Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
As organizations scale, having a robust security posture is critical. To achieve this, organizations rely on intelligent security operations. Visibility plays a crucial part in this. This means having visibility across boundaries, not just across networks and IT, but also into operational data and IoT devices.
Join this presentation to learn:
•What's needed to enable visibility into millions of events per second
•How to provide context to the collected data
•Role of machine learning in real-time correlation and analytics
•How to prioritize security analyst tasks, optimize resources and save time
Discover the capabilities powering intelligent security operations that enable you to track alerts and investigate threats at the speed of the attacker.
To cope with business demand, servers must be built – which is a highly manual process that often lacks standardization. Join this webinar with CA Technologies’ internal IT team, as they discuss how CA Process Automation enables them to automation core infrastructure tasks, including server deployment, maintenance and retirement – and saved their team 20 hours a day of manual work.
You will learn:
How CA Technologies’ internal IT team saves time automating triage and remediation
How workflows can be easily adapted to detect issues quickly
How new servers are now deployed within a matter of minutes with standardized builds and security protocols
IT leaders are increasingly uncovering the value of soft skills within their workforce. They’re telling us that soft skills—specifically communication and collaboration skills—can be as important as some technical competencies. What is causing increasing demands for soft skills in IT talent? How do IT leaders assess the soft skills of new recruits? Can these skills be developed in existing employees?
During this webinar, you’ll hear experts from Experis and Right Management discuss the need for improved soft skills within today’s IT workforce and how IT leaders can ensure their workforce has the skills required to succeed in today’s world of work.
By participating in this webinar, you will:
Understand the increasing importance of communication and collaboration skills in IT roles today
Gain greater insight from workforce experts about how to assess new IT recruits for soft skill proficiency
Learn best-practice strategies for developing communication and collaboration skills within your team
* NOTE: This event qualifies for 1 CPE credit.
Experis is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org. Should this course need to be cancelled or rescheduled by Experis, a 24-hour notice will be provided. For more information regarding administrative policies such as complaint and refund, contact Learning & Development at 414-319-3400.
Small Businesses are increasingly being targeted by cyber criminals. With precious few resources, how can Small Businesses defend against Ransomware, Data Breach, Insider Threat plus more issues.
Join this webcast to learn how the NIST Cybersecurity Framework (CSF) can be an important resource to help Small Businesses defend against cyber-attacks. We’ll walk you through the recently released NIST Publication “Small Business Information Security: The Fundamentals” and it’s relation to the NIST CSF.
- A basic understanding of the Cybersecurity Framework.
-The purpose and scope of the recently released NIST Small Business Information Security Publication.
-A review of the alignment of Symantec solutions to the Cybersecurity Framework.
Join this webcast for a review of the latest NIST guidance and how to apply it to assess and manage Cybersecurity Risks to your business.
The continued growth in size and frequency of costly data breaches has increased the pressure on senior leadership and Boards of Directors to take a rigorous approach to understanding and managing cyber security risk. With this in mind, ERM teams are being asked to weigh in the organization’s response to these risks. Join this webinar to learn from CEB how your peers manage and report on cyber security risks and work with their Information Security counterparts to ensure that their organisations are prepared for the inevitable cyber-attack.
Hear how we’re delivering a new approach to business applications, through a single cloud service of purpose-built apps that will help you manage specific business functions.
Turn your customers in to fans by reinventing your Sales, Customer Service, Finance, Field Service, Operations, Marketing and Project Service Automation processes. This completely integrated platform includes Productivity and Reporting tools, Internet of Things, and is also extensible through its own easy to use graphical development and workflow tools, allowing IT professionals to implement, build and deploy a new level of functionality for a wide range of business processes, using world-class technology.
The 4th industrial revolution is upon us. Digital transformation is quickly becoming the most important factor of a company’s ability to compete in the fastest and most disruptive period in our history. It’s time to start asking the tough questions. How do I implement tools to enable our employees to achieve more together? How do I make sure we are optimizing mobile teams and networks without opening ourselves up to security, compliance and privacy risks? How do I get the information I need quickly to make decisions that will shape the future of my business? In this session you will learn how Microsoft is bridging the gap between people and technology with Office 365, Skype for Business, and Intelligent productivity tools, all with the built-in security, privacy and compliance you’ve come to expect.
