Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • CIS Benchmarking 101
    CIS Benchmarking 101 Pravin Goyal Recorded: May 24 2017 4 mins
    Why are CIS security benchmarks important and how are they created?
  • Briefings On Demand: Getting it Right - Security & the Internet of Things
    Briefings On Demand: Getting it Right - Security & the Internet of Things Dave Madden – Sr Director of Business Development & Brandon Dunlap Recorded: May 24 2017 58 mins
    The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. However, securing it can be difficult. Join Gemalto and (ISC)2 for a discussion on the Internet of Things and how it will play a role in your future and what changes will be happening in security.
  • Turn Disruption into Differentiation with your Digital Transformation Strategy
    Turn Disruption into Differentiation with your Digital Transformation Strategy Sheryl Kingstone 451 Research, Bill Hurley CMO CenturyLink Recorded: May 24 2017 55 mins
    Join 451 Research and CenturyLink May 24th at 1pm ET to discuss how enterprises are choosing and using digitization initiatives for business gain.

    Organizations of all sizes and in every sector are busy redefining their IT priorities for a digital future, identifying the goals of enhanced customer experience, operational efficiency, business agility and improved risk management as four key pillars for their digital transformation strategies.

    Digital transformation is playing out differently depending on a company’s maturity, the vertical sector in which it operates, its employees, its infrastructure, and its ability to innovate. Knowing where to start, and how to maintain momentum is critical.

    Join 451 Research and Centurylink to learn how some global enterprises are making assured first steps, and hear the following:

    •Understand how companies with more progressive Digital Transformation strategies are prioritizing their efforts for competitive differentiation, changing the nature of their business with innovative technologies that are becoming more easily accessible with a lower barrier to entry.

    •Insights and recommendations from a major survey of enterprises worldwide about IT priorities and how to make service provider choices to accelerate digital transformation mandates such as the role of cloud and other IT infrastructure options that are built for availability, speed, and resilience.

    •Identification of key shifts in business context that will continue to shape digitization efforts, and how these need to be reflected in a digital transformation roadmap for IT organizations.
  • APT32: New Cyber Espionage Group
    APT32: New Cyber Espionage Group Nick Carr, Sr. Manager Incident Response, Mandiant, a FireEye Company Recorded: May 24 2017 57 mins
    Learn more about APT32 (OceanLotus Group), a Southeast Asian cyber espionage group threatening multi-national companies operating in Vietnam. After long-term monitoring and response of their activities, FireEye has given this threat actor the newest APT designation.

    Join Nick Carr, Sr. Manager of Incident Response, as he shares how Mandiant, iSIGHT Intelligence and FireEye as a Service teams reveal:

    • Who is part of APT32, where they are based, whom they target and how they operate
    • Advice on how to defend against, hunt for and respond to APT32
    • How your organization can improve your ability to detect, prevent and remediate APT32 attacks
  • GDPR: Countdown to Day0
    GDPR: Countdown to Day0 Neil Thacker, Forcepoint, Moyn Uddin, Cyber Counsel, Jonathan Armstrong, Cordery, Adrian Davis, (ISC)² EMEA Recorded: May 24 2017 60 mins
    With the EU General Data Protection Regulation entering into force and becoming applicable from the 25th May 2018, this webcast, featuring an expert panel, will focus on key milestones to become ready for the new regulation and what we have learned to date with 1 year to go.

    Topics for discussion will include obligations to:

    · Maintain a personal data inventory
    · Map Data flow vs. Data Transfer Agreements
    · Incident Response and obligations for mandatory data breach notification
  • [VIDEO] Man & Machine: Analytics as a Defence Against Advanced Cyber Threats
    [VIDEO] Man & Machine: Analytics as a Defence Against Advanced Cyber Threats Ross Brewer, vice president and managing director EMEA, LogRhythm & Josh Downs, Senior Community Manager, BrightTALK Recorded: May 24 2017 30 mins
    As technology advances, so does the threat landscape, with cyber criminals effectively exploiting weak points on an almost daily basis. When malware infiltrates an organisation’s first layer of defence, it can spread quickly throughout the network, exposing data and weakening security - and in most cases this happens faster than analysts or administrators have time to react to. Indeed, with reams of data being generated and transferred over networks, organisations are having a hard time monitoring everything, which means potential threats can easily go unnoticed.

    Organisations need to rely on machines to detect and respond to threats more quickly and efficiently. Even enterprises with a dedicated security team that monitors the latest security threat trends and understands the blueprint of evolving attack vectors still need to continuously monitor all network activity. The sheer volume of processes, services and applications running on a corporate network is just too much for human beings to monitor alone. However, this doesn’t mean that human analysis is not important.

