Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Wisdom of Crowds Virtual Roundtable - Data Security with RSA, Dell and more.
    Wisdom of Crowds Virtual Roundtable - Data Security with RSA, Dell and more. Rashmi Knowles, Charles Race,William Culbert, Paul Ferron,Jason Goode and Jackson Shaw Recorded: Jul 27 2017 20 mins
    Participants in the Roundtable: Rashmi Knowles from RSA, Charles Race from OneLogin, William Culbert from Bomgar, Paul Ferron from CA Technologies, Jason Goode from Ping Identity and Jackson Shaw from Dell Security

    How has the adoption of ‘cloud’, including SaaS applications, changed the security landscape?

    What are the benefits of an Identity Access Management solution, why should it be implemented, and would you recommend an on-premise, cloud or hybrid solution?

    How does a single sign-on policy help to improve productivity and save costs, and what are the principle differences between SSO and federated identity?

    How should businesses and organisations leverage provisioning and deprovisioning for cloud applications, and what impact will this have?
  • Beginner's Guide to Public Sector Cloud Infrastructure
    Beginner's Guide to Public Sector Cloud Infrastructure Todd Bernhard, CloudCheckr Product Marketing Manager & Jonathan Morse, State Local Higher Education Account Executive Recorded: Jul 27 2017 63 mins
    Migrating to the cloud poses challenges for any organization, but there are particular concerns for the public sector. Government regulations like FedRAMP and the upcoming DFARS must be met, but security in the cloud is different than in the data center. Cloud providers use a Shared Responsibility Model, where they secure the physical infrastructure and the rest is up to the customer. In the public sector, budgets have to be justified... and used, at the risk of decreasing in the next year. Given the potential for Cloud Sprawl, without a Cloud Management Platform, expenses can get out of control.

    This webinar serves as a guide for public sector organizations looking to embrace the cloud. We will discuss the specific requirements of public sector organizations and explain the choices that will need to be made during such a migration. Topics covered include:

    - What terms do I need to know?
    - What questions do I need to ask?
    - What are some common pitfalls?
    - What tools are available to help?
  • Using SecureMail with Office 365
    Using SecureMail with Office 365 DataMotion Recorded: Jul 27 2017 2 mins
    Does the native message encryption meet your compliance and ease-of-use needs? This short 60 second video reviews how DataMotion SecureMail works with Office 365 to enhance its encryption capabilities.
  • Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results
    Top U.S. Security Concerns Revealed - 2017 Unisys Security Index Survey Results Bill Searcy, Vice President for Global Justice, Law Enforcement, and Border Security Solutions, Unisys Recorded: Jul 27 2017 41 mins
    U.S. consumers rate national security in relation to war or terrorism as their top security concern, though fears over viruses/malware and hacking are rising dramatically, according to the new Unisys Security Index™ that surveyed more than 13,000 consumers in April 2017 in 13 countries. This study, the only recurring snapshot of security concerns conducted globally, gauges the attitudes of consumers on a wide range of security-related issues.

    About the speaker:
    Bill Searcy is the Vice President for Global Justice, Law Enforcement, and Border Security Solutions. As a recognized law enforcement solutions expert, he is responsible for developing market strategies, overseeing delivery, ensuring customer satisfaction, and driving business performance to meet goals.​​
    During his 21-year career as a Special Agent with the Federal Bureau of Investigation, Bill was recognized as an innovator who regularly sought new ways to use technology to solve complex problems. He is credited with leading numerous award winning IT initiatives, among them the FBI’s Grid Computing Initiative (Attorney General’s Award for Innovation) and the Next Generation Workstation (FBI Director’s Award).
    Prior to joining Unisys, Bill served as the Deputy Assistant Director of the FBI’s IT Infrastructure Division, where he was responsible for the engineering, development, deployment, and support of the FBI’s worldwide IT enterprise.
    A graduate of the United States Military Academy at West Point, Bill was commissioned as an officer in the U.S. Army where he commanded a Field Artillery battery. He went on to earn a Master of Science in Information Assurance from Norwich University and he is a Certified Information Systems Security Professional (CISSP).
  • [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack
    [Breach Prevention] Phishing & Credential Abuse 201 - Inside the Attack Brad Duncan, Unit 42 Threat Intelligence Analyst, Palo Alto Networks Recorded: Jul 27 2017 61 mins
    This 201 level course builds on the introductory material of Phishing & Credential Theft 101 and takes it deeper. After this course, you’ll understand better how phishers and credential theft attackers ply their trade and how attacks actually work. The course will go into detail on two selected, publicly known breaches which involved credential theft and abuse.

