Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Zack Allen, Director of Threat Operations, ZeroFOX and Ryan Trost, Chief Technology Officer, ThreatQuotientRecorded: Apr 24 201941 mins
How to identify and mitigate social media and digital risk
Financial service organizations have a massive footprint and attack surface on social media & external digital platforms — all of which is ungoverned, unmonitored and unprotected by the existing security perimeter. Understanding the threats on these platforms is critical, from financial fraud, phishing and malware spread on social media, customer scams, impersonating accounts and mobile apps, and more. Join ZeroFOX and ThreatQuotient to learn the top risks facing financial institutions on social and digital channels and key tactics for addressing those risks.
-Understand top trends and threats facing financial institutions on social and digital channels
-Gain knowledge of key tactics for addressing social and digital threats
-Learn about the tools available to your organization for mitigating risk
Brian McHenry and Graham AldersonRecorded: Apr 24 201935 mins
Distinguishing between good bots, bad bots, and humans is a major challenge. Today, over 50% of online traffic is generated by bots and they are involved in nearly every attack. Identifying malicious bots and safeguarding against them is now a top priority for organisations developing a sustainable security strategy.
Join us for this webinar to learn:
- How bots infect, propagate, and attack applications
- What types of application attacks are commonly performed by bots
- How you can defend against bad bots without disrupting the good ones
Doug Austin and Tom O'ConnorRecorded: Apr 24 201965 mins
In today’s era of growing data privacy concerns with GDPR and CCPA, increase in harassment claims with #MeToo and rising corporate malfeasance concerns, there are a lot of potential compliance and investigations needs with regard to discovery that organizations have today whether or not they ever lead to litigation. This CLE-approved webcast* will discuss the drivers and challenges facing organizations today to be more proactive in understanding their data to identify issues before they lead to litigation and address them proactively. Topics include:
+ Timeframes to Act After the Case is Filed
+ Challenges Posed by BIG Data and Variety of Data Sources
+ Data Privacy Trends and Challenges
+ Challenges from #metoo and Corporate Malfeasance
+ Key Stats and Challenges Regarding Data Breaches
+ Will Information Governance Bail Us Out of This Mess?
+ Data Discovery vs. Legal Discovery
+ Where the Technology is Heading
+ Recommendations for Addressing Data Discovery Challenges
Doug Austin is the Vice President of Products and Services for CloudNine. Doug has over 30 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog, which is a trusted resource for eDiscovery news and analysis, and has received a JD Supra Readers Choice Award as the Top eDiscovery Author each year since 2017.
Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
Brandon Cooper, Sales Support EngineerRecorded: Apr 24 201925 mins
Unique to the industry, CMD+CTRL are interactive cyber ranges where staff compete to find vulnerabilities in business applications in real-time – learning quickly, that attack and defense are about thinking on your feet, creativity and adaptability. Every two weeks, we will offer the opportunity to test drive CMD+CTRL for 24 hours. We'll open up our CMD+CTRL to anyone to participate, score points, and see how they do. We will start with a 30 minute live demo to go over the features and functionality of CMD+CTRL, Q&A, and provide the login URL and credentials for your free 24 hour access and you can begin testing your skills immediately. Sign up to test drive CMD+CTRL!
Elie Khoury, Principal Research Scientist and Manager, Ph.DRecorded: Apr 24 201920 mins
AI presents exciting but uncharted territory. And as AI forges its way into organizations’ voice interface, like any disruptive technology, benefits for your organization exist alongside new opportunities for criminals to use this technology against you and your customer:.
This webinar will explore potential pitfalls to your voice channels such as :
- Synthetic voice -- the arrival of synthetic voice introduces a whole new realm of fraud possibilities and ethical debates
- Chatbots and the new hacks fraudsters use to attack this channel
- The leaky IVR and the newest brute force attack trends you may be overlooking
Duncan Brown, Dr. Margaret Cunningham & Dr. Richard FordRecorded: Apr 24 201940 mins
Trust forms the foundations of any relationship. For businesses, trust provides a platform for building strategic partnerships, establishing a reputation, and embracing innovation and change. But large-scale data breaches and privacy abuses are undermining trust - 63% of senior executives at large enterprises say that trust has eroded over the past two years*.
What can be done to reverse this trend? In this webcast, our panel discuss:
- The factors and relationships that influence trust.
- How to foster a culture of trust within the organization.
- How technology can play a part in facilitating trust.
Watch this webcast and learn how you can help your organization become a trust leader.
Duncan Brown, Sr. Director Security Strategist, Forcepoint
Dr. Margaret Cunningham, Principal Research Scientist for Human Behavior, Forcepoint X-Labs
Dr. Richard Ford, Chief Scientist, Forcepoint
*Cultivating Trust To Gain Competitive Advantage, by Harvard Business Review Analytic Services, March 2019
Brian Iverson, GartnerRecorded: Apr 24 201961 mins
This informative webcast contains great insights from Gartner analyst Brian Iverson, which begins with a simple and pragmatic definition for “what is governance?”
Brian also discusses challenges, pitfalls and recommendations on:
- How organizations can mitigate the risk of a breach
- How to prepare for hackers
- Ways to ensure the right people have the right access
- Overcoming governance challenges with apps, unstructured data, the cloud and personal devices
- Breaches that bypass the perimeter
- Creating a holistic security approach: What are the risks of doing things and not doing things
It can be a difficult task to achieve governance if you don’t have the right solutions. That’s why the second part of this webcast focuses on solutions to help you enhance your identity governance capabilities.
Asher Benbenisty, Director of Product MarketingRecorded: Apr 24 201920 mins
Firewall rules must be reviewed and recertified regularly for an organization to stay secure, ensure continuous compliance and gain the optimal firewall performance. Firewall rules which are out of date, unused or unnecessary should be removed, as firewall bloat creates gaps in your security posture, causes compliance violations, and decreases firewall performance.
However, manual firewall rule recertification is complex, time-consuming and prone to errors.
Join Asher Benbenisty, AlgoSec’s Director of Product Marketing, on a special webinar introducing an application-centric approach to firewall recertification.
In this webinar Asher will cover:
• Why it is important to regularly review and recertify your firewall rules
• How to use application connectivity for firewall rule recertification
• How to automatically manage the rule-recertification process
Dave Shackleford, SANS | David Aiken, AWS MarketplaceRecorded: Apr 24 201960 mins
True accountability for the security of cloud-based assets requires visibility into the events and behaviors that move into and through your cloud environment. Security today relies on visibility in several areas: networks, systems, storage and applications.
In this recorded webcast, SANS Analyst and cloud security expert Dave Shackleford explains how visibility in the cloud differs from more traditional security visibility and suggests how organizations can move toward establishing a cloud visibility strategy, using practical examples to illustrate the process.
Attendees will learn about:
- Types of visibility needed today
- Event data and information available in the cloud
- Cloud-native controls offered by services providers
- Third-party options to enhance monitoring and visibility strategies
- How to tie event monitoring, vulnerability scanning and control planes together to enhance visibility
Register for this webcast to be among the first to receive the associated whitepaper written by Dave Shackleford.
Dave Shackleford, a SANS analyst, instructor, course author, GIAC technical director and member of the board of directors for the SANS Technology Institute, is the founder and principal consultant with Voodoo Security. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering. A VMware vExpert, Dave has extensive experience designing and configuring secure virtualized infrastructures. He previously worked as chief security officer for Configuresoft and CTO for the Center for Internet Security.
David Aiken is a Solutions Architect Manager at AWS Marketplace and is an AWS Certified Solutions Architect. He leads a team of specialist SA's that help customers implement security and governance best practices. His skills include cloud computing, enterprise architecture, agile methodologies, web services, and software design and development.
Seyi Verma, Director of Product Marketing, DruvaRecorded: Apr 24 201956 mins
Imagine that you're responsible for a massive construction project and you just lost your data due to a disaster. Blueprints? Gone. Timelines? Gone. Drinks? Might be time for one!
Losing your data is a reality that every company faces—construction is no exception. That's why Egan Company—a leading specialty trades contractor in Minnesota, unsatisfied with their previous backup products)—turned to Druva Phoenix to ensure their critical data was backed up and fully accessible in the event of a disaster.
