Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Privacy in the Time of COVID
    Privacy in the Time of COVID
    Chenxi Wang | Vishwanath Raman | Michelle Dennedy | Tom Pendergast Recorded: May 22 2020 58 mins
    In the fight against COVID-19, countries are taking urgent actions to address the crisis. Some are turning to tech to find solutions for containing the spread of the virus. Digital contact tracing, in particular, is gaining a lot of traction. For example, Apple and Google recently announced a rare collaboration to jointly facilitate contact tracing within their mobile platforms for public health monitoring applications.
    So, what does this mean for privacy? 
    While some efforts are being made to preserve user privacy, like not tracking user location or collecting other identifying information, digital contact tracing can still reveal more user information than necessary.

    Join this panel of security and privacy experts lead by Chenxi Wang to learn more about the different implications associated with digital contact tracing, how it is being used around the world, and the long-term effects of COVID-rushed decisions.

    Speakers:
    - Chenxi Wang, Founder & General Partner of Rain Capital
    - Vishwanath Raman, Lead, Privacy Technologies, Oasis Labs
    - Michelle Dennedy, CEO Drumwave
    - Tom Pendergast, Chief Learning Officer, MediaPRO
  • Being Prepared for the Unforeseen by Having a Strategic Mindset
    Being Prepared for the Unforeseen by Having a Strategic Mindset
    Donald E. Hester, Ron Puccinelli, & Robert DeRoeck Recorded: May 22 2020 66 mins
    CIO CISO Table Talk. The COVID-19 pandemic has demonstrated the importance of technology in dealing with emergency situations. Some organizations were prepared for the transition to work from home and others struggled with the transition. How do we plan for the unknown?
    Having a strategic mindset is an important trait for CIOs and CISOs. This is much more difficult in technology because of the rapid change rate and dynamic nature of technology. How do you make decisions now to set yourself and your organization up for success in the future? Think strategic, act tactical, always keep your current projects focused on the long-term objectives. Join Don, Ron, and Rob for this talk on having a strategic mindset.
    Speakers:
    Donald E Hester, Maze & Associates
    Ron Puccinelli, City of Fairfield
    Robert DeRoeck, Indiana University
  • Zum Tango gehören immer zwei - DevOps und Serviceerbringung
    Zum Tango gehören immer zwei - DevOps und Serviceerbringung
    Dave Snowden Chief Scientific Officer, Cognitive Edge & Jason Goldberg Senior Solution Architect, Device42 Recorded: May 22 2020 14 mins
    Sind wir Kollegen oder Gegner? Für eine vollendete Tanzdarbietung braucht man eine harmonische Partnerschaft. Jede Unstimmigkeit wird sofort sichtbar und stört den Ablauf. Dasselbe gilt für die Beziehung zwischen DevOps und Serviceerbringung. In diesem Gespräch geht es darum, welche Erwartungen beide Teams idealerweise im Hinblick auf den anderen haben sollten, um Fehler zu vermeiden. Wir betrachten auch, welche Auswirkungen gut eingespielte DevOps- und Serviceerbringungs-Abläufe haben können und wie Sie damit neue Höhen des Erfolges erreichen.
  • It's time to get cirrus about the cloud
    It's time to get cirrus about the cloud
    Graeme McMillan, Sr. Security Solutions Engineer & Justin Buchanan, Senior Manager of VM Offerings Recorded: May 22 2020 49 mins
    Find yourself gazing towards the cloud with roughly the same intrepidation as the Wright brothers did when they looked to the clouds? Although somewhat daunting,the public cloud has sparked an IT migration worth billions.

    Many organizations have turned to the agility of the cloud as a means of accelerating growth and streamlining operations. However, with the somewhat endless list of services and options now available, some companies could certainly find themselves straying from a well architected solution.

    Join Rapid7 as we explore the shift and share how to ensure you're formulating a secure cloud approach.
  • Becoming a Search Artist: Best Practices to Solve Common Search Problems
    Becoming a Search Artist: Best Practices to Solve Common Search Problems
    Neal Carter Recorded: May 22 2020 49 mins
    Are your searches not yielding the help that you hoped? Are you spending more time than any one person should, simply writing search criteria? Come spend an hour with us where we will explore ways to alleviate these challenges. You'll walk away with best practices, tips, and tricks to solve many common search problems.
  • Jederzeit und überall - Schaffen einer Omnichannel-Serviceerfahrung
    Jederzeit und überall - Schaffen einer Omnichannel-Serviceerfahrung
    Stuart Rance Owner, Optimal Service Management Ltd. & Philip Sheu CTO, Splashtop Recorded: May 22 2020 13 mins
    Ein durchschnittlicher US-Konsument ist gleichzeitig mit ungefähr sechs vernetzten Geräten verbunden. Die Geräteinteraktionen steigen zudem exponentiell an und entwickeln sich weiter, daher muss auch der Service immer präsent sein. Auch die Mitarbeiter sind hyper-vernetzt, so dass die Trennlinie zwischen der Arbeit und dem Privatleben verschwimmt. In diesem Gespräch schauen wir, wie ein menschenzentrierter Omnichannel-Ansatz die Serviceerfahrung verbessert.
  • Are You Ready for a Cloud-First Approach to Client Lifecycle Management?
    Are You Ready for a Cloud-First Approach to Client Lifecycle Management?
    Colin Sweeney, Greg Watson, James Craig, Aman Kohli Recorded: May 22 2020 46 mins
    Financial Institutions are under pressure to digitalize their operations in the face of multiple challenges. These include the emergence of new challenger banks and the worldwide COVID-19 pandemic, which has forced many financial institutions to accelerate their provision of remote services. However, migrating to the cloud is a long-term, strategic project.
  • Maximieren Sie das Potenzial Ihrer Technologie
    Maximieren Sie das Potenzial Ihrer Technologie
    Andrea Kis Manager, Deloitte & Tobias Nyberg Advisor & Coach, Galestro AB Recorded: May 22 2020 12 mins
    Ein großer Teil unseres Lebens ist inzwischen digital. Trotzdem müssen unsere Interaktionen über verschiedene Interaktionskanäle einfach, durchgängig und transparent bleiben. Zugleich müssen sie reich an Informationen und zugänglich sein. Dieser Aspekt bildet bereits einen beachtlichen Schwerpunkt, wenn es um den Umgang mit externen Stakeholdern geht. Wie sieht es aber mit den internen Stakeholdern aus? Schaffen wir auch für sie nahtlose Erfahrungen? In unserem Interview erfahren Sie, wie IT-Führer die Technologie nutzen, um konsumentenähnliche Erfahrungen schaffen, um die Erwartungen digital versierter Arbeitskräfte zu erfüllen.
  • [In:Confidence Digital] Maximising the Value of Sensitive Data in the Cloud
    [In:Confidence Digital] Maximising the Value of Sensitive Data in the Cloud
    Tom Kennedy, Director of Cloud & Technology Partnerships, Privitar Recorded: May 22 2020 27 mins
    Tom will outline how organisations can move more sensitive data into the cloud and leverage cloud technologies to maximise the value of their sensitive data.
    Tom’s presentation will cover the following key topics:

    – Privacy challenges with sensitive data in the cloud
    – Common patterns with using sensitive data in the cloud
    – How to implement a safe data pipeline for a cloud or hybrid environment
  • [In:Confidence Digital] How to Evaluate Your Data Protection Solution
    [In:Confidence Digital] How to Evaluate Your Data Protection Solution
    Mark Semenenko, Senior Privacy Engineer, Privitar Recorded: May 22 2020 23 mins
    Come and learn what to look for when constructing your Data Protection Solution tests; listen to a technical leader in the Data Privacy space talk about real world usage of Data Protection techniques and why you need them in your data platform. In this session the audience will:

    - Receive an in-depth look at the different methods for protecting data

    - Gain insight into what capabilities are the most critical for your sensitive data management platform
  • [In:Confidence Digital] How to Implement a Privacy Center of Excellence
    [In:Confidence Digital] How to Implement a Privacy Center of Excellence
    Pat Bates, Senior Privacy Engineer, Privitar Recorded: May 22 2020 28 mins
    Implementing privacy across your organization requires a lot more than just the right tools, it requires alignment across teams and people. Come learn how leaders are defining team structures to meet the ever-evolving challenges of protecting privacy. Attendees should expect to:

    - Develop an understanding of both internal and external pressures in managing privacy

    - Learn how to align their teams to overcome these challenges and increase the utilization of data inside the organization
  • [In:Confidence Digital] How to Evaluate Your Privacy Posture
    [In:Confidence Digital] How to Evaluate Your Privacy Posture
    Marc Moesse, VP of Product, Privitar Recorded: May 22 2020 42 mins
    Privacy is continuously evolving discipline, and assessing where you are on the maturity curve is critical to evaluate what comes next. In this session, we will discuss how the state of privacy is evolving across the globe, and inside or organizations today as we dive into how to practically implement a privacy solution. Highlights will include:

    Insights into how to apply privacy to data based on context and use cases
    An overview of how automation can be applied to accelerate time to data
  • [In:Confidence Digital] Learning to Use Sensitive Data Safely
    [In:Confidence Digital] Learning to Use Sensitive Data Safely
    Jason McFall, CTO, Privitar Recorded: May 22 2020 21 mins
    This session will introduce the agenda for the day ahead: highlighting the power of data when you get privacy right and the steps that you need to take to make it a reality within your organization.
  • Behind the Scenes of Managed Detection & Response Service
    Behind the Scenes of Managed Detection & Response Service
    Marcus Eaton, Lead Security Solutions Engineer, Jason Prescott, Manager Threat Detection, Douglas Wainer, Threat Analyst Recorded: May 22 2020 48 mins
    You might think of a security operations center like a stereotypical movie war room: a dark room filled with complex maps, fancy monitors, and analysts on headsets. However, most SOCs aren't really a physical presence or room; more accurately, they're a formally organised team that's dedicated to a specific set of security roles and responsibilities for detecting and validating threats within your environment.
    No matter a company's size or purpose, it’s valuable to have a dedicated organisational-level team whose job is to constantly monitor security operations and incidents and respond to any issues that may arise. The various responsibilities within a cybersecurity team can be extremely complex, and a SOC can not only serve as the tactical console to empower team members in performing their day-to-day tasks, but also as a strategic center to keep the team aware of bigger, longer-term security trends.

