Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Using Predictive Analytics to optimize Application operations: Can you dig it? Using Predictive Analytics to optimize Application operations: Can you dig it? Lesley-Anne Wilson, Group Product Rollout & Support Engineer, Digicel Group Recorded: Jul 22 2016 23 mins
    Many studies have been done on the benefits of Predictive Analytics on customer engagement in order to change customer behaviour. However, the side less romanticized is the benefit to IT operations as it is sometimes difficult to turn the focus from direct revenue impacting gain to the more indirect revenue gains that can come from optimization and pro-active issue resolution.

    I will be speaking, from an application operations engineers perspective, on the benefits to the business of using Predictive Analytics to optimize applications.
  • The Foundation of Data Quality The Foundation of Data Quality Charlie Piper - CEO and Dan Ortega - VP of Marketing Recorded: Jul 22 2016 5 mins
    Blazent's CEO, Charlie Piper and Dan Ortega introduce the company strategy, vision and it's value to customer's and MSP partners. Together, Charlie and Dan describe how Blazent's platform finds the the most accurate data to improve decision manking in IT and beyond.
  • Ransomware - an Educated Response Ransomware - an Educated Response Stu Sjouwerman, Founder and CEO of KnowBe4 Recorded: Jul 21 2016 12 mins
    Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
  • Security in the Boardroom Series: Earning and Using Your Seat at the Table Security in the Boardroom Series: Earning and Using Your Seat at the Table Ashley Ferguson, Director, SecureWorks Governance, Risk & Compliance Recorded: Jul 21 2016 60 mins
    This webinar will provide tips for successfully navigating the expanding role of the Chief Information Security Officer as an essential business leader. Explore leading practices for managing cybersecurity risk as a people, process and IT leader. Get tips for building a working relationship with other executive stakeholders in audit, compliance and enterprise risk. And hear how other CISOs are establishing more productive reporting relationships with the board of directors. Whether you’d like to expand your role as a risk and security professional, gain more executive support for key initiatives, or improve your relationship with the board, you’ll take away actionable insights to apply to your own journey as an essential business leader.
  • Briefings Part 1: Anatomy of a Ransomware Attack Briefings Part 1: Anatomy of a Ransomware Attack Barry Shteiman, Director, Threat Research, Exabeam; Brandon Dunlap, Brightfly Recorded: Jul 21 2016 60 mins
    Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
  • The Agile Supply Chain: API-led Connectivity and B2B/EDI The Agile Supply Chain: API-led Connectivity and B2B/EDI Kent Brown, CTO, ModusBox David Chao, Industry Marketing, MuleSoft Recorded: Jul 21 2016 46 mins
    Today's supply chains are faced with an increasing number of distribution channels, a broader set of suppliers and ever decreasing product cycles. A new approach is required that delivers a step change in agility. MuleSoft's API-led approach delivers up to 200% faster development cycles through leveraging re-usable assets. Join us for a walkthrough of this approach, including a demo of Anypoint Platform and Anypoint B2B.
  • Effective Monitoring and Defense in Financial Services Effective Monitoring and Defense in Financial Services Dave Hoelzer (SANS) and Lawrence Chin (Palo Alto Networks) Recorded: Jul 21 2016 47 mins
    Cybersecurity Webcast co-hosted by SANS and Palo Alto Networks

    In financial institutions, investments in cybersecurity may occur in fits and starts due to actual incidents, media coverage, or perceived risk. This presents challenges in maintaining a consistent security posture, especially as the threats and the attack surfaces evolve continuously.

    In this webcast you will learn about the value of constant monitoring and awareness of your network traffic, the role and relevance of anomalies, and the benefits of an overall security architecture for financial institutions.
  • Is IT feeling the heat? Try iland’s cool summer console release Is IT feeling the heat? Try iland’s cool summer console release Jeff Polczynski, Solutions Architect at iland and Lilac Schoenbeck, VP Product Management & Marketing at iland Recorded: Jul 21 2016 60 mins
    It may be summer, but IT never takes a vacation. As business projects slow, IT takes advantage of the downtime to shore up the infrastructure and overhaul systems. With all eyes on technology these days, everything from security breaches to system outages get outsized attention. It’s a lot to contend with.

    While any old cloud can provide a bit of shade, the iland cloud can do more. Our purpose built – and consistently enhanced – iland cloud console provides a welcome reprieve from the pain of managing cloud workloads, ensuring their security – and even answer questions from the executive suite.

