Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • [state of the internet]/security Credential Stuffing: Attacks and Economies
    [state of the internet]/security Credential Stuffing: Attacks and Economies
    Patrick Sullivan, Senior Director, Security Technology & Strategy Akamai and Shane Keats, Director of Global Industry Mktg. Recorded: Aug 22 2019 32 mins
    Webinar: Credential stuffing targets media

    January 2019 saw the public release of a massive collection of private credentials — more than 25 billion email address and password combinations. Though much of the user information was from older data breaches, the audacious data dump reflects the reality that the theft, abuse, and sale of username/password combinations is a thriving criminal business.

    Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And they’re willing to do whatever it takes to steal them.

    During this webinar, we’ll share the recent research that digs into this trend, which has significant impacts for gaming, video, and entertainment companies.

    You’ll learn:

    - Why cheap tools and free tutorials lower the bar of entry for would-be criminals
    - How malicious actors turn data breaches into substantial profits on darknet markets
    - What businesses can do to detect and prevent credential stuffing attacks
  • 5 Ways to Make Your SOAR Initiatives Take Flight
    5 Ways to Make Your SOAR Initiatives Take Flight
    Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions Recorded: Aug 22 2019 44 mins
    This is a must-attend webinar for anyone responsible for management of SOAR solutions in their organization. During the webinar you'll hear from Josh Williams, FireMon Senior Sales Engineer, Cloud and Automation Solutions, as he shares his presentation from Black Hat USA 2019 on how to add command to your SOAR initiatives.

    Security Operations Centers wield a vast arsenal of tools to secure their assets. To get the most out of those tools, SOAR solutions start you down the right path. But if you want your SOAR solutions to truly take off, you need the ability to gather data in real time, analyze the data for patterns, trends and alerts, and respond instantly using automation. In this webinar, we'll dive deeper into automation and share five ways to make your SOAR initiatives take flight.
  • Accelerate Incident Response Through Automation
    Accelerate Incident Response Through Automation
    Joseph Loomis, CSO, CyberSponse and Steve Sunday, Principal Technical Engineer, AccessData Recorded: Aug 22 2019 29 mins
    When a data breach occurs, every second counts. With the new RESTful API from AccessData, organizations can now automate incident response, saving up to 40 minutes of analysis time per incident. When an attack is detected by an organization’s cybersecurity software, like CyberSponse, the #1 security, orchestration, automation and incident response solution, the API alerts the AD Enterprise agent and initiates a collection job within moments of the attack, immediately preserving data related to the root cause of the breach.

    Join us on Thursday, August 22nd at 2:00 pm ET for a 60-minute webinar co-presented by AccessData and CyberSponse. In this webinar, you’ll understand how automation can facilitate faster, more secure incident response and you'll see firsthand how the integration between these two platforms using the new AccessData API triggers automated forensics, dramatically accelerating incident response. Collected evidence is then immediately available for analysis in AD Enterprise. Join us to see a live demo of the integration!
  • Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Scaling DevOps Episode 3: Scaling Environment Complexity and Orchestration
    Roni Dover, Director of Sales Innovation & Alex Azrah, Senior Engineer Recorded: Aug 22 2019 17 mins
    DevOps cloud environments are becoming more complex and heterogeneous in the technologies and infrastructure types they include. As environments are shifting left to provide early integration with production architectures, they can include a combination of VMs, Kubernetes instances, serverless functions, and PaaS services and also the orchestration to set everything up, import data and artifacts and glue everything together. In this episode, we will discuss the challenges of automation complex environments end-to-end and as always bring up some principles that can help us manage that complexity.
  • How to Design an Adaptable, Flexible and Compliant Social Selling Program
    How to Design an Adaptable, Flexible and Compliant Social Selling Program
    Roman Tobe, Product Marketing Manager Proofpoint & Jeremy Goldstein, Sr. Solutions Consultant Hootsuite Recorded: Aug 22 2019 47 mins
    Social media presents a big opportunity to develop relationships with clients and prospects. But the myriad regulations around it can be hard to interpret. It’s easy for advisers to wind up non-compliant or feel stifled and avoid the channel altogether.

    If you’re like your peers, you may wonder how to create a great experience for clients and advisers while staying compliant. Adding to the challenge, regulations are evolving as regulators and firms continue to observe the nuances of social. So the question is how do you design a social selling program that’s compliant, flexible and adaptable?

    Join Hootsuite and Proofpoint as our experts share:

    - How top firms balance compliance with their adviser experience
    - What experts believe is in store for social selling and compliance in the future
    - How Hootsuite and Proofpoint provide a solution that enables advisers and protects firms
  • Why Browser Isolation is the New 'Sandbox'
    Why Browser Isolation is the New 'Sandbox'
    Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security Recorded: Aug 22 2019 51 mins
    Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become an important line item in IT budgets around the world.

