Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Beat Hackers Through Visibility, Precision and Quick Response Beat Hackers Through Visibility, Precision and Quick Response Travis Grandpre, HPE Director of ArcSight Product Marketing and Justin Kelso, HPE ArcSight Recorded: Jan 17 2017 40 mins
    As organizations scale, having a robust security posture is critical. To achieve this, organizations rely on intelligent security operations. Visibility plays a crucial part in this. This means having visibility across boundaries, not just across networks and IT, but also into operational data and IