Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Il tempo scorre: agisci ora per accelerare il tuo viaggio verso il GDPR
    Il tempo scorre: agisci ora per accelerare il tuo viaggio verso il GDPR Giampiero Nanni Recorded: Feb 23 2018 64 mins
    Mancano pochi mesi alla scadenza del GDPR, e non c’è tempo da perdere. Che cosa puoi fare, praticamente, in questo momento per prepararti al meglio? Organizzato dagli esperti in sicurezza Symantec, il webinar “90 giorni al GDPR” è ricco di suggerimenti e consigli essenziali.

    A prescindere dal tuo livello di preparazione, questo webinar ti aiuterà a capire la tua posizione, offrendoti consigli pratici e concreti da attuare prima della scadenza di maggio.

    Non affidarti al caso: registrati ora.

    Se non lo hai già fatto, prima di seguire il webinar completa il modulo di valutazione d el tuo stato di preparazione al GDPR (GDPR Readiness Assessment) di IDC: ti permetterà di capire a che punto sei nella tua pianificazione per realizzare la compliance al GDPR.

    Completa la valutazione >>
    REGISTRATI SUBITO
  • Die Uhr tickt: stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung
    Die Uhr tickt: stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung Symantec, Alexander Peters Recorded: Feb 23 2018 61 mins
    Handeln Sie jetzt – und stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung

    Verlieren Sie keine Zeit – die DSGVO kommt schon in einigen Monaten. Aber wie können Sie sich aktiv darauf vorbereiten? Im Webinar
    ‘Noch 90 Tage bis zur DSGVO’ geben Ihnen die Symantec Experten v iele praxisnahe Tipps für die Umsetzung.

    Ganz egal, wie weit Sie mit Ihrer Vorbereitung heute sind: Im Webinar erfahren Sie, wo Sie aktuell stehen, und erhalten rechtzeitig vor dem Stichtag im Mai klare, handlungsrelevante Tipps.

    Gehen Sie kein Risiko ein – melden Sie sich noch heute an.

    Vor der Teilnahme am Webinar sollten Sie, wenn es noch nicht gesche hen ist, auch das GDPR Readiness Assessment von IDC
    absolvieren. Es hilft Ihnen einzuschätzen, wie weit Ihre Vorbereitung vorangeschritten ist.

    Zum Assessment •http://symantecgdpr.idcready.net/de/?utm=aI638CIsFU

    JETZT ANMELDEN
  • El tiempo corre: haga algo ahora mismo para hacer frente al RGPD
    El tiempo corre: haga algo ahora mismo para hacer frente al RGPD Ramses Gallego, Strategist Symantec Recorded: Feb 23 2018 55 mins
    Faltan pocos meses para que el nuevo RGPD entre en vigor, por lo que no hay tiempo que perder. ¿Sabe qué puede hacer desde ahora mismo para prepararse debidamente? Organizado p or los expertos de Symantec, el seminario web «90 días para el RGPD» incluye numerosos consejos y técnicas al respecto.

    Independientemente de la etapa de preparación en la que se encuentre su organización, este seminario web le ayudará a entender el nivel de preparación de su organización y, además, le ofrece pasos prácticos y ejecutables para cumplir con la fecha límite de mayo.

    No se la juegue e inscríbase ahora mismo.

    Pero antes de asistir al seminario web, si no lo ha hecho aún, sería muy útil que realizara la evaluación de preparación para el RDPG preparada por IDC. Esta le ayudará a determinar en qué etapa se encuentra su plan de preparaci ón para el RGPD.
    Realice la evaluación INSCRÍBASE YA
  • Training Snapshot: Proximity Searching From CloudNine
    Training Snapshot: Proximity Searching From CloudNine Brian Kelley Recorded: Feb 22 2018 5 mins
    A snapshot demonstration of the process and syntax required to perform proximity searches within CloudNine to locate responsive terms that are not only in the same document, but close to each other without having to be in an exact phrase.

    When performing keyword searching, the challenge to performing those searches effectively is to balance recall (retrieving responsive documents with hits) and precision (not retrieving too many non-responsive documents with hits). One way to achieve that balance is through proximity searching, which is simply searching for two or more words that appear close to each other in the document. Proximity searching is more precise then an AND search (where two terms can appear in the document together but be completely unrelated) with more recall than a phrase search (where the terms must be exactly together in that order), so proximity searching can be a valuable search strategy for striking the proper balance in your search results.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • GDPR's Effect On Internet Application Developers and Security Professionals
    GDPR's Effect On Internet Application Developers and Security Professionals Eric Greenfeder Primitive Logic, Nathan Wenzler AsTech, Michael Rubin Latham & Watkins, and Robert Shields Informatica Recorded: Feb 22 2018 58 mins
    Join this panel discussion of technology solution, information security, legal privacy and data protection experts along with Informatica’s Director of Product Marketing for Data Security to find out:

    - How does GDPR change the way security is approached by both Internet application developers and security professionals?

