Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • IT on Trial — Guilty Until Proven Innocent? [PANEL DISCUSSION]
    IT on Trial — Guilty Until Proven Innocent? [PANEL DISCUSSION]
    Dr. Nicko Van Someren, CTO, Absolute | Maninder Malli, VP Legal, Absolute | Josh Mayfield, Director Of Security Strategy, Abs Recorded: Jun 18 2019 62 mins
    Experts debate the legal and technical requirements for data privacy

    The expectations of IT teams are often in conflict — enable increased employee productivity through technology while protecting the data entrusted to the organization. Privacy laws, such as GDPR, CCPA, and HIPAA give organizations parameters to work within and help to ensure accountability. However, in the face of resource constraints and rapidly evolving threats, IT is often caught in the crossfire in choosing where efforts should be focused.

    Join our interactive, video panel discussion with experts from two sides — legal and IT — as they lay out a path for harmonious co-existence between working within the law and advancing technology.

    You will learn:

    • Legal and ethical considerations for data privacy
    • The value legal frameworks provide to technological advancement
    • Predictions about the direction and increasing importance of privacy laws

    -----

    Speakers:
    DR. NICKO VAN SOMEREN | Chief Technology Officer | Absolute
    MANINDER MALLI | VP, Legal | Absolute
    JOSH MAYFIELD | Director of Security Strategy | Absolute


    *This is a rebroadcast, due to popular demand. Feel free to submit any questions as you watch, and we’ll follow-up with you directly. Thank you!
  • New Presidential Executive Order on America's Cybersecurity Workforce
    New Presidential Executive Order on America's Cybersecurity Workforce
    David Morris, Mark Rasch, and Juanita Koilpillai Recorded: Jun 18 2019 62 mins
    This session will examine the new Presidential Executive Order that addresses the critical shortage in cybersecurity skills and staffing. What does the new Presidential Executive Order on America's Cybersecurity Workforce entail? Who will be impacted? What can you do now?
  • Using Metrics to Drive Your Software Security Initiative
    Using Metrics to Drive Your Software Security Initiative
    Kevin Nassery, Senior Principal Consultant, Synopsys Recorded: Jun 18 2019 48 mins
    Intuition can take you quite far at the beginning of your application security journey. But even the most experienced leaders will eventually need data to guide them through a decision or justify their investments. Well-designed software security metrics provide that compass.

    This webinar will arm software security group leadership with the knowledge necessary to design key metrics that drive thoughtful investment and enhancement of their software security initiative (SSI).

    We’ll pay special attention to must-have application security metrics, common missteps, and executive visibility across the Software Security Development Lifecycle (SSDL) and SSI.
  • The New Age of Multi-Factor Authentication
    The New Age of Multi-Factor Authentication
    Lysa Myers & Cameron Camp, Security Researchers Recorded: Jun 18 2019 53 mins
    Trying to navigate the stormy seas of multi-factor authentication (MFA) to find the “killer app” both you and your organization can use to bolster security? In this webinar, we look at:

    - The various factors of authentication
    - Factor vs “steps”
    - Considerations in choosing a factor
    - The various technologies that people are using
    - What seems to be working

    Whether you’re pondering Near Field Communication (NFC) ninja tech for your smart phone, or those new biometric doo-dads that verify you based on the smell of your ears (really), we can help you sort out what might work for you and what would be crazy to implement. And as a bonus: this tech will all keep you far safer that your plain old password ever did.
  • Using Risk Management to Optimize Cybersecurity Costs
    Using Risk Management to Optimize Cybersecurity Costs
    Matt Keane, Senior Director, Risk Management Services – FireEye Mandiant Recorded: Jun 18 2019 57 mins
    Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite

    Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.

    C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.

    Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:

    • Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
    • Ensure that the board’s security investment decisions support your organization’s appetite for risk
    • Establish a framework that ensures the alignment of strategic priorities with security spending
    • Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
    • Apply these lessons to a sample business scenario.

    Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
  • Best Practices for Healthcare Digital Transformation
    Best Practices for Healthcare Digital Transformation
    John Lehane, Product Marketing &Danny Akacki, Technical Account Manager, Gigamon; Lyle Kelly, Sr. Systems Engineer, Forescout Recorded: Jun 18 2019 43 mins
    Are you ready for digital transformation? Transformation begins with visibility – looking inside the network “black box” and understanding exactly what’s running. But we know that can be easier said than done, especially in the healthcare industry where privacy, security and compliance are paramount.

    Join our webinar to hear experts from Gigamon and Forescout delve into the network and security challenges they’ve observed in healthcare. Participants will learn how to surmount the challenges in:

    •Achieving visibility of digital app usage across distributed, dynamic environments
    •Ensuring the most relevant application traffic is delivered to the right security tool
    •Pinpointing lateral movement of malware and shadow IT for faster time to detection and remediation
    •Monitoring, tracking and securing Internet of Medical Things (IoMT) devices
    •Integrating new sites and locations into your network
  • An Introduction to Linke Emory: Amazon S3 Backint agent for SAP HANA
    An Introduction to Linke Emory: Amazon S3 Backint agent for SAP HANA
    Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert. Recorded: Jun 18 2019 57 mins
    SAP HANA database is becoming the new default database engine from SAP. Enterprises worldwide are shifting towards SAP HANA and are relying in hyperscale cloud providers, such as AWS, to run their SAP workloads. While AWS provides the infrastructure and services to run SAP HANA, managing database backups and ensuring its availability in a secure and cloud native way is still a challenge for customers.

    Emory Cloud Backup is Linke’s implementation of the SAP backint agent for SAP HANA to manage database backups on Amazon S3. Its SAP-Certified and supports both single node and multi node (scale-out) SAP HANA deployments on AWS. Emory Cloud Backup integrates seamlessly with Amazon S3 making it an extension of your SAP HANA database and leverages SAP administration tools to manage your database backup catalog stored on Amazon S3.

    Join us to learn how Linke’s Emory Cloud backup can help you manage your SAP HANA database backups on Amazon S3 storage service to:

    •Reduce costs associated to database backups
    •Increase backup performance by reducing recovery times
    •Implement a cloud native solution to manage your cloud based SAP
    HANA databases.
  • Introducing Application Metadata Intelligence
    Introducing Application Metadata Intelligence
    Ollie Sheridan, Principal Engineer Security, Gigamon, Chris Green, Head of PR and Comms EMEA, (ISC)² Recorded: Jun 18 2019 60 mins
    For many years the choice for monitoring networks has been focussed on the collection and Analysis of raw packets. With the increasing need for multiple tools and SIEM's to get access to this data, along with requirements from Forensic Response teams, a more streamlined method of understanding the behaviour of traffic and user behaviour is required. Whilst NetFlow version 5 and 9 do provide some visibility, there are challenges such as sample rates and lack of Application Layer inspection that need to be addressed.

    Join us for this webinar to learn more about how you can:

    -Produce rich Metadata from network traffic and dive into the Application Layer
    -Use this rich Metadata for Security, Forensics and Business Intelligence purposes
    -Generate Metadata based on the application rather than the IP & Port
    -Ensure that the Application traffic, regardless of port spoofing, produces the correct Metadata
  • DevSecOps Beyond the Myths: Cutting Through the Hype and Doubt to Get Results
    DevSecOps Beyond the Myths: Cutting Through the Hype and Doubt to Get Results
    Sam King, CEO at Veracode Recorded: Jun 18 2019 34 mins
    DevSecOps is moving beyond the buzzword stage and into the real world. But there are obstacles standing in the way of widespread adoption. Perhaps the biggest obstacle is a lack of understanding about what DevSecOps is, which can discourage IT leaders, developers, and security teams who fear that it is a bridge too far to cross from DevOps, let alone Waterfall and Agile methodologies. Despite these myths and doubts, DevSecOps is producing real results in organizations that embrace it. For example, Veracode’s analysis of thousands of application scans found that applications scanned for security flaws early in the development process had a 48% higher fix rate (reduction in flaws) than other applications.