    User and entity behavioural analytics (UEBA) is essential in keeping up with continuously evolving threats and making sense of anomalous network behaviour. Security approaches that utilise both machine learning and human analysis enable all threats to be analysed for effective detection and response, ensuring all data is accounted for and including the human element to help reduce the opportunities for false positives. To keep up with the ever-changing security landscape, companies need to integrate internal and external threat context in their environment by updating processing rules for operating systems, applications, and network devices in order to strengthen the accuracy of real-time machine analytics.
  • Action GDPR: Finding Sensitive Data
    Action GDPR: Finding Sensitive Data Paul Garstang, Snr Manager EMEA - Data Security Group & Steve Holyer, EMEA Specialist - Data Security Group Recorded: May 24 2017 55 mins
    GDPR (General Data Protection Regulation) is only a year away, and many organisations are still trying to understand what this new regulation means to them, and their data governance practices.

    Join us for the second in a series of webinars which focus on how organisation's can begin to action GDPR - this short session is all about accelerating Data Discovery & Classification, how to automate and put in place a repeatable 'near real time capability' with Informatica's Secure@Source.

    Secure@Source provides 360º visibility of sensitive data and analyses and ranks sensitive data risk. In the context of GDPR, it helps organisations understand where their sensitive data resides, which data stores contain high risk combinations and how it proliferates through the organisation.

    This session will cover:
    - Where to start with your sensitive data
    - How to identify potential data risks
    - Live Demo of Secure@Source
  • Vulnerability Intelligence Eine wichtige Komponen
    Vulnerability Intelligence Eine wichtige Komponen Thomas Todt, Senior Sales Engineer DACH, MEA & Eastern Europe Recorded: May 24 2017 35 mins
    Software Vulnerability Management ist eine Herausforderung für die IT- und Informationssicherheitsstrategie Ihres Unternehmens. Hunderte neue Schwachstellen pro Woche machen das Thema zu einem Albtraum für Sicherheitsprofis. Die Informationen zu sammeln, zu prüfen und sie den relevanten Personen als Grundlage für die Risikobewertung zur Verfügung zu stellen ist eine weitere Herkules-Aufgabe. Doch es geht auch einfacher:

    *Was ist Vulnerability Intelligence?
    *Wie kann Vulnerability Intelligence Manager eingesetzt werden, um die Herausforderungen zu meistern?
    *Wie managen Sie Software Vulnerabilities effektiv?

    Nehmen Sie an diesem Webinar teil, um einen Überblick über Vulnerability Intelligence und den Wert für Ihr Unternehmen zu gewinnen. Lernen Sie, wie Sie die Sicherheit Ihrer Anwendungen mit Vulnerability Intelligence Manager effektiv steigern.
  • Countdown to GDPR - Reduce your Risk
    Countdown to GDPR - Reduce your Risk Darron Gibbard, Managing Director, EMEA North at Qualys & Jonathan Armstrong, Partner at Cordery Recorded: May 24 2017 60 mins
    This is a must-attend webcast for anyone working for an organisation within Europe and responsible for the security of personal data.

    You are probably already thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover.

    For organisations headquartered across EMEA, GDPR is a key focus for the next 12 months as the 25 May 2018 deadline approaches. Qualys solutions can help your organisation prepare and comply with GDPR.

    During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery, will answer any compliance questions and highlight the key areas to consider. Darron Gibbard, Managing Director, EMEA North at Qualys, will show you how to know and control your data, assets and suppliers.

    You will get practical advice on:

    - What you need to focus on: data, assets, suppliers
    - Who you should involve: key stakeholders and departments
    - How you can automate processes with Qualys Security Assessment Questionnaire

    This webcast will include a live Q&A session.
  • State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends
    State of the Internet/ Security Report–Latest DDoS and Web App Attack Trends Nick Rieniets, Senior Security Specialist, Akamai Technologies Recorded: May 24 2017 60 mins
    As an organization that delivers and protects 15-30% of the world’s web traffic on a daily basis, Akamai is uniquely positioned to observe a large amount of attacks ranging from 20 malicious HTTP requests containing SQL injection to DDoS attacks up to 650 Gbps. Our security experts analyze this information and share trends, observations, and findings in our quarterly State of the Internet / Security Report. We will present this information and associated insights in this webinar series.

