Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Dr. Nicko Van Someren, CTO, Absolute | Maninder Malli, VP Legal, Absolute | Josh Mayfield, Director Of Security Strategy, AbsRecorded: Jun 18 201962 mins
Experts debate the legal and technical requirements for data privacy
The expectations of IT teams are often in conflict — enable increased employee productivity through technology while protecting the data entrusted to the organization. Privacy laws, such as GDPR, CCPA, and HIPAA give organizations parameters to work within and help to ensure accountability. However, in the face of resource constraints and rapidly evolving threats, IT is often caught in the crossfire in choosing where efforts should be focused.
Join our interactive, video panel discussion with experts from two sides — legal and IT — as they lay out a path for harmonious co-existence between working within the law and advancing technology.
You will learn:
• Legal and ethical considerations for data privacy
• The value legal frameworks provide to technological advancement
• Predictions about the direction and increasing importance of privacy laws
DR. NICKO VAN SOMEREN | Chief Technology Officer | Absolute
MANINDER MALLI | VP, Legal | Absolute
JOSH MAYFIELD | Director of Security Strategy | Absolute
*This is a rebroadcast, due to popular demand. Feel free to submit any questions as you watch, and we’ll follow-up with you directly. Thank you!
David Morris, Mark Rasch, and Juanita KoilpillaiRecorded: Jun 18 201962 mins
This session will examine the new Presidential Executive Order that addresses the critical shortage in cybersecurity skills and staffing. What does the new Presidential Executive Order on America's Cybersecurity Workforce entail? Who will be impacted? What can you do now?
Kevin Nassery, Senior Principal Consultant, SynopsysRecorded: Jun 18 201948 mins
Intuition can take you quite far at the beginning of your application security journey. But even the most experienced leaders will eventually need data to guide them through a decision or justify their investments. Well-designed software security metrics provide that compass.
This webinar will arm software security group leadership with the knowledge necessary to design key metrics that drive thoughtful investment and enhancement of their software security initiative (SSI).
We’ll pay special attention to must-have application security metrics, common missteps, and executive visibility across the Software Security Development Lifecycle (SSDL) and SSI.
Lysa Myers & Cameron Camp, Security ResearchersRecorded: Jun 18 201953 mins
Trying to navigate the stormy seas of multi-factor authentication (MFA) to find the “killer app” both you and your organization can use to bolster security? In this webinar, we look at:
- The various factors of authentication
- Factor vs “steps”
- Considerations in choosing a factor
- The various technologies that people are using
- What seems to be working
Whether you’re pondering Near Field Communication (NFC) ninja tech for your smart phone, or those new biometric doo-dads that verify you based on the smell of your ears (really), we can help you sort out what might work for you and what would be crazy to implement. And as a bonus: this tech will all keep you far safer that your plain old password ever did.
Matt Keane, Senior Director, Risk Management Services – FireEye MandiantRecorded: Jun 18 201957 mins
Using Risk Management to Optimize Cybersecurity Costs: Best Practices for the C-Suite
Cyber risk management is increasingly becoming a strategic priority for executive leaders worldwide, though many organizations find it challenging to accurately anticipate, prioritize, and forecast risk mitigation costs.
C-level executives can meet these challenges by engaging their boards and their security teams to ensure they have the right data to scope risk-based focus areas. This allows the organization to plan effectively while keeping necessary security investments top of mind.
Join this webinar with Matt Keane, FireEye Mandiant Senior Director of Risk Management Services, as he explains how to:
• Identify the top risks to your organization based on threat intelligence—and communicate these trends to your board of directors in a way they’ll hear
• Ensure that the board’s security investment decisions support your organization’s appetite for risk
• Establish a framework that ensures the alignment of strategic priorities with security spending
• Track the right risk performance metrics to monitor changes in your unique risk profile, so that you can shift priorities and spending when needed
• Apply these lessons to a sample business scenario.
Register for this webinar to learn how executives like yourself can effectively implement these cyber risk management practices today.
John Lehane, Product Marketing &Danny Akacki, Technical Account Manager, Gigamon; Lyle Kelly, Sr. Systems Engineer, ForescoutRecorded: Jun 18 201943 mins
Are you ready for digital transformation? Transformation begins with visibility – looking inside the network “black box” and understanding exactly what’s running. But we know that can be easier said than done, especially in the healthcare industry where privacy, security and compliance are paramount.
