Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • VirusTotal: Renforcez vos équipes de threat intelligence et recherche de menaces
    VirusTotal: Renforcez vos équipes de threat intelligence et recherche de menaces
    Patrice Puichaud, Manager Avant-Ventes, Google Cloud Security Live 22 mins
    Nous allons, durant ce webinaire, faire un tour d’horizon des fonctionnalités de VirusTotal Intelligence et de VirusTotal Hunting. Nous vous montrerons comment vous pouvez identifier facilement les malwares qui vous intéressent au sein de notre vaste base de données et comment surveiller des menaces potentielles.
    Nous vous montrerons comme une investigation peut commencer autour d’un malware dont on sait peu de choses. Puis comment un analyste sécurité pourra ensuite s’appuyer sur VirusTotal pour détecter des variantes de la menace initiale et les techniques que les groupes d’attaquants utilisent.

    Découvrez comment VirusTotal peut vous aider à :
    Enrichir les connaissances de vos équipes Sécurité.
    Répondre aux incidents.
    Détecter les menaces.
  • Best Practices for Avoiding a Data Breach
    Best Practices for Avoiding a Data Breach
    Bob Bragdon, SVP/Managing Director of CSO, Worldwide, IDG and Ravi Srinivasan, VP Solutions & Platform Marketing, Forcepoint Live 24 mins
    New IDG research found that most companies that didn’t suffer a breach in the last year still cite data security as a sticking challenge. But why? In this webcast, Forcepoint VP of Platform and Solution Marketing Ravi Srinivasan sits down with IDG’s Bob Bragdon to discuss the research and what companies like yours can do to stay secure.

    Watch now to learn:
    - Challenges of securing data moving between on-prem and the cloud
    - Tips and takeaways from data-secure companies
    - Technologies they’ve used to prevent breaches
  • Ransomware lauert schon um die Ecke -- Sind Sie vorbereitet?
    Ransomware lauert schon um die Ecke -- Sind Sie vorbereitet?
    Manfred Erjak Live 60 mins
    Ransomware ist eine der aktivsten und tiefgreifendsten Cyber-Bedrohungen, mit denen Unternehmen heute konfrontiert sind. Jahre nach den Angriffen von Wannacry auf Unternehmen auf der ganzen Welt dominieren Ransomware-Infektionen kontinuierlich die Schlagzeilen und Vorstandsdiskussionen. Angreifer haben fortschrittliche Techniken entwickelt, bei denen Unternehmen nun eine ganzheitliche Strategie zur Minderung des Sicherheitsrisikos anwenden müssen.

    • Lernen Sie moderne Ransomware-Trends und das Verhalten von Angreifern kennen
    • Erkennen Sie, warum proaktive Assessments bei der Vorbereitung und Verhinderung von Ransomware von entscheidender Bedeutung ist
    • Implementieren Sie wirksame Strategien zur Schadensbegrenzung, um Ransomware-Angreifer zu stoppen
  • Automatisation de l'analyse des données sécurisées avec Privitar et BigID
    Automatisation de l'analyse des données sécurisées avec Privitar et BigID
    Sebastien Cognet, Privitar and Jean-Michel Kaçmann, BigID Live 45 mins
    L'avènement de l'ère de la confidentialité des données amplifie les contraintes liées à la conformité et à la réglementation. Ce phénomène empêche à de nombreuses organisations de mettre en œuvre des stratégies de croissance et d'innovation fondées sur les données. La pression concurrentielle étant de plus en plus forte, pour mieux comprendre les attentes des clients et y répondre, il est nécessaire de s'appuyer sur les données des entreprises ainsi que celles des sources externes.

    Les réglementations relatives à la gouvernance et au respect de la vie privée ainsi que le risque inhérent aux données sensibles entraînent des pratiques de gestion des données lourdes qui bloquent les projets.

    L'automatisation des stratégies de réduction des risques liés à la protection des données peut permettre aux entreprises de tirer avantage de la flexibilité technique et financière des offres de services « cloud » comme Amazon Web Services (AWS), Google (GCP) ou Microsoft Azure pour accélérer l’innovation par les données.

    Rejoignez nous pour découvrir comment BigID et Privitar s'associent pour:

    - Rationaliser la découverte des données afin d'identifier toutes celles qui doivent être protégées
    - Appliquer à ces données à caractère personnelle un large éventail de règles pour assurer leur protection afin de minimiser les risques
    - Fournir aux applications d'analyse, des données dans le « Cloud » riches, sûres et pleinement exploitables.

    Grâce à ces nouvelles possibilités, les entreprises seront en mesure de d'accélérer leur initiative data-driven dans une économie toujours plus digitaler.
  • Preparing Enterprise Cybersecurity for a post-COVID19 world
    Preparing Enterprise Cybersecurity for a post-COVID19 world
    Murali Palanisamy, Chief Solutions Officer, AppViewX and Alon Nachmany, Director of Customer Success, AppViewX Recorded: Oct 1 2020 43 mins
    Welcome to our Virtual Panel series where we discuss all things cybersecurity and PKI, and how businesses can benefit from them. These interactive sessions are chaired by leaders in cybersecurity and business, and allow attendees to interact and engage with them in every 45-minute session. Make sure you drop by!

    In this first session, we’re tackling a hot topic: what will cybersecurity look like once the pandemic passes? Among the several paradigm-shifting changes to lifestyles, none stand out more than remote work. Touted as the ‘new normal’ for employees worldwide, remote workforces are also a cause of concern for security leaders and CISOs, who are slowly becoming aware of the threats this may pose to their security strategy,

    Cybersecurity policy and PKI need to evolve and become fully agile. The only way to do that is automation, and that is the key to setting up post-COVID security strategy.

    Key Takeaways -
    • The impact of COVID-19 on cybersecurity
    • Emerging Trends
    • The relevance of PKI in making security remote-ready
    • How can certificate lifecycle automation help?
    • Case Study
  • Make Zero Trust a Strategic Priority – Tips and Advice from Forrester
    Make Zero Trust a Strategic Priority – Tips and Advice from Forrester
    David Holmes, Senior Security & Risk Analyst, Forrester; Ruvi Kitov, CEO & Co-Founder, Tufin; Alex Apt, Solutions Architect Recorded: Oct 1 2020 60 mins
    Join David Holmes, Senior Security & Risk Analyst at Forrester, as he shares advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.