    In this presentation, our Unit 42 Threat Intelligence team will show you:
    • How credential theft and abuse were used in real world attacks
    • Demonstration of tools attackers use to capture credentials.
    • How attackers buy and sell credentials on the dark web to further their criminal operations.
  • The Cost of Insecure Endpoints – New Findings from Ponemon Institute
    The Cost of Insecure Endpoints – New Findings from Ponemon Institute Dr. Larry Ponemon, Chairman and Founder, Ponemon Institute & Richard Henderson, Global Security Strategist, Absolute Recorded: Jul 27 2017 64 mins
    Just how dangerous, inefficient, and ineffective are the endpoint security solutions used in most organizations today? Ponemon Institute independently surveyed hundreds of IT security professionals to find out — and are ready to share the surprising results in this important webinar.

    On July 27th, join founder and chairman, Dr. Larry Ponemon, and Richard Henderson, global security strategist at Absolute, for an interactive webinar on the results, including:

    • Exposing the largest dangers and greatest inefficiencies with endpoint security management today
    • Average financial and productivity costs associated with insecure systems – and how to mitigate in your organization
    • Steps you can take now to prevent attacks and stay compliant
  • Tech Demo - Addressing Data Across Borders for the GDPR
    Tech Demo - Addressing Data Across Borders for the GDPR Cheryl Tang, Director of Product Marketing and Sumit Bahl, Sr. Technical Product Manager Recorded: Jul 27 2017 32 mins
    This is part 3 in our demo series focused on GDPR. One of the key requirements of GDPR relates to cross-border data transfers. Our security experts demonstrate how SecureSphere can help address this regulation with monitoring and access control of personal data.
  • Not All Endpoint Protection Platforms Are Created Equal
    Not All Endpoint Protection Platforms Are Created Equal Torry Campbell, Senior Director Product Management, Symantec Recorded: Jul 27 2017 60 mins
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • Time for Banks to Reassess Their Risk of DDoS Attacks
    Time for Banks to Reassess Their Risk of DDoS Attacks Tom Bienkowski, Director of DDoS Product Marketing, Arbor Networks Recorded: Jul 27 2017 38 mins
    A study by McKinsey suggests the increased operational risk of digital innovation threatens 6% of the net profit for a retail bank. Renowned hactivist group Anonymous’ OpIcarus; a Distributed Denial of Service (DDoS) attack siege on the world’s banking infrastructure and other well publicized successful attacks have exposed just how vulnerable banks are to such threats. The reality is modern day DDoS attacks are getting more frequent, more sophisticated, and are commonly used as a distraction during the data exfiltration stage of advanced threat campaigns. The unfortunately reality is that in many cases, these attacks succeed because the targets were simply inadequately prepared to stop them.

    Join this webcast to learn:
    •The latest trends in DDoS attacks.
    •Commonly overlooked costs due to DDoS attacks.
    •And best practices in DDoS attack defense.
  • Webcast: E-Signatures: Changing Landscape for Life Insurers
    Webcast: E-Signatures: Changing Landscape for Life Insurers Colleen Risk, Senior Analyst - Celent & Andrea Masterton, Director Corporate Marketing - eSignLive Recorded: Jul 27 2017 57 mins
    The process of buying life insurance is becoming increasingly digitized - driven by customer expectations for convenience and ease. As insurers are removing paper from everyday processes, electronic signatures enabling this digital transformation by providing a secure means to offer the customer a user-friendly end-to-end digital experience.

    In response to the accelerated adoption, Celent recently published the report, “Putting a Lock On Straight-Through Processing – Life Insurance E-Signature Vendors 2017”. The research aimed to answer the questions: “how is e-signature technology transforming the life insurance customer experience”; “who are the main vendors?”; and “what are the common components of a solution?”.

    In this on-demand webcast, hosted by LOMA, you will learn what to look for in a solution, hear an update on how the vendor landscape has changed and takeaway these highlights:

    Top e-signature solution requirements
    How to evaluate and differentiate vendors
    Perceived and real obstacles to continued adoption
    Case Studies of E-Signatures in Life Insurance

    Presenters:
    - Colleen Risk, Senior Analyst - Celent
    - Andrea Masterton, Director Corporate Marketing - eSignLive by VASCO
  • Cyber-Threat Report 2017 - Selected Case Studies from Darktrace
    Cyber-Threat Report 2017 - Selected Case Studies from Darktrace Andrew Tsonchev, Director of Cyber Analysis and Bethany Edgoose, Lead Research Analyst Recorded: Jul 27 2017 34 mins
    Over the course of the past year, cyber-attacks have frequently made headlines. In 2017 alone, global ransomware damage costs are expected to exceed $5 billion, with the total cost of cyber-crime expected to reach trillions of dollars.

    Darktrace has detected over 30,000 in-progress cyber-threats, and has firsthand experience with modern, never-before-seen attacks, including fast moving ransomware, new strains of malware, compromised IoT devices, malicious insiders, attacks on cloud environments, and more.