    In this keynote address, Veracode General Manager Sam King will introduce the concepts of DevSecOps that will form the basis of this virtual summit. Sam will discuss:

    -A simple definition of what DevSecOps is, beyond the hype and the myths, and why it holds promise for bringing together the assurances of AppSec with the speed and agility of DevOps

    -Why the evidence says that DevSecOps is attainable in the real world – how Veracode scanning data shows that there is a genuine shift to DevOps and DevSecOps happening, one step at a time.

    -Overview of the challenges that stand in the way – cultural, process, and technological – and how best practices can break down barriers to change.

    -Welcome to speakers and setting the stage for what you should expect and come away with from the event.
  • 2019 Cyberthreat Defense Report Key Findings
    2019 Cyberthreat Defense Report Key Findings
    Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide Security Recorded: Jun 18 2019 58 mins
    New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:

    •Gain pervasive visibility into your network for better threat hunting
    •Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
    •Become more effective by delivering optimized traffic to tools
    •Overcome skills shortages and retain key staff through efficiency, automation and orchestration
    •Accelerate deployment and integration of new security tools

    Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
    Register now!
  • APT Groups: How They Think, What They Want, and How to Fight Them
    APT Groups: How They Think, What They Want, and How to Fight Them
    David Grout, CTO, EMEA, FireEye Recorded: Jun 18 2019 59 mins
    Like most cyber criminals, advanced persistent threat (APT) groups try to steal data, disrupt operations, and destroy infrastructure. But unlike other attackers, APT attackers pursue their objectives over months or even years, adapting to defenses and frequently retargeting the same victim.

    Join this webinar to hear David Grout, FireEye EMEA Chief Technology Officer explain how effective cyber threat intelligence (CTI) helps you understand APT groups’ intents and tactics so you can stay ahead of attacks, instead of just reacting to them. He’ll also provide:

    •A high-level overview of the nation-state interests driving APT activity
    •Insight into the most recent APT attacks investigated by FireEye
    •A deep dive into the workings of APT40, a Chinese cyber espionage group that typically targets countries and organizations strategically important to the country’s “Belt and Road Initiative.”
  • Технический обзор архитектурных особенностей, требований к планированию ресурсов
    Технический обзор архитектурных особенностей, требований к планированию ресурсов
    Дмитрий Иванюк, эксперт по решениям Commvault Recorded: Jun 18 2019 54 mins
    Уважаемые коллеги!

    Приглашаем Вас и Ваших коллег принять участие в вебинаре «Технический обзор архитектурных особенностей, требований к планированию ресурсов и параметров установки для развертывания Commvault».

    Дата: 18 июня
    Время проведения: 11.00-12.00
    Тренер: Дмитрий Иванюк, эксперт по решениям Commvault.

    Курс предназначен для менеджеров по продукту, архитекторов, инженеров, администраторов.

    В процессе вебинара мы рассмотрим:
    ∙ Вводный технический обзор архитектурных особенностей
    ∙ Технический обзор требований к планированию ресурсов и вариантов установки при развертывании Commvault
    ∙ Описание передовых приёмов конфигурирования и повышения производительности
    ∙ Описание инструментов, процедур поиска и устранения неисправностей, полезных при выявлении причин типовых проблем и их решении
    ∙ Q&A

    Будем рады новым слушателям!
    С уважением,
    команда Commvault
  • Prévisions Forcepoint sur la cybersécurité en 2019
    Prévisions Forcepoint sur la cybersécurité en 2019
    Alain Thibaud Recorded: Jun 18 2019 50 mins
    L'innovation se nourrit de la collaboration en toute confiance au travail, quand chacun utilise les données librement et en toute créativité grâce à la technologie. Ce carrefour est également le point où la vulnérabilité est la plus haute pour votre entreprise, et la source principale de failles de sécurité qui propulsent les cyberrisques à des sommets jamais atteints.

    En 2019, les assaillants ne reculeront devant rien pour voler nos identités. Ils utiliseront de nouvelles techniques pour échapper à la détection et créer des perturbations au plus près de nos vies. Les enjeux sont élevés, dans un monde encore plus connecté que nous l'avions imaginé.

