Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • 8 Things to Analyze in Outbound Packets 8 Things to Analyze in Outbound Packets Randy Franklin Smith, Windows Security Subject Matter Expert, and Rob McGovern, Sr. Technical Product Manager at LogRhythm Recorded: Jan 19 2017 90 mins
    Most modern malware operates as part of a system. Whether it’s a multi-part kill chain with droppers and payloads, a botnet with command and control servers, or ransomware encrypting files, the malware on the compromised system talks to other systems over the internet.

    If you have been compromised, and didn’t catch malware on the way in, you can often find it by monitoring outbound network connections.

    In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Rob McGovern, Sr. Technical Product Manager at LogRhythm, discuss the top 8 things to analyze in outbound connections from your network to the Internet.

    The duo also shows you how Network Monitor tools can help you improve your network analysis and forensics capabilities.

    Join this webcast to learn how monitoring your network can help you detect and investigate potential malicious behavior within your IT environment.
  • Top 5 Accelerators Defining the Business Landscape in 2020 Top 5 Accelerators Defining the Business Landscape in 2020 Dan Ortega - Blazent's Vice President of Marketing Recorded: Jan 18 2017 4 mins
    In this episode we will review the Top 5 Accelerators Defining the Business Landscape in 2020. What follows is a discussion of the accelerators primarily identified by Forrester and their impact on IT.
  • Your 2017 Cloud Security Action Plan Your 2017 Cloud Security Action Plan Maxim Integrated - Matt Hollcraft, CISO & Dave Ruedger, Chief Security Architect; Bitglass - Rich Campagna, SVP Products Recorded: Jan 18 2017 57 mins
    We are now three plus years into widespread adoption across industries of public SaaS apps like Office 365. Despite this momentum, security and compliance remain top challenges. This webinar, featuring Matt Hollcraft, CISO for Maxim Integrated, Dave Ruedger, Chief Security Architect for Maxim Integrated, and Rich Campagna, SVP of Products for Bitglass, will help you build a 2017 action plan to embrace public cloud without sacrificing security and compliance.

    While offering practical, actionable advice for major apps like Office 365, Matt, Dave and Rich will address your top concerns, such as unmanaged device access, external sharing, and mitigating controls. They also will provide real world examples of how other organizations have securely navigated the public cloud.
  • The Tech Tools Empowering National Security in a Digital World The Tech Tools Empowering National Security in a Digital World Iveta Topalova, WW Public Sector Architect Manager Recorded: Jan 18 2017 25 mins
    National security agencies face significant challenges today. From new and unknown threats, to operating tempo and budget challenges, having the right technology in place is key to ensuring security in an increasingly evolving threatscape.

    What if technology could help you:
    Gain a common operating picture through shared awareness and visualization of unfolding events
    Harness and validate new and existing sources of data to unlock key patterns and insights
    Align and modernize systems for improved anytime, anywhere command and operations communication
    Improve operational readiness and impact through the use of devices and apps tailored to specific roles and missions

    In this webcast, we begin with the end in mind: the need for the optimization of data insights through analytics, the alignment of platforms and devices for enhanced security and readiness, and the enablement of command and operations within an agile, data-driven national security ecosystem.

    Join this discussion to:
    - Discuss current trends that are presenting significant challenges to protecting US citizens from terrorism and crime
    - See how advancements in technology are empowering national security and federal law enforcement agencies to meet these challenges
    - Learn how agencies are implementing a digital transformation strategy to enhance how they better protect citizens
  • Escaping the Storage Licensing Money Pit Escaping the Storage Licensing Money Pit Dave Wright - Vice President & General Manager, NetApp SolidFire and Tim Stammers - Senior Storage Analyst, 451 Research Recorded: Jan 18 2017 57 mins
    The tables have been stacked against storage buyers for decades, but a change is coming. Forget the endless refresh treadmill of monolithic storage systems, and licensing models that are not just inflexible, but also force you to pay again and again for the same technology. Join this webinar to learn how to liberate your storage budget, and pay for storage the way that suits your business rather than the vendors, with 451 Research senior analyst Tim Stammers, and NetApp SolidFire’s Vice President & General Manager, Dave Wright.
  • Successful Identity Management Deployments – Don’t forget the user experience Successful Identity Management Deployments – Don’t forget the user experience Sumner Blount, Director, Security Solutions, CA Technologies Recorded: Jan 18 2017 57 mins
    A critical element to the success of an identity management deployment is the user experience, but it’s often overlooked, or not given high enough priority. An identity management deployment without a seamless, convenient user experience could be the make or break point for success.

