Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Protect Financial Customers From Fraud and Fakes
    Protect Financial Customers From Fraud and Fakes
    Zack Allen, Director of Threat Operations, ZeroFOX and Ryan Trost, Chief Technology Officer, ThreatQuotient Recorded: Apr 24 2019 41 mins
    How to identify and mitigate social media and digital risk

    Financial service organizations have a massive footprint and attack surface on social media & external digital platforms — all of which is ungoverned, unmonitored and unprotected by the existing security perimeter. Understanding the threats on these platforms is critical, from financial fraud, phishing and malware spread on social media, customer scams, impersonating accounts and mobile apps, and more. Join ZeroFOX and ThreatQuotient to learn the top risks facing financial institutions on social and digital channels and key tactics for addressing those risks.

    Key Takeaways:

    -Understand top trends and threats facing financial institutions on social and digital channels
    -Gain knowledge of key tactics for addressing social and digital threats
    -Learn about the tools available to your organization for mitigating risk
  • Fight the good fight against the bad bots!
    Fight the good fight against the bad bots!
    Brian McHenry and Graham Alderson Recorded: Apr 24 2019 35 mins
    Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.

    Join us for this webinar to learn:
    - How bots infect, propagate, and attack applications
    - What types of application attacks are commonly performed by bots
    - How you can defend against bad bots without disrupting the good ones
  • Discovery Isn’t Just for Litigation Anymore
    Discovery Isn’t Just for Litigation Anymore
    Doug Austin and Tom O'Connor Recorded: Apr 24 2019 65 mins
    In today’s era of growing data privacy concerns with GDPR and CCPA, increase in harassment claims with #MeToo and rising corporate malfeasance concerns, there are a lot of potential compliance and investigations needs with regard to discovery that organizations have today whether or not they ever lead to litigation. This CLE-approved webcast* will discuss the drivers and challenges facing organizations today to be more proactive in understanding their data to identify issues before they lead to litigation and address them proactively. Topics include:

    + Timeframes to Act After the Case is Filed
    + Challenges Posed by BIG Data and Variety of Data Sources
    + Data Privacy Trends and Challenges
    + Challenges from #metoo and Corporate Malfeasance
    + Key Stats and Challenges Regarding Data Breaches
    + Will Information Governance Bail Us Out of This Mess?
    + Data Discovery vs. Legal Discovery
    + Where the Technology is Heading
    + Recommendations for Addressing Data Discovery Challenges

    Presentation Leaders:

    Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author each year since 2017.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Take the Industry’s Most Authentic Cyber Range for a Security Test Drive
    Brandon Cooper, Sales Support Engineer Recorded: Apr 24 2019 25 mins
    Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability.

Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do.

We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately.

Sign up to test drive CMD+CTRL!
  • Emerging Threats in Your Call Center- Chatbots, Synthetic Voice and Leaky IVRs
    Emerging Threats in Your Call Center- Chatbots, Synthetic Voice and Leaky IVRs
    Elie Khoury, Principal Research Scientist and Manager, Ph.D Recorded: Apr 24 2019 20 mins
    AI presents exciting but uncharted territory. And as AI forges its way into organizations’ voice interface, like any disruptive technology, benefits for your organization exist alongside new opportunities for criminals to use this technology against you and your customer:.

    This webinar will explore potential pitfalls to your voice channels such as :

    - Synthetic voice -- the arrival of synthetic voice introduces a whole new realm of fraud possibilities and ethical debates
    - Chatbots and the new hacks fraudsters use to attack this channel
    - The leaky IVR and the newest brute force attack trends you may be overlooking
  • Understanding the Importance of Trust
    Understanding the Importance of Trust
    Duncan Brown, Dr. Margaret Cunningham & Dr. Richard Ford Recorded: Apr 24 2019 40 mins
    Trust forms the foundations of any relationship. For businesses, trust provides a platform for building strategic partnerships, establishing a reputation, and embracing innovation and change. But large-scale data breaches and privacy abuses are undermining trust - 63% of senior executives at large enterprises say that trust has eroded over the past two years*.

    What can be done to reverse this trend? In this webcast, our panel discuss:

    - The factors and relationships that influence trust.
    - How to foster a culture of trust within the organization.
    - How technology can play a part in facilitating trust.

    Watch this webcast and learn how you can help your organization become a trust leader.