    Join our Director of Cyber Analysis, Andrew Tsonchev, and our Lead Research Analyst, Bethany Edgoose, as they present Darktrace's 2017 Threat Report, review novel cyber-attacks, and break down how they were detected by the Enterprise Immune System.
  • Symantec Monthly Threat Briefing - July 2017 update
    Symantec Monthly Threat Briefing - July 2017 update Jeff Barto and Angelique Pereira, Trust Strategists at Symantec Recorded: Jul 27 2017 40 mins
    Hear the latest on the current website security threats for July 2017 from Symantec. This month’s briefing spotlights the monetary effects and costs of cybercrime and violations of trust.
  • GDPR: Minimise the risk of non-compliance with an assessment strategy
    GDPR: Minimise the risk of non-compliance with an assessment strategy Amanda Maguire- Education Solution Architect SAP SuccessFactors Recorded: Jul 27 2017 46 mins
    Preparing for GDPR? Are you wondering how you'll track and manage employee compliance?

    If your answer is yes, join Amanda and Chloe live on July 27th for this 45-minute FREE, educational webinar: 'Using Assessments for GDPR Compliance'.

    During this webinar, Amanda and Chloe will talk you through the basics of GDPR and show you how to achieve compliance by not only training your people but testing their knowledge so you can prove you’ve taken every step to fulfil the regulation and prevent data breaches.
    Amanda Maguire is a senior education architect with over 20 years' experience on business transformation programmes. With a career focused on the impacts on people – project team members, end users, suppliers and customers, Amanda has a passion for effective and engaging education, enabling people through innovative learning interventions. Her experience is wide ranging - from national to global programmes in a variety of industries.

    Chloe Mendonca is a Marketing Manager who leads a variety of digital communication campaigns and events across EMEIA. She is particularly fascinated by the way digital technology is changing the world and enjoys helping organisations worldwide realise the power of Questionmark's assessment management system. For the past 5 years, Chloe has worked with businesses across an array of verticals, sharing their stories.
  • Secrets of the Superstar CISO
    Secrets of the Superstar CISO Jake Olcott, VP of Strategic Partnerships, BitSight; Chris McClean, Vice President, Research Director, Forrester (Guest) Recorded: Jul 27 2017 59 mins
    As business success grows more reliant on data, technology, and third parties, CISOs and security leaders are finding themselves more often in the spotlight. They're being asked to brief board members, respond to third party requests, guide critical decisions, and make tough strategic calls. These increasing expectations are creating great opportunities for CISOs to shine, but to do so, they need to rise to the occasion. This webinar takes best practices and lessons learned from "superstar" CISOs, explaining what top security leaders are doing to lead their companies successfully through some of today's most complex business and technology challenges.
  • An Exciting Day in the Life of a Risk Manager! - Really!
    An Exciting Day in the Life of a Risk Manager! - Really! Amar Singh, Chris Payne, Dom Saunders Recorded: Jul 27 2017 50 mins
    Policy? We have a policy? Have you read the policy? Thats right...who actually reads company policies?

    Risk and compliance managers globally have lost the fight against user policy acceptance leading to increasing organisational risk and the decreased ability to stand up and demonstrate effective compliance to regulatory bodies.

    Does it have to be this way? In this webinar, we

    * Demo what we use to transform and make mainstream what is often boring and ignored.

    * Show how you can effectively measure (yes measure and report) on how effective your policy implementation is.

    * Better engage and enforce your policies with third parties.
  • Key eDiscovery Case Law Review for First Half of 2017
    Key eDiscovery Case Law Review for First Half of 2017 Doug Austin, Julia Romero Peter, Esq., and Karen DeSouza, Esq. Recorded: Jul 26 2017 72 mins
    The best predictor of future behavior is relevant past behavior. Nowhere is that truer than with legal precedents set by past case law decisions, especially when it relates to eDiscovery best practices. This CLE-approved* webcast session will cover key case law covered by the eDiscovery Daily Blog during the first half of 2017. Key topics include:

    + How should objections to production requests be handled?
    + Are you required to produce subpoenaed data stored internationally?
    + Should there be a limit to fees assessed for discovery misconduct?
    + When is data stored by a third party considered to be within your control?
    + Should courts dictate search terms to parties?
    + How can you make an effective proportionality argument to address burdensome requests?
    + Can the requesting party dictate the form of production?
    + Does storing data on a file share site waive privilege?
    + If data is intentionally deleted, should Rule 37(e) apply?
    + Is circumstantial evidence of intentional spoliation good enough to warrant sanctions?
    + Should keyword search be performed before Technology-Assisted Review?

