Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Machine Learning and AI in a Brave New Cloud World
    Machine Learning and AI in a Brave New Cloud World
    Ulf Mattsson, Head of Innovation, TokenEx Recorded: Oct 10 2019 61 mins
    Machine learning platforms are one of the fastest growing services of the public cloud. ML, an approach and set of technologies that use Artificial Intelligence (AI) concepts, is directly related to pattern recognition and computational learning. Early adopters of AI have now rolled out cloud-based services that are bringing AI to the masses.

    How are AI, deep learning, machine learning, big data, and cloud related? Can machine learning algorithms enable the use of an individual’s comprehensive biological information to predict or diagnose diseases, and to find or develop the best therapy for that individual? How is Quantum Computing in the Cloud related to the use of AI and Cybersecurity?

    Join this webinar to learn more about:
    - Machine Learning, Data Discovery and Cloud
    - Cloud-Based ML Applications and ML services from AWS and Google Cloud
    - How to Automate Machine Learning

    ----------------------------------------
    Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
  • The State of Data Security in Retail
    The State of Data Security in Retail
    Andy Kicklighter, Director of Product Marketing, Thales Recorded: Oct 10 2019 35 mins
    Digital transformation is fundamentally impacting all industries, and nowhere is this truer than in retail. The internet and mobile technologies have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also how they communicate with, serve, and support them.

    While digital transformation is touching every industry, U.S. retailers are leaders are on the leading edge of implementations,
    with 42% of retailers saying they are either aggressively disrupting the markets in which they participate or embedding digital capabilities that enable greater organizational agility. While Digital Transformation is allowing retailers to introduce new business models and reach more customers in new and innovative ways, it is introducing added difficulties for information security professionals and raises the potential to put sensitive customer data at risk.

    Based on the results from the 2019 Thales Data Threat Report – Retail Edition, participants in this webinar can expect to learn about:
    •How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    •The data security challenges facing retail companies today
    •Critical analyst recommendations for how organizations can be most effective when selecting the right tools that will enable them to manage greater amounts of complexity, that span legacy on-premises needs as well as modern, cloud-based, edge-oriented technologies.
  • AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    AmerisourceBergen: Data Protection for HIPAA, CCPA, GDPR Privacy Compliance
    Arvin Bansal, Senior Director Cyber Governance, AmerisourceBergen, Nathan Turajski, Sr. Director, Informatica Recorded: Oct 10 2019 32 mins
    The California Consumer Privacy Act (CCPA), GDPR and other mandates are a wake-up call to take a fresh look at data protection for personal information. As the scope of sensitive data and user rights requirements have evolved, this includes industries with significant experience managing legacy mandates such as PCI DSS or HIPAA.

    AmerisourceBergen is no stranger to industry mandates like HIPAA and HITECH, but is now preparing for a future where the number and impact of healthcare data breaches continues to increase, even as user transparency demands expanded controls. However, there is a silver lining as data privacy controls can also help accelerate digital transformation and enable safe value creation. In this webinar, you’ll learn how AmerisourceBergen approaches making information safe with world-class data masking techniques as a critical component of their privacy journey, and how Informatica is helping deliver data privacy governance solutions for the next-generation Data 3.0 evolution.
  • API monitoring and troubleshooting in a hybrid world
    API monitoring and troubleshooting in a hybrid world
    Kevin Balaji, Product Marketing Manager at MuleSoft and Andrew Bragdon, Director of Product Management at MuleSoft Recorded: Oct 10 2019 34 mins
    Today’s enterprises are increasingly dependent on all types of APIs and apps for flexibility and rapid development. However, if even one component of this chain breaks, it can have a ripple effect on its dependents, ultimately sacrificing customer experience and impacting the overall business. As traffic increases, organizations need real time visibility, proactive notifications of issues, and an efficient way to mitigate problems in order to deliver on customer expectations.

    Anypoint Monitoring helps you to proactively identify and resolve issues, all in one place with real time visibility into your APIs and integrations. Ensure business continuity with real time visibility into app performance, customizable dashboards, advanced alerts, and instant access to historical log data.

    Watch this live demo to learn:
    - How MuleSoft customers leverage Anypoint Monitoring to enable best practices and steps towards operational monitoring of their application network.
    - Advanced Monitoring capabilities, including advanced alerts, log management, and custom metrics/events.
    - How Anypoint Monitoring provides real time visibility into your APIs and integrations with easy to use out-of-the-box and customizable dashboards.
  • Nice to Have or Have to Have? The Case for Cyber Insurance
    Nice to Have or Have to Have? The Case for Cyber Insurance
    John Smith, Prin. Sec. Engr, ExtraHop; Sean Scranton, RLI Cyber; William Boeck, Lockton; Brandon Dunlap, Moderator Recorded: Oct 10 2019 60 mins
    More and more companies are offering cyber insurance policies to help mitigate the financial losses an organization might suffer from a cyber incident. With the increase in breaches, intrusions and ransomware incidents, cyber insurance could be right for your organization as a part of the risk mitigation strategy. But there’s a lot of confusion for organizations in determining what a company’s exposure is and what exceptions and exclusions might be in a policy. Organizations are almost forced to think like an underwriter to address these concerns. Join ExtraHop and (ISC)2 October 10, 2019 at 1PM Eastern for a discussion on cyber insurance, demystifying the current insurance landscape and what are the right questions to answer.
  • Enterprise IoT Security: Connect and Protect
    Enterprise IoT Security: Connect and Protect
    Momenta Partners Oct 24 2019 4:00 pm UTC 60 mins
    Security remains a top priority in today’s connected world. The market landscape is dynamic, innovative and confusing at the same time. Navigating the ever emerging threats requires vigilant expertise, which is always in short supply in a digitally accelerated world. Every connected device and service has potential vulnerabilities. Join Momenta Partners as we highlight the most relevant issues of today in Enterprise IoT Security: Connect and Protect.