    Our Panel:
    Duncan Brown, Sr. Director Security Strategist, Forcepoint
    Dr. Margaret Cunningham, Principal Research Scientist for Human Behavior, Forcepoint X-Labs
    Dr. Richard Ford, Chief Scientist, Forcepoint

    *Cultivating Trust To Gain Competitive Advantage, by Harvard Business Review Analytic Services, March 2019
  • Solutions that Hit the Bullseye
    Solutions that Hit the Bullseye
    Jeff Merck, NetApp Sr Account Executive & John Lavelle, Palo Alto District Manager Public Cloud Security Sales Recorded: Apr 24 2019 59 mins
    Join us to hear how NetApp and Palo Alto Networks can securely accelerate your cloud deployment with advanced security for workloads, infrastructure, hosts, apps and data.
  • Gartner analyst covers all things security, risk and governance
    Gartner analyst covers all things security, risk and governance
    Brian Iverson, Gartner Recorded: Apr 24 2019 61 mins
    This informative webcast contains great insights from Gartner analyst Brian Iverson, which begins with a simple and pragmatic definition for “what is governance?”

    Brian also discusses challenges, pitfalls and recommendations on:

    - How organizations can mitigate the risk of a breach
    - How to prepare for hackers
    - Ways to ensure the right people have the right access
    - Overcoming governance challenges with apps, unstructured data, the cloud and personal devices
    - Breaches that bypass the perimeter
    - Creating a holistic security approach: What are the risks of doing things and not doing things

    It can be a difficult task to achieve governance if you don’t have the right solutions. That’s why the second part of this webcast focuses on solutions to help you enhance your identity governance capabilities.
  • Firewall Rule Recertification with Application Connectivity
    Firewall Rule Recertification with Application Connectivity
    Asher Benbenisty, Director of Product Marketing Recorded: Apr 24 2019 20 mins
    Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.

    However, manual firewall rule recertification is complex, time-consuming and prone to errors.

    Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.

    In this webinar Asher will cover:
    • Why it is important to regularly review and recertify your firewall rules
    • How to use application connectivity for firewall rule recertification
    • How to automatically manage the rule-recertification process
  • How to Build a Security Visibility Strategy in the Cloud
    How to Build a Security Visibility Strategy in the Cloud
    Dave Shackleford, SANS | David Aiken, AWS Marketplace Recorded: Apr 24 2019 60 mins
    True accountability for the security of cloud-based assets requires visibility into the events and behaviors that move into and through your cloud environment. Security today relies on visibility in several areas: networks, systems, storage and applications.

    In this recorded webcast, SANS Analyst and cloud security expert Dave Shackleford explains how visibility in the cloud differs from more traditional security visibility and suggests how organizations can move toward establishing a cloud visibility strategy, using practical examples to illustrate the process.

    Attendees will learn about:
    - Types of visibility needed today
    - Event data and information available in the cloud
    - Cloud-native controls offered by services providers
    - Third-party options to enhance monitoring and visibility strategies
    - How to tie event monitoring, vulnerability scanning and control planes together to enhance visibility

    Register for this webcast to be among the first to receive the associated whitepaper written by Dave Shackleford.

    Speaker Bios

    Dave Shackleford, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security.

    David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA's that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
  • Proactive Preparation: Disaster-Proofing your Data
    Proactive Preparation: Disaster-Proofing your Data
    Seyi Verma, Director of Product Marketing, Druva Recorded: Apr 24 2019 56 mins
    Imagine that you're responsible for a massive construction project and you just lost your data due to a disaster. Blueprints? Gone. Timelines? Gone. Drinks? Might be time for one!

    Losing your data is a reality that every company faces—construction is no exception. That's why Egan Company—a leading specialty trades contractor in Minnesota, unsatisfied with their previous backup products)—turned to Druva Phoenix to ensure their critical data was backed up and fully accessible in the event of a disaster.

    Join this informative webinar with experts from Egan Company and Druva, and learn about:

    - The flexibility, security and value of data protection delivered as-a-service in the cloud
    - How Egan Company enjoys fast, reliable restores, including large-scale VM volumes
    - How Druva Phoenix offers the go-to solution for backup, archival, and disaster recovery
  • WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    WISSENSMANAGEMENT DER SCHLÜSSEL ZU EINER ZUKUNFT MIT KI
    Aria Naderi Recorded: Apr 24 2019 55 mins
    Künstliche Intelligenz, einst auf den Großbildschirm beschränkt, steht den Verbrauchern in Grundform mit Alexa-, Siri- und selbstfahrenden Tesla-Autos zur Verfügung. Aber was bedeutet das für die Wirtschaft? Wir haben vielleicht noch keine Ex-Machina-ähnlichen Roboter, aber engagierte "Futuristen" schließen sich in vielen Unternehmen der C-Suite an, um zukunftssichere Entscheidungen zu treffen und sich auf zukünftige technologische Innovationen vorzubereiten.

