Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Testing at the Edges Testing at the Edges Franklin Webber, Training and Technical Content Lead Live 60 mins
    As you become a more sophisticated Chef, the complexity of the recipes you write increases. You find yourself querying data from the Chef server or requesting the state of an operating system component. You’re using complex logic that is abstracted behind helper methods. However, these advanced recipes require equally advanced tests.

    In this webinar, Franklin Webber, Training and Technical Content Lead at Chef, will show you some approaches to testing complex recipes. He’ll explain mocking and stubbing and then apply those techniques to verify recipes that use search, resource guards, and helper methods.

    Join us to learn:
    - How to test recipes that are powered by search and data bags
    - How to test resource guards
    - How to test helper methods

    Who should attend:
    Chef users with experience using ChefSpec, InSpec, and Test Kitchen
  • How to Recognize and Fend Off Web-based Threats How to Recognize and Fend Off Web-based Threats Joshua Daggs Live 30 mins
    Security 101: covering drive-by downloads, malvertising, watering hole attacks, plug-in vulnerabilities and much more from security experts as they guide you through the many face of cyberthreats with practical tips and tricks to protect your organization's key valuables: your data.
  • FINRA And SEC Exam Priorities For 2017 FINRA And SEC Exam Priorities For 2017 Martin Tuip, Sr Product Manager | Joanna Belbey, Compliance Subject Matter Expert | Dan Nadir, VP, Product Management Live 60 mins
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2017.

    Joanna Belbey, Compliance Subject Matter Expert, Proofpoint, Dan Nadir, VP, Product Management, Proofpoint and Martin Tuip, Senior Product Marketing Manager will discuss some of the risks spotlighted for 2017:

    • Recordkeeping
    • Supervision and controls to protect investors
    • Suitability, particularly for seniors
    • Social media and electronic communications retention and supervision
    • Cybersecurity controls

    Learn how Proofpoint can help you and your firm meet these and other regulatory challenges in the year ahead. Live Q & A will follow.
    Time not convenient? Sign up anyway and we’ll send you the link to the recorded webinar plus valuable materials.
  • Microsoft CISO: Cybersecurity in Action Microsoft CISO: Cybersecurity in Action Bret Arsenault, Chief Information Security Officer, Microsoft Recorded: Mar 1 2017 26 mins
    Cybersecurity continues to be a top priority; leaders must constantly judge how to balance business enablement and cyber protection priorities as they support the digital transformation of their organizations.

    Join Microsoft's CISO, Bret Arsenault, as he discusses examples of this balancing act in action and where Microsoft can help to improve your security posture.
  • Visibilität und Verwaltung von IoT-Geräten! Visibilität und Verwaltung von IoT-Geräten! Bob Tarzey, Quocirca, Dir & Analyst Quocirca, & Stephen von Guendel Krone, Named Account Manager, ForeScout Recorded: Mar 1 2017 48 mins
    Das Internet der Dinge (IoT) optimiert Unternehmensprozesse und ermöglicht neue Arten der Kommunikation. Zudem ergeben sich für Organisationen neue Wege zur Kundeninteraktion. Im Jahr 2017 werden IoT-Devices die Anzahl der klassischen Endgeräte weltweit zum ersten Mal übertreffen. Im Jahr 2020 schätzt man das insgesamt 30 Milliarden Endgeräte online sein werden – dies entspricht einer Verdreifachung, hauptsächlich verursacht durch IoT. Dieser unglaubliche Anstieg vergrößert die Angriffsfläche von Netzwerken, daher müssen bestehende Sicherheitsmechanismen angepasst werden.