    Join a webinar from our product experts, showing how the iland cloud console integrates:
    - A full complement of proactive security technologies
    - Tools to provision and manage VMs, vApps, network and more
    - 12 months of performance and capacity data
    - On-demand reporting for your executives and auditors
    - A host of “bonus features” to make your life easier

    Join this webinar to see how the iland cloud, with it’s innovative console, does more than outsource infrastructure. We’ll pour you a tall glass of virtual ice water, turn on the A/C, and make sure that your cloud operation is cool as a cucumber.
  • Up and Running in AWS, Now What About Security? Up and Running in AWS, Now What About Security? Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture Recorded: Jul 21 2016 54 mins
    For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.

    Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Tradition is out: where traditional security does and doesn’t fit
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • The Digital Boardroom in the Public Sector The Digital Boardroom in the Public Sector MyXa Elgstedt Recorded: Jul 21 2016 32 mins
    In 2010, a proposal was put to the UK Government to transform the delivery of its public services to be ‘digital by default’. But achieving a paperless public sector takes real organisational change. It has to start from the top: senior-level internal processes and business structures can be enhanced and improved by a digital approach, moving away from long-held paper-based systems. It just isn’t feasible to deliver public-facing services digitally and still retain old systems internally.

    Electronic board portals can drastically transform the way board, trustee and committee meeting materials are produced and consumed. Hundreds of public sector organisations around the world have kicked paper packs and emailed PDFs to the curb and made the lives of both administrators and directors much easier and more productive.

    Join us for a 30 minute webinar to learn more about switching to a digital board portal can:
    • Facilitate better communication and collaboration among board members
    • Save administrative time and reduce production costs
    • Upgrade the security of your most sensitive data
    • Make good governance easier
  • What makes a Next Gen SOC? What makes a Next Gen SOC? Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec Recorded: Jul 21 2016 52 mins
    As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.

    In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.

    Join our upcoming webinar and learn about:

    - Core requirements for a Next Gen SOC
    o Flexible Log Collection
    o Big Data Processing
    o Advanced Analytics
    o Real-Time Intelligence
    - SOC-centric services: Incident Response and Advanced Intelligence
    - SOC operating models – Building your own SOC, Operating Models & Extending Services
    - Developing the next generation of security professionals
  • Financial Services & GDPR – The Path to Compliance Financial Services & GDPR – The Path to Compliance Andrew Joss, Financial Services Industry Consultant Recorded: Jul 20 2016 58 mins
    An industry no stranger to compliance and regulation, Financial Services organisations face one of their biggest challenges yet as they consider how to tackle Europe’s newest data initiative GDPR (General Data Protection Regulation). Failure to comply will not only result in hefty fines never before seen in the industry – but presence in national headlines for all the wrong reasons.

    2018, when the legislation comes into law, may seem far off just now – however the complexity of the GDPR data challenge makes this a major business imperative which requires a plan in place for full compliance now.

    Join us on this webinar to learn:

    1.What GDPR actually is, and what it means to you and your organisation

    2.The Data Privacy Challenges GDPR creates, and the repercussions if you fail to meet them

    3.Key software approaches which address GDPR Challenges, and helps you get your customer data under control
  • The Rise of Threat Actor Groups: What You Need to Know The Rise of Threat Actor Groups: What You Need to Know Christopher Ahlberg, CEO of Recorded Future, and Teresa Shea, Director of Cyber Reboot at In-Q-Tel Recorded: Jul 19 2016 62 mins
    As we’ve seen targeted threats increase in recent years, we’ve also witnessed the rise of the threat actor group. Not a lone hacker, but a team of individuals with a specific mission to compromise technology. Whether these groups are focused on compromising and leaking information, stealing financial data, or hacktivists driven to disrupt service or deface websites, what they have in common is the willingness to pursue and attack very specific targets often using unique or brand new TTPs.

    In this “virtual fireside chat,” Recorded Future Chief Executive Officer Christopher Ahlberg will be joined by Teresa Shea, director of cyber reboot at In-Q-Tel, to discuss how the actions of threat actor groups bear direct relevance to any organization's cyber security strategy.

    Their discussion will focus on the following questions:

    • Should companies research threat actors? Or just harden their defenses?
    • What types of threat actors should companies be aware of?
    • Is cyber terrorism a real threat?
    • Does attribution of actors matter for businesses rather than just government agencies?
    • How will the landscape change over the next five to ten years, and which countries are on the rise?
  • Bringing Shadow Devices into the Light Bringing Shadow Devices into the Light Mike Rothman, Securosis Analyst and President Recorded: Jul 19 2016 48 mins
    Shadow Devices and Cybersecurity

    Along with the burgeoning Internet of Things comes a new reality: billions of invisible devices connected to private networks. These “shadow devices” enlarge your attack surface and, if left in the dark, expose your organization to malware propagation and theft of critical resources.