    Please join us on October 1st to learn about the importance of defining a Zero Trust network access strategy and roadmap, how this will help align many other security initiatives, and the major challenges likely to be encountered. David will impart his view on:
    • Why Zero Trust should be a strategic priority that drives technology adoption
    • The importance of network segmentation, visibility, and continuous inspection to enable Zero Trust
    • How vulnerability management is integral to the success of Zero Trust initiatives and how they can work hand in hand
    • The cost, productivity, compliance and security benefits of consolidating multiple security functions into a single platform
    • Ways to leverage Zero Trust to foster close relationships with other technology teams and break down silos
  • [APAC] 5 Reasons to Outsource Detection & Response Operations
    [APAC] 5 Reasons to Outsource Detection & Response Operations
    Chris Hartley - Regional Director for UK & Ireland, Rapid7, and Warwick Webb - Security Practitioner, Rapid7 Recorded: Oct 1 2020 38 mins
    Security has played a positive role in enabling business over the recent weeks. This has been demonstrated by allowing remote workforces to remain productive and the hard work of security teams to keep operations running. However all this is putting a strain on the internal resources trying to protect their critical business assets from both external attackers and insider threats.

    At Rapid7 we are taking a practical role in helping ensure security advice and guidance is available for all, and we will be running a series of talk tracks to help provide a measured perspective on how to remain secure and operational with the resources you have.

    Join us for this live talk where Chris Hartley, Director at Rapid7 UK & Ireland, and Warwick Webb, Security Practitioner, will discuss the top 5 reasons why some organisations are looking to augment or outsource their threat detection and response operations including:

    · Talent shortage in cybersecurity and why specialisation is key
    · Business continuity and the impact of ‘always on’
    · Threat intelligence and global visibility of the threat landscape
    · Role of threat hunters in incident response

    We’ll also be joined by customer, Simon Parry from the Development Bank of Wales to reveal how they are using managed services in their own environment and which elements of managed detection and response are most important the success of their security program.
  • Using automation to secure your remote workforce
    Using automation to secure your remote workforce
    Karl Klaessig, Director of Product Marketing for Security Operations Solutions, ServiceNow Recorded: Oct 1 2020 33 mins
    After years of keeping personal devices with dubious security at arm’s length, BYOD is suddenly necessary for remote employees. Learn the various solutions CIOs and CISOs are now using to help secure their remote workforces during these uncertain times.

    Join Karl Klaessig, our Director of Product Marketing for Security Operations Solutions, as he shares insights on:

    - Mitigating enterprise security risks from BYOD
    - Securing your remote workforce via automation
    - Ensuring resilience for your critical business operations
  • Building for Tomorrow - Digital Integration Hub - access your data in real-time
    Building for Tomorrow - Digital Integration Hub - access your data in real-time
    Rully Feranata - Bank Mandiri; Derrick Loi - Microsoft; Michael Henry - Former Global Head of Digital Experience, BHP Recorded: Oct 1 2020 115 mins
    Learn how to build for tomorrow with industry experts and customers who will share ideas on how to jump start or advance your digital strategy in the new reality.
    Opening - Anneliese Schulz , President, Software AG APJ
    Keynote: Outlook - Michael Henry , Former Global Head of Digital Experience of BHP, Thought Leader , Keynote Speaker
    Customer Interview - Rully Feranata, Solution Architecture, Bank Mandiri Indonesia
    Partner Keynote - Derrick Loi, GM, Apps & Infrastructure , Azure Solutions, Microsoft
    Power Digital Transformation with a Digital Integration Hub- Sachin Gadre, VP Product, Integration & API, Software AG
    Q&A and Closing Remarks (and Lucky Draw) - Michael Henry

    Other sessions, click here :
    September 9th: https://bit.ly/3fb00HX - IoT, the Ace Up Your Sleeve
    September 16th: https://bit.ly/3jVRsbv - Digital Transformation- PwC and Petronas Malaysia
  • 金融業界のDXを取り巻くデータ脅威の動向、各組織の取り組みを解説
    金融業界のDXを取り巻くデータ脅威の動向、各組織の取り組みを解説
    タレスジャパン株式会社、クラウドプロテクション&ライセンシング、シニアテクニカル スペシャリスト 畑瀬 宏一 Recorded: Oct 1 2020 45 mins
    タレスでは、3回に渡りウェビナーを開催して参ります。

    第1回のウェビナーは、「2019年タレス データ脅威レポート 金融サービス版」から、100の米国金融サービス組織の回答者からの調査結果をまとめた具体的なデータ結果に基づき解説してまいります。金融業界におけるDXが、金融サービスの機密データにどのような影響を与え、各組織はその保護にどう取り組んでいるのか、マルチクラウド利用が増加する中で、法規制に対応しながら効果的に機密データを保護することの重要性について考察していきます。

    また、451リサーチ社による「決済のグローバル動向」やアバディーン社のレポートから、年間の運用コストの削減、データプライバシー、データセキュリティやコンプライアンスや法制度の遵守など、昨今のDXにおける複雑な環境の中で求められる機密データの保護や暗号化の重要性などにも触れながら、業界動向をご紹介いたします。
  • Enhance Your CDH and HDP Clusters in the Cloud
    Enhance Your CDH and HDP Clusters in the Cloud
    Sushant Rao, Gaurav Patel Recorded: Oct 1 2020 57 mins
    Due to cloud’s agility, elasticity, and global scale, many companies have deployed their Cloudera Data Hub (CDH) and/or Hortonworks Data Platform (HDP) clusters to this environment. Using the cloud in an Infrastructure-as-a-Service model, companies can easily add (virtual) infrastructure as needed to their clusters. But, neither CDH nor HDP was designed to take advantage of cloud technologies.