    Rejoignez Alain Thibaud, Directeur de Sales Engineering EMEA chez Forcepoint, pour un webcast qui aborde les problèmes de cybersécurité les plus urgents – et ce que vous pouvez faire pour vous protéger.
  • A Red Team Case Study
    A Red Team Case Study
    Steve Ledzian, Vice President & Chief Technology Officer, APAC, FireEye Recorded: Jun 18 2019 48 mins
    Red Team assessments help organizations identify weaknesses in their current detection and response procedures so they can update their existing security programs to better deal with modern threats. We'll look at a red team case study detailed in FireEye's MTrends 2019 report where consultants performed an objective-based assessment that emulated a real cyber attack of an advanced, nation state attacker across the entire attack lifecycle
  • Threat Intelligence on the Frontlines
    Threat Intelligence on the Frontlines
    Tavis Newsome, Senior Intelligence Optimisation Analyst, FireEye Recorded: Jun 18 2019 55 mins
    Today, defeating cyber attackers and the techniques they employ requires real-time insight and intelligence. Staying ahead of attacks, instead of merely reacting, is the heart of cyber threat intelligence. To illustrate the importance of these capabilities to both public and private sector organizations, Tavis will draw from recent real-world intelligence findings, such as FireEye’s collaboration with Facebook and Google to identify Iranian government influence campaigns, as well as our identification of North Korean state-sponsored groups targeting the energy sector.
  • An Introduction to Symantec Email Fraud Protection
    An Introduction to Symantec Email Fraud Protection
    Adrian Covich, Director Systems Engineering Symantec | Brian Westnedge, Sr. Director, Global Channels, Valimail Recorded: Jun 18 2019 61 mins
    Are attackers leveraging your domains to impersonate and send emails to your clients and business partners?

    Symantec has launched Email Fraud Protection, an add on cloud service solution that provides organisations with a fully automated approach to the implementation of DMARC, SPF and DKIM to prevent attackers from spoofing their domain names and provide protection from Business Email Compromise (BEC).

    During this webinar, you will discover how Symantec Email Fraud Protection can safeguard your organisation from these impersonation and phishing attacks and how it can help organisations overcome the complexity of achieving sender authentication. We will be diving deep into DMARC Enforcement, and taking a look at Symantec’s newly hosted innovative approach to DMARC, a simpler and more streamlined method to prevent phishing attacks.

    Join us as we discuss:

    - DMARC Enforcement and why you should be at quarantine or reject
    Domain configuration
    - Achieving enforcement without processing PII
    - Increasing brand reputation and sender trust through authentication
  • Transport Architecture Simplification with Segment Routing (SR) & EVPN
    Transport Architecture Simplification with Segment Routing (SR) & EVPN
    Ron Bonica, Distinguished Engineer Recorded: Jun 17 2019 60 mins
    In this online webinar Ron will share the same presentation he gave at the Technical Advisory Board meeting in Orlando, FL allowing this important information to be shared further in your organizations.

    In the presentation, we will explore Segment Routing and Ethernet Virtual Private Networks. We will also explore how these technologies can simplify network protocols and network operations.
  • Keynote Address: Symantec Outlook & Vision
    Keynote Address: Symantec Outlook & Vision
    Kevin Reardon, Vice President, Worldwide Strategy and Consulting, Symantec Jun 19 2019 1:00 am UTC 33 mins
    Even as technological advances make it easier for organisations to undertake a digital transformation, the challenges of cloud migration, privacy legislation and advanced adversaries still remain.

    Join Kevin Reardon, Vice President of Worldwide Strategy and Consulting at Symantec, in this webinar as he discusses Symantec’s outlook and vision for 2020 and beyond, including:

    - Challenges securing the digital transformation
    - Symantec’s Integrated Cyber Defense approach
    - How an integrated platform can help simplify and resolve digital transformation challenges
    - What your next steps should be

    Register now to watch the webinar.
  • Green Demon Denied
    Green Demon Denied
    Shashwath Hegde, Solutions Architect, APAC Jun 19 2019 2:00 am UTC 25 mins
    Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
  • Zero Trust: Integrated Cyber Defense & ISTR Observations
    Zero Trust: Integrated Cyber Defense & ISTR Observations
    Nick Savvides, Chief Technology Officer, Asia Pacific, Symantec Jun 19 2019 2:00 am UTC 43 mins
    With the internet and the cloud being a critical part of most organisations today, the walled network is soon becoming a thing of the past. When your network is essentially the internet, the only secure mindset is Zero Trust.