    - What are the rights provided to data subjects by GDPR and how does this change the way Internet business applications must be designed and secured?

    - How can organizations demonstrate the GDPR requirements for Article 25: Data Protection by Design and by Default?

    Day 3 of 3 day series:
    Day 3 - Focus on Security side of GDPR from a technology perspective

    ~ Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
    ~ Day 2 – Focus on Privacy side of GDPR from a technology perspective

    Speakers:
    Eric Greenfeder, Primitive Logic Chief Architect
    Nathan Wenzler, AsTech Consulting, Chief Security Strategist
    Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection
    Robert Shields, Informatica Director Product Marketing for Data Security
  • Benefits of a Cloud-First Approach for Modern Enterprises
    Benefits of a Cloud-First Approach for Modern Enterprises Todd Bernhard, Product Marketing Manager Recorded: Feb 22 2018 24 mins
    Is a cloud-first approach right for your organization? Cloud-first offers a leaner, more efficient, and more manageable approach to enterprise functionality than legacy architecture.

    In this webinar learn more about the benefits of having and cloud-first approach, and how it can positively impact your business.
  • My Friend, My Enemy
    My Friend, My Enemy Erich Kron CISSP, Security Awareness Advocate Recorded: Feb 22 2018 31 mins
    It’s always nice to find a kindred spirit — someone who knows what you know and likes what you like. The problem today is that kindred spirit whom you think is your friend might well be your worst enemy. One of the most effective tools attackers use to breach everything from high-security networks and physical installations to your most closely held secrets is social engineering. This webinar looks at how social engineering works, why it works as well as it does, how to identify an attack and what to do if you think you’ve been compromised.
  • Insider Threats – Best Practices for Detecting and Preventing an Attack
    Insider Threats – Best Practices for Detecting and Preventing an Attack David Duncan, VP Security Marketing at CA Technologies Recorded: Feb 22 2018 50 mins
    Your biggest security risk may be inside your organization. Today’s most damaging threats don’t originate from criminal outsiders or malware but from insiders - both malicious and careless. So, are there preventative options?

    Join this candid discussion of cybersecurity experts – featuring David Duncan, VP Security Marketing at CA Technologies – as they reveal best practices to protect your organization and review key findings from the latest 2018 Insider Threat Report, including:

    • Why 90% of organizations feel vulnerable to insider attacks
    • How the use of behavior and data monitoring is accelerating
    • What popular technologies can help detect, deter and prevent insider attacks

    All registrants will receive a full copy of the new 2018 Insider Threats Report.

    This Panel Discussion is hosted by Cybersecurity Insiders
  • What GDPR Means for Your Security
    What GDPR Means for Your Security Adenike Cosgrove, Cyber Security Strategist at Proofpoint Recorded: Feb 22 2018 46 mins
    For many, GDPR is a challenging undertaking that requires new processes, technology, skills, and oversights. It demands new ways to design privacy that places the protection of EU citizen and resident data at its core.

    Join us as we discuss how organizations can meet the GDPR requirements and the security implications for your organization.

    Join us to hear how to:

    • Discover and classify personal data.
    • Protect all personal data by developing and implementing appropriate security controls.
    • Enhance security controls by monitoring, detecting, responding, and reporting on all policy violations and external threats.
  • Four Essential Strategies for Endpoint Security and Protection
    Four Essential Strategies for Endpoint Security and Protection Richard Henderson, Global Security Strategist, Absolute Recorded: Feb 22 2018 62 mins
    When it comes to endpoint security, the playing field has changed. Threats are more dangerous and prevalent than ever before. Global security standards are more rigid, and the penalties for non-compliance more severe. Yesterday’s security strategy isn’t going to protect you from tomorrow’s attacks.

    Register now for this important webinar that takes a deep dive into the four essential strategies for endpoint security and protection. Featuring Richard Henderson, Global Security Strategist at Absolute, you’ll learn how to:

    • Get ahead of threats and prevent incidents before they happen
    • Implement continuous assessment for regulatory compliance
    • Dramatically minimize risk through effective technologies and processes should an incident occur

    Learn the key strategies for building and maintaining a comprehensive ecosystem of management and security controls for all of your endpoints. Register to watch this webinar now.
  • Sysdig Monitor Overview
    Sysdig Monitor Overview Eric Carter, Director, Product Marketing, Sysdig Recorded: Feb 22 2018 54 mins
    Container-based infrastructure radically changes what’s required for monitoring, troubleshooting and alerting. How do you see what’s happening inside containers? How do you monitor the performance of distributed services orchestrated by tools like Kubernetes? How do you get complete visibility without bloating your container images?