    But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Learn:

    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution

    Featuring SC Media and Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security
  • Microsoft Azure 2 Virtual Machines
    Microsoft Azure 2 Virtual Machines
    Donald E Hester & Robert DeRoeck Recorded: Aug 22 2019 89 mins
    Our next session in our continuing series of webcast on Microsoft Azure. In this session we cover virtual machines and virtual machine management. Session will include demos.
    Virtual Machine Planning, Creating Virtual Machines, Virtual Machine Availability, Virtual Machine Extensions
  • Ultralight Data Movement for IoT with SDC Edge
    Ultralight Data Movement for IoT with SDC Edge
    Guglielmo Iozzia - Big Data Lead - Optum | Pat Patterson - Technical Director - StreamSets Recorded: Aug 22 2019 34 mins
    Edge computing and the Internet of Things bring great promise, but often just getting data from the edge requires moving mountains.

    During this webinar, we will discuss:

    -How to make edge data ingestion and analytics easier using StreamSets Data Collector edge, an ultralight, platform independent and small-footprint Open Source solution for streaming data from resource-constrained sensors and personal devices (like medical equipment or smartphones) to Apache Kafka, Amazon Kinesis and many others.

    -We'll provide an overview of the SDC Edge main features, supported protocols and available processors for data transformation, insights on how it solves some challenges of traditional approaches to data ingestion, pipeline design basics, a walk-through some practical applications (Android devices and Raspberry Pi) and its integration with other technologies such as StreamSets Data Collector, Apache Kafka, and more.
  • Breach Detection and Response:Establishing Incident Response Processes and Plans
    Breach Detection and Response:Establishing Incident Response Processes and Plans
    Josh Rickard, Security Research Engineer, Rebekah Wilke, SOAR Advocate, at Swimlane Recorded: Aug 22 2019 46 mins
    Many organizations lack adequate personnel, processes, procedures and technologies to detect breaches in real time. They have an even harder time responding promptly and accurately.

    In this webcast, Swimlane Research Engineer Josh Rickard and SOAR Advocate Rebekah Wilke will discuss the importance of establishing sufficient incident response processes and clear guidelines surrounding incident response plans.

    The two security orchestration, automation and response (SOAR) experts will outline how formulating, implementing and maintaining an up-to-date, robust breach detection and incident response plan will:

    - Reduce mean time to detection (MTTD) and mean time to resolution (MTTR).
    - Ease analyst burnout, enabling retention.
    - Allow analysts the opportunity to focus on anomalous behavior that could have a larger impact on the business.
    - Expedite disaster recovery for reduced security risk.
  • Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Conversational AI: Go beyond chatbots with intelligent customer and employee exp
    Kevin Fredrick, Managing Partner, OneReach.ai and Vishnu Samevedula, Senior Solution Engineer, ISV Partnerships Recorded: Aug 22 2019 44 mins
    In this webinar we’ll attempt to go around the chatbot hype. With conversational AI, your customers and employees get the answers they need fast. It’s more than simple “if-then” logic; it incorporates natural language to make human-to-machine conversations more like human-to-human ones. The result? Increased customer engagement, continued trust and reliability in your business, and the ability to free up your best thinkers and doers to become more productive than ever before.

    Watch this live webinar to learn how to:
    - Automatically parse data, intent, and tasks from customer interactions using the power of Anypoint Platform combined with no-code/low-code conversational AI solutions from OneReach.ai
    - Build task-specific, channel-agnostic experiences by integrating data from systems and channels like Slack, SMS, Voice, WhatsApp, and Facebook Messenger.
    - Retool your team for operational efficiency by automating the known, handing off the unknown, and more.
  • Security Symposium - Afternoon Sessions
    Security Symposium - Afternoon Sessions
    Red Hat Recorded: Aug 22 2019 179 mins
    The afternoon session is back with presentations and demos on using automation to enforce security guidelines, security capabilities in the latest release of Red Hat Enterprise Linux, and understanding security & mitigating risk.
  • How to Detect Targeted Ransomware with MITRE ATT&CK™
    How to Detect Targeted Ransomware with MITRE ATT&CK™
    Dick O'Brien, Principal Editor, Symantec & Adam Pennington, Principal Cyber Security Engineer, MITRE Recorded: Aug 22 2019 57 mins
    Cyber criminals are turning to targeted ransomware at an accelerated pace, motivated no doubt by the success of recent attacks. Join experts from Symantec and MITRE as we explore the latest research and best practices for detecting targeted ransomware in your environment.

    We will cover:

    • The latest trends in attacks

    • An in depth look at GoGalocker

    • How to use the ATT&CK™ knowledge base to describe these threats

    • Mitigations and defenses for dealing with Gogalocker

    Please Join Us, Register Today
  • How to Choose the Best Cyber Security Bachelor’s Degree for $100K+ Jobs – Part 2
    How to Choose the Best Cyber Security Bachelor’s Degree for $100K+ Jobs – Part 2
    Dr. V. N. Berlin, CEO, Mission Critical Institute, Rob Chubbuck, Information Assurance Systems Engineer, CACI International Recorded: Aug 22 2019 62 mins
    Learn how the right cyber security bachelor’s degree can help you move into $100K+ cyber positions. Join our webinar series and hear from a top cyber security employer exactly what you should look for in a cyber bachelor’s degree.

