Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Assessing Your Vulnerability to Ransomware Assessing Your Vulnerability to Ransomware David Corlette, Director of Product Management at ThreatTrack Live 60 mins
    Join as we help you defeat those ransomware hoodlums lurking in the dark cyberspace. Learn preventative measure from VIPRE:

    - Watch as we dissect common variants like Locky, Petya, TeslaCrypt and Cerber

    - Learn how to stop ransomware attacks before they happen

    - Get practical advice on how to get back on your feet if an attacker does get through

    - Discover what other end users have done – without opening their wallets – to defeat the threat
  • Tech Demo - Imperva Application Protection Portfolio Tech Demo - Imperva Application Protection Portfolio Ajay Uggirala, Director of Product Marketing and Mina Mahdavi, Senior Systems Engineer Live 60 mins
    Imperva offers comprehensive application protection that has the flexibility to be deployed on-premises or in-the-cloud protecting business-critical applications and infrastructure. This webinar will provide a complete overview of Imperva’s unique application security product portfolio that will enable your organization to defend itself against DDoS attacks, web-based threats and other emerging zero-day attacks. Learn how easy and flexible it is to deploy the solution in any environment and watch a live demo.
  • Top Trends That Will Shape Your Cybersecurity Strategy in 2017 Top Trends That Will Shape Your Cybersecurity Strategy in 2017 Mark Weatherford (vArmour), Ann Barron-DiCamillo (AmEx), Paul Kurtz (TruSTAR), Leo Taddeo (Cryptzone), Usman Choudhary(VIPRE) Recorded: Feb 21 2017 75 mins
    Discover the latest trends in cyber attacks and how they are shaping the security strategy across industries and on a national level.

    Join this keynote panel session for an interactive discussion on the emerging technologies and tactics used by attackers, the role of artificial intelligence and machine learning in cyber attacks and cybersecurity, and the best practices for improving security for your organizations.

    Moderator:
    - Mark Weatherford, Chief Cybersecurity Strategist at vArmour

    Panelists:
    - Ann Barron-DiCamillo, VP Cyber Threat Intelligence & Incident Response at American Express
    - Paul Kurtz, CEO of TruSTAR
    - Leo Taddeo, CSO of Cryptzone
    - Usman Choudhary, SVP & CPO at ThreatTrack (VIPRE)
  • Cybersecurity Strategy: Success Cases and Avoidable Mistakes Cybersecurity Strategy: Success Cases and Avoidable Mistakes Peter Wood, CEO, First Base Technologies LLP Recorded: Feb 21 2017 48 mins
    Our cybersecurity consultancy practice works with multinational businesses through to medium-sized UK organisations. We see cybersecurity strategies that are impressive, comprehensive, misguided and non-existent. This webinar will distil some of the most creative and successful approaches, as well highlighting the mistakes to avoid. Our analysis is based on cyber readiness, cyber risks stress testing, cyber hygiene assessments and security gap analysis. Threat and risk assessments and red team exercises also provide an insight into the effectiveness of cybersecurity strategies.
  • How to Get the Best Out Of DevSecOps - From The Security Perspective How to Get the Best Out Of DevSecOps - From The Security Perspective Colin Domoney, Sr Product Innovations Manager at Veracode Recorded: Feb 21 2017 45 mins
    With application security rapidly moving towards a DevSecOps approach, it's important to understand from each team's perspective how to be the successful in the new agile process.

    Join this webinar to understand from the security perspective both the challenges and benefits of a DevSecOps approach, and how to integrate with the rest of the developer and operations teams.
  • Panel Discussion: Cyber Security Strategies and Trends in 2017 Panel Discussion: Cyber Security Strategies and Trends in 2017 Jeff Costlow, ExtraHop Networks; Francois Raynaud, DevSecCon; Rami Mizrahi, TopSpin Security & Josh Downs, BrightTALK Recorded: Feb 21 2017 48 mins
    These days it's not a matter of if you'll be breached, but when. Security teams in the modern enterprise must accept that as well as efforts to protect their perimeter, they must also focus on understanding their east-west traffic.