    In this webinar, you will learn:

    • A summary of global findings from the State of the Internet Report
    • Attack statistics for APJ
    • How IoT botnets have changed the attack topology in APJ
    • The responsibilities for security of IoT

    Join Akamai and (ISC)² on May 24 (Wed) at 13:00 (Singapore time) for an overview and analysis of traffic and trends from Distributed Denial of Service (DDoS) and web application attacks.
  • Detecting Network Threats: What Can Endpoint Data Tell You?
    Detecting Network Threats: What Can Endpoint Data Tell You? Greg Foss, Security Architect, LogRhythm & Chris Berninger, Senior Systems Engineer, Carbon Black Recorded: May 24 2017 59 mins
    Data-driven security is the future, but alarm fatigue and data overload continue to hold Security Operations teams back. Fortunately, there are some easy ways to organize and correlate data so you can simplify the threat hunting process and free up your resources to better detect, respond and neutralize advanced threats.

    In this webcast, Greg Foss, Security Architect at LogRhythm, and Chris Berninger, Senior Systems Engineer at Carbon Black, discuss how to proactively search for and detect threats in your network.

    You’ll learn:

    • To use endpoint data to gain visibility into your network and understand what’s really going on in your network
    • How LogRhythm SmartResponse can help orchestrate security operations
    • Threat hunting techniques using Carbon Black within LogRhythm

    Register now to discover how to use insights from endpoint data to best protect your organization from advanced attacks.
  • Spot & Patch Web App Bugs in One Click
    Spot & Patch Web App Bugs in One Click Vikas Phonsa, Product Management, Qualys WAF and Frank Catucci, Product Management, Qualys WAS Recorded: May 23 2017 57 mins
    Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.

    Qualys simplifies web app security with an end-to-end solution.

    During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:

    * Scan your apps using Qualys Web Application Scanning (WAS)
    * Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
    * Manage it all from a centralized, cloud-based portal

    This webcast will include a live Q&A session.
  • Data Protection in the Changing Payments Landscape
    Data Protection in the Changing Payments Landscape Smrithi Konanur Global Product Manager – Payments, Web, & Mobile, HPE Security – Data Security Recorded: May 23 2017 42 mins
    With continued improvements in payments security through technologies such as P2PE and EMV, the PCI community has been effective at combating crime in a wide variety of financial institutions, retail environments and enterprises. As the use of stolen or fraudulent cards for in-person card present transactions becomes more difficult, criminals are shifting their focus to online activities. To stay ahead of the bad guys, merchants and institutions need tools that are specifically designed to address these challenges.

    There are powerful solutions that enable organizations to securely protect payment transactions and retain control over their consumers’ buying experience, while integrating with existing payment flows. Join us to hear more about proven ways to safeguard sensitive crypto process and protect payment transactions while eliminating the exposure to sensitive cardholder data.


    Presenter: Smrithi Konanur
    Global Product Manager – Payments, Web, & Mobile, HPE Security – Data Security

    Smrithi Konanur has over 14 years of computer software industry experience including more than 7 years of experience in Payment Industry. Her main focus in her current role is providing data security solutions for PCI, P2PE, tokenization, PII, and PHI in different channels like in-store(POS systems), e-commerce/browser-based applications and other mobile applications. Her background ranges from technical product development, management, integration, product management, and product strategy. She holds a Masters in Computer Engineering and multiple management continuing education programs.
  • Strategies for Effective 3rd Party Risk Management
    Strategies for Effective 3rd Party Risk Management Scott Roller, Founder of 3WP; Rebecca Herold, Privacy Professor; Sam Kassoumeh, SecurityScorecard. James Christiansen, Optiv. Recorded: May 23 2017 63 mins
    The challenges that organizations face today are increasingly more complex than in the past. The constant change of the global economy, dynamics of business risks and opportunities, and an increased threat of cyber-attacks add complexities we’ve never faced. As organizations rely on more and more third parties to grow and thrive, they’re exposed to higher levels of risk, and regulators are focused on the need for organizations to manage 3rd party risk more effectively.

    Manual processes, silos in contract administration, and technology and resource constraints can all lead to significant errors in the third party supply chain that leads to violation of privacy guidelines and security breaches, which cause substantial fines, penalties, and damage to brand value. On this webinar our panel of experts will discuss the risks and repercussions associated with third party contract management shortcomings, common gaps in third party contract management processes, examples of how new solutions and technologies can help organizations optimize their third party processes, and effective strategies for managing 3rd Party Risk.
  • Credential Theft:  A Perspective From the FBI & Unit 42 Threat Intel Team
    Credential Theft: A Perspective From the FBI & Unit 42 Threat Intel Team SSA John Caruthers, FBI & Jen Miller-Osborn Palo Alto Networks Recorded: May 23 2017 62 mins
    Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials.