    Watch this webinar for an introduction of Sysdig Monitor, part of the Sysdig Container Intelligence Platform. In this session we will discuss and demo:

    - How to monitor services and apps built on top of containers
    - The benefits of transparent instrumentation for metric collection
    - Using dashboards to quickly see and share performance data
    - How to quickly determine the what and the why of what’s happening in your environment
  • GDPR: Brace for Impact or Not?
    GDPR: Brace for Impact or Not? Lance James | Mark Rasch | Martyn Hope | David Morris Recorded: Feb 22 2018 64 mins
    The GDPR compliance date is fastly approaching and many companies will not be compliant. What will this mean for them, what can they do over the remaining time left and what will the impact mean?

    Join this panel of world-class experts:

    Lance James: Chief Scientist at Flashpoint, internationally renowned Cybersecurity Specialist who has advised Boards and CISO’s at a wide range of government and F-500 organizations. Frequent lecturer and speaker.

    Mark Rasch: Chief Legal and Compliance Partner for Digital Risk Management & GDPR. Former Chief Security Evangelist for Verizon Enterprise Solutions, Chief Privacy Officer at SAIC and Led U.S. Department of Justice’s Cyber Crime Unit.

    Martyn Hope: Founder of the EU-GDPR Institute.

    In this session you will learn:
    - What will happen if I'm not Compliant by May 25, 2018
    - Where do I Begin to start my compliance effort
    - Who should I trust to advise me through my compliance program

    If you are a CISO, Board Member, Compliance Officer, Data Privacy Officer or anyone tasked with GDPR , this is a must see discussion of world-class panelists who are experts and have first hand knowledge and expereince.
  • Securing Google G Suite | Securing the Enterprise Cloud
    Securing Google G Suite | Securing the Enterprise Cloud Chris Isbrecht Director of Cloud Security Architecture Recorded: Feb 22 2018 30 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on G Suite.

    During this session, we’ll cover threats to data within G-Suite:
    • Email-based phishing, spoofing, and malware
    • Account takeover, insider threats, compromised Google credentials
    •Controlling sensitive data within G-Drive and Gmail and GSuite Apps
  • Embracing a Data Culture: One CDO’s Journey Beyond Data Governance
    Embracing a Data Culture: One CDO’s Journey Beyond Data Governance Barry Green, Chief Data Officer, Bank of Ireland & Thomas Brence, Director of Product Marketing, Informatica Recorded: Feb 22 2018 44 mins
    Have you ever wondered how to build momentum for your data governance program? Join us for this informative webinar to hear how the Chief Data Officer at the Bank of Ireland is enabling cross-functional collaboration and helping his team to embrace a ‘data culture’. You’ll learn how, through his innovative methods, CDO Barry Green is adopting a smart approach to breaking down silos between disciplines and business functions, fostering a shift in data management culture based on collaboration and knowledge transfer across the enterprise.

    Through these new processes and solutions, the Bank of Ireland is now linking data and technology to the value chain. This shift ensures transparency and controls are in place and can support both regulatory requirements (GDPR, BCBS239, etc.) and accelerate their data-driven digital transformation. In fact, the ‘data culture’ is allowing Bank of Ireland to identify opportunities to increase customer satisfaction, re-engineer process and streamline for cost efficiency.

    During the webinar, you will hear:
    •The importance of collaboration
    •The need for executive sponsorship
    •How to get the organization moving in the same direction
    •How your program can support compliance such as GDPR and BCBS239
  • The Pulse of Outsourcing 2H 2017: IDC's Semiannual Look at Rolling 4-Quarter Dea
    The Pulse of Outsourcing 2H 2017: IDC's Semiannual Look at Rolling 4-Quarter Dea David Tapper and Xiao-Fei Zhang, IDC Global Services Markets and Trends Recorded: Feb 22 2018 62 mins
    In this IDC Web conference, outsourcing analysts David Tapper and Xiao-Fei Zhang will leverage IDC's BuyerPulse Services Deals Database to provide an analysis and assessment of outsourcing deals based on a rolling 4-quarter view from Q3 2015 through Q4 2017. The analysis will better enable service providers to pursue key markets, incorporate strategic capabilities, and ensure that they are optimally positioned.
  • How to Buy a GRC Platform
    How to Buy a GRC Platform Adam Billings - Principal Consultant, Lockpath Recorded: Feb 22 2018 57 mins
    Buying a GRC platform isn’t so much about sizing up the options as it is about analyzing your company’s needs. After that, it’s about knowing which questions to ask vendors and how to evaluate their offerings while keeping business processes front and center. In this webinar, we’ll share how to self assess needs and benchmark your GRC maturity. Throughout the hour, we’ll offer buyer’s tips and empower you to buy the GRC platform that’s right for your company.