Join this informative webinar with experts from Egan Company and Druva, and learn about:
- The flexibility, security and value of data protection delivered as-a-service in the cloud
- How Egan Company enjoys fast, reliable restores, including large-scale VM volumes
- How Druva Phoenix offers the go-to solution for backup, archival, and disaster recovery
Künstliche Intelligenz, einst auf den Großbildschirm beschränkt, steht den Verbrauchern in Grundform mit Alexa-, Siri- und selbstfahrenden Tesla-Autos zur Verfügung. Aber was bedeutet das für die Wirtschaft? Wir haben vielleicht noch keine Ex-Machina-ähnlichen Roboter, aber engagierte "Futuristen" schließen sich in vielen Unternehmen der C-Suite an, um zukunftssichere Entscheidungen zu treffen und sich auf zukünftige technologische Innovationen vorzubereiten.
KI-Tools basieren auf datenbankgestützter, prädiktiver Technologie, die die kognitive Leistungsfähigkeit des Menschen verbessert. Lernen Sie mit uns, wie Sie mit guten Wissensmanagementpraktiken eine solide Grundlage für KI-Initiativen schaffen können.
Mark Bouchard, Co-Founder and COO, CyberEdge Group Ian Farquhar, Distinguished Consultant Sales Engineer, Worldwide SecurityRecorded: Apr 23 201959 mins
New research from CyberEdge’s 2019 Cyberthreat Defense Report shows that in spite of increasing cybersecurity budgets, organizations are dealing with ongoing cyberattacks, challenges finding and properly utilizing both human and financial resources, and obstacles to threat hunting within their environments. Sign up for this webinar to learn how to:
•Gain pervasive visibility into your network for better threat hunting
•Deal with inevitable cyberattacks, including malware, phishing and ransomware, including those that enter the organization via the supply channel
•Become more effective by delivering optimized traffic to tools
•Overcome skills shortages and retain key staff through efficiency, automation and orchestration
•Accelerate deployment and integration of new security tools
Learn how IT security pros plan to protect themselves against cyberthreats in 2019.
Eric Sheridan, Chief Scientist, WhiteHat SecurityRecorded: Apr 23 201939 mins
APIs are doors into your data and applications, so pausing to include security is just as important as securing web applications. In this presentation we will discuss best practices to ensure that APIs have full security coverage, and how teams can find and fix vulnerabilities before problems arise.
We’ll also cover the inflection points for security assessment in the software development life cycle (SDLC) as they may vary depending on whether the development team is enabling APIs for legacy applications or building new API-first applications. Join us to learn best practices on when to:
-Perform DAST of APIs for dynamic scanning, and create a plan for remediating/mitigating discovered vulnerabilities
-Perform SCA & SAST analysis for the API implementation code within the DevOps process
-Use secure design patterns within the enterprise application architecture
-Implement a robust feedback loop within the SDLC to act on the findings of various scans
Gary Rowe, CEO Principal Consulting Analyst for TechVision Research & Lisa Grady, Solutions Architect with Radiant LogicRecorded: Apr 23 201959 mins
Where is identity management heading in the next five years? Join Radiant Logic and TechVision Research for an important discussion of technology trends and learn how a federated identity and directory service is a vital part of your digital transformation.
Large enterprises often have complex identity infrastructures already in place; with identity data spread across many heterogeneous data sources—multiple AD domains and forests, other directories, databases, applications, web services/APIs—along with a multitude of legacy applications that rely on those sources. To prepare for the future of IAM, enterprises will generally require a rationalization of, integration with, and ultimately migration to this next generation identity infrastructure.
This webinar will show you:
•Technology trends and where identity management is heading in the next five years
•The role of a federated identity and directory service in digital transformation
•TechVision Research’s top 10 List of Key Identity Management Trends
Jill Reber, CEO, Primitive Logic; Kevin Moos, President, Primitive Logic; David Jarzabek, Attorney, Royse LawRecorded: Apr 23 201959 mins
The California Consumer Privacy Act (CCPA) impacts companies of all sizes, including startups and SMBs. CCPA will expand the privacy obligations of all organizations far beyond those required by current state privacy legislation (CalOPPA, etc.), and all organizations who gather and process personal data of California residents must be prepared. Fortunately, the right strategies can make this process easier than you may have thought.