    Join us in this webinar as Nick Savvides, Symantec’s Chief Technology Officer for Asia Pacific and Japan, discusses:

    - The evolution from Open Security to Zero Trust
    - Key learnings from the Internet Security Threat Report (ISTR) Vol. 24
    - The guiding principles and practical applications of Zero Trust
    - Symantec’s vision of Zero Trust

    Register now to watch the webinar.
  • Symantec Emerging Technologies: We Invest So You Don't Have To
    Symantec Emerging Technologies: We Invest So You Don't Have To
    John Cunningham, Vice President, Emerging Technologies, Asia Pacific, Symantec Jun 19 2019 3:00 am UTC 24 mins
    Staying current with the latest digital technologies can be a costly endeavour to both implement and secure, yet organisations cannot afford to fall behind. How can an organisation keep up with the ever-changing digital business landscape?

    Join John Cunningham, Vice President of Emerging Technologies, Asia Pacific at Symantec, in this webinar as he discusses:

    - The challenges organisations face trying to keep up with the digital landscape
    - How Symantec’s investments in emerging technologies can aid organisations
    - Symantec’s acquisition of Luminate to help organisations achieve Zero Trust
    - The enhancement of Symantec’s web isolation capabilities with Fireglass

    Register now to watch the webinar.
  • Symantec Web Isolation
    Symantec Web Isolation
    Dan Amiga, Vice President, Web Isolation, Symantec Jun 19 2019 4:00 am UTC 39 mins
    With 90% of cyber attacks coming through web and email, the need for Web Isolation has never been greater. But is it possible to have an air gap on all fronts without negatively affecting the user experience?

    Join us in this webinar as Don Amiga, Vice President of Web Isolation at Symantec, reveals the ins and outs of Web Isolation, including:

    - Why organisations today need military grade air gaps
    - The architecture behind Web Isolation
    - Live demo and use cases and how to implement Web Isolation for each
    - How Symantec Web Isolation offers superior integration and protection

    Register now to watch the webinar.
  • Top Security Considerations in Moving to the Cloud
    Top Security Considerations in Moving to the Cloud
    Sherif El-Nabawi, Vice President, Systems Engineering, Asia Pacific and Japan, Symantec Jun 19 2019 5:00 am UTC 30 mins
    By 2020, organisations in Asia Pacific are expected to utilise an average of 5 cloud solutions. But with 51% of these organisations storing sensitive data on public clouds and 45% feeling that the public clouds’ security features are sufficient, organisations urgently need to factor in more security considerations when moving to the cloud.

    In this webinar, Sherif El Nabawi, Vice President of Systems Engineering at Symantec Asia Pacific and Japan, discusses the top security considerations in moving to the cloud, including:

    - The risks and issues created by cloud migration
    - Symantec’s Direct to Net Secure Access Services
    - IaaS and SaaS adoption challenges and solutions
    - Why every organisation needs to establish a Cloud Center of Excellence

    Register now to watch the webinar.
  • Applying Zero Trust Principles to Your Network (Featuring Guest Analyst)
    Applying Zero Trust Principles to Your Network (Featuring Guest Analyst)
    Chase Cunningham, Forrester Principal Analyst Serving Security & Risk Professionals & Erez Tadmor, Product Manager, Tufin Jun 19 2019 6:00 am UTC 53 mins
    Networks and network security tooling has continued to proliferate at light speed as organizations infrastructures and systems have moved to the cloud. This massive sprawl of the control surface has created a nightmare scenario for businesses to control and maintain. This webinar will delve into the truths around how large this problem is and detail the facts related to the necessity for automation and orchestration within today's cloud-enabled businesses. Our session will provide guidance and thoughts on the impossibility of achieving Zero Trust without the use of a central security policy and automated control technologies.