    Join the FBI and our own Unit 42 threat intelligence team as they present their insightful perspective on the cyberthreat landscape in 2017, with an emphasis on credential-based attacks and phishing. In addition to presenting their unique attack lifecycle, they will:

    * Identify trends and techniques in methods used for credential theft and abuse.
    * Review how cybercriminals have changed their tactics to compromise networks.
    * Examine who is being targeted, and why.
    * Discuss techniques to stop credential leakage.
    * Review the FBI’s role in combating this destructive attack.

    Defending against cyberattacks is tough enough, especially when attackers pose as authenticated users on your network.

    Join the FBI and Palo Alto Networks® Unit 42 to learn what to do when you discover intruders on your network, and how to prevent their attacks from succeeding
  • Inside The New Generation of Phishing Attacks
    Inside The New Generation of Phishing Attacks Michael Landewe, Researcher, Avanan Cofounder Recorded: May 23 2017 37 mins
    What we know and have trained users about phishing attacks has changed. Old methods no longer apply.

    IT teams have deployed filters and taught our users to detect phishing attacks by scanning for suspicious URLs, spoofed login pages, and unrecognized senders. We've told people to change passwords, turn on two factor authentication and watch for suspicious logins.

    None of these methods can defend against the next generation of automated, malicious API-based phishing attacks that are invisible to users and unmonitored by SaaS.

    Once exclusive to advanced state-sponsored actors, the recent Google Docs worm pushed this sophisticated method into the headlines.

    In this webinar we will dig deep into the next generation of phishing attack and describe the new methods every IT team must deploy to defend against them. Because the vulnerability is not unique to Google, we will also discuss Office 365, Box, Salesforce and other popular business apps.
  • Don’t let Smartphones Kill your PKI Security Strategy
    Don’t let Smartphones Kill your PKI Security Strategy Gregory Vigroux, Enterprise Mobility Expert at Gemalto Recorded: May 23 2017 51 mins
    Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.

    So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
    -Software-based security versus hardware-based security
    -How this impacts your back-end systems
    -Technology such as derived credentials and mobile PKI
    -Implementing a mobile PKI solution
  • GDPR: Global Implications of EU Legislation
    GDPR: Global Implications of EU Legislation Jonathan Armstrong, Cordery & Nima Baiati, Absolute Recorded: May 23 2017 62 mins
    Enforcement of the EU General Data Protection Regulation (GDPR) is looming, giving you less than 12 months to prepare. And it has major implications for every organization that processes EU personal data – regardless of where they are based.

    With the cost of non-compliance set at an astronomical 4% of global annual revenue – not to mention damage to reputation – the time to protect yourself is now.

    On May 23rd, join Absolute’s data protection experts alongside leading technology and compliance lawyer Jonathan Armstrong, as they share practical insights on the global implications of GDPR. Register today and learn:

    • GDPR compliance – what’s required and what’s at stake
    • Organizational steps you need to take now to avert disaster
    • The best security approaches to ensure compliance and protect your data – and your brand
  • Next-generation Security for the Public Cloud
    Next-generation Security for the Public Cloud Matt Keil, Director of Product Marketing at Palo Alto Networks May 25 2017 8:00 am UTC 60 mins
    As more and more organizations move their workloads to the public cloud, security remains a top concern because cybercriminals do not care whether your applications and data reside in your datacenter or in the cloud. Their goal is to steal data or computing resources by gaining access to the network, then moving laterally, potentially to the cloud to execute their goal.

    Join us for this webinar to learn how the VM-Series protects your public cloud deployment with the same next-generation firewall and threat prevention features available in our physical appliances.

    The webinar will cover:
    • Overview of the VM-Series next-generation firewall
    • How the VM-Series prevents cyberattacks in the public cloud
    • Key differences between the VM-Series and other cloud security offerings
  • iGov Survey Results: GDPR Compliance and Creating a 360 Citizen View
    iGov Survey Results: GDPR Compliance and Creating a 360 Citizen View Guy Bradshaw from Entity Group and Informatica May 25 2017 9:30 am UTC 60 mins
    This webinar will present the latest research project from iGov.

    This research considers the challenges and benefits for public sector organisations as they prepare for the EU’s forthcoming General Data Protection Regulation (GDPR).

    This webinar will illuminate:

    • The current state of Public Sector readiness in the light of GDPR’s introduction on May 25th 2018.

    • How present data management capabilities, illustrated by the iGov survey findings, could be affected by the new regulations.

    • How GDPR could affect Public Sector organisations when it comes to collecting and maintaining personal data.

    • Discussions regarding a realistic roadmap for GDPR compliance based on the survey findings.

    Registrants will also receive a complimentary copy of the survey report - to benchmark against other participating Public Sector organisations.