Join our webinar to hear experts from Gigamon and Forescout delve into the network and security challenges they’ve observed in healthcare. Participants will learn how to surmount the challenges in:
•Achieving visibility of digital app usage across distributed, dynamic environments
•Ensuring the most relevant application traffic is delivered to the right security tool
•Pinpointing lateral movement of malware and shadow IT for faster time to detection and remediation
•Monitoring, tracking and securing Internet of Medical Things (IoMT) devices
•Integrating new sites and locations into your network
Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert.Recorded: Jun 18 201957 mins
SAP HANA database is becoming the new default database engine from SAP. Enterprises worldwide are shifting towards SAP HANA and are relying in hyperscale cloud providers, such as AWS, to run their SAP workloads. While AWS provides the infrastructure and services to run SAP HANA, managing database backups and ensuring its availability in a secure and cloud native way is still a challenge for customers.
Emory Cloud Backup is Linke’s implementation of the SAP backint agent for SAP HANA to manage database backups on Amazon S3. Its SAP-Certified and supports both single node and multi node (scale-out) SAP HANA deployments on AWS. Emory Cloud Backup integrates seamlessly with Amazon S3 making it an extension of your SAP HANA database and leverages SAP administration tools to manage your database backup catalog stored on Amazon S3.
Join us to learn how Linke’s Emory Cloud backup can help you manage your SAP HANA database backups on Amazon S3 storage service to:
•Reduce costs associated to database backups
•Increase backup performance by reducing recovery times
•Implement a cloud native solution to manage your cloud based SAP
Ollie Sheridan, Principal Engineer Security, Gigamon, Chris Green, Head of PR and Comms EMEA, (ISC)²Recorded: Jun 18 201960 mins
For many years the choice for monitoring networks has been focussed on the collection and Analysis of raw packets. With the increasing need for multiple tools and SIEM's to get access to this data, along with requirements from Forensic Response teams, a more streamlined method of understanding the behaviour of traffic and user behaviour is required. Whilst NetFlow version 5 and 9 do provide some visibility, there are challenges such as sample rates and lack of Application Layer inspection that need to be addressed.
Join us for this webinar to learn more about how you can:
-Produce rich Metadata from network traffic and dive into the Application Layer
-Use this rich Metadata for Security, Forensics and Business Intelligence purposes
-Generate Metadata based on the application rather than the IP & Port
-Ensure that the Application traffic, regardless of port spoofing, produces the correct Metadata
Sam King, CEO at VeracodeRecorded: Jun 18 201934 mins
DevSecOps is moving beyond the buzzword stage and into the real world. But there are obstacles standing in the way of widespread adoption. Perhaps the biggest obstacle is a lack of understanding about what DevSecOps is, which can discourage IT leaders, developers, and security teams who fear that it is a bridge too far to cross from DevOps, let alone Waterfall and Agile methodologies. Despite these myths and doubts, DevSecOps is producing real results in organizations that embrace it. For example, Veracode’s analysis of thousands of application scans found that applications scanned for security flaws early in the development process had a 48% higher fix rate (reduction in flaws) than other applications.
In this keynote address, Veracode General Manager Sam King will introduce the concepts of DevSecOps that will form the basis of this virtual summit. Sam will discuss:
-A simple definition of what DevSecOps is, beyond the hype and the myths, and why it holds promise for bringing together the assurances of AppSec with the speed and agility of DevOps
-Why the evidence says that DevSecOps is attainable in the real world – how Veracode scanning data shows that there is a genuine shift to DevOps and DevSecOps happening, one step at a time.
-Overview of the challenges that stand in the way – cultural, process, and technological – and how best practices can break down barriers to change.
-Welcome to speakers and setting the stage for what you should expect and come away with from the event.
Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide SecurityRecorded: Jun 18 201958 mins
New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:
•Gain pervasive visibility into your network for better threat hunting
•Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
•Become more effective by delivering optimized traffic to tools
•Overcome skills shortages and retain key staff through efficiency, automation and orchestration
•Accelerate deployment and integration of new security tools
Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
David Grout, CTO, EMEA, FireEyeRecorded: Jun 18 201959 mins
Like most cyber criminals, advanced persistent threat (APT) groups try to steal data, disrupt operations, and destroy infrastructure. But unlike other attackers, APT attackers pursue their objectives over months or even years, adapting to defenses and frequently retargeting the same victim.
