Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Secure By Design: Ensuring That Security Is Built In
    Secure By Design: Ensuring That Security Is Built In
    Chris Wysopal, Chief Technology Officer and Co-Founder at CA Veracode Live 45 mins
    As software becomes a bigger component of the value delivered by companies in every industry, it is no exaggeration to say that every company is becoming a software company that is competing with software.

    Companies are pushing the envelope on how to tool up their internal software factory to make software better, faster and more efficiently. By necessity, developers more often assemble software than create it from scratch, as they are more frequently incorporating open source libraries to speed up time-to-market. However, as open source libraries increase, so do the number of vulnerabilities, resulting in increased risk.

    In this session, Chris Wysopal, Chief Technology Officer and Co-Founder at CA Veracode discusses what it means to build software secure by design. He will describe how to build a software development process that has continuous security, is measurable, and is transparent.
  • Achieve NERC CIP Compliance with FireMon
    Achieve NERC CIP Compliance with FireMon
    Robert Rodriguez, Senior Sales Engineer | Brian Dixon, Sales Engineer | Elisa Lippincott, Director of Product Marketing Recorded: Dec 10 2018 12 mins
    Utilities need scalable solutions to help them adapt and comply with the constantly changing NERC CIP requirements. FireMon can partner with utilities to automate their security policy workflows, optimize their vulnerability management efforts, and get their networks under control with complete visibility, real-time monitoring and continuous compliance checks.
  • Balancing Compliance and Value in Data Management Initiatives
    Balancing Compliance and Value in Data Management Initiatives
    Ian Rowlands, ASG; Bob Cumberbatch; Consultant; Gaurav Bansal, RCloud Consulting; Garry Manser, Visa Recorded: Dec 10 2018 60 mins
    Over the past few years, about 90% of data management has been dedicated to the operational requirements of data governance and regulatory compliance, but this is changing rapidly as financial institutions look to exploit and drive business value from data.

    At a growing number of institutions, close to 70% of data management resource is focused on understanding data and implementing analytics that help the business work faster, smarter and identify new opportunities.

    How can you shift the balance between operations and business analytics safely and successfully, and ensure investment in data management initiatives delivers proportionate business value?

    Join this webinar to find out more about:
    - The shift from operations to business led data management
    - Ongoing challenges and solutions of regulatory compliance
    - How to identify value in data and drive business benefit
    - Approaches to balancing operational and business needs
    - Technology tools and solutions to sustain the balance
    - Ensuring return on investment in data management initiatives
  • 2018 – The year in cyber crime
    2018 – The year in cyber crime
    Orla Cox, Director Security Response, Symantec Recorded: Dec 10 2018 49 mins
    Cyber criminals today are relentless, and they only need to be successful once. With each passing year, not only does the sheer volume of threats increase, but the threat landscape becomes more diverse.

    From the explosion of coinmining activity in 20181, to the 600% rise in targeted activity against IoT devices1, attackers are still working relentlessly to discover new avenues to infect networks and steal data, while also covering their tracks.

    Join Orla Cox, Director of Security Response at Symantec for this insight-packed webinar, including:

    • How targeted attacks are evolving to exploit new technologies like IoT.
    • The increasing diversity of cyber attacks, and the new method that hackers are using to infect networks and steal information
    • A roundup of the year’s most high-profile attacks, and a look at what to expect in the year to come
  • Trust No One Part 3 - User Authentication for a Zero Trust Security Model
    Trust No One Part 3 - User Authentication for a Zero Trust Security Model
    Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Josh Green, Richard Archdeacon, Duo Recorded: Dec 10 2018 59 mins
    During episode 1 in our Trust No One Series, we heard about the origins of Zero Trust. Episode 2 showed us how Banco Santander started their Zero Trust journey.

    In this Part 3, Duo will demonstrate how they deliver Zero Trust models to their customers.
    You’ll leave with a hands-on basic understanding of how to deploy Duo to a cloud-based web-application.

    Duo has been a pioneer in bringing Zero Trust models to the commercial market, allowing organisations to protect themselves quickly and easily.

    Josh Green, Solutions Engineer, Duo Security
    Richard Archdeacon, Advisory CISO, Duo Security
  • How to protect your organisation in a digital world: Panel discussion and launch
    How to protect your organisation in a digital world: Panel discussion and launch
    Carolyn Williams, Director of Corporate Relations Recorded: Dec 10 2018 59 mins
    11 a.m Carolyn Williams, Director of Corporate Relations,
    Institute of Risk Management
    Introduction to the new Certificate and support from the
    WMG Cyber Security Centre at the University of Warwick
    and the University’s Department of Politics and
    International Studies,

    11.10 Panel discussion into: What are senior
    risk managers detecting in their businesses/macro/micro
    environment that underlines the need for digital upskilling.