With 2016 behind us, is this the last Yahoo breach we’ll hear about? Join Chris Roberts, Chief Security Architect at Acalvio Technologies as he discusses the lessons to be learned from the recently disclosed Yahoo breaches, and the nagging questions infosecurity professionals will try to answer in 2017.
Organizations moving at DevOps speed can easily integrate security testing into their Software Development Life Cycle (SDLC) workflow. Join this presentation to discover how built-in application security testing can become a seamless part of your coding process.
Viewers will learn:
- How integrations spanning all stages of development, deployment and production enable application security testing into the development tool chain
- How to empower your developers to test for security vulnerabilities earlier, build better code and secure your software
Your organization has little over a year to comply with the new PCI DSS v3.2 standard. If you have yet to assess your current security controls against these new standards, it’s time to start. We’ll highlight the key changes, the issues to think about, and the time required to assess, plan and implement. As a PCI Qualified Security Assessor, we know what can trip organizations up and how to avoid missteps.
Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.
Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
With over 1 billion user accounts stolen, the recently disclosed Yahoo breach is the biggest one to date. What does this mean for your organization? Join Chris Pierson, General Counsel and Chief Security Officer at Viewpost as he discusses the Yahoo breaches and the cybersecurity and privacy implications for organizations worldwide.
About the presenter:
Dr. Chris Pierson is the EVP, Chief Security Officer & General Counsel for Viewpost - a Fintech payments company. He is a globally recognized cybersecurity expert and entrepreneur who holds several cybersecurity and technology patents. Dr. Pierson serves on the Department of Homeland Security’s Data Privacy and Integrity Advisory Committee and Cybersecurity Subcommittee and is a Distinguished Fellow of the Ponemon Institute. Previously, Chris was the first Chief Privacy Officer, SVP for the Royal Bank of Scotland’s U.S. banking operations leading its privacy and data protection program. Chris was also a corporate attorney for Lewis and Roca where he established its Cybersecurity Practice representing companies on security and data breach matters.
2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
·The changing landscape of regulations and consumer behavior
·Technology transformations and new innovations that will influence the way you prepare for 2017
Organizations are frequently tempted to modify and adapt their Agile approaches as they become more experienced. As they then try and expand Agile use into other areas, or as they look for ways to integrate Agile and traditional project execution approaches they realize they are facing some unintended consequences. Join Andy Jordan, ProjectManagement.com as he discusses how best to look at options for enhancing or modifying Agile at your organization and how to ensure you aren’t causing future problems.
This session is approved for 1 Project Management Institute (PMI) PMP Credit.
Traditionally, test data management has involved copying, masking, and subsetting production data. While masking data does offer production-like data, it’s also slow, complex, and often error-prone, increasing the risk of sensitive information making it to less secure test environments.
View this event to discover how synthetic data generation can create realistic test data that contains no sensitive information. What’s more, this test data will contain the negative paths, future scenarios, and outliers not typically found in production, providing the data needed to maximize test coverage.
You will also learn:
-The drawbacks of using production data in testing, from compliance to provisioning time and quality
-How data visualization can be used to identify any data missing from production needed for rigorous testing
-How masking can be combined with synthetic data generation to plug any gaps in test data
When disaster strikes, your number one priority is fast recovery. But trying to determine the root cause of the problem can be a time consuming, manual process. Join this webinar with CA Technologies’ internal IT team, as they discuss how automation has helped them save time with disaster recovery through consistent, predicable processes – and enabled them to get up and running again seamlessly.
You will learn:
How to save money and time from outages – even when the worst happens
•How to shift your focus from manual problem solving to fast recovery through automation and repeatable processes
•How keeping an audit trail prevented the team from making the same mistakes in the future
The landscape of the traditional work environment has changed and continues to evolve at a rapid pace. And while organizations are reaping the productivity rewards of an increasingly mobile workforce, data loss becomes a growing concern. Businesses need to secure their data without slowing down their employees. Spend 45 minutes with WinMagic’s Senior Product Marketing Manager, Aaron McIntosh, and learn how to be secure when embracing workforce mobility and productivity.