Join this webinar to hear David Grout, FireEye EMEA Chief Technology Officer explain how effective cyber threat intelligence (CTI) helps you understand APT groups’ intents and tactics so you can stay ahead of attacks, instead of just reacting to them. He’ll also provide:
•A high-level overview of the nation-state interests driving APT activity
•Insight into the most recent APT attacks investigated by FireEye
•A deep dive into the workings of APT40, a Chinese cyber espionage group that typically targets countries and organizations strategically important to the country’s “Belt and Road Initiative.”
Дмитрий Иванюк, эксперт по решениям CommvaultRecorded: Jun 18 201954 mins
Приглашаем Вас и Ваших коллег принять участие в вебинаре «Технический обзор архитектурных особенностей, требований к планированию ресурсов и параметров установки для развертывания Commvault».
Дата: 18 июня
Время проведения: 11.00-12.00
Тренер: Дмитрий Иванюк, эксперт по решениям Commvault.
Курс предназначен для менеджеров по продукту, архитекторов, инженеров, администраторов.
В процессе вебинара мы рассмотрим:
∙ Вводный технический обзор архитектурных особенностей
∙ Технический обзор требований к планированию ресурсов и вариантов установки при развертывании Commvault
∙ Описание передовых приёмов конфигурирования и повышения производительности
∙ Описание инструментов, процедур поиска и устранения неисправностей, полезных при выявлении причин типовых проблем и их решении
Будем рады новым слушателям!
L'innovation se nourrit de la collaboration en toute confiance au travail, quand chacun utilise les données librement et en toute créativité grâce à la technologie. Ce carrefour est également le point où la vulnérabilité est la plus haute pour votre entreprise, et la source principale de failles de sécurité qui propulsent les cyberrisques à des sommets jamais atteints.
En 2019, les assaillants ne reculeront devant rien pour voler nos identités. Ils utiliseront de nouvelles techniques pour échapper à la détection et créer des perturbations au plus près de nos vies. Les enjeux sont élevés, dans un monde encore plus connecté que nous l'avions imaginé.
Rejoignez Alain Thibaud, Directeur de Sales Engineering EMEA chez Forcepoint, pour un webcast qui aborde les problèmes de cybersécurité les plus urgents – et ce que vous pouvez faire pour vous protéger.
Steve Ledzian, Vice President & Chief Technology Officer, APAC, FireEyeRecorded: Jun 18 201948 mins
Red Team assessments help organizations identify weaknesses in their current detection and response procedures so they can update their existing security programs to better deal with modern threats. We'll look at a red team case study detailed in FireEye's MTrends 2019 report where consultants performed an objective-based assessment that emulated a real cyber attack of an advanced, nation state attacker across the entire attack lifecycle
Tavis Newsome, Senior Intelligence Optimisation Analyst, FireEyeRecorded: Jun 18 201955 mins
Today, defeating cyber attackers and the techniques they employ requires real-time insight and intelligence. Staying ahead of attacks, instead of merely reacting, is the heart of cyber threat intelligence. To illustrate the importance of these capabilities to both public and private sector organizations, Tavis will draw from recent real-world intelligence findings, such as FireEye’s collaboration with Facebook and Google to identify Iranian government influence campaigns, as well as our identification of North Korean state-sponsored groups targeting the energy sector.
Adrian Covich, Director Systems Engineering Symantec | Brian Westnedge, Sr. Director, Global Channels, ValimailRecorded: Jun 18 201961 mins
Are attackers leveraging your domains to impersonate and send emails to your clients and business partners?
Symantec has launched Email Fraud Protection, an add on cloud service solution that provides organisations with a fully automated approach to the implementation of DMARC, SPF and DKIM to prevent attackers from spoofing their domain names and provide protection from Business Email Compromise (BEC).
During this webinar, you will discover how Symantec Email Fraud Protection can safeguard your organisation from these impersonation and phishing attacks and how it can help organisations overcome the complexity of achieving sender authentication. We will be diving deep into DMARC Enforcement, and taking a look at Symantec’s newly hosted innovative approach to DMARC, a simpler and more streamlined method to prevent phishing attacks.