    Join us for this webinar as we discuss Cloudera Data Platform (CDP) - Public Cloud, which has been built from the ground up to take advantage of the cloud, including object stores and containers. See how CDP - Public Cloud delivers a cloud-native experience with:

    Lower costs

    Faster analytics

    Easier security and governance

    Reduced operational risk

    This webinar will include a comparison of running CDH and HDP in the cloud with CDP - Public Cloud as it relates to functionality, TCO, and customers’ experiences. We will also discuss how easy it is to move your workloads from CDH / HDP in the cloud to CDP - Public Cloud.
  • Asset Management - with Digital Twins
    Asset Management - with Digital Twins
    Alasdair Hutcheson - ICON RISK, Sumit Bhandari - VCG Digital Recorded: Sep 30 2020 59 mins
    Learn why Asset Management with Digital Twins is the new normal. Understand the information life cycle, why cyber security is paramount and how ARIS as the digital solution for information management can facilitate the end-to-end asset life cycle.

    The webinar will cover:
    Digital Twins: Public policies, ISO standards, and structured processes
    Information life cycle and cyber security
    Demo: Using Digital solutions for information management across the end-to-end Asset life cycle
  • Make Zero Trust a Strategic Priority – Tips and Advice from Forrester
    Make Zero Trust a Strategic Priority – Tips and Advice from Forrester
    David Holmes, Senior Security & Risk Analyst, Forrester; Ruvi Kitov, CEO and Co-Founder, Tufin Recorded: Sep 30 2020 58 mins
    Join David Holmes, Senior Security & Risk Analyst at Forrester, as he shares advice and insights garnered from conversations with hundreds of security & risk professionals as well as his own research.

    Please join us on September 30th to learn about the importance of defining a Zero Trust network access strategy and roadmap, how this will help align many other security initiatives, and the major challenges likely to be encountered. David will impart his view on:
    • Why Zero Trust should be a strategic priority that drives technology adoption
    • The importance of network segmentation, visibility, and continuous inspection to enable Zero Trust
    • How vulnerability management is integral to the success of Zero Trust initiatives and how they can work hand in hand
    • The cost, productivity, compliance and security benefits of consolidating multiple security functions into a single platform
    • Ways to leverage Zero Trust to foster close relationships with other technology teams and break down silos
  • Three Reasons Why You Should Outsource Your IT
    Three Reasons Why You Should Outsource Your IT
    Nick Cavalancia Recorded: Sep 30 2020 44 mins
    Small and mid-sized businesses (SMBs) have unique challenges when it comes to IT. Like with larger organizations, there’s a need to leverage technology to innovate, increase productivity, and drive profitability, but without the luxury of a well-staffed IT team. MSPs help SMBs gain access to the technology that can help achieve their goals - along with the experts to manage it and keep their data secure and protected.
  • SECtember Experience Wrap-Up: Guiding your Race to the Cloud
    SECtember Experience Wrap-Up: Guiding your Race to the Cloud
    Jim Reavis, CEO, Cloud Security Alliance Recorded: Sep 30 2020 56 mins
    In this session, Jim will take a look back at the critical topics covered throughout this month-long SECtember Experience and highlight key takeaways that can help guide you on your race to the cloud. How do you move forward and leverage the information and tools you collected during this past month? Jim will provide his insights and a roadmap ahead as you look to navigate the challenges of the current cloud climate.
  • Under Pressure – Building Security into Application Development
    Under Pressure – Building Security into Application Development
    Patrick Carey, Director Product Marketing, Synopsys and Dave Gruber, Senior Analyst, Enterprise Strategy Group Recorded: Sep 30 2020 62 mins
    A recent study by Enterprise Strategy Group, commissioned by Synopsys, revealed that nearly half of the cybersecurity and development professionals surveyed indicate that their organization knowingly pushes vulnerable code into production due to time pressures. In every sector, development and security teams grapple with the competing demands of development velocity and application security.

    In this webinar, we speak with the study’s author, ESG Senior Analyst, Dave Gruber, about how organizations are working to build security into their development toolchains and processes. Highlights include:

    - Why many organizations’ AppSec programs aren’t as effective as they think.

    - Key attributes of the most successful AppSec programs.

    - Trends and challenges organizations are facing in implementing their AppSec programs.

    - How organizations are working to improve AppSec ROI while simplifying deployments.
  • Live Demo: Advanced People-Centric Cybersecurity for Cloud Applications
    Live Demo: Advanced People-Centric Cybersecurity for Cloud Applications
    Anthony Dimeo, Sr. Sale Engineer at Proofpoint Recorded: Sep 30 2020 34 mins
    What are the best practices for building a people-centric cybersecurity strategy and where should your organization start? Proofpoint has revamped our three-phase cybersecurity maturity model to help you elevate your advanced email security, stop business email & account compromise, and protect your cloud applications.

    Join us for a live demo to learn how you can complete your people-centric security journey and see the tools in action. In this last phase of three phases, we’ll demonstrate how to:

    - Protect your people and defend your data as your organization works with O365, G Suite, and other cloud applications
    - Leverage Proofpoint’s CASB solution to gain a centralized view of your cloud environment
    - Block threats associated with compromised accounts, risky third-party apps, and the misuse of valuable data
  • The Math Behind Bot Management
    The Math Behind Bot Management
    Rob Yates, Senior Solutions Engineer and Adam Torres, Solutions Engineer Recorded: Sep 30 2020 68 mins
    Sophisticated bot attacks could put revenue, productivity, and reputation all at risk. No matter what your organization is calling it — credential abuse, credential stuffing, bad bots, or account takeover — preparing for and preventing these automated attacks doesn’t need to be your Achilles’ heel.

    Join Rob Yates, Senior Solutions Engineer and Adam Torres, Solutions Engineer at Akamai for an interactive workshop and a behind-the-scenes look at the configured actions on bot activity at the edge server.

    In this 45-minute workshop, Rob will cover:

    - Why bot detection is important, and the costs of bots to business and IT
    - The architectural challenge to employing today’s bot management solutions effectively
    - Best-practice approaches to bot management, including mobile SDK
  • Automation in the Post-Pandemic Contact Center
    Automation in the Post-Pandemic Contact Center
    Paul Stockford, President and Chief Analyst, Saddletree Research and Bruce Mazza, VP, Technology Alliance Program, Blue Prism Recorded: Sep 30 2020 62 mins
    The essential role of automation in the contact center was played out thousands of times as the global contact center industry scrambled to maintain customer service and satisfaction levels amidst an unprecedented global health crisis. Add to these challenges the role of automation in the expectations and requirements of the new generation of contact center customers and workers, and it becomes clear that “business as usual” in the future will be anything but.