    In this webinar, you will discover:

    • How to assess your organization and determine what type of platform is right for you
    • What questions to ask when evaluating GRC vendors
    • Tips for building a business case for a GRC platform and estimating potential ROI

    In our increasingly competitive and digital world, organizations need to evolve to be more competitive. For many, an untapped resource is GRC and its role in increasing efficiency and organizational resiliency. Explore what’s possible in this educational webinar.
  • AI in Cyber Security: Explained
    AI in Cyber Security: Explained Dave Palmer, Director of Technology, Darktrace Recorded: Feb 22 2018 49 mins
    The year of 2018 may very well be the year of ‘smart malware’. As sophisticated threat-actors continue to bolster their toolkits, it is only a matter of time before we see weaponized AI targeting our organizations. Simultaneously, cyber security companies are racing to implement new AI technologies into their cyber defense strategies. We now find ourselves in an AI arms race. Defenders and attackers alike are rushing to stay one step ahead before machines fight machines on the battleground of corporate networks.

    Amidst this new threat landscape, cyber defense has become a confusing terrain to navigate. What are the actual risks of AI-based attacks? What would an AI attack look like? And how can effectively implementing AI proactively defend against this new era of threat?

    Join Dave Palmer, Director of Technology at Darktrace, on February 22nd at 9AM PST for a discussion on how AI will shape the next age of cyber defense.

    In this webinar, you will learn:
    •How AI will enhance the sophistication of cyber-threats
    •Why organizations should prepare for AI-based attacks
    •How cyber security companies are responding to advances in AI
    •How Darktrace has leveraged AI to spearhead a fundamentally new approach to cyber defense
  • The One Man SOC - How Unified Security Management Simplifies Threat Detection
    The One Man SOC - How Unified Security Management Simplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Feb 22 2018 66 mins
    With the proliferation of single-point security solutions, many IT teams are struggling to efficiently monitor the security of their environments, and respond quickly to threats. It can be a real challenge to juggle multiple tools that weren’t designed to work together, which wastes time and resources that small IT security teams can’t afford to lose.

    Watch this webcast to learn how one of AlienVault's customers was able to build a security operations center (SOC) on a budget with the AlienVault toolset, and extend security capabilities via the AlienApps ecosystem.

    In this webcast, we'll cover:

    Essential security capabilities that all IT teams should have, regardless of size
    Challenges of integrating and maintaining multiple security tools
    How AlienVault customer Guy Dulberger operates his "One Man SOC" with the AlienVault toolset
    A demo of how AlienVault Unified Security Management speeds threat detection and incident response

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager

    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • GDPR: T Minus 3 Months: 6 Steps to Get Ready
    GDPR: T Minus 3 Months: 6 Steps to Get Ready Jan Smets, Certified Data Protection Officer, Gemalto Recorded: Feb 22 2018 61 mins
    The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
    In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • Creating a Single Data Security Classification Policy for GDPR & Everything Else
    Creating a Single Data Security Classification Policy for GDPR & Everything Else Greg Forest, CTO of Contoural Recorded: Feb 22 2018 48 mins
    In order to properly control privacy data under GDPR, you need a plan for both classifying and understanding where that info is kept. Regulation-specific standards are often insufficient, and trying to apply multiple standards is difficult and confusing to employees. In this webcast. Greg Forest from Contoural will discuss how to create a single comprehensive yet workable data security classification standard that both ensures compliance and is intuitive and easier for employees to follow. Topics include:
    • An overview of key data classification frameworks including HIPAA, ISO, FIPS and others, their strengths and their weaknesses
    • Key attributes that should go into your standard including privacy, confidentiality, IP and other types of sensitive information
    • How to create a hybrid standard
    • Sampling your standard with content, and using this to drive adjustments and fine tuning
    • How to integrate data classification with record retention
  • Internet of Things: Market Spending and Trend Outlook for 2018 and Beyond
    Internet of Things: Market Spending and Trend Outlook for 2018 and Beyond Marcus Torchia, Research Manager, Customer Insights & Analysis, IDC, and Carrie MacGillivray, VP IoT & Mobility, IDC Recorded: Feb 22 2018 61 mins
    The Internet of Things marches relentlessly toward a ubiquitous future as it becomes the underpinning of many 3rd platform technologies. Organizations are beginning to move beyond pilot deployments to realize the promise of the IoT.. Along this journey, technology adoption and the investment horizon is moving fast and hindered only by the speed of business change. In this webinar, we will share market insights on expectations about technology adoption from the field, key insights on the spending landscape and IoT buyer sentiment.
  • The clock is ticking: GDPR: Act now to accelerate your GDPR journey
    The clock is ticking: GDPR: Act now to accelerate your GDPR journey Robert Arandjelovic and Sunil Choudrie, Symantec Recorded: Feb 22 2018 49 mins
    With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.

    Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.

    Don’t leave it to chance – register now.

    Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.

    Take Assessment >> https://symantecgdpr.idcready.net/?utm=JO0yR5ukvt
  • Before you choose Microsoft – 5 Things to Check in an Access Management solution
    Before you choose Microsoft – 5 Things to Check in an Access Management solution Mor Ahuvia, Authentication Product Marketing at Gemalto Feb 26 2018 4:00 pm UTC 60 mins
    Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.

    Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
  • Prevent Sophisticated Threats to Financial Services - Protect Your Endpoints
    Prevent Sophisticated Threats to Financial Services - Protect Your Endpoints Lawrence Chin, Financial Services Security Architect & Joel Boyd, Director of Endpoint Protection Feb 26 2018 5:00 pm UTC 60 mins
    It’s clear that targeted and zero day attacks aren’t going away any time soon. So what do these attacks have in common?

    Endpoints were compromised.

    In fact, according to a 2017 analysis of financial services attacks by our threat research team Unit 42, 96% of cyberattacks were delivered by email in the financial services industry.

    Register for our webinar and learn:
    •How cyberattackers bypassed legacy security solutions in recent attacks
    •What you can do to reliably reduce the risk of successful attacks
    •How to prevent unknown threats from compromising your systems, even unpatched ones
  • Ransomware Hostage Rescue Guide
    Ransomware Hostage Rescue Guide Erich Kron CISSP, Security Awareness Advocate Feb 26 2018 7:00 pm UTC 60 mins
    2017 was a Ransomware nightmare. If you've been in the IT trenches over the past year, you've probably noticed that ransomware attacks are accelerating, damages are more severe and there is no end in sight for 2018

    Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4 for the webinar “Ransomware Hostage Rescue Guide”. We will look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and advise what to do when you are hit with ransomware.

    Erich will cover these topics:

    * What are new scary ransomware features in the wild?
    * I’m infected, now what?
    * Proven methods of protecting your organization
    * Why the “human firewall” is so effective
  • The 5 Essentials of Every Next-Gen SOC
    The 5 Essentials of Every Next-Gen SOC Peter Sparkes, Senior Director, Cyber Security Services, Symantec Feb 27 2018 5:00 am UTC 60 mins
    Every cybersecurity organisation is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.

    New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.

    How does your Security Operations Center (SOC) keep up?

    Join us to learn how to scale and extend the capabilities of your SOC.

    We’ll review topics such as:

    - Automated security event analysis

    - Human security event analysis and prioritisation

    - Threat visibility across key on-premise and cloud control points

    - Consumption of technical and strategic threat intelligence

    - Proactive threat hunting and incident response

    Register Today
  • Sind sie richtig abgesichert?
    Sind sie richtig abgesichert? Kai Kudlek, CISSP, CISA, CISM Senior Systems Engineer Feb 27 2018 9:00 am UTC 60 mins
    Auf der Wunschliste für tägliche Aufgaben steht Hunting bei Sicherheitsanalysten, SOC Mitarbeitern und Administratoren häufig ganz oben. Die fehlenden Möglichkeiten, Aufgaben sinnvoll und effizient zu priorisieren und dabei die Sicht aufs Ganze zu behalten sorgt aber oft dafür, dass dieser Wunsch selten erfüllt wird und stattdessen die tägliche Routine in der Analyse von false positive Alarmen und Alarmen mit geringer Kritikalität liegt.

    FireEye Helix stellt eingehende Alarme in Kontext dar, bewertet diese und bietet Ihnen so die Möglichkeit, schnell zu priorisieren und bei den wenigen, entscheidenden Fällen in der gleichen Oberfläche mit dem Hunting zu beginnen.

    Dieses Webinar gibt einen kurzen Überblick über die Möglichkeiten der FireEye Helix Plattform gefolgt von einer leicht verständlichen Hunting-Demonstration.
  • Cyber Security Update 2018
    Cyber Security Update 2018 Markus Grüneberg, Security Strategist and Mario Seefried, Cyber Security Professional Feb 27 2018 9:00 am UTC 60 mins
    So bleiben Sie vor den neuesten Cyber-Bedrohungen geschützt

    Erfahren Sie in unserem Cybersecurity-Jahresupdate für 2018, wie aktuelle Angriffe aussehen und wie Sie Ihr Unternehmen vor diesen neuen Bedrohungen schützen. Informieren Sie sich unter anderem, über

    - Vorhersagen für die Bedrohungslandschaft 2018 mit besonderem Fokus auf Europa
    - Wichtige Maßnahmen, die Sie ergreifen können, um Ihr Unternehmen zu schützen
    - Top-Ressourcen zur Unterstützung Ihrer Sicherheitsanstrengungen
  • Embrace Next-Generation Cloud Communications For Governance And Compliance
    Embrace Next-Generation Cloud Communications For Governance And Compliance Mark Elwood, Marketing Director, TeleWare Feb 27 2018 11:00 am UTC 60 mins
    New regulations such as MiFID II mean that the regulatory requirement for recording, storage and retrieval of communication data has grown exponentially. Infrastructure and governance overheads and security must be managed wisely, utilising next generation technologies where available to ensure compliance is cost-effective, robust and meets required SLAs.

    Join a group of industry experts including TeleWare and Microsoft to hear more about how financial markets players are turning to the cloud to meet and surpass exacting standards in recording, storage, retrieval and governance for communications data.