    KI-Tools basieren auf datenbankgestützter, prädiktiver Technologie, die die kognitive Leistungsfähigkeit des Menschen verbessert. Lernen Sie mit uns, wie Sie mit guten Wissensmanagementpraktiken eine solide Grundlage für KI-Initiativen schaffen können.
  • 2019 Cyberthreat Defense Report
    2019 Cyberthreat Defense Report
    Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide Security Recorded: Apr 23 2019 59 mins
    New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:

    •Gain pervasive visibility into your network for better threat hunting
    •Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
    •Become more effective by delivering optimized traffic to tools
    •Overcome skills shortages and retain key staff through efficiency, automation and orchestration
    •Accelerate deployment and integration of new security tools

    Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
    Register now!
  • Unbreakable API’s: Best Practices for Application Security Testing
    Unbreakable API’s: Best Practices for Application Security Testing
    Eric Sheridan, Chief Scientist, WhiteHat Security Recorded: Apr 23 2019 39 mins
    APIs are doors into your data and applications, so pausing to include security is just as important as securing web applications. In this presentation we will discuss best practices to ensure that APIs have full security coverage, and how teams can find and fix vulnerabilities before problems arise.

    We’ll also cover the inflection points for security assessment in the software development life cycle (SDLC) as they may vary depending on whether the development team is enabling APIs for legacy applications or building new API-first applications. Join us to learn best practices on when to:

    -Perform DAST of APIs for dynamic scanning, and create a plan for remediating/mitigating discovered vulnerabilities
    -Perform SCA & SAST analysis for the API implementation code within the DevOps process
    -Use secure design patterns within the enterprise application architecture
    -Implement a robust feedback loop within the SDLC to act on the findings of various scans
  • The Future of Identity Management 2019-2024
    The Future of Identity Management 2019-2024
    Gary Rowe, CEO Principal Consulting Analyst for TechVision Research & Lisa Grady, Solutions Architect with Radiant Logic Recorded: Apr 23 2019 59 mins
    Where is identity management heading in the next five years? Join Radiant Logic and TechVision Research for an important discussion of technology trends and learn how a federated identity and directory service is a vital part of your digital transformation.
    Large enterprises often have complex identity infrastructures already in place; with identity data spread across many heterogeneous data sources—multiple AD domains and forests, other directories, databases, applications, web services/APIs—along with a multitude of legacy applications that rely on those sources. To prepare for the future of IAM, enterprises will generally require a rationalization of, integration with, and ultimately migration to this next generation identity infrastructure.

    This webinar will show you:

    •Technology trends and where identity management is heading in the next five years
    •The role of a federated identity and directory service in digital transformation
    •TechVision Research’s top 10 List of Key Identity Management Trends
  • CCPA: How Startups and SMBs Can Prepare Without Panicking
    CCPA: How Startups and SMBs Can Prepare Without Panicking
    Jill Reber, CEO, Primitive Logic; Kevin Moos, President, Primitive Logic; David Jarzabek, Attorney, Royse Law Recorded: Apr 23 2019 59 mins
    The California Consumer Privacy Act (CCPA) impacts companies of all sizes, including startups and SMBs. CCPA will expand the privacy obligations of all organizations far beyond those required by current state privacy legislation (CalOPPA, etc.), and all organizations who gather and process personal data of California residents must be prepared. Fortunately, the right strategies can make this process easier than you may have thought.

    Join Primitive Logic and Royse Law to learn
    - Why CCPA readiness doesn’t have to “break the bank”
    - How to develop a cost-effective plan to get ready for CCPA
    - How to prepare for private right of action under CCPA and potential amendments
    - How data privacy is becoming part of standard M&A due diligence practices
  • How to Keep Your Cyber Defenders Sharp: Do You have the right people?
    How to Keep Your Cyber Defenders Sharp: Do You have the right people?
    David Morris and Brian Markus Recorded: Apr 23 2019 62 mins
    Tune into this session to learn how to determine if you have the right people with the sharpest skills defending your organization through the use of a Cyber Training Range.

    Learn what are Persistent Cyber Training Range Environments, the benefits and value of a Cyber Training Range and how they help you answer the question ARE WE READY TO DEFEND AGAINST THE NEXT ATTACK?".
  • CISSP Exam Prep Clinic #5: Difference between CISSP and CISSP Associate status
    CISSP Exam Prep Clinic #5: Difference between CISSP and CISSP Associate status
    Mission Critical Institute Recorded: Apr 23 2019 27 mins
    Learn about the CISSP employment endorsement and the CISSP Associate Status.

    In Clinic #5, you will learn about the CISSP employer endorsement and how it works. You will also learn what happens when you pass the exam but still cannot meet all of the CISSP employment requirements. Specifically, you receive information about the CISSP Associate status and how employers will respond to you when you pass the exam and still need more experience.


    If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    These five Clinics include tips for all 8 CISSP domains covered in the exam.