Join Primitive Logic and Royse Law to learn
- Why CCPA readiness doesn’t have to “break the bank”
- How to develop a cost-effective plan to get ready for CCPA
- How to prepare for private right of action under CCPA and potential amendments
- How data privacy is becoming part of standard M&A due diligence practices
David Morris and Brian MarkusRecorded: Apr 23 201962 mins
Tune into this session to learn how to determine if you have the right people with the sharpest skills defending your organization through the use of a Cyber Training Range.
Learn what are Persistent Cyber Training Range Environments, the benefits and value of a Cyber Training Range and how they help you answer the question ARE WE READY TO DEFEND AGAINST THE NEXT ATTACK?".
Mission Critical InstituteRecorded: Apr 23 201927 mins
Learn about the CISSP employment endorsement and the CISSP Associate Status.
In Clinic #5, you will learn about the CISSP employer endorsement and how it works. You will also learn what happens when you pass the exam but still cannot meet all of the CISSP employment requirements. Specifically, you receive information about the CISSP Associate status and how employers will respond to you when you pass the exam and still need more experience.
If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:
• The new CISSP exam format, the “adaptive exam format”
• How hands-on labs will help you prepare for your exam
• Tactics to select the best answer for each question
• How to get your employment endorsement and what happens if you need more experience
These five Clinics include tips for all 8 CISSP domains covered in the exam.
Victoria McIntosh, Information & Privacy ProfessionalRecorded: Apr 23 201955 mins
Surf's up! Coming into force in 2020 is the California Consumer Privacy Law. As a new privacy law in the United States, the CCPL breaks significant ground. Following international trends, those living in California will soon have stronger privacy rights.
If you do business in the state or process data on California residents, time to pay attention. Get amped with Privacy Technologist Victoria McIntosh, breaking down what you need to know about the new regulation.
Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. A confluence of trends has caused all the right conditions for the perfect and potentially devastating security event. This session will immerse you in this rapidly evolving topic and provide you with the expertise to weather the next category 5 cyber storm.
The Financial Services Industry is heavily regulated and is also a major target for cyber crime. Conducting periodic Security Risk Assessments is not only a best practice but often may be a requirement. Learn from a leading Cybersecurity expert about the process of conducting security risk assessments in the financial services industry.
CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
Rahul Vir, Juniper Networks, Jeff Aaron, Mist Systems, Mitchel Davis, Dartmouth College, and Felix Windt, Dartmouth CollegeRecorded: Apr 23 201960 mins
When it came to deploying a new network across campus, Dartmouth College came to an important realization - students learn best when the network is learning, too.
In this webinar, the Dartmouth IT team is joined by experts from Mist and Juniper to describe how an AI-driven network is being used to deliver new learning experiences on campus.
Watch now, and learn how to:
-Gain visibility into the Wi-Fi user experience
-Quickly troubleshoot network problems with an AI-driven virtual assistant
-Predict network problems before they arise
-Implement personalized location services, such as wayfinding and proximity notifications
Jade McQueen, Senior Managing Director, Media & EntertainmentRecorded: Apr 23 201922 mins
Travaillez, stockez et collaborez en toute sécurité sur vos différents actifs multimédias
Des images de campagne marketing aux fichiers vidéo, les ressources numériques sont au cœur des flux de travail de toutes les entreprises. En l'absence d'un système centralisé de gestion des actifs numériques, il devient difficile de rechercher le bon actif lorsque vous en avez besoin. La gestion de contenu peut rapidement devenir un défi lorsque les ressources sont modifiées et sauvegardées dans différents systèmes. En outre, un manque de mesures de sécurité adaptées crée des risques de perte de documents confidentiels ou non publiés. Box fournit un guichet unique pour tous vos actifs numériques, quel que soit leur format et vous permet de collaborer en temps réel avec des commentaires et un marquage automatisé des métadonnées afin que tout le monde puisse facilement trouver la dernière version. De plus, Box vous permet d'automatiser intelligemment les workflows jusqu'à l'approbation, en évitant les erreurs dues à des tâches manuelles. De la création à la publication, vous pouvez gérer tous vos actifs numériques de manière sécurisée et efficace.