    Automation has the power to dramatically and positively impact both customer satisfaction and employee job satisfaction while enabling customer service executives to manage costs in the uncertain economy that potentially lies ahead.

    Join us to hear from Blue Prism’s Bruce Mazza, VP, Technology Alliance Program and Paul Stockford, President and Chief Analyst at Saddletree Research, who specializes in contact centers & customer service. Bruce and Paul will share how automation is delivering true business value and rapid ROI to contact centers throughout the world and how you can get started on your automation journey today.

    In this event, find out the secret weapon that other large enterprises are using to:
    * Deliver an optimized customer experience while their agents provide excellent service
    * Protect client data and ensure that their contact center is in compliance with privacy mandates
    * Attract and retain top-tier customer service talent
    * And so much more...
  • Improving Customer Engagement Through Cloud Contact Center
    Improving Customer Engagement Through Cloud Contact Center
    Accudata Systems: Jason Fackrell, Stephen Zost, Roderick Alavos, and Jennifer Casler Recorded: Sep 30 2020 29 mins
    Increasingly, businesses are expected to deliver more personalized and proactive service, as well as a seamlessly connected customer experience across myriad touchpoints. This is the new standard for all interactions shared between businesses and their customers, and the contact center is no exception.

    In this 30-minute webinar, Accudata’s industry-certified experts, who bring architecture expertise and a field-level perspective, as well as an end-user point of view, will discuss common contact center challenges and how Accudata and Cisco can help businesses:
    • Create proactive, personalized customer experiences
    • Increase customer lifetime value
    • Optimize workforce productivity
    • Leverage data for agent and customer insights
    • Complete a flexible transition to the cloud
    • Reap the benefits of a full-stack solution from a single vendor

    This panel-discussion webinar will provide businesses with real-world insights and the information they need to better engage with their customers. Accudata and Cisco’s complete collaboration solution from the cloud includes analytics and artificial intelligence, enabling contact centers to create personalized customer experiences.

    Our Accudata panel includes:
    • Jason Fackrell, Practice Manager, Collaboration and Networking
    • Stephen Zost, Senior Consultant, Collaboration
    • Roderick Alavos, Consultant, Collaboration
    • Jennifer Casler, Operations Manager, Managed Services
  • Enabling a Smooth Digital Transformation in the Post-Pandemic New Tomorrow
    Enabling a Smooth Digital Transformation in the Post-Pandemic New Tomorrow
    Gordon Beith – Senior Director, Product Marketing, Gigamon Recorded: Sep 30 2020 49 mins
    Learn strategies for a smooth DX in a post-pandemic world. For any organization, this means having the ability to manage and secure without network disruption.

    You’ll hear why visibility into data in motion across hybrid, on-premise or cloud infrastructures, is critical and how to accomplish this in the most cost-effective way possible.

    You’ll learn how to:
    • Optimize data delivery and monitoring
    • Gain visibility into all data for improved analytics
    • Better manage and secure applications and services

    Presented by:
    Gordon Beith, Senior Director Product Marketing at Gigamon
  • OWASP Top 10: A Real-World Retrospective
    OWASP Top 10: A Real-World Retrospective
    Peter Silva, Sr. Solutions Marketing Manager, F5 Networks | Byron McNaught, Sr. Technical Marketing Manager, F5 Networks Recorded: Sep 30 2020 56 mins
    Hindsight is 2020. That holds true for the OWASP Top 10, the threat awareness report that details the most critical security risks to web apps each year. Come learn the real-world impact of the OWASP Top 10, and why the guidance is relevant in maintaining a foundational security posture in an era of digital transformation.

    We’ll dive into real attacks that have recently exploited OWASP Top 10 vulnerabilities.

    In this webinar, you’ll learn:

    - How the explosion of open source technology and cloud-based architectures has made the threat surface so challenging to protect against

    - Why the OWASP Top 10 still matters and how to use it effectively to stay ahead of the curve

    - What could change with the 2020 OWASP Top 10

    Register Today
  • ForAllSecure Threat Research (FASTR): Uncovering Memory Defects in cereal
    ForAllSecure Threat Research (FASTR): Uncovering Memory Defects in cereal
    Richard Bae, Director of Solutions Recorded: Sep 30 2020 8 mins
    ForAllSecure presents its vulnerability discovery webinars (FASTR) demonstrating how Mayhem, an advanced fuzz testing solution, combines the tried-and-true methods of guided fuzzing with the ingenuity of symbolic execution, continuously uncovering defects at unprecedented speed, scale, and accuracy.

    Join ForAllSecure Director of Solutions, Richard Bae, for the second installment of the FAS.T.R. webinar series as he dives into uncovering memory defects in cereal.
  • Engage! The Benefits of Building Security Training Employees Want to Take
    Engage! The Benefits of Building Security Training Employees Want to Take
    Tom Pendergast and Osterman Research Recorded: Sep 30 2020 42 mins
    The concept of “security culture” gets a great deal of play these days in the security world, but what does it really mean?

    More importantly, how can someone responsible for the security training and awareness initiative at their company move toward this goal?

    With the results of a recent original research report, the answer begins to come into focus. In a 2020 study conducted by Osterman Research surveying both IT managers and everyday employees, employees who found training to be “very interesting” were more than 13 times more likely to make fundamental changes in the way they think about security compared to those who found the training to be “boring.”

    Explore the importance of security training and awareness in forging a security culture and how the quality of that training comes into play with the webinar Engage! The Benefits of Building Security Training Employees Want to Take.

    Join Osterman Research President Michael Osterman and MediaPRO Chief Learning Officer Tom Pendergast and as they discuss the findings of this report, co-sponsored by MediaPRO.

