lesley-Anne Wilson, Group Product Rollout & Support Engineer, Digicel Group Recorded: Jul 22 2016 23 mins
    Many studies have been done on the benefits of Predictive Analytics on customer engagement in order to change customer behaviour. However, the side less romanticized is the benefit to IT operations as it is sometimes difficult to turn the focus from direct revenue impacting gain to the more indirect revenue gains that can come from optimization and pro-active issue resolution.

    I will be speaking, from an application operations engineers perspective, on the benefits to the business of using Predictive Analytics to optimize applications.
  • The Foundation of Data Quality The Foundation of Data Quality Charlie Piper - CEO and Dan Ortega - VP of Marketing Recorded: Jul 22 2016 5 mins
    Blazent's CEO, Charlie Piper and Dan Ortega introduce the company strategy, vision and it's value to customer's and MSP partners. Together, Charlie and Dan describe how Blazent's platform finds the the most accurate data to improve decision manking in IT and beyond.
  • Ransomware - an Educated Response Ransomware - an Educated Response Stu Sjouwerman, Founder and CEO of KnowBe4 Recorded: Jul 21 2016 12 mins
    Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
  • Security in the Boardroom Series: Earning and Using Your Seat at the Table Security in the Boardroom Series: Earning and Using Your Seat at the Table Ashley Ferguson, Director, SecureWorks Governance, Risk & Compliance Recorded: Jul 21 2016 60 mins
    This webinar will provide tips for successfully navigating the expanding role of the Chief Information Security Officer as an essential business leader. Explore leading practices for managing cybersecurity risk as a people, process and IT leader. Get tips for building a working relationship with other executive stakeholders in audit, compliance and enterprise risk. And hear how other CISOs are establishing more productive reporting relationships with the board of directors. Whether you’d like to expand your role as a risk and security professional, gain more executive support for key initiatives, or improve your relationship with the board, you’ll take away actionable insights to apply to your own journey as an essential business leader.
  • The Agile Supply Chain: API-led Connectivity and B2B/EDI The Agile Supply Chain: API-led Connectivity and B2B/EDI Kent Brown, CTO, ModusBox David Chao, Industry Marketing, MuleSoft Recorded: Jul 21 2016 46 mins
    Today's supply chains are faced with an increasing number of distribution channels, a broader set of suppliers and ever decreasing product cycles. A new approach is required that delivers a step change in agility. MuleSoft's API-led approach delivers up to 200% faster development cycles through leveraging re-usable assets. Join us for a walkthrough of this approach, including a demo of Anypoint Platform and Anypoint B2B.
  • Briefings Part 1: Anatomy of a Ransomware Attack Briefings Part 1: Anatomy of a Ransomware Attack Barry Shteiman, Director, Threat Research, Exabeam; Brandon Dunlap, Brightfly Recorded: Jul 21 2016 60 mins
    Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
  • Effective Monitoring and Defense in Financial Services Effective Monitoring and Defense in Financial Services Dave Hoelzer (SANS) and Lawrence Chin (Palo Alto Networks) Recorded: Jul 21 2016 47 mins
    Cybersecurity Webcast co-hosted by SANS and Palo Alto Networks

    In financial institutions, investments in cybersecurity may occur in fits and starts due to actual incidents, media coverage, or perceived risk. This presents challenges in maintaining a consistent security posture, especially as the threats and the attack surfaces evolve continuously.

    In this webcast you will learn about the value of constant monitoring and awareness of your network traffic, the role and relevance of anomalies, and the benefits of an overall security architecture for financial institutions.
  • Is IT feeling the heat? Try iland’s cool summer console release Is IT feeling the heat? Try iland’s cool summer console release Jeff Polczynski, Solutions Architect at iland and Lilac Schoenbeck, VP Product Management & Marketing at iland Recorded: Jul 21 2016 60 mins
    It may be summer, but IT never takes a vacation. As business projects slow, IT takes advantage of the downtime to shore up the infrastructure and overhaul systems. With all eyes on technology these days, everything from security breaches to system outages get outsized attention. It’s a lot to contend with.

    While any old cloud can provide a bit of shade, the iland cloud can do more. Our purpose built – and consistently enhanced – iland cloud console provides a welcome reprieve from the pain of managing cloud workloads, ensuring their security – and even answer questions from the executive suite.

    Join a webinar from our product experts, showing how the iland cloud console integrates:
    - A full complement of proactive security technologies
    - Tools to provision and manage VMs, vApps, network and more
    - 12 months of performance and capacity data
    - On-demand reporting for your executives and auditors
    - A host of “bonus features” to make your life easier

    Join this webinar to see how the iland cloud, with it’s innovative console, does more than outsource infrastructure. We’ll pour you a tall glass of virtual ice water, turn on the A/C, and make sure that your cloud operation is cool as a cucumber.
  • Up and Running in AWS, Now What About Security? Up and Running in AWS, Now What About Security? Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Jul 21 2016 54 mins
    For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.

    Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Tradition is out: where traditional security does and doesn’t fit
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • The Digital Boardroom in the Public Sector The Digital Boardroom in the Public Sector MyXa Elgstedt Recorded: Jul 21 2016 32 mins
    In 2010, a proposal was put to the UK Government to transform the delivery of its public services to be ‘digital by default’. But achieving a paperless public sector takes real organisational change. It has to start from the top: senior-level internal processes and business structures can be enhanced and improved by a digital approach, moving away from long-held paper-based systems. It just isn’t feasible to deliver public-facing services digitally and still retain old systems internally.

    Electronic board portals can drastically transform the way board, trustee and committee meeting materials are produced and consumed. Hundreds of public sector organisations around the world have kicked paper packs and emailed PDFs to the curb and made the lives of both administrators and directors much easier and more productive.

    Join us for a 30 minute webinar to learn more about switching to a digital board portal can:
    • Facilitate better communication and collaboration among board members
    • Save administrative time and reduce production costs
    • Upgrade the security of your most sensitive data
    • Make good governance easier
  • What makes a Next Gen SOC? What makes a Next Gen SOC? Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec Recorded: Jul 21 2016 52 mins
    As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.

    In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.

    Join our upcoming webinar and learn about:

    - Core requirements for a Next Gen SOC
    o Flexible Log Collection
    o Big Data Processing
    o Advanced Analytics
    o Real-Time Intelligence
    - SOC-centric services: Incident Response and Advanced Intelligence
    - SOC operating models – Building your own SOC, Operating Models & Extending Services
    - Developing the next generation of security professionals
  • Financial Services & GDPR – The Path to Compliance Financial Services & GDPR – The Path to Compliance Andrew Joss, Financial Services Industry Consultant Recorded: Jul 20 2016 58 mins
    An industry no stranger to compliance and regulation, Financial Services organisations face one of their biggest challenges yet as they consider how to tackle Europe’s newest data initiative GDPR (General Data Protection Regulation). Failure to comply will not only result in hefty fines never before seen in the industry – but presence in national headlines for all the wrong reasons.

    2018, when the legislation comes into law, may seem far off just now – however the complexity of the GDPR data challenge makes this a major business imperative which requires a plan in place for full compliance now.

    Join us on this webinar to learn:

    1.What GDPR actually is, and what it means to you and your organisation

    2.The Data Privacy Challenges GDPR creates, and the repercussions if you fail to meet them

    3.Key software approaches which address GDPR Challenges, and helps you get your customer data under control
  • The Rise of Threat Actor Groups: What You Need to Know The Rise of Threat Actor Groups: What You Need to Know Christopher Ahlberg, CEO of Recorded Future, and Teresa Shea, Director of Cyber Reboot at In-Q-Tel Recorded: Jul 19 2016 62 mins
    As we’ve seen targeted threats increase in recent years, we’ve also witnessed the rise of the threat actor group. Not a lone hacker, but a team of individuals with a specific mission to compromise technology. Whether these groups are focused on compromising and leaking information, stealing financial data, or hacktivists driven to disrupt service or deface websites, what they have in common is the willingness to pursue and attack very specific targets often using unique or brand new TTPs.

    In this “virtual fireside chat,” Recorded Future Chief Executive Officer Christopher Ahlberg will be joined by Teresa Shea, director of cyber reboot at In-Q-Tel, to discuss how the actions of threat actor groups bear direct relevance to any organization's cyber security strategy.

    Their discussion will focus on the following questions:

    • Should companies research threat actors? Or just harden their defenses?
    • What types of threat actors should companies be aware of?
    • Is cyber terrorism a real threat?
    • Does attribution of actors matter for businesses rather than just government agencies?
    • How will the landscape change over the next five to ten years, and which countries are on the rise?
  • Bringing Shadow Devices into the Light Bringing Shadow Devices into the Light Mike Rothman, Securosis Analyst and President Recorded: Jul 19 2016 48 mins
    Shadow Devices and Cybersecurity

    Along with the burgeoning Internet of Things comes a new reality: billions of invisible devices connected to private networks. These “shadow devices” enlarge your attack surface and, if left in the dark, expose your organization to malware propagation and theft of critical resources.

    In this webinar, Mr. Rothman defines the classes of shadow devices—everything from sensors to medical devices to industrial control systems—and discusses how to gain visibility and control of these potentially dangerous endpoints. In addition, he’ll talk about next-generation access control and the strategies and technologies that reveal shadow devices through:

    • Visibility and risk profiling
    • Controls to protect vulnerable agentless devices
    • Automation and integration of existing security technologies

    --

    Mike Rothman, Analyst & President, Securosis, Inc. started his career as a programmer and a networking consultant. Today, he specializes in protecting networks and endpoints, security management, and compliance, or what he calls “the sexy aspects of security.” Mike is one of the most sought-after speakers and commentators in the security field and, after 20 years in the business, he’s one of the guys who “knows where the bodies are buried.”
  • Why do you need 24X7 SOC at your service Why do you need 24X7 SOC at your service New Corporate Video Recorded: Jul 19 2016 4 mins
    Watch this 4-min video to better understand what is MDR (Managed Detection and Response), and how AWN CyberSOC delivers vigilant cybersecurity through 24X7 monitoring, cloud-based SIEM and customer-dedicated security engineers.