Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Our expert panel will discuss upcoming trends and best practices in infosec policy management for the IOT. The panel will include:
Jennifer Bisceglie, CEO, Interos Solutions
Robert Brese, Executive Partner, Gartner
Ryan Gillis, VP of Cybersecurity and Global Policy, Palo Alto Networks
Gary Hayslip, CISO, City of San Diego, Co-Chair, CyberTECH
Paul Rosenzweig, Principal, Red Branch Consulting
Watch this on-demand webinar featuring Forrester Research for a sneak peek into how this study found independent software suppliers benefited from Veracode's cloud-based service, and how you can use this analysis to develop your own business case.
Study after study confirms that chat is both a cost effective and customer friendly channel. However, many organizations haven’t yet implemented chat or are still relying on email and phone as primary support channels. Moving to chat can be a daunting task, and too many organizations add chat as a support channel without proper planning. Inevitably, the full benefits of chat are never realized and customers refuse to embrace the new channel. This session will share actions a support organization can take to ensure the success of a new chat channel: ten steps that can help you put the right people, processes and technology in place to successfully launch and gain value from chat support.
As an IT leader, you are under pressure to thwart ‘shadow IT’ and to deliver the agility and cost efficiencies your lines of business are finding in the public cloud.
Private cloud and software-defined data centers promise this agility, but can introduce greater risk of downtime or breach. Why? Even the most modern, robust hardware and software will still go down if process failure or administrator “pilot error” leads to mistakes in data center operations. And accidental misconfiguration in a highly virtualized environment can impact many more applications than in a traditional, air-gapped data center. As you virtualize more applications and move toward private cloud, maintaining availability at the highest level is absolutely essential.
In this webinar, Rob Babb, Principal Systems Engineer at HyTrust, will give you the lowdown on how to:
• Reduce downtime by preventing accidental misconfiguration
• Prevent large scale errors introduced through automation
• Achieve faster remediation and recovery with platform hardening,
alerts, and actionable log data
• Free up headcount for compliance through automation
Join Forrester Vice President, Principal Analyst, John Kindervag and Fortinet to learn about how next generation firewalls (NGFW) are changing the way organizations protect themselves. Get a look at the latest research on how IT professionals are using NGFWs to combat today’s threat environment and the requirements for an effective NGFW.
System Center Configuration Manager is the solution of choice for managing today's enterprise environments. But what’s an administrator to do when a security audit includes vulnerabilities in non-Microsoft applications and server platforms?
Introducing the only enterprise-class 3rd party patching solutions designed exclusively for System Center environments that require operationally efficient and reliable security and compliance patching solutions.
Join us for a discussion of practical methods to improve and automate the patch process for your most targeted 3rd party desktop applications and non-Windows server platforms, reduce the time you spend building updates, and improve audit readiness in your Windows environment.
SCM systems are the cornerstone of modern continuous delivery and DevOps. Is it time to update your system? If you're a development manager or ALM expert considering a move from ClearCase to Git, join us for this webinar where we'll review the why and how of making the switch.
Join Storage Switzerland and Accelerite for a live webinar “How To Prepare for the Disasters that Will Actually Happen”. In this webinar we will discuss how these types of man-made disasters differ from natural disasters, why they’re more costly than natural disasters and what steps IT professionals must take, right now, to make sure their businesses can recover from them.
All registrants attending the live webinar will also be entered into a drawing to win an Apple Watch given away after the webinar.
It’s not if, it’s when you will expand your enterprise footprint into Amazon Web Services (AWS). When organizations shift to a public cloud environment, security and compliance must remain top of mind. While AWS provides robust infrastructure-level protections, today’s attackers target the applications themselves.
This webinar will:
· Discuss inherent AWS security capabilities
· Review attack types that target the applications and why traditional security approaches can’t stop them
· Illustrate how Imperva SecureSphere for AWS stops these attacks and enables you to use the security infrastructure on-prem and in the cloud
With the mobile platform now outpacing desktop users it's important to be informed on what type of threats utilize the smartphone as a vector of attack. This presentation will look at the mobile threat landscape at a glance with statistics over the past couple years as well as its growth to what it is today. We'll also take a few specific threats and take an in-depth look to show the differences compared to PC that have been developed to take advantage of the Android.
Triple-A ratings are normally associated with chief financial officers keeping a tab on John Moody’s bond credit rating. But, in the technology world, how can a chief information officer or IT decision maker rate the efficiency of an IT security implementation?
A comprehensive security approach should encompass three factors. It should be adaptive to threats, business requirements and the ever-evolving use of the internet within the corporate network, have adapted to meet the specific requirements of an organization and have been adopted fully by end users.
These factors can be summarized as a “Triple-A” security approach. If you achieve this, you can strengthen your overall security posture.