Kim Øystein Næss, Lead Architect Analytics EMEA, Hitachi VantaraRecorded: Apr 23 201926 mins
Watch this session to get insights on:
- The value of an easy to use interface with advanced capabilities for data engineering
- How to correctly process data engineering.
- The collaboration between business analysts, data scientists and data engineers
Anand Visvanathan, Director of Product Management, Symantec and Linda Park, Sr. Manager IaaS, Security & Compliance, SymantecApr 25 20195:00 amUTC45 mins
Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.
Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.
Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.
During this webinar, you'll learn:
• Why traditional security monitoring tools cannot provide visibility into cloud compliance risks
• Why Security and DevOps teams need automated cloud security
posture management (CSPM) tools to remove compliance bottlenecks
• How to migrate your legacy infrastructure to the cloud without compromising security and compliance
Richard Leadbetter, Technical Sales Specialist, EMEAApr 25 20199:00 amUTC30 mins
By 2019, 92% of industrial organizations will have adopted Internet of Things (IoT) technology and 77% believe it will transform manufacturing. But, how are business executives using IoT today and what do they expect from it in the future? Join us and find out
Jenni Lee, Product Marketing Manager, AcquiaApr 25 201910:00 amUTC28 mins
In this webinar, we will cover the following topics:
- How to transform your IT digital team from a “bottleneck” to a trusted service provider
- How to implement a site-governance strategy across your organization
- Best practices for expediting website development and delivery
Vincent Lieffroy, Senior Lead EngineerApr 25 201912:30 pmUTC60 mins
Les entreprises doivent agir plus rapidement que jamais dans un monde caractérisé par une hyper-concurrence et par les attentes grandissantes des clients.
C'est pourquoi nous avons conçu le Cloud Content Management (CCM) - une plate-forme unique pour accélérer vos processus métier, augmenter la satisfaction de vos employés et protéger vos informations les plus précieuses. Découvrez les nouveautés du cloud content management (CCM) en assistant à ce webinaire:
- Collaboration aisée et sécurisée dans Google Docs, Sheets et Slides, grâce à notre nouvelle intégration avec G-Suite
- Productivité permanente avec Mark for Offline - emportez vos fichiers Box avec vous lorsque vous n'êtes pas en ligne (vos modifications sont automatiquement enregistrées dans Box lorsque vous vous reconnectez)
- Des workflows de contenus fiabilisés avec Box pour ServiceNow Integration Hub
- Des cycles de développement d'applications accélérés avec Box Elements
Anass Bezzari, Senior Pre-Sales ConsultantApr 25 201912:30 pmUTC60 mins
Selon une étude de la Harvard Business Review, en moyenne 47% des nouvelles données ont, au moins, une erreur importante.
Que vos données soient structurées, non structurées, stockées sur site ou dans le Cloud, vous devez pouvoir vous fier à leur exactitude. Vous concrétiserez leur valeur métier en veillant à ce que tous les projets et les processus importants soient alimentés en données fiables et pertinentes.
Avec les produits de qualité et de gouvernance des données d'Informatica, vous avez la possibilité d'accroître la valeur métier en veillant à ce que tous les projets et les processus importants soient alimentés en données fiables et pertinentes.
Bill Belcher, Amit Kharat, Kristina ScottApr 25 20193:00 pmUTC45 mins
Recent innovations have made data security achievable for organizations of all sizes and industries. It’s now possible to quickly and effectively reduce the risk of data breaches and leaks.
Get up to speed with the 5 innovations every Security and IT professional should be aware of – to gain the confidence that their organization’s most sensitive information stays secure, these include:
1. Classification-driven protection
2. DLP-driven protection
3. Email auto-protection
4. Automated protection with enterprise applications
5. Orchestrated policy management, identity federation, and data tracking for compliance
Join this webinar to learn how integrated data classification and data protection from two industry leaders, Boldon James and Seclore, makes data security as straightforward as 1-2-3.
Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEAApr 25 20193:00 pmUTC60 mins
As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.
So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.
From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.