    In this webinar series, we will give you an exclusive free tool to help you select the best cyber bachelor’s degree for you.

    You will learn how to assess:

    • The cyber faculty
    • The cyber curriculum
    • The cyber placement support
    • The success of graduates and current students
    • The hands-on experience
    • The cyber tools they teach

    You will also learn how you can get hired for a cyber security job even before finishing your cyber bachelor’s degree.

    Rob Chubbuck, senior cyber security expert at CACI International, will tell you how he decides to hire candidates even before they finish their degrees, taking you inside the employer recruiting process.

    Register now and download the attached Cyber Certification Voucher Request to qualify for up to $5000 in cyber certification tuition and exam rebate vouchers!

    If you can’t make this date, register anyway and we will send you the recording.

    ADDED WEBINAR BENEFITS: Register for the webinar and download the attachments to become a cyber certified professional. Download the Career Readiness Assessment and schedule an interview with an MCI Cybersecurity Education Specialist to fast-track your cyber security career today.
  • How to Evaluate, Really Evaluate, Identity Verification Solutions
    How to Evaluate, Really Evaluate, Identity Verification Solutions
    Jumio Recorded: Aug 22 2019 34 mins
    The realm of identity verification has long been a dark art. You feed in ID documents and selfies (or other biometric data) and your identity verification solution provider provides you a yes, no, and in some cases, a "maybe." But, how did they arrive at that decision.

    This is why testing different solutions is so critical as part of the decision-making process. In this 30-minute webinar, we will discuss how to perform a simple side-by-side test (aka a competitive bake-off) and how to perform a simple Total Cost of Ownership comparing the TCO from different identity verification solutions.

    If you're currently evaluating different IDV solutions, this is a must-watch session.
  • How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    How to Prepare for the Inevitable Security Incident with Digital Forensics Essen
    Danielle Russell, Group Product Marketing Manager & Aaron Genereaux, Sales Engineer Recorded: Aug 22 2019 58 mins
    As soon as you detect a security incident or breach in your environment, things move fast. You need to be able to quickly ascertain what happened and how as well as which assets were involved, so that you can decide how to respond, mitigate impact, and report the incident to the business and any affected parties. In this critical time between detection and remediation, your digital forensics and incident response (DFIR) readiness is key to success.

    What does it take to be forensics-ready? Join AT&T Cybersecurity for a special session webcast on DFIR readiness.

    We’ll address the following questions:

    - What does DFIR readiness include? What frameworks exist?
    - What security tools and technologies are essential for DFIR?
    - How does an effective DFIR program utilize security orchestration and automation reduce time to response (TTR)?
    - How can AT&T Cybersecurity solutions help you accelerate and simplify your DFIR?

    Meet Your Hosts:
    Danielle Russell, Group Product Marketing Manager
    Aaron Genereaux, Sales Engineer
  • How to Leverage NIST CSF
    How to Leverage NIST CSF
    Sam Abadir, Lockpath Recorded: Aug 22 2019 45 mins
    Many organizations have difficulty leveraging information in their cybersecurity and business operations to make the right risk decisions, establish the right risk priorities and appropriately allocate budget to best achieve their risk management goals.

    Many believe that NIST CSF is another standalone methodology instead of a tool designed to help your organization understand and build a roadmap to achieve the right level of cybersecurity. Successful NIST CSF programs help integrate, message and prioritize cybersecurity efforts not only within IT but across the entire business.

    In this live webinar, Lockpath’s Sam Abadir will share what implementing a NIST CSF solution entails, including:

    • Framework support
    • Budget expectations vs. reality
    • Correctly assessing an organization’s needs to implement NIST CSF
    • Proper management and management skills
    • Prioritizing cybersecurity within an organization

    Find out what you need to know to implement a NIST CSF solution by attending this educational webinar. Register now!
  • Malicious Traffic: Understanding What Does and Doesn’t Belong on Your Unique Net
    Malicious Traffic: Understanding What Does and Doesn’t Belong on Your Unique Net
    Rick Fernandez (LogRhythm) and Randy Franklin Smith (UWS) Recorded: Aug 22 2019 91 mins
    Too often, when looking for malicious network traffic, you either search for known bad network traffic or investigate anomalous traffic that doesn’t look normal. That reactive approach is time consuming, and potentially over-reliant on searching for larger concerns. Fortunately, new solutions use advanced network analytics to proactively identify, enrich and alert on malicious traffic.

    Why is this important?

    Detecting known bad network traffic is great when it works, but it’s a lot like signature-based AV (which is rigid and unable to detect unknown threats). Often it is only really effective for widespread, generalized attacks – not so great for unique targeted attacks. Further, there’s an indefinite amount of time before the malicious traffic signature, domain name or IP makes it into the pattern updates and threat intel feeds from your vendors.

