Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Introducing the Latest Release of Symantec Advanced Threat Protection: Email Introducing the Latest Release of Symantec Advanced Threat Protection: Email Jane Wong,Product Management,Gateway Security Group,Symantec & Nirav Shah, Email Security Product Marketing Manager, Symantec Dec 8 2016 4:00 pm UTC 30 mins
    Stop Sophisticated Email Threats by Leveraging one of the World’s Largest Global Intelligence Networks

    Email continues to be the #1 threat vector for targeted and advanced attacks. The ubiquity of email and the widespread adoption of traditional email security solutions has led attackers to move beyond basic spam and phishing emails to more targeted and sophisticated attacks to infiltrate an organization.

    Join Symantec’s Jane Wong, Sr. Director, Product Management,Gateway Security Group and Nirav Shah, Email Security Product Marketing Manager to learn:

    - How Symantec can help your organization uncover, stop and respond to sophisticated email attacks while providing the deepest level threat intelligence.


    Register Today
  • Malware Detection: How to Spot Infections Early with AlienVault USM Malware Detection: How to Spot Infections Early with AlienVault USM Don Shin & Brian Bledsoe Dec 8 2016 4:00 pm UTC 60 mins
    While malware has been a thorn in the side of IT pros for years, some of the recent variants observed by the AlienVault Labs security research team, like Mirai, have turned our own Internet of Things (IoT) devices into weapons against us. Join us for a live demo to learn about the most common types of malware, and how you can detect infections quickly with AlienVault USM.
    In this demo, we'll cover:
    Common types of malware (viruses, worms, Trojans/RATs, rootkits, and more)
    How new variants propagate while evading preventative security measures
    Signature versus anomaly detection (and why both are important)
    What to do when you detect malware activity on your network
    How USM can help identify malware infections so you can take action quickly
  • The Role of Internal Network Traffic Analysis in Cybersecurity The Role of Internal Network Traffic Analysis in Cybersecurity Rob Westervelt, Research Manager, IDC Security + Arabella Hallawell, Sr. Director ADVT Product Marketing, Arbor Networks Dec 8 2016 5:00 pm UTC 60 mins
    This joint webinar between IDC and Arbor Networks will discuss how the threat landscape is rapidly evolving with financially motivated attackers, nation-states, and hacktivists out to disrupt business operations, steal data, or conduct corporate or cyberespionage.

    IDC analyst Rob Westervelt will examine an emerging category of solutions called Internal Network Traffic Analysis, which provide innovative approaches to attack detection and prevention. A comprehensive approach for data protection has network monitoring and traffic inspection at its core. Network traffic analysis is an essential element of most threat prevention and data protection strategies. He will explore why these solutions are a requirement and describes the most critical components necessary to identify and contain attacker movement before critical network resources and servers containing sensitive data are exposed.

    Arbor’s Arabella Hallawell, herself a former industry analyst with Gartner, will discuss the role of Arbor Networks solutions in addressing the challenges described above.
  • CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access CA Briefings Part 4: Step 3: Secure and Simplify Cloud Access Hadeel Dabbagh, Sr. Principal Product Mgr; Kathy Hickey, VP, Product Mgmt.; Brandon Dunlap (Moderator) Dec 8 2016 6:00 pm UTC 75 mins
    The steps for strengthening your enterprise and increasing customer engagement has seen the rise of cloud adoption and a "bring your own app" trend in the workplace which continues to grow. IT and security leaders are hard pressed to keep up with the demands of a seamless user experience while protecting user identities across the cloud environment. On December 8, 2016 at 1:00PM Eastern, CA Technologies and (ISC)2 will examine how to leverage identity-as-a-service to secure access to cloud applications - including provisioning, onboarding and deployment, deliver a seamless user experience without compromising security and how to keep up with the pace of cloud adoption.
  • Coalfire and vArmour: PCI Compliance with Software-Based Segmentation Coalfire and vArmour: PCI Compliance with Software-Based Segmentation David Anderson, Director of Technology Marketing at vArmour, and Chris Krueger, Principal, Cloud & Virtualization at Coalfire Dec 8 2016 6:00 pm UTC 60 mins
    Join PCI Qualified Security Assessor Coalfire and vArmour to learn how application-layer network visibility, software-based segmentation, and micro-segmentation can help organizations adhere to PCI DSS 3.2 requirements in data center and cloud environments.