Moderator: Daniel Blander, Virtual Clarity
Joseph Feiman, Chief Strategy Officer, WhiteHat Security
Paul Farrington, CTO, Veracode EMEA
Robert Nicklin, Product Owner, Blue Prism | Bart Peluso, SVP of Product Marketing, Blue PrismApr 25 20193:00 pmUTC75 mins
Join us on April 25th for a preview of find out what is coming with Blue Prism’s v6.5.
The latest version of our software will include:
• Full Japanese and simplified Chinese language capabilities - Through a simple drop-down box a customer can select their preferred language on the Blue Prism UI.
• Data gateways - A new mechanism that allows customers much more control of their data, with the option to send data as duplicates of what is stored in the BP database or to send the information only to the external end point, significantly reducing the amount of database space used for data storage.
• IPv6 support - Through this feature Blue Prism customers can be confident our connected-RPA platform is ready to evolve with customer environments as they plan, test and take actions to start their transition to using IPv6.
• Latest updates from the Blue Prism Digital Exchange
• Robert Nicklin, Product Owner, Blue Prism
• Bart Peluso, SVP of Product Marketing, Blue Prism
• Richard Pauly, Head of Digital Exchange, Blue Prism
If you have a burning product question to ask, make sure to pre-register and join us on April 25th for this live webinar. If you can’t make it on the day, you can easily watch a recording of the session from our webinar page, after the event.
Erik Decker, CISO & CPO, University of Chicago Medicine & Ellen Sundra, VP of Engineering at ForescoutApr 25 20193:00 pmUTC60 mins
Join Erik Decker, Chief Information Security Officer and Chief Privacy Officer of the University of Chicago Medicine and Ellen Sundra, VP of Engineering at Forescout, to learn how to protect patients by applying the recommended principles and practices from Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP).
Over the past decade, threats to the health care industry has increased dramatically along with the sophistication of cyber-attacks. As a result, the Healthcare Sector Coordinating Council and the US Department of Health and Human Services collaborated to establish cybersecurity practices that can be used across the healthcare industry. Our guest, Erik Decker, serves as the industry lead on the development of, “Health Industry Cybersecurity Practices (HICP)”, which resulted from insights of the task group and over 150 health IT professionals.
Ellen Sundra leads this discussion to gain insights into actionable steps that health industry IT and HTM security professionals can establish, implement and maintain in their organizations to thwart cyber-attacks before they occur.
What you will learn in this webinar:
- How to reduce risk to the business by implementing solid security practices
- Which are top security practices to consider when facing some of healthcare’s top issues
- How using policy-based controls can simplify processes and protect the organization
Jimmy Lin, Sr. Product Manager, SymantecApr 25 20193:00 pmUTC60 mins
On 29 March 2019, we further extended the capabilities of Symantec Email Security.cloud. As a SaaS security service, it undergoes many upgrades throughout the year, allowing us to make improvements and add new capabilities. We have always understood the importance of ensuring our products are designed around the user’s needs. This is critical as our customers rely on Symantec to provide a highly practical solution.
In this webinar, we’ll do a deep dive into some of the recent enhancements of our Email Security.cloud solution:
Indicators of Compromise Blacklisting
Service Configuration Health
Symantec Email Security.cloud App for QRadar
George Johnson, Vice President of Cyber Solutions, NC4 and Thanh Nguyen, Vice President of Technology, NC4Apr 25 20194:00 pmUTC43 mins
We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?
NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
Mark Rogan, DAST Manager, WhiteHat Security & Calvin Nguyen, Director of Product Management, WhiteHat SecurityApr 25 20194:00 pmUTC60 mins
Today’s applications touch millions if not billions of people on a daily basis. With virtually every business using applications to grow, they are critical to companies’ success—yet the vulnerabilities and risks associated with them continue to increase exponentially.
To help educate the market on avoiding breaches of this nature, the experts at the WhiteHat Security Threat Research Center (TRC) have compiled a Top 10 Application Security Vulnerabilities for Developers, detailing the most common web exploits used by malicious attackers during the past 12 months.
Join Mark Rogan from the WhiteHat Security Threat Research Center and Calvin Nguyen, Director of Product Management, as they discuss the top vulnerabilities and give valuable prevention tips for enterprises to implement.
Bob Maley, Normshield; Tony Rock, LockpathApr 25 20194:00 pmUTC60 mins
Interaction between the financial industry and third-parties has become more complicated due to the combined risk of the financial industry's rapid growth and an increase in third-party relationships.