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing consulting, project management and software development services to commercial and government clients.

    Julia Romero Peter, Esq.: Julia is GC and VP of Sales with CloudNine. With 19 years of legal experience and 13 years focusing on eDiscovery, Julia received her J.D. from Rutgers Law School - Newark, and her B.A. in History with a minor in education from Columbia University - Barnard College.

    Karen DeSouza, Esq.: Karen is Director of Review Services and a Professional Services Consultant for CloudNine. A licensed attorney in Texas, Karen has over 15 years of legal experience.

    * MCLE Approved in Selected States
  • [Breach Prevention] Disrupting Credential-based Attacks
    [Breach Prevention] Disrupting Credential-based Attacks Martin Walter, Product Line Manager, Palo Alto Networks Recorded: Jul 26 2017 58 mins
    Learn how to use the Palo Alto Networks next-generation security platform to disrupt the unique attack lifecycle used in credential-based attacks. In this session, get details about the strategies and key technologies for preventing both the theft and abuse of credentials.

    In this session, get details on:
    * Why the platform plays a critical role towards disrupting credential-based attacks
    * Preventing the theft of credentials, using new PAN-OS 8.0 technologies
    * Stopping the use of stolen credentials, through new multi-factor authentication capabilities in PAN-OS 8.0
  • Prevent Major Data Breaches with Threat Lifecycle Management
    Prevent Major Data Breaches with Threat Lifecycle Management Seth Goldhammer, Senior Director of Product Management Recorded: Jul 26 2017 62 mins
    Throughout 2017 organisations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organisation will be compromised, but when.

    A traditional prevention-centric strategy naively assumes all threats can be blocked at the perimeter, which leaves you blind to the threats that do get in. Many organisations are shifting to a more balanced strategy including detection and response. Enter Threat Lifecycle Management (TLM) - your playbook for rapidly detecting and responding to cyber-attacks.

    In this webcast, Seth Goldhammer, senior director of product management at LogRhythm, explains what TLM is, and demonstrates how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.
  • The Evolution of SSL/TLS and Browser Compliance Requirements in 2017
    The Evolution of SSL/TLS and Browser Compliance Requirements in 2017 Dathan Demone, Entrust Datacard Recorded: Jul 25 2017 57 mins
    SSL/TLS Industry requirements are changing at an unprecedented pace. Over the last couple of years, new requirements have been passed down by the CA and browser community to help further solidify the security practices around obtaining and using SSL/TLS and other types of publicly trusted certificates. Over the next 12 months, more important changes are being introduced to continue that trend. Join Dathan Demone, Product Manager at Entrust Datacard, who will discuss both past and future changes that will have a major impact on all certificate subscribers. In this Webinar, we will discuss topics such as:

    • New changes coming to browsers and how they notify end users about the proper use of SSL/TLS on all web pages
    • Changes to certificate lifetime policies and verification rules that are being introduced in 2017
    • New requirements around Certificate Transparency that are being introduced in October, 2017
    • Updates to recommended security best practices and new vulnerabilities in the world of SSL/TLS
    • Certificate Authority Authorization and how this can be used to protect your organization against fraud
  • [Breach Prevention] How does Credential Theft Affect Your Organization?
    [Breach Prevention] How does Credential Theft Affect Your Organization? Brian Tokuyoshi, Sr Product Marketing Manager, Palo Alto Networks Recorded: Jul 25 2017 47 mins
    The effects of a credential-based attack differs by organization and by job function. In this session, we will cover a look at how these attacks affect different types of organizations, along with the analysis and demonstration of how an attack is done.

    In this session, hear about:
    * Credential theft industry research coverage
    * Industry analysis of the problem space
    * Application of the credential theft lifecycle in light of recent attacks
  • Workloads, Data Centers & Cloud Strategy: Market & Technology Trends
    Workloads, Data Centers & Cloud Strategy: Market & Technology Trends Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center busines Recorded: Jul 25 2017 58 mins
    IT planners have far more options as to where to run their workloads than ever before. On-premises data centers, co-location facilities and managed services providers are now joined by hybrid multi-clouds – a combination of Software-, Infrastructure- and Platform-as-a-Service (SaaS, IaaS, and PaaS) execution venues. All have unique operational, performance and economic characteristics that need to be considered when deploying workloads.