    Steve Treece, CFIRM,
    Head of Corporate Risk, Corporate Portfolio Office, NHS Digital

    Steve O'Neill,
    Credit Risk Skills & Risk Academy, Barclays

    Stefano Capodagli, IRM Technical Specialist, Strategic Advisor & Group CRO


    11.30 Trudi Mellon, Specialist Consultant – Qualifications
    Projects, Institute of Risk Management

    Syllabus development, key learning outcomes,
    partnership with Warwick University

    11.40 James McCarthy , Student Admissions, Engagement &
    Support Manager,
    Institute of Risk Management

    Questions, advice and guidance on the practicalities of enrolment, studying and exams

    11.50 Questions and answers
  • Mobile Threat Management: Addressing endpoint security’s biggest blind spot
    Mobile Threat Management: Addressing endpoint security’s biggest blind spot
    Phil Hochmuth, Program Director, Enterprise Mobility at IDC Recorded: Dec 10 2018 41 mins
    Lookout invited a special guest, Phil Hochmuth, Program Director, Enterprise Mobility at IDC to talk about the rising implications of employees accessing business data and apps with smartphones.

    On the agenda:

    - The latest research in enterprise mobility adoption

    - Security and the top challenges sourced by IDC

    - How mobile threat management fits into an enterprise endpoint security architecture
  • Who should setup access in the ERP (Financial Application)?
    Who should setup access in the ERP (Financial Application)?
    Donald E. Hester; Robert DeRoeck; Ron Puccinelli Recorded: Dec 7 2018 64 mins
    As an IT auditor for local governments, one of the most often asked I get during audits is who should setup user access in the financial application. There is a debate of whether it should be IT or finance staff that create accounts and setup access. As with any professional my answer is it depends. It depends upon other controls that might be in place. What I like to do with clients is walk them through the needs and risks to help them design and understand the process they come up with. Let’s walk thought the logic and see what might be the best answer for your organization. Plus, we will answer a question from a listener on hacking Instagram accounts.
  • RSA #3 - Transforming Secure Access to be Intelligent
    RSA #3 - Transforming Secure Access to be Intelligent
    Ayelet Biger-Levin, CISSP, Senior Consultant, Product Marketing, RSA Recorded: Dec 7 2018 54 mins
    When it comes to making access decisions, it’s all about being smart. In the speed of today’s business agility requirements, we cannot stop users at the door all the time and ask for their ID. We need to know them. Intelligent Authentication provides the benefit of reducing friction AND adding security to protect applications and data that are critical to the business. It provides security and convenience, considering the needs of the modern workforce. In this session we will discuss a simple process to gain visibility into the right listening posts, derive actionable insights and then drive action to protect the organization’s most valuable assets from rogue access and drive Identity Assurance.
  • Post Perimeter Security 101 - Protecting a border-less world
    Post Perimeter Security 101 - Protecting a border-less world
    Aaron Cockerill, Chief Strategy Officer Recorded: Dec 7 2018 29 mins
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • Customer Data Management: Strategische Herausforderungen und Lösungen
    Customer Data Management: Strategische Herausforderungen und Lösungen
    Dr. Heiko Klarl, CMO / iC Consult Group Recorded: Dec 7 2018 36 mins
    In diesem Webinar erfahren Sie mehr über die strategischen Herausforderungen, die mit der Einführung von Customer Data Management-Lösungen einhergehen, und wie diese angegangen werden können.
  • 7 Common IAM Mistakes
    7 Common IAM Mistakes
    Adrian Pinderhughes Recorded: Dec 6 2018 48 mins
    Identity and Access Management (IAM) is a key factor in managing security: it helps manage access to applications and systems, but falls short when applying that same solution to enterprise data. How can you address the shortfalls – and get the most out of your IAM?
  • SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    SD-WAN Best-of-Breed vs All-in-One: Which should you choose?
    Dr. Jim Metzler and Joel Christner Recorded: Dec 6 2018 43 mins
    The WAN has been fundamentally upended by SD-WAN and IT decision makers now have to reconsider what the branch of today and tomorrow looks like. Do you choose a best-of-breed solution or do you settle on a solution that includes SD-WAN and other capabilities?

    Join our webinar to learn the pros and cons of each and which dimensions should power your decision.