    In this webcast, our threat detection specialists will reveal;
    · How known and unknown threats are identified in our customer environments
    · The intelligence behind threat hunting
    · How our SOC uses threat intelligence to detect, investigate and respond to incidents
    · What a typical day in the life of a SOC Analyst looks like
  • Messen des Erfolges in der Mensch-IT-Ära
    Messen des Erfolges in der Mensch-IT-Ära
    Matthew Burrows President, SkillTx & Claire Agutter Director, ITSM Zone Recorded: May 22 2020 14 mins
    Wir alle möchten gerne wissen, wo wir stehen und ob wir in die richtige Richtung gehen. Man muss verstehen, warum und wie wir etwas brauchen, um die richtigen Entscheidungen zu treffen. Neben anderen Gedanken beleuchtet dieses Gespräch den Kontext von übertrieben optimistischem Denken im Gegensatz zu bekannten Tatsachen sowie das Finden einer Balance, um nicht zu einem Datenjunkie zu werden. Als Teil der Wertschöpfung tragen wir alle eine Verantwortung für Genauigkeit, Transparenz, Glaubwürdigkeit und Sicherheit der Informationen, die wir in das System eingeben und die dabei helfen, datengestützte Entscheidungen zu treffen.
  • Automation als Hebel zum Verstärken des Besten der menschlichen Fähigkeiten
    Automation als Hebel zum Verstärken des Besten der menschlichen Fähigkeiten
    Juha Berghall CEO & Co-Founder, ONEiO Cloud Corporation, & Iain Cameron User Services Manager, Digital and Information Servic Recorded: May 22 2020 11 mins
    In diesem Interview betrachten wir, welcher Designansatz das Beste der Automatisierung und das Beste der Menschen zusammenbringt und verstärkt. Wir betrachten die Integration von menschlichen und automatisierten Elementen, um die Serviceerfahrung reibungslos zu gestalten. Zugleich soll die KI-Schnittstelle in die Lage versetzt werden, zu lernen und sich im Hinblick auf Geschwindigkeit, Genauigkeit, Konsistenz und Beziehungsinteraktion zu verbessern.
  • Realitätscheck: Die KI und ihr steigender Wert
    Realitätscheck: Die KI und ihr steigender Wert
    Kai Altenfelder Managing Partner, pro accessio GmbH & Co. KG & Simone Jo Moore Mixologist & Human API, SJM Recorded: May 22 2020 14 mins
    In diesem Gespräch räumen wir mit einigen der Erwartungen an die künstliche Intelligenz (KI) auf. Es wird weiterhin fortlaufend darüber debattiert, in welchem Ausmaß KI die Rolle von Menschen in den IT-Diensten und Operationen beeinflussen kann. Verwechseln wir vielleicht maschinelles Lernen (ML), KI und ihre Reifung? IT-Führer diskutieren über KI, denn die Kunden erwarten Service und Erfahrungen ähnlich wie diejenigen, die Alexa von Amazon, Google Home usw. bieten. Dabei geht es um die Frage: Wie kann die IT Unternehmen dabei unterstützen, wirklichen Nutzen aus der KI zu ziehen?
  • What’s New in Tufin Orchestration Suite R20-1
    What’s New in Tufin Orchestration Suite R20-1
    Robin Ostler, Sales Engineer, Tufin Recorded: May 22 2020 28 mins
    Looking for the fastest, easiest way to block suspicious traffic? Search and modify specific service throughout the rule base? Or maybe implement rule changes using IPv6 addresses? All of these changes (and more!) can now be managed with the new capabilities in Tufin Orchestration Suite (TOS) R20-1.

    Join us for a short and super informative webinar, on May 22nd at 12pm BST to learn how you can use Tufin’s newest security automation features to:

    *Respond quickly to suspicious network activity by blocking a high-risk service (Remember WannaCry TCP 445…?)
    *Manage changes that include IPv6 (and IPv4) addresses for fast implementation
    *Control and automate changes in NGFW (Palo Alto Networks Panorama and Cisco Firepower) based on accurate traffic/usage analysis

    Save your seat. Register today!

    If you're unable to attend the live webinar, sign up here and we’ll send you the recording.
  • Über die Technologie hinaus - die Notwendigkeit der Talentverwaltung
    Über die Technologie hinaus - die Notwendigkeit der Talentverwaltung
    Matthew Burrows President, SkillTx & Suzanne van Hove CEO & Owner, SED-IT Recorded: May 22 2020 15 mins
    Die ständig wachsende Bedeutung der Digitaltechnik in Unternehmen schafft neue Funktionen und stellt neue Anforderungen an das Können. Unternehmen, denen es nicht gelingt, eine Belegschaft aufzubauen, die den ständigen Wandel aushält, geraten ins Hintertreffen. In diesem Gespräch gehen wir der Frage auf den Grund, wie man Fähigkeiten für die digitale Ära umformt und Verhaltensweisen ablegt, die nicht mehr zielführend sind.
  • Business Relationship Management - alte Liebe rostet nicht
    Business Relationship Management - alte Liebe rostet nicht
    Greg Sanker Senior IT Leader / Former CIO, State of Oregon & Tessa Troubridge Chief Executive Officer, Service Desk Institute Recorded: May 22 2020 12 mins
    In dieser Folge beleuchten wir die verschiedenen Art und Weisen in denen IT anderen Abteilungen dabei helfen kann, auf Höchstform zu arbeiten. Business Relationship Management (BRM) hat die Rolle der IT von taktischen Interaktionen zu einem strategischen Verhältnis mit dem Unternehmen gewandelt. Die Balance zwischen der Optimierung von Unternehmenszielen und der Verbesserung der Unternehmenskultur hilft dabei, Silos einzureißen und insgesamt einheitlicher als Unternehmen zu agieren.
  • As best practises para detetar e bloquear ficheiros maliciosos
    As best practises para detetar e bloquear ficheiros maliciosos
    Pedro Castro Recorded: May 22 2020 51 mins
    O número e complexidade dos ataques têm crescido exponencialmente. As organizações gastam milhões de euros todos os anos em soluções de cibersegurança, no entanto as empresas continuam a ter brechas de segurança.

    Neste webinar, os nossos experts vão falar sobre os métodos mais eficientes de detetar e bloquear ficheiros maliciosos, demonstrando as best practises para o fazer, assim como, exemplos de ataques que temos observado no mundo real e que devem ser precavidos. Irá aprender os detalhes por detrás destas ameaças, as suas estratégias para ultrapassar as soluções de segurança existentes e para se moverem lateralmente dentro das organizações. Por último, veremos como é possível simplificar a segurança das organizações com menos tools e menos alertas.