    In this Webinar Carl Lehmann, Principal Analyst with 451 Research, and Don Davis, Technology Director for Iron Mountain’s Data Center business will discuss how industry leading enterprises determine the best execution venues for their workloads by addressing:

    •The market and technology trends that influence workload, data center and cloud strategy
    •How to evaluate the characteristics of various workloads and execution venues
    •How to manage workloads across on-premises and off-premises ecosystems
    Attendees will learn how to formulate an IT strategy that can be used to guide the decision criteria needed for placing workloads on their best execution venues, and enable the migration and ongoing management of workloads across a hybrid multi-cloud enterprise architecture.
  • Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing
    Building Highly Scalable ADC Clusters with Equal-cost Multi-Path Routing Nenad Merdanovic, Product Manager, HAProxy Technologies Recorded: Jul 25 2017 52 mins
    Application delivery infrastructure resources are increasingly strained. The new features in modern Application Delivery Controllers along with the demands for SSL to comply with search engine ranking algorithms are major contributors to the problem. It means organizations have to find ways to scale their ADCs. But do they scale up? Or scale out? And how?.
     
    Join us for this live webinar to discover:
    oThe drivers for the requirement of scalable application delivery infrastructure like SSL adoption and expanding ADC feature sets
    oThe pitfalls and limits of vertically scaling your ADC
    oHow you can use equal-cost multi-path (ECMP) routing to horizontally (and nearly infinitely) scale your ADC
    oHow to use Route Health Injection (RHI) to ensure availability of your ADC cluster
    oExamples of organizations who have accomplished this with HAProxy
  • How IoT and Predictive Analytics Transform Operations in the Digital Age
    How IoT and Predictive Analytics Transform Operations in the Digital Age Ray Wang, Constellation Research, David Bishop & Martin Boggess, Hitachi Solutions, & Rahul Garg, Microsoft Jul 28 2017 6:00 pm UTC 105 mins
    Today's manufacturers are operating in a world of uncertainty. Successful manufacturers are combating market volatility by focusing on productivity gains via new technology. The Internet of Things (IoT) and predictive analytics are likely to determine who wins and who loses in this age of uncertainty.

    Join this virtual event to hear from leading experts and analysts about technologies manufacturers need to adopt to stay competitive. Industry analyst, Ray Wang will outline the macroeconomics trends affecting the industry and lay a path forward. Experts from Hitachi Solutions will discuss the promise of IoT and the cloud for discovering new opportunities and achieving operational efficiencies. Microsoft’s IoT lead will share upcoming trends to watch.

    Hear leading experts and analysts discuss the state of manufacturing today—and a path to the future.
  • Automation, Machine Learning, and AI: Saving Security or Job Stealing Overlords?
    Automation, Machine Learning, and AI: Saving Security or Job Stealing Overlords? Michael Ball CISSP IT Security Consultant, Davi Ottenheimer President of flyingpenguin, Chris Pace, Recorded Future Jul 31 2017 3:00 pm UTC 60 mins
    Headlines as we left 2016 and predictions for 2017 suggest that the future of the IT department (including information security) looks to be increasingly reliant upon machines doing the work, courtesy of the adoption and explosion of automation technologies, artificial intelligence and machine learning. How capable can machines ultimately become in securing businesses from an increasing array of threats? What role does this leave for humans?

    In this webinar we will look at the rise in popularity of artificial intelligence generally, what it means for businesses and its potential to improve efficiency and security. Which areas of security strategy may have the most to gain and lose in this transformation?

    This webinar will:

    • Consider the power of AI in threat intelligence, security operations and incident response
    • Discuss how AI and predictive analytics can lower risk
    • Question whether automation will always require the human factor
  • Gain Visibility into Your Open Source Risk with Veracode Software Composition An
    Gain Visibility into Your Open Source Risk with Veracode Software Composition An Jacob Martel, Solution Architect, Veracode Jul 31 2017 4:00 pm UTC 30 mins
    Most development organizations don’t have the time or the resources to create every application from scratch, so they rely on third-party software and integrate open source components into their internally developed software. However, securing open source components is challenging for many security professionals because they lack visibility into what components are in use where in their organizations.

    At Veracode we know it can be difficult to pinpoint applications using vulnerable open source components. In this 30 minute webinar find out how Veracode Software Composition Analysis can help you:

    •Assess proprietary and open source code in a single scan
    •Build an inventory of your third-party components
    •Gain visibility into which applications have a vulnerable version of a component
    •Identify and remediate vulnerabilities to help comply with industry regulations
  • RESILIA™ - HELPING BALANCE TRANSFORMATION AND RESILIENCE IN THE DIGITAL WORLD
    RESILIA™ - HELPING BALANCE TRANSFORMATION AND RESILIENCE IN THE DIGITAL WORLD Nick Wilding - Manager, Cyber Resilience, AXELOS. Stuart Rance - Managing Director, Optimal Service Management Aug 1 2017 1:00 pm UTC 45 mins
    Our globally connected world delivers a wealth of opportunities for economic growth and innovation but it also brings with it the real risk of cyber-attack. Many organizations continue to invest in multiple layers of ‘intelligent’ technical controls to protect themselves from cyber attackers. However, security breaches continue to grow in their scale and impact. There’s something missing in our organisational response to the cyber risks we face.