    In this webinar, you will learn:

    * The similarities and differences between best-of-breed SD-WAN and all-in-one systems
    * Which challenges and complexities are either presented or remedied by each model
    * How best-of-breed SD-WAN and all-in-one systems affect long-term remote office architecture
    * And most importantly, which provides the most value in different circumstances

    SPEAKERS
    Dr. Jim Metzler is the Founder and Vice President at Ashton, Metzler & Associates. Dr. Metzler has worked in many positions in the networking industry. His current interests include Application Delivery, Software Defined Networking and Network Functions Virtualization.

    Joel Christner is the VP of Marketing at CloudGenix and has two decades of experience in building distributed systems, infrastructure, and application delivery.
  • Let's Talk About Security IT: Why 24x7 Monitoring is Critical
    Let's Talk About Security IT: Why 24x7 Monitoring is Critical
    Sonu Shankar - Sr. Product Marketing Manager - Arctic Wolf Networks Recorded: Dec 6 2018 52 mins
    Data breaches are now a common global occurrence, causing real economic damage to businesses. Lost revenue, damaged reputations, disrupted operations, and significant costs to recover, attackers are adapting their techniques at a much faster pace than most businesses. These once less sophisticated cyber criminals now have easier access to exploits that were previously only available to highly skilled nation-state actors.

    Without access to the large IT budgets to fend off these bad actors, small and medium businesses continue to struggle with determining the right approach to cyber security. Lacking the resources to build or staff a Security Operations Center (SOC), companies continue to invest in endpoint and perimeter security products. However, even with several security products deployed, breaches keep occurring. So, is there a way you could detect data exfiltration attempts early, even if the attackers were able to evade your endpoint defense mechanisms?

    In this webinar, we talk about:

    - Why investing heavily in endpoint and perimeter security products may not be enough
    - The top reasons why 24x7 security monitoring is critical to defend your business from today’s attackers
    - How you can transform your cyber security strategy today with advanced threat detection and response

    To discover why 24x7 monitoring is critical, register now.
  • The Hacker You Don’t Know – Uncovering Active Cyberattacks
    The Hacker You Don’t Know – Uncovering Active Cyberattacks
    Ahmed Hussein, Systems Engineer and Eric Kampling, Systems Engineer Recorded: Dec 6 2018 26 mins
    If an active attacker were operating inside your network right now, could you see them? IT security professionals today are challenged with detecting active attackers in addition to stopping malware & risky behavior. Learn how to leverage the power of machine learning to stop active cyberattacks before it’s too late.
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring
    Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring
    Anand Visvanathan, Director of Product Management, and LindaPark, Senior Manager, IaaS, Security & Compliance, Symantec Recorded: Dec 6 2018 46 mins
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    • Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    • Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    • How to migrate your legacy infrastructure to the cloud without compromising security and compliance

    Please Join Us, Register Today
  • Implementing NIST 800-171 with ForeScout
    Implementing NIST 800-171 with ForeScout
    James John, Systems Engineer, ForeScout Technologies, Inc. Recorded: Dec 6 2018 42 mins
    The ForeScout platform helps with 800-171 preparedness by automating and accelerating your path to compliance, reducing overall risk and maintaining and demonstrating ongoing compliance. James John, Senior Systems Engineer with ForeScout has extensive experience implementing and deploying the ForeScout solution in both public and private sector environments. He will demonstrate and share tips and tricks to help you maximize your existing investment to comply with NIST 800-171. The webinar and interactive demo will show you how to:
    •Effectively identify Controlled Unclassified Information on your
    network
    •Assess devices that store CUI
    •Build policies to effectively segment and protect these devices
    •Implement these policies and plan for remediation
    •Integrate with your existing security solutions
  • The journey towards a faster, safer and more efficient payments system in the US
    The journey towards a faster, safer and more efficient payments system in the US
    Gene Neyer - Icon Solutions, Carl Slabicki - BNY Mellon, Steve Ledford - TCH, Jim Reuter - FirstBank, Connie Theien - Fed Recorded: Dec 6 2018 61 mins
    The Federal Reserve recently requested public comment on a number of proposals. What does the Fed request for comment mean to the Financial Community and ultimately, to the end-user?

    This webinar is an opportunity to hear directly from the Fed on what is included in the request, an insight into the reaction of The Clearing House, as well as hearing the views of both a large and a mid-sized bank. As your institution is thinking through the strategic implications, take a listen to the experts and then form your own opinions. We also do encourage you to submit your comments to the Fed by the Dec 14th!