    Presented by
    Guy Bradshaw and Kate Tickner from Entity Group and Informatica
  • Turning the Table on Hackers through Situational Awareness
    Turning the Table on Hackers through Situational Awareness Jason Hart, CTO Data Protection, Gemalto, Adrian Davis, Managing Director, (ISC)² EMEA May 25 2017 11:00 am UTC 60 mins
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations, and identity theft. According to Gemalto's Breach Level Index, the number of stolen, compromised, or lost records increased by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a finger on the pulse of what is going on. It seems too simple to be true, but it goes back to the age-old principle "information is power". Getting the information comes from being aware of one's surroundings. To become situationally aware, companies need to change their mindset—building a walled garden isn't an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    •What we can learn from Jason Bourne about knowing one's surroundings
    •What we can learn from hackers to better protect valuable data
    •What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability, and confidentiality
    •How to change our mindset in a new era of a hacker-driven gold rush
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife May 25 2017 2:00 pm UTC 60 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready
    Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready Derek Brink, VP, Research Fellow, Information Technology May 25 2017 3:00 pm UTC 60 mins
    Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.

    In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Neil Cooper, Regional Sales Manager, UK&I, for Thales eSecurity, as they share the following helpful insights:

    • Short synopsis of the timeline and key provisions of GDPR
    • Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
    • Summarise the six fundamental strategies for safeguarding sensitive data
    • Identify the three most important capabilities for addressing GDPR requirements
  • Why cybersecurity is everyone’s responsibility in today’s FS organization
    Why cybersecurity is everyone’s responsibility in today’s FS organization Steve Holt, EY EMEIA Head of Cybersecurity Financial Services May 25 2017 3:00 pm UTC 60 mins
    This webinar will discuss the global cybersecurity landscape, and the threats and opportunities cybersecurity is presenting for financial services organizations. Given the panel is being held exactly one year before the official General Data Protection Regulation (GDPR) implementation date, panelists will be reflecting specifically on the implications of this regulation for FS organizations.

    Panelists

    * Cheri McGuire, Group Chief Information Security Officer, Standard Chartered Bank
    * Simon Hales, Group Head of ISR, HSBC
    * Tony de Bos, EY EMEIA Financial Services, Data Protection and Privacy Leader

    Topics for discussion:

    * Talent and awareness - building a culture that makes cybersecurity part of everyone’s job and rethinking the role of the Chief Information Security Officer (CISO)
    * Strategy and innovation - putting cybersecurity at the heart of business strategy and ensuring that new digital innovation includes cybersecurity at the outset
    * Regulation - assessing the impact GDPR will have on your organization’s people, processes and technology ahead of the 2018 implementation date
    * Resilience and scalability - being prepared to recover rapidly from a cyber-breach while holding up your ecosystem to the same cybersecurity standards that you follow as an organization

    This publication contains information in summary form and is therefore intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of professional judgment. Member firms of the global EY organization cannot accept responsibility for loss to any person relying on this article.
  • Learning from the RSA Conference 2017 - Uncover Data Security Blind Spots
    Learning from the RSA Conference 2017 - Uncover Data Security Blind Spots Ulf Mattsson, CTO Atlantic BT Security May 25 2017 4:00 pm UTC 60 mins
    The RSA conference is a unique and valuable event for IT security experts from around the world. With cyber-attacks on the rise, securing your data is more imperative than ever. The RSA conference pointed out that revisions to PCI (Payment Card Industry) DSS (Data Security Standard) is increasingly focusing on Rugged DevOps or SecDevOps, and the different approach called DevSecOps, embracing the speed of DevOps and continuous delivery in a secure environment. DevOps does affect security, and you can use it to your advantage. As cloud, big data and DevOps disrupt traditional approaches to security, new capabilities emerge to automate and enhance security operations.
    Join this session and learn how to automatically address these data security blind spots and how security can be built into the development process and IT platforms. We will discuss how security can be built into Rugged DevOps,SecDevOps, DevSecOps, Scrum, SAFe, DAD and use in Large-scale Development.
  • Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance
    Segment & Conquer - Segmentation Strategies to Accelerate GDPR Compliance Erik Luysterborg, EMEA Privacy Leader, Deloitte; Jesse McKenna, Director of Product, vArmour; David Melnick, CEO, Weblife May 25 2017 5:00 pm UTC 60 mins
    With GDPR enforcement beginning May 2018 and fines of 4% of global revenue, it’s time for organizations inside and outside of the EU to build plans for compliance. How will GDPR's broad scope of requirements affect the personal information processed in your data center, and how can you simplify your path to compliance?

    In this webinar, we’ll give you the strategy you need to understand how personal data is flowing across your data center, and how you can implement segmentation to narrow your project scope and get you GDPR compliant faster.