    Register to learn more about:
    • The impact of engaging security training on employee behavior
    • What makes security training interesting and engaging, straight from the minds of the employees who interact with it
    • The relationship between employee enjoyment of training and how much a part of the larger corporate security landscape they feel
  • Machine Learning Deep Dive: Simplify Ticket Remediation with ML-Powered Analysis
    Machine Learning Deep Dive: Simplify Ticket Remediation with ML-Powered Analysis
    Greg Ainslie-Malik, Staff ML Architect at Splunk Oct 1 2020 9:00 am UTC 43 mins
    Machine learning (ML) can be applied to help companies leverage intelligence in their operations. In this webinar, we will discuss how the Splunk Machine Learning Toolkit (MLTK) can be extended to create domain-specific guided Assistants that can simplify workflows for users such as IT administrators.

    Join Greg Ainslie-Malik, Staff ML Architect at Splunk, to get a glimpse into the future of IT ticket triage, as we display:
    How ML can provide new insights into ticket management
    A deep dive demo into a new app powered by the Machine Learning Toolkit (MLTK) that can help admins mine their data for patterns and easily identify candidates for automated remediation
    How this use case can complement IT Service Intelligence (ITSI), our premium monitoring and analytics solution powered by artificial intelligence for IT Operations (AIOps)
  • Apache Kafka® Use Cases for Financial Services
    Apache Kafka® Use Cases for Financial Services
    Tom Green, Senior Solutions Architect, Confluent. Oct 1 2020 9:00 am UTC 62 mins
    Traditional systems were designed in an era that predates large-scale distributed systems. These systems often lack the ability to scale to meet the needs of the modern data-driven organisation. Adding to this is the accumulation of technologies and the explosion of data which can result in complex point-to-point integrations where data becomes siloed or separated across the enterprise.



    The demand for fast results and decision making, have generated the need for real-time event streaming and processing of data adoption in financial institutions to be on the competitive edge. Apache Kafka and the Confluent Platform are designed to solve the problems associated with traditional systems and provide a modern, distributed architecture and Real-time Data streaming capability. In addition these technologies open up a range of use cases for Financial Services organisations, many of which will be explored in this talk. .



    By attending this talk you will develop a new understanding of:



    •How Apache Kafka enables a 360 view of the customer

    •How to provide a back bone for distribution of trade data

    •How Kafka and Confluent Platform enable you to meet regulatory requirements for trade information, payments, liquidity

    •How to overcome security concerns with SIEM

    •How to integrate mainframe data with event streaming and the cloud

    •How to reduce fraud with real-time fraud processing, fraud analytics and fraud notifications.

    •How to Develop and enhance microservices.
  • Digital Archive in a Box
    Digital Archive in a Box
    Robert Rowe, Solution Domain Principle, Data Intelligence, Professional Services, Hitachi Vantara Oct 1 2020 9:00 am UTC 30 mins
    Whilst archiving was once the place at the end of the Business Process that documents went to die. In the modern Digital world, Archiving has moved very much to the front of the Business process.

    Businesses are using the legacy capabilities of archiving solutions to manage the massive growth in objects, whether documents or records. Satisfying regulatory and compliance needs in the process. Whilst acting as the gateway to analytics over the information being archived. All with the potential to manage down costs.

    As an example, the rise of the smart device and the way that businesses are exploiting it is seeing an explosion of unstructured, object-based data, and associated MetaData. In insurance, claims previously handled via a person visit are self-served via an app that collects images and geospatial data. All of which need to be managed, including against GDPR and other regulations.

    We’ll look at examples of how customers are using our archiving technology to digitise their businesses and gain real value.
  • Completing the Demand Planning Cycle with Data Science
    Completing the Demand Planning Cycle with Data Science
    Dan Roozemond (EyeOn), Martin Daudey (EyeOn) Oct 1 2020 9:00 am UTC 60 mins
    The steps for a typical demand planning cycle are: review & correct historical data, statistical base line forecast, enrichment by marketing/sales, consolidate and consensus meeting, validate results & improve.

    Learn in this session how data science can help you completing the cycle in shorter intervals and with higher quality by integrating a data science platform into the planning cycle.

    Speakers:
    - Dan Roozemond, Data Science Team Lead at EyeOn
    - Martin Daudey, Sr. Business and Solutions Consultant at EyeOn

    Please be aware that by registering for this webinar, you agree to have your personal information shared with Dataiku's partner EyeOn. They may contact you with information that could be of interest to you.
  • Podcast: Guest David Bianco Talks Origin Story, Pyramid of Pain, and More
    Podcast: Guest David Bianco Talks Origin Story, Pyramid of Pain, and More
    Rick Holland, CISO and David Bianco, Principal Engineer for cybersecurity at Target Corporation Oct 1 2020 9:30 am UTC 45 mins
    ShadowTalk hosts Alex and Digital Shadows CISO, Rick, talk to special guest David about his beginnings in the cybersecurity space, the Pyramid of Pain, and threat hunting.
  • Need for Identity and Access Management architecture for enterprises in today's
    Need for Identity and Access Management architecture for enterprises in today's
    Rana Gupta,VP Thales CPL joined by L&T Infotech, Mphasis, Persistent Systems, Quess Corp, Airtel, Tech Mahindra, Mindtree Oct 1 2020 10:30 am UTC 93 mins
    As proliferation of cloud technologies increase, firms are posed with the challenge of ensuring data security, network security, application security in a complex data environment with limited funding on IT Security and highest possible rate of return. Also, with the growth of the cloud, the concept of a defined perimeter and perimeter security is losing its context. Hackers are finding innovative ways to impersonate employees and exploiting their privileges to steal critical and sensitive data.
    In the past five months, as remote working has increased due to the pandemic, there have been increased cases of hacking, phishing, and other online frauds, as hackers try to take advantage of possible vulnerabilities.
    With this context in mind, Thales CPL along with Indian Express and Technobind is coming together with top CIOs ,CTOs and CISOs of the IT industry for virtual round table conference, wherein they will be sharing their views, perspectives and best practices on how they can secure user identity in a constantly changing digital environment.