    Detecting anomalous traffic can address the aforementioned weaknesses, but in practice it depends heavily on how – and how well – you define anomalous traffic, and how quickly (accurately) you can spot it.

    Security practitioners are getting better by the day at looking for anomalies. Here’s just a few we’ll focus on in our webinar:
    - Unrecognized port protocol numbers
    - Malformed/non-compliant traffic compared to protocol expected on known port
    - Protocols you don’t want or at least don’t expect to see in the given context
    - Disproportionate inbound/outbound bandwidth usage for a given endpoint
    - Suspicious Destination/Source IP combinations

    In this webinar, Randy Franklin Smith (of Ultimate Windows Security) and Rick Fernandez (of LogRhythm) will explore how to analyze your network so that you can learn and understand its traffic patterns and get a handle for what’s normal. You’ll then be able to take this information and look for anomalous traffic, build known-bad detections and make your network detection and response (NDR) technologies and efforts smarter.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Recorded: Aug 22 2019 35 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • From Password Self-Service to a Password-less Future
    From Password Self-Service to a Password-less Future
    Eduardo Helering, Solutions Engineering Team Lead - EMEA Recorded: Aug 22 2019 46 mins
    If passwords are designed to improve security, why are they responsible for 81% of breaches?

    Passwords are reused too often, not rotated often enough, repeated across personal and corporate accounts, stolen in consumer breaches, and used in brute spray attacks against your company.

    Join Eduardo Helering, Solutions Engineering Team Lead - EMEA, for a 45 minute webinar where he'll discuss:
    - Transitioning from Secure Password Self Services to Password-less
    - How to deliver OneLogin Secure Password Self Services
    - Most common Use Cases
    - Benefits of Password Self Servicdataes
    - Benefits of Passwordless
    - Implementation Best Practices
  • Defense in Depth: Key Learnings for Achieving Detection and Response Everywhere
    Defense in Depth: Key Learnings for Achieving Detection and Response Everywhere
    Gene Stevens, Dave Gold Recorded: Aug 22 2019 53 mins
    Join Gene Stevens and Dave Gold, executive leaders from ProtectWise (acquired by Verizon in March 2019) who will discuss the essential components of a robust detection and response strategy. They will talk about the limitations and challenges with the security models that many organizations still have in place today, before opening up the conversation on how to modernize your cyber detection and response to support today's business environment and to transition to a state of advanced threat detection. Gene and Dave will cover the building blocks that make up a holistic and comprehensive detection and response infrastructure and how threat data from multiple sources can be brought together with analytics and machine learning to provide rationalized and actionable intelligence. They will deconstruct an attack and provide guidance on how to identify the exposure points in your systems. Walk away with a much clearer idea on how to improve and reinforce your defenses with proactive threat identification and root cause analysis.
  • Core Banking System Offloading with DataStax Enterprise
    Core Banking System Offloading with DataStax Enterprise
    Maciej Stępień, CEO at Braintri, & Nicolas Soum, DataStax Recorded: Aug 22 2019 39 mins
    Load from electronic banking puts strain on your core systems. In this webinar we discuss how to capture data changes in mainframe-based core banking system and replicate them to DataStax Enterprise (DSE) in real time using automatically generated C++ code. Electronic channels are redirected to DSE using existing legacy APIs. The presentation will discuss solution design, innovative approach to automatic code generation and lessons learned from the platform implementation.
  • Security Symposium - Morning Sessions
    Security Symposium - Morning Sessions
    Red Hat Recorded: Aug 22 2019 182 mins
    Join Red Hat senior principal security global technical evangelist and strategist, Lucy Kerner, talking about automating security and compliance for hybrid environments. Followed by Dan Walsh, senior consulting software engineer, sharing container security and container technologies like kubernetes, buildah, and podman. Followed by a short Q&A, join live to submit your questions on August 22.
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Delivering an Effective Cyber Security Exercise: Enhanced Breach Response
    Daniel Norman, Research Analyst, ISF Recorded: Aug 22 2019 44 mins
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • Cloud Native – Everything a Security Professional Needs to Know
    Cloud Native – Everything a Security Professional Needs to Know
    Colin Domoney DevSecOps Consultant & Adam Reyland, Regional Marketing Specialist at Veracode Recorded: Aug 22 2019 45 mins
    The Cloud Native Computing Foundation is home to literally hundreds of projects enabling developers to embrace every benefit of cloud native development from container deployment and orchestration to monitoring and messaging.

    This webinar gives an overview of the work of the Cloud Native Computing Foundation; highlights a few flagship projects such as Kubernetes and Istio; and explains how these projects are transforming the way developers work. Security practitioners will benefit from insights into how these new technologies and projects can be applied to ensure that cloud native applications are also natively secure by design.
  • Automation for a Continuously Aware Data Center
    Automation for a Continuously Aware Data Center
    Nlyte Recorded: Aug 22 2019 35 mins
    This webinar will show you how Nlyte’s Asset Explorer's discovery application continuously improves asset accuracy in your Nlyte DCIM implementation.

