Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • LIVE Interactive Q&A: Steve Durbin on the Yahoo Data Breach LIVE Interactive Q&A: Steve Durbin on the Yahoo Data Breach Steve Durbin, Managing Director, ISF Ltd Sep 30 2016 10:00 am UTC 45 mins
    Last week Yahoo was hit with the biggest data breach of all time; with an estimated 500 million customer accounts compromised by hackers. The attack will have significant rippling effects on consumer trust, data protection standards and information security practices. The legal battle is now also only just beginning, with two key cases being heard in California, as Yahoo is sued for data-protection negligence.

    But what will does all this mean to your business? Do you feel compromised professionally or personally? Were key mistakes made that you can avoid? How can you best prepare (in terms of incident response) to such a breach? Will the attack have lasting effects or will it disappear into the annuls of history alongside the Ashley Maddison, Target and Linkedin hacks. All these questions and more will be answered live, over webcam by Security expert and Managing Director of the ISF Steve Durbin.

    Tune in, ask your burning questions and join the conversation on BrightTALK.
  • (ISC)² EMEA Reacts: Yahoo – a case study for GDPR? (ISC)² EMEA Reacts: Yahoo – a case study for GDPR? Adrian Davis, Jason Hart, Nigel Hawthorn, Anthony Lee Sep 30 2016 10:00 am UTC 45 mins
    The “(ISC)² EMEA reacts” are ad-hoc webinars scheduled in reaction to major Information security events and breaches. Here we bring together leading Industry experts to join Adrian Davis, Managing Director, (ISC)2 EMEA to explore the impact, potential responses, and implications for the future, offering professionals much-needed perspective as the dust settles.
  • 8 Security Lessons from 8bit Games 8 Security Lessons from 8bit Games Gavin Millard, EMEA Technical Director Tenable Network Security, Adrian Davis, Managing Director (ISC)² EMEA; Oct 3 2016 11:00 am UTC 60 mins
    What can Space Invaders teach us about attack path analysis? Mario about defending your users that are the weakest link? Even Pac Man about focusing on the right goals? Join Gavin Millard, EMEA Technical Director, who will explore the lessons to be learned from the games many of us played years ago that are still valid in the reduction of security risks within all of our infrastructures. Key takeaways from the webinar include:

    How to game the system to get a high score in security.
    How to gain insight into the attack path used by hackers to gain access to your data.
    What cheats can be used to reduce the risk of data loss.
  • Cyber Crime – Why Are You a Target Cyber Crime – Why Are You a Target Richard Cassidy, UK Cyber Security Evangelist Oct 4 2016 2:00 pm UTC 60 mins
    According to cyber security experts, the frequency and severity of cyber attacks are on the rise, causing alarm to businesses and customers across a variety of industries. Taking a proactive, strategic approach to evaluating your cyber security strategy is critical, it starts with understanding who your organisations adversaries are and what the impact would be on your business if you were the victim of a cyber attack.

    Register for this impactful webinar presented by Richard Cassidy, UK Cyber Security Evangelist at Alert Logic as he examines the latest methods and exploits used by cyber criminals providing an overview of the most current ways they target businesses. You’ll get an insight on how the most sophisticated attackers choose their targets, what they are looking for, and how they extract valuable data.

    In this webinar, we will take a look at:
    • The ever-changing threat landscape, and how it affects your business
    • Tactics, techniques and procedures (TTPs) used by cyber criminal actors
    • Strategies and tools for mitigating the risk of cyber attack
    • Insight into Real-life case studies
  • ¿Trabaja su software de backup para usted, o usted para su software de backup? ¿Trabaja su software de backup para usted, o usted para su software de backup? Cesar Funes - Commvault Technical Partner Enablement Manager Oct 5 2016 10:30 am UTC 60 mins
    Conformarse vs Orquestar.
    Las soluciones de IT que selecciona deberían ayudarle a dar el mejor soporte posible a su negocio. Pero hay algunas que heredamos, o que seleccionamos con una visión parcial de nuestros sistemas, y que acaban frenando nuestra capacidad de dar valor a nuestra empresa como Departamento de IT.