    We’ll dive into:
    -vArmour Distributed Security System architecture and capabilities
    -Coalfire evaluation criteria and findings
    -PCI requirements addressable by vArmour DSS
  • Next Generation Data Breach Response: Preparing Your C-Suite and Board Next Generation Data Breach Response: Preparing Your C-Suite and Board King & Spalding, Rite Aid, and Kroll Dec 8 2016 6:00 pm UTC 60 mins
    In today’s complex and ever-changing security landscape, every C-Suite and Board knows of cyber risk, but what does it really mean to be prepared to respond to a data breach incident? Top executives do not have to become cyber security experts, but they must make sure their organization’s breach response plans and strategies are defined and set. While they will not directly lead technical, legal and notification efforts to address data breaches, they do need to act as internal champions of proper planning and prevention.

    Identifying and closing security gaps, directing communication channels, and developing and regularly testing incident response plans are as important now as managing any other business risk or concern. Therefore, company leadership must take charge and direct their organizations to conduct extensive preparation efforts to mitigate those risks and make certain everyone stands ready to execute against the established procedures and policies when a breach occurs.
    In this webinar, you will hear from experts who have been on the inside and outside of data breach response efforts. You will learn:

    •Why the C-Suite and Board need to champion planning and prevention efforts.
    •How to get Executive buy-in.
    •Ways to build stronger response structures from the top.
    •How to construct response architectures. Who needs to be responsible for what?
    •Cyber Risk – What are the latest threats and what does the C-Suite and Board need to understand?
    •Developing and directing an Incident Response Plan: Where do the C-Suite and Board fit in?
    •Examples our experts have seen – the good and the bad
  • Customer Service: Maximizing Service Management Beyond IT Customer Service: Maximizing Service Management Beyond IT Paul Kelsey, Kifinti Solutions Inc. & Mike Heberling, HEAT Software Dec 8 2016 6:00 pm UTC 60 mins
    Customer Service: Maximizing Service Management Beyond IT

    There is a distinct need for a tech support staff with a desire for supporting customers with immediacy and social intelligence— creating a better connection in a digital world.

    Both internal and external customers are utilizing more communication channels and more devices now than ever before. The mobile workforce, remote work, consumerization, increased self-service, and emerging technologies have all played a part in creating the demand for better ways to serve customers and users.

    Join us for this Customer Service webinar & learn:

    Instant information to clients
    - Workflow to run based on known and secure criteria
    - Voice system knows everything the Service Desk knows

    Multiple communication channels
    - Integration and capabilities
    - Omni Channel
    - Single message representation

    Distributed Support/Telecommuting
    - Globalization
    - Repatriation of Call Centers

    Voice of the Customer Score
    - Personalization of Interaction and Routing
    - Custom Surveys based on Service and Category

    Auditing and Compliance
    - Reporting on actual effort for Labor Law compliance

    Who should attend?
    - VP of Support
    - IT Service Desk managers
    - Desktop Support managers
  • 2016 Has Been a Security Minefield; Are You Ready for 2017? 2016 Has Been a Security Minefield; Are You Ready for 2017? Scott Crawford (451 Research) and Rodney Joffe (Neustar) Dec 8 2016 6:00 pm UTC 60 mins
    Ransomware. Politically-motivated hacking. Distributed denial-of-service – and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017?

    In this webinar, Scott Crawford, Research Director for Information Security with 451 Research, and Rodney Joffe with Neustar will examine these trends and highlight key tactics to better prepare you for what the coming year may bring. We’ll explore:

    Key factors in today’s security landscape that shape our future defense strategies:
    •Many attacks are about money today, what will they be about tomorrow?
    •Without DNS, there’s no Internet as we know it. Recent attacks against DNS have set new records for scale and taken down some of the Internet’s biggest names. What’s your strategy for assuring that DNS doesn’t fail your business?
    •The hidden agenda of attackers who use these techniques as a means to a more serious end
    •Tactics for strengthening your resilience, to better prepare you for the coming year – and beyond