    In this webinar, Momenta's Managing Director Ken Forster will be joined by a panel of IoT security experts; Duncan Greatwood, CEO of Xage Security, Nicole Ford, VP, Chief Information Officer of Carrier, and Julie Fitton, VP, Digital Product Security of Stanley Black & Decker Inc. to discuss these key themes in digital security:

    - What is enterprise IoT security?
    - Current state of the security market
    - What are the risks?
    - IT - OT gap
    - Solutions and use cases
  • Network of the Future is Powered by AI: Dartmouth College Case Study
    Network of the Future is Powered by AI: Dartmouth College Case Study
    Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth College Recorded: Oct 10 2019 60 mins
    When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.

    In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.

    Watch now, and learn how to:

    -Gain visibility into the Wi-Fi user experience
    -Quickly troubleshoot network problems with an AI-driven virtual assistant
    -Predict network problems before they arise
    -Implement personalized location services, such as wayfinding and proximity notifications
  • ¿Cómo migrar copias de seguridad Legacy a la nube con Commvault?
    ¿Cómo migrar copias de seguridad Legacy a la nube con Commvault?
    Jose Luis Garcia, Commvault Recorded: Oct 10 2019 22 mins
    ¡Es hora de apagar su copia de seguridad heredada o legacy! Commvault mueve esos datos antiguos a la nube de forma segura.

    ¿Sigue pagando mantenimiento en los sistemas de respaldo antiguos solo porque no está seguro de qué hacer con ese conjunto de datos de respaldo y archivado que aún deben mantenerse para cumplir con los requisitos de cumplimiento o retención? ¿Qué pasaría si pudiera migrar esas copias de seguridad y archivos directamente a la nube mientras conserva los metadatos importantes, como las fechas y horas de retención originales?

    Únase a Commvault para aprender cómo mover las copias de seguridad y los archivos de los sistemas heredados o legacy, y almacenar ese conjunto de datos y cargas de trabajo directamente en el almacenamiento en la nube.

    Nuestros expertos en la materia técnica explicarán cómo la plataforma Commvault puede capturar automáticamente copias de seguridad y archivos legacy para la migración a la nube. Aprenda cómo mover copias de seguridad a la nube desde cualquiera de estos sistemas:

    Veritas NetBackup
    Veritas BackupExec
    IBM Spectrum Protect, anteriormente llamado Tivoli Storage Manager (TSM)
    Dell EMC NetWorker
    Dell EMC Avamar
    Administrador de protección de datos de Microsoft (DPM)
    Microfocus Data Protector, anteriormente HP Data Protector
    No necesita mantener ese antiguo sistema funcionando en la esquina "por si acaso". Aprenda cómo optimizar su carga de trabajo de TI, proporcionar una mejor disponibilidad de datos e incluir sus copias de seguridad legacy en la búsqueda empresarial.
  • Practical Risk Management for the Multi-Cloud
    Practical Risk Management for the Multi-Cloud
    Ulf Mattsson, Head of Innovation, TokenEx Recorded: Oct 10 2019 62 mins
    This session will take a practical approach to IT risk management and discuss multi cloud, Verizon Data Breach Investigations Report (DBIR) and how Enterprises are losing ground in the fight against persistent cyber-attacks. We simply cannot catch the bad guys until it is too late. This picture is not improving. Verizon reports concluded that less than 14% of breaches are detected by internal monitoring tools.

    We will review the JP Morgan Chase data breach were hackers were in the bank’s network for months undetected. Network configuration errors are inevitable, even at the largest banks as Capital One that recently had a data breach where a hacker gained access to 100 million credit card applications and accounts.

    Viewers will also learn about:
    - Macro trends in Cloud security and Micro trends in Cloud security
    - Risks from Quantum Computing and when we should move to alternate forms of encryption
    - Review “Kill Chains” from Lockhead Martin in relation to APT and DDoS Attacks
    - Risk Management methods from ISACA and other organizations

    Speaker: Ulf Mattsson, Head of Innovation, TokenEx

    ----------------------------------------
    Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
  • Настраиваем файловую архивацию или как экономить место на файловых серверах
    Настраиваем файловую архивацию или как экономить место на файловых серверах
    Дмитрий Иванюк, эксперт по решениям Commvault Recorded: Oct 10 2019 50 mins
    Уважаемые коллеги!

    Приглашаем Вас и Ваших коллег принять участие в вебинаре «Настраиваем файловую архивацию или как экономить место на файловых серверах».

