Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Enterprises have generally responded to the security challenge, recognising that they cannot simply cross their fingers and hope to avoid a major cyber incident. Many have reached for the ‘big security technology catalogue’ and in the past couple of years we have seen increasing numbers of organisations setting out with the intention of deploying some form of SOC. While there is no getting away from the fact effectively deployed technologies and the integration of a well organised SOC can be part of the solution, very few organisations can actually set up and operate a form of SOC that will make a material difference. In this webinar, experts from Fujitsu will discuss the considerations that go into an effective SOC, identify common mistakes and recommend a SOC Strategy which is more likely to yield an improved security posture than blowing a massive budget on a ‘home-grown’ SOC.
Symantec Cloud Workload Protection, our latest offering for securing enterprise data center migrations into the public cloud. This new offering adds workload security to Symantec’s security portfolio for the cloud generation.
Cloud Workload Protection provides elastic security for AWS and Microsoft Azure workloads via cloud-native integration, enabling businesses to enjoy public cloud benefits without worrying about the security and integrity of their brand as they offer new services to their customers.
To learn more, visit the Symantec Cloud Workload Protection product page: https://www.symantec.com/products/threat-protection/cloud-workload-protection
A complete demonstration of CloudNine's SaaS-delivered eDiscovery automation software by industry expert and author Doug Austin. Used extensively by corporations and law firms to simplify legal discovery in litigation, investigations, and audits, CloudNine provides eDiscovery practitioners with a secure platform that enables the upload, review, and production of documents from a fully integrated and automated fourth-generation eDiscovery platform. For a free trial, visit eDiscovery.co.
Los puestos de trabajo y los dispositivos móviles son habitualmente los aspectos más olvidados en la estrategia de gestión de datos empresarial. Sin embargo, la información presente en ordenadores portátiles, de escritorio y dispositivos móviles es uno de los activos de mayor valor para la organización, pese a que potencialmente se encuentra en máximo riesgo. De acuerdo con IDC hay alrededor de 1.300 millones de trabajadores móviles hoy en día, pero tan solo la mitad de las empresas utiliza algún tipo de backup para puestos de trabajo.
La fuerza de trabajo móvil es cada vez mayor. Dichos usuarios manejan información fuera del dominio tradicional del departamento de TI y emplean soluciones de colaboración no corporativas. El coste potencial y el riesgo asociados al cumplimiento de la normativa y al eDiscovery, la necesidad de proteger el puesto de trabajo y de aportar soluciones de colaboración corporativas están claros y se encuentran en un punto de inflexión crucial.
Acompáñenos en este webinar, donde analizaremos:
- Cómo recuperar el control sobre lo que ocurre en los dispositivos móviles de los trabajadores
- Cómo mitigar los riesgos asociados con los ataques cada vez más frecuentes de ransomware
- Cómo aumentar la productividad con una plataforma segura para la compartición de archivos
À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en :
- Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
- Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
Cyber security is front and center like never before, and cyber leaders are working to speed cyber response times for threat prevention, detection, and mitigation for known, and more importantly, unknown threats.
A recent study shows Feds are losing the race against hackers– with 85% of security operations professionals taking hours, even days, to create protections against newly discovered cyber threats.
View the on-demand “Pedal to the Metal” webinar and hear from Federal and industry cyber experts as they discuss MeriTalk’s newest cyber study findings, including:
•How much time and manpower is expended analyzing threat intelligence?
•What advanced automatic capabilities can Feds utilize to act rapidly and decisively against advanced threats?
•Is threat intelligence is helping Feds prevent attacks – from never-before-seen threat actors and tactics – faster?
Featured Speakers Include:
•Paul Morris, Acting CISO/Acting Director, Information Assurance and Cybersecurity Division, TSA
•Pamela Warren, Director, Government and Industry Initiatives, Palo Alto Networks
With over 1 billion monthly active users, Facebook Messenger is beginning to change the world for companies looking for ways to connect with, engage, and retain an unprecedented number of customers. And we’re guessing that’s probably you.
It’s all because of Messenger’s developer tools, which have leapt on the promise of bots for customer service and native payments without ever leaving the platform--and have thoroughly delivered on it. Users stay cozily inside the Messenger platform to play games, search, shop, pay, and more, meaning they’re fully engaged with your brand in multiple ways in a single brand context.
Facebook’s long-term plan: make Messenger the center of users’ lives. Your short-term plan: start positioning yourself to take advantage of this revolution in messenger tech innovation. Register for this free VB Live event now and learn how you can monetize Messenger.