    Panelists are;
    Dilipkumar Panjwani, CISO CDPO & IT Controller, L&T Infotech Ltd (LTI)
    Sethu Seetharaman, Chief Risk Officer, Mphasis
    Amarjit Singh, Head - Strategic Projects, Security, Persistent Systems
    Aditya Vardhan, Head Cyber Security and Risks – Quess Corp (MFX India & Qtek Systems)
    Manish Tiwari, Global CISO, Airtel
    Ved Prakash Nirbhya, CIO, Tech Mahindra
    Chandan Pani, CISO, Mindtree
    Moderated by Rana Gupta VP of APAC Sales, Cloud Protection and Licensing, Thales
    And also joined by Prashanth GJ Co-Founder & CEO, Technobind
  • Building a Secure, Tamper-Proof & Scalable Blockchain with AiB’s KafkaBlockchain
    Building a Secure, Tamper-Proof & Scalable Blockchain with AiB’s KafkaBlockchain
    Kai Waehner, Technology Evangelist, Confluent Stephen Reed, CTO, Co-Founder, AiB Oct 1 2020 12:00 pm UTC 54 mins
    Apache Kafka is an open-source event streaming platform used to complement or replace existing middleware, integrate applications, and build microservice architectures. Used at almost every large company today, it's understood, battled-tested, highly scalable, and reliable.

    Blockchain is a different story. Being related to cryptocurrencies like Bitcoin, it's often in the news. But what is the value for software architectures? And how is it related to an integration architecture and event streaming platform?

    This session explores blockchain use cases and different alternatives such as Hyperledger, Ethereum, and Kafka-native blockchain implementation. We discuss the value blockchain brings for different architectures, and how it can be integrated with the Kafka ecosystem to build a highly scalable and reliable event streaming infrastructure.
  • Cyber Security for Industrial Control Systems: Best Practices & Lessons Learned
    Cyber Security for Industrial Control Systems: Best Practices & Lessons Learned
    Stephen Pichocki, Fujitsu. Jamie Wilkie, Fujitsu. Rob Falzon, Check Point Oct 1 2020 12:00 pm UTC 57 mins
    In this guest webinar, run jointly with our partner Check Point, our experts examine the Cyber Security implications for connected Industrial Control Systems. What are the best practices & lessons learned to keep these assets safe from attack.
  • Cloud security – überall sicher arbeiten
    Cloud security – überall sicher arbeiten
    Alexander Schmidt | Hans Irlacher | Mario Zimmler Oct 1 2020 12:00 pm UTC 60 mins
    Es ist nicht leicht, die Balance zwischen Unternehmensanforderungen und einer guten Nutzererfahrung zu halten. Immer mehr Mitarbeiter nutzen Apps aus der Cloud. Ob im Büro oder im Home Office muss die IT dafür sorgen, dass das flüssig funktioniert und gleichzeitig die die Sicherheits- und Compliance-Standards eingehalten werden.

    Wir möchten zusammen mit Netskope zeigen, wie Sie eine moderne und sichere IT Umgebung mit allen Vorzügen der Cloud passend für Ihr Unternehmen umsetzen können.

    In diesem Webinar sprechen wir über folgende Themen:

    · Wie Sie die Risiken der Cloud-Nutzung für Ihr Unternehmen bewerten können (Sicherheit & Compliance)

    · Wie Sie ein einheitliches Sicherheitsniveau für alle Nutzer unabhängig vom Standort umsetzen können, ohne veraltete VPN Technologie zu nutzen

    · Wie Sie herausfinden können, ob Ihre sensiblen Daten öffentlich zugänglich sind

    Alexander Schmidt, Solutions Executive Security, Verizon
    Hans Irlacher, Regional Sales Manager, Netskope
    Mario Zimmler, Senior Sales Engineer, Netskope
  • Enterprise Data Fabric – The Key To Building A Data-Driven Enterprise
    Enterprise Data Fabric – The Key To Building A Data-Driven Enterprise
    Mike Ferguson, Intelligent Business Strategies | Paul Moxon, Denodo | Andy Steed, Big Data LDN Oct 1 2020 1:00 pm UTC 60 mins
    This session looks at the emergence of Enterprise Data Fabric and its role in a modern enterprise. It firstly defines what enterprise data fabric is and why it has become strategically important in a multi-cloud hybrid computing environment. It also looks at the component capabilities that enable it and how these fit together to help connect to, simplify access, manage, govern and orchestrate the ingestion, discovery, cataloguing, cleansing, transformation, integration and analysis of data in a distributed computing environment. Finally it looks at data virtualisation and why it is a critical part of an enterprise data fabric solution

    What is enterprise data fabric?
    Why do you need it?
    What are the components of an enterprise data fabric offering and what role do these components have?
    How does Enterprise data fabric, the data catalog and AI work together?
    Why is Data virtualisation a critical capability in an enterprise data fabric solution?
    Use Cases and examples of companies who have built a data fabric using Data Virtualization

    Speakers:
    Mike Ferguson, Intelligent Business Strategies
    Paul Moxon, Denodo
    Andy Steed, Big Data LDN
  • Stream me to the Cloud (and back) with Confluent & MongoDB
    Stream me to the Cloud (and back) with Confluent & MongoDB
    Gianluca Natali, Confluent & Felix Reichenbach, MongoDB Oct 1 2020 1:30 pm UTC 65 mins
    Companies collect and store their data in various data stores and use a number of business applications and services to access, analyze and act on their data. Pulling all the data from disparate sources is difficult to manage, inefficient and ineffective in producing results. Event streaming and stream processing changes this paradigm. By enabling robust and reactive data pipelines between all your data stores, apps and services, you can make real-time decisions that are critical to your business.


    In this online talk, we’ll explore how and why companies are leveraging Confluent and MongoDB to modernize their architecture and leverage the scalability of the cloud and the velocity of streaming. Based upon a sample retail business scenario, we will explain how changes in an on-premise database are streamed via the Confluent Cloud to MongoDB Atlas and back.

    Key Learnings

    Modernize your architecture without revolutionizing it.