    Besuchen Sie das Webinar Visibilität und Verwaltung von IoT-Geräten und sehen Sie Auswirkung von IoT auf deutsche Unternehmen. Mit Hilfe neuester Untersuchungen zeigen wir Ihnen, welche Sicherheitsbedenken entstehen und wie mit Sie ForeScout IoT Best-Practices umsetzen können.
  • [VIDEO] The Rise of the Underground Darknet Criminal Economy [VIDEO] The Rise of the Underground Darknet Criminal Economy Josh Downs, Community Manager, BrightTALK & Rob Wainwright, Director, Europol Recorded: Mar 1 2017 11 mins
    BrightTALK will be broadcasting its in-depth interview with Europol Director Rob Wainwright and Josh Downs, Information Security Community Manager at BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Most 2FA Solutions are Insecure, Is Yours One of them? Most 2FA Solutions are Insecure, Is Yours One of them? Amar Singh & Chris Payne Recorded: Mar 1 2017 60 mins
    Everyone knows two-factor authentication right? or do you just know how to use it? Something you know and something you own is a phrase we can all recite but very few actually understand two-factor authentication and its true benefits. How it works, why two solutions are not alike or what to look for in a true secure solution are just some of the conversation topics covered in this webinar.
  • The Nuix Black Report: Find Out What Hackers are Really Thinking The Nuix Black Report: Find Out What Hackers are Really Thinking Christopher Pogue, Chief Information Security Officer, Nuix Recorded: Mar 1 2017 60 mins
    The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.

    Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:

    • Which countermeasures will actually improve your security posture (they’re not the ones you think)?
    • What is the best spend for your security dollar and why?
    • If hackers could speak to your CEO or board of directors, what would they say?

    Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
  • Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Swimming in the Sea of Compliance: Become NCUA Compliant with Gemalto Alex Hanway, Encryption Marketing at Gemalto Recorded: Feb 28 2017 42 mins
    The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
    Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
    Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
    •Which specific guidelines concern customer information at rest and in transit
    •How encryption and key management addresses these requirements
    •The benefits of a centralized encryption management
  • Key Steps to Implement & Maintain PCI DSS Compliance in 2017 Key Steps to Implement & Maintain PCI DSS Compliance in 2017 Dr. Branden Williams; Smrithi Konanur, HPE Security; Kevin Eberman, Mineraltree; Asma Zubair, WhiteHat Security Recorded: Feb 28 2017 60 mins
    In today’s digital landscape, it’s much easier for criminals to access sensitive payment card data, not only gaining direct access to a consumer’s available funds, but also their personal identity. With cyber attacks becoming much more advanced, the PCI DSS standard has been forced to adapt to address these new threats.

    However, PCI compliance is something that any organization can successfully achieve. The requirements of PCI DSS are clear, but it takes work to accomplish compliance across an organization. On this webinar our panel will discuss some best practices, and solutions that provides your business with an easy, cost effective and highly automated way to achieve compliance with PCI DSS in 2017.
  • Threat Intelligence Gateway: An Unconventional Weapon for An Unconventional War Threat Intelligence Gateway: An Unconventional Weapon for An Unconventional War Kinshuk Pahare, Director of Pruduct Development, LookingGlass Recorded: Feb 28 2017 37 mins
    The cyber threat landscape is constantly evolving and conventional security products (Firewalls, IPS/IDS and web proxies) are unable to address emerging threats in a fast and efficient manner. LookingGlass’ newest threat mitigation appliance, the ScoutShield Threat Intelligence Gateway, provides a zero-touch solution to automate the threat response.

    Join our Director of Product Management, Kinshuk Pahare as he discusses the:
    1. Challenges with conventional security appliances and the need for a Threat Intelligence Gateway.
    2. Importance of having high quality threat intelligence.
    3. Must-have characteristics of a Threat Intelligence Gateway appliance.
  • A View of the World's Largest & Fastest Growing Data Center Spot A View of the World's Largest & Fastest Growing Data Center Spot Kelly Morgan 451 Research and Mark Kidd Iron Mountain Recorded: Feb 28 2017 1 min
    A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there

    The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.

    Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
  • Best Practices for Effective eDiscovery Searching Best Practices for Effective eDiscovery Searching Doug Austin and Karen DeSouza, Esq. Recorded: Feb 28 2017 63 mins
    With all of the hype about Technology Assisted Review, does keyword search still have a place in eDiscovery? You bet it does – if it is conducted properly. This CLE-approved* webcast session will cover goals for effective searching, what to consider prior to collecting ESI that will be subject to search, mechanisms for culling prior to searching, mechanisms for improving search recall and precision, challenges to effective searching and recommended best practices for searching and validating your search results to ensure effective search results.

    Webcast Highlights

    + Search Fundamentals
    + Considerations Before Searching
    + Mechanisms for Culling Before and After Searching
    + Mechanisms for Improving Recall and Precision
    + Searching Considerations and Challenges
    + Using Sampling for Defensible Searching

    Presenters Include:

    
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog.