    Junte-se a esta sessão informativa focada na prevenção de ameaças
  • Erfahrungen als Service - zurück zum Kern
    Erfahrungen als Service - zurück zum Kern
    Deborah Burton,CEO at Instruqt & Paul Wilkinson Director, GamingWorks Recorded: May 22 2020 14 mins
    In dieser Folge untersuchen wir die bisherige Beziehung die zwischen dem Menschen und der Technologie bestand. Wir zeigen auf, wie Unternehmen ihren Schwerpunkt weg vom funktionellen ITSM hin zum Schaffen von Erfahrungen verlagern müssen - denn es sind Erfahrungen, die die Zukunft des ITs prägen werden.
  • Seminarium internetowe: Co nowego w pakiecie Tufin Orchestration Suite R20-1
    Seminarium internetowe: Co nowego w pakiecie Tufin Orchestration Suite R20-1
    Slawek Slowiński, Regional Sales Manager - Tufin Recorded: May 22 2020 31 mins
    Szukasz najszybszego i najłatwiejszego sposobu na zablokowanie podejrzanego ruchu? Wyszukaj i zmodyfikuj konkretną usługę w całej bazie reguł? A może wdrożyć zmiany reguł przy użyciu adresów IPv6? Wszystkimi tymi zmianami (i nie tylko!) Można teraz zarządzać dzięki nowym możliwościom pakietu Tufin Orchestration Suite (TOS) R20-1.

    Dołącz do nas na krótkie i bardzo merytoryczne webinarium, 22 maja o godzinie 10.00 (CEST), aby dowiedzieć się, jak korzystać z najnowszych funkcji automatyzacji bezpieczeństwa Tufin w celu:

    *Szybkiego reagowania na podejrzane działania sieci, blokując usługę wysokiego ryzyka (pamiętasz WannaCry TCP 445…?)
    *Zarządzania zmianami obejmującymi adresy IPv6 (i IPv4) w celu szybkiej implementacji
    *Kontrolowania i automatyzacji zmiany w NGFW (Palo Alto Networks Panorama i Cisco Firepower) w oparciu o dokładną analizę ruchu / użytkowania

    Potwierdź swoje miejsce. Zarejestruj się dziś!

    Jeśli nie możesz wziąć udziału w webinarium na żywo, zarejestruj się tutaj, a my prześlemy Ci nagranie.
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout May 26 2020 12:00 am UTC 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Security Awareness Training – Your best line of defence
    Security Awareness Training – Your best line of defence
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ May 26 2020 1:00 am UTC 39 mins
    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that regularly trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.
    So how can you better protect yourself, your organisation, and your end users?
    Join us as we walk you through how we’re taking Proofpoint’s expertise in the email security space and applying it to our Security Awareness Training solutions to lower your people-centric risk. With this webinar you’ll get a better understanding of:
    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)
  • Secure Your Digital Transformation Journey with Thales and Microsoft
    Secure Your Digital Transformation Journey with Thales and Microsoft
    Herns Hermida, Business Group Lead PH, Microsoft; Vina Yee, Data Protection Lead, CPL ASEAN, DIS, Thales May 26 2020 1:00 am UTC 90 mins
    For virtually every organization today, the adoption of multiple cloud services continues to expand — and so does the use of encryption. As the proliferation of encryption continues, so do the number of keys and the potential risks. Join us with your morning coffee and learn how you can start your digital transformation journey and securely migrate your applications and data through a combined portfolio of Thales and Microsoft.

    Key Highlights:
    - What is Microsoft Migration Program?
    - How Microsoft manages customer data?
    - What is Bring Your Own Key(BYOK) and Bring Your Own Encryption (BYOE)?
  • Exploring 5 Techniques from the MITRE ATT&CK Cloud Matrix Specific to O365
    Exploring 5 Techniques from the MITRE ATT&CK Cloud Matrix Specific to O365
    Randy Franklin Smith, Dan Kaiser, Brian Coulson, Sally Vincent May 26 2020 2:00 am UTC 58 mins
    MITRE isn’t resting on their laurels with ATT&CK; they keep making it better. ATT&CK now includes cloud-specific content, and I don’t mean just generalized cloud guidance. Just like how ATT&CK has specific Techniques for Windows and Linux, ATT&CK’s cloud matrix defines Techniques specific to Office 365, Azure, AWS, Google, and others. It also covers most of the same Tactics found in the original ATT&CK matrix, including:

    - Initial Access: Get into your network
    - Persistence: Maintain their foothold
    - Privilege Escalation: Gain higher-level permissions
    - Defense Evasion: Avoid being detected
    - Credential Access: Steal account names and passwords
    - Discovery: Figure out your environment
    - Lateral Movement: Move through your environment
    - Collection: Gather data of interest to their goal
    - Exfiltration: Steal data

    The only ones missing at this time are:

    - Execution: Run malicious code
    - Command and Control: Communicate with compromised systems to control them
    - Impact: Where the adversary tries to manipulate, interrupt, or destroy your systems and data.

    In addition, MITRE’s cloud matrix already has over 40 different documented Techniques, and in this real training for free ™ event, Randy Franklin Smith of Ultimate Windows Security will provide an overview of the matrix and show you how it fits into the overall ATT&CK framework.