    The webinar will be moderated by Gene Neyer, Executive Advisor, Payments, at Icon Solutions. Gene’s extensive payments experience includes membership of the successor to the Fed Fast Payments Taskforce, GFFT, and President of the Supplier Committee at BAFT.
  • Rethinking Data Protection for the Gov Cloud
    Rethinking Data Protection for the Gov Cloud
    Ankur Chadda (Sr. Product Marketing Manager, Cloud) & Rob Campbell (Director, Data Security Solutions, Global Governments) Recorded: Dec 6 2018 48 mins
    As agencies modernize their security and data continues to move to the cloud, it’s critical to extend the same protections that you have on premises to the cloud.

    Watch this webinar to learn how Forcepoint CASB, along with DLP for Cloud Applications and Web Security solutions, can help with:

    • Discovery – insight into what cloud apps employees are using
    • Enforcement – automated threat prevention and context-aware policy enforcement
    • Risk Assessment – contextual risk of applications, users, and security configurations
  • Technical Education Series: Securing the Cloud Approach (re-run)
    Technical Education Series: Securing the Cloud Approach (re-run)
    Mohammad Kaouk - World Wide Solutions Architect Recorded: Dec 6 2018 56 mins
    In this webinar you will learn how to utilize Symantec’s Web Security Service in order to secure your day to day interactions with the Internet.
  • Privacy Insights Report 2018: Four lessons for business
    Privacy Insights Report 2018: Four lessons for business
    Nikki Stones, Privitar; Louise Turner, Edelman; Alexandra Deschamps-Sonsino, Author and Jeni Tennison, The ODI Recorded: Dec 6 2018 43 mins
    - Privitar Privacy Pulse 2018 -

    Privacy matters to your customers. 9 out of 10 consumers believe that technological advancements pose a risk to their data privacy – but 64% of businesses believe that they could miss out on a competitive edge by not making the most of their data. How can you reconcile the two?

    This session will unveil the results of a wide-ranging data privacy survey, during which we asked 5,000 consumers and 1,500 B2B leaders across the UK, US and France for their thoughts on data privacy and data protection. The webinar will feature experts from industry, policy and academia discussing the issues raised by the results, and their implications for your business.

    Gain a deeper understanding of consumer and corporate attitudes to privacy and enjoy our expert’s view on the implications for business as we discuss:

    - The missed opportunity of data utilisation

    - Erosion of trust through misuse of data

    - Demand for business prioritisation of data protection

    - Communicating the value exchange

    This will also be the chance to ask a panel of industry-leading professionals your data privacy questions, so please do register now to join the conversation. The key learnings from the report will also be available as a ready-to-download attachment for you to access and share.

    Speakers include:

    - Nikki Stones, Head of Marketing, Privitar

    - Jeni Tennison, CEO, The Open Data Institute

    - Louise Turner, Managing Director, Edelman Intelligence UK & Ireland

    - Alexandra Deschamps-Sonsino, Author, Smarter Homes: How Technology will Change Your Home Life
  • IDC FutureScape: Worldwide Future of Work 2019 Predictions
    IDC FutureScape: Worldwide Future of Work 2019 Predictions
    Roberta Bigliani, Vice President, Avinav Trigunait, Research Director, Holly Muscolino, Vice President Recorded: Dec 6 2018 59 mins
    In this IDC FutureScape presentation, analysts discuss key predictions that will impact CIOs and IT professionals in the future of work over the next one to five years.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.
  • Detecting and Insider Threat with LogRhythm UEBA
    Detecting and Insider Threat with LogRhythm UEBA
    Chris Ford, Enterprise Sales Engineer, LogRhythm Recorded: Dec 6 2018 23 mins
    Last year, 69 percent of surveyed organizations reported incidents that resulted in data theft — but not from external attacks. These threats came from inside the organization. User and Entity Behavior Analytics (UEBA) plays a crucial role in detecting the user behavior that can put your company at risk

    LogRhythm UEBA solutions uncover user-based threats with diverse analytical methods, including scenario- and behavior-based techniques, which deliver comprehensive visibility across the full spectrum of attacks.

    LogRhythm can help maximize efficiency and minimize risk, to help you solve security use cases such as insider threats, account compromise, privileged account abuse, and more.

    Watch our on-demand technical demo highlighting the power of our UEBA solutions.
  • Cloud Migration: Avoiding Common Pitfalls to Accelerate Adoption
    Cloud Migration: Avoiding Common Pitfalls to Accelerate Adoption
    Graeme Burton, Group News Editor, Computing (moderator) Paul Chapman, CIO, Box Angelo Crippa, EMEA Enterprise Business Develo Recorded: Dec 6 2018 50 mins
    Organisations have been moving to the cloud for at least five years, and probably talking about it for at least 10. With most of us familiar with the benefits of cloud services, why is the process of moving to the cloud still considered by some to be a challenge?