    Effective cyber resilience need to focus on aligning strategic priorities, service management tools, operational systems and architectures with ongoing training and involvement of people across the organization. By applying these proven disciplines organizations can more effectively balance their business opportunities and risks, their people, processes and technology and their ability to prevent, detect and respond to cyber-attacks.

    This webinar will outline the cyber resilience challenges and the opportunities open to organizations and how RESILIA™ best practice can be used to build the critical collaboration between ITSM and InfoSec teams needed to effectively manage and respond to the cyber risks they face.

    Speakers:

    Nick Wilding:
    General Manager of RESILIA at AXELOS where he’s responsible for leading the successful design, development and demand of the RESILIA portfolio that provides cyber resilience best practice, training, learning and insight for organisations from the boardroom down. Previous to AXELOS Nick spent 11 years at Detica (now BAE Systems Applied Intelligence) where he helped set up their Cyber Security business and led their cyber market engagement and thought leadership.

    Stuart Rance:
    An expert in information security management and IT service management. He works with IT organizations all over the world, helping them create value for their customers. Stuart is an author of ITIL® and RESILIA™ and blogs at optimalservicemanagement.com. He is chief examiner for RESILIA, and an examiner for ITIL.
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Aug 1 2017 3:00 pm UTC 60 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Transforming K-12 Cybersecurity Through Visibility
    Transforming K-12 Cybersecurity Through Visibility Dr. Kecia Ray, Exec Director, Center for Digital Education & Erik Floden, K12 Education Strategist, ForeScout Technologies Aug 1 2017 4:00 pm UTC 60 mins
    As school districts continue to make technology adoption in the classroom a top priority, they face increasing network security risks, including persistent cyberattacks and the potential theft or manipulation of student data. Dr. Kecia Ray, Executive Director of the Center for Digital Education, will address these challenges and discuss how school districts can effectively manage the rapid expansion of the number of devices students, educators and administrators are adding to their IT networks. Webinar topics will include:
    • Cybersecurity and student data security trends in K-12
    • Top K-12 priorities to address these challenges
    • Recent funding and legislative developments at federal and state levels
  • Information Governance and the Cloud
    Information Governance and the Cloud Bill Tolson, Actiance & Jim Shook, Esq, EMC Corp. Aug 1 2017 5:00 pm UTC 60 mins
    With the cloud computing promise of faster, better and cheaper, everyone needs a cloud strategy. But the strategy needs to be informed because legal and regulatory obligations, including eDiscovery, remain the company’s responsibility even when a third party cloud provider has the data. Public, private and hybrid clouds all have different characteristics that impact access to, control of and remedies for issues related to your organization’s data. Changing regulations on data privacy and security alter the risk profile for maintaining data in different types of clouds, and even the location of the cloud can be important.

    In this webcast we have discussed some of the important differences between cloud models and how organizations can develop a strategy that best meets their requirements. In this webcast, we’ll address the following questions:

    • What are the basic cloud deployment models?
    • What are the key compliance benefits and risks of public and private clouds for email?
    • How can my organization determine which types of data are the best fit for the different cloud models?
    • What are some of the current and up-and-coming trends that may impact some of my cloud decisions?
  • Integrating Business Solutions for Always-on IT Security
    Integrating Business Solutions for Always-on IT Security Gabe Long, Sr Product Marketing Manager, Microsoft Aug 1 2017 6:00 pm UTC 60 mins
    In the age of cybercrime, threats, and breaches, it's more important than ever to secure your IT operations, devices, and infrastructure through an integrated approach.

    Now, for the first time ever, Microsoft is offering an integrated solution for your business that helps you achieve more together, anywhere it matters, with always-on security.

    In this webcast, you will:
    - Discover an integrated solution powered by Office 365 and Windows 10, designed for small and mid-size businesses.
    - Learn how you can connect with your remote coworkers and work on a document in real-time using Word, Outlook, OneDrive, and Skype for Business.
    - See how inking in Windows 10 enables you to take notes with OneNote.
    - Learn how you can easily set-up policies to protect company data across devices with Microsoft 365 Business.
  • Securing Critical Infrastructure with Advanced Cybersecurity Controls
    Securing Critical Infrastructure with Advanced Cybersecurity Controls Keao Caindec, VP of Marketing and Dean Weber, CTO, Mocana Aug 1 2017 6:00 pm UTC 45 mins
    The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, dams, defense, energy, financial, food and agriculture, healthcare, IT, nuclear, transportation and water and waste management.

    Securing the industrial control systems (ICS) and SCADA networks requires a different approach that goes beyond threat detection, perimeter-based security, firewalls and physical security protections.