    Las soluciones de protección de datos suelen encontrarse en este segundo caso. El hecho de que sus fabricantes, como Veritas, Veeam o IBM, no invierten lo suficiente en innovación para convertirlas en auténticas herramientas de gestión de datos empresariales, o de que están pensadas sólo para cubrir una parte de los sistemas, trae como consecuencia que Usted, que las tiene integradas en sus plataformas, sufra algunos o todos estos problemas:

    • Gastos de administración y operación excesivos
    • Inversión en plataformas de soporte de protección de datos costosas y propietarias
    • Riesgos financieros asociadas a la incapacidad de cumplir SLAs y dar valor a su negocio
    • Limitación en la libertad para elegir cuáles serán los sistemas de producción que mejor soporten su negocio, simplemente porque no tendrá cómo protegerlos.

    Es hora de liberarse de esta carga, y apostar por el líder al que el mercado aclama como un socio tecnológico innovador que le devuelve el control sobre sus decisiones de IT. Si va a renovar su actual software de protección de datos, es hora de decidirse por el mejor.

    Únase a nosotros en este webinar y descubra cómo Commvault le garantiza que su software de copia de seguridad no le limitará la capacidad de elegir proveedores de sistemas de producción, y reducirá sus riesgos financieros de cara a la Dirección de su empresa disminuyendo la complejidad de su infraestructura y aumentando su productividad.
  • Educational Institutions:Accurate visibility of all software & hardware assets Educational Institutions:Accurate visibility of all software & hardware assets David Foxen, SAM Evangelist at Snow Software Oct 5 2016 1:00 pm UTC 45 mins
    With a strong track record in Education, find out how Snow Software provides a consolidated view of all licenses, enabling staff to use just one interface to manage multiple software vendors, device types and locations across all platforms.
  • Multi-Cloud Management - How to effectively manage multiple cloud environments Multi-Cloud Management - How to effectively manage multiple cloud environments Brent Brightwell, SVP Strategy, DoubleHorn Oct 5 2016 5:00 pm UTC 30 mins
    The digitization of businesses and the way that IT supports the needs of these businesses has changed significantly over time. Today, different IT workloads can be deployed on different types of cloud services, depending upon the business requirements. As a result, many IT departments are moving their infrastructure to the cloud and multi-cloud virtual environments. A multi-cloud management platform allows enterprises to manage workloads and applications across all cloud deployment models, including public, private, and hybrid. Using the right platform for this workload enables enterprises to drive favorable business results. The multi-cloud approach facilitates transition to the IT-as-a-Service (ITaaS) model, where IT departments act as service brokers and support organizations in optimizing their IT infrastructure consumption. In this webinar, we'll discuss the key features of a multi-cloud management platform and also discuss the benefits, challenges, and opportunities in the existing market.
  • Cyber Readiness: Going Beyond “Awareness” and Building a Culture of Security Cyber Readiness: Going Beyond “Awareness” and Building a Culture of Security Kelley Bray, Employee Trust and CustomerONE at Symantec Oct 5 2016 5:00 pm UTC 60 mins
    Building a strong culture of security is the key to ensuring that your users care enough about the security of your company to protect it. Every day, in every interaction, we want our users to do the right thing when it comes to security.

    In this webinar we will discuss:

    - Symantec’s Employee Trust Program

    - How we go beyond basic security awareness training to continuously cultivate our security culture.
  • Cloud Security and Manageability on a Personal Level Cloud Security and Manageability on a Personal Level Microsoft Oct 5 2016 8:00 pm UTC 60 mins
    Help your employees take personal responsibility for IT security!

    From biometrics to multi-factor authentication, how do you help your employees be protected at a personal level?

    We’ll explore how you can go beyond mere password strength to help prevent your employees' identities and your business from being compromised. Join this webcast to learn how cloud services and operating systems are designed with security in mind, while preserving natural, friendly user interactions.

    This webcast is part of our Digital security in the modern world webcast series. Sign up for this session, or the entire series today!
  • Understanding the Impact of GDPR on the Public Sector Understanding the Impact of GDPR on the Public Sector Andrew Joss – Head of Industry Consulting, EMEA Oct 6 2016 1:00 pm UTC 60 mins
    From May 2018, the new EU General Data Privacy Regulation (GDPR) will require all Public Sector organisations to more effectively understand how they manage data on their citizens, contractors and staff. Citizens will have significantly more rights and powers on how their data is used and consumed, with large fines available for any breaches of the regulation.