In this exclusive webinar, Bob Maley, Chief Security Officer of Normshield, Inc., who designed information security programs from the ground up for major financial services organizations, will share his perspective of third-party risk in the financial services industry. He’ll discuss common financial third-party risk challenges and trends in the market, best practices and challenging scenarios from his career and how he resolved them.
As an attendee you’ll learn how his real-world third-party risk examples, best practices and recommendations can apply to your organization’s unique needs. Discover how to build and mature a successful third-party risk program in financial services by attending this educational webinar.
Dr. V. N. Berlin, CEO, Mission Critical Institute, Rob Chubbuck, Information Assurance Systems Engineer, CACI InternationalApr 25 20194:30 pmUTC60 mins
Hear from a top cyber security employer exactly how you can get hired for a cyber breach prevention job without a degree in this four-part webinar series.
Let Rob Chubbuck, senior cyber security expert at CACI International, tell you how he decides to hire candidates without degrees to cyber security teams.
This webinar series will take you inside the recruiting process and you will learn the answers to these questions:
1. How big is the opportunity for cyber breach prevention?
2. How fast is that opportunity growing?
3. Why will he consider candidates without a degree?
4. What skills does he look for in a candidate?
5. What tools does he want a candidate to have experience using?
6. What experience should a candidate have for him to consider without a degree?
7. What personal characteristics are essential to him?
8. What academic credentials does he want a candidate to have?
9. What additional academic credentials does he want a candidate to earn?
10. What certifications does he want a candidate to have?
11. What additional certifications does he want a candidate to earn?
12. What does he look for in a resume to schedule a phone screen?
13. What must a candidate do in a phone screen to get the interview?
14. What kinds of questions are asked in the interview?
15. What answers does he look for?
16. What professional development plans does he want candidates to have?
This unique webinar series will tell you exactly what motivates an employer to hire a candidate without a degree into a top cyber breach prevention position.
Seating is limited to 75, so register now to reserve your spot!
ADDED WEBINAR BENEFITS: Register for the webinar and download the attachments to prepare for the interview. Download the CCRMP Career Readiness Assessment and schedule an interview with an MCI Cybersecurity Education Specialist to fast-track your cyber security career today.
Also included are complimentary $500 CISSP Exam Vouchers and $1995 CISSP Exam Prep Course Vouchers.
Tom DiRusso, ASG & Steve Studer, Zia ConsultingApr 25 20195:00 pmUTC45 mins
Are you one of the many organizations with content in a variety of silos? You probably are – and you’re not alone - most organizations today are also siloed. It’s clear that this siloed approach creates a huge challenge for companies in meeting stringent compliance regulations. Sound familiar? Now, imagine if your Teams had the ability to search and action content as though it resided in one location – with easy access and usability. Get the picture?
Join ASG & Zia to discover how you can gather and understand your content across various silos to ensure you are on the ‘Offensive’ with compliance regulations.
During this session, we’ll discuss:
- Why some of the largest financial institutions have taken an ‘Offensive Approach’ to managing static and streaming content to comply with laws and regulations
- How you can federate, migrate and manage records in one place
- New ways to identify, classify and dispose of records
- Why it’s critical to have a records management solution that has a repository of records that is auditable and defendable
Rob Long, Head of IoT & Senior Director Applied Technology at Stibo & Vishnu Samavedula, Senior Solution Engineer at MuleSoftApr 25 20195:00 pmUTC35 mins
Did you know that each retail customer transaction takes an average of 39 different backend systems to complete? Overlapping systems, complex backend integrations, and constant maintenance needs are crippling IT teams as they work to drive the innovation necessary to meet growing consumer expectations.
This webinar examines how retailers are leveraging MuleSoft’s Anypoint Platform and Stibo Systems Master Data Management platform to bridge online and offline channels, resulting in deeper customer insights, simplified operations, and exceptional customer experiences. Retailers leveraging this approach are seeing an average of a 6% increase in profitability and a 6x increase in customer retention
In this webinar, you will learn how to:
- Streamline product lifecycle management processes with your eCommerce systems.
- Leverage Master Data Management to gain visibility across inventory and customer data.