    Дата: 10 октября
    Время проведения: 11.00-12.00
    Тренер: Дмитрий Иванюк, эксперт по решениям Commvault.

    Курс предназначен для технических специалистов, но будет интересен и менеджерам по продукту.

    В процессе вебинара мы расскажем:
    •Что такое архивация
    •Настройка архивации в Commvault
    •Запуск заданий
    •Работа со stub
    •Реакция пользователей
    •Q&A

    Не упустите возможность узнать больше!
  • The Role of AI in IoT Security
    The Role of AI in IoT Security
    May Wang, CTO & Co-founder of Zingbox Recorded: Oct 9 2019 60 mins
    Artificial Intelligence, machine learning, and deep learning are the raves in network security. It's perceived as the only practical approach to staying ahead of today's cyberthreats.

    The various steps used by Artificial Intelligence is not so different than a physician’s approach to treating a patient. You must first understand the patient (or device), monitor and assess that all organs (or components) are behaving as intended, and proactively treat (or remediate) viruses and other harm.

    In this session, Dr. May Wang will explore:
    - The latest advancements in AI for IoT security using healthcare as an example
    - The top security threats to healthcare organizations and how to address them.
  • Digital Transformation, Application Security and the New 5G World
    Digital Transformation, Application Security and the New 5G World
    Ashish Khanna, Verizon and Greg Kushmerek, Onapsis Recorded: Oct 9 2019 62 mins
    With digital transformation projects a top priority for nearly every organization, it's imperative to consider how cybersecurity and risk play a role in the migration's success. With ERP systems at the heart of the enterprise, security and compliance need to be considered at stage zero. That’s why Verizon and Onapsis are partnering to help organizations improve their risk posture. To help customers identify risks associated with SAP/ERP systems, Verizon leverages Onapsis'
    technology to enable organizations to continuously monitor business-critical ERP applications for cybersecurity vulnerabilities across cloud and on-premise deployments. Join Verizon and Onapsis to hear why this partnership provides you a better security option in a
    modernizing world.
  • Network Security DDoS Solutions for Today's Threat Landscape
    Network Security DDoS Solutions for Today's Threat Landscape
    Irene Zhan, Sr. Product Marketing Manager at Juniper Networks, Ashley Stephenson, CEO at Corero Recorded: Oct 9 2019 57 mins
    DDoS attacks are a significant part of today's threat landscape, and they continue to grow in magnitude, frequency, and sophistication. It is no longer feasible to address this growing problem with traditional out of-band scrubbing centers and manual intervention approaches. Juniper and Corero have developed a revolutionary new defense against DDoS attacks, delivering line-rate detection and mitigation in real time at very large scale by leveraging always on packet-level monitoring, automated machine analysis, and infrastructure-based enforcement across the network edge.

    Join Irene Zhang, Sr. Product Marketing Manager, Juniper Networks and Ashley Stephenson, CEO, Corero and learn how the joint Juniper Networks-Corero Network Security DDoS Solution can benefit your business.
  • National Cyber Security Awareness Month - Secure IT
    National Cyber Security Awareness Month - Secure IT
    Dina Steinke | Michael Enos | Zara Smith Recorded: Oct 9 2019 61 mins
    Symantec invites you to join us, as well as TechSoup and the Michigan Small Business Development Center, for a discussion on how to apply added layers of security to your devices and online accounts. The changes in technology are not slowing, with all of the changes cybercriminals are adapting to become more sophisticated. Better protect your personal info with available security features on your own devices.

    We will focus on small businesses and nonprofits and the topic will include:

    · Creating strong, unique passphrases

    · Multi-factor authentication

    · Safe online shopping

    · How to spot and avoid phishing

    Register Today
  • NCSAM Part 1 of 4: After the Attack—Surviving and Thriving Post-Breach
    NCSAM Part 1 of 4: After the Attack—Surviving and Thriving Post-Breach
    Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly Recorded: Oct 9 2019 50 mins
    Join us as we kick off Part 1 of 4 in our Cybersecurity Awareness Month webinar series, with a replay of this informative webinar.

    More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

    • Understand responsibilities and ramifications of ever-tightening data privacy rules
    • Minimize damages and mitigate risk exposure with rapid response strategies
    • Identify various breach threats and common network vulnerabilities
    • Analyze key learnings from prominent breach events
    • See how technology can help you investigate, automate and document key processes
  • How a Trusted Employee Becomes a Business Risk
    How a Trusted Employee Becomes a Business Risk
    Tom Miller, CEO, ClearForce Recorded: Oct 9 2019 52 mins
    Behind professional exteriors, many employees struggle with personal and financial pressures and workplace stress. The implications of employee stress to your business extend well beyond human resource concerns. Join Tom Miller, CEO of ClearForce, for this webinar discussing how employee stress leads to inadvertent errors, financial risks, disengagement, harassment, and in extreme cases, insider threats and criminal activity in the workplace. Tom will discuss how to discover and understand employee behavioral cycles so that you can take action to improve workplace safety, the productivity of both your workers and your business, and defend against insider threats.
  • How to securely link datasets from different organisations
    How to securely link datasets from different organisations
    Javier Abascal, Senior Privacy Engineer, Privitar Recorded: Oct 9 2019 23 mins
    With SecureLink, distributed datasets held by different business units, regions or independent organisations can be securely joined by a coordinating central party, while never disclosing identity-revealing linking identifiers, allowing insights to be safely obtained from rich, combined datasets.