In this webinar, you’ll:
* Understand the broader digital wallet strategy to connect with customers through chatbots
* Get valuable tips to spin chatbots into gold
* Learn the biggest mistake organizations are making with payments through Messenger
* Laura Knapp, Managing Director, SRAX Social, Social Reality
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat
Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.
Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:
• What are your options if you’re a victim of ransomware
• Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
• How Symantec technologies work together for maximum protection
And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.
Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.
For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.
Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:
•PKI use cases in an enterprise environment to secure access and protect data
•Budgeting for your PKI deployment of modernization
•Outlining the deployment size, scope and timeline
•Analyzing and reviewing current and/or future security policies
•Maintenance and administration of the PKI system
•Configuring and understanding certificate authorities
•Developing a scalable approach to prepare for future needs
•Addressing the protection of sensitive keys and the ecosystem integration
Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organization will be compromised, but when.
The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.
In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.
•The definition and details of the TLM framework
•How TLM enables you to sort through the noise to highlight and investigate concerning incidents
•How TLM works to streamline processes through automated workflow
•Specific use cases TLM can address to prevent major data breaches
Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).
On a daily basis, organizations are targeted by cybersecurity threats. While these threats occur throughout the world, half of ransomware detections occur in the U.S. Today, the internet of everything, mobile devices, underfunded/staffed IT organizations and a critical lack of trained cybersecurity professionals are combining to make things more difficult. As ransomware attacks become more prevalent and the effectiveness of phishing attempts become more sophisticated, all but the largest IT organizations are fortunate if they can keep pace.
We know cyber attackers are becoming more refined and are searching for new ways to make a profit. Thanks to advances in attack distribution, anonymous payments, reliably encrypting and decrypting data, ransomware attacks are rising dramatically. Understanding the dangers of ransomware, and how to prevent them, has never has been more important.
Bob Turner, Chief Information Security Officer, Office of the CIO & Vice Provost for Information Technology, University of Wisconsin-Madison
Brad Duncan, Unit 42 Threat Expert, Palo Alto Networks
Jim Jorstad, Senior Fellow, Center for Digital Education
Please join the Center for Digital Education, the University of Wisconsin-Madison, and Palo Alto Networks for this informative on demand webinar to learn more about these challenges and to gain focused advice to help you combat one of the biggest obstacles every IT organization is facing.
Topics will include:
•The three key steps to protect against ransomware: preparation, prevention, and response
•New attack strategies and what to do about them
•Combatting new forms of cryptolocker and other ransomware
•Myths of ransomware
Digital transformation is changing the business landscape for every organisation, with the way new technologies can unlock competitive advantage, enable efficiently, agility and enhance customer experiences. The cloud is where this innovation is happening and enabling this transformation, but when you take advantage of its possibilities, it’s crucial that you secure your cloud applications and workloads.
If you’re building applications or migrating workloads to the cloud, you’re probably like most organisations – trying to determine what security controls are needed, and how to integrate workload security without slowing down innovation or needing to add dedicated security staff – which these days is harder to find and more expensive to keep.
During this panel discussion you will hear from industry experts as they discuss what steps and considerations should be taken when moving to any cloud. Where are the responsibilities of security and how do you maintain visibility and control over your data, including:
- Why when moving business critical applications to the cloud you require a different approach to security?
- Best Practices for minimizing risk in your cloud adoption
- Filling the Cloud Security IT Skills Gap
- Managing the Challenges of the Cloud under EU GDPR
Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis. But what about the risks? Join me, Stephen McCormack from IBM MaaS360 as I take you step-by-step through the key challenges that mobile devices bring, and how you can easily act to ensure your organisation is protected.
Join fellow security executives for a roundtable discussion over the necessity and importance of staying secure in a dynamically evolving and competitive landscape.
The cyber resiliency assessments are based on the U.S. Department of Defense’s mission-critical procedures and Unisys’ commercial best business practices. They provide an unbiased 3rd party expert assessment of the client’s Incident Response Capabilities, deliver a Security Enhancement Playbook, and identify the gaps in their cyber defense network that leads to improved cyber resiliency.
These assessments provide leadership with:
- A deeper insight into the effectiveness of decision making
- Understanding of the vulnerabilities in their cyber defenses
- How to enhance adaptability to the unanticipated and the capacity to emerge from a crisis faster with less damage to profitability, brand and customer loyalty.
We will also discuss how crisis-preparedness exercises help your team experience real-world threat scenarios in order to assess the team’s ability to address, contain, respond and mitigate security threats.