    Join Erik Luysterborg, EMEA Privacy Leader for Deloitte, along with WebLife and vArmour to learn:

    • An Overview Understanding GDPR
    • The key requirements and how they impact security teams at organizations both in and outside the EU
    • Why environmental segmentation is a critical aspect of regulatory compliance and should be part of your GDPR strategy
    • Ways organizations can use segmentation to simplify and accelerate GDPR compliance
  • Let the countdown begin: What does the GDPR mean for US companies?
    Let the countdown begin: What does the GDPR mean for US companies? Stephen Bailey, Head of Privacy at NCC Group, Terry Blake, SureCloud EVP – North America, and Nick Rafferty, SureCloud COO. May 25 2017 5:00 pm UTC 60 mins
    Exactly one year from the date of this webinar, the General Data Protection Regulation will take effect in the European Union. The GDPR applies to any organization that stores, processes or transfers the personal data of residents within the EU. It includes organizations located in and outside the EU. Non-compliance can result in fines of more than $20 million or 4% of worldwide revenues, whichever is greater. A recent survey found an alarming percentage of US-based companies are planning to reduce their presence in Europe or exit the European Union altogether rather than deal with the GDPR. Instead of tossing up their hands over the GDPR and going home, strategic US companies can follow the defined steps and adopt software solutions that can bring certainty to these uncertain times. In fact, they see another company’s exit from the EU as a potential opportunity to gain share. The good news is that you’re not too late in getting started to meet the GDPR deadline. But as the countdown begins, urgency escalates. The time to act is now.

    In this webinar, you will learn:
    What the GDPR means for you
    How to get started on your journey to compliance
    How the SureCloud GDPR Applications Suite can help you gain and demonstrate compliance and continuously improve your performance

    Agenda includes plenty of time to address your questions.
  • Workload Placement Made Simple: Private or Public?
    Workload Placement Made Simple: Private or Public? Jason McKinney, Chief Revenue Officer and Julian Macri. Cloud Consultant May 25 2017 6:00 pm UTC 30 mins
    During this session you will learn how to bring clarity to help make cloud decisions in minutes, not months.

    Jason McKinney will be presenting.

    CloudAssist™ is the portal through which you research cloud options and map your application portfolio to the best cloud solution.

    Assess application profiles, model transformation scenarios, and discover the best execution venues for your needs based upon user demographics, service levels, security, technology and total cost of ownership.

    Define Requirements
    Compare Options and Providers
    Receive Actionable Recommendations
    Evaluate the Business Case
    Move from Decision to Provision
  • Lifecycle Container & Docker Security - The CISO's Perspective
    Lifecycle Container & Docker Security - The CISO's Perspective Dave Ginsburg, Ravi Rajamiyer, Izak Mutlu May 25 2017 6:00 pm UTC 60 mins
    Are containers & Docker secure? We look at best practices across their lifecycle, including image scanning within CI/CD process, container OS hardening, and orchestration security with Kubernetes. Guest speaker is Izak Mutlu, former CISO at Salesforce.
  • Ransomware - The Great Shakedown
    Ransomware - The Great Shakedown Keith Rayle, Chief Security Strategist, Fortinet May 26 2017 4:00 pm UTC 60 mins
    Join Keith Rayle, Chief Security Strategist at Fortinet to dissect the WannaCry hack, its implications for the industry, and the path forward.
  • Email Fraud Defense - Live Demo
    Email Fraud Defense - Live Demo Aaron Neff, Sr Engineer, Parker Bowman Account Manager May 26 2017 5:00 pm UTC 60 mins
    Proofpoint Email Fraud Defense (EFD) can help you protect your organization and your customers, leveraging the power of email authentication. Join us for our EFD demo, one in a series covering our Email Protection Solution. Learn how EFD can help you:

    •Block malicious emails spoofing your domains before they reach your employees and customers
    •Monitor all emails (inbound and outbound) from your domains and those of third parties
    •Accurately distinguish between legitimate emails and fraudulent emails
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture
    SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec May 30 2017 5:00 am UTC 30 mins
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • Attacchi cyber in EMEA: i nuovi trend
    Attacchi cyber in EMEA: i nuovi trend Gabriele Zanoni, Systems Engineer di FireEye May 30 2017 9:30 am UTC 45 mins
    Partecipa al webinar con Gabriele Zanoni, Systems Engineer di FireEye, per scoprire come si sta evolvendo il panorama delle minacce sulla base dei dati sui cyber attacchi dello scorso anno, rilevati dalle investigazioni di Mandiant.