    Then, members of LogRhythm’s Threat Research team — Brian Coulson, Dan Kaiser, and Sally Vincent — demonstrate how you can use the following 5 cloud Techniques to identify anomalies in an Office 365 environment:

    - T1114: Email Collection
    - T1534: Internal Spearphishing
    - T1098: Account Manipulation
    - T1136: Create Account
    - T1192: Spearphishing Link

    Watch this on-demand technical session for the latest ways to protect your cloud resources with MITRE ATT&CK.
  • Por qué le llaman SD-WAN cuando lo que necesitas es SD-Branch?
    Por qué le llaman SD-WAN cuando lo que necesitas es SD-Branch?
    Pedro Martinez Busto May 26 2020 2:30 am UTC 58 mins
    Por qué le llaman SD-WAN cuando lo que necesitas es SD-Branch?
  • Supercharge Your Security Operations
    Supercharge Your Security Operations
    Oren Koren, Technical Product Manager & Ran Ish Shalom, Product Manager May 26 2020 6:00 am UTC 67 mins
    Check Point’s Infinity SOC is designed to address the key challenges faced by SOC teams. Check Point Infinity SOC provides advanced innovative tools that enable security teams to effectively and efficiently prevent, detect and respond to threats by addressing 3 key areas:
    • Automatic detection and response
    • Powerful and actionable threat intelligence
    • Innovative threat hunting

    Key speakers: Oren Koren and Ran Ish Shalom
  • Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Deutsch: Security Awareness Training, die beste Verteidigung gegen Cyberangriffe
    Henning Hanke, Cybersecurity Specialist, Deutschland, Österreich und Schweiz May 26 2020 8:00 am UTC 48 mins
    Cyberkriminelle arbeiten ständig an der Verbesserung ihrer Social-Engineering-Methoden und nutzen ausgefeilte Köder und Tricks, auf die häufig selbst die erfahrensten Anwender hereinfallen. Wie Untersuchungen von Proofpoint zeigen, hängen 99 % aller Angriffe davon ab, dass der Anwender in irgendeiner Form aktiv wird. Ohne die Interaktion des Anwenders kann der Angriff – aus Sicht des Kriminellen – nicht erfolgreich sein. Der Anwender wird beispielsweise zum Klicken auf einen Link aufgefordert, dazu, Anmeldedaten auf einer gefälschten Login-Seite einzugeben oder ein Makro (und damit Schadcode) auszuführen, wenn er beispielsweise eine befallene Datei öffnet.
    Wie können Sie also sich selbst, Ihr Unternehmen und Ihre Endnutzer besser schützen?

    In unserem Webinar zeigen wir, wie wir die Proofpoint-Expertise im E-Mail-Sicherheitsbereich für unsere Security Awareness-Training-Lösungen praktisch anwenden, um das Sicherheitsrisiko durch Cyberangriffe, die sich gegen Mitarbeiter richten, zu minimieren. Im Webinar gehen wir auf folgende Themen ein:

    - Sie erfahren, wie Sie messen können, wie anfällig Ihre Mitarbeiter für Angriffe über den wichtigsten Bedrohungsvektor – die E-Mail – sind.
    - Sie erhalten Tipps aus der Praxis dahingehend, welche Kriterien Schulungsmaßnahmen zur Steigerung des Sicherheitsbewusstseins erfüllen müssen, so dass sie neue Verhaltensweisen fördern und aus Ihren Mitarbeitern eine effektive letzte Verteidigungslinie machen.
    - Sie erhalten Informationen darüber, wie Ihre Mitarbeiter verdächtige E-Mails mit nur einem Klick melden können.
    - Automatisierung Ihrer Reaktion bei gemeldeten verdächtigen E-Mails mithilfe von Closed-Loop Email Analysis and Response (CLEAR), sodass Sie wertvolle Zeit sparen und Angriffe rechtzeitig abwehren können

    Proofpoint, Inc. (NASDAQ:PFPT) ist ein führendes Cybersicherheitsunternehmen. Im Fokus steht für Proofpoint dabei der Schutz der Mitarbeiter.

    Deutsch
  • När Nätverken Möter Den Nya Morgondagen! 1
    När Nätverken Möter Den Nya Morgondagen! 1
    Robert Klasson Gigamon SE Nordic and Baltic andJohn Svensson Gigamon Sales Director Nordic and Baltic May 26 2020 8:00 am UTC 30 mins
    Gör mer med befintlig utrustning, verktygsoptimering kan spar upp till 50%
    Klarar befintlig utrustning 10G, 40G, 100G, Hur undviker ni att uppgradera säkerhets och analysutrustning i onödan.
    De flesta organisationer har gjort betydande investeringar i nätverket och säkerhetsverktygen som de använder för att hantera och skydda sina nätverk.

    När trafiken skiftar från LAN till WAN är det viktigt att dataflödet till dessa verktyg inte orsakar överbelastning av sökerhetslösningar och andra verktyg, orsakar områden där ni inte har full synlighet eller skapar andra problem beroende på den ökade trafikmängden.
    För att maximera effektiviteten av en organisations verktyg och säkerhetsutrustning är det viktigt att nätverkstrafik från fysisk, virtuell och moln miljöerna är optimerade innan de levereras till dessa lösningar.
    Om inte riskerar man att överbelasta dessa och att få göra manuell handpåläggning i annars automatiserade processer för att undvika problem
    ”Case study”
    Den amerikanska Myndigheten HHS (Health and Human Services) uppgraderade sitt nätverk till 10 GBps, men många av deras säkerhetsverktyg hade 1 Gbps nätverks interface.
    Med Gigamon kunde de behålla de äldre verktygen som kunde kunna arbeta med trafik från det snabbare 10Gb nätverket.
    Enligt ESG-studie tillhandahåller de en en besparing på 40–50 procent för att de kunnat dimensionera sin hårdvara och sina säkerhetsverktyg
  • How Prepared Are You For The Current Threat Landscape?
    How Prepared Are You For The Current Threat Landscape?
    Richard Vines and Anthony Roberts May 26 2020 8:00 am UTC 36 mins
    Data analysis from Europe published by Cynet, reveals that this wide quarantine creates unique cyber risks that attackers forcefully seize to launch attacks on multiple organizations, especially targeting employees working from home.