    Register today and move closer to your goal!

    SPONSORED BY: Mission Critical Institute
  • Riding New Data Regulation Waves: Intro to CCPA
    Riding New Data Regulation Waves: Intro to CCPA
    Victoria McIntosh, Information & Privacy Professional Recorded: Apr 23 2019 55 mins
    Surf's up! Coming into force in 2020 is the California Consumer Privacy Law. As a new privacy law in the United States, the CCPL breaks significant ground. Following international trends, those living in California will soon have stronger privacy rights.

    If you do business in the state or process data on California residents, time to pay attention. Get amped with Privacy Technologist Victoria McIntosh, breaking down what you need to know about the new regulation.
  • The Perfect ICS Cyber Storm - And What You Need To Weather It
    The Perfect ICS Cyber Storm - And What You Need To Weather It
    Michael Rothschild Recorded: Apr 23 2019 55 mins
    Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. A confluence of trends has caused all the right conditions for the perfect and potentially devastating security event. This session will immerse you in this rapidly evolving topic and provide you with the expertise to weather the next category 5 cyber storm.
  • Conducting Security Risk Assessments in the Financial Services Industry
    Conducting Security Risk Assessments in the Financial Services Industry
    24By7Security, Inc. Recorded: Apr 23 2019 55 mins
    The Financial Services Industry is heavily regulated and is also a major target for cyber crime. Conducting periodic Security Risk Assessments is not only a best practice but often may be a requirement. Learn from a leading Cybersecurity expert about the process of conducting security risk assessments in the financial services industry.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • Dartmouth College's Network of the Future is Powered by AI
    Dartmouth College's Network of the Future is Powered by AI
    Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth College Recorded: Apr 23 2019 60 mins
    When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.

    In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.

    Watch now, and learn how to:

    -Gain visibility into the Wi-Fi user experience
    -Quickly troubleshoot network problems with an AI-driven virtual assistant
    -Predict network problems before they arise
    -Implement personalized location services, such as wayfinding and proximity notifications
  • La gestion des actifs numériques redéfinie
    La gestion des actifs numériques redéfinie
    Jade McQueen, Senior Managing Director, Media & Entertainment Recorded: Apr 23 2019 22 mins
    Travaillez, stockez et collaborez en toute sécurité sur vos différents actifs multimédias

    Des images de campagne marketing aux fichiers vidéo, les ressources numériques sont au cœur des flux de travail de toutes les entreprises. En l'absence d'un système centralisé de gestion des actifs numériques, il devient difficile de rechercher le bon actif lorsque vous en avez besoin. La gestion de contenu peut rapidement devenir un défi lorsque les ressources sont modifiées et sauvegardées dans différents systèmes. En outre, un manque de mesures de sécurité adaptées crée des risques de perte de documents confidentiels ou non publiés. Box fournit un guichet unique pour tous vos actifs numériques, quel que soit leur format et vous permet de collaborer en temps réel avec des commentaires et un marquage automatisé des métadonnées afin que tout le monde puisse facilement trouver la dernière version. De plus, Box vous permet d'automatiser intelligemment les workflows jusqu'à l'approbation, en évitant les erreurs dues à des tâches manuelles. De la création à la publication, vous pouvez gérer tous vos actifs numériques de manière sécurisée et efficace.
  • Poor Data Quality - Do it better with Data Engineering with Pentaho from Hitachi
    Poor Data Quality - Do it better with Data Engineering with Pentaho from Hitachi
    Kim Øystein Næss, Lead Architect Analytics EMEA, Hitachi Vantara Recorded: Apr 23 2019 26 mins
    Watch this session to get insights on:

    - The value of an easy to use interface with advanced capabilities for data engineering
    - How to correctly process data engineering.
    - The collaboration between business analysts, data scientists and data engineers
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring
    Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring
    Anand Visvanathan, Director of Product Management, Symantec and Linda Park, Sr. Manager IaaS, Security & Compliance, Symantec Apr 25 2019 5:00 am UTC 45 mins
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    • Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    • Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    • How to migrate your legacy infrastructure to the cloud without compromising security and compliance

    Please Join Us, Register Today
  • Taking the Oh out of IoT
    Taking the Oh out of IoT
    Richard Leadbetter, Technical Sales Specialist, EMEA Apr 25 2019 9:00 am UTC 30 mins
    By 2019, 92% of industrial organizations will have adopted Internet of Things (IoT) technology and 77% believe it will transform manufacturing. But, how are business executives using IoT today and what do they expect from it in the future? Join us and find out
  • Live Demo: Email Fraud Defense
    Live Demo: Email Fraud Defense
    Ash Valeski, Director Product Management, Proofpoint Apr 25 2019 9:00 am UTC 30 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • 5 Steps to Delivering Many Sites, Lowering Costs, and Improving Governance
    5 Steps to Delivering Many Sites, Lowering Costs, and Improving Governance
    Jenni Lee, Product Marketing Manager, Acquia Apr 25 2019 10:00 am UTC 28 mins
    In this webinar, we will cover the following topics:

    - How to transform your IT digital team from a “bottleneck” to a trusted service provider
    - How to implement a site-governance strategy across your organization
    - Best practices for expediting website development and delivery
  • Quoi de neuf chez Box? 
    Quoi de neuf chez Box? 
    Vincent Lieffroy, Senior Lead Engineer Apr 25 2019 12:30 pm UTC 60 mins
    Les entreprises doivent agir plus rapidement que jamais dans un monde caractérisé par une hyper-concurrence et par les attentes grandissantes des clients.
    C'est pourquoi nous avons conçu le Cloud Content Management (CCM) - une plate-forme unique pour accélérer vos processus métier, augmenter la satisfaction de vos employés et protéger vos informations les plus précieuses. Découvrez les nouveautés du cloud content management (CCM) en assistant à ce webinaire:

    - Collaboration aisée et sécurisée dans Google Docs, Sheets et Slides, grâce à notre nouvelle intégration avec G-Suite
    - Productivité permanente avec Mark for Offline - emportez vos fichiers Box avec vous lorsque vous n'êtes pas en ligne (vos modifications sont automatiquement enregistrées dans Box lorsque vous vous reconnectez)
    - Des workflows de contenus fiabilisés avec Box pour ServiceNow Integration Hub
    - Des cycles de développement d'applications accélérés avec Box Elements
  • Qualité des données : reprenez confiance dans vos prises de décision
    Qualité des données : reprenez confiance dans vos prises de décision
    Anass Bezzari, Senior Pre-Sales Consultant Apr 25 2019 12:30 pm UTC 60 mins
    Selon une étude de la Harvard Business Review, en moyenne 47% des nouvelles données ont, au moins, une erreur importante.

    Que vos données soient structurées, non structurées, stockées sur site ou dans le Cloud, vous devez pouvoir vous fier à leur exactitude. Vous concrétiserez leur valeur métier en veillant à ce que tous les projets et les processus importants soient alimentés en données fiables et pertinentes.

    Avec les produits de qualité et de gouvernance des données d'Informatica, vous avez la possibilité d'accroître la valeur métier en veillant à ce que tous les projets et les processus importants soient alimentés en données fiables et pertinentes.

    Participez à ce webinar jeudi 25 avril à 14h30.
  • How to Classify and Protect Your Data in One Easy Step
    How to Classify and Protect Your Data in One Easy Step
    Bill Belcher, Amit Kharat, Kristina Scott Apr 25 2019 3:00 pm UTC 45 mins
    Recent innovations have made data security achievable for organizations of all sizes and industries. It’s now possible to quickly and effectively reduce the risk of data breaches and leaks.
    Get up to speed with the 5 innovations every Security and IT professional should be aware of – to gain the confidence that their organization’s most sensitive information stays secure, these include:

    1. Classification-driven protection
    2. DLP-driven protection
    3. Email auto-protection
    4. Automated protection with enterprise applications
    5. Orchestrated policy management, identity federation, and data tracking for compliance

    Join this webinar to learn how integrated data classification and data protection from two industry leaders, Boldon James and Seclore, makes data security as straightforward as 1-2-3.
  • [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEA Apr 25 2019 3:00 pm UTC 60 mins
    As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.

    So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.

    From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.

    Moderator: Daniel Blander, Virtual Clarity
    Panelists:
    Joseph Feiman, Chief Strategy Officer, WhiteHat Security
    Paul Farrington, CTO, Veracode EMEA
  • Show and Tell: Discover Blue Prism v6.5 & Digital Exchange Updates
    Show and Tell: Discover Blue Prism v6.5 & Digital Exchange Updates
    Robert Nicklin, Product Owner, Blue Prism | Bart Peluso, SVP of Product Marketing, Blue Prism Apr 25 2019 3:00 pm UTC 75 mins
    Join us on April 25th for a preview of find out what is coming with Blue Prism’s v6.5.