    Il webinar affronterà temi quali:

    •I nuovi trend negli attacchi di phishing usati per compromettere le aziende
    •I cambiamenti nella telemetria e nella metodologia degli attacchi
    •Le analisi di intelligence sulle minacce emergenti
    •Le nuove strategie di difesa per proteggere al meglio le aziende
    •L’impatto del GDPR sul business
    •Confronto fra trend europei, americani e asiatici
  • Securely Enabling a Hybrid Data Center with Microsoft Azure
    Securely Enabling a Hybrid Data Center with Microsoft Azure Matt Keil, Director of Product Marketing at Palo Alto Networks May 30 2017 12:00 pm UTC 45 mins
    Microsoft® Azure™ is enabling a data center transformation that results in a hybrid architecture that combines your on premises resources and the Azure cloud. From a security perspective, your challenge remains: how to protect your applications and data, regardless of their location.

    Join us for this live webinar to learn how the VM-Series can securely enable a hybrid data center. At the end of the webinar, you will learn:
    •Security considerations when moving to Azure
    •Top 3 VM-Series recommendations to protect your data
    •Tips and techniques to streamline your efforts
  • WannaCry: Inside the Next Generation of Email Attacks
    WannaCry: Inside the Next Generation of Email Attacks Michael Landewe, Researcher, Avanan Cofounder May 30 2017 3:00 pm UTC 45 mins
    Government-developed malware is loose and IT teams are scrambling. Avanan customers were protected and we had the resources of multiple partners to analyze the attack.

    In this webinar we will analyze the details of the WannaCry code and look ahead at what to expect in future email phishing outbreaks. The proliferation of state-sponsored code to unknown attackers makes is all the more necessary to improve the arsenal of tools we use to defend against them.

    We will introduce the zero-day monitoring tool at www.avanan.com/gauge and show how different tools on the Avanan platform responded to the outbreak.

    Today, more than ever, the only protection is a multi-layer, multi-technology, multi-vendor solution. True defense-in-depth that includes the best technology that the security industry can offer.
  • The Role of DevOps in Reducing the Likelihood of a Data Breach
    The Role of DevOps in Reducing the Likelihood of a Data Breach Amy DeMartine, Principal Analyst, Security & Risk, Forrester & Bhavna Sarathy, Principal Product Manager, Veracode May 30 2017 3:00 pm UTC 60 mins
    Security breaches continue to make headlines and negatively impact the reputation and bottom line for many businesses. According to Cybersecurity Ventures, global annual cybercrime costs will double between now and 2021. More than 50% of all cyberattacks target the software application layer* and the number of these attacks grows at a rate of about 25% per year**.

    Enter DevOps- a delivery approach that focuses on continuous software delivery and gives organizations an opportunity to reduce overall security risks in applications. It offers development teams the ability to introduce security earlier in the development lifecycle so they can identify and address vulnerabilities faster.

    While traditional methodologies typically introduce security during later phases of development, DevOps enables security visibility across the lifecycle to decrease discovery and remediation time.

    In this webinar, guest speaker Amy DeMartine, Principal Analyst at Forrester Research and Bhavna Sarathy, Principal Product Manager at Veracode will provide an overview of the current state of cybersecurity and the DevOps movement, how security is changing the way that software is being built and deployed, and the technologies and best practices organizations should consider in order to reduce the likelihood of a data breach. Specific topics addressing the threat of data breaches to be discussed include:

    • The organizational gaps that both security and development teams are currently tackling with regards to data breach prevention

    • Practical steps both teams can take to transition to a secure DevOps environment

    • Leveraging technologies such as Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle
  • Ransomware & Other Cybersecurity Trends In Major Industries
    Ransomware & Other Cybersecurity Trends In Major Industries Jay Jacobs, Joel Alcon: BitSight May 31 2017 5:00 pm UTC 60 mins
    Large-scale data breaches continue to hit all industries, leading to millions of compromised records. According to the Identity Theft Resource Center, there were 780 data breaches in which nearly 178 million records were compromised. While no industry is immune to data breaches, some are more prepared than others.

    Join Jay Jacobs, Senior Data Scientist at BitSight as he explains how security posture differs in six major industries. This webinar will highlight new findings on:

    - The most common ransomware infections
    - The rate of ransomware infections found across major industries
    - The aggregate BitSight Security Rating for each industry
  • Top 5 Compliance Predictions for 2017
    Top 5 Compliance Predictions for 2017 Robert Cruz, Senior Director Information Governance, Actiance and Jasmine Wu, Director of Product Marketing, Actiance May 31 2017 5:00 pm UTC 60 mins
    2016 was an eventful year for those who need to stay on top of compliance. The SEC undertook 868 enforcement actions totaling over $4B in sanctions, while sweeping new requirements contained within MiFID II and GDPR drew closer.

    Now, with the possibility of deregulation growing, what can compliance teams expect in 2017?