    Has your security strategy responded to these factors – and is it ready to take the hit from what may come next? Join us to learn more about what your organization can do to be better prepared for these too-often hidden aspects of highly visible threats.
  • Re:Invent Re:Cap Re:Invent Re:Cap Mark Nunnikhoven, Vice President of Cloud Technology, Trend Micro Dec 8 2016 6:00 pm UTC 60 mins
    re:Invent 2016 was a whirlwind of announcements and new possibilities. AWS unleashed a torrent of new functionality across all 50+ services. Join leading cloud expert, Mark Nunnikhoven, as he reviews the highlights of the show, unearths the hidden gems, and discusses how these new features could impact your approach to security in the AWS Cloud.
  • The Value of Data Quality to American Family Insurance’s Data Governance Program The Value of Data Quality to American Family Insurance’s Data Governance Program Vinaya Thummala, Enterprise Data Quality Specialist & Sarah Moen, Information Quality Specialist at American Family Insurance Dec 8 2016 7:00 pm UTC 60 mins
    In this webinar, Vinaya Thummala and Sarah Moen will share insights on the data governance program at American Family Insurance. They will discuss the value of high quality data to their program and what it has meant to their success. By leveraging Informatica Data Quality, they have been able to ensure that their data is reliable, consistent, and clean. In this webinar, you will:

    •Hear an overview of the Information Quality Management Program at American Family Insurance
    •Lean how data governance activities are supported by data quality policies, standards and processes to continuously monitor and improve the reliability of business data
    •Understand the effective use of data quality in projects: check and ensure the quality of all data, including existing data, transformed data and newly created data
    •Discover their Data Quality as a Service Model: Data quality services deployment at Enterprise level for technical expertise, shared infrastructure, and different engagement models to meet all business needs
  • Deploy & Manage a Modern Data Platform on Microsoft Azure Deploy & Manage a Modern Data Platform on Microsoft Azure Jennifer Wu, Director of Product Management, Cloudera and Daniel Karuppiah Director of Product Marketing Microsoft Dec 8 2016 7:00 pm UTC 60 mins
    Discover the new platform within the enterprise! The emergence of Big Data has driven the need for a new data platform within the enterprise.

    Apache Hadoop has emerged as the core of that platform and is driving transformative outcomes across every industry.

    Leverage the unique advantages of Cloudera Enterprise to help you improve products and service offerings, drive operational efficiencies, and reduce your business risk. The Cloudera offering in Azure Marketplace combines the latest open source components from the Apache Hadoop ecosystem with enterprise-grade security, governance, and management tools to help you move quickly from Proof of Concept (POC) to production and deliver value to the business.

    Join this webcast to:
    - See how Microsoft Azure provides first class support for your Linux-based Apache Hadoop applications
    - Explore the Cloudera Enterprise stack, from open source components to enterprise tooling
    - Review common use cases for Cloudera on Azure
    - Discover customer benefits and success stories
    - Learn how to deploy and start recognizing value with Cloudera on Azure

    This webinar is part of the ‘8-part Azure Open Source’ webinar series dedicated to discussing various open source solutions available on Azure, to ensure you're successful with your Linux-based applications provided by our trusted partners like Cloudera, Datastax, Cloudbees, SUSE, Pivotal, and more.

    This webcast is part of our Realize more benefits with open source on Azure webcast series. Sign up for this session, or the entire series today!
  • Rapid7 InsightIDR Product Demo Rapid7 InsightIDR Product Demo Eric Sun and Pat Haley Dec 8 2016 8:00 pm UTC 60 mins
    By integrating with your existing network & security stack, InsightIDR leverages user behavior analytics to correlate the millions of events your organization generates daily to the exact users and assets behind them. Along with custom included intruder traps, you'll automatically detect the top attack vectors behind breaches, including compromised credentials, malware, and phishing. Combined with a fully searchable data set and endpoint interrogation, InsightIDR directly addresses the gaps found in most of today's detection technologies, including SIEM and IPS.
  • Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning Accelerating Threat Hunting Maturity - From Adhoc to Advanced Machine Learning James Hanlon, Security Markets Director, Splunk, Adrian Davis, Managing Director, (ISC)² EMEA Dec 9 2016 1:00 pm UTC 60 mins
    Threat hunting is evolving. Many organizations still carry out threat hunting in an adhoc manner without a defined and repeatable process. Yet some organizations are now looking at new machine learning driven approaches to accelerate their maturity and success. This session will review the current approaches to threat hunting and explain how Splunk can support & accelerate your threat hunting maturity.
  • Abusing Bleeding Edge Web Standards For AppSec Glory Abusing Bleeding Edge Web Standards For AppSec Glory Ryan Lester, CEO & Co-Founder of Cyph Dec 9 2016 8:00 pm UTC 45 mins
    Through cooperation between browser vendors and standards bodies in the recent past, numerous standards have been created to enforce stronger client-side control for web applications. As web appsec practitioners continue to shift from mitigating vulnerabilities to implementing proactive controls, each new standard adds another layer of defense for attack patterns previously accepted as risks.