    This webinar will be an interactive panel session discussing:
    • Cloud services for Cap Markets - how have cloud services developed to meet the exacting standards of the investment banks and brokers?
    • Why now is the time for cloud services in capital markets.
    • Voice and eCommunication recording – why the cloud is taking the sting out of the increased data storage requirements for MiFIDII.
    • Compliance-specific requirements – including data security and in-country storage.
    • Hybrid deployment models – leveraging cloud services alongside existing enterprise environments.
    • Cost factors – how TCO can be significantly reduced by intelligent outsourcing, including cost of governance, security and compliance.
    • Reaching new heights – methods of migration, deployment and ongoing data management.
    • And why uncertainty about Brexit is driving the need for more flexibility to scale up or down across different geographies.

    The session will be hosted by Mark Elwood, Marketing Director, TeleWare

    Panelists:
    Ian Salmon, Director, IgniteG2M Limited. Specialist regulatory advisers
    Andrew Fawcett, MiFID II Product Manager, TeleWare
    Hannah Cawthorne, Financial Services Industry Lead, Microsoft
  • Prevent Costly Data Leaks From SaaS Apps
    Prevent Costly Data Leaks From SaaS Apps Anuj Sawani, Sr. Product Marketing Manager at Palo Alto Networks Feb 27 2018 2:00 pm UTC 60 mins
    SaaS apps are now extensively adopted by organizations – some procured by IT, others adopted by the users themselves. You’re already likely witnessing large amounts of data being transferred between users and these apps. As corporate data moves to the cloud, the risk of a data leakage increases with users accessing enterprise apps on unmanaged devices or storing corporate data on risky, unsanctioned apps.

    Join this webinar to learn how to prevent data exposure and maintain compliance by protecting your data within enterprise SaaS apps and blocking unsanctioned apps. You’ll learn about:
    •A real-world customer journey for complete data security in SaaS.
    •Common threats leading to data leaks from popular SaaS apps.
    •Benefits of adopting a platform approach to SaaS security.
  • Reducing data breaches by focusing on the people problem
    Reducing data breaches by focusing on the people problem Neil Larkins, Jeanette Garwood Feb 27 2018 3:00 pm UTC 60 mins
    We’ve got clearer rules around data protection and we’re spending more money than ever on preventing breaches,* so it’s logical to expect the number of reported incidents would at least plateau or, in an ideal world, decline.

    However, we all know that isn’t what we’re experiencing. In fact, the most recent statistics published in The Breach Level Index show that there were as many records breached in the first six months of 2017 as there were in the whole of 2016.

    Backing up the idea that buying information security tech alone won’t solve this issue, further analysis of the Breach Level Index shows that 86% of breached records were directly caused by accidental loss as a result of human error or employee negligence.

    During this webinar the speakers will share strategies for understanding user behaviour and look at how technology can work effectively with staff to provide a combined approach to tackling the insider threat, covering:

    •Analysis of the latest statistics to evaluate the threat your staff present to sensitive data
    •The psychology behind the insider threat, how people behave when handling sensitive data and their responses to data breaches, using real human error data breach examples
    •The level of reliance placed on pure technology to combat data breaches, compared with a blended approach focused on securing the user and their behaviour
    •Steps that can be taken to embed data protection into organisational culture in a way that’s meaningful for both staff and the wider business
    •Examine the insider threat from IT and Compliance’s viewpoint to discuss the real challenges you face
  • Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible?
    Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible? Larry Ponemon, Chairman and Founder of the Ponemon Institute and Jason Hart, CTO office for data protection Feb 27 2018 4:00 pm UTC 60 mins
    95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,

    The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.

    During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
    -2018 Global Cloud Data Security Findings
    -Compliance and cloud security: How will this work?
    -A shift in the budget: Where is IT spending their money?
    -Country breakdown of IT cloud security: Who is doing the best?
    -What can you do to secure the cloud and comply with regulations?
  • Increasing the Effectiveness of Incident Management
    Increasing the Effectiveness of Incident Management John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Feb 27 2018 4:00 pm UTC 60 mins
    Incidents are fast-paced, dynamic events, forcing responders in to stressful and unfamiliar situations. Ineffective or delayed response to an incident can potentially lead to millions of dollars in lost revenue and damages. Even seasoned response teams require structure and leadership to respond effectively to an incident.

    This webinar offers a deeper look into the Incident Management System (IMS) and explains how when combined with a properly designed and implemented incident response process, the IMS can help organizations achieve a more effective and efficient incident management process, translating directly to a decrease in financial loss and reputational damage from incidents.

    Key Takeaways:

    - One of the core requirements of an IMS is that it must remain both flexible and scalable.
    - The first and most crucial step in implementing an IMS is integrating it into current organization processes and procedures.
    - Incorporating an IMS can elevate incident management to a level which is simply not possible with a more ad hoc system.
    - Utilizing an IMS for every incident large and small alike, will ensure that stakeholders remain proficient and in control of the process.