    See how you can:

    - Improve capacity planning and resource utilization
    - Improve and increase SLAs and Support responsiveness by reducing MTTR and RCA
    - Eliminate manual audit efforts improving efficiency and accuracy of workflows
    - Accelerate implementation or expansion of DCIM with auto-discovery and auto-updating of asset data

    We look forward to seeing you there!
  • 6 Degrees of Network Security
    6 Degrees of Network Security
    Negisa Taymourian, Product Marketing Manager, Cisco Umbrella Aug 27 2019 12:00 am UTC 36 mins
    Are common security pitfalls putting your network at risk? We get it. More and more users are working wherever they please — not always using the VPN. And you may not have visibility to all the apps in use across your organization. While firewalls are ok, they won’t protect users when they are off network. There’s a lot standing between you and a safe network. Your security shouldn’t be one of them. Join us for our webinar, "6 Degrees of Network Security," and learn how to avoid 6 common security pitfalls that put your users, their devices, and your data at risk.
  • Cyber Security Brief: Twitterbots, ransomware retirements, and email mishaps
    Cyber Security Brief: Twitterbots, ransomware retirements, and email mishaps
    Cyber Security Brief podcast Aug 27 2019 8:00 am UTC 19 mins
    On this week’s Cyber Security Brief podcast, we chat about our report looking into the Internet Research Agency's disinformation campaign targeting the 2016 US presidential election. We also talk about the apparent retirement of the operators behind GandCrab, and red faces in both the New Zealand government and the Dutch Data Protection Authority.
  • Airheads Tech Talks: SD-WAN-Health Check and Dynamic Path Selection
    Airheads Tech Talks: SD-WAN-Health Check and Dynamic Path Selection
    Rajesh P, Aruba TAC Aug 27 2019 9:00 am UTC 90 mins
    Health checks must be enabled to determine the path availability of each WAN uplink. When enabled, the gateway will send UDP or ICMP probes to an IP or FQDN of a host to determine if the path is available to accommodate traffic. The primary use case for health checks is to verify that each ISP’s network is operational and prevent branch traffic from being forwarded into a black hole.

    Aruba gateways can implement DPS policies to determine the WAN uplinks that are selected for specific users, applications, and destinations. The selected forwarding path could be a single WAN uplink or traffic could be load balanced between a group of WAN uplinks. The destination IP address of the traffic will determine if the traffic is steered towards a VPN tunnel or forwarded directly to the Internet. The DPS policy effectively selects an uplink and the gateway’s routing table or policy-based routing (PBR) rules will determine the next hop.

    Agenda:

    1. Introduction to Health Check and DPS
    2. Features and basic setup requirements
    3. Uplink health check configurations
    4. DPS Policies Configurations
    5. DPS policies verification
    6. DPS Traffic Verification
    7. Flow with routing plus DPS
  • Converging Governance for Privacy and Third Party Risk
    Converging Governance for Privacy and Third Party Risk
    Linnea Solem Aug 27 2019 3:00 pm UTC 60 mins
    Converging Governance for Privacy and Third Party Risk with Linnea Solem CEO and Founder of Solem Risk Partners LLC
  • How Syniti delivers on the journey to SAP S/4HANA Central Finance
    How Syniti delivers on the journey to SAP S/4HANA Central Finance
    Susan Nee, Sr. Value Engineer at Syniti Aug 27 2019 3:00 pm UTC 60 mins
    The demonstration will focus on Syniti's SAP Solution Extension – SAP Advanced Data Migration for SAP Central Finance. See how to complete and maintain your SAP Central Finance program, allowing you to centralize your financial data and post to the supporting financial source systems. Using Syniti’s proven solutions and agile methodology will result in a simple, auditable and reusable workflow to enhance collaboration between IT and business users to drive the success of your organization.
  • 10 Tips for Achieving Cultural Change in DevOps
    10 Tips for Achieving Cultural Change in DevOps
    Jeffrey Martin (Director of Product, WhiteSource) Aug 27 2019 3:00 pm UTC 60 mins
    DevOps success depends on three things: people, processes and tools. While tools and processes can be easy enough to address, the people part of the equation can be more difficult to tackle. Changing the culture of an organization can be akin to turning a cruise ship midstream. This webinar offers 10 tips to help employees let go of traditional ways of working and embrace DevOps.
  • OpenShift roadmap: what the next year means to you, to us, and the industry
    OpenShift roadmap: what the next year means to you, to us, and the industry
    Mike Barret, Rob Szumski, Marc Curry, Brian "Redbeard" Harrington and Tushar Katari - Red Hat Aug 27 2019 3:30 pm UTC 55 mins
    Come to this session to see what it OpenShift means to you. What are the technology enhancements in 2019 and into 2020 that will change the way we think about compute, development, and how we best use these technologies on-premise and in public clouds. In a first look, we'll demonstrate new features and explain where we're taking Red Hat OpenShift and why. Don't miss this session!