    Join Anthony Roberts, Security Engineer at Cynet, as he shares:

    The cyber risks that mass working from home entails.

    Live threat data, showing spike in specific attack vectors.

    Best practices on how to be best prepared and maintain your organisation secure.
  • How do you gain cyber assurance?
    How do you gain cyber assurance?
    Katherine Demidecka, Strategic Mandiant Consultant, FireEye May 26 2020 9:00 am UTC 45 mins
    This webinar will discuss how an organisation can gain assurance that it is prepared to defend against and respond to a cyber incident. The following key topics will be covered:

    •Securing your environment proportionate to the risk
    •Readiness to identify and respond to an attacker's presence quickly
    •Testing your defences and response plans through simulated attacks
  • Security Awareness Training –Your best line of defence
    Security Awareness Training –Your best line of defence
    Paul Down, Director & Matt Cooke, Cyber Security Specialist May 26 2020 9:00 am UTC 31 mins
    How susceptible are your users to email attack?
    Join our experts to discover new highly-crafted lures and tricks used by cyber criminals in 2020.
    Learn how to strengthen your last line of cyber defence : your people

    Cybercriminals are continually refining their approaches to social engineering with well-crafted lures and schemes that trick even your most savvy users. Proofpoint research shows that 99% of attacks rely on your users taking some form of action, be it clicking a link, entering their credentials or even running their code.

    So how can you better protect yourself, your organisation, and your end users?

    With this webinar you’ll get a better understanding of:

    • How to measure your susceptibility to attack through the number 1 threat vector, email.
    • How to deliver a customised security awareness program to drive new behaviours and help your people be an effective last line of defence
    • How to enable your employees to quickly report suspicious email messages with one tap
    • How you can automate your security response to suspicious email reports, saving precious time and stopping attacks with closed-loop email analysis and response (CLEAR)

    Join us to review 2020 best practice in security awareness training

    ABOUT PROOFPOINT
    Proofpoint, Inc. (NASDAQ:PFPT) is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 100, rely on Proofpoint. No one protects people, the data they create, and the digital channels they use more effectively than Proofpoint.
  • Mittels DevSecOps Applikationen Sichern
    Mittels DevSecOps Applikationen Sichern
    Julian Totzek - Hallhuber | Solution Architect at Veracode May 26 2020 9:00 am UTC 45 mins
    Gerade wenn Sie dachten es kann nicht schlimmer werden, passiert es. Cyber-Angriffe haben sich in den letzten 12 Monaten verdoppelt. Egal für wen Sie arbeiten, auch Ihr Unternehmen wird mehrfach jeden Minute angegriffen.

    Es ist nicht nur die Bedrohung, die Ihre Ressourcen zu überwältigen droht, sondern auch das Ausmaß und die Geschwindigkeit Ihrer Reaktion. Das stimmt, solange Sie nicht die Strategien, Richtlinien und Prozesse von DevSecOps implementieren.

    Veracode behauptet, dass Cloud-native Technologien Entwicklern helfen, die Zeit zu reduzieren, die zur Beseitigung von Sicherheitslücken erforderlich ist. Laut Gartner werden Unternehmen, die die Cloud-Infrastruktur zur Automatisierung des Sicherheitsschutzes verwenden, bis 2022 60% weniger Sicherheitsvorfälle erleiden, und DevSecOps-Teams, die auf diese Weise arbeiten, lösen ihre Sicherheitsprobleme dreimal schneller, so Veracode.

    Aber wie? Nehmen Sie an unserem Webinar teil und sehen Sie, wie Veracodes Principle Solutions Architect Julian Totzek-Hallhuber zeigt, was DevSecOps in der Praxis bedeutet und welche pragmatischen Schritte zu schnellen und effektiven Ergebnissen in Ihrem Unternehmen führen.
  • SOAR Explained: Benefits, Unique Capabilities, SOAR vs SIEM, KPIs and More
    SOAR Explained: Benefits, Unique Capabilities, SOAR vs SIEM, KPIs and More
    Andrea Fumagalli, VP of Engineering, DFLabs May 26 2020 9:00 am UTC 75 mins
    Security Orchestration, Automation, and Response (SOAR) has grown exponentially in recent years, both in popularity and demand. An increasing number of enterprises, SOCs, and MSSPs have looked for new and innovative solutions to address several pervasive problems, and SOAR quickly became a popular security solution among businesses and organizations.

    In this webinar, we’ll focus on the core functions of Security Orchestration, Automation and Response (SOAR) technology, its unique capabilities, and the most common challenges that SOAR helps resolve. We’ll also discuss the key benefits that SOAR as a solution offers to enterprises and MSSPs, the difference between SIEM and SOAR, and how they work together, as well as revealing the most important KPIs for security operations and incident response programs.