Attend our webcast to see how your organization can have the best security possible, and use IT security to drive innovation – instead of blocking it.
Microsoft has announced Windows Server 2003 End of Support (EOS) on July 14, 2015. Many businesses will be forced by circumstances to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments. In addition to various logistical issues, an out-of-support component is vulnerable to attack and may leave the business vulnerable to significant security and compliance risks.
Learn how you can use Advanced Endpoint Protection as a compensating control, so that businesses can keep Windows Server 2003 systems compliant and secure, even after EOS.
Boeing found that many successful attacks were linked to basic security vulnerabilities in vendor-supplied software, and over 90% of the software they tested had significant, compromising flaws. These vulnerabilities introduced unnecessary risk into critical applications — yet as the world's leading aerospace company and largest manufacturer of commercial jetliners and military aircraft, Boeing needs to rely on its third-party software as a means of speeding up innovation.
This webcast is for information security professionals or anyone who would like to know how to get rid of passwords and the password database, removing one of the key assets targeted by cyber criminals.
Old school IT security can no longer be trusted. And as long as the redundant principles that guide it continue, hacks and breaches will be inevitable. M-Pin uses distributed cryptography to avoid the points of compromise that make old authentication so vulnerable. It’s an entirely new way to authenticate that means you’ll never have to choose between user experience, security and scalability.
Die nächste on-premise Version von SharePoint - SharePoint Server 2016 - wird bereits mit Spannung erwartet und verspricht Neuerungen gerade in Bezug auf hybride Nutzung und die Cloud. Eine Migration zur neuen SharePoint-Version kann dahingehend ein echter Neustart sein, bringt erfahrungsgemäß aber auch Herausforderungen mit sich.
In diesem Webcast zeigen wir Ihnen, wie Sie Ihre Migration in Hinblick auf die auf der Microsoft Ignite vorgestellten neuen Features von SharePoint 2016 erfolgreich planen und durchführen und geben Ihnen eine Übersicht zu Migrationsstrategien und Best Practices.
Dennis Hobmaier, Senior Technical Solutions Professional, AvePoint und Tobias Pfanner, Head of Services Colygon, stellen praktische Tools beider Unternehmen vor, die Ihr Migrationsvorhaben unterstützen können. Mit den Infrastrukturmanagement-Tools von AvePoint können Sie SharePoint-Content nicht nur einfach migrieren, sondern auch restrukturieren und logische Änderungen wie Domänenmigrationen durchführen können. Durch den Framework-basierten Ansatz von Colygon MatchPoint wird die Implementierung und Migration von Intranet-/Collaboration-Anwendungen und anderen Business-Applikationen zwischen SharePoint-Versionen vereinfacht.
End-point data protection is fundamentally changing. End-points have moved from desktop to mobile with BYOD, and the data protection envelope is extending beyond simple backup and recovery solutions to include continuous data availability, security, and compliance.
During this webinar learn how Syncplicity’s enterprise file sync and share solution helps extend the data protection envelope across your enterprise.
Both insider and external threats will attempt to exploit highly privileged administrative accounts to perform unauthorized tasks that could lead to data theft or sabotage. In this session we will demonstrate how a SIEM can enable organizations to adopt best practices for managing privileged user activity such as:
Separation of Duties
Audit Privileged Sessions
Forbid All Access Accounts
Real Time Response to Suspicious Privilege Escalation
Office 365 is a catalyst for enterprises transitioning to SaaS. However, reducing the deployment and operational risks are the biggest challenges in making this transition to cloud successful. And while >90% of enterprises have Active Directory in place, staying within the Microsoft family of solutions is not necessarily the right decision once cloud initiatives take hold. Making it easy for users to securely access their applications, and making it easy on IT to quickly configure and provision services to users, are critical success factors.
Join Chip Epps and Rob Capozzi from OneLogin, the leader in enterprise identity and access management, for an overview and live demo showcasing must-have capabilities to bridge AD and your SaaS applications, including:
-Preparing your AD infrastructure for federation and single sign-on
-Leveraging OneLogin OneClick to simplify your deployment between AD and Office365
-Provisioning your users automatically from AD to Office 365, with entitlements correctly mapped to license types
-Enabling the mobile workforce with Desktop SSO while ensuring IT security and compliance
Join ESET and National University as we explore options for education and career advancement in the field of cybersecurity. Christopher Simpson, the Director for the National University Center for Cybersecurity and Information Assurance program will look at the evolving technology job field and what specific cybersecurity related skill sets employers will want to look for.
To sell your software to enterprises, your product needs to be scalable, reliable, and – above all – secure. If you are not prepared to address questions about the security of your software, you are not going to land substantial deals with Fortune 500 companies. However, security isn’t rocket science and software vendors everywhere, especially start-ups like those backed by Atlas Venture, can benefit from becoming the “secure choice” in the market.