- Deliver personalized customer experiences based on past behaviors and purchases.
Mark Sarbiewski and John KlassenApr 25 20195:00 pmUTC45 mins
Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.
Social networks today are undergoing a massive paradigm shift when it comes to content moderation. From tragic shootings broadcast live on Facebook, to YouTube removing comments on children's videos due to child predator concerns, social platforms are under fire from users, governments, and law enforcement to adopt better technology and strengthen their content moderation practices.
It’s not all bad news. Business leaders have also realized that accurate, efficient moderation, coupled with positive reinforcement, can increase user retention and encourage growth.
But who is responsible for enforcing these policies and practices? How did hate speech, abuse, and extremism become the "cost of being online"? And how can like-minded businesses band together to raise the bar and make their social platforms engaging, safe for all users, and ultimately, more profitable?
Join Two Hat CEO and founder Chris Priebe and veteran analyst and market influencer Brian Solis for an insightful talk about the changing landscape of online conversations and the role of content moderation. Social abuse and objectionable materials need no longer be the price of admission.
Register today for this free event!
* How to start a dialogue in your organization around protecting your audience without imposing on free speech
* The business benefits of joining the growing movement to "raise the bar"
* Practical tips and content moderation strategies from industry veterans
* Why Two Hat’s blend of AI+HI (artificial intelligence + human interaction) is the first step towards solving today’s content moderation challenges
* Brian Solis, Principal Digital Analyst at Altimeter, author of "Lifescale"
* Chris Priebe, CEO & founder of Two Hat Security
* Stewart Rogers, VentureBeat
Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator)Apr 25 20195:00 pmUTC60 mins
In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
Neil Thacker, CISO, NetskopeApr 25 20195:00 pmUTC60 mins
In a globally connected world where the number of cloud applications consumed by organisations rises daily, the challenges associated with protecting data and individual’s privacy are therefore also on the rise.
In this webcast we will look at some of the challenges associated with privacy including:
- Understanding contractual obligations
- Managing the geolocation of data
- Applying data transfers mechanisms and controls
Colin Whittaker, IRD; Jake Olcott, BitSight; Blake Brannon, OneTrust; Kelly White, RiskRecon; and Todd Boehler, ProcessUnity.Apr 25 20195:00 pmUTC75 mins
In today’s interconnected technology ecosystem, companies increasingly rely on third party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.
Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program. Join this CPE accredited panel webinar as our expert panel address some key steps to master VRM, including:
- Implementing a scalable VRM program from the ground up,
- Tips on managing vendor data and mapping the digital supply chain,
- Assessing third, fourth, and fifth-party risk,
- Performing quantifiable vendor security analyses,
- Establishing pre-procurement standards.
Join for a play-by-play of a live attack simulation and investigation of a rogue insider threat using DatAlert’s new DFIR capabilities.
During this training session, our security analysts will execute a new attack scenario in our lab.
Here’s the scenario:
An insider was paid to exfiltrate sensitive organizational data
To remain uncovered, he takes control on a service account
Using the service account, he scans company filers for documents with indicating keywords
Copies matching documents to his PC
Creates an encrypted ZIP file
To remain uncovered, he uses the service account to upload the ZIP file to an external Gmail account
Louis Evans, Product Marketing Manager & Todd Thiemann, Director of Product Marketing - Arctic Wolf NetworksApr 25 20196:00 pmUTC48 mins
At Arctic Wolf, we continually encounter IT security myths that persist among businesses of every size. Isn’t antivirus all you need for cybersecurity? Aren’t large enterprises the only ones affected by data breaches? 24x7 security monitoring is overkill, right? These myths can significantly impact strategic IT decisions and put your business operations at risk.
These are the kinds of questions, myths, and cybersecurity urban legends we’ll explore in this webinar. Discover what’s true—and what’s simply a myth.
The webinar covers:
•6 common myths about cybersecurity and cyber risk
•The threats these myths pose to your business
•Cybersecurity facts you can use to protect yourself
Let the Arctic Wolf Cybersecurity Mythbusters team educate and entertain you. Save your seat now!
And click here: http://bit.ly/2B3lyFv for part one of our six-part “mythbuster” blog series.