    Computing's Group News Editor, Graeme Burton is joined in the studio by Box's CIO, Paul Chapman, Angelo Crippa, EMEA Enterprise Business Development Leader at AWS and Peter Gothard, Technology Analyst at Computing.

    In this webinar, you'll hear some great insights and thoughts from the panel on:

    - The common pitfalls and hurdles when moving to the cloud
    - The different approaches and resulting opportunities
    - Enterprise-wide adoption of cloud technologies at an end-user level
    - The way cloud technology is affecting the key roles of CTOs and CIOs
  • Rethinking Security Models
    Rethinking Security Models
    Lee Fisher, Head of Security Business EMEA, Juniper Networks Recorded: Dec 6 2018 23 mins
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • CEO Insights: 2019 Cybersecurity Predictions
    CEO Insights: 2019 Cybersecurity Predictions
    Brian NeSmith, CEO and Co-founder of Arctic Wolf Networks Dec 10 2018 9:00 pm UTC 45 mins
    Cybercriminals continued on their rampage in 2018 stealing millions of records from Department of Homeland Security and successfully hacked into name brand companies like Adidas, Twitter, Cathay Pacific, and Ticketmaster. The pace is not expected to slow in 2019. With porous on-premises infrastructure, new cloud assets, and not enough people with cybersecurity skills to detect and respond to threats, 2019 should be a lively year.

    The cybersecurity experts at Arctic Wolf Networks (AWN), a leading Security Operation Center (SOC)-as-a-Service provider have seen all types of attacks that have attempted to sneak through many a company’s perimeter and endpoint defenses.

    In this webinar, Brian NeSmith, CEO and co-founder of Arctic Wolf will walk through the top predictions for 2019, based on what our security services team has seen across more than 500 customers.

    Here is a preview of the top 3 predictions that is bound to surprise you.

    - The new approach cybercriminals will employ to get into target organizations
    - Which industries will be most attractive to 2019’s hackers
    - Whether new security technologies can live up to their expectations
    - And much more!

    To hear from this security expert and to learn what to look for in 2019, register now.
  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout Dec 11 2018 2:00 am UTC 60 mins
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    • The current threat landscape and unique security challenges healthcare organizations face
    • Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    • How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • Trends in the Industry: Setting the Stage on Open Source Trends
    Trends in the Industry: Setting the Stage on Open Source Trends
    Mark Curphey, VP of Strategy, Veracode Dec 11 2018 10:30 am UTC 42 mins
    Open source is here to stay. Iconic brands like Google, Facebook, and Twitter have pioneered the practice of building their platforms on a core of code that is shared with the public and free for anyone to use. Rather than build applications from scratch, today’s developers first look to third-party code to kick start their innovation in the form of open source libraries. Unfortunately, reusable code also means reusable vulnerabilities, and the bad guys are increasingly turning to attacking open-source. In a recent study by Veracode, a whopping 88% of Java applications had at least one flaw in an open-source library, leaving application security managers faced with the challenging question: how can we keep innovating quickly without introducing vulnerabilities into our code base?

    The solution is multi-faceted – part education, part technology, part process change. Join us for our Virtual Summit, The Open Source Conundrum: Managing your Risk, as we dig into all the pieces of this solution.
  • People Risk
    People Risk
    Grant Kennedy & Dr Aarti Anhal Dec 11 2018 11:00 am UTC 75 mins
    People are the single most important asset in any organisation, yet they can often be the most vulnerable. The opportunities and threats people present to the operations and strategic objectives of their organisations constitute “people risk” – an area of risk often ignored because of the perceived complexities involved in managing it effectively. This webinar will focus on “risk intelligence”, which refers to the way in which an individual’s values, risk competences and behaviours come together to drive their perception of risk, approach to risk-based thinking and decision-making. Th webinar will introduce the diagnostic tools that can be used by organisations to evaluate the “risk intelligence” of staff, whether in the operational 1st Line, the 2nd line’s risk and compliance functions or senior management.
  • Cyber Security & Data Centre Modernisation: Prevent, Identify, Resolve
    Cyber Security & Data Centre Modernisation: Prevent, Identify, Resolve
    David Woolger & Luke Jeffries Dec 11 2018 11:00 am UTC 60 mins
    So after building the business case for Data Centre Modernisation you've discovered moving away from traditional, inefficient IT can help you reduce costs & reinvest in the services that matter. But will adopting cloud help you improve your security?

    Join our webinar hosted by Director of Technology David Woolger & Principal Cloud Support Engineer Luke Jeffries as we guide you through how moving from away from Legacy IT impacts your cyber security

    You'll learn
    - What the biggest threats are to your organisation
    - What to consider when modernising your Data Centre
    - How UKCloud can help

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • How to Ensure Your Applications are Secure by Design
    How to Ensure Your Applications are Secure by Design
    Chris Wysopal, Co-Founder and CTO, Veracode Dec 11 2018 11:30 am UTC 46 mins
    As software becomes a bigger component of the value delivered by companies in every industry, it’s no exaggeration to say that every company is becoming a software company.

    We find our customers pushing the envelope on how to tool up their internal software factory to make software better, faster and more efficiently. By necessity, software is more often assembled than it is created from scratch, as developers are more frequently incorporating open source libraries to speed up time-to-market. But as open source libraries increase, so do the number of vulnerabilities, resulting in increased risk.

    In this session, Veracode CTO Chris Wysopal talks about what it means to be secure by design, and why businesses need to focus on prevention. The days of detect-and-respond tactics are a thing of the past – we’re living in an age when the attacks will happen before you have the time to find and respond to them. Attendees will also learn about why an application security program is imperative to data protection, how to mitigate open source risk and ensure secure coding practices are in place to prove that security is a top priority for your organisation.
  • Dissecting XSS Flaw In Commercial Code: Why Open Source Isn't Your Only Concern
    Dissecting XSS Flaw In Commercial Code: Why Open Source Isn't Your Only Concern
    Matt Runkle, Application Security Consultant, Veracode Dec 11 2018 12:30 pm UTC 49 mins
    It’s no secret that open source security is a hotly debated topic. However it’s important to keep in mind that commercially licensed third-party software carries much of the same risk as open source software. While helping a customer attain a Verified certification, one of Veracode’s application security consultants uncovered a cross-site scripting flaw in the popular Telerik Reporting project. The flaw has since been patched but it’s these types of unknown risks that organizations take when introducing third party code into their environment.

    During this talk, you’ll hear from Matt Runkle, the AppSec Consultant who uncovered the XSS flaw, to get insight into the mind of a hacker and hear how vulnerabilities like XSS are commonly exploited in third party software and how you can take action to prevent attacks like this in your own environment.
  • Emerging Cyber Threats for 2019
    Emerging Cyber Threats for 2019
    Steve Durbin, Managing Director, ISF LTD Dec 11 2018 1:00 pm UTC 45 mins
    Organisations in 2019 will be increasingly faced with a hyper-connected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.

    In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:

    -The increased sophistication of cybercrime and ransomware
    -The impact of legislation
    -The myth of supply chain assurance
    -Smart devices challenge data integrity

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Can you protect against what you can’t see?
    Can you protect against what you can’t see?
    Richard Leadbetter, EMEA Security Technical Sales Specialist Dec 11 2018 2:00 pm UTC 14 mins
    This webinar discusses how multiple levels of visibility are essential to the digital transformation process.
  • A View from the IT Practitioner: End User Predictions for 2019
    A View from the IT Practitioner: End User Predictions for 2019
    Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd Dec 11 2018 3:00 pm UTC 60 mins
    2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.

    We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.

    Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:

    - What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
    - How their priorities have changed over the last 15 years and where they will focus for the next 15 years
    - Which cyber security trends have impacted their cyber security strategy
    - How to prepare your organisation for these new trends

    Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.
  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout Dec 11 2018 4:00 pm UTC 60 mins
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    •The current threat landscape and unique security challenges healthcare organizations face
    •Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    •How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • 2019 Government Cybersecurity Predictions, Presented by Forcepoint & Raytheon
    2019 Government Cybersecurity Predictions, Presented by Forcepoint & Raytheon
    Forcepoint's George Kamis & Raffael Marty; Raytheon's Brett Scarborough Dec 11 2018 4:00 pm UTC 60 mins
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your agency and the primary source of security breaches driving cyber risk to all-time highs.

    In 2019, attackers will stop at nothing to steal our identities, evade detection through new techniques, and bring disruption to our doorsteps. The stakes are high, the world more connected than we could have ever imagined.

    In this webinar, we'll examine topics such as:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale

    Join Forcepoint's Raffael Marty (VP Research & Intelligence) and George Kamis (CTO Global Governments & Critical Infrastructure) along with Raytheon's Brett Scarborough (Senior Manager, Cyber Business & Strategy Development) for a discussion around the most pressing cybersecurity issues for government – and what agencies can do to protect against them.
  • Siemens | Leveraging cognitive technologies to drive RPA innovation
    Siemens | Leveraging cognitive technologies to drive RPA innovation
    Nikolas Barth, Head of Innovation & Digitalization & Andrea Martschink, IT Strategy & Business Development Robotics, Siemens Dec 11 2018 4:00 pm UTC 90 mins
    Innovation has always been at the heart of Siemens. In addition to being the largest manufacturing company in Europe, the German conglomerate continues to innovate in a startup fashion and has embraced Digital Transformation and has won their CIO Award based on the work they are doing with RPA.

    In this episode of our Blue Prism Café, discover how Siemens has been leveraging Robotic Process Automation as part of this Digital Transformation journey, and how their global RPA service, run jointly by the Shared Services and IT department, has enabled their lines of business in realizing true efficiency and quality gains along end-to-end processes. You will also get insight as and how they are leveraging some of the latest intelligent automation technologies such as IBM Watson, Celonis and MSFT Azure Chatbot Technology with their Blue Prism Digital Workforce.

    Key takeaways will include:
    • How Siemens built their RPA Centre of Excellence to future proof their RPA and Intelligent Automation Growth
    • Real-life scaled examples of automated processes across various lines of businesses
    • An overview of Siemens' use of Cognitive Automation leveraging RPA
    • Achievements and results from their service delivery model

    Speakers:
    • Nikolas Barth, Head of Innovation & Digitalization in Siemens Shared Services
    • Andrea Martschink, IT Strategy & Business Development Robotics
  • IDC FutureScape: Worldwide Smart Cities 2019 Predictions
    IDC FutureScape: Worldwide Smart Cities 2019 Predictions
    Ruthbea Clarke, Vice President, Alison Brooks, Research Director, Jan Alexa, Senior Research Analyst, IDC Government Insights Dec 11 2018 4:00 pm UTC 60 mins
    In this IDC FutureScape presentation, the IDC Worldwide Smart Cities team discusses the key predictions that will impact CIOs and IT professionals in the worldwide utilities industry over the one three to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • Sunset of Windows Server 2008: Migrate with Docker Enterprise
    Sunset of Windows Server 2008: Migrate with Docker Enterprise
    David Hamdani Dec 11 2018 5:00 pm UTC 33 mins
    The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.

    Attend this webinar to learn how Docker can help you meet migration deadlines by providing a validated methodology for containerizing legacy Windows applications, quickly. The combination of the Docker Enterprise container platform and purpose-built tools, allow you to upgrade and improve application security and reliability; all while cutting costs by up to 50%.
  • Cracking The Code on OT Security
    Cracking The Code on OT Security
    Mille Gandelsman & Michael Rothschild Dec 11 2018 5:00 pm UTC 75 mins
    A confluence of trends has caused the security of industrial operations to take center stage in the C-Suite. The convergence of IT and OT environments, migration of once isolated OT environments to IIoT, and of course increased targeting of industrial networks just to name a few. With these emerging trends, there is an even greater need to have 100% visibility, security and control across industrial environments.

    One of the key design decisions needed when implementing an industrial cyber security solution is the approach best suited for your industrial control environment - passive, active or hybrid. Join us for our next webcast where Mille Gandelsman, CTO and co-founder of Indegy will explain what “active” security is, what it does, why you need it, how it is safe and how to get there. Learn from Indegy's experience of implementing active technology for the past four years in some of the most demanding and sensitive environments globally, and gain the field knowledge needed to secure your industrial operations both now and into the future.
  • The No-BS Guide to Data Privacy in 2019 … and Beyond
    The No-BS Guide to Data Privacy in 2019 … and Beyond
    Kevin Moos, Kina Ratanjee, and Sarah Davis Dec 11 2018 5:00 pm UTC 60 mins
    Now that data privacy has entered mainstream conversations around the world, some businesses are finding it difficult to separate fact from fiction — "Is an updated privacy policy all we really need?" "This company says their data tool will make us compliant — is that true?" "Can't I just use a survey to find out what we're doing with personal data?"

    Join Primitive Logic at our next webinar, where we'll bust the most common myths about data privacy as we show you how to adapt to the demands of our current environment and prepare for what lies ahead.

    You will learn:

    The most common myths around data privacy … and the real truth behind them
    How to build a foundation for alignment with present and future data privacy laws
    How to address the four key areas of data privacy compliance
    The realities of where technology products can help your compliance efforts
    Common challenges and pitfalls to avoid

    Speakers:

    Kevin Moos, President, Primitive Logic
    Kina Ratanjee, Delivery Director, Primitive Logic
    Sarah Davis, Senior Consultant, Primitive Logic
  • HR Data Privacy—Protecting Privacy in Global Diversity and Inclusion Initiatives
    HR Data Privacy—Protecting Privacy in Global Diversity and Inclusion Initiatives
    Jackie Wilkosz, Manager, Aleada Consulting & Bret Cohen, Partner, Hogan Lovells LLP Dec 11 2018 5:00 pm UTC 45 mins
    Many companies are developing initiatives or programs to enhance the diversity and inclusiveness of their workforce and applicant pools. To implement such initiatives and track their progress, companies must collect, use, and store personal information such as race, gender, and ethnicity. Some jurisdictions consider these types of personal information sensitive and subject to special requirements or restrictions. Additionally, handling these types of data elements presents unique internal challenges for HR teams and data analysts.

    This webinar will explore ethical and privacy implications of corporate diversity and inclusion activities, with a focus on GDPR restrictions and requirements. We will discuss some best practice solutions for developing and implementing global diversity and inclusion initiatives that protect worker and applicant privacy while enabling companies to understand and enhance diversity and inclusiveness.

    Speakers:
    - Jackie Wilkosz, Manager, Aleada Consulting
    - Bret Cohen, Partner, Hogan Lovells LLP
  • Data Intelligence Drives Digital Business Success
    Data Intelligence Drives Digital Business Success
    Marcus MacNeill, SVP, Product Management, ASG Technologies Dec 11 2018 6:00 pm UTC 60 mins
    In the digital era, an organization’s business strategy is inextricably linked to its data strategy.

    Yet increases in data volume, variety and velocity continue to challenge data management strategies and capabilities making it difficult for enterprises to effectively satisfy defensive (run the business) and offensive (drive the business) needs.

    In this session, we’ll explore the state of data management including key trends and their impact on the direction and evolution of ASG’s Data Intelligence offering.
  • Threat Detection in TLS: The Good, the Bad, and the Ugly
    Threat Detection in TLS: The Good, the Bad, and the Ugly
    Ian Farquhar, Distinguished Sales Engineer, Gigamon Dec 11 2018 6:00 pm UTC 59 mins
    While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to encrypted attacks, hidden command and control threats and data exfiltration exploits that go undetected.

    To make this situation even more complex, the TLS 1.3 draft 28 proposal, ratified at the IETF 101 conference in London and now moving toward official RFC status, has actually removed the visibility which was widely deployed for threat identification in TLS 1.2.

    Once again, InfoSec teams find themselves at the fulcrum of a delicate balancing act. On one hand, encryption is moving toward ubiquity but on the other, we need to detect when threat actors use it too. And in detecting that misuse, we need to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns. For example, we can’t decrypt just at the edge of our networks if we believe “perimeter security is dead.” Proxies on the network edge are a step backwards.

    What can you do? “Threat Detection in TLS: The Good, the Bad and the Ugly” will discuss the necessity of deploying TLS decryption in the core of networks and will explore innovative architectures that deliver that capability while maintaining availability and reliability.

    Learn how organizations can manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.
  • Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Kevin Haley, Director Security Response, Symantec Dec 11 2018 6:00 pm UTC 60 mins
    Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.

    Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.

    Key Learning Objectives:

    • Insights on cryptojacking, fileless threats and ransomware

    • Capabilities you need to protect yourself from these threats

    • Best practices for more efficient and effective endpoint security

    Please Join Us, Register Today
  • Around the World with Privacy and Your Business
    Around the World with Privacy and Your Business
    Victoria McIntosh, Information and Privacy Professional, MLIS,CIPT, Information in Bloom Management Services Dec 11 2018 6:00 pm UTC 60 mins
    Planning on doing business overseas? Establishing a new office in a foreign land, or selling online to consumers in a new country? When going over company requirements for working in your new neighbourhood, don’t forget to review corporate privacy practices.

    When it comes to privacy, expectations, safeguard minimums and rights of the data subject can vary between jurisdictions. From Canada and the United States, the European Union with its new GDPR, Japan, Australia, even between China and Hong Kong, there’s no single set of global standards. Fortunately however, many privacy legislations do contain common ground. There are also ways to proactively account for the differences.

    Information and Privacy Professional Victoria McIntosh presents a taste of privacy across the globe, with some of the ways businesses can prepare in dealing with data across borders.
  • Facing Forward: Cyber Security in 2019 and Beyond
    Facing Forward: Cyber Security in 2019 and Beyond
    Christopher Porter, Chief Intelligence Strategist, FireEye Dec 11 2018 9:00 pm UTC 60 mins
    As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.

    Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye iSIGHT Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:

    •Threats to the aviation industry, including cyber espionage and cybercrime
    •What to expect from established and emerging nation states
    •How threat actors are changing their tactics to stay ahead of defenders

    Register today to learn what lies ahead and stay one step ahead of cyber security threats.