    The latest version of our software will include:

    • Full Japanese and simplified Chinese language capabilities - Through a simple drop-down box a customer can select their preferred language on the Blue Prism UI.
    • Data gateways - A new mechanism that allows customers much more control of their data, with the option to send data as duplicates of what is stored in the BP database or to send the information only to the external end point, significantly reducing the amount of database space used for data storage.
    • IPv6 support - Through this feature Blue Prism customers can be confident our connected-RPA platform is ready to evolve with customer environments as they plan, test and take actions to start their transition to using IPv6.
    • Latest updates from the Blue Prism Digital Exchange

    Speakers:
    • Robert Nicklin, Product Owner, Blue Prism
    • Bart Peluso, SVP of Product Marketing, Blue Prism
    • Richard Pauly, Head of Digital Exchange, Blue Prism

    If you have a burning product question to ask, make sure to pre-register and join us on April 25th for this live webinar. If you can’t make it on the day, you can easily watch a recording of the session from our webinar page, after the event.
  • Top Cybersecurity Practices (HICP) to Mitigate Cyber Threats in Healthcare
    Top Cybersecurity Practices (HICP) to Mitigate Cyber Threats in Healthcare
    Erik Decker, CISO & CPO, University of Chicago Medicine & Ellen Sundra, VP of Engineering at Forescout Apr 25 2019 3:00 pm UTC 60 mins
    Join Erik Decker, Chief Information Security Officer and Chief Privacy Officer of the University of Chicago Medicine and Ellen Sundra, VP of Engineering at Forescout, to learn how to protect patients by applying the recommended principles and practices from Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP).

    Over the past decade, threats to the health care industry has increased dramatically along with the sophistication of cyber-attacks. As a result, the Healthcare Sector Coordinating Council and the US Department of Health and Human Services collaborated to establish cybersecurity practices that can be used across the healthcare industry. Our guest, Erik Decker, serves as the industry lead on the development of, “Health Industry Cybersecurity Practices (HICP)”, which resulted from insights of the task group and over 150 health IT professionals.

    Ellen Sundra leads this discussion to gain insights into actionable steps that health industry IT and HTM security professionals can establish, implement and maintain in their organizations to thwart cyber-attacks before they occur.

    What you will learn in this webinar:
    - How to reduce risk to the business by implementing solid security practices
    - Which are top security practices to consider when facing some of healthcare’s top issues
    - How using policy-based controls can simplify processes and protect the organization
  • Email Security.cloud: A walkthrough of the latest product enhancements
    Email Security.cloud: A walkthrough of the latest product enhancements
    Jimmy Lin, Sr. Product Manager, Symantec Apr 25 2019 3:00 pm UTC 60 mins
    On 29 March 2019, we further extended the capabilities of Symantec Email Security.cloud. As a SaaS security service, it undergoes many upgrades throughout the year, allowing us to make improvements and add new capabilities. We have always understood the importance of ensuring our products are designed around the user’s needs. This is critical as our customers rely on Symantec to provide a highly practical solution.

    In this webinar, we’ll do a deep dive into some of the recent enhancements of our Email Security.cloud solution:

    Indicators of Compromise Blacklisting
    Service Configuration Health
    Symantec Email Security.cloud App for QRadar
    And more
  • It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    George Johnson, Vice President of Cyber Solutions, NC4 and Thanh Nguyen, Vice President of Technology, NC4 Apr 25 2019 4:00 pm UTC 43 mins
    We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?

    NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
  • Top 10 Application Security Vulnerabilities for Developers
    Top 10 Application Security Vulnerabilities for Developers
    Mark Rogan, DAST Manager, WhiteHat Security & Calvin Nguyen, Director of Product Management, WhiteHat Security Apr 25 2019 4:00 pm UTC 60 mins
    Today’s applications touch millions if not billions of people on a daily basis. With virtually every business using applications to grow, they are critical to companies’ success—yet the vulnerabilities and risks associated with them continue to increase exponentially.

    To help educate the market on avoiding breaches of this nature, the experts at the WhiteHat Security Threat Research Center (TRC) have compiled a Top 10 Application Security Vulnerabilities for Developers, detailing the most common web exploits used by malicious attackers during the past 12 months.

    Join Mark Rogan from the WhiteHat Security Threat Research Center and Calvin Nguyen, Director of Product Management, as they discuss the top vulnerabilities and give valuable prevention tips for enterprises to implement.
  • Optimize Your Third-Party Protection Program
    Optimize Your Third-Party Protection Program
    Bob Maley, Normshield; Tony Rock, Lockpath Apr 25 2019 4:00 pm UTC 60 mins
    Interaction between the financial industry and third-parties has become more complicated due to the combined risk of the financial industry's rapid growth and an increase in third-party relationships.

    In this exclusive webinar, Bob Maley, Chief Security Officer of Normshield, Inc., who designed information security programs from the ground up for major financial services organizations, will share his perspective of third-party risk in the financial services industry. He’ll discuss common financial third-party risk challenges and trends in the market, best practices and challenging scenarios from his career and how he resolved them.

    As an attendee you’ll learn how his real-world third-party risk examples, best practices and recommendations can apply to your organization’s unique needs. Discover how to build and mature a successful third-party risk program in financial services by attending this educational webinar.