    Join guest speaker Chase Cunningham, Forrester’s Principal Analyst for Security and Risk Professionals and Erez Tadmor, Director Product Management, together with Dan Rheault, Tufin Senior Product Marketing Manager to gain an in-depth understanding of the Zero Trust framework, and how it can successfully be implemented in your network and maintained through security policy management.
  • Next Generation Security Operations: Symantec Threat Intelligence
    Next Generation Security Operations: Symantec Threat Intelligence
    Peter Sparkes, Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec Jun 19 2019 6:00 am UTC 37 mins
    Preparing for the threats of tomorrow will require faster, deeper integration of technology, process, intelligence and warriors. However, making so many moving components work seamlessly together can be a challenge.

    Join Peter Sparkes, Symantec’s Senior Director of Cyber Security Services for Asia Pacific and Japan, in this webinar as he discusses the OODA Loop Strategy:

    - Observe: Expanding detection and extending coverage across the ecosystem
    - Orientate: Utilising threat intelligence with planning, process and playbooks
    - Decide: Empowering the analyst and the impact on business
    - Act: Proactive defense through managed endpoints detection and response and orchestration

    Register now to watch the webinar.
  • Der Schlüssel zu Produktivität im Digitalen Unternehmen
    Der Schlüssel zu Produktivität im Digitalen Unternehmen
    Pierre-Andre Aeschlimann Jun 19 2019 8:30 am UTC 45 mins
    Die Digitalisierung verursacht eine radikale Umgestaltung von Unternehmen und sogar ganzer Branchen. Es ist eine radikale Umformung der Interaktion zwischen Kunden und Unternehmen aber auch, immer wichtiger, zwischen Mitarbeiter und deren Unternehmen. Die Rolle der IT ist strategischer als je zuvor. Ein unternehmensweiter Service Management Ansatz hat sich als der beste Ausgangspunkt gezeigt.

    In diesem Kontext werden wir folgende Themen und deren Wichtigkeit erklären:
    •Wie verwalte ich Services effizient quer durch das ganze Unternehmen (IT, HR, Security, Facilities, Marketing, Customer Service,...) ?
    •Wie automatisiere ich die dazugehörenden Prozesse oder Arbeitsabläufe intelligent und einfach?
    •Wie ermögliche ich meinen Kunden und Mitarbeitern eine moderne, intuitive und immersive Erfahrung/Erlebniss/Experience, und warum ist ganz speziell die Employee Experience so wichtig?
    •Das Ganze illustriert durch Fallbeispiele von Kunden aus dem deutschsprachigen Raum (DACH)
  • The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    The State of DevSecOps - Featuring Amy DeMartine of Forrester Research
    Chris Eng, Veracode Vice President of Research and guest, Forrester Research Principal Analyst Amy DeMartine Jun 19 2019 9:00 am UTC 56 mins
    In our recent State of Software Security Volume 9 report, Veracode examined fix rates across 2 trillion lines of code shows that the number of vulnerable applications remains staggeringly high. More than 85 percent of all applications contain at least one vulnerability following the first scan, and more than 13 percent of applications contain at least one very high severity flaw.

    One thing is certain: the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.

    There are just too many vulnerabilities for organizations to tackle all at once, which means it requires smart prioritization to close the riskiest vulnerabilities first. For the first time, our report shows a very strong correlation between high rates of security scanning and lower long-term application risks, which we believe presents a significant piece of evidence for the efficacy of DevSecOps. In fact, the most active DevSecOps programs fix flaws more than 11.5 times faster than the typical organization, due to ongoing security checks during continuous delivery of software builds, largely the result of increased code scanning.