    
Karen DeSouza: Karen is the Director of Review Services, In-House Counsel, and a Professional Services Consultant for CloudNine. Also, Karen helps attorneys with CloudNine's software and Pre-Litigation Consulting Services. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence. Before CloudNine, Karen worked as an E-Discovery Director, Project Manager, and as an Associate at various law firms in Houston area where her primary focus was litigation.

    * Approved in Selected States (To Be Published Prior To Webcast Delivery)
  • Clarifying the Cloud: Licensing Oracle in the Skytap Cloud Clarifying the Cloud: Licensing Oracle in the Skytap Cloud Nathan Biggs; House of Brick Technologies, CEO & Jeff Schroeder; Skytap, Cloud Solutions Architect Recorded: Feb 28 2017 46 mins
    There is a lot of confusion around Oracle licensing, especially in virtualized or Cloud environments. In this session, we will provide an overview of the Skytap Cloud, and what Skytap has done to facilitate Oracle license-compliance in their cloud. We will provide education on the principles of Oracle licensing, and information on how those principles are applied to workloads running in the Skytap Cloud.
  • Microsoft CEO: How Digital Transformation is Changing the Landscape in the US Microsoft CEO: How Digital Transformation is Changing the Landscape in the US Satya Nadella, CEO, Microsoft; Curt Kolcun, VP, US Public Sector Recorded: Feb 28 2017 14 mins
    Microsoft’s CEO, Satya Nadella sits down with Curt Kolcun, VP US public Sector about digital transformation and the changing landscape in the United States.
  • Hunting & Disrupting Cyber-Criminals Hunting & Disrupting Cyber-Criminals Jeremy Linden, Sr. Product Manager Cisco Umbrella, Dhia Mahjoub, Principal Engineer Cisco Umbrella Recorded: Feb 28 2017 62 mins
    Warning. It’s Hunting Season.

    Hackers don’t wear blaze orange. Sophisticated adversaries are targeting you, your employees and your data. Let’s face it, yesterday’s traditional security defenses leave you exposed and render your corporate network open terrain. Take the target and put it on the attacker’s back.

    Join a panel of security experts: Jeremy Linden, Sr. Product Manager Cisco Umbrella, Dhia Mahjoub, Principal Engineer Cisco Umbrella, Craig Williams, Sr. Technical Leader, Cisco Talos, and Robert Simmons, Director of Research, ThreatConnect, for an inside look at how to identify attackers, stalk their internet infrastructures and disrupt cyber-criminals before they disrupt you. Hunt or be hunted.
  • How to Achieve Cyber Resiliency in an Evolving Threatscape - Roundtable How to Achieve Cyber Resiliency in an Evolving Threatscape - Roundtable Dante Disparte, John Bone, Ed Liebig, Sidney Pearl Recorded: Feb 28 2017 32 mins
    Join fellow security executives for a roundtable discussion over the necessity and importance of staying secure in a dynamically evolving and competitive landscape.

    The cyber resiliency assessments are based on the U.S. Department of Defense’s mission-critical procedures and Unisys’ commercial best business practices. They provide an unbiased 3rd party expert assessment of the client’s Incident Response Capabilities, deliver a Security Enhancement Playbook, and identify the gaps in their cyber defense network that leads to improved cyber resiliency.

    These assessments provide leadership with:
    - A deeper insight into the effectiveness of decision making
    - Understanding of the vulnerabilities in their cyber defenses
    - How to enhance adaptability to the unanticipated and the capacity to emerge from a crisis faster with less damage to profitability, brand and customer loyalty.

    We will also discuss how crisis-preparedness exercises help your team experience real-world threat scenarios in order to assess the team’s ability to address, contain, respond and mitigate security threats.