    Stream your data from multiple applications and data centers into the Cloud and back

    Confluent as the Central Nervous System of your architecture

    MongoDB Atlas as the flexible and scalable Modern Data Platform combining data from different sources and powering your frontend applications

    Why MongoDB and Confluent is such a great combination

    This architectural approach will allow you to dynamically scale the customer facing frontend, avoid over provisioning and enable the development team to rapidly implement new functionality which will differentiate you from your competition
  • Airheads Tech Talk - Aruba Location Services
    Airheads Tech Talk - Aruba Location Services
    Alan Ni, Aruba Global Director, Smart Spaces and IoT Oct 1 2020 2:00 pm UTC 60 mins
    Learn about Aruba’s release of a new set of native contact and location tracing tools for existing Aruba infrastructure customers based on both Wi-Fi and Bluetooth. We will also cover expanded capabilities with Aruba Technology Partners whose solutions integrate with Aruba infrastructures to monitor social distancing and group sizes, and generate contact tracing trees of potentially exposed individuals.
  • How Secure is Your Data in The Cloud? Cloud vs On-premises
    How Secure is Your Data in The Cloud? Cloud vs On-premises
    W. Curtis Preston Chief Technical Evangelist - Druva Oct 1 2020 3:00 pm UTC 30 mins
    Hear from W. Curtis Preston Chief Technical Evangelist, Druva - Why the cloud is more secure than on-premises data center.

    In this live talk you will learn more about:

    • Flexible backup and recovery solutions that protect data from loss or compromise
    • Remote device encryption and sanitization capabilities to prevent data breach
    • Geolocation capabilities to aid in device recovery
    • Geofencing that can restrict access to data from specific IP addresses or locations
  • Lessons from Top Echelon Development Teams: Higher Quality Code & Productivity
    Lessons from Top Echelon Development Teams: Higher Quality Code & Productivity
    Francis Cianfrocca, Luke Hinds, Erik Costlow, Patrick Spencer Oct 1 2020 3:00 pm UTC 63 mins
    Presenters:
    Francis Cianfrocca, CEO, InsightCyber Group
    Luke Hinds, Security Engineering Lead, Office of the CTO, Red Hat
    Erik Costlow, Director of Developer Relations at Contrast Security
    Patrick Spencer, Editor-in-Chief of Inside AppSec Podcast

    Over 60% of leading development teams deploy code to production every day or with every release. This demands a completely different security approach.

    Attend this webinar to learn how the “cream of the crop” are accelerating their release cycles and transforming their businesses by launching new applications and evolving existing ones. Attendees will learn:

    - Best practices from top development teams
    - What security tools and approaches they use
    - How they leverage open-source frameworks and libraries
    - What tools must be integrated into the IDE and CI/CD pipeline
    - How application security must change

    The digital age completely changes DevSecOps, and only those in the top echelon of practitioners are likely to succeed.
  • Using Nuix Workstation for eDiscovery
    Using Nuix Workstation for eDiscovery
    Jessica Solano Oct 1 2020 3:00 pm UTC 60 mins
    Using Nuix Workstation for eDiscovery

    In this short overview, we will take a quick look at a few of the concepts and analytics that will be discussed in Nuix Training to mimic a Nuix eDiscovery workflow from beginning to end. In training, we will explore what happens when you receive data, how to get it into Nuix, and how we can use techniques in Nuix to analyze, search, and cull data all the way to a production and legal export.
  • Analyst Webinar: 4 Strategies to Save on Storage Costs
    Analyst Webinar: 4 Strategies to Save on Storage Costs
    Jon Toor, CMO of Cloudian and Randy Kerns, Sr. Strategist at Evaluator Group Oct 1 2020 4:00 pm UTC 60 mins
    Today’s uncertain economy makes cost control critical. Reducing your storage costs can help.

    Join Analyst Randy Kerns of the Evaluator Group for this live webinar on June 24th at 10am PT / 1pm ET to get your cost questions answered.

    In this interactive webinar, we’ll look at the numbers to examine the true costs of:

    Data Protection: Your backup target alternatives
    NAS: Strategies to contain file storage costs, without disrupting users
    Public Cloud: The true cost of cloud vs. the on-prem alternatives
    Big Data / Splunk: Why server-based storage costs more than you think
  • Step Up Your F5 Automation Game
    Step Up Your F5 Automation Game
    Murali Palanisamy, Chief Solutions Officer Oct 1 2020 4:00 pm UTC 45 mins
    If you’re an F5 user, chances are you’d be using their management platform, BIG-IQ. You could also be using Ansible on top of BIG-IQ to meet other F5 automation needs. You might be getting good value out of it - your network team has better visibility into application services, your application team can spin up services through templates, etc., etc.

    But just how much of this “automation” translates into real business benefits?

    In this webinar, Step Up Your F5 Automation Game, Murali Palanisamy, Chief Solutions Officer at AppViewX, explains how end-to-end, closed-loop, context-aware orchestration of F5 can save enterprises up to 5000 person-hours annually, keep TCO low when expanding device footprint, dramatically improve application performance and availability.

    The key takeaways will be to:
    •Make the F5 infrastructure self-healing, context-aware, and secure
    •Automate the lifecycle of certificates, ADCs, and firewalls with multi-vendor integrations
    •Build dashboards, enable RBAC-powered self-servicing for application teams
    •Quicken troubleshooting with app-centric visibility, object-level backup and restore
  • How Today’s Security Challenges are Leading to Opportunities
    How Today’s Security Challenges are Leading to Opportunities
    Randall Palm and Patrick Sullivan, Akamai Technologies Oct 1 2020 4:00 pm UTC 18 mins
    This is the third episode in a 6-part series with a mission of sharing the latest insights and perspectives from our top security experts on the ever-changing security landscape. Our host, Randall Palm, AVP of Sales, is bringing over 20 years of experience at Akamai helping organizations through their digital transformations and will guide our audience through this 6-part series.

    On this episode, Randall Palm virtually sits down Patrick Sullivan, CTO Security Strategy, to have a conversation around some of the biggest security challenges that businesses are facing in these changing times and how they are actually creating opportunities to enhance their security strategy.

    For the last episode in the series, Learning From Your Remote Workforce with special guest, Tony Lauro, click here: https://www.brighttalk.com/webcast/17608/408303

    Customers and Prospects can respond directly to Randall and Patrick with any questions or requests for follow-up by contacting SecuritySoundBytes@akamai.com
  • 6 Best Practices for Slack eDiscovery & Legal Hold
    6 Best Practices for Slack eDiscovery & Legal Hold
    David Farris, Information Governance Lead, Global Relay, Bo Nelson, Legal & eDiscovery Lead, Global Relay Oct 1 2020 4:00 pm UTC 30 mins
    More than 65% of Fortune 100 firms use Slack, along with more than 12 million people worldwide who depend on it daily to collaborate with customers and suppliers, and to get work done.