    Register now!
  • How to Get Hired for Top Cyber Security Job with No Degree – Part 2
    How to Get Hired for Top Cyber Security Job with No Degree – Part 2
    Dr. V. N. Berlin, CEO, Mission Critical Institute, Rob Chubbuck, Information Assurance Systems Engineer, CACI International Apr 25 2019 4:30 pm UTC 60 mins
    Hear from a top cyber security employer exactly how you can get hired for a cyber breach prevention job without a degree in this four-part webinar series.

    Let Rob Chubbuck, senior cyber security expert at CACI International, tell you how he decides to hire candidates without degrees to cyber security teams.

    This webinar series will take you inside the recruiting process and you will learn the answers to these questions:

    1. How big is the opportunity for cyber breach prevention?
    2. How fast is that opportunity growing?
    3. Why will he consider candidates without a degree?
    4. What skills does he look for in a candidate?
    5. What tools does he want a candidate to have experience using?
    6. What experience should a candidate have for him to consider without a degree?
    7. What personal characteristics are essential to him?
    8. What academic credentials does he want a candidate to have?
    9. What additional academic credentials does he want a candidate to earn?
    10. What certifications does he want a candidate to have?
    11. What additional certifications does he want a candidate to earn?
    12. What does he look for in a resume to schedule a phone screen?
    13. What must a candidate do in a phone screen to get the interview?
    14. What kinds of questions are asked in the interview?
    15. What answers does he look for?
    16. What professional development plans does he want candidates to have?

    This unique webinar series will tell you exactly what motivates an employer to hire a candidate without a degree into a top cyber breach prevention position.

    Seating is limited to 75, so register now to reserve your spot!

    ADDED WEBINAR BENEFITS: Register for the webinar and download the attachments to prepare for the interview. Download the CCRMP Career Readiness Assessment and schedule an interview with an MCI Cybersecurity Education Specialist to fast-track your cyber security career today.

    Also included are complimentary $500 CISSP Exam Vouchers and $1995 CISSP Exam Prep Course Vouchers.
  • Take the Offensive: Unlock Your Siloed Content
    Take the Offensive: Unlock Your Siloed Content
    Tom DiRusso, ASG & Steve Studer, Zia Consulting Apr 25 2019 5:00 pm UTC 45 mins
    Are you one of the many organizations with content in a variety of silos? You probably are – and you’re not alone - most organizations today are also siloed. It’s clear that this siloed approach creates a huge challenge for companies in meeting stringent compliance regulations. Sound familiar? Now, imagine if your Teams had the ability to search and action content as though it resided in one location – with easy access and usability. Get the picture?

    Join ASG & Zia to discover how you can gather and understand your content across various silos to ensure you are on the ‘Offensive’ with compliance regulations.

    During this session, we’ll discuss:
    - Why some of the largest financial institutions have taken an ‘Offensive Approach’ to managing static and streaming content to comply with laws and regulations
    - How you can federate, migrate and manage records in one place
    - New ways to identify, classify and dispose of records
    - Why it’s critical to have a records management solution that has a repository of records that is auditable and defendable
  • Creating compelling customer experiences through MDM with Stibo Systems
    Creating compelling customer experiences through MDM with Stibo Systems
    Rob Long, Head of IoT & Senior Director Applied Technology at Stibo & Vishnu Samavedula, Senior Solution Engineer at MuleSoft Apr 25 2019 5:00 pm UTC 35 mins
    Did you know that each retail customer transaction takes an average of 39 different backend systems to complete? Overlapping systems, complex backend integrations, and constant maintenance needs are crippling IT teams as they work to drive the innovation necessary to meet growing consumer expectations.

    This webinar examines how retailers are leveraging MuleSoft’s Anypoint Platform and Stibo Systems Master Data Management platform to bridge online and offline channels, resulting in deeper customer insights, simplified operations, and exceptional customer experiences. Retailers leveraging this approach are seeing an average of a 6% increase in profitability and a 6x increase in customer retention

    In this webinar, you will learn how to:
    - Streamline product lifecycle management processes with your eCommerce systems.
    - Leverage Master Data Management to gain visibility across inventory and customer data.
    - Deliver personalized customer experiences based on past behaviors and purchases.
  • Your Browser Betrays You
    Your Browser Betrays You
    Mark Sarbiewski and John Klassen Apr 25 2019 5:00 pm UTC 45 mins
    Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.
  • Raising the bar on content moderation for social & gaming platforms
    Raising the bar on content moderation for social & gaming platforms
    Two Hat Security Apr 25 2019 5:00 pm UTC 60 mins
    Social networks today are undergoing a massive paradigm shift when it comes to content moderation. From tragic shootings broadcast live on Facebook, to YouTube removing comments on children's videos due to child predator concerns, social platforms are under fire from users, governments, and law enforcement to adopt better technology and strengthen their content moderation practices.