    In this webinar, Mr. Rothman defines the classes of shadow devices—everything from sensors to medical devices to industrial control systems—and discusses how to gain visibility and control of these potentially dangerous endpoints. In addition, he’ll talk about next-generation access control and the strategies and technologies that reveal shadow devices through:

    • Visibility and risk profiling
    • Controls to protect vulnerable agentless devices
    • Automation and integration of existing security technologies

    --

    Mike Rothman, Analyst & President, Securosis, Inc. started his career as a programmer and a networking consultant. Today, he specializes in protecting networks and endpoints, security management, and compliance, or what he calls “the sexy aspects of security.” Mike is one of the most sought-after speakers and commentators in the security field and, after 20 years in the business, he’s one of the guys who “knows where the bodies are buried.”
  • Why do you need 24X7 SOC at your service Why do you need 24X7 SOC at your service New Corporate Video Recorded: Jul 19 2016 4 mins
    Watch this 4-min video to better understand what is MDR (Managed Detection and Response), and how AWN CyberSOC delivers vigilant cybersecurity through 24X7 monitoring, cloud-based SIEM and customer-dedicated security engineers.
  • Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention Prevention Week Part 2: Defeat Zero-Day Exploits by Automating Prevention Michael Moshiri | Director, Advanced Endpoint Protection at Palo Alto Networks Recorded: Jul 19 2016 61 mins
    Your endpoint security should easily prevent known threats. But can it also prevent unknown threats from compromising your environment? More importantly, can it automate this prevention so you don’t have to assign scarce resource to investigate alerts?

    In this webinar, you’ll discover a revolutionary approach to defeating zero-day exploits. We’ll examine current approaches to exploit prevention, discuss the top 10 zero-day exploits of 2015, and analyze unknown threats on the day they became known.

    You’ll learn:
    •How to future-proof your endpoint security to protect your users from unknown threats
    •Why other approaches to endpoint protection cannot prevent zero-day exploits
    •Which applications were targeted by the top 10 zero-day exploits discovered in 2015
    •How to automate threat prevention through a natively-integrated, next-generation security platform
  • Overcoming Ransomware (Editorial webinar by SC Magazine) Overcoming Ransomware (Editorial webinar by SC Magazine) Brian NeSmith, Arctic Wolf Networks CEO and Co-founder Recorded: Jul 19 2016 33 mins
    Ransomware is hardly new, but it’s evolved into a very dangerous trend. Hosted by SC Magazine, this editorial webinar invited Brian NeSmith, CEO from Arctic Wolf for a Q&A style conversation about:

    - Why traditional backup strategies fail
    - 5 Things IT should do if exposed
    - Latest technologies for email security
  • Briefings Part 2: Integrate Data Security with Your Big Data Platform Briefings Part 2: Integrate Data Security with Your Big Data Platform Praveen Jain, Systems Engineer, Partner Engineering, HPE Big Data Platform - Vertica: Reiner Kappenberger, Global Prod Mgmt, Recorded: Jul 19 2016 59 mins
    A global telecoms company ingests 300 million customer records in < 1.5 minutes today. A mid-size firm handles 3.7 billion transactions annually. With Big Data analytics at the heart of all these systems-driving transformation, innovation and new customer insights-these projects include massive quantities of sensitive data that flow across multiple systems. Adding to the complexity of securing your data, these systems are spread across multiple data centers, on premise, and in the cloud. Join HPe Security - Data Security and (ISC)2 on July 19, 2016 at 1:00PM Eastern to understand how enterprises can leverage end-to-end data-centric protection in conjunction with their Big Data systems and view a technical deep dive into how enterprises can gain Big Data Insights - without the risk.
  • WhiteHat Security's 2016 Web Applications Security Stats Report Explained WhiteHat Security's 2016 Web Applications Security Stats Report Explained Ryan O'Leary, VP Threat Research Center & Technical Support, and Tamir Hardof, CMO, WhiteHat Security Recorded: Jul 19 2016 50 mins
    In this insightful and data-rich one-hour webinar Ryan O'Leary, Vice President of WhiteHat Security's Threat Research Center and Technical Support, and Tamir Hardof, Chief Marketing Officer, will present findings from our 2016 Web Applications Security Statistics Report.

    The Report, compiled using data collected from tens of thousands of websites, reveals that on average the majority of web applications exhibit two or more serious vulnerabilities per application for every industry at any given point in time. We will provide unique perspectives on the state of website security. Data by industry will be presented and accompanied by expert analysis and recommendations.


    Why Attend

    - Learn which industries declined, improved, or greatly improved their remediation rates
    - Learn how many vulnerabilities are typically remediated and the average time to resolve
    - Learn why knowing your risk rating can help you prioritize which vulns to fix first
    - Discover the 3 most common web application vulnerabilities
  • Transaction Monitoring Model Basics: Management, Selection and Security Transaction Monitoring Model Basics: Management, Selection and Security Robert Colatarci, Peter D. Wild, Rebecca Schauer Robertson, and Shannon Cox Recorded: Jul 19 2016 58 mins
    Join Experis Finance for a complimentary, virtual panel webinar focused on whether or not your AML models for transaction monitoring perform according to regulatory expectations.