Dante Disparte, CEO of Risk Cooperative
John Bone, Global Director of Cyber Resilience, Unisys
Ed Liebig, VP of Global Security, Professional Services, Unisys
Sidney Pearl, Global MSS Executive Architect, Unisys
There is a lot of confusion around Oracle licensing, especially in virtualized or Cloud environments. In this session, we will provide an overview of the Skytap Cloud, and what Skytap has done to facilitate Oracle license-compliance in their cloud. We will provide education on the principles of Oracle licensing, and information on how those principles are applied to workloads running in the Skytap Cloud.
Hackers don’t wear blaze orange. Sophisticated adversaries are targeting you, your employees and your data. Let’s face it, yesterday’s traditional security defenses leave you exposed and render your corporate network open terrain. Take the target and put it on the attacker’s back.
Join a panel of security experts: Jeremy Linden, Sr. Product Manager Cisco Umbrella, Dhia Mahjoub, Principal Engineer Cisco Umbrella, Craig Williams, Sr. Technical Leader, Cisco Talos, and Robert Simmons, Director of Research, ThreatConnect, for an inside look at how to identify attackers, stalk their internet infrastructures and disrupt cyber-criminals before they disrupt you. Hunt or be hunted.
In today’s digital landscape, it’s much easier for criminals to access sensitive payment card data, not only gaining direct access to a consumer’s available funds, but also their personal identity. With cyber attacks becoming much more advanced, the PCI DSS standard has been forced to adapt to address these new threats.
However, PCI compliance is something that any organization can successfully achieve. The requirements of PCI DSS are clear, but it takes work to accomplish compliance across an organization. On this webinar our panel will discuss some best practices, and solutions that provides your business with an easy, cost effective and highly automated way to achieve compliance with PCI DSS in 2017.
The cyber threat landscape is constantly evolving and conventional security products (Firewalls, IPS/IDS and web proxies) are unable to address emerging threats in a fast and efficient manner. LookingGlass’ newest threat mitigation appliance, the ScoutShield Threat Intelligence Gateway, provides a zero-touch solution to automate the threat response.
Join our Director of Product Management, Kinshuk Pahare as he discusses the:
1. Challenges with conventional security appliances and the need for a Threat Intelligence Gateway.
2. Importance of having high quality threat intelligence.
3. Must-have characteristics of a Threat Intelligence Gateway appliance.
A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there
The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.
Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
With all of the hype about Technology Assisted Review, does keyword search still have a place in eDiscovery? You bet it does – if it is conducted properly. This CLE-approved* webcast session will cover goals for effective searching, what to consider prior to collecting ESI that will be subject to search, mechanisms for culling prior to searching, mechanisms for improving search recall and precision, challenges to effective searching and recommended best practices for searching and validating your search results to ensure effective search results.
+ Search Fundamentals
+ Considerations Before Searching
+ Mechanisms for Culling Before and After Searching
+ Mechanisms for Improving Recall and Precision
+ Searching Considerations and Challenges
+ Using Sampling for Defensible Searching
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog.
Karen DeSouza: Karen is the Director of Review Services, In-House Counsel, and a Professional Services Consultant for CloudNine. Also, Karen helps attorneys with CloudNine's software and Pre-Litigation Consulting Services. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence. Before CloudNine, Karen worked as an E-Discovery Director, Project Manager, and as an Associate at various law firms in Houston area where her primary focus was litigation.
* Approved in Selected States (To Be Published Prior To Webcast Delivery)
With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.
SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.
Learn how to:
•Stay safe from ransomware and other advanced attacks
•Practice good security hygiene
•Use trusted automated tools to protect your network and endpoints
The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
•Which specific guidelines concern customer information at rest and in transit
•How encryption and key management addresses these requirements
•The benefits of a centralized encryption management
Ransomware can be more disturbing and damaging than any other cyber crime, and payouts seem to be on the rise. Now, a new brand of extortion is emerging, where criminals threaten to sell data obtained from ransomware campaigns on the cyber criminal underground. Join this webinar to learn about the mastermind behind an infamous ransomware campaign, the mindset of criminals no longer content with small payouts, what role threat intelligence plays, and the pros and cons of paying off criminals.
The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.
Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:
• Which countermeasures will actually improve your security posture (they’re not the ones you think)?
• What is the best spend for your security dollar and why?
• If hackers could speak to your CEO or board of directors, what would they say?
Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
Everyone knows two-factor authentication right? or do you just know how to use it? Something you know and something you own is a phrase we can all recite but very few actually understand two-factor authentication and its true benefits. How it works, why two solutions are not alike or what to look for in a true secure solution are just some of the conversation topics covered in this webinar.