    Facilitator:
    Dante Disparte, CEO of Risk Cooperative

    Panelists:
    John Bone, Global Director of Cyber Resilience, Unisys
    Ed Liebig, VP of Global Security, Professional Services, Unisys
    Sidney Pearl, Global MSS Executive Architect, Unisys
  • [VIDEO] The Influence of Machine Learning and AI on Cyber Security [VIDEO] The Influence of Machine Learning and AI on Cyber Security Josh Downs, Community Manager, BrightTALK & Troels Oerting, CISO, Barclays Recorded: Feb 28 2017 9 mins
    BrightTALK will be broadcasting its in-depth interview with Troels Oerting, CISO of Barclays and Josh Downs, Community Manager of the BrightTALK Information Security Community.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Redefining Endpoint Threat Hunting with Behavioral Analysis Redefining Endpoint Threat Hunting with Behavioral Analysis Mike Vien, Malware and Forensic Expert Mar 1 2017 7:00 pm UTC 60 mins
    Join Mike Vien, Malware and Forensic Expert, for an interactive demonstration of determining the infection of know and non-know malware thru endpoint scanning using CounterTack’s powerful DDNA core that relies on behavioral intelligence, not signatures or patterns.

    Unknown threats don’t execute with any indicators and are not previously seen in an organization’s network, data center or within the user base. These are commonly referred to as zero-day threats. And most endpoint detection engines will not identify the right behaviors associated with unknown threats because they rely on signatures.

    ThreatScan PRO lets IT and security teams of any size and skill level apply the most powerful memory-based, endpoint scanning technology to determine the infection state based on malware infiltration. CounterTack delivers visibility into endpoint state for teams with a 100% cloud-delivered technology, and the expertise of a CounterTack expert to analyze critical scans. Leverages behavioral intelligence to identify malware artifacts and other indicators of potential compromise, calculating a module-level threat score, to give users the data they need, or the capability to remove it and eradicate it automatically.

    Attendees of this session will receive a limited-time only incentive to buy ThreatScan PRO.
  • The Identity Economy: Evolving from Analog to Digital The Identity Economy: Evolving from Analog to Digital Jose Caldera, IDM- Travis Jarae, One World Identity- Blake Hall, ID.me- David Delouya, AlphaPoint- Srikant Movva, HSBC Mar 1 2017 7:00 pm UTC 75 mins
    Digital identities are the lifeblood of the modern digital economy

    As human activity migrates online, challenges for authenticating physical identities arise, while businesses and consumers look around for guidance.

    Increasing demand for answers to the identity verification dilemma was just one of the contributing factors for the emancipation of the identity space as an industry of its own, vertical-agnostic.

    With such an outlook, it is important to understand what a Digital Identity is, and their current role in our society. Furthermore, how to leverage the identities to build better business models, deliver better products and services; and most importantly, how to take the leap and hop on the Identity Evolution train - after all, you don’t want to get left behind.

    We know implementing new technologies, and changing your current operations and processes can be a challenge. And even though the benefits far outweigh the costs, it always helps to have a guiding hand. Today, that guiding hand comes as a framework to understand how digital identities play a beneficial role in each industry and YOUR business, so you can start the journey from analog to digital identities within your organization.

    At the end of the webinar you will:

    - Be able to differentiate physical from digital identities, and the attributes that shape them.
    - Appreciate the function digital identities play today, and their potential to help overcome present [and future] social and economic challenges.
    - Understand the role of Blockchain in the Digital Identity Ecosystem.
    - Recognize the business models that are placing identity at the center: Identity-as-a-Service, or Identity APIs - and how they can reshape the world as we know it.
    - Know WHY and HOW to make the leap over to digital identities within your business.
  • Advanced Endpoint Protection (AEP) - Market Analysis and Survey Results CY2016 Advanced Endpoint Protection (AEP) - Market Analysis and Survey Results CY2016 Paula Musich, Will Fisher Mar 1 2017 7:00 pm UTC 60 mins
    There is a lot of confusion in the crowded market of Advanced Endpoint Protection (AEP). This webinar will provide an overview of the NSS Labs AEP market assessment, including origins, drivers, inhibitors and major players. Included is results of a survey of buyer’s requirements, priorities and expectations.
  • How to Prevent Ransomware Infections How to Prevent Ransomware Infections Brook Chelmo Mar 1 2017 7:00 pm UTC 60 mins
    With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.

    SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.