    With the most basic controls complete, attention is shifting toward mitigating more complex threats. As a result of the drive to control for these threats client-side, standards such as SubResource Integrity (SRI), Content Security Policy (CSP), and HTTP Public Key Pinning (HPKP) carry larger implementation risks than others such as HTTP Strict Transport Security (HSTS). Builders supporting legacy applications actively make trade-offs between implementing the latest standards versus accepting risks simply because of the increased risks newer web standards pose.

    In this talk, we'll strictly explore the risks posed by SRI, CSP, and HPKP; demonstrate effective mitigation strategies and compromises which may make these standards more accessible to builders and defenders supporting legacy applications; as well as examine emergent properties of standards such as HPKP to cover previously unforeseen scenarios.
  • Protecting Your Business from the Ransomware Threat Protecting Your Business from the Ransomware Threat James Carder, CISO of LogRhythm, Ryan Sommers, Manager of Threat Intelligence and Incident Response, LogRhythm Labs Dec 13 2016 12:00 am UTC 45 mins
    The Scenario

    It's 2:00 p.m. on a Friday afternoon, and you get that fateful call. An employee's laptop was hit by the latest CryptoWall variant. The employee was merely searching for how to solve a computer problem, but within minutes of clicking a link, his files have been encrypted and he must pay a ransom fee to get them back.

    Unfortunately, his laptop wasn't the only thing affected. The file shares that he was connected to were also encrypted beyond reach. Other calls start coming in. Files in various department shares are "corrupted" and things are grinding to a halt. Another ruined weekend for the SOC and IT--and likely another payday for the bad guys.

    Defending Your Organization Against Ransomware

    In this webinar, LogRhythm will look at the business problems surrounding the new and evolved ransomware threat. The webinar will also give you a brief technical overview of how these schemes function and how they can be spotted and responded to early enough in the threat lifecycle to severely limit the potential damage. You'll also be given a framework that you can work through to better protect your organization in the face of this looming menace.

    Webinar topics include:

    • The early indicators of ransomware
    • Automated defenses that you can put in place to thwart the attack
    • The steps that must be followed (with robotic precision) to make a mole hill out of the potential mountain.
  • Privacy by Design: How to Protect your Hybrid Enterprise from the Inside Out Privacy by Design: How to Protect your Hybrid Enterprise from the Inside Out Paul Ferron, Digital Identity Strategist CA Technologies EMEA and John McGonagle, Sr. Associate, DLA Piper Dec 13 2016 2:00 pm UTC 60 mins
    As organisations transform digitally the opportunity exists to build security into the network and infrastructure from the beginning. The new EU General Data Protection Regulation extends to virtual and cloud environments as well as traditional on-premise – and there are implications for moving and sharing data within these environments too.

    Join this webcast with Paul Ferron, Digital Identity Strategist CA Technologies EMEA and Giulio Coraggio, Partner and Head of the Italian Technology Sector at DLA Piper as they explore

    -How to balance digital transformation with compliance and protect PII while also enabling identities.
    -How a Privacy by Design approach enables companies to realise economic growth by building Trusted Digital Relationships with stakeholders.
    -Using Trusted Digital Relationships as a basis for GDPR compliance.
    -Implications of GDPR on data sharing
    -How to leverage GDPR to benefit consumers
  • Operate with Confidence: Responding to the Changing Risk Environment in LATAM Operate with Confidence: Responding to the Changing Risk Environment in LATAM Brian Weihs and Ian Cook with Kroll Investigations and Disputes and John Fanning with Kroll Compliance Dec 13 2016 3:00 pm UTC 75 mins
    Whether operating in the region or conducting business through third parties, the shifting risk and regulatory landscape in Latin America poses many challenges. With local nuances, a one-size-fits-all approach to compliance and due diligence might do little more than provide a false sense of security.

    Join Kroll's experts as they discuss the changing risk environment in Latin America and the potential implications on your risk mitigation and due diligence programs in the region.