    Regulatory guidance requires independent validation of models used for risk management purposes, including AML systems. Greater emphasis is being placed on institutions to identify suspicious activity and ensure that the models used are effective. This panel, which includes both community bank and large bank perspectives, will discuss the independent validation of transaction monitoring systems, examples of typical validation findings, and the development of an action plan to address the results of a validation.

    After attending this webinar,

    •You will begin to understand the necessary components of Data Management as it relates to the set-up of Transaction Monitoring Systems
    •You will understand the current rules-based systems, the newer behavioral-based systems, and how they work
    •You will understand the basics of how to select a new transaction monitoring system
    •You will understand the next generation of Cyber Threats and how they differ from traditional attacks

    Presenters include:
    - Robert Colatarci, Senior Manager, Financial Institution Services, Experis Finance
    - Peter D. Wild, Internal Audit Partner, Wild AML Services
    - Rebecca Schauer Robertson, Sr. Vice President - Director of AML Compliance, South State Bank
    - Shannon Cox, Sr. Vice President - Enterprise BSA Officer, First National Bank of Santa Fe
  • What Going Digital Really Means to IT What Going Digital Really Means to IT Bill Briggs, CTO, Deloitte Consulting LLP Ross Mason, Founder and VP of Product Strategy, MuleSoft Recorded: Jul 19 2016 64 mins
    Almost everyone is undergoing digital transformation, but not everyone knows the right way to do it. In a recent MuleSoft survey, 96 percent of respondents are executing on digital transformation initiatives or planning to do so in the near future. However, the results also showed that just 18 percent of IT decision makers are confident that they will succeed in meeting this year’s digital transformation goals. To do this effectively, IT teams need different skill sets, tools, and more importantly, different mindsets. Join Bill Briggs, CTO at Deloitte, and Ross Mason, Founder and VP of Product Strategy at MuleSoft, to learn how IT can grow beyond “business as usual".
  • Bigger Bang for the Buck: Agility with Security for Financial Services Bigger Bang for the Buck: Agility with Security for Financial Services Maya Malevich - Director, Product Marketing Tufin and John Parmley- Area Vice President - US West, Tufin Recorded: Jul 19 2016 43 mins
    For many financial services organizations, security and risk management is a necessary evil that slows down IT's ability to keep up with business needs. The conflict between security and agility becomes even greater with adoption of hybrid cloud platforms. While agility should be maintained, security and compliance become even more challenging.

    By automating and orchestrating network security policies across physical and hybrid cloud platforms, it is possible to maximize both agility and security simultaneously.

    Join us for this session to understand how network security change automation with inherent policy controls can help you stop the balancing act between agility and security and maximize both for your business.
  • Nova versão PCI - mudanças e clarificações da norma Nova versão PCI - mudanças e clarificações da norma José Roberto Giunti Lama, Managing Consultant and Isabel Silva, Business Development Director Recorded: Jul 19 2016 63 mins
    A versão 3.2 do PCI DSS (Payment Card Industry Data Security Standard) já foi anunciada – as organizações precisam entender as mudanças e suas implicações. Participe para aprender mais sobre o porquê foi lançado tão rápido e como você pode preparar a sua organização.

    Participe deste webinário para aprender sobre:
    • O escopo na nova versão PCI DSS 3.2
    • Que significa para o seu negócio?
    • Porque você deveria implementar essas mudanças, mesmo que não forem mandatórías?
    • O que pode vir no futuro próximo?
  • Erhalten Sie Einsicht in die größten Cyberangriffe in EMEA im Jahr 2015 Erhalten Sie Einsicht in die größten Cyberangriffe in EMEA im Jahr 2015 Mathias Fuchs, Senior Incident Response Consultant bei Mandiant Recorded: Jul 19 2016 47 mins
    Dieses Webinar verdeutlicht Ihnen, unterstützt von wichtigen Trends, Statistiken und Anwenderberichten, die Entwicklung der raffinierten Cyberangreifer und ihrer Angriffsstrategien im vergangenen Jahr in EMEA.

    Registrieren Sie sich für das Webinar und lassen Sie sich von Mathias Fuchs, Senior Incident Response Consultant bei Mandiant, die wichtigsten Erkenntnisse aus diesem Report erläutern. Außerdem zeigt er Ihnen, wie Sie sich optimal auf einen Cyberangriff vorbereiten und im Falle eines Vorfalls richtig reagieren.