    Join guest presenter Amy DeMartine, Principal Analyst, Forrester Research Inc., and Veracode’s Chris Eng as they deliver valuable takeaways for business leaders, security practitioners and development teams seeking to secure their applications. Listeners will learn potential prioritizations and software development methods that could help their organizations reduce risk more quickly.
  • Securing the Sugar out of Azure DevOps Pipeline
    Securing the Sugar out of Azure DevOps Pipeline
    Colin Domoney DevSecOps Consultant at Veracode Jun 19 2019 11:00 am UTC 43 mins
    This webinar will provide a comprehensive look at the security features of the Azure DevOps CD/CD platform. The topics include built-in security features such as user access controls and branch policies; and an overview of best practice for the incorporation of various 3rd party security tooling such as Veracode Greenlight within your pipeline.

    Other topics include best practices for pipeline telemetry, reporting, pipeline protection and templates for security best practices. Whether you are a software developer using Azure DevOps, a security manager or a DevOps expert this webinar should further enhance your expertise in secure software delivery with Azure DevOps.

    Register for this live webinar where Colin Domoney - DevSecOps Consultant at Veracode - will leave you with a clear understanding of how to Secure your DevOps Pipeline.
  • Shoot for the Cloud: Getting Started with Security in AWS
    Shoot for the Cloud: Getting Started with Security in AWS
    Daniel Prauser Jun 19 2019 12:00 pm UTC 60 mins
    Is your organisation moving to Amazon Web Services? Or are you a seasoned AWS pro, but need to know where to start to secure it?

    It’s a fact—Cloud environments aren’t going away anytime soon. Cloud adoption is expected to grow at 12.4% annually until 2025. When you need to get started in a new cloud environment, or secure an existing one, vulnerability management is the place to start.

    Join Daniel Prauser to learn the fundamentals of setting up vulnerability management in your cloud environment and common pitfalls to watch out for.

    In this webinar we will cover:

    The future of the cloud infrastructure landscape
    * Some common misconceptions. Did you know AWS doesn’t secure your environment for you?
    * Vulnerability Management best practices
    * How Rapid7's InsightVM and InsightIDR can help
  • Visibility in Public Cloud Umgebungen
    Visibility in Public Cloud Umgebungen
    Daniela Fusaro, Senior Solutions Architect Jun 19 2019 12:00 pm UTC 14 mins
    Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
    Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.


    Finden Sie heraus in unserem 15minutigen Webinar wie Sie:

    - Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
    - Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
    - Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
  • How To Train Your Email Security Dragon
    How To Train Your Email Security Dragon
    Gareth Fraser-King, Director, Product Marketing EMEA Jun 19 2019 1:00 pm UTC 45 mins
    The numbers make stark reading. 281 billion emails sent daily to over 2 billion business users. 91% of all cyber-attacks start with an email and it only takes 1 with malicious intent to impact your organisation. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned.

    Join Gareth Fraser-King, Director, Product Marketing EMEA, to learn:
    - The state of the cyber landscape, specific to email security.
    - How the attack vector is changing with new tactics, techniques, procedures and what you need to look out for.
    - Why is FireEye better at catching evolving attacks and how this can benefit you.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Joshua Costa, Manager, PS Advisory Services Jun 19 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss threat hunting and incident detection leveraging EDR and the current cybersecurity threat landscape.

    We'll cover:
    •Incident investigation considerations - old versus new
    •Threat remediation and recovery
    •Third-party and threat intelligence integration

    Our Verizon Threat Research Advisory Center presenters will be:
    •Hayden Williams, Sr. Manager, PS Advisory Services
    •Joshua Costa, Manager, PS Advisory Services
    - David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com


    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • GDPR One Year On – 5 Lessons Learned
    GDPR One Year On – 5 Lessons Learned
    Martin Whitworth, Research Director, European Security, IDC & Duncan Brown, Sr. Director Security Strategist, Forcepoint Jun 19 2019 3:00 pm UTC 41 mins
    We are now one year on from when GDPR became law, but the compliance race is far from over. Many organizations undoubtedly made a huge effort to revamp their processes and security around personal data—but how effective have they been?

    In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European Security Martin Whitworth as they discuss where we succeeded, where mistakes were made, and share five lessons learned to help prepare for the evolving privacy and compliance challenges ahead, including:

    - Regulatory enforcement: Penalties are starting to be handed out and it’s not just fines; enforcement can take many forms.
    - Over-compliance: Did some companies damage themselves by deleting too much data?
    - A global trend towards privacy regulation: GDPR is just the start, with more consequences for how organizations use and misuse personal data.