    Agenda:

    - Corruption risks and trends in Latin America

    - Understanding local nuances: What you need to know when conducting business with third parties in the region

    - Best practices for risk mitigation and due diligence

    - Q&A
  • Eliminating security blind spots for Endpoints or on the move Eliminating security blind spots for Endpoints or on the move Kim Ellery, Director Product Marketing Dec 13 2016 3:00 pm UTC 60 mins
    Just a few years ago it was all about keeping things out with traditional security focused on the perimeter. Today it’s a given that many risks have already made it past the front door – with the acceleration to the cloud combined with the exponential growth of mobility, sensitive data can be accessed from anywhere. This new reality has brought productivity gains but also a new landscape of risks. As a result, many organizations have upped their game, employing a strong playbook traversing from the endpoint to the cloud. This layered approach ensures organizations can tackle and respond to each play as it happens. Join Kim Ellery from Absolute for an insightful presentation on the strategic benefits of this new landscape, and why many organizations still miss critical security blind spots.
  • Protecting Online Shopping & Payment with PCI DSS Best Practices Protecting Online Shopping & Payment with PCI DSS Best Practices Maya Malevich - Director, Product Marketing Tufin Dec 13 2016 4:00 pm UTC 45 mins
    Black Friday and Cyber Monday are behind us, but if you are still working on your holiday shopping then you may be thinking about the risks associated with online payment options. Just in time for the 2016 shopping season, the PCI Security Standards Council recently announced changes to the Payment Card Industry Data Security Standard (PCI DSS).

    While usually associated with retail and financial services, PCI DSS compliance is in fact a challenge that crosses industries since online transactions are essential for any digital business. Join this webinar to learn how leaders from different industries are running network security policy orchestration to ensure continuous compliance with PCI DSS requirements.
  • 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" 451 Group and Gemalto Present "The Keys to Multi-Cloud Security" John Ray, Senior Product Strategist and EricHanselman, Chief Analyst at 451 Group Dec 13 2016 4:00 pm UTC 60 mins
    The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.

    Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.

    Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
    • Recent findings on enterprise cloud usage from 451 Group
    • How to analyze the security risks of your cloud platforms
    • Security practices for different cloud platforms and business processes
    • Future-proofing your Cloud security and data protection compliance
    • How security can work in the multi-cloud universe
    • Implementing a key management system that you own
  • Don't Pay the Ransom! Protect Yourself from Ransomware with Cloud Don't Pay the Ransom! Protect Yourself from Ransomware with Cloud Ed Cabrera, Chief Cybersecurity Officer, Trend Micro and Justin Giardina, CTO, iland Dec 13 2016 4:00 pm UTC 60 mins
    Ransomware has become the Number 1 threat facing organizations in 2016; and it is of particular threat to any company that relies heavily on documents to run their business. With adoption of cloud computing for more mission-critical use cases growing, IT leaders are naturally concerned about protecting against ransomware in the cloud as well as on-premise.

    Join the Chief Cybersecurity Officer of Trend Micro and the CTO of iland for this webinar where they'll delve into the significant threat that Ransomware poses to enterprise IT organisations - and discuss how to protect and remediate your business from ransomware attacks in the cloud.

    This webinar will look into how Ransomware has changed; and how it’s becoming more targeted and harder to identify. With email still being the number 1 attack vector and a reported 70% of spam now delivering Ransomware, we will look at how advanced sandboxing technology can be used to identify new and unknown threats, like Ransomware, and why you need a robust disaster recovery and back-up plan.

    What will be covered:
    · Insight into Trend Micro’s ransomware and 2017 threat predictions
    · Threat detection techniques to identify new and unknown threats
    · How Trend Micro threat intelligence is integrated in the iland cloud platform
    · How a cloud-based disaster recovery and back-up plan helps remediate ransomware attacks
  • Effective Patch Strategies for Windows 10 and Office 365 Effective Patch Strategies for Windows 10 and Office 365 Damon Covey, Director of Solutions Product Management – Symantec Dec 13 2016 5:00 pm UTC 60 mins
    Microsoft has made significant changes in how they provide updates to Windows 10 and Office 365. These changes have caused confusion and additional complexity for many enterprises.

    Please join us for this special webcast to gain a better understanding of:

    - What these change are and how new features in IT Management Suite can help simplify using Windows 10 and Office 365.

    Register Now
  • Protecting Patient Information in Enterprise Data Centers and the Cloud Protecting Patient Information in Enterprise Data Centers and the Cloud Tyrone Jeffress, Manager, IT Risk Management, Meditology; and Steve Neville, Director of Hybrid Cloud Solutions, Trend Micro Dec 13 2016 5:00 pm UTC 30 mins
    • Learn about both the security benefits and risks of a hybrid cloud environment.
    • Learn about ways to overcome security challenges within Enterprise data centers and the cloud.
    • Gain insight on some of the most common concerns and myths surrounding hybrid clouds, in order to make informed decisions on the issue.