    Watch the webinar now, where you will learn:

    -Key recordkeeping and supervisory themes emerging from 2016 regulatory actions
    -Top 5 regulatory compliance predictions for 2017
    -What steps you can take to ensure the compliant use of new communications channels
  • Meet the Experts: Transform Your Business with Governed, High Quality Data
    Meet the Experts: Transform Your Business with Governed, High Quality Data Thomas Brence, Director of Product Marketing and Lyle Myers, Product Specialist May 31 2017 5:00 pm UTC 60 mins
    Your organization has data in a variety of systems. You’ve connected all of it. But is it clean? Is it the kind of data that you can rely on? Is it reliable? Does it provide you the kind of foundation that you need for that next big initiative? It’s possible that it’s not. And even if it is today, it’s unlikely to be dependable data tomorrow. With a solid data quality and governance plan, however, you can start building toward consistently trustworthy data. Join us for this Meet the Experts webinar where you’ll learn how Informatica Data Quality and Informatica Axon can work together to ensure the kind of consistent data that you need for success.
  • What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017
    What Attorneys Need to Know About Cybersecurity and Data Privacy in 2017 Doug Austin, Julia Romero Peter, Esq., Sean Hall and Paul Cobb May 31 2017 5:00 pm UTC 75 mins
    You’ve heard the horror stories. Data breaches are happening within organizations at an alarming rate, and sensitive data is being compromised regularly. As an attorney, what can you do to protect yourself, your firm and your client from becoming a victim? And, what do you need to do to keep up with ever-changing requirements for data security, both within the US and internationally? This webcast will discuss what you need to know today about cybersecurity and data privacy to protect the sensitive data that your organization manages every day.

    Webcast Highlights:

    + The State of Cybersecurity in the U.S. in 2017
    + Top Threats Facing Your Practice
    + Your Responsibility to Your Clients: The High Cost of Data Leaks
    + How to Protect Your Firm and Your Clients
    + Recent Developments in International Data Privacy
    + Criteria for Evaluating Providers in Your eDiscovery Projects
    + Ethics Considerations
    + Looking Forward: The Future of Cybersecurity in the Legal Field

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Julia Romero Peter, Esq.: Julia is General Counsel and VP of Sales with CloudNine. Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

    Sean Hall: Sean is the CEO of Firm Guardian, LLC. Sean has a decade of experience working with emerging start-ups from an executive level creating scalable, profitable businesses.

    Paul Cobb: Paul is the COO for Firm Guardian LLC. Paul is a business leader with twenty years of diverse experience in management, marketing, sales strategy, and operations.

    MCLE Approved in Selected States
  • Visualizing the Evolution of Cyber Threats
    Visualizing the Evolution of Cyber Threats CW Walker, Government SE, Recorded Future and Daniel Hatheway, Senior Technical Analyst, Recorded Future May 31 2017 6:00 pm UTC 60 mins
    Actionable intelligence requires swift analysis and this is only possible with the ability to rapidly sort through vast quantities of data varying in size, source, and format.

    Intelligence analysts need the right tools that empower them to make the quick, informed decisions that our national security demands.

    Recorded Future and Altamira LUMIFY provide a powerful big data fusion, analysis, and visualization platform that supports the development of actionable intelligence. Join this webinar to learn how your agency can:

    • Accelerate the transformation of data to valuable insights using Lumify for Recorded Future.
    • Discover complex connections and explore diverse relationships in your data.
    • Enable sharing across your analytic tools and systems.
    • Enhance your analysis with malware samples sandboxed by Recorded Future.

    Lumify for Recorded Future enables analysts to quickly discover important relationships across a variety of data sources, driving a more efficient process for gaining actionable intelligence.
  • GDPR - 358 Days To Fill the Compliance GAP
    GDPR - 358 Days To Fill the Compliance GAP Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest analyst Enza Iannopollo Jun 1 2017 9:00 am UTC 45 mins
    On the 1st June, there are just 358 days until the EU GDPR comes into force. At its core, the GDPR aims to put control of personal data back into the hands of EU residents. It regulates how personal data is collected, processed, and managed by organisations.

    Businesses have only 358 days left to develop and implement a GDPR compliance roadmap. But what does successful compliance look like? What changes will your organisation have to make to internal processes, and what technologies should your company leverage to ensure that the personal data of EU residents are protected?

    Join Adenike Cosgrove, Cybersecurity Strategist at Proofpoint and guest Forrester analyst Enza Iannopollo to discuss:
    •The playbook of steps your organisation must implement to drive towards compliance
    •How to embed ‘privacy by design’ to your development life cycles
    •How to protect all identified EU personal data and prevent data breaches