    Key Takeaways:
    - What is SOAR?
    - Unique capabilities of SOAR
    - The marriage between SIEM and SOAR
    - Core functions & capabilities of a DFLabs IncMan SOAR solution
    - TRIAGE
    - Open Integration Framework
    - Probationary role and chain of custody
    - Reporting and KPI
    - Key benefits of SOAR for enterprises and MSSPs
  • Best Practices for Securing Your Remote Workers
    Best Practices for Securing Your Remote Workers
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout May 26 2020 9:00 am UTC 53 mins
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Spring Kafka Beyond the Basics - Lessons learned on our Kafka Journey at ING Ban
    Spring Kafka Beyond the Basics - Lessons learned on our Kafka Journey at ING Ban
    Tim van Baarsen May 26 2020 10:00 am UTC 57 mins
    In this talk, Tim van Baarsen will take you on a journey beyond the basics of Spring Kafka and will share his knowledge, pitfalls and lessons learned based on real-life Kafka projects that are running in production for many years at ING Bank in the Netherlands.
  • Keep Hidden Threats from invading your network
    Keep Hidden Threats from invading your network
    Chris McCormack May 26 2020 10:00 am UTC 45 mins
    Network firewalls are evolving, and the latest generation
    is very different from its predecessors. We continue to see
    a shift in the threat landscape, and a dramatic rise in the
    number and complexity of security systems that protect
    against cyberattacks.


    These changes, combined with the
    overwhelming amount of data produced, have created a
    dangerous situation that requires a much different approach
    to network security, one that makes it essential security
    systems work together, simplify and streamline workflows,
    and parse through enormous volumes of data to focus
    attention on exactly what’s important without negatively
    impacting performance. It also requires new approaches to
    security integration, new management systems, and new
    ways of identifying and responding to risks and threats.
  • SD-WAN Orchestration
    SD-WAN Orchestration
    Maniraj Durairaj: Technical Lead – ERT May 26 2020 11:00 am UTC 60 mins
    Aruba Central, a highly scalable cloud-native management system, includes an SD-WAN Orchestrator. This allows IT to quickly and efficiently set up routes and tunnels—based on business policy—across the entire organization: branch offices, headquarters, enterprise data centers, and even virtual private clouds (VPC) inside providers such as Amazon Web Services (AWS) or Microsoft Azure.
  • Endpoint Protection - Protection across a dramatic increase in remote workers
    Endpoint Protection - Protection across a dramatic increase in remote workers
    Scott Robertson - Sales Engineer May 26 2020 12:00 pm UTC 50 mins
    Endpoint Backup has often been assumed too complicated to implement & manage. Organisations have therefore decide not to protect laptop data and expect users to use shared storage only. This no longer meets the demands of the modern day, remote, workforce and puts organisational data at risk! Add to that now the worldwide directive with almost all users working from home, this puts organisations without Endpoint protection at an even higher risk. This webinar is designed to show how simple protecting Endpoint devices can be and highlights the added advantages such as Self Service Restore, Sharing, Encryption, DLP, Remote Wipe and more.
  • Formation de sensibilisation à la sécurité /dernière ligne de défense / Français
    Formation de sensibilisation à la sécurité /dernière ligne de défense / Français
    Quentin Habert, Expert en cybersécurité, France & région SEMEA, Proofpoint May 26 2020 12:00 pm UTC 34 mins
    Les cybercriminels peaufinent continuellement leurs techniques d'ingénierie sociale au moyen de leurres et de stratagèmes élaborés avec soin, qui piègent même les utilisateurs les plus avisés.

    D'après les études menées par Proofpoint, 99 % des attaques requièrent une action quelconque de la part de vos utilisateurs : cliquer sur un lien, saisir leurs identifiants ou encore exécuter le code.
    Comment mieux vous protéger vous-même, votre entreprise et vos utilisateurs ?

    Rejoignez-nous pour découvrir comment nous appliquons l'expertise de Proofpoint dans le domaine de la sécurité de la messagerie électronique à nos solutions de formation et de sensibilisation à la sécurité informatique pour réduire les risques associés à vos utilisateurs.

    Dans ce webinaire, vous découvrirez comment :
    • évaluer votre vulnérabilité aux attaques via le principal vecteur de menaces, les emails ;
    • proposer un programme de sensibilisation à la sécurité informatique personnalisé pour encourager de nouveaux comportements et transformer vos utilisateurs en dernière ligne de défense robuste ;
    • encourager vos collaborateurs à signaler rapidement tout email suspect en un clic ;
    • automatiser vos mesures de réponse aux incidents de sécurité suite aux signalements d'emails suspects, afin de gagner un temps précieux et de bloquer les attaques grâce à la solution Closed-Loop Email Analysis and Response (CLEAR).


    Proofpoint, Inc. (NASDAQ:PFPT) est une entreprise leader dans le domaine de la cybersécurité qui protège les ressources les plus importantes et les plus à risques des entreprises : leurs collaborateurs. Les grandes entreprises de toutes tailles, y compris plus de la moitié des entreprises de l’index Fortune 100, font confiance à Proofpoint pour diminuer leurs risques les plus critiques en matière de sécurité et de conformité via les emails, le cloud, les réseaux sociaux et le Web.

    Présenté en Français.
  • BP/BrightKnight Webinar - Use cases in Customer Service using SAP
    BP/BrightKnight Webinar - Use cases in Customer Service using SAP
    John Bailey, Blue Prism; Arvid Aendenboom, BrightKnight & Fred Versyck, BrightKnight May 26 2020 1:00 pm UTC 60 mins
    SAP is a powerful software suite, used extensively in many corporations of all sizes across the globe. BrightKnight have come across many business processes executed in SAP. Many of them have a tremendous potential for automation with Blue Prism. During this webinar we will focus on two of them.
    Focus will be on how we went about the automation journey and on the benefits realized with these processes. Furthermore, we will also share a quick word on how we tackled this from technical standpoint.