    Join this webinar to understand:

    - What GDPR is and what it means to Public Sector bodies
    - The potential impact of Brexit
    - The range of data challenges and opportunities the new regulation will create
    - What data capabilities agencies will need to consider
    - Learn what best practice approaches commercial organisations are already taking to ensure timely compliance
  • Managing Apple Devices in a Windows World Managing Apple Devices in a Windows World Steve Brasen - Research Director, Enterprise Management Associates | Tim Williams, Director, Product Marketing HEAT Software Oct 6 2016 3:00 pm UTC 60 mins
    As Windows support requirements continue to dominate the focus of enterprise endpoint management efforts, an increasing number of Apple device users are becoming frustrated with being treated as second-class citizens. At the heart of the problem are Windows-centric practices and solutions that do not comprehensively translate to supporting Mac and iOS platforms. However, adoption of Apple management point solutions that operate independent of existing Windows administration platforms only add to management complexity and fail to achieve service reliability and cost-effectiveness.
    Join Steve Brasen, EMA Research Director from analyst firm, Enterprise Management Associates, and Tim Williams, Director Product Marketing at HEAT Software for a one-hour presentation identifying the optimal practices and solutions that will enable comprehensive management of Apple devices side-by-side with Windows endpoints.
    Key topics of discussion include:
    •What is the current state of Apple device adoption and use in the enterprise?
    •What specific Apple requirements are not being serviced by traditional Windows-targeted management solutions?
    •Which methods should be employed to maintain consistent user experiences across different endpoint architectures?
    •What effect has increased workforce mobility had on emerging Apple support requirements?
    •How can enterprise security requirements be maintained across disparate software and hardware ecosystems?
  • The CISO as a Transformational Role in Risk Management The CISO as a Transformational Role in Risk Management Michael Rasmussen- GRC 20/20 Oct 6 2016 6:00 pm UTC 60 mins
    Mike Rasmussen of GRC 20/20 explores the ever changing role of the CISO in a modern organization.

    This presentation offers a prescription for managing information security risk as it permeates business operations, processes, transactions, and relationships in the digital world.
  • Overcome Outdated Processes and Automate IT Risk & Compliance Overcome Outdated Processes and Automate IT Risk & Compliance Nick Hayes, Analyst at Forrester, Josh Hankins, Information Security Solutions Manager at 84.51° Oct 6 2016 6:00 pm UTC 60 mins
    Companies across a wide gamut of industries and regions all strive to effectively manage risk and compliance, but too few actually achieve it. As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight.

    During this webcast, guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° will cover how you can:

    · Move up the maturity curve through better program coordination and technology integration.
    · Establish the right metrics to build the business case and showcase continual progress.
    · Bolster future success by prioritizing business agility and data mastery as top strategic objectives.

    This Webcast will have a Live Q&A
  • Intelligent eDiscovery & Data Documentation for Legal Professionals Intelligent eDiscovery & Data Documentation for Legal Professionals Craig Delle Donne, Microsoft Oct 6 2016 8:00 pm UTC 60 mins
    Build intelligence into your eDiscovery processes!

    Did you know the median litigation budget in the US is $1.2M (2015 - Norton Rose Fulbright) and that over 40% of large companies have one or more lawsuits with $20M+ at issue? With data being created at exponential rates, reviewing necessary documentation can and will become one of the biggest challenges legal teams face. It’s time to build intelligence into your discovery processes. Microsoft Office 365 Advanced eDiscovery may be the answer for you.

    Join this webcast to learn:
    •How Microsoft Office 365 Advanced eDiscovery can help you analyze data within Office 365, streamline document reviews and make decisions for efficient eDiscovery
    •How this solution differs from traditional eDiscovery software
    •Why there's no better time than today to start thinking about this topic

    File sharing, collaboration on documents and the influx of data in the cloud will pose new challenges and opportunities. Save your seat in this session to learn more!
  • Resource Management In A Busy World: Delivering Results, Extending PPM Maturity Resource Management In A Busy World: Delivering Results, Extending PPM Maturity Eric Kissel, Services Architect for CA PPM, CA Technologies Lars Matzerath, Head of Sales, itdesign GmbH Adam Frary, Services Oct 7 2016 3:00 pm UTC 60 mins
    Resource Management is a relatively straight forward concept with significant benefits. However, some organizations choose to postpone those benefits and focus on other aspects of PPM. How can we extend organizational maturity for PPM with high value outcomes from Resource Management?

    Please join Erich Kissel, CA Services Architect for PPM, and Lars Matzerath, Head of Sales from itdesign GmbH for an insightful discussion on Resource Management on Friday, Oct.7th.

    CA Services will provide tips for getting started and for expanding into new Resource Management use cases. Our partner, itdesign, will share some insights of two powerful packaged work products
    for CA PPM: itd Assignment Editor and itd Allocation Editor which enhance project and resource managers’ visibility and editing options of resources.