    SecureLink masks identifiers using industry-standard encryption schemes, so that identifiers are kept encrypted at all times. All identifiers receive a consistent but secure treatment, so that upon receiving the data the central party can still join it into a single dataset.

    Publisher’s SecureLink feature enables organisations to overcome trust barriers and meet regulatory and governance requirements that are usually blockers for collaboration on data projects that involve multiple parties.
  • Network Security DDoS Solutions for Today's Threat Landscape [EMEA]
    Network Security DDoS Solutions for Today's Threat Landscape [EMEA]
    Irene Zhan, Sr. Product Marketing Manager at Juniper Networks, Ashley Stephenson, CEO at Corero Recorded: Oct 9 2019 57 mins
    DDoS attacks are a significant part of today's threat landscape, and they continue to grow in magnitude, frequency, and sophistication. It is no longer feasible to address this growing problem with traditional out of-band scrubbing centers and manual intervention approaches. Juniper and Corero have developed a revolutionary new defense against DDoS attacks, delivering line-rate detection and mitigation in real time at very large scale by leveraging always on packet-level monitoring, automated machine analysis, and infrastructure-based enforcement across the network edge.

    Join Irene Zhang, Sr. Product Marketing Manager, Juniper Networks and Ashley Stephenson, CEO, Corero and learn how the joint Juniper Networks-Corero Network Security DDoS Solution can benefit your business.
  • Stop Watching and Start Blocking: Affordable Machine-Learning Enabled Defense
    Stop Watching and Start Blocking: Affordable Machine-Learning Enabled Defense
    John Bambenek, VP of Security Research and Intelligence at ThreatSTOP, Inc. Recorded: Oct 8 2019 58 mins
    The chief problem with cybersecurity is that most of our tools and workforce is geared to waiting for adverse events, detecting those events (sometimes months after the fact), investigating the breach that has already occurred, and then cleaning up. This slow and reactive process ensures breaches happen and security staff us overwhelmed under the noise.

    This talk will focus on automation and machine learning techniques that can proactively identify threats seen in the wild based on the latest academic research. This techniques allow organizations to identify suspect infrastructure before it is used to attack them. The key to making this work is infusing machine learning with knowledge of how actual attacks work and the threat landscape. Machine learning without intelligence is merely gussied up mensa math exercises.

    It isn't enough to know what the attacker will use to attack, however. Armed with this knowledge, organizations now need to safely automatically block these attacks before they occur so breaches never happen to begin with. The goal of automation must be to stop attacks before they are launched, not merely speeding up incident response. Several case studies will be discussed showing how this all can work together in the real world.

    Takeaways:
    - How to use machine learning and why it is essential to use strong intelligence to create models
    - Techniques to use automation to block attacks before they are launched against a victim organization
    - Cost-effective and safe ways to whitelist and blacklist infrastructure to insure against false positives
  • Unified Endpoint Management & Security: A Force Multiplier for Small Businesses
    Unified Endpoint Management & Security: A Force Multiplier for Small Businesses
    Scott Scheferman, Cylance Director of Global Services; Masataka Hashiguchi, Interfocus Sales Engineer Recorded: Oct 8 2019 55 mins
    Join Interfocus and Cylance for this webinar outlining the workplace productivity gains that your business can realize through an integrated and unified platform delivering both IT asset management and endpoint security. Most IT teams today suffer from "alert fatigue" from the growing number of devices on their network, and spend on average 5-13 hours a week cleaning up compromised endpoints. Scott Scheferman from Cylance and Masataka Hashiguchi from Interfocus will demonstrate how automation and prevention is worth a pound of cure on your endpoints.
  • 7 Steps to Automating Threat Detection and Analysis
    7 Steps to Automating Threat Detection and Analysis
    Josh Rickard, Security Research Engineer, Swimlane and Nick Tausek, Security Research Engineer, Swimlane Recorded: Oct 8 2019 45 mins
    There are numerous cybersecurity tools available to help organizations detect threats. But, this volume creates a number of challenges, including siloed and disparate systems. While these tools are intended to improve the organization’s security posture, many of them require sophisticated staff with complex training to leverage them effectively. Sometimes, even with training, systems generate so many alerts the highly-skilled staff is unable to analyze and respond to real threats in a timely manner. This is not sustainable for even the largest security operations center (SOC). A holistic, automated approach to threat detection and analysis is necessary.