    It’s not all bad news. Business leaders have also realized that accurate, efficient moderation, coupled with positive reinforcement, can increase user retention and encourage growth.

    But who is responsible for enforcing these policies and practices? How did hate speech, abuse, and extremism become the "cost of being online"? And how can like-minded businesses band together to raise the bar and make their social platforms engaging, safe for all users, and ultimately, more profitable?

    Join Two Hat CEO and founder Chris Priebe and veteran analyst and market influencer Brian Solis for an insightful talk about the changing landscape of online conversations and the role of content moderation. Social abuse and objectionable materials need no longer be the price of admission.

    Register today for this free event!

    You’ll learn:

    * How to start a dialogue in your organization around protecting your audience without imposing on free speech
    * The business benefits of joining the growing movement to "raise the bar"
    * Practical tips and content moderation strategies from industry veterans
    * Why Two Hat’s blend of AI+HI (artificial intelligence + human interaction) is the first step towards solving today’s content moderation challenges

    Speakers:

    * Brian Solis, Principal Digital Analyst at Altimeter, author of "Lifescale"
    * Chris Priebe, CEO & founder of Two Hat Security
    * Stewart Rogers, VentureBeat
  • Buying Down Risk in the New World of App Development - Imperva Part 2
    Buying Down Risk in the New World of App Development - Imperva Part 2
    Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator) Apr 25 2019 5:00 pm UTC 60 mins
    In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
  • The Rise of Privacy in the Cloud Era
    The Rise of Privacy in the Cloud Era
    Neil Thacker, CISO, Netskope Apr 25 2019 5:00 pm UTC 60 mins
    In a globally connected world where the number of cloud applications consumed by organisations rises daily, the challenges associated with protecting data and individual’s privacy are therefore also on the rise.

    In this webcast we will look at some of the challenges associated with privacy including:
    - Understanding contractual obligations
    - Managing the geolocation of data
    - Applying data transfers mechanisms and controls
  • [Earn 1 CPE] Key Steps to Identify Risk and Master Vendor Risk Management
    [Earn 1 CPE] Key Steps to Identify Risk and Master Vendor Risk Management
    Colin Whittaker, IRD; Jake Olcott, BitSight; Blake Brannon, OneTrust; Kelly White, RiskRecon; and Todd Boehler, ProcessUnity. Apr 25 2019 5:00 pm UTC 75 mins
    In today’s interconnected technology ecosystem, companies increasingly rely on third party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program. Join this CPE accredited panel webinar as our expert panel address some key steps to master VRM, including:

    - Implementing a scalable VRM program from the ground up,
    - Tips on managing vendor data and mapping the digital supply chain,
    - Assessing third, fourth, and fifth-party risk,
    - Performing quantifiable vendor security analyses,
    - Establishing pre-procurement standards.
  • Incident Response Masterclass: Investigate a Rogue Insider
    Incident Response Masterclass: Investigate a Rogue Insider
    Matt Radolec Apr 25 2019 6:00 pm UTC 59 mins
    Join for a play-by-play of a live attack simulation and investigation of a rogue insider threat using DatAlert’s new DFIR capabilities.

    During this training session, our security analysts will execute a new attack scenario in our lab.

    Here’s the scenario:
    An insider was paid to exfiltrate sensitive organizational data
    To remain uncovered, he takes control on a service account
    Using the service account, he scans company filers for documents with indicating keywords
    Copies matching documents to his PC
    Creates an encrypted ZIP file
    To remain uncovered, he uses the service account to upload the ZIP file to an external Gmail account
  • Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked
    Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked
    Louis Evans, Product Marketing Manager & Todd Thiemann, Director of Product Marketing - Arctic Wolf Networks Apr 25 2019 6:00 pm UTC 48 mins
    At Arctic Wolf, we continually encounter IT security myths that persist among businesses of every size. Isn’t antivirus all you need for cybersecurity? Aren’t large enterprises the only ones affected by data breaches? 24x7 security monitoring is overkill, right? These myths can significantly impact strategic IT decisions and put your business operations at risk.

    These are the kinds of questions, myths, and cybersecurity urban legends we’ll explore in this webinar. Discover what’s true—and what’s simply a myth.

    The webinar covers:

    •6 common myths about cybersecurity and cyber risk
    •The threats these myths pose to your business
    •Cybersecurity facts you can use to protect yourself

    Let the Arctic Wolf Cybersecurity Mythbusters team educate and entertain you. Save your seat now!

    And click here: http://bit.ly/2B3lyFv for part one of our six-part “mythbuster” blog series.