    Learn how to:
    •Stay safe from ransomware and other advanced attacks
    •Practice good security hygiene
    •Use trusted automated tools to protect your network and endpoints
  • How to Enable Zero Trust Security for Your Data Center How to Enable Zero Trust Security for Your Data Center John Kindervag, Vice President and Principal Analyst at Forrester Mar 2 2017 2:00 pm UTC 60 mins
    The rising tide of successful cyberattacks against organizations has made it clear that traditional approaches for defining trust levels, stopping lateral movement and enforcing advanced security controls within a data center are no longer effective. The Zero Trust approach advocated by Forrester provides guiding principles for achieving a robust and secure data center security architectures. However, choice of the security platform, design considerations and effective use of advanced security capabilities play a crucial role in implementing a successful Zero Trust enabled data center.

    In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester will talk about the steps to achieving a Zero Trust data center.

    Topics covered in this webinar will include:

    - 5 Steps to achieving Zero Trust enabled data centers.
    - Extending Zero Trust design principles across hybrid cloud deployments
    - Security policy considerations and guidelines for implementing Zero Trust enabled data centers.
  • [Video Interview] Threat Management and the Keys to Avoiding a Major Data Breach [Video Interview] Threat Management and the Keys to Avoiding a Major Data Breach Ross Brewer, VP & MD, LogRhythm & Josh Downs, Community Manager, BrightTALK Mar 2 2017 3:00 pm UTC 30 mins
    Research shows that 76% of companies suffered a data breach in 2016, so it’s now almost inevitable that hackers will gain access to your company and your sensitive data.

    Security professionals are now looking to deal with breaches faster, to keep their company off the front page and with heavy GDPR fines on the horizon, they’re wise to do so.

    Organisations are fearful of damaging data breaches but unsure of the best course of action to protect themselves from major cyber incidents. Whilst a large per cent of businesses focus on building up perimeter defences, not enough are concentrating on monitoring their own network to detect threats and mitigate them before significant damage is done.

    Tune into this in-depth one-on-one interview to discover:

    •More about the current threat landscape and the dangers to your organisation.

    •How you can reduce the time to detect and respond to threats without adding staff to accomplish the job.

    •More about how cutting edge technology can be used such as:
    oAdvanced machine analytics, which are key to discovering potential threats quickly.
    oSecurity automation and orchestration capabilities, which increase the efficiency of the threat lifecycle management process.

    •The influence that GDPR will have and steps you need to take.
  • [VIDEO] Cyber Opportunities for the New US Political Administration in 2017 [VIDEO] Cyber Opportunities for the New US Political Administration in 2017 Josh Downs, Community Manager, BrightTALK & Simon Crosby, Co-Founder & CTO, Bromium Mar 2 2017 4:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with Bromium's Co-Founder and CTO Simon Crosby in conversation with Josh Downs, Community Manager, BrightTALK.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.
  • Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Continuous Delivery = Agile + DevOps: Learn more with Guest Forrester Forrester VP and Principal Analyst, Diego Lo Giudice and Dan Rice, Agile Advisor, CA Technologies Mar 2 2017 4:00 pm UTC 60 mins
    The Global Agile Software Application Development Online Survey from Forrester Research, Inc. shows that a third of firms have been practicing agile for more than five years, and 54% have successfully scaled their Agile practices to more than half their teams.*

    People who practice agile methods often talk about "pulling quality forward." This and other agile tenets (delivering early and often, reducing batch size, inspecting and adapting, creating a collaborative culture and focusing on customer value) are designed to help organizations get valuable, high-quality features out the door, fast. But they can't happen just in engineering: agile succeeds as a mindset that's systemic throughout your organization.

    Join CA Technologies and guest speaker Diego Lo Giudice, Forrester VP and Principal Analyst in Application Development + Delivery to find out how YOU can help make your business an agile business by implementing agile both upstream (through your business portfolio) AND downstream (through testing and operations).

    If you're ready for a strategic, collaborative approach to delivering value to customers, then you won’t want to miss this webinar.


    *Forrester Research, Inc. “The 2015 State Of Agile Development: Learn From Agile Expert Firms,” August 2015
  • The NYS Cyber Security Regulation Is Mandatory: Now What? The NYS Cyber Security Regulation Is Mandatory: Now What? Craig A. Newman, Partner at Patterson Belknap Webb & Tyler LLP, Steven Grossman, VP of Strategy and Enablement, Bay Dynamics Mar 2 2017 5:00 pm UTC 60 mins
    The New York State Cyber Security Regulation for financial organizations becomes mandatory March 1st. Since our last webinar, the requirements have been updated. The revised regulation, which NYS banks, insurance companies, and other financial services institutions regulated by the Department of Financial Services must follow, includes changes surrounding risk assessments, encryption, cyber security policies, cyber governance and more. Join us for this second webinar specifically addressing the revised components of the regulation and what financial organizations inside and outside of NYS should be doing now that the regulation is taking effect.
  • How Not to Get Fired as a CISO How Not to Get Fired as a CISO Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy Mar 2 2017 6:00 pm UTC 60 mins
    Seasoned CISOs know that failure to plan past a two-year window is dangerous— to both their company and their job security. But it is all too common for many security strategies to only look two years out.

    That’s why Imperva’s own CISO is going to devote this next Cybersecurity Webinar to exploring the phenomenon of the Two-Year Trap, its impact, and how to avoid it.

    Join this webinar featuring Shahar Ben-Hador, Chief Information Security Officer (CISO) and Paul Steen, Vice President, Global Product Strategy for a lively interactive session that will discuss:

    *What is the Two-Year Trap and how to avoid it
    *How to manage the long-term vs. short-term security view
    *What do about trendy security attacks

    Join us to learn how CISOs can extend their life expectancy with a long-term view.
  • Access control for Subversion and Git Access control for Subversion and Git Doug Robinson Mar 2 2017 6:00 pm UTC 60 mins
    Enterprise development teams are frequently working with multiple types of SCM repositories, such as Git and Subversion. Git does a solid job handling source code; Subversion does a solid job handling binary artifacts and is likely where many older projects' full histories reside. Managing both Subversion and Git repositories together is quite a challenge. Join us to learn how to make it easy.
  • Unlock Public Cloud Benefits While Maintaining Security Unlock Public Cloud Benefits While Maintaining Security Sudha lyer, Principal Product Marketing, Symantec and Dan Frey, Senior Manager Product Marketing, Symantec Mar 2 2017 6:00 pm UTC 60 mins
    The public cloud offers agility and cost savings for organizations seeking that competitive edge, but will your critical workloads and applications remain secure?

    The "shared responsibility" model of security means that businesses are still on the hook for securing everything running on the IaaS providers infrastructure.

    Learn how the new Symantec Cloud Workload Protection automates security for your AWS and Azure deployments, how to defend your workloads against exploits and advanced threats so you can enjoy public cloud benefits without worrrying about security.

    Join our webcast to learn how easy it can be to:

    * Automatically discover, view, and control all of your for public cloud IaaS instances
    * Intregrate security directly into your DevOps continuous delivery workflows
    * Deploy security that scales seamlessly with your dynamic public cloud workloads
    * Mitigate risk associated with public cloud adoption

    Register Today
  • How to Invest Your 2017 Cyber Security Training Budget for Maximum ROI How to Invest Your 2017 Cyber Security Training Budget for Maximum ROI Matt Kuznia & Jim Mitchell Mar 2 2017 6:00 pm UTC 60 mins
    When it comes to securing an organization’s network, most stakeholders understand that cyber security education and training are not a luxury – they're a necessity. In this webinar we will discuss how best to spend those precious training dollars to get a solid return on investment.
  • Information Overload - Making Sense of Threat Intelligence Sources Information Overload - Making Sense of Threat Intelligence Sources John Carnes, Anthem; Mat Gangwer, CTO, Rook Security; Erik Von Geldern, FXCM; Brandon Dunlap (Moderator) Mar 2 2017 6:00 pm UTC 75 mins
    There's an overwhelming amount of information that comes from the connected world. Information sources are endless, but their credibility can be questionable. Cyber security teams can often relate with an overload of threat data from a variety of sources. Building an effective threat intelligence capability requires drilling down through all of information to find the data that is most relevant to you. So where do you start? To avoid information overload, an organization needs to be selective about the sources that they need to stay ahead of the threats and exploits that can compromise them. Join (ISC)2 and our sponsor Recorded Future for a From the Trenches webcast on March 2, 2017 at 1:00 PM ET for a discussion on threat intelligence sources, what's available out there, and how to separate the signal from the noise so you can spend less time on data collection and more time on analysis.
  • Operational Excellence: The Key to Safeguarding Your IT Infrastructure Operational Excellence: The Key to Safeguarding Your IT Infrastructure Dan Thompson Senior Research Analyst 451 Research and Kelly Sullivan, VP Global Data Center Operations at CenturyLink Mar 2 2017 7:00 pm UTC 60 mins
    Data center uptime is more critical than ever as more and more business processes are digitized. Having a sound foundation starts with having a solid and reliable data center in which to deploy your IT infrastructure. The data shows that how a data center is run and managed is the single biggest contributor to uptime.