    In this webinar, Swimlane’s Josh Rickard will provide seven steps to automate threat detection and analysis that can be used in any-sized SOC. This process enables analysts to stop focusing on detection and focus instead on a proactive SOC model, improving the security posture of the organization and dramatically reducing threat risk. You will learn how to:

    - Monitor everything within your security stack;
    - Build a system that can automatically detect every form of attack;
    - Improve your ability to detect attacks and avoid false positives;
    - Detect security threats in real time;
    - And more!
  • Fuzzing Infotainment Systems and Telematics Units With Agent Instrumentation
    Fuzzing Infotainment Systems and Telematics Units With Agent Instrumentation
    Dennis Kengo Oka, Senior Solutions Architect, Synopsys & Rikke Kuipers, Product Manager, Synopsys Recorded: Oct 8 2019 58 mins
    In the past few years, cybersecurity has become more intertwined into each step of the automotive development process. In particular, fuzz testing has proven to be a powerful approach to detect unknown vulnerabilities in automotive systems. However, with limited instrumentation, especially on systems such as in-vehicle infotainment (IVI) system and telematics units, there are several types of issues that go undetected, such as memory leaks and cases where the application crashes but restarts quickly. Since these systems are typically based on operating systems providing more functionality such as Linux and Android, it is possible to use appropriate tools to collect additional information from the system under test (SUT) to determine whether there were any exceptions detected during the fuzz testing. Furthermore, it would be possible to gather more details about the detected exceptions on the SUT which helps developers to better understand and identify the root cause of the issues and fix the problems more efficiently. To this end, we introduce the Agent Instrumentation Framework and explain how it can be used to improve fuzz testing of IVIs and telematics units. We show how additional information can be collected from the target system and used to identify whether there are exceptions on the SUT and additionally help developers identify the underlying cause of any issues detected. Finally, to showcase the effectiveness of the agent instrumentation framework we built a test bench based on this approach and performed fuzz testing on multiple SUTs. Based on our findings we highlight several examples of issues that would have not been detected unless we used agent instrumentation.
  • Key Considerations for Your Future Email Security Solution
    Key Considerations for Your Future Email Security Solution
    Cheryl Tang, Product Marketing Director Recorded: Oct 8 2019 50 mins
    The Broadcom acquisition of Symantec’s Enterprise Security Business creates uncertainty for your email security strategy. Unsettled by the acquisition, many Symantec email security customers are reevaluating their email security solution. As you evaluate your options, you may be wondering what critical capabilities your next email security solution must have. One thing is certain. With today’s threat actors continually refining their tactics, you need an email security solution that can keep pace with today’s rapidly changing threat landscape. But what else do you need to defend against the No. 1 threat vector?

    Join Proofpoint for an educational webinar to learn:

    - What the threat landscape looks like today
    - What key capabilities you should look for to future proof your email security
    - How Proofpoint we’ve helped customers with their email security
  • Implementing CAIQ-Lite in a Cloud Vendor Security Assessment Workflow
    Implementing CAIQ-Lite in a Cloud Vendor Security Assessment Workflow
    Nick Sorensen-CEO, Whistic & Azure Shen-Compliance Analyst, OneLogin & Samantha Cowan-Security Compliance Manager, HackerOne Recorded: Oct 8 2019 56 mins
    Come learn how leading technology companies are optimizing cloud vendor security assessments by leveraging the recently-released CAIQ-Lite in their workflow. Also learn how and why the CAIQ-Lite came to be, as well as best practices from early adopters.

    Takeaways from this webinar include...
    - An introduction of the history/creation of the CAIQ-Lite
    - Best practices for using CAIQ-Lite to perform security assessments of cloud vendors
    - A "behind the scenes" look at how technology companies are using both the CAIQ and CAIQ-Lite in their assessment workflows
  • Evolving Beyond the Password
    Evolving Beyond the Password
    Andrew Shikiar (FIDO Alliance), Dr. Rolf Lindemann (Nok Nok Labs), Dean Nicolls (Jumio) Recorded: Oct 8 2019 42 mins
    Learn how modern enterprises are discovering new alternatives to the password - device-based authentication that overcomes the many shortcomings of the username and password paradigm. This is at the heart of the FIDO Alliance, an open industry association whose mission is to develop and promote authentication standards that help reduce the world’s over-reliance on passwords.

    The presentation is divided into three sections:

    -The Problem with Passwords: Andrew Skikiar (FIDO Alliance)
    -Next Generation Authentication: Dr. Rolf Lindemann (Nok Nok Labs)
    -Identity Proofing & Password Recovery: Dean Nicolls (Jumio)

    When users lose their last or only authentication method (forgotten password, etc.), account recovery needs to be performed in order to re-enable access to the account. In this webinar, we also explore secure ways to recover their accounts leveraging proven identity proofing methods.
  • Live Interview with Graeme Payne, former VP and CIO of Equifax
    Live Interview with Graeme Payne, former VP and CIO of Equifax
    David Morris, Graeme Payne and Reid Eastburn Oct 14 2019 4:00 pm UTC 90 mins
    Tune in for this live interview with Graeme Payne, former VP and CIO for Global Corporate Platforms at Equifax. This session will give you first hand insights into what happened at Equifax, and lessons learned.
  • Enterprise Content Management: A Digital Operations Future?
    Enterprise Content Management: A Digital Operations Future?
    John Newton, Founder, Alfresco / Charles Araujo, Principal Analyst, Intellyx Oct 15 2019 9:30 am UTC 56 mins
    What are the content management trends influencing the market and which new capabilities will help you unlock the value hidden in your organization's content?

    Alfresco founder John Newton, believes working towards a state of ‘Digital Operations’ is key to putting content at the heart of your digital transformation.