    This panel discussion will look at the trends and technologies influencing cyber security strategy in 2017, in particular those that deal with effectively monitoring your network to ensure your organisation handles vulnerabilities and stays breach free.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - Jeff Costlow, Director of Security, ExtraHop Networks

    - Rami Mizrahi, VP of R&D, TopSpin Security

    - Francois Raynaud, Founder, DevSecCon

    Tune into this panel conversation if you're a network or security professional looking to hear the latest trends and security best-practices to defend against a constantly evolving opponent.
  • (ISC)2 Managing Director EMEA Adrian Davis Insights with Cyber Leaders (ISC)2 Managing Director EMEA Adrian Davis Insights with Cyber Leaders Amar Singh - Cyber Management Alliance Recorded: Feb 20 2017 41 mins
    (ISC)2 Managing Director EMEA Adrian Davis talks to Amar Singh about his top tips for CISSP aspirants and about hs personal journey and how he made it.
  • Scaling Business Continuity and Disaster Recovery On-Prem & in the Cloud Scaling Business Continuity and Disaster Recovery On-Prem & in the Cloud Todd Furst and Rich Ross, Technical Solutions Professionals, Microsoft Recorded: Feb 17 2017 44 mins
    Help protect your organization's data and applications. Even a minor outage can put you at a competitive disadvantage.

    Mitigate your risk and be ready with a business continuity plan that enables backup and disaster recovery if needed. Increase capacity, decrease costs, and delivery disaster recovery at cloud scale.

    Join this webcast to learn how to:
    - Implement disaster recovery for all your major IT systems
    - Unify data management, security, and protection
    - Provide protection for your data and applications, no matter where they reside
    - Extend on-premises backups storage and data archiving solutions to the cloud
  • Understanding IT Governance & Security in your Dev, Test & Cloud Environments Understanding IT Governance & Security in your Dev, Test & Cloud Environments Rajesh Agadi, Technical Solutions Professional & Rodrigo de Carvalho, Cloud AppDev Marketing Manager, Microsoft Recorded: Feb 17 2017 66 mins
    Companies of all sizes are under pressure to deliver greater results. The search for quicker and more impactful results, while balancing costs, governance, and agility, are one of the biggest challenges of many IT organizations. While applications – developed internally, packaged, or off-shored – are the engine behind business transformation, the ability to deliver better apps is compromised by the lack of environments to proper develop and test them. High hardware procurement time and costs are usually major roadblocks faced by IT.

    Cloud Computing plays a key role in providing application teams with the tools needed to develop and test in production-like environment, while never ignoring costs, security, and agility.

    Join this webcast to learn how to:
    - Understand the challenges in IT to provision development and testing environments for applications teams
    - See how cloud computing and Microsoft Azure can be the answer for dev-test environments
    - Learn about Microsoft Azure and the Azure Dev-Test Offer
    - Receive an overview of dev-test labs and governance and security of dev-test environments
  • Climbing the Corporate Ladder… in (Tasteful) High Heels Climbing the Corporate Ladder… in (Tasteful) High Heels Jo Stewart-Rattray (BRM Holdich) & Theresa Grafenstine (US House of Representatives) Recorded: Feb 16 2017 62 mins
    For many years, women have represented roughly half of all university graduates. Yet, there is a lingering imbalance of women that progress to senior leadership positions.

    Join two industry trailblazers, Jo Stewart-Rattray, the first woman to serve as CIO with responsibility for both operational and business IT in the Australian utilities space and Theresa Grafenstine, the first woman to serve as the Inspector General of the US House of Representatives, as they discuss how they cracked through the proverbial glass ceiling.

    Attendees will get practical advice on becoming a trusted advisor, building your personal brand, joining the “Old Boys Club,” and the art of gaining influence.

    Jo and Theresa will also reflect on their careers and share lessons learned on the bumps and bruises they encountered along the way with “What they wished they knew 20 years ago…”

    At the end of what will surely be a spirited discussion, attendees will have a chance to pose questions to these two role models who blazed a trail for women in the IT profession.
  • Logistics Analytics: Predicting Supply-Chain Disruptions Logistics Analytics: Predicting Supply-Chain Disruptions Dmitri Adler, Chief Data Scientist, Data Society Recorded: Feb 16 2017 47 mins
    If a volcano erupts in Iceland, why is Hong Kong your first supply chain casualty? And how do you figure out the most efficient route for bike share replacements?