Join us as we discuss:
- DMARC Enforcement and why you should be at quarantine or reject
- Achieving enforcement without processing PII
- Increasing brand reputation and sender trust through authentication
Ron Bonica, Distinguished EngineerRecorded: Jun 17 201960 mins
In this online webinar Ron will share the same presentation he gave at the Technical Advisory Board meeting in Orlando, FL allowing this important information to be shared further in your organizations.
In the presentation, we will explore Segment Routing and Ethernet Virtual Private Networks. We will also explore how these technologies can simplify network protocols and network operations.
Kevin Reardon, Vice President, Worldwide Strategy and Consulting, SymantecJun 19 20191:00 amUTC33 mins
Even as technological advances make it easier for organisations to undertake a digital transformation, the challenges of cloud migration, privacy legislation and advanced adversaries still remain.
Join Kevin Reardon, Vice President of Worldwide Strategy and Consulting at Symantec, in this webinar as he discusses Symantec’s outlook and vision for 2020 and beyond, including:
- Challenges securing the digital transformation
- Symantec’s Integrated Cyber Defense approach
- How an integrated platform can help simplify and resolve digital transformation challenges
- What your next steps should be
Shashwath Hegde, Solutions Architect, APACJun 19 20192:00 amUTC25 mins
Managed Detection and Response (MDR) services should spot prevention failures and respond quickly. Good MDR services spot Red Teams and Pen Testers who are tasked with defeating preventative controls. A great MDR service knows when real, malicious threat actors are hiding their footprints amongst Red Team activity. In this war story, we discuss how Managed Defense, FireEye's MDR service, deals with such situations.
Nick Savvides, Chief Technology Officer, Asia Pacific, SymantecJun 19 20192:00 amUTC43 mins
With the internet and the cloud being a critical part of most organisations today, the walled network is soon becoming a thing of the past. When your network is essentially the internet, the only secure mindset is Zero Trust.
Join us in this webinar as Nick Savvides, Symantec’s Chief Technology Officer for Asia Pacific and Japan, discusses:
- The evolution from Open Security to Zero Trust
- Key learnings from the Internet Security Threat Report (ISTR) Vol. 24
- The guiding principles and practical applications of Zero Trust
- Symantec’s vision of Zero Trust
John Cunningham, Vice President, Emerging Technologies, Asia Pacific, SymantecJun 19 20193:00 amUTC24 mins
Staying current with the latest digital technologies can be a costly endeavour to both implement and secure, yet organisations cannot afford to fall behind. How can an organisation keep up with the ever-changing digital business landscape?
Join John Cunningham, Vice President of Emerging Technologies, Asia Pacific at Symantec, in this webinar as he discusses:
- The challenges organisations face trying to keep up with the digital landscape
- How Symantec’s investments in emerging technologies can aid organisations
- Symantec’s acquisition of Luminate to help organisations achieve Zero Trust
- The enhancement of Symantec’s web isolation capabilities with Fireglass
Dan Amiga, Vice President, Web Isolation, SymantecJun 19 20194:00 amUTC39 mins
With 90% of cyber attacks coming through web and email, the need for Web Isolation has never been greater. But is it possible to have an air gap on all fronts without negatively affecting the user experience?
Join us in this webinar as Don Amiga, Vice President of Web Isolation at Symantec, reveals the ins and outs of Web Isolation, including:
- Why organisations today need military grade air gaps
- The architecture behind Web Isolation
- Live demo and use cases and how to implement Web Isolation for each
- How Symantec Web Isolation offers superior integration and protection
Sherif El-Nabawi, Vice President, Systems Engineering, Asia Pacific and Japan, SymantecJun 19 20195:00 amUTC30 mins
By 2020, organisations in Asia Pacific are expected to utilise an average of 5 cloud solutions. But with 51% of these organisations storing sensitive data on public clouds and 45% feeling that the public clouds’ security features are sufficient, organisations urgently need to factor in more security considerations when moving to the cloud.