    Watch the webcast to get prepared for what lies ahead.
  • Critical Incident Response: Why Good Enough Is Just Not Good Enough
    Critical Incident Response: Why Good Enough Is Just Not Good Enough
    Valerie O'Connell, Research Director, EMA and Vincent Geffray, Senior Director, Product Marketing, Everbridge Jun 19 2019 3:00 pm UTC 58 mins
    Technology incidents happen every day to companies of all sizes, across every vertical, in all degrees of impact from inconvenient to potentially catastrophic. So, by definition, all organizations do IT incident response. The question is, how well do they do it? Research from leading IT analyst firm Enterprise Management Associates (EMA) shows that unless the response takes advantage of automation, the answer “not nearly well enough” is an understatement.

    With the average time to engage the right response team taking 1 to 2 hours, and the average time to resolve a major outage taking 5 to 6 hours, there is a definitive need for immediate and dramatic operational improvement.

    Leveraging EMA research and a case-based approach, this webinar will explain how to reduce mean time to repair (MTTR) through automated slashing of the time it takes to begin effective response. A simple method for determining the point at which it makes more business sense to invest in an improvement than it does to continue funding the status quo will also be discussed.

    Additionally, webinar attendees will learn more about:

    *Top automation drivers, indicators, obstacles, and benefits realized
    *The case for automating incident response – real numbers from real places
    *Quantifying the high cost of status quo – a conservative approach to demonstrating value
  • The Future: Enterprise Virtualization to Container-Native Virtualization
    The Future: Enterprise Virtualization to Container-Native Virtualization
    Andrew Sullivan, Principal Technical Marketing Manager, Red Hat & Doron Fediuck, Director, Software Engineering, Red Hat Jun 19 2019 3:00 pm UTC 47 mins
    Virtualization has been a staple of datacenter technology for a decade and continues to provide robust capabilities for all types of applications. Today’s Red Hat Virtualization product might not be what you remember. It now provides a fully featured, enterprise-ready hypervisor capable of hosting any workload in the on-premise datacenter. However, datacenter virtualization is evolving, and gaining the ability to integrate and interoperate with cloud-native applications and containers in new ways.

    In this presentation from Red Hat Summit, Andrew Sullivan and Doron Fediuck discuss where Red Hat Virtualization for the enterprise and container-native virtualization fit into Red Hat’s portfolio and strategy. They also provide an overview of the capabilities that you can expect currently and in new functionality coming.

    If you want to simplify your datacenter virtualization and help make digital transformation a reality, Red Hat's virtualization portfolio should be at the top of your list.
  • Simplifying Security Operations with ONE Platform
    Simplifying Security Operations with ONE Platform
    Ben Forster, Sr. Product Marketing Manager, FireEye Jun 19 2019 4:00 pm UTC 60 mins
    Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.

    In this webinar:
    - Understand the benefits of technology consolidation
    - Learn about what a single platform can do for your people and processes
    - Discover the untapped potential of your security investments
  • The State of Open Source and Security: What It Means for You
    The State of Open Source and Security: What It Means for You
    Gordon Haff, Red Hat & Dave Meurer, Synopsys Jun 19 2019 4:00 pm UTC 60 mins
    Development organizations view open source software as not just important but also strategic. That’s just one of the topics we’ll investigate in this joint webinar from Red Hat and Synopsys. Drawing from Red Hat’s “The State of Enterprise Open Source” report, technology evangelist Gordon Haff will explain why IT decision makers value open source so highly.

    At the same time, changing development practices and escalating threats mean that security remains a concern with respect to open source software, as it is for IT more broadly. Dave Meurer of the Synopsys Software Integrity Group will explain findings from the Synopsys “2019 Open Source Security and Risk Analysis” report to offer an in-depth look at the state of open source security, compliance, and code quality risk in commercial software.

    We’ll close with some practical advice about getting the most value from open source software while keeping your organization safe.