    In this presentation, Chief Data Scientist Dmitri Adler will walk you through some of the most successful use cases of supply-chain management, the best practices for evaluating your supply chain, and how you can implement these strategies in your business.
  • Long-term Data Retention: Challenges, Standards and Best Practices Long-term Data Retention: Challenges, Standards and Best Practices Simona Rabinovici-Cohen, IBM, Phillip Viana, IBM, Sam Fineberg Recorded: Feb 16 2017 61 mins
    The demand for digital data preservation has increased drastically in recent years. Maintaining a large amount of data for long periods of time (months, years, decades, or even forever) becomes even more important given government regulations such as HIPAA, Sarbanes-Oxley, OSHA, and many others that define specific preservation periods for critical records.

    While the move from paper to digital information over the past decades has greatly improved information access, it complicates information preservation. This is due to many factors including digital format changes, media obsolescence, media failure, and loss of contextual metadata. The Self-contained Information Retention Format (SIRF) was created by SNIA to facilitate long-term data storage and preservation. SIRF can be used with disk, tape, and cloud based storage containers, and is extensible to any new storage technologies. It provides an effective and efficient way to preserve and secure digital information for many decades, even with the ever-changing technology landscape.
Join this webcast to learn:
    •Key challenges of long-term data retention
    •How the SIRF format works and its key elements
    •How SIRF supports different storage containers - disks, tapes, CDMI and the cloud
    •Availability of Open SIRF

    SNIA experts that developed the SIRF standard will be on hand to answer your questions.
  • Keeping Applications Compliant and Secure Using ARA Keeping Applications Compliant and Secure Using ARA Keith Puzey, CA Technologies Recorded: Feb 16 2017 25 mins
    Are you burdened with regulatory mandates that require the proper compliance controls and audit trails? Do last-minute security updates hold-up your application releases—or more problematic, have you missed security patches that impacted the business?

    In this 30-minute webcast:
    -Discover what it means to shift your security thinking left and incrementally improve security as part of your continuous delivery practice.
    -Learn how you can apply the right levels of governance, gain end-to-end transparency and ensure full auditability of your releases.
    -See how an Application Release Automation (ARA) solution like CA Release Automation enables you to deliver applications with the agility and speed required by your business while enabling you to stay in control.

    At the end of this webcast, you’ll have insights into how to mitigate digital risks as you apply continuous delivery practices.
  • Top Five Reasons to Use Verified Asset Discovery Top Five Reasons to Use Verified Asset Discovery Dan Ortega - VP of Marketing for Blazent Recorded: Feb 16 2017 4 mins
    In this Top 5 video we list the top responses from a survey of 58 IT managers on the benefits they observed from using IT asset discovery and mapping technology.
  • Evolution of Traditional Investigations and Modern Forensics Evolution of Traditional Investigations and Modern Forensics Bill Hickman, COO of CSI Corporate Security and Investigations Inc. and Peter L. Mansmann, president of Precise, Inc., a lit Recorded: Feb 16 2017 57 mins
    The use of web enabled devices has profoundly changed the world we live in. The average American now spends upwards of 10 hours per day in front of some form of electronic medium. More and more, the smart phone is becoming the device of choice to communicate, get news/information, and share social information on a real time basis. This is how people navigate through today's world and has had a significant behavioral impact as a result.

    Internal Auditors can benefit greatly from understanding how to best integrate this new wealth of information in their audits and investigations. The future of both audits and investigations will need to rely more on technology but cannot neglect the impact and role of the “human element”. Points of particular interest include:
    •social media searches to identify where someone has been and plans to be,
    •location enabled services identifying where someone's phone (and presumably they) have been,
    •devices and apps measuring and sharing individual’s mobility and activity,
    •the trend towards this data going directly to the public cloud, and
    •the emergence of the "internet of things".
  • SAP Indirect Usage costs more than you think. Learn how to avoid financial risk. SAP Indirect Usage costs more than you think. Learn how to avoid financial risk. Brian Skiba, Dan Kirtley Recorded: Feb 16 2017 41 mins
    SAP customers are becoming increasingly exposed to financial risk through audits, particularly where third party applications and add-ons indirectly access and use SAP data.

    This type of access is known as Indirect Usage.