Over a billion records were leaked last year in online cyberattacks. While the specifics of each breach vary, in-depth analysis of successful attacks reveals a common thread – the compromise of privileged users and the thousands of accounts and credentials they rely on to manage increasingly complex hybrid enterprises. In this webcast, we’ll examine several of the highest profile breaches of the last few years, reveal the steps attackers took to gain access – and how cybersecurity teams can leverage privileged identity management to defend their environment and stop breaches.
Join us to learn:
-Who are privileged users?
-How attackers exploit and compromise privileged users to gain access to sensitive systems and data
-How to prevent attacks from succeeding through privileged identity management
- Ben Butler, Vice President of Business Development and Solutions Architecture, Rean Cloud
- John Suit, Chief Technology Officer, Xceedium
Sesión sobre la protección de sus sistemas Windows Server 2003 después de la finalización del soporte.
•¿Sabía que el 14 de julio finalizará el soporte del producto Windows Server 2003?
oDespués de esta fecha , Microsoft dejará de emitir parches de seguridad , dejando a estos sistemas en un estado de vulnerabilidad alto frente a los ataques de día cero y otras formas de código malicioso.
•Conozca a que riesgos se expone si no hace frente a esta situación y como Symantec le ayuda a proteger sus sistemas ante la finalización del soporte para estos sistemas.
Join John Hudson, Thinking Dimensions, to learn how to:
- Identify the key stakeholders represented in any situation
- Identify the Critical Thinking skills and processes that underlie a successful Root Cause Analysis
- How to successfully prioritise issues every time
- Identify the core issues represented in any situation
What you will take-away:
- An appropriate set of Thinking processes to adopt
- An intuitive and structured set of Questioning techniques
- Structured templates that allow for the timely analysis/filtering of information
- The confidence to adopt the process for your everyday work
If your organization cannot afford downtime from DDoS attacks, join this timely discussion from Neustar, with special guest perspective from IDC’s Christina Richmond. Explore the complexity and purpose behind today’s attacks and what you can do to defend your Internet presence. You will learn:
· What the DDoS threat environment looks like today
· Why “smokescreening” is a particular danger
· Where attacks can have impact across your organization
· How you can take steps to thwart DDoS threats
Today it is generally recognized that projects must deliver value. But what is value, how do we ensure that it is delivered, and how do we group the set of investments into our portfolio to deliver the most value?
Industry established standards and practices should form the basis for the approach to implementing portfolio management. These will guide us in the steps to prioritize and select the highest value investments.
This presentation very simply walks through the steps to create and maintain portfolios within these best practice standards and practices.
This event qualifies for Project Management Institute (PMI) 1 Professional Development Unit (PDU).
Cyber insurance is becoming an increasingly competitive market. In order to differentiate their offerings, underwriters are beginning to offer unique risk mitigation services to their insureds. But with all the noise in this space, how do risk managers find and choose the policy that is best for them?
In this webinar hosted by Advisen, Tracie Grella, Global Head of Professional Liability at the world's largest insurer, AIG, Neeraj Sahni, Vice President, FINEX North America—Cyber and Technology Risks at Willis, and Ira Scharf, General Manager of Cyber Insurance at BitSight Technologies, to learn how underwriters, brokers and technology firms are working together to bring risk mitigation services to their clients
Join this webinar to learn:
- How cyber coverage has evolved
- How the insurance market is bringing value related to cyber risks
- How risk mitigation services lower expected costs and help insurers do a better job of underwriting
- Why risk mitigation services and cyber insurance create a safer cyber ecosystem
Before tackling a SIEM project to improve detection and response, learn from these case studies as their scenario likely matches yours. To firebreak your network brings together technologies, processes and people in the right balance across four phases. More than a security point solution or another box, you need to turn craft into a discipline to improve detection and response.
Learn from your peers about the following:
- Before environment and issues
- Transition effort, cost and impact
- After environment and benefits
- Best practices for managed SIEM
- Your network and next steps
IT professionals are facing an explosion of data and an avalanche of devices to protect. So how do you do more with less?
Learn how the technology associated with next generation all-in-one backup appliances – physical and virtual – can help you solve the core problems of protecting more IT infrastructure and data with less effort and more confidence.
Participez à ce webinaire pour savoir comment offrir rapidité et protection à votre réseau tout en respectant vos contraintes budgétaires. Les entreprises telles que la vôtre s’appuient sur des connexions rapides et abordables pour se tourner vers le cloud. Si vous savez utiliser SSL pour chiffrer les données, c’est aussi ce que font les cybercriminels pour chiffrer les programmes malveillants. Votre réseau haut débit exige une protection ultrarapide.