    Presenters:
    Mike Barret, Director of Product Management, Red Hat
    Rob Szumski, Product Manager, Red Hat
    Marc Curry, Senior Principal OpenShift Product Manager, Container Infrastructure, Red Hat
    Brian "Redbeard" Harrington, Principal Product Manager, Red Hat
    Tushar Katari, OpenShift Product Manager, Red Hat
  • CISSP Exam Prep Clinic # 2: How to pass your CISSP the 1st Time, Hands-On Labs
    CISSP Exam Prep Clinic # 2: How to pass your CISSP the 1st Time, Hands-On Labs
    Mission Critical Institute Aug 27 2019 4:00 pm UTC 29 mins
    In Clinic #2 you will learn how to integrate labs into your CISSP study plan.

    If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    These five Clinics include tips for all 8 CISSP domains covered in the exam.

    Register today and move closer to your goal!

    SPONSORED BY: Mission Critical Institute
  • Security Past the Perimeter: A Cyber Immune System For the Cloud
    Security Past the Perimeter: A Cyber Immune System For the Cloud
    Andrew Tsonchev, Darktrace Director of Technology Aug 27 2019 4:00 pm UTC 38 mins
    Join Darktrace's Director of Technology, Andrew Tsonchev to learn how Darktrace AI not only protects critical data in the cloud, but also across your entire infrastructure, from IoT and cloud, to email and on-premise.

    Darktrace’s Cyber AI Platform detects and responds to cloud-based threats that others miss, from malicious insiders and external attacks, through to critical misconfigurations that can expose the business to future compromise. In this webinar, witness first-hand:

    > How self-learning AI detects threats that others miss
    > A demo of Darktrace's Enterprise Immune System
    > 3 cloud-based threats detected and neutralized by Darktrace technology
  • Recipes for Success How to Build Continuous Ingest Pipelines
    Recipes for Success How to Build Continuous Ingest Pipelines
    Arvind Prabhakar - Co-Founder and CTO - StreamSets Aug 27 2019 5:00 pm UTC 62 mins
    Modern data infrastructures are fed by vast volumes of data, streamed from an ever-changing variety of sources. Standard practice has been to store the data as ingested and force data cleaning onto each consuming application. This approach saddles data scientists and analysts with substantial work, creates delays getting to insights and makes real-time or near-time analysis practically impossible.
  • Building a Culture of Security within Healthcare Organizations
    Building a Culture of Security within Healthcare Organizations
    Gretel Egan, Security Awareness Training Strategist, and Ryan Witt, Managing Director Healthcare Industry Practice Aug 27 2019 5:00 pm UTC 59 mins
    Are you taking a patient-centric approach to cybersecurity? As a patient yourself, you no doubt care about the quality of your care... but you also want your personal data and medical history to remain private. Patient care is about more than caring for the body and mind. It’s also about data security.

    In this webinar, we will discuss the importance of visibility and agility when it comes to identifying end-user vulnerabilities, and how healthcare organizations can efficiently implement security awareness training and build a culture that prioritizes data, device, and patient security.

    Join us to learn:

    - What we mean by a “patient-centric” cybersecurity mindset
    - How to overcome common training obstacles and deliver the most effective cybersecurity education program
    - How to understand the current state of healthcare cybersecurity and the challenges faced by the industry
  • On the Horizon: Preparing for the California Consumer Privacy Act (CCPA)
    On the Horizon: Preparing for the California Consumer Privacy Act (CCPA)
    Ken Durbin,CISSP Sr.Strategist,Global Gov't Affairs, Symantec & Kim Allman, Director Gov't Affairs, Symantec Aug 27 2019 5:00 pm UTC 60 mins
    On January 1, 2020, one of the strictest privacy laws in the US, the California Consumer Privacy Act (CCPA), will come into effect. Often compared to the EU’s General Data Protection Regulation (GDPR), processes required to comply with the CCPA can be overwhelming from understanding the regulation, managing requirements as well as consumer requests.

    What should governance, risk and compliance executives know in order to prepare for CCPA?

    Join our webcast to learn:

    - The basics of the CCPA…what are the requirements and why is it impactful.

    - Find out how to leverage GDPR preparedness for the CCPA.

    - Review how technology investments can help your organization achieve CCPA compliance.