    In this webinar, we explain how some of the recent amendments to SAP’s terms and conditions might lead to further exposure for your organization. You will learn how to efficiently highlight activity in the SAP system to identify where Indirect Usage may be taking place and what to do about it.

    Don’t walk your organization into a hefty audit fine! Make sure that you’re fully prepared and reduce your exposure to a minimum.
  • Transformation für mehr Sicherheit durch Sichtbarkeit Transformation für mehr Sicherheit durch Sichtbarkeit Kristian von Mejer, Strategic Account Director – Germany Recorded: Feb 16 2017 42 mins
    Kommt es Ihnen so vor, als hätten die Angreifer den Vorteil zunehmend auf ihrer Seite? Es gibt immer öfter Berichte über erfolgreiche Cyberattacken und Datenverluste, obwohl die Ausgaben für Sicherheitsmechanismen ebenfalls steigen. Der Schutz muss verbessert werden und dabei ist der erste Schritt mehr Visibilität.
    In unserem Webinar zum Thema Transformation für mehr Sicherheit durch Sichtbarkeit zeigen wir Ihnen, wie Sie in drei Schritten Ihr Netzwerk sicherer machen:

    • See: Erkennen Sie jedes Endgerät, sobald es sich mit dem Netzwerk verbindet. Dabei spielt es keine Rolle, ob Firmengerät, BYOD oder Endpunkte aus dem Internet der Dinge (IoT) – alle Devices werden ohne den Einsatz von Agenten erkannt
    • Control: Verwalten Sie Netzwerkzugriffsrechte für Gerätegruppen auf Basis von festgelegten Sicherheitsrichtlinien. Zudem können kritische Endpunkte automatisch bewertet und gesichert werden
    • Orchestrate: Teilen Sie Informationen mit bestehenden Sicherheitslösungen und automatisieren Sie Arbeitsprozesse durch die Extended Modules von ForeScout
  • Taming the "God" User Taming the "God" User Amar Singh and Joseph Carson Recorded: Feb 16 2017 60 mins
    Privileged IT users hold significant power in an organisation. They can delete, change or read emails and create, reset or change user accounts amongst other things. In many cases the privileged user can easily bring a business to its knees.

    Businesses may be aware of the scale of the privileged insider threat but efficiently managing these users often remains an aspiration. Join Amar Singh in this interactive webinar as he talks to privileged management expert Joseph Carson and discusses how you can expertly manage your privileged users.

    Cyber Management Alliance's webinars are highly interactive and have a higher than normal user interaction during the webinar. So, sign-up now and take this opportunity to ask, learn and share.
  • Denken Sie über die DSGVO hinaus – Integrieren Sie Ihre Cyberabwehr Denken Sie über die DSGVO hinaus – Integrieren Sie Ihre Cyberabwehr Alexander Peters, Robert Arandjelovic Recorded: Feb 16 2017 64 mins
    Wie verhindern Sie, dass die DSGVO lediglich zu einem lästigen Kostenfaktor für Ihr Unternehmen wird? Indem Sie die Verordnung dazu nutzen, Ihre Strategien für Informationssicherheit und Datenschutz zu überarbeiten.

    Warum?

    Die DSGVO beruht auf dem Prinzip einer guten Daten-Governance. Wenn Sie sich dieses Prinzip zu eigen machen, können Sie die Verordnung nicht nur leichter einhalten, sondern auch andere geschäftliche Risiken mindern. Ein Fokus, der sich auf eine solide, langfristige Datenschutzstrategie richtet, bringt laufende Vorteile mit sich, zumal Cyberbedrohungen und Datenschutz zu den größten Risiken für Unternehmen zählen. Wenn Sie Informationsschutz und Sicherheit in Ihren DSGVO Plan einbeziehen, können Sie vorhandene Infrastruktur nutzen und sich auf die wichtigsten Verbesserungsbereiche konzentrieren.