    This webcast will highlight critical components of a convenient and secure user experience. Attendees will learn:
     Current trends in identity management and governance
     Essential characteristics of employee, partner, and customer identity management
     Key attributes of a successful identity management user experience with examples
     Recommendations for a successful identity management deployment
  • What’s Next In Securing Identities? Key Identity & Access Management Trends What’s Next In Securing Identities? Key Identity & Access Management Trends Danna Bethlehem Recorded: Jan 18 2017 43 mins
    Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

    Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

    -The status of the two-factor authentication market and what we can expect in the years to come
    -The enterprise risk issues of using social media credentials to access to corporate resources
    -The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
    -The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
  • Auditing Neglected Critical Infrastructure Auditing Neglected Critical Infrastructure Ian Whiting - CEO Titania Group Recorded: Jan 18 2017 33 mins
    Key network infrastructure devices are overlooked yet they provide critical functionality. Exploiting web application weaknesses and service buffer overflows is exciting, but the housekeeping of network infrastructure is not. Issues in network infrastructure devices can lead to network wide problems that would cause system admininstration nightmares. This presentation provides a review of key security devices, often side-lined when looking at security. It covers the value of these devices to "Blue Teams", issues "Red Teams" can highlight, desired outcomes and auditing practices.
  • Beat Hackers Through Visibility, Precision and Quick Response Beat Hackers Through Visibility, Precision and Quick Response Travis Grandpre, HPE Director of ArcSight Product Marketing and Justin Kelso, HPE ArcSight Recorded: Jan 17 2017 40 mins
    As organizations scale, having a robust security posture is critical. To achieve this, organizations rely on intelligent security operations. Visibility plays a crucial part in this. This means having visibility across boundaries, not just across networks and IT, but also into operational data and IoT devices.

    Join this presentation to learn:

    •What's needed to enable visibility into millions of events per second
    •How to provide context to the collected data
    •Role of machine learning in real-time correlation and analytics
    •How to prioritize security analyst tasks, optimize resources and save time

    Discover the capabilities powering intelligent security operations that enable you to track alerts and investigate threats at the speed of the attacker.
  • How Process Automation Works Within the NOC & Infrastructure How Process Automation Works Within the NOC & Infrastructure Jeremy Axmacher, Platform Engineer Recorded: Jan 17 2017 45 mins
    To cope with business demand, servers must be built – which is a highly manual process that often lacks standardization. Join this webinar with CA Technologies’ internal IT team, as they discuss how CA Process Automation enables them to automation core infrastructure tasks, including server deployment, maintenance and retirement – and saved their team 20 hours a day of manual work.

    You will learn:
    How CA Technologies’ internal IT team saves time automating triage and remediation
    How workflows can be easily adapted to detect issues quickly
    How new servers are now deployed within a matter of minutes with standardized builds and security protocols
  • The Softer Side of IT: Cultivating hard-to-find soft skills in today's workforce The Softer Side of IT: Cultivating hard-to-find soft skills in today's workforce Experis and Right Management Recorded: Jan 17 2017 60 mins
    IT leaders are increasingly uncovering the value of soft skills within their workforce. They’re telling us that soft skills—specifically communication and collaboration skills—can be as important as some technical competencies. What is causing increasing demands for soft skills in IT talent? How do IT leaders assess the soft skills of new recruits? Can these skills be developed in existing employees?

    During this webinar, you’ll hear experts from Experis and Right Management discuss the need for improved soft skills within today’s IT workforce and how IT leaders can ensure their workforce has the skills required to succeed in today’s world of work.

    By participating in this webinar, you will:
    Understand the increasing importance of communication and collaboration skills in IT roles today
    Gain greater insight from workforce experts about how to assess new IT recruits for soft skill proficiency
    Learn best-practice strategies for developing communication and collaboration skills within your team

    * NOTE: This event qualifies for 1 CPE credit.
    Experis is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org. Should this course need to be cancelled or rescheduled by Experis, a 24-hour notice will be provided. For more information regarding administrative policies such as complaint and refund, contact Learning & Development at 414-319-3400.
  • Learn How the NIST CSF Benefits Small and Medium Businesses Learn How the NIST CSF Benefits Small and Medium Businesses Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Jan 17 2017 60 mins
    Small Businesses are increasingly being targeted by cyber criminals. With precious few resources, how can Small Businesses defend against Ransomware, Data Breach, Insider Threat plus more issues.

    Join this webcast to learn how the NIST Cybersecurity Framework (CSF) can be an important resource to help Small Businesses defend against cyber-attacks. We’ll walk you through the recently released NIST Publication “Small Business Information Security: The Fundamentals” and it’s relation to the NIST CSF.

    - A basic understanding of the Cybersecurity Framework.

    -The purpose and scope of the recently released NIST Small Business Information Security Publication.

    -A review of the alignment of Symantec solutions to the Cybersecurity Framework.