    Please Join Us, Register Today
  • Why Join an ISAO? The Network Effects of Threat Intelligence Sharing
    Why Join an ISAO? The Network Effects of Threat Intelligence Sharing
    Troy Vennon, Director of Security Innovation, the Columbus Collaboratory Aug 27 2019 6:00 pm UTC 60 mins
    Join us for this webinar presenting the benefits of networking with your industry peers to share intelligence about threats and vulnerabilities. In today's environment where the threats seem to intensify, it's critical to know who to trust. During this session, Troy Vennon, Director of Security Innovation at the Columbus Collaboratory, will outline the benefits of an Information Sharing and Analysis Organization (ISAO), explain how you can benefit from joining an ISAO even if you're already part of an ISAC, and provide an example of how collaboration around cyber threat data can enable your organization to efficiently identify and neutralize the most prolific and potentially harmful threats out there.
  • DevSecOps: The Journey of Security in a DevOps Environment
    DevSecOps: The Journey of Security in a DevOps Environment
    Scott Van Kalken, Systems Engineer, F5 Networks Aug 28 2019 6:00 am UTC 60 mins
    IT automation and orchestration, the key enabler of digitization is the number one IT initiate globally according to our state of application services report 2019. In addition, Zero Trust and Security-By-Design are key imperatives of organizations pursuing digital transformation as these organizations accelerate adoption of cloud technologies to gain speed, scale and accessibility to innovative technologies like AI and blockchains.

    In this webinar, we will look at the changing landscape of DevOps and explore the practice of scaling application security, controlling vulnerabilities and controlling advanced threats with the web application firewall in CI/CD environments. We will also take a look at how the technologies enable close collaboration between security teams and development teams on securing APPs without requiring application teams having in-depth knowledge of security.

    Join F5 Networks and (ISC)² on Aug 28, 2019 (Wed) at 14:00 (GMT +8) to learn about web application firewall in a CI/CD workflow.

    Presenter: Scott Van Kalken, Systems Engineer, F5 Networks
    Moderator: Tony Vizza, CISSP, Director, Cybersecurity Advocacy for APAC, (ISC)²
  • Automating Regulatory Change & The Regulatory Rules Engine
    Automating Regulatory Change & The Regulatory Rules Engine
    Conor Coughlan, Joe Dunphy, Laura Glynn Aug 28 2019 9:00 am UTC 37 mins
    An insight into the industry's leading regulatory automation solutions and services, market research, insights and best practices. This special webinar aims to ensure compliance, regulatory, risk and operations professionals are armed with a key insights into how to solve the problem of regulatory change when it comes to KYC, AML & Client Lifecycle Management. This webinar will:

    Watch our recent webinar to learn more about:

    Market Trends & Regulatory Outlook
    The Fenergo approach to Regulatory Change
    The Fenergo regulatory rules engine
  • Improve process and increase customer satisfaction through Service Automation
    Improve process and increase customer satisfaction through Service Automation
    Richard de Boer, Pink Elephant Aug 28 2019 9:00 am UTC 45 mins
    On 28 August at 11 a.m. (CET) Pink Elephant trainer Richard de Boer will be talking about Service Automation, looking at customer services in particular and how this can increase user satisfaction and the quality of services.
    The webinar will include a discussion on the theoretical framework (Service Automation Framework) and the various steps you need to shape, roll out and make Service Automation a success.
    Learn how Cherwell, a leading provider of Enterprise Service Management, can make this Service Automation process possible. With Cherwell, workflows, facility management and HR processes can easily be created within IT, as can a self-service portal which end users can initiate and work through.
  • How Isolation Helps SOC Analysts Threat Hunt
    How Isolation Helps SOC Analysts Threat Hunt
    Patrick Darrow, Product Management Team - Menlo Security Aug 28 2019 9:30 am UTC 29 mins
    Security Operations Centers are a crucial aspect of ensuring data security. However, managing a Security Operations Center (SOC) can be burdensome for any IT team. The job continues to be complicated, and companies face a challenge to obtain talent that can help. Vendors are claiming to make the time to hunt more productive, typically by applying some level of intelligence to the alerts process. Does this work?

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become a significant line item in IT budgets around the world and now can help SOC teams replay attacks like never before, providing them with the insight and evidence of a breach.

    Listen to this webinar to:

    - Understand how things are done today with detection-based solutions
    - Where SOC analysts spend time during the process of Threat Hunting
    - How Isolation remove threats and can replay a real-world attack for forensic purposes

    To see how Isolation helps SOC analysts threat hunt, register now.
  • Improve SMB Productivity with Aruba Wi-Fi for UCC Applications
    Improve SMB Productivity with Aruba Wi-Fi for UCC Applications
    Kevin Crehan, Aruba - Lead Technologist, EMEA Aug 28 2019 10:00 am UTC 55 mins
    As workforces become increasingly mobile, the reliable delivery of Unified Communication and Collaboration (UCC) applications like Skype for Business is of utmost importance. Cloud-based business applications are cost efficient alternatives for small and medium business (SMB) – are your customers able to support this transition?

    Join this webinar to learn how Aruba’s Wi-Fi solutions enhance your customer’s network infrastructure, reduce costs, and improves productivity by providing reliable connectivity when using cloud-based business applications like Office 365, Skype for Business and other UCC applications.