    Hören Sie sich an, was die Teilnehmer unserer Diskussionsrunde zu den Hürden zu sagen haben, vor denen Unternehmen am häufigsten stehen, und erfahren Sie, wie die Integration von Technologie dabei helfen kann, diese zu bewältigen. Das Webinar bietet einen grundlegenden Überblick über die Bestimmungen der DSGVO, erläutert einen Ansatz für die Ausarbeitung Ihres Plans und erörtert die Vorzüge verschiedener Technologien zur Verbesserung des Datenschutzes. Außerdem werden die weiteren Auswirkungen aufgezeigt, insbesondere im Hinblick auf Sicherheitskultur und Prozessgestaltung, um die erfolgreiche Umsetzung Ihrer Strategie zu gewährleisten.
  • Think beyond GDPR – Integrate your cyber defences Think beyond GDPR – Integrate your cyber defences Sunil Choudrie & Robert Arandjelovic Recorded: Feb 16 2017 64 mins
    How do you stop GDPR becoming just a burden to your business? By using it to fundamentally review your information security and data privacy plans. Why?

    As GDPR is based on the principal of good data governance, adopting that mindset will not only ease your ability to comply, but reduce other business risks. A focus on a robust, long term, data protection strategy will deliver ongoing benefits, particularly as cyber threats and data protection are cited as top risks to organisations. Encompassing information protection and security, within your GDPR plan will allow you to utilise existing infrastructure allowing to focus on the key improvement areas.

    Join our panel to hear their views on the most common hurdles organisations face, and how integrating technology can help you overcome these. The webinar will provide a basic overview of the GDPR regulations, identify an approach you can take to develop your plan and discuss the merits of different technologies in improving data protection. The panel will also identify the wider implications, particularly regarding security culture and process design to ensure successful implementation of your strategy.
  • SEP 14 Product Tour: 15 Years Running, a Leader in Gartner Magic Quadrant SEP 14 Product Tour: 15 Years Running, a Leader in Gartner Magic Quadrant Symantec Recorded: Feb 16 2017 5 mins
    Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Our multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection 14 is our lightest and the strongest endpoint protection on the market.
  • Detect Ransomware Before it’s Too Late with AlienVault USM Detect Ransomware Before it’s Too Late with AlienVault USM Jim Hansen Feb 21 2017 6:00 pm UTC 60 mins
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

    You'll learn:

    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Feb 21 2017 7:00 pm UTC 60 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • Security Myths Debunked: Running Your Business In the Cloud Security Myths Debunked: Running Your Business In the Cloud Adrian Sanabria, Senior Analyst, Information Security at 451 Research & Aaron Newman, CEO & Founder at CloudCheckr Feb 21 2017 7:00 pm UTC 60 mins
    Organizational efficiency and convenience were the initial appeal of the cloud: add servers when you need them, get rid of them when you don't. Offering businesses the ability to automatically scale with workload and application needs, the cloud offers endless potential to grow at scale. As cloud technology continues to evolve and diversify—from public to private, hybrid to multi-cloud—the use cases and potential benefits have also expanded. And, unlike traditional IT, cloud performance and capacity drivers also tend to improve infrastructure security. During this webinar, we'll explore:

    *Using cloud security as a competitive advantage for your business
    *How focus on performance, agility, and efficiency in cloud mutually benefits security
    *The changes in thinking and design necessary to unlock the cloud’s potential for improving security
    *Practical strategies for automation, monitoring, mitigation and incident response

    Join 451 Research and CloudCheckr for an exclusive webinar to discuss trends, challenges, and opportunities for organizations looking to leverage the true potential of the cloud.

    About CloudCheckr:
    CloudCheckr is a unified cost and security automation platform that gives you visibility, insight, and automation for your AWS environment. CloudCheckr delivers a suite of products for cloud operations, security and finance teams for Cost Management, Security and Compliance, Utilization and Inventory.
  • Scaling Security at DevOps Speed Scaling Security at DevOps Speed Mike Goldgof, VP of Marketing at WhiteHat Security Feb 21 2017 7:00 pm UTC 60 mins
    Seamlessly integrating AppSec testing into CI processes earlier in the SDLC has become the holy grail of DevOps and security teams. Achieving this means apps are not only more secure and can be deployed more quickly, but companies are also able to reap substantial cost and resource savings.

    Join Mike Goldgof, WhiteHat Security’s VP of Marketing, to learn about best practices and what’s needed to fit security testing into highly-automated Agile DevOps processes, that are transforming the development world and speed of delivery dictated by businesses today.
  • Threat Actors Are Using Automation.. Are You Automating Threat Response? Threat Actors Are Using Automation.. Are You Automating Threat Response? Joseph Yun, Sr. Product Evangelist, ProofPoint Feb 21 2017 9:00 pm UTC 60 mins
    Threat Actors figured out long ago that automating and orchestrating their attacks gives them the ability to conduct their campaigns more efficiently and effectively. The byproduct of these automated attacks is a high volume of events and alerts meant to overwhelm enterprises. Enterprises conducting predominantly manual investigations and remediations will never be able to scale to the level of those attackers utilizing automated tactics.

    Join us on February 21, 2017 at 1 PM PT and learn how to quickly and easily


    •Understand the scope of automation necessary to combat mass campaigns from attackers
    •Understand which automations can be accomplished with the fastest ROI
    •Understand how,you can automate and apply internal context, 3rd party intelligence, campaign data, and investigations
    •Deploy powerful and proven shortcuts to integrate with alert sources and enforcement systems
  • Panel Discussion - AI & Machine Learning in Cyber Security Panel Discussion - AI & Machine Learning in Cyber Security Josh Downs, BrightTALK; John Laliberte, FireEye; Natalino Busa, TeraData & Neill Gernon, AI.Dublin and Atrovate Feb 22 2017 11:00 am UTC 60 mins
    A live online panel discussion focused on the debate around AI and machine learning and how they can automate cyber security; catch more threats and malicious attacks and prove a useful weapon against cyber crime.

    Panelists:

    - Josh Downs, Community Manager - Information Security, BrightTALK (moderator)

    - John Laliberte, VP, Endpoint and ICE, FireEye

    - Natalino Busa, Head of Applied Data, TeraData

    - Neil Gernon, MD, Atrovate & Founder, Dublin.AI
  • State of Endpoint Protection & How Machine Learning Helps Stop The Attacks State of Endpoint Protection & How Machine Learning Helps Stop The Attacks Robert Arandjelovic & Jose Carlos Cerezo Feb 22 2017 12:00 pm UTC 60 mins
    In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?

    Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.

    Key Learning Objectives:

    •What is the state of the industry for Endpoint Protection technology
    •Why machine learning is not enough
    •Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more
  • Rise of the Zombie Army - A Study of Botnets Rise of the Zombie Army - A Study of Botnets Ronan Lavelle, General Manager EMEA, Zenedge Feb 22 2017 1:00 pm UTC 45 mins
    From Haitian folklore to George A. Romero’s Dawn of the Dead, the use of Zombies in fictional settings has experienced a strong resurgence in recent years. With fact mirroring fiction, the real world has also faced the terror of dealing with a rise of mindless automatons capable of creating mass devastation on an international scale.

    We are of course talking about the rise of Botnets.

    Come join us for an interactive presentation with chief zombie-wrangler, Ronan Lavelle, on the insidious rise of this threat looking at recent attacks, the link in growth to insecure IoT devices and just what we can do to combat them.

    This webinar is perfect for cyber professionals those who want to:

    - stop data loss by defending against botnets
    - better respond to incidents and remediate
    - reduce attack surfaces and counter threats
  • [Video Interview] RSA 2017 - John Elliott [Video Interview] RSA 2017 - John Elliott Josh Downs, Community Manager, BrightTALK & John Elliott Mar 7 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with easyJet Head of Payment Security John Elliott in conversation with BrightTALK Information Security Community Manager.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Immune System Cyber Defense: Across the Cloud and Beyond Immune System Cyber Defense: Across the Cloud and Beyond Andrew Tsonchev, Principal Consultant; Simon Wilson, Senior Cyber Technician Feb 22 2017 3:00 pm UTC 45 mins
    By 2020, 92% of all business will rely on cloud infrastructure. The shift to cloud and virtualized environments is changing the nature of network borders, and creates a new frontier for cyber-attackers. How do security teams defend their organizations against emerging threats within the cloud and beyond?
  • Reducing Open Source Risk and Remediation Costs Early in the SDLC Reducing Open Source Risk and Remediation Costs Early in the SDLC Pat Durante, Senior Director Education Services; John Beaudoin, Senior Instructional Designer Feb 22 2017 4:00 pm UTC 90 mins
    Increasingly, organizations worldwide are implementing open source security and license risk assessment capabilities early in the software development lifecycle when the cost to remediate issues is lowest. This webinar will demonstrate Black Duck Hub’s effectiveness in providing comprehensive risk assessments when used in combination with our Eclipse IDE plugin, Build Tool, and CI Tool integrations. Additionally, we'll review valuable new features in Black Duck Hub 3.5.
    You’ll also learn:
    - How to improve the accuracy of your open source inventory by leverage open source dependency discovery techniques for build tools and package managers
    - Options for incorporating Hub scanning into your Continuous Integration environments
    - How to track remediation tasks using the Hub-Jira integration
    - How to streamline your component review process
    - Use cases for scanning binary repositories such as Artifactory
  • Quantifying DevOps Outcomes - Digital transformation and the competitive edge Quantifying DevOps Outcomes - Digital transformation and the competitive edge George Miranda, Technical Strategy Feb 22 2017 6:00 pm UTC 30 mins
    This webinar is part one of a four part series that examines how digital transformation enables you to outperform competitors.