In this webinar, Sherif El Nabawi, Vice President of Systems Engineering at Symantec Asia Pacific and Japan, discusses the top security considerations in moving to the cloud, including:
- The risks and issues created by cloud migration
- Symantec’s Direct to Net Secure Access Services
- IaaS and SaaS adoption challenges and solutions
- Why every organisation needs to establish a Cloud Center of Excellence
Chase Cunningham, Forrester Principal Analyst Serving Security & Risk Professionals & Erez Tadmor, Product Manager, TufinJun 19 20196:00 amUTC53 mins
Networks and network security tooling has continued to proliferate at light speed as organizations infrastructures and systems have moved to the cloud. This massive sprawl of the control surface has created a nightmare scenario for businesses to control and maintain. This webinar will delve into the truths around how large this problem is and detail the facts related to the necessity for automation and orchestration within today's cloud-enabled businesses. Our session will provide guidance and thoughts on the impossibility of achieving Zero Trust without the use of a central security policy and automated control technologies.
Join guest speaker Chase Cunningham, Forrester’s Principal Analyst for Security and Risk Professionals and Erez Tadmor, Director Product Management, together with Dan Rheault, Tufin Senior Product Marketing Manager to gain an in-depth understanding of the Zero Trust framework, and how it can successfully be implemented in your network and maintained through security policy management.
Peter Sparkes, Senior Director, Cyber Security Services, Asia Pacific and Japan, SymantecJun 19 20196:00 amUTC37 mins
Preparing for the threats of tomorrow will require faster, deeper integration of technology, process, intelligence and warriors. However, making so many moving components work seamlessly together can be a challenge.
Join Peter Sparkes, Symantec’s Senior Director of Cyber Security Services for Asia Pacific and Japan, in this webinar as he discusses the OODA Loop Strategy:
- Observe: Expanding detection and extending coverage across the ecosystem
- Orientate: Utilising threat intelligence with planning, process and playbooks
- Decide: Empowering the analyst and the impact on business
- Act: Proactive defense through managed endpoints detection and response and orchestration
Pierre-Andre AeschlimannJun 19 20198:30 amUTC45 mins
Die Digitalisierung verursacht eine radikale Umgestaltung von Unternehmen und sogar ganzer Branchen. Es ist eine radikale Umformung der Interaktion zwischen Kunden und Unternehmen aber auch, immer wichtiger, zwischen Mitarbeiter und deren Unternehmen. Die Rolle der IT ist strategischer als je zuvor. Ein unternehmensweiter Service Management Ansatz hat sich als der beste Ausgangspunkt gezeigt.
In diesem Kontext werden wir folgende Themen und deren Wichtigkeit erklären:
•Wie verwalte ich Services effizient quer durch das ganze Unternehmen (IT, HR, Security, Facilities, Marketing, Customer Service,...) ?
•Wie automatisiere ich die dazugehörenden Prozesse oder Arbeitsabläufe intelligent und einfach?
•Wie ermögliche ich meinen Kunden und Mitarbeitern eine moderne, intuitive und immersive Erfahrung/Erlebniss/Experience, und warum ist ganz speziell die Employee Experience so wichtig?
•Das Ganze illustriert durch Fallbeispiele von Kunden aus dem deutschsprachigen Raum (DACH)
Chris Eng, Veracode Vice President of Research and guest, Forrester Research Principal Analyst Amy DeMartineJun 19 20199:00 amUTC56 mins
In our recent State of Software Security Volume 9 report, Veracode examined fix rates across 2 trillion lines of code shows that the number of vulnerable applications remains staggeringly high. More than 85 percent of all applications contain at least one vulnerability following the first scan, and more than 13 percent of applications contain at least one very high severity flaw.
One thing is certain: the sheer volume of vulnerabilities present in most organizations’ application portfolios makes it necessary for them to make daily tradeoffs between security, practicality, and speed.
There are just too many vulnerabilities for organizations to tackle all at once, which means it requires smart prioritization to close the riskiest vulnerabilities first. For the first time, our report shows a very strong correlation between high rates of security scanning and lower long-term application risks, which we believe presents a significant piece of evidence for the efficacy of DevSecOps. In fact, the most active DevSecOps programs fix flaws more than 11.5 times faster than the typical organization, due to ongoing security checks during continuous delivery of software builds, largely the result of increased code scanning.
Join guest presenter Amy DeMartine, Principal Analyst, Forrester Research Inc., and Veracode’s Chris Eng as they deliver valuable takeaways for business leaders, security practitioners and development teams seeking to secure their applications. Listeners will learn potential prioritizations and software development methods that could help their organizations reduce risk more quickly.
Colin Domoney DevSecOps Consultant at VeracodeJun 19 201911:00 amUTC43 mins
This webinar will provide a comprehensive look at the security features of the Azure DevOps CD/CD platform. The topics include built-in security features such as user access controls and branch policies; and an overview of best practice for the incorporation of various 3rd party security tooling such as Veracode Greenlight within your pipeline.
Other topics include best practices for pipeline telemetry, reporting, pipeline protection and templates for security best practices. Whether you are a software developer using Azure DevOps, a security manager or a DevOps expert this webinar should further enhance your expertise in secure software delivery with Azure DevOps.
Register for this live webinar where Colin Domoney - DevSecOps Consultant at Veracode - will leave you with a clear understanding of how to Secure your DevOps Pipeline.
Is your organisation moving to Amazon Web Services? Or are you a seasoned AWS pro, but need to know where to start to secure it?
It’s a fact—Cloud environments aren’t going away anytime soon. Cloud adoption is expected to grow at 12.4% annually until 2025. When you need to get started in a new cloud environment, or secure an existing one, vulnerability management is the place to start.
Join Daniel Prauser to learn the fundamentals of setting up vulnerability management in your cloud environment and common pitfalls to watch out for.
In this webinar we will cover:
The future of the cloud infrastructure landscape
* Some common misconceptions. Did you know AWS doesn’t secure your environment for you?
* Vulnerability Management best practices
* How Rapid7's InsightVM and InsightIDR can help
Daniela Fusaro, Senior Solutions ArchitectJun 19 201912:00 pmUTC14 mins
Viele Unternehemen ziehen es in Betracht Ihre existierende Infrastruktur in der Public Cloud zu erweitern oder sogar in einigen Fällen zu ersetzen. Während der Einsatz der Public Cloud unerhörte Flexibilität bietet, was das Ausrollen und die Bereitstellung angeht, stellt es Organisationen vor der Herausforderung, wie sie dieses Umfeld am besten sichern und überwachen können, vor allem wenn es sich um den East-West Traffic im Netzwerk handelt.
Einsicht im Netzwerkverkehr zu gewinnen ist der erste Schritt, diese Umgebungen zu sichern und dafür zu sorgen, daß alle Resourcen effizient genutzt und ihre Performanz optimiert wird.
Finden Sie heraus in unserem 15minutigen Webinar wie Sie:
- Mehr erfahren über die Herausforderungen von Unternehmen bei der Einführung von der Public Cloud
- Einsicht gewinnen wie Tools mit Hilfe der Gigamon Lösung, Zugriff auf diesem Netzwerkverkehr gewinnen und dabei Sicherheit und Leistung verbessert werden
- Herausfinden wie Gigamon Netzwerk Packet Broker innnerhalb dieser Umgebungen virtualisiert hat und wie alles mit GigaVUE-FM zusammenhängt
Gareth Fraser-King, Director, Product Marketing EMEAJun 19 20191:00 pmUTC45 mins
The numbers make stark reading. 281 billion emails sent daily to over 2 billion business users. 91% of all cyber-attacks start with an email and it only takes 1 with malicious intent to impact your organisation. With evolving methods used by the adversary, it’s becoming increasingly difficult not to get burned.
Join Gareth Fraser-King, Director, Product Marketing EMEA, to learn:
- The state of the cyber landscape, specific to email security.
- How the attack vector is changing with new tactics, techniques, procedures and what you need to look out for.
- Why is FireEye better at catching evolving attacks and how this can benefit you.
Joshua Costa, Manager, PS Advisory ServicesJun 19 20192:00 pmUTC90 mins
Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss threat hunting and incident detection leveraging EDR and the current cybersecurity threat landscape.
•Incident investigation considerations - old versus new
•Threat remediation and recovery
•Third-party and threat intelligence integration
Our Verizon Threat Research Advisory Center presenters will be:
•Hayden Williams, Sr. Manager, PS Advisory Services
•Joshua Costa, Manager, PS Advisory Services
- David Kennedy, Managing Principal, Open Source Intelligence
And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
•Current Intelligence Overview
•Attacks and Threat Indicators
•Latest Malware Trends
If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
Martin Whitworth, Research Director, European Security, IDC & Duncan Brown, Sr. Director Security Strategist, ForcepointJun 19 20193:00 pmUTC41 mins
We are now one year on from when GDPR became law, but the compliance race is far from over. Many organizations undoubtedly made a huge effort to revamp their processes and security around personal data—but how effective have they been?
In this webcast, Forcepoint Security Strategist Duncan Brown is joined by IDC’s Research Director for European Security Martin Whitworth as they discuss where we succeeded, where mistakes were made, and share five lessons learned to help prepare for the evolving privacy and compliance challenges ahead, including:
- Regulatory enforcement: Penalties are starting to be handed out and it’s not just fines; enforcement can take many forms.
- Over-compliance: Did some companies damage themselves by deleting too much data?
- A global trend towards privacy regulation: GDPR is just the start, with more consequences for how organizations use and misuse personal data.
Watch the webcast to get prepared for what lies ahead.
Valerie O'Connell, Research Director, EMA and Vincent Geffray, Senior Director, Product Marketing, EverbridgeJun 19 20193:00 pmUTC58 mins
Technology incidents happen every day to companies of all sizes, across every vertical, in all degrees of impact from inconvenient to potentially catastrophic. So, by definition, all organizations do IT incident response. The question is, how well do they do it? Research from leading IT analyst firm Enterprise Management Associates (EMA) shows that unless the response takes advantage of automation, the answer “not nearly well enough” is an understatement.
With the average time to engage the right response team taking 1 to 2 hours, and the average time to resolve a major outage taking 5 to 6 hours, there is a definitive need for immediate and dramatic operational improvement.
Leveraging EMA research and a case-based approach, this webinar will explain how to reduce mean time to repair (MTTR) through automated slashing of the time it takes to begin effective response. A simple method for determining the point at which it makes more business sense to invest in an improvement than it does to continue funding the status quo will also be discussed.
Additionally, webinar attendees will learn more about:
*Top automation drivers, indicators, obstacles, and benefits realized
*The case for automating incident response – real numbers from real places
*Quantifying the high cost of status quo – a conservative approach to demonstrating value
Andrew Sullivan, Principal Technical Marketing Manager, Red Hat & Doron Fediuck, Director, Software Engineering, Red HatJun 19 20193:00 pmUTC47 mins
Virtualization has been a staple of datacenter technology for a decade and continues to provide robust capabilities for all types of applications. Today’s Red Hat Virtualization product might not be what you remember. It now provides a fully featured, enterprise-ready hypervisor capable of hosting any workload in the on-premise datacenter. However, datacenter virtualization is evolving, and gaining the ability to integrate and interoperate with cloud-native applications and containers in new ways.
In this presentation from Red Hat Summit, Andrew Sullivan and Doron Fediuck discuss where Red Hat Virtualization for the enterprise and container-native virtualization fit into Red Hat’s portfolio and strategy. They also provide an overview of the capabilities that you can expect currently and in new functionality coming.
If you want to simplify your datacenter virtualization and help make digital transformation a reality, Red Hat's virtualization portfolio should be at the top of your list.
Ben Forster, Sr. Product Marketing Manager, FireEyeJun 19 20194:00 pmUTC60 mins
Managing security operations is a challenge, and the technologies most organizations are using don’t provide the visibility, detection efficacy, or context they need. As their risk profile expands, organizations rely on hiring more analysts and purchasing more tools, often depending on manual processes to find and mitigate threats. The high volume of alert noise strains security teams’ resources and increases the probability they will miss an alert that matters. Organizations need a single solution that centralizes their security management, provides visibility, and allows them to quickly respond to threats with automation.
In this webinar:
- Understand the benefits of technology consolidation
- Learn about what a single platform can do for your people and processes
- Discover the untapped potential of your security investments
Gordon Haff, Red Hat & Dave Meurer, SynopsysJun 19 20194:00 pmUTC60 mins
Development organizations view open source software as not just important but also strategic. That’s just one of the topics we’ll investigate in this joint webinar from Red Hat and Synopsys. Drawing from Red Hat’s “The State of Enterprise Open Source” report, technology evangelist Gordon Haff will explain why IT decision makers value open source so highly.
At the same time, changing development practices and escalating threats mean that security remains a concern with respect to open source software, as it is for IT more broadly. Dave Meurer of the Synopsys Software Integrity Group will explain findings from the Synopsys “2019 Open Source Security and Risk Analysis” report to offer an in-depth look at the state of open source security, compliance, and code quality risk in commercial software.
We’ll close with some practical advice about getting the most value from open source software while keeping your organization safe.