    Join him for this webinar, hosted by Charles Araujo, Principal Analyst at Intellyx, where they will explore:
    - Digital Operations that lead to meaningful Digital Customer Experiences and instant services.
    - Why several independent analysts all agree Alfresco is an ECM market leader.
    - The impact of Open Source, API-driven Microservices and Containerization and AI.
  • No Geek-Speak Allowed: The Financial View of Cyber Risk
    No Geek-Speak Allowed: The Financial View of Cyber Risk
    Jerry Caponera, VP of Products & Cyber Risk, Nehemiah Security Oct 15 2019 3:00 pm UTC 60 mins
    Join us for this webinar to explore how cyber risk models have evolved to more accurately predict financial outcomes through better alignment with frameworks and models like NIST and MITRE ATT&CK. Jerry Caponera, VP of Products and Cyber Risk at Nehemiah Security, will share insights from global cybersecurity leaders who have risen above cyber geek talk and successfully translated risk into business terms. He will cover managing risk by tracking associated potential financial losses; what’s behind the hype surrounding financial data risk assessment (FinDRA); how to calculate ROI for security and mitigation investments; and how to brief your Board on cyber risk in financial terms.
  • Streamline your Data Transformation to SAP S/4HANA
    Streamline your Data Transformation to SAP S/4HANA
    Kate Holthouse, Sr. Value Engineer at Syniti Oct 15 2019 3:00 pm UTC 60 mins
    Running an on time, on budget migration is a daunting task. How do you ensure your source data is complete, your mappings are correct, and your team is used efficiently? How do you hit your timeline goals when your project is stalling? Get answers to these questions and more today.
  • [PANEL] How to Simplify Cyber Risk Management?
    [PANEL] How to Simplify Cyber Risk Management?
    Panelists TBA Oct 15 2019 4:00 pm UTC 60 mins
    In today’s multi-cloud and hybrid environments, CISO's are struggling to secure assets, manage security policies across clouds, monitor and mitigate risks, while also supporting the business. How are CISOs solving the challenge of complexity?

    Join this panel of experts to learn how to simplify cyber risk management as well as maximize the value of your team and technology.
    - Risk scoring and security controls
    - How to identify risks for organizations and their third-party vendors
    - How to prevent, detect, and respond to, privacy and network security incidents
    - Best of vulnerability and risk management in a multi-vendor environment
    - Best practices and use cases across industries
  • What Happens When Your Bank is Hacked?
    What Happens When Your Bank is Hacked?
    David Morris, Lance James, Steven Teppler, and Mark Rasch Oct 15 2019 5:00 pm UTC 90 mins
    This session will delve into the legal responsibilities of your Bank's liability and your requirements to protect your banking credentials from the unauthorized transfer of funds as a result of a hack.
  • DNS as a Foundational Security Architecture for Digital Transformations
    DNS as a Foundational Security Architecture for Digital Transformations
    Jerry Wong, Systems Engineer, Infoblox Oct 16 2019 6:00 am UTC 60 mins
    The perimeter has shifted. Your users directly access cloud applications from everywhere and data no longer reside only in data centers. Digital transformations like SD-WAN, IoT and cloud make securing your infrastructure, applications and data complicated. SD-WAN enabled branches directly connect to the Internet, but they don’t have the ability to replicate a full HQ security stack. IoT leads to an explosion of non-standard devices using non-standard protocols, making them harder to secure. Every new change doesn’t equal need for a new security tool.

    What’s needed is a scalable, simple, and integrated security solution that leverages existing infrastructure that organizations already own. DNS is critical to the fabric of the internet and any IP based communication (on-premises, cloud, SD-WAN and IoT environments). It serves as the perfect foundation for security because it is simple to deploy, ubiquitous in networks, is needed anyway for connectivity and can scale to the size of the Internet.

    Join Infoblox and (ISC)² on Oct 16, 2019 (Wed) at 14:00 (GMT +8) to learn how leveraging DNS as a foundational security architecture for digital transformations can:

    • Protect your brand by securing your traditional networks and transformations like SD-WAN, Cloud and IoT
    • Reduce time and cost of your enterprise threat defense
    • Automate response when it sees things happening and provide data to the rest of the ecosystem

    Presenter: Jerry Wong, Systems Engineer, Infoblox
    Moderator: Sam Goh, CISSP, GM for Korea and Japan, Ensign InfoSecurity
  • LGPD e o direito ao esquecimento
    LGPD e o direito ao esquecimento
    Luiz Guimaraes, Enterprise Solutions Engineer, ASG Technologies Oct 16 2019 1:30 pm UTC 53 mins
    Uma nova geração de leis e regulamentos surgiu nos últimos anos com o objetivo de proteger dados e informações de usuários na internet. Na Europa a GDPR, no Brasil a LGPD e nos Estados Unidos (Califórnia), até agora, o CCPA.

    O desafio hoje, para todas as corporações, é não só a gestão de um volume explosivo de dados não-estruturados, tornando-os aderentes as suas Políticas de Governança, como também a geração de valor para o negócio através do uso consistente de seu conteúdo.