    Digital transformation occurs when a company adopts technologies and practices that change it from one that ships its software slowly and painfully to one that ships software quickly while, at the same time, improving its quality and mitigating risk. Businesses that embrace digital transformation outperform their competitors: they capitalize on disruption rather than allowing themselves to be disrupted. They deliver their software faster, with higher efficiency and lower risk. These advances can be quantified to prove their effectiveness.

    This short-form webinar series invites you to participate in a discussion on how to implement digital transformation and which metrics demonstrate progress on your journey. The first part of our series, focuses on the overall challenges businesses face in the marketplace and how to gauge where you stand. Subsequent webinars will focus on specific measures that move transformation forward.

    Join us to:
    - Learn how industry trends shape your internal challenges
    - Explore how companies have resolved tensions between central IT organizations and development teams
    - Learn how to use industry metrics to determine where you should be focusing your efforts
    - Participate in a virtual roundtable discussion where you can ask the questions most relevant to you

    Who should attend:
    - Director/VP of technology teams
    - Technology executives
    - Management seeking strategic alignment with business objectives
  • Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks Real-Time Contextual Learning and Adaptation in an Era of Targeted Attacks Simon Crosby, Co-Founder & CTO of Bromium Feb 22 2017 10:00 pm UTC 60 mins
    You’ve heard a lot about using artificial intelligence and machine learning to change the odds in your favor in cyber-attacks. Unfortunately it turns out that the bad-guys have great AI too, and with each click they can stealthily adapt, morphing into a new hard-to-detect form. But what if we apply learning in real time, on every endpoint, and allow the endpoints to collaborate to identify the threat?

    In this talk Simon Crosby, co-founder and CTO of Bromium, will explore how this new approach can give defenders the edge in an era of targeted attacks.

    About the Presenter:
    Simon Crosby is a co-founder and CTO of Bromium Inc. – the pioneer of micro-virtualization, which enables PCs to defend themselves by design from all malware. Previously Simon was CTO, Data Center & Cloud at Citrix Systems, which acquired XenSource, where he was co-founder and CTO. He was formerly a Principal Engineer at Intel where he led strategic research on platform security and trust, and founder & CTO of CPlane Inc., a pioneer in Software Defined Networking. He was a faculty member in the Computer Laboratory at the University of Cambridge, UK from 1994-2000. He holds a PhD in Computer Science from the University of Cambridge, UK, and is author of more than 50 peer reviewed papers and patents.
  • Incident Response and GDPR. What You Need To Know. Incident Response and GDPR. What You Need To Know. Amar Singh Feb 23 2017 9:00 am UTC 60 mins
    Warning - this is not just another GDPR webinar. Join Amar Singh in his popular and interactive webinars and deep-dive into this special Cyber Incident Planning & Response webinar where we share and discuss the following:

    * - What are the key components to automate in incident management to enable GDPR compliance.

    * - Four important questions a CISO or Manager must ask to manage an incident successfully.

    * - Understand Process Automation for Incident Orchestration.

    * - How you can, using the technology and processes, build a lean, effective and knowledge Security team with or without a Security Operations Centre.

    * - Data Protection and Incident Response for the non-technical manager.

    * - How and why it's critical that middle and senior management, working with technical teams, get involved in delivering effective cyber incident planning & response.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Feb 23 2017 11:00 am UTC 60 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.