    Both use cases focus on Customer Service in the utilities sector, specifically customer data quality. SAP relies on verified and correct customer data to work as intended; this is where automation comes in. A significant amount of manual work was spent on simple checks to verify how a client contract should be handled. Now all this preparation is done by a Blue Prism robot and the manual work focuses on handling the actual contract.
    In another use case, the aftercare of a mass migration of data is being done. It wasn’t technically feasible to couple incoming clients with existing clients and therefore RPA came into the picture. Due to the implementation of this Blue Prism robot, business could take the correct decisions in handling the rest of the cases.
  • Stärken Sie Ihre Belegschaft durch moderne Authentifizierung
    Stärken Sie Ihre Belegschaft durch moderne Authentifizierung
    John Waters von OneLogin und Patrick Schnell von Yubico May 26 2020 1:00 pm UTC 45 mins
    Der Zugang zu Unternehmensinformationen wird in der Regel über Passwörter verwaltet. Aufgrund der wachsender von Sicherheitsverletzungen, die hauptsächlich durch schwache oder gestohlene Passwörter entstehen, evaluieren immer mehr Unternehmen alternative Authentifizierungs Optionen.

    Erfahren Sie wie moderne Standards der Authentifizierung Sie auf ihrer Reise von passwortlosen Anmeldung unterstützen können. Unternehmen haben dafür heute die Flexibilität z.B. YubiKeys (Security Keys) oder Biometrie für ihre starke Authentifizierung zu nutzen, ohne die Sicherheit zu vernachlässigen. Gleichzeitig steigern diese Lösungen die Akzeptanz beim Benutzer da der Login prozess stark vereinfacht wird.

    In diesem Webinar sprechen John Waters von OneLogin und Patrick Schnell von Yubico über folgende Themen:

    -Wie moderne Authentifizierung heutige Belegschaften beeinflusst
    -Fallbeispiele über WebAuthN/FIDO2
    -Bewährte Praktiken zur Verwendung der WebAuthN-/FIDO2- Authentifizierung, um Ihnen einen sicheren Zugriff auf Unternehmensinformationen Ihrer Organisation zu ermöglichen
  • The State of Open Source Security Vulnerabilities in 2020
    The State of Open Source Security Vulnerabilities in 2020
    Jeffrey Martin, Senior Director of Product and Sharon Sharlin, Product Marketing Manager May 26 2020 2:00 pm UTC 56 mins
    WhiteSource’s Annual Report on The State of Open Source Security Vulnerabilities in 2020 found that a record-breaking number of new open source security vulnerabilities in was published in 2019.

    In our research, we focused on open source security’s weakest and strongest points in the hopes of bringing some clarity to the fast-paced and complex space of known open source security vulnerabilities.

    Join Jeffrey Martin, Senior Director of Product and Sharon Sharlin, Product Marketing Manager at WhiteSource as they discuss:
    •How the open source community is evolving when it comes to security research and what to expect in 2020.
    •Ways software development outfits can implement secure coding from the earliest stages of the DevOps pipeline.
    •Best practices for development, DevOps, and Security teams to make sure they address the most critical issues to their software products’ security.
  • Your phone and your face. Anchoring users to real identities
    Your phone and your face. Anchoring users to real identities
    Robert Humphrey | CMO | Onfido & Mickey Martin | Global Lead, Sales Engineering | Onfido May 26 2020 2:00 pm UTC 52 mins
    Expectations of online businesses have never been higher. Customers expect frictionless and personalized experiences, while demanding evermore streamlined registration processes. And if they don’t get them, they’ll take their business elsewhere.

    Resultantly, businesses are experiencing a profound tension. How do you balance frictionless registration, and effective identity management - so that customers are more than just an email and password in a database?

    In this webinar, Robert Humphrey and Mickey Martin will be discussing how to anchor customers to real identities in an easy and secure way.

    Join to learn about how:

    -Anchored identities enable user-controlled re-authentication and recredentialing via biometrics

    -Document-first verification with data extraction can eliminate friction, and lead to better data integrity

    -Identity verification can stop fraud at the door, protecting revenue and platform trust
  • Ready to take back control of office 365?
    Ready to take back control of office 365?
    Matt Walmsley May 26 2020 2:00 pm UTC 26 mins
    With the widespread adoption of Office 365 and an increasingly mobile workforce, cloud security has become top of mind for most organisations. Traditional security solutions, like enabling MFA, are focused point-in-time assessments and offer limited efficacy since attackers can still hijack authenticated sessions to gain access. It’s time fora more modern approach to cloud security.

    This webcast we will discuss:

    The latest trends in cloud threats
    Why preventative solutions aren’t sufficient to stop attacks
    Why the severity of an attack in the cloud surpasses an on-prem attack
    How Vectra Cognito for Office 365 can help stop attacks before they become breaches
  • Protecting the Unprotectable
    Protecting the Unprotectable
    Dries Robberechts May 26 2020 3:00 pm UTC 57 mins
    Current IT revolutions such as Cloud, IoT and BYOD force dramatic changes upon corporate networks. With countless devices and services getting connected and no clear network boundaries, Identity has to be the new perimeter. Not trusting anyone by default, even those already inside the network perimeter has to be the new reality. The security model of Zero Trust.

    Silverfort’s Next-Generation Authentication Platform can enforce secure authentication for any user on any system, including systems that were considered “Unprotectable” until today, without any modifications to endpoints and servers. This includes homegrown systems, IT infrastructure, IoT devices, dynamic IaaS environments and more.

    Silverfort enables organizations to address a wide variety of Zero Trust use cases and compliance needs, including secure migration of sensitive applications to the Cloud.

    Watch this webinar to learn:

    Why passwords are no longer a reliable factor of authentication.
    Why so many sensitive enterprise systems still aren’t protected by Multi-Factor Authentication (MFA).
    Why traditional MFA won’t cope with Zero Trust requirements.
    How Silverfort’s technology allows full agent-less Adaptive Risk Based Authentication.