    Junte-se a nós em um Quick Demo Webinar, onde você entenderá como o ASG Mobius 9.1 está ajudando seus clientes a obter o máximo de suas informações:
    - Impactos e consequências da nova legislação para as empresas
    - Muito mais que uma abordagem tradicional - entregando escalabilidade, flexibilidade e controle com tecnologia moderna
    - Como tratar aspectos da LGPD em conteúdo dados estruturados e não estruturados
    - Gestão do conteúdo por políticas amplas e auditadas
    - Direito ao esquecimento na Gestão de Registros
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    K. Eric Gentry, Managing Principal, VTRAC Oct 16 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.

    We’ll cover:
    •The most common social engineering attacks
    •New insights on phishing attacks
    •Top threat actors in social attacks

    Our Verizon Threat Research Advisory Center presenters will be:
    •K. Eric Gentry, Managing Principal, VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • Unified Data Protection: Part 2
    Unified Data Protection: Part 2
    Ankur Chadda, Senior Product Marketing Manager Oct 16 2019 3:00 pm UTC 38 mins
    Enterprises are facing new challenges when it comes to protecting regulated data and critical IP.

    Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data.

    Wednesday, October 16, 2019

    10 a.m. CDT

    This webinar explores how companies should rethink data security. Addressing the challenges of protecting critical data & intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.

    Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate

    Risk-Adaptive Controls – to eliminate the complexity of policy enforcement

    Intelligent & Dynamic Automation – to build a better understanding of context and user intent
  • 10 Ways to Dramatically Cut Abandonment Rates During Account Onboarding
    10 Ways to Dramatically Cut Abandonment Rates During Account Onboarding
    Dean Nicolls, VP of Global Marketing, Jumio Oct 16 2019 3:30 pm UTC 31 mins
    Financial institutions are losing almost 40% of applicants during digital on-boarding. There's a number of reasons for this, but often its the online identity verification part of the process where customers are lost. This is because the experience is often too time-consuming, onerous, or clunky.

    In this webcast, Dean Nicolls provides an update on the abandonment crisis and then shares 10 practical tips for improving the onboarding process. He also shares a handy TCO calculator for comparing conversion rates of different identity verification solutions.
  • NCSAM Part 2 of 4: Accelerate Incident Response Through Automation
    NCSAM Part 2 of 4: Accelerate Incident Response Through Automation
    Joseph Loomis, CSO, CyberSponse and Steve Sunday, Principal Technical Engineer, AccessData Oct 16 2019 4:00 pm UTC 28 mins
    When a data breach occurs, every second counts. With the new RESTful API from AccessData, organizations can now automate incident response, saving up to 40 minutes of analysis time per incident. When an attack is detected by an organization’s cybersecurity software, like CyberSponse, the #1 security, orchestration, automation and incident response solution, the API alerts the AD Enterprise agent and initiates a collection job within moments of the attack, immediately preserving data related to the root cause of the breach.

    Join us on Thursday, August 22nd at 2:00 pm ET for a 60-minute webinar co-presented by AccessData and CyberSponse. In this webinar, you’ll understand how automation can facilitate faster, more secure incident response and you'll see firsthand how the integration between these two platforms using the new AccessData API triggers automated forensics, dramatically accelerating incident response. Collected evidence is then immediately available for analysis in AD Enterprise. Join us to see a live demo of the integration!
  • Best Practices for Secured ICS Deployments
    Best Practices for Secured ICS Deployments
    Barak Perelman Oct 16 2019 4:00 pm UTC 75 mins
    Manufacturing and critical infrastructure organizations require the right OT solution that can deliver visibility & security from emerging threats. But that is only half the battle. Each environment is a bit different and what may be appropriate for some, will simply not work for others. Whether you are big or small, distributed or centralized will determine the right deployment model for you. Join us as we discuss a variety of deployment best practices based on different organizational models, structures and goals. After all, it is about leveraging the right model for YOUR organization that will ultimately achieve a fully secured environment.
  • Live Demo: Foundations of People-Centric Cybersecurity
    Live Demo: Foundations of People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Oct 16 2019 5:00 pm UTC 45 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • National Cyber Security Awareness Month- Protect IT
    National Cyber Security Awareness Month- Protect IT
    Kevin Haley | Eva Velasquez | Ryan Lawless Oct 16 2019 5:00 pm UTC 60 mins
    As we wrap up National Cyber Security Awareness month join Symantec and partners The Identity Theft Resource Center and Infolock for our final webinar. Whether you are connecting to networks or collecting customer/consumer data, protection is needed. This group of speakers will help familiarize you on how to check your systems and how to keep others’ data safe.

    Topics will include:

    - If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems

    - Wi-Fi safety

    - If You Collect It, Protect It: keeping customer/consumer data and information safe

    Register Today
  • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Gabe Gumbs, Chief Intelligence Officer at Spirion and Ben Rice, VP of Business development at Bitglass Oct 16 2019 5:00 pm UTC 60 mins
    Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solutions already in use in your organization. Want to learn more?

    Join Spirion’s and Bitglass data protection experts in our joint webinar: Getting Ahead of the Game in Data Protection: Discover, Classify and Manage on October 16, 1 PM ET.

    What you will learn?

    •Data protection challenges to be mindful of
    •Managing digital transformation and unstructured data proliferation
    •How Bitglass and Spirion's solutions work together to protect your data
  • Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program
    Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program
    Casey Smith Director of Applied Research & with Brian Baskin Technical Director of Threat Research @ Carbon Black Oct 17 2019 2:00 am UTC 60 mins
    What is required to take your threat hunting program to the highest level of maturity? Using Red Canary as a case study, this session will provide a behind-the-scenes look at how to bring together MITRE ATT&CK™, CB Response, and Atomic Red Team to analyze massive amounts of data and quickly detect adversaries. This webinar also features David J. Bianco's threat hunting maturity model.

    Attendees will learn how to:

    - Automate the majority of successful data analysis procedure
    - Map adversary techniques to detection coverage
    - Test, validate, and continuously improve visibility
    - Make threat hunting a repeatable process that drives better security outcomes
  • Global Trends in Cloud Access Management, Single Sign On and Authentication
    Global Trends in Cloud Access Management, Single Sign On and Authentication
    Danna Bethlehem, Director of Product Marketing, Thales Oct 17 2019 10:00 am UTC 45 mins
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • Protecting Today’s Smart City Through Device Visibility & Control
    Protecting Today’s Smart City Through Device Visibility & Control
    Jonathan Jesse is a Senior Systems Engineer, State & Local, Forescout Technologies Oct 17 2019 3:00 pm UTC 27 mins
    The vision of smart cities is bright—automating critical public services, improving community interactions and achieving untold levels of efficiency in a connected, technology-driven society. But along with all of this boundless potential comes untold risk of a cybersecurity breach.

    Join us for this insightful webinar to hear how Forescout Technologies is playing a critical role in securing these technologically advanced communities to mitigate risk, increase visibility across the extended enterprise, and provide the necessary controls needed to secure these smart environments.

    Webinar topics include:

    ·Protecting our Law Enforcement technology – from vehicles to dispatch, and all devices in between
    ·Risks and challenges of new technologies with Smart Transportation and Digital Services
    ·Real case studies of Smart Cities and how they manage the risk of IoT and the connected reality

    Sponsored By Forescout Technologies + ISA Cybersecurity
  • What’s Your Organization’s Exposure on the Dark Web?
    What’s Your Organization’s Exposure on the Dark Web?
    Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management, Terbium Labs Oct 17 2019 3:00 pm UTC 60 mins
    A thriving fraud economy exists in the criminal underground, on the Dark Web and beyond, that trades in compromised information. Even if it’s not your business’s information, it’s still your problem because stolen user credentials are used for large-scale phishing attacks, credential stuffing, and account takeover. Join two Terbium Labs VPs—Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management—as they offer insights into how your organization should rethink data security as more information is exposed, and re-exposed, every day.
  • How Lending Tree built an automated, connected service experience
    How Lending Tree built an automated, connected service experience
    Esther Chen, Product Marketing at MuleSoft Oct 17 2019 4:00 pm UTC 31 mins
    To automate business and service processes requires enabling faster integration between Service Cloud and the ecosystem of surrounding applications. See how LendingTree was able to digitally transform their service experience and provide agents with a single view of their customers. Learn how to use MuleSoft's API approach to integrate Salesforce faster and more efficiently.

    Key Takeaways:
    - Understand the power of MuleSoft + Service Cloud in building a personalized service experience
    - Learn how LendingTree was able to create a single view of their customer using API Designer and Flow Designer
  • Business Continuity Management and Resiliency for 2020 and Beyond
    Business Continuity Management and Resiliency for 2020 and Beyond
    Sam Abadir, Lockpath Oct 17 2019 4:00 pm UTC 60 mins
    Business interruptions can hurt an organization's reputation, decrease revenue and loose customer trust. Business continuity and resiliency plans detail the impact of various disaster scenarios and creates a solution for ensuring critical operations remain open during a crisis.

    In this live webinar, Lockpath’s Sam Abadir will share what business continuity and resiliency management for 2020 and beyond looks like, including:

    • What areas business continuity management and resiliency encompasses

    • How your organization can gain efficiency from proper business continuity and resiliency management

    • Advantages of managing business continuity and resiliency on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage business continuity and resiliency in 2020 and beyond by attending this educational webinar. Register now!
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Oct 17 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Modern Data Strategies – Moving Beyond RDBMS
    Modern Data Strategies – Moving Beyond RDBMS
    Mike Stone, Lead Architect & CIO, House of Brick Oct 16 2019 11:00 pm UTC 60 mins
    Relational databases have been the undisputed industry standard for data storage and management since the concept was introduced to the computing community, with the first commercially viable products appearing in the late 1970’s. Today, 50 years later, there continues to be a place for this technology and it is still a pillar of modern computing. However, in the ever-changing landscape of data platforms and technology, how does your organization determine the best options for storing, managing, and retrieving data going forward? Learn how concepts like Virtual, NoSQL, Columnar, and Streaming increase your options as well as offer the potential for improving your ability to truly manage data while maximizing its utility for your business.

    Topics covered:
    • Security
    • Governance
    • Management
    • Self-Service
    • Common Cloud Services
    - Google Spanner
    - Amazon DynamoDB