    During this session we will cover:

    •Network trends and challenges impacting cloud-based business applications
    •Benefits of Skype for Business and other UCC applications paired with Aruba Wi-Fi solutions
    •Resources, promotions, and tools to leverage
    •Q & A
  • Strategies for Integrated Policies and Training - Employee Engagement
    Strategies for Integrated Policies and Training - Employee Engagement
    Michael Rasmussen Aug 28 2019 2:00 pm UTC 60 mins
    Policies are only effective if they are clearly understood. Effectively communicating policies, directing corporate culture & behaviour, and measuring comprehension requires a communication and training plan.

    Organizations need to provide an integrated approach to policy and training management that delivers both contextually and supports each other. The overall employee experience and engagement on policies and training is critical, particularly for the millennial workforce. Haphazard approaches will lead to employees ignoring the training and will be ineffective.

    This webinar details strategies and best practices to effectively engage employees on an integrated approach to policy and training management, including:

    • Critical relationship of policies and training
    • How to build a policy communication and training plan
    • Defining employee audiences based on risk to determine who needs more detailed training/awareness
    • Role of technology in delivering an integrated policy and training employee experience
  • Webinar: Accelerating the Digital Transformation: Why Security Policy Management
    Webinar: Accelerating the Digital Transformation: Why Security Policy Management
    Colby Dyess, Director Cloud Marketing, Tufin Aug 28 2019 3:00 pm UTC 60 mins
    Public cloud providers have built some of the secure environments in modern history, yet It seems every week another security breach makes headline news. Upon inspection it is revealed that most breaches are due to misconfigurations by end-users, not the providers. So why does this keep happening and what can be done to avoid being next week’s headline?

    This session describes why organizations struggle with cloud-native security, and how security policy automation address those challenges. Audience members will learn how Tufin cloud solutions help users gain visibility into their cloud security posture, establish Zero Trust security model and improved compliance across hybrid and multi-cloud environments.
  • How to Reduce Incident Volume with AI & Analytics
    How to Reduce Incident Volume with AI & Analytics
    Jim Henaghan, Solutions Architect, Numerify Aug 28 2019 3:00 pm UTC 39 mins
    Every IT organization would like to reduce the number of incidents they experience. The rewards for achieving this are substantial: fewer business disruptions, lower IT costs, and the ability to concentrate talent on growth and innovation. However, with your organization experiencing ever-increasing complexity, where do you start? It can be hard to know with service delivery fragmented across multiple systems, processes, geographies, and providers. These silos of teams and data lead to a lack of visibility, process inefficiencies, and knowledge gaps.

    What analytics-driven best practice can help you reduce incident volume and improve customer satisfaction? Come hear Numerify’s Jim Henaghan, Solutions Consultant, as he shares ways companies like yours have reduced their incident volumes.

    Topics that will be covered include:

    - Proactive analytics-driven incident reduction strategies that target the highest impact problem hot spots

    - How Machine Learning models can help predict incidents and reduce incident volume

    - Using analytics to bring together siloed teams and standardize on best practice processes

    - How text analytics techniques can help extract insights trapped in unstructured data
  • Make Security Your Competitive Advantage
    Make Security Your Competitive Advantage
    Asha May, Director, Customer Engagement, Veracode Aug 28 2019 4:00 pm UTC 60 mins
    Application security is more than breach avoidance - it can be your competitive differentiator. The sobering threat of data breaches has raised concern within organizations around the software running in their environments and touching their businesses. Software vendors who can prove that their applications will not leave their customers open to attack can claim a competitive advantage.

    Attend this upcoming webinar, and hear Veracode experts share insights into how enterprises are using security to drive business growth from within. Specifically you will learn how security can drive revenue growth through:

    •Increased speed to market
    •Proven competitive differentiation
    •Greater supply chain assurance
  • What the Symantec Acquisition Means for Your Email Security Future
    What the Symantec Acquisition Means for Your Email Security Future
    Ryan Kalember, EVP of Cybersecurity Strategy for Proofpoint Aug 28 2019 4:30 pm UTC 60 mins
    It’s official – the Symantec Enterprise Security business is being sold to Broadcom. You may be concerned about what this acquisition means for your Symantec email security solution. Legacy solutions are not able to keep up with today’s threat landscape and acquisitions create uncertainty. In this unpredictable time, it’s important that you have a solution for email security that is keeping up with the evolving threats.

    As a market leader in email security, Proofpoint can provide confidence in your email security future. Join us for an informational webinar to learn:

    - How the email threat landscape has changed with attackers evading legacy approaches
    - How leaders like Proofpoint have innovated to keep up
    - How we have helped customers migrate from legacy products to Proofpoint
  • A Closer Look at Isolation: Hype or Next Gen Security?
    A Closer Look at Isolation: Hype or Next Gen Security?
    Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute Aug 28 2019 5:00 pm UTC 55 mins
    This webinar looks at Isolation from different viewpoints. Learn from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to protect their users from the ever-present web and email dangers.

    In This Webinar Will Dive Into:

    - The shortcomings of today’s reactive security philosophy
    - Why the web continues to present a risk to businesses
    - The benefits of embracing Isolation
    - How organizations should rethink their security strategy moving forward