Nehmen Sie an diesem Webinar teil und finden Sie heraus, wie Sie von einem sicheren und schnellen Netzwerk profitieren, ganz ohne Ihr Budget zu sprengen. Immer mehr Organisationen setzen auf schnelle, erschwingliche Breitbandverbindungen, um die Vorteile der Cloud für ihr Geschäft zu nutzen. Möglicherweise verwenden auch Sie, wie viele Unternehmen, SSL zur Datenverschlüsselung. Leider tun das auch Cyberkriminelle, um Malware zu verschlüsseln. Für ein High-Speed-Netzwerk braucht es aber einen High-Speed-Schutz.
Join this webinar to learn how to achieve both speed and protection for your network, while staying on budget. Organizations like yours are leveraging fast, affordable broadband to move to the cloud. And while you may use SSL to encrypt data, cybercriminals also use it to encrypt malware. Your high-speed network demands high-speed protection.
As the trend of employees using smartphones and tablets as corporate access devices in the workplace grows, businesses of all sizes continue to see information security risks being exploited. These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications.
During this webinar Steve Durbin, Managing Director of ISF, will explain why it is important for organisations to embrace these new technologies to develop and deploy effective enterprise-wide strategies and to safeguard their data.
Informatica and HighPoint Solutions will be co-hosting a panel discussion with leading global Pharmaceutical companies where they will discuss the challenges, solutions and most importantly, how their companies can benefit from IDMP compliance.
Our personal and professional attack surfaces have never been greater, and they are only expected to grow as organizations and individuals continue to increase their reliance on the digitally connected world for a variety of tasks.
Throughout 2014, and into 2015, Verisign iDefense® Security Intelligence Services observed cyber criminals increasing their focus on attacking point-of-sale (PoS) systems and developing and deploying new banking malware. Global events continue to drive a higher frequency and severity of hacktivist activities and pro-state cyber operations. Vulnerable legacy and open-source operating systems continued to complicate the security of critical networks.
This report presents an overview of the key cyber security trends Verisign has noted and expects to see throughout the remainder of 2015. It features conclusions drawn from Verisign iDefense research and analysis covering cyber-crime, hacktivism and vulnerabilities.
This session will be about the process that takes place once a data breach occurs. The pressure is extremely high and various teams have to come together in this time of emergency, including incident response team, the board and the executive management, the PR team, risk management and legal. Goals are to strategize and minimize the damage, contain the threat, and ensure that the business continues running in spite of a major incident and at the same time public concerns and pressure are addressed in an efficient manner.
Getting the call
Arriving on scene (first observations and attacker profile analysis)
Crisis management with key internal tenants
Evidence collection and preservation, digital forensic investigation and analysis
Data’s coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you’re at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable – get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.
In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.
In this presentation we will examine real cases that show how vulnerable cloud and virtual environments can be without the correct controls. You will see how easily controls can be bypassed and compromised, why software keys are simply not good enough, and how your personal life threatens your business and work life. Join us on July 8th to learn what we call, unsharing your data.
Cybercrime continues to increase, with nearly 100% of Forbes Global 2000 companies reporting data breaches within the last 12 months.
It is estimated that over 200 nations have Intelligence capabilities and their #1 target is the United States. Cyber tools, used for exploitation, can also be used for cyber attacks. These capabilities are being built by the 1,000s. The result is that most US corporations have been penetrated. Furthermore, most network security appliances may stop a novice attack but they are no match for a sophisticated threat actor. The presentation will explore the evolving threat, why we should care, and what we can and cannot do to counter this never ending, dynamic and evolving threat.
Organizations spend millions to protect data from outside threats, but are investing far less to protect themselves against attacked from inside. Security experts agree that there is currently no way of completely block hacks or prevent insiders from leaking information. But is the situation completely hopeless?
This session will present a new paradigm for keeping sensitive data safe by classifying and protecting it at the source. How to enhance the performance of DLP? How to enable collaboration and BYOD in a secure manner? How can you track all organizational data and pinpoint risk? How can you make the threat of data theft and loss irrelevant?
Holding off on getting a SIEM, or frustrated with the one you’ve got?
Security information and event management (SIEM) solutions have been deployed for over a decade but the vision offered by vendors and analysts is rarely realized by customers. Roughly one-third of new SIEM sales today are replacements for “failed” SIEM deployments. Listen in as our experts highlight the major challenges to selecting, deploying and more importantly, operating a SIEM. Then the conversation will shift to focus on six strategies to augment your resources using Trustwave managed services so that you can realize the full vision of a SIEM solution.
Join this informative webinar where you will learn how to:
•Fund, deploy and operate a SIEM that sets you up for success
•Optimize automatic log collection and threat correlation
•Efficiently identify, stop, and resolve breaches.