    Join us on this webinar as we try to answer the common questions surrounding how to increase the effectiveness of incident management, including the best set up of an Incident Management System, its structure and roles, when it should be used, as well as how an organization should go about implementation.
  • Ponemon Research: Reducing Cybersecurity Costs & Risk Through Automation
    Ponemon Research: Reducing Cybersecurity Costs & Risk Through Automation Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute; Laurence Pitt, Global Security Strategy, Juniper Networks Feb 27 2018 4:00 pm UTC 60 mins
    Recent research, conducted by the Ponemon Institute, into cyber automation technologies revealed that cyber automation reduces the hours spent dealing with security exploits and as a result can save organizations an average of more than $2.3 million annually.

    Over 1,500 IT security practitioners, globally, were surveyed. The research looked at how organizations are deploying cyber automation technologies such as artificial intelligence and machine learning; their cost-effectiveness and other benefits of automation.

    Attend this webinar to find out more about:

    - How your peers are deploying cyber automation technologies
    - The benefits of adopting security tools with Automation
    - Why automation is the answer
    - Attendees to the webinar will get a copy of the full research report.
  • What Do Microservices Mean for AppSec?
    What Do Microservices Mean for AppSec? Brian Pitta, Senior Solutions Architect, CA Veracode Feb 27 2018 4:30 pm UTC 45 mins
    Microservices are a mainstay in the development of most modern applications as the shift to developing several small software components versus a single large application has been popular for a while. Yet even the best teams have trouble integrating security into their implementation. While many organizations see the benefits of the microservice architecture, questions continually arise on its impact on application security programs, especially with the rapid development that goes hand-in-hand with microservices.

    Join Brian Pitta, Senior Solutions Architect at CA Veracode who will discuss:

    •The need to keep up with the speed of DevSecOps and how to automate and integrate security testing with rapid feedback loops;
    •How to run and measure an effective AppSec program at scale and maintain a holistic view of all your applications given the shift to a more “decentralized” application environment to which the microservice architecture lends;
    •The importance of staying current with technology trends to equip an agile development team and continually enhance support for additional frameworks, languages and integration points
  • Securing Today’s Enterprise The Proof is in the Proxy
    Securing Today’s Enterprise The Proof is in the Proxy Timothy Chiu - Senior Director of Product Marketing, Symantec Feb 27 2018 6:00 pm UTC 30 mins
    While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of
    different network, end-point and gateway technologies.

    Learn how each of these different technologies offers different layers of protection against threats, and why it’s not a prudent risk to go without any of them, especially the Secure Web Gateway.

    The Secure Web Gateway adds the proxy-based layer of defense needed for web-borne threats, generally considered one of the two most likely mechanisms for threat transmission into organizations today
    (the other being e-mail).

    Please Join Us, Register Today
  • How to get started with Security Automation and Orchestration
    How to get started with Security Automation and Orchestration Kumar Saurabh, CEO & Co-founder of LogicHub Feb 27 2018 6:00 pm UTC 45 mins
    Security Automation can significantly improve investigations, reduce tedious busy work, and strengthen defenses. However, it is not always clear where to start, and which use cases to apply automation to.

    In this webinar, we will provide a primer and discuss best practices. Topics discussed will include:
    - What is security automation and orchestration?
    - Different automation models
    - Examples of how automation has helped others
    - Assessing your automation readiness
    - Steps to get started - picking your first use cases

    The discussion will be led by Kumar Saurabh, a 15 year veteran of Security Operations, and CEO & Co-founder of LogicHub.
  • CEO Insights: 2018's Top Cyber Security Predictions
    CEO Insights: 2018's Top Cyber Security Predictions Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Feb 27 2018 6:00 pm UTC 60 mins
    As you explore new opportunities to drive business growth in 2018, so are cyber criminals retooling their war chest to exploit your business. As we have seen in 2017, no one is safe.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf Networks, will share his insights on the top 7 predictions to look out for in 2018.

    Here is a preview of the top 3 predictions that is bound to surprise you.
    - AI will not improve security. You will need Hybrid-AI.
    - The US voting system will undergo major changes
    - A major corporation will get caught with its sticky hands in the cookie jar

    With these challenges, investing in prevention tools alone is not enough to counteract new cyber-attacks. Focusing on threat detection and response becomes necessary to address these sophisticated attacks that will continue to bypass their perimeter defenses.

    To learn more about these 2018 predictions and to see how you can protect your on-premise IT infrastructure and cloud-based resources, with an industry leading SOC-as-a-service, register now.