    Join this webcast for a review of the latest NIST guidance and how to apply it to assess and manage Cybersecurity Risks to your business.
  • Information Security and Cyber Risk Information Security and Cyber Risk Ian Beale and Richard Cross Recorded: Jan 17 2017 60 mins
    The continued growth in size and frequency of costly data breaches has increased the pressure on senior leadership and Boards of Directors to take a rigorous approach to understanding and managing cyber security risk. With this in mind, ERM teams are being asked to weigh in the organization’s response to these risks. Join this webinar to learn from CEB how your peers manage and report on cyber security risks and work with their Information Security counterparts to ensure that their organisations are prepared for the inevitable cyber-attack.
  • Drive Customer Growth and Business Success with Cloud Business Applications Drive Customer Growth and Business Success with Cloud Business Applications Eanna Sarah, Tom Yang Recorded: Jan 16 2017 28 mins
    Hear how we’re delivering a new approach to business applications, through a single cloud service of purpose-built apps that will help you manage specific business functions.
    Turn your customers in to fans by reinventing your Sales, Customer Service, Finance, Field Service, Operations, Marketing and Project Service Automation processes. This completely integrated platform includes Productivity and Reporting tools, Internet of Things, and is also extensible through its own easy to use graphical development and workflow tools, allowing IT professionals to implement, build and deploy a new level of functionality for a wide range of business processes, using world-class technology.
  • Empowering Employee Productivity in the Digital Age Empowering Employee Productivity in the Digital Age Michal Gideoni, Director Product Marketing | Kyle Minar, Product Marketing Manager Recorded: Jan 16 2017 43 mins
    The 4th industrial revolution is upon us. Digital transformation is quickly becoming the most important factor of a company’s ability to compete in the fastest and most disruptive period in our history. It’s time to start asking the tough questions. How do I implement tools to enable our employees to achieve more together? How do I make sure we are optimizing mobile teams and networks without opening ourselves up to security, compliance and privacy risks? How do I get the information I need quickly to make decisions that will shape the future of my business? In this session you will learn how Microsoft is bridging the gap between people and technology with Office 365, Skype for Business, and Intelligent productivity tools, all with the built-in security, privacy and compliance you’ve come to expect.
  • How the Heck Did They Miss It? Lessons to Learn from the Yahoo Breach How the Heck Did They Miss It? Lessons to Learn from the Yahoo Breach Chris Roberts, Chief Security Architect at Acalvio Technologies Recorded: Jan 13 2017 49 mins
    With 2016 behind us, is this the last Yahoo breach we’ll hear about? Join Chris Roberts, Chief Security Architect at Acalvio Technologies as he discusses the lessons to be learned from the recently disclosed Yahoo breaches, and the nagging questions infosecurity professionals will try to answer in 2017.
  • The Fortify Ecosystem: Seamless integration into the development toolchain The Fortify Ecosystem: Seamless integration into the development toolchain Scott Johnson, Director of Product Management, Fortify Recorded: Jan 12 2017 39 mins
    Organizations moving at DevOps speed can easily integrate security testing into their Software Development Life Cycle (SDLC) workflow. Join this presentation to discover how built-in application security testing can become a seamless part of your coding process.

    Viewers will learn:

    - How integrations spanning all stages of development, deployment and production enable application security testing into the development tool chain

    - How to empower your developers to test for security vulnerabilities earlier, build better code and secure your software
  • IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare John Smith, Principle Solutions Architect from ExtraHop, Darren Carr, Sr. Technology Architect, from Cerner Recorded: Jan 12 2017 49 mins
    Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.

    Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
  • PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply David Kim. ITPG Secure Compliance. SVP, Governance Risk and Compliance Recorded: Jan 12 2017 53 mins
    Your organization has little over a year to comply with the new PCI DSS v3.2 standard. If you have yet to assess your current security controls against these new standards, it’s time to start. We’ll highlight the key changes, the issues to think about, and the time required to assess, plan and implement. As a PCI Qualified Security Assessor, we know what can trip organizations up and how to avoid missteps.
  • What Does the Massive Yahoo Hack Mean for Your Company? What Does the Massive Yahoo Hack Mean for Your Company? Dr. Christopher Pierson, EVP, Chief Security Officer & General Counsel, Viewpost Recorded: Jan 12 2017 37 mins
    With over 1 billion user accounts stolen, the recently disclosed Yahoo breach is the biggest one to date. What does this mean for your organization? Join Chris Pierson, General Counsel and Chief Security Officer at Viewpost as he discusses the Yahoo breaches and the cybersecurity and privacy implications for organizations worldwide.

    About the presenter:
    Dr. Chris Pierson is the EVP, Chief Security Officer & General Counsel for Viewpost - a Fintech payments company. He is a globally recognized cybersecurity expert and entrepreneur who holds several cybersecurity and technology patents. Dr. Pierson serves on the Department of Homeland Security’s Data Privacy and Integrity Advisory Committee and Cybersecurity Subcommittee and is a Distinguished Fellow of the Ponemon Institute. Previously, Chris was the first Chief Privacy Officer, SVP for the Royal Bank of Scotland’s U.S. banking operations leading its privacy and data protection program. Chris was also a corporate attorney for Lewis and Roca where he established its Cybersecurity Practice representing companies on security and data breach matters.