    From assigning and aligning resources to projects, evaluating and normalizing demand, to gaining a better understanding of available skills, it’s time to fulfill your resource management aspirations!
  • Running Your Mission Critical Line of Business Applications Running Your Mission Critical Line of Business Applications Ross LoForte, Technology Architect, Microsoft; Jimmy May, SQL Server Solutions Architect, SanDisk Oct 7 2016 4:00 pm UTC 60 mins
    In a recent Gartner survey, more than 85% of enterprise respondents indicated that data growth, performance and availability was their largest challenge.

    Join this session to learn how SQL Server can help you run your mission critical line of business applications including:

    - Enterprise performance
    - IT Security and compliance
    - Scalability
    - High availability and disaster recovery
  • The role of Threat Intelligence Feeds in the Battle Against Evolving Cybercrime The role of Threat Intelligence Feeds in the Battle Against Evolving Cybercrime Nahim Fazal, Head of Cybersecurity Development at ‎Blueliv Oct 11 2016 2:00 am UTC 45 mins
    Today, advanced cyber threats form part of the risk landscape we encounter every day in our increasingly digital lives. Cybercrime is known for its complex, chameleon characteristics – it’s a highly lucrative industry with fast-paced innovation at its core. The evolution of cybercriminal techniques enables it to thrive, and we need to sprint to keep up. Organizations must respond with security solutions nimble enough to compete with the bad guys. Sounds like a job for MRTI, and we think we’ve got just the ticket.

    This webinar intends to be an educational piece for any Security team in need of having a better understanding of the value provided by Threat Intelligence feed in order to complement traditional security real estate. This is not intended for those who already have a strong expertise and understanding of the fundamentals of threat intelligence delivered via a feed.
  • Privacy vs. Security Privacy vs. Security Steve Durbin, Managing Director, ISF Ltd Oct 11 2016 1:00 pm UTC 45 mins
    In May 2018 the EU’s General Data Protection Regulation (GDPR) will take effect. The GDPR upholds the protection of personal data and increases the accountability of organisations processing any personal details belonging to EU citizens- with severe penalties for those who do not comply.

    In this webinar Steve Durbin, Managing Director at the ISF, discusses why it is important for the security and data privacy teams to work together to run risk assessments on their most critical information assets and to develop checklists, policies and procedures that can be implemented internally and with third party suppliers. Only by taking this approach will organisations be able to remain agile, maintain customer confidence and demonstrate that they are ‘GDPR ready.’
  • Database as a Service: What should you consider before migrating to the cloud? Database as a Service: What should you consider before migrating to the cloud? Matt Aslett - 451 Research Director, Data Platforms and Analytics Oct 11 2016 3:00 pm UTC 45 mins
    Database-as-a-service offers multiple potential benefits, including lower database licensing and infrastructure costs, faster time to application development, and reduced administration overheads. These benefits are most likely to be experienced by database administrators and architects, although senior decision-makers and business users also stand to gain from having on-demand access to database services, rather than waiting for databases to be configured and deployed on dedicated physical or virtual server infrastructure.

    While 451 Research anticipates growing adoption of database-as-a-service (DBaaS), adoption is currently nascent compared with other cloud services, as enterprises look to make the most of their investments in on-premises database deployments, and also to identify the most appropriate workloads for transition or migration to DBaaS. This webinar explores the factors shaping those adoption trends, including the potential benefits and challenges to DBaaS adoption, the economics of the cloud as they relate to database workloads, and adoption lifecycles.

    Based on research involving enterprises currently deploying database workloads in the cloud, the webinar will:

    • Highlight the trends driving enterprises to move database workloads to the cloud
    • Identify the challenges causing enterprises to be hesitant about migrating database workloads to the cloud
    • Identify the use-cases that are prime candidates for migrating database workloads to the cloud
    • Highlight the critical success factors for database migration to the cloud
  • Understanding the Risks from DDoS Attacks Understanding the Risks from DDoS Attacks Rohit Kinra, Director - Product Technology, Verisign Oct 11 2016 3:00 pm UTC 45 mins
    Recent DDoS attacks trends indicate that DDoS attacks are becoming more sophisticated and persistent. What do these DDoS trends mean for your organization, especially during the upcoming holiday season?
    Join Rohit Kinra, Director, Product Technology, Verisign, as he discusses the behavioral shifts observed by Verisign in recent DDoS attacks and what should concern you. Rohit will also share recommendations on how your organization can prepare and defend against DDoS attacks.