    In this webinar, you’ll learn about how to architect and embed strong cybersecurity controls such as: secure boot, multi-factor authentication, secure software updates, secure communications between industrial devices (PLCs, sensors, IEDs, RTUs and controllers), gateways and industrial clouds. You’ll also learn about how to enable applications to call cryptographic functions that leverage hardware secure elements such as TPM, SGX, TrustZone as well as HSMs and SIMs.
  • Combating Data Breaches: Proactive Defence during a Digital Transformation
    Combating Data Breaches: Proactive Defence during a Digital Transformation Ian Greenwood, Regional Sales Manager and Mark Penny, PKI Security Consultant, Professional Services EMEA, Thales e-Security Aug 2 2017 11:30 am UTC 60 mins
    Combating Data Breaches: Proactive Defence during a Digital Transformation
    Join Herjavec Group and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.
    Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualised systems, and more. The policies and regulatory mandates in effect continue to grow more stringent. At the same time, these groups have to guard against more sophisticated cyber-attacks, and the continuous threats posed by users that have stolen privileged user credentials.
    To adapt to these expanding demands, IT and security professionals have to leverage technologies that offer a strong mix of security, implementation flexibility, and operational efficiency.

    Topics covered during the webinar:

     Complex and sophisticated data threat landscape

     GDPR at a glance

     Digital transformation ambitions and challenges

     Why adopt a data encryption strategy?

     Focus on how encryption and key management solutions can help you comply, secure and keep control of your data

    This introduction is aimed at those within your organisation looking to gain an insight into data protection and the potential challenges that your organisation could face.
  • Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance
    Machine Learning Analytics for Engaging Consumers and Limiting Risk in Finance Rodrigo Fontecilla,Vice President and Global Lead for Analytics, Unisys Aug 2 2017 3:00 pm UTC 60 mins
    Unisys advises banks, non-bank lenders, insurers, and payments providers developing data management and artificial intelligence capabilities. This webinar will showcase client examples applying machine learning and predictive analytics to optimize consumer engagement, identify fraud and cyber security risks, and bring new capabilities to credit modeling.

    About the Speaker: Rodrigo Fontecilla is vice president and global lead for analytics for Unisys Federal Systems, where he leads all aspects of software development, system integration, mobile development, and data management focused on the federal government. Rod is responsible for providing leadership, coordination, and oversight on all IT solutions, emerging technologies, and IT services delivery to the federal government. He has more than 25 years of professional experience in the capture, design, development, implementation, and management of information management systems delivering mission-critical IT solutions and has an extensive background and expertise in cloud computing, mobile development, social media, enterprise architecture, data analytics, SOA-based solutions, and IT governance.
  • Systems Failure Fuels Security-Focused Design Practices
    Systems Failure Fuels Security-Focused Design Practices Christopher Rommel, Executive Vice President, VDC Research and Joe Jarzombek,Security Strategist, Synopsys Aug 2 2017 4:00 pm UTC 60 mins
    Today’s electronic systems are more intelligent, more connected, and more at risk than ever before. A single vulnerability can lead to widespread system-of-systems compromises. Organizations participating in security-critical industries like Aerospace and Defense (A&D) are especially at risk.

    In this webinar, Christopher Rommel from VDC and Joe Jarzombek from Synopsys will discuss the results from a recent report highlighting issues facing these organizations. They will also identify what considerations need to be made for the security of software that enables and controls system functionality.

    This webinar will explore:
    • The importance of quality and security in current projects
    • The amount of code re-use from previous projects
    • How automated quality and security testing tools can integrate into your current SDLC
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway
    High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec Aug 2 2017 6:00 pm UTC 60 mins
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.

    Agenda:

    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • Windows 10: How to Protect your Data and Manage Compliance
    Windows 10: How to Protect your Data and Manage Compliance Ryan Sanders, Sales and Product Enablement Specialist & Daniel Reppmann, Director of Sales for Central and Eastern Europe Aug 2 2017 6:00 pm UTC 60 mins
    As we move closer to a Windows 10 world, businesses need to secure their data without slowing down their IT staff or employees. Forward-thinking businesses are realizing the security and productivity benefits of migrating to Windows 10 as drastic improvements to BitLocker Drive Encryption have made it a viable option for data protection and compliance.

    WinMagic's Director of Sales for Central and Eastern Europe, Daniel Reppmann, and Sales and Product Enablement Specialist, and Ryan Sanders discuss how to improve security without compromising mobility and productivity using BitLocker and SecureDoc - Together.

    Key Learnings:

    ·Learn the security advantages of Windows 10 and BitLocker Drive Encryption
    ·Understand potential security gaps and roadblocks to productivity
    ·Discover 5 ways that you can leverage the best of BitLocker with SecureDoc
  • Technical Deep Dive: Modernizing Your Next-Gen IT Operations
    Technical Deep Dive: Modernizing Your Next-Gen IT Operations Grant Fenn, CEO, Downer Group & Matt Furse & Fai Lai, Digital Experts, Microsoft Aug 2 2017 11:00 pm UTC 39 mins
    Gain industry insights on harnessing Digital Transformation to drive the next generation of operational capabilities.

    Implementing a digital transformation strategy that can encompass platforms, systems, integrations and needs across organizations is vital. Join this webcast to discuss a strategic, fool-proof approach to modernizing your IT operations, including how to build a cloud architecture to support data, analytics and digital transformation from end to end.
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Aug 3 2017 5:00 am UTC 60 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks. Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats.

    Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Aug 3 2017 4:00 pm UTC 60 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks. Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats.

    Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Live Data Transformation
    Live Data Transformation Brent Hansen, Senior Director, Sales Engineering Aug 3 2017 5:00 pm UTC 60 mins
    With cyber threats and compliance requirements increasing in tandem, it is important that encryption can be deployed and managed with minimal impact on business processes and user experience. However, when very large data sets are involved, initial encryption deployments can reduce data availability and require lengthy maintenance windows. Compounding matters further, maintaining data security compliance often requires routine encryption key rotation even after initial deployments have been successfully completed. When large data sets have been encrypted, significant processing time and long periods of planned downtime may be required to support the rekeying of data. These realities have often forced security and IT teams to make tough trade-offs, fundamentally having to choose between security and availability.
    With Vormetric Live Data Transformation from Thales, encryption is delivered with minimal disruption, effort, and cost. The solution’s transparent approach enables security organisations to implement encryption without changing application, networking, or storage architectures. Launched earlier this year, the product offers patented capabilities that deliver breakthroughs in resiliency and efficiency, while also highlighting Thales’ drive to continue offering organizations the most innovative, easy to deploy and operate data security solutions available.
  • Technical Deep Dive: GDPR Compliance via a Governed Data Lake
    Technical Deep Dive: GDPR Compliance via a Governed Data Lake Ben Sharma, CEO & Co-Founder at Zaloni Aug 3 2017 5:00 pm UTC 60 mins
    GDPR is quickly becoming a global data privacy crisis. With the May 2018 deadline looming, businesses in every industry are taking a fresh look at governing personal information. They’re finding out what’s needed to ensure compliance - and it’s not going to be easy.

    Big data thought leader, Ben Sharma, has years of experience in data management and governance. He will discuss the impact GDPR has on big data management and explain how data lakes can set you up for success, both for GDPR compliance and future governance endeavors. This webinar will discuss specific technical solutions. If you are concerned about your GDPR compliance initiative, or just interested in verifying your current path, then this is a must-attend webinar.

    Topics covered:
    - Data lineage
    - Masking of PII
    - Leveraging custom metadata
    - Data lifecycle management
    - Building a next-generation data architecture for compliance
    - Your GDPR preparation checklist

    In preparation for this deep dive into GDPR, we suggest you view our previous webinar on the basics of GDPR.
  • Technology Assisted Review: What You Need to Know, Ask, and Expect
    Technology Assisted Review: What You Need to Know, Ask, and Expect George Socha, Bonnie Kennedy, Avi Benayoun, Adam Strayer Aug 3 2017 6:00 pm UTC 60 mins
    Join George Socha, co-creator of the EDRM, as he moderates a conversation with Bonnie Kennedy of Delta Air Lines, Avi Benayoun of Greenberg Traurig and Adam Strayer of BDO. They will discuss the TAR workflow and the importance of open communication between and among the client, the law firm, and the service provider. These three litigation and ediscovery experts will talk about expectations, transparency, and some of the information black holes that can develop during the predictive coding process.
  • Healthcare and Open Source – Balancing Innovation Against Risk
    Healthcare and Open Source – Balancing Innovation Against Risk Jim DeGraw, Partner, Ropes & Gray; Mike Pittenger, VP Security Strategy, Black Duck Aug 8 2017 3:00 pm UTC 60 mins
    More and more innovation in the healthcare industry is powered by open source software, whether it’s for a new pacemaker or the latest Electronic Medical Records (EMR) platform.

    A recent study of more than 1,000 commercial software applications found that open source components comprised 46% of the code in commercial applications for healthcare-related industries. But with innovation comes risk. The same research uncovered high-risk open source security vulnerabilities in 47% of the healthcare applications studied.

    A focused approach to managing open source risk is essential as HIPAA and the European Union’s General Data Protection Regulation (GDPR) put new pressures on healthcare providers and technology companies to protect patient data privacy and security.

    If you're concerned with healthcare application security, learn why open source management is essential for your overall security strategy.