    And despite Slack being one of the world’s most popular collaborative messaging platforms, collecting and preserving Slack data for eDiscovery, legal hold, and case management is challenging.

    Slack was built for collaboration, not eDiscovery or compliance, therefore it might not meet some of the retention and legal hold complexities that enterprises require.

    In this webinar we will show you how you can continue to use Slack, without compromising your eDiscovery and legal hold obligations.

    Join this webinar to learn:

    • 6 best practices for conducting efficient eDiscovery and legal hold, when using Slack
    • How to simplify capture and collection of pertinent data
    • How to ensure your organization preserves a clean chain of custody, when litigation or a compliance investigation arises
  • Enabling a Remote Workforce Amid COVID-19
    Enabling a Remote Workforce Amid COVID-19
    24By7Security, Inc Oct 1 2020 4:00 pm UTC 60 mins
    This joint webinar, led by Sanjay Deo from 24By7Security and Joe Monaco from The Monaco Group, will highlight the technical challenges of enabling a remote workforce in the midst of a pandemic. Join us on September 24th at 12:00pm eastern to hear from these industry-leading experts and their clients about the transition to work-from-home and how the implementation of these services amid COVID-19 accelerated the need for digital transformation across all market segments.
  • Four Stages for Government Security Teams to Manage Risk
    Four Stages for Government Security Teams to Manage Risk
    Cam Beasley, CISO, UT Austin | Jae Lee, Product Marketing, Splunk Inc. Oct 1 2020 4:00 pm UTC 40 mins
    To achieve comprehensive and effective cybersecurity, organizations first need to understand where they reside on the security maturity curve.

    Gain the insights you need by listening to this webinar, 4 Steps to Government Security, available on demand. Moderated by CSO, the webinar features a fireside chat with Cam Beasley, CISO of the University of Texas at Austin and Splunk, who examine the security challenges facing highly regulated organizations today, and explain how to leverage data from a broad range of sources to improve your security posture.

    Featuring:

    Cam Beasley,
    CISO,
    UT Austin

    Jae Lee,
    Director, Product Marketing,
    Splunk Inc.
  • Shifting Left with Future Proofed AppSec – Customer Conversation
    Shifting Left with Future Proofed AppSec – Customer Conversation
    John Smith, Director Solution Architects, Veracode / Marco Ulgelmo, CISO, Quby Oct 1 2020 4:00 pm UTC 44 mins
    Meeting the demands of modern software development requires fast and accurate security solutions that you can scale up or scale down, anytime, anywhere – especially in the face of a global digital transformation. As our Static Analysis scan numbers hit a new record in March and then another record high in April, our customers continue to impress with their drive for better application security in the face of current events.

    In this session we are sitting down with Quby, a Veracode customer and innovative Dutch-based energy and utilities company, to discuss how future proofing their application security with cloud-based solutions has allowed them to continue their “shift-left” strategy while keeping pace with the competition.

    Join this informative discussion between Quby’s CISO Marco Ulgelmo and Veracode’s Director of Solution Architects EMA/APAC John Smith to learn more about:
    • Quby’s journey to full automation and integration
    • How Quby leveraged the cloud to begin securing their applications right away
    • How a cloud-based solution boosted collaboration and productivity for remote teams
    • Scaling up, scaling down, and saving money with easy integration into their SDLC
  • Navigating Your Cloud Journey and the New Tomorrow
    Navigating Your Cloud Journey and the New Tomorrow
    Rich Mogull – CEO of Securosis + Bassam Khan – VP of Product and Technical Marketing at Gigamon Oct 1 2020 5:00 pm UTC 30 mins
    There's no right or wrong way to migrate to the cloud, but how you get there means the difference between smooth sailing or nothing but obstacles. Rich Mogull, CEO of Securosis, whiteboards the four common migration patterns, explains the benefits and risks of each and recommendations for a safe cloud journey.

    Watch the video to learn:
    • Risk level and tooling associated with each type of migration pattern
    • Factors that make some migration patterns riskier than others
    • Why whether an industry is regulated or not impacts which migration pattern to use
    • How network visibility is the first step in your journey

    Presented by:
    Rich Mogull, CEO of Securosis
    Bassam Khan, Vice President of Product and Technical Marketing at Gigamon
  • Bridging the Gap Between AppSec and DevOps to Reduce Security Risk
    Bridging the Gap Between AppSec and DevOps to Reduce Security Risk
    Dr. Larry Ponemon, ZeroNorth CEO John Worrall, ZeroNorth SVP Engineering Christian van den Branden Oct 1 2020 5:00 pm UTC 60 mins
    Organizations are at risk when application security (AppSec) and DevOps teams don’t have a common vision for delivering software capabilities required by the business — securely. This is now truer than ever, as digital transformation puts pressure on organizations to develop applications at increasing speeds, potentially putting their security at risk. Yet, according to a new Ponemon Institute research report, sponsored by ZeroNorth, 75% of AppSec practitioners and 49% of developers believe this “cultural divide” exists between their respective teams.

    In this webinar, Dr. Larry Ponemon, ZeroNorth CEO John Worrall and Christian van den Branden, SVP of Engineering at ZeroNorth offer their unique perspectives on the “Revealing the Cultural Divide Between Application Security and DevOps” research results, as well as the five steps Ponemon Institute recommends organizations take to help bridge this critical cultural divide.
  • Podcast: Guest David Bianco Talks Origin Story, Pyramid of Pain, and More
    Podcast: Guest David Bianco Talks Origin Story, Pyramid of Pain, and More
    Rick Holland, CISO and David Bianco, Principal Engineer for cybersecurity at Target Corporation Oct 1 2020 5:00 pm UTC 45 mins
    ShadowTalk hosts Alex and Digital Shadows CISO, Rick, talk to special guest David about his beginnings in the cybersecurity space, the Pyramid of Pain, and threat hunting.