    About our speaker:
    Brian NeSmith brings more than 30 years of experience, most recently as former CEO of Blue Coat Systems, where he increased company revenues from $5M/year to over $500M/year as the industry’s leading web proxy platform. Prior to Blue Coat Brian was the CEO of Ipsilon Networks (acquired by Nokia) which became the leading appliance platform for Check Point firewalls. His early career includes product management, marketing, and general management at Newbridge Networks. He was also a consultant for Network Strategies, Inc. Brian graduated from Massachusetts Institute of Technology with a bachelors of science in electrical engineering.
  • ESG Tests vArmour for Securing Multi-Cloud Workloads
    ESG Tests vArmour for Securing Multi-Cloud Workloads Tony Palmer, Sr. Lab Analyst at ESG; Faraz Aladin, Sr. Director of Marketing at vArmour Feb 27 2018 6:00 pm UTC 60 mins
    The Analysts at Enterprise Strategy Group just wrapped up testing of the vArmour DSS Distributed Security System across physical, virtual, cloud, and container platforms and the results are in.

    Join ESG Senior Lab Analyst, Tony Palmer, along with vArmour Senior Director of Marketing, Faraz Aladin, for a detailed review of the vArmour solution and to see how it performs in the areas of:

    --Application identification, inspection, and protection across a combination of infrastructure platforms

    --Scalability to match compute resources and throughput requirements

    --Automatic security provisioning for new assets

    --Deception capability, ease of use, and efficiency
  • Sysdig Secure Overview
    Sysdig Secure Overview Knox Anderson, Product Marketing Manager, Sysdig Feb 27 2018 6:00 pm UTC 60 mins
    Learn how you can simplify and strengthen your container security posture by combining deep kernel-level container visibility with metadata from your container orchestration tools to define your policies.

    We'll cover how the security landscape is changing, the architecture of Sysdig Secure, we will show you live how to instrument your containerized environment and then do something you'll never see from any other security tool!

    During the live demo will walk you through what Sysdig Secure can do:

    -Implement application and service aware policies
    -Block incoming attacks and container break-ins
    -Audit executed commands
    -Intrusion forensics: pre and post attack investigation
    -Unify monitoring & security workflows
  • Man & Machine: Analytics as a Defence Against Advanced Cyber Threats
    Man & Machine: Analytics as a Defence Against Advanced Cyber Threats Ross Brewer, vice president and managing director EMEA, LogRhythm & Josh Downs, Senior Community Manager, BrightTALK Feb 28 2018 1:00 am UTC 30 mins
    As technology advances, so does the threat landscape, with cyber criminals effectively exploiting weak points on an almost daily basis. When malware infiltrates an organisation’s first layer of defence, it can spread quickly throughout the network, exposing data and weakening security - and in most cases this happens faster than analysts or administrators have time to react to. Indeed, with reams of data being generated and transferred over networks, organisations are having a hard time monitoring everything, which means potential threats can easily go unnoticed.

    Organisations need to rely on machines to detect and respond to threats more quickly and efficiently. Even enterprises with a dedicated security team that monitors the latest security threat trends and understands the blueprint of evolving attack vectors still need to continuously monitor all network activity. The sheer volume of processes, services and applications running on a corporate network is just too much for human beings to monitor alone. However, this doesn’t mean that human analysis is not important.

    User and entity behavioural analytics (UEBA) is essential in keeping up with continuously evolving threats and making sense of anomalous network behaviour. Security approaches that utilise both machine learning and human analysis enable all threats to be analysed for effective detection and response, ensuring all data is accounted for and including the human element to help reduce the opportunities for false positives. To keep up with the ever-changing security landscape, companies need to integrate internal and external threat context in their environment by updating processing rules for operating systems, applications, and network devices in order to strengthen the accuracy of real-time machine analytics.
  • Container Forensics & Troubleshooting with Sysdig Inspect
    Container Forensics & Troubleshooting with Sysdig Inspect Jorge Salamero Sanz, Technical Marketing Manager, Sysdig Feb 28 2018 10:00 am UTC 60 mins
    Join us for a 1 hour use-case driven training session on container forensics, postmortem analysis and error troubleshooting with the Sysdig open source tool, Sysdig Inspect.

    In this session, we'll demo:

    -How to troubleshoot a 502 Bad Gateway error on HAproxy

    - A postmortem analysis to understand how a hacker broke into your containerized app

    - How to do deep forensic analysis and understand how your system was breached and what data was taken
  • What are the full spectrum of mobile risks in 2018?
    What are the full spectrum of mobile risks in 2018? Burak Agca - System Engineer Feb 28 2018 10:00 am UTC 60 mins
    Mobile has become the primary espionage target. Everyday employee behaviors can jeopardize your data, systems, and compliance policies.

    With over 120M mobile devices using our endpoint security products, Lookout has unparalleled global insight into the full spectrum of mobile risks, threats, and vulnerabilities.

    Register to today's webinar to learn about:
    - The threat landscape
    - The evolution of mobile threats
    - How does that impact your organization?
    - How other other organizations are doing?
    - The impact of a breach post GDPR
    - How to protect your enterprise data?

    Live Q&A session at the end.