    Join 451 Research Senior Analyst, Dan Thompson, and Kelly Sullivan, VP Global Data Center Operations at CenturyLink for a dialog on how operational excellence is put into practice and has become a core of the organizational culture at CenturyLink.

    Hear real-world experience and insight derived from managing a global fleet of 57 data centers and how the Uptime Institute Management and Operations Stamp of Approval program helped them raise their game through a regiment of continual improvement.
  • Microsoft Platform Security: Detecting Threats & Preventing Breaches Microsoft Platform Security: Detecting Threats & Preventing Breaches Paul Edlund, Technical Solutions Professional, Microsoft Mar 3 2017 4:00 pm UTC 30 mins
    We built security into Microsoft products and services from the start. That’s how we deliver a comprehensive, agile platform to better protect your endpoints, move faster to detect cybersecurity threats, and respond to security breaches across the smallest and largest of organizations.

    Join this session to learn more about:
    - Preventing identity compromise
    - Securing apps and data
    - Expanding device controls
    - Safeguarding your cloud infrastructure
  • Cloud-Enabled: The Future of Endpoint Security Cloud-Enabled: The Future of Endpoint Security Jackie Castelli CrowdStrike, Sr. Product Manager Mar 3 2017 4:00 pm UTC 60 mins
    As the cost and complexity of deploying and maintaining on-premises security continues to rise, many endpoint security providers have embraced the cloud as the ideal way to deliver their solutions. Yet, incorporating cloud services into legacy architectures limits their ability to fully engage the tremendous power the cloud offers.

    CrowdStrike Falcon recognized the value of cloud-delivery from the beginning, developing architecture built from the ground up to take full advantage of the cloud. CrowdStrike’s cloud-powered endpoint security not only ensures rapid deployment and infinite scalability, it increases your security posture by enabling real-time advanced threat protection across even the largest, distributed enterprises.

    In this CrowdCast, Jackie Castelli, Sr. Product Manager will discuss:

    • The advantages of endpoint protection purpose-built for the cloud – why it allows you to take full advantage of the cloud’s power

    • The common concerns organizations face when evaluating cloud-based endpoint security - can privacy and control be assured?

    • Real-world examples demonstrating the unique advantages offered by CrowdStrike Falcon’s innovative cloud-powered platform


    About the Speaker:

    Jackie Castelli
    CrowdStrike, Sr. Product Manager

    Jackie Castelli, CISSP, has over 20 years of experience in the cybersecurity industry. She has gained practical security experience in her roles as a security architect and data center manager. As a senior product marketing manager for CrowdStrike, she is responsible for educating the market about Falcon Host, CrowdStrike’s next-generation endpoint protection. Prior to CrowdStrike, Jackie worked in technical roles in pre-sales, IT and support. Jackie frequently speaks on cyber security topics at executive briefings and industry events.
  • [VIDEO] The Crucial Steps to Prepare for GDPR in 2018 [VIDEO] The Crucial Steps to Prepare for GDPR in 2018 Josh Downs, Community Manager, BrightTALK & John Elliott, Payments & Privacy Expert Mar 7 2017 2:00 pm UTC 45 mins
    BrightTALK will be broadcasting its in-depth interview with easyJet Head of Payment Security John Elliott in conversation with BrightTALK Information Security Community Manager.

    Topics up for discussion will include:

    - The new political climate and it's effect on Cyber Security and global cyber warfare

    - The supposed Russian hack on the 2016 US election

    - GDPR and what companies need to be doing to prepare for 2018

    - Equal opportunities in the information security industry

    - The rise of AI & Machine learning and how it'll influence the cyber world

    - IoT and how to keep connected devices all safe and secure

    - Incident response and steps to take if you've been breached!

    - The 2017 threatscape and what you shoud be concentrating on

    All this and much more - join us for the broadcast.