1. How you can support a multi-OS or BYOD environment with an consistent security policy
2. How you can increase security awareness and adoption using an employee-centric mindset
3. Discover how to build your 2017 strategic roadmap for PCs, tablets and other managed endpoints
For corporations and financial institutions RegTech is the vehicle to decrease compliance costs, control risks, and minimize the potential for regulatory actions and fines, while gaining operational efficiencies from the automation of manual processes. For regulators, it is the bridge between reactive supervision of financial activities and proactive and preventive real-time monitoring of all market participants. And this is only the beginning; the potential of RegTech is far greater than we can appreciate presently.
With such an outlook, it is important we understand what RegTech is, and what its not. How to leverage RegTech solutions in order to reap the benefits of automated compliance, monitoring, and risk management; and most importantly how we can implement such solutions in our organizations.
As with any piece of new technology, the process of discovering, researching, choosing and implementing a RegTech solution is no task for the faint hearted. And, even though we do know the benefits far outweigh the costs, it wouldn’t hurt to have a guiding hand; a roadmap for your first RegTech implementation, and how to achieve successful onboarding.
Join us for a walk down RegTech Lane. At the end of the webinar you will:
- Have a clear concept of RegTech, its benefits and potential
- Know what to take into consideration when researching RegTech solutions for your organization
- Understand the hurdles to implement a RegTech solution
- Have a list of action items necessary to overcome these implementation obstacles
Agile is here to stay, waterfall’s not going away anytime soon, and more and more organizations are creating hybrid project execution models that combine both. What does that mean at the portfolio level? If you’re struggling to manage a portfolio of different project approaches, if you have executives looking for common reporting metrics, or if you have frustrated project teams, this webcast is for you. Join PPM expert Andy Jordan as he explains:
•Value based reporting that ignores the project execution approach
•The importance of flexibility in portfolio planning and delivery
•The need to create an environment that supports both Agile and waterfall
•Some simple steps you can take today to improve hybrid portfolios
The future of portfolio management will include both Agile and waterfall, unless you’ve mastered them both you need to attend this webinar.
This webinar will cover the results of the third annual SANS survey on incident response. It will explore the continuing evolution of incident response, how tactics and tools have changed in the last three years and how security professionals are dealing with increasing numbers and kinds of attacks.
•How integrated incident response tools are in the typical organization
•What impediments hamper effective incident response
•How budget allocations are projected to change over the next 12 months
•Improvements planned in the next 12 months
Complete the form to learn takeaways and recommendations for incident response from industry experts.
Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape.
In fact, during 2015 the FBI received 2,453 complaints related to ransomware malware attacks, which resulted in $24.1 million in losses for victims.
In this webinar, Randy Franklin Smith of Ultimate Windows Security will be joined by Nathaniel “Q” Quist to discuss how to leverage SIEM technology to catch and respond—even automatically within seconds—to ransomware to prevent it from spreading and reaching the critical mass.
The duo will also share some cool technical tips for creating signature-based rules for catching specific ransomware and explore how to use behavioral rules to detect late stage ransomware on a given endpoint.
Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.
In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
An exclusive interview with Kaspersky Lab founder and CEO Eugene Kaspersky. Find out about how Eugene made it and his thoughts about the future of cyber security. The first in the series of Insights with Cyber Leaders videos created by Cyber Management Alliance featuring our CEO Amar Singh.
Key network infrastructure devices are overlooked yet they provide critical functionality. Exploiting web application weaknesses and service buffer overflows is exciting, but the housekeeping of network infrastructure is not. Issues in network infrastructure devices can lead to network wide problems that would cause system admininstration nightmares. This presentation provides a review of key security devices, often side-lined when looking at security. It covers the value of these devices to "Blue Teams", issues "Red Teams" can highlight, desired outcomes and auditing practices.
Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.
Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:
-The status of the two-factor authentication market and what we can expect in the years to come
-The enterprise risk issues of using social media credentials to access to corporate resources
-The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
-The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
A critical element to the success of an identity management deployment is the user experience, but it’s often overlooked, or not given high enough priority. An identity management deployment without a seamless, convenient user experience could be the make or break point for success.
This webcast will highlight critical components of a convenient and secure user experience. Attendees will learn:
Current trends in identity management and governance
Essential characteristics of employee, partner, and customer identity management
Key attributes of a successful identity management user experience with examples
Recommendations for a successful identity management deployment
National security agencies face significant challenges today. From new and unknown threats, to operating tempo and budget challenges, having the right technology in place is key to ensuring security in an increasingly evolving threatscape.
What if technology could help you:
Gain a common operating picture through shared awareness and visualization of unfolding events
Harness and validate new and existing sources of data to unlock key patterns and insights
Align and modernize systems for improved anytime, anywhere command and operations communication
Improve operational readiness and impact through the use of devices and apps tailored to specific roles and missions
In this webcast, we begin with the end in mind: the need for the optimization of data insights through analytics, the alignment of platforms and devices for enhanced security and readiness, and the enablement of command and operations within an agile, data-driven national security ecosystem.
Join this discussion to:
- Discuss current trends that are presenting significant challenges to protecting US citizens from terrorism and crime
- See how advancements in technology are empowering national security and federal law enforcement agencies to meet these challenges
- Learn how agencies are implementing a digital transformation strategy to enhance how they better protect citizens
The tables have been stacked against storage buyers for decades, but a change is coming. Forget the endless refresh treadmill of monolithic storage systems, and licensing models that are not just inflexible, but also force you to pay again and again for the same technology. Join this webinar to learn how to liberate your storage budget, and pay for storage the way that suits your business rather than the vendors, with 451 Research senior analyst Tim Stammers, and NetApp SolidFire’s Vice President & General Manager, Dave Wright.
We are now three plus years into widespread adoption across industries of public SaaS apps like Office 365. Despite this momentum, security and compliance remain top challenges. This webinar, featuring Matt Hollcraft, CISO for Maxim Integrated, Dave Ruedger, Chief Security Architect for Maxim Integrated, and Rich Campagna, SVP of Products for Bitglass, will help you build a 2017 action plan to embrace public cloud without sacrificing security and compliance.
While offering practical, actionable advice for major apps like Office 365, Matt, Dave and Rich will address your top concerns, such as unmanaged device access, external sharing, and mitigating controls. They also will provide real world examples of how other organizations have securely navigated the public cloud.
Most modern malware operates as part of a system. Whether it’s a multi-part kill chain with droppers and payloads, a botnet with command and control servers, or ransomware encrypting files, the malware on the compromised system talks to other systems over the internet.
If you have been compromised, and didn’t catch malware on the way in, you can often find it by monitoring outbound network connections.
In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Rob McGovern, Sr. Technical Product Manager at LogRhythm, discuss the top 8 things to analyze in outbound connections from your network to the Internet.
The duo also shows you how Network Monitor tools can help you improve your network analysis and forensics capabilities.
Join this webcast to learn how monitoring your network can help you detect and investigate potential malicious behavior within your IT environment.
Two themes emerge from 451 Research's recent study of the organizational dynamics of enterprise information security teams: that security teams are understaffed and potentially incorrectly positioned in organizations. Join us to review the the study's results based on more than 930 online surveys and 20 live interviews with enterprise security leaders.
High speed and autonomous transportation, remote surgical procedures, and mixed reality experiences are just a few of the upcoming Internet of Things (IoT) technological game changers that require high speed and low latency communications infrastructure. 5G Radio Access Network (RAN) technologies continue to evolve to meet the complex and continually evolving network requirements of IoT applications.
This webcast will explore the latest advances in RAN, including:
• Which technologies will see the earliest deployments?
• How important will the 3.5 GHz band networks (also known as the Citizen’s Broadband Radio Service (CBRS)) be in future 5G applications?
• Will mmWave networks change the game in the last mile?
• How far will the industry advance in real deployments in the next year or two?
• Where are companies participating in this ecosystem investing their money?
• Are there concerns for Return on Investment (ROI) that companies are trying to resolve?
Brian Daly, Director - Core & Government/Regulatory Standards, AT&T Access Architecture & Devices
Adam Drobot, Chairman, OpenTechWorks, Inc.
Steven Glapa, VP of Marketing, Tarana Wireless
Robert Azzi, Executive Managing Partner. Argyle Griffin Group (Moderator)
Increase security effectiveness and maintain dev agility
Three certainties in 2017: organizations worldwide will continue to increase their use of open source software; new open source security vulnerabilities will be discovered; exploits of open source vulnerabilities will occur.
With dev teams under constant pressure to accelerate application delivery and with security resources often scarce, organizations need more effective ways to determine which open source vulnerabilities to fix first and the options available to reduce risk during remediation.
Join Black Duck VP of Security Strategy Mike Pittenger as he discusses strategies and emerging best practices for risk-ranking open source vulnerabilities. He will cover:
- the most important considerations in prioritizing open source security issues
- ways to determine the risk associated with a discovered open source vulnerability
- options for dealing with open source security vulnerabilities beyond simply replacing the component
Open-minded, collaborative, and engaged, Millennials embrace values that can be effectively directed to reduce risk across an organization. While some may view the Millennial spirit as a security liability, with the right support, their views and priorities can actually help cultivate a stronger security mindset within their teams.
In this talk, MJ Kelly explores how to develop security programs that resonate with Millennials. She presents practical approaches that incorporate deeply held priorities of the new generation, while ensuring that experienced team members remain included and engaged. Strategies include determining appropriate incentives, varying motivational focus, and testing new tactics such as gamification and novel information distribution channels to foster a strong security culture throughout the entire organization.
CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization.
Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn:
· What top 3 cyber security trends will have the largest impact in 2017
· Why cyber attacks are on the rise and multiplying quickly
· How to combat the increasing number of breaches
· What to consider in building a security plan that is right for your organization
The challenge with detecting malware is that it easily gets past traditional security solutions, placing your DNS infrastructure in harm’s way before you even notice it’s there. Hear how DNS operates and malware utilizes the DNS protocol to communicate with outside threats and exfiltrate data from an enterprise.
This webinar is ideal for IT and security managers who have limited experience with DNS or malware but are interested in how threats use this often overlooked protocol.
Viewers will learn:
•Practical strategies to protect your enterprise from bad DNS traffic
•Best practices for securing your DNS infrastructure
Ransomware has become extremely popular with cyber criminals because it’s easy and very profitable. Organizations can defend themselves and lower the risk of ransomware or other common threats costing them time and money.
Key Learning Objectives:
- A look at the current state of ransomware
- Simple and inexpensive steps that can advance state and local government security posture
- Better understanding of the cyber security landscape
- Best practices to take in cyber defense
Join us for a review on simple ways, state and local government can protect themselves against ransomware attacks.
You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
What does “high availability” mean in practical terms? Join our free webinar detailing what it takes to make your Git deployment highly available, including some of the trade-offs to expect. If you’ve got questions, this webinar is your chance to get answer from our Senior Product Manager and resident expert Doug Robinson.
Proxy deployments today have outlived their usefulness and practicality with limited security functionality against today’s advanced threats. Today's security must consider new applications, access options and capabilities within our networks. This webinar provides insights on a next generation security approach to today's networks that considers the changing nature of our networks without compromising the protection of our data and the integrity of our networks.
Despite the fact that third party breaches have been on the rise, organizations may not be doing enough to manage the cybersecurity of all of their critical vendors. Law firms, in particular, are one of the most widely used third parties, yet the Legal sector may be getting overlooked in vendor security discussions.
In fact, the latest BitSight Insights Industry Index report revealed that although companies in the Legal sector have high security ratings and low rates of vulnerabilities, the industry remains a key target for cyber criminals. Therefore, it’s crucial for organizations in this space to understand their cybersecurity posture and improve their vendor risk management techniques.
Join Jake Olcott, VP at BitSight, and Jay Jacobs, Sr. Data Scientist at BitSight as they discuss data security in the Legal sector and beyond. In this webinar, you’ll learn:
- How the cybersecurity posture of the Legal sector has changed over time
- How the Legal sector stacks up against six other industries
- The importance of cybersecurity in the Legal sector
Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in ServiceNow, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations.
Join Bob Gilbert, chief evangelist of Netskope, for a session on the top five CASB use cases that have the highest impact on cloud-consuming enterprises.
Attendees will learn:
•Industry-specific data that’s foundational to any cloud security business case;
•The five highest-impact CASB use cases from our customers, demonstrated from the perspective of users and security professionals; and
•How those use cases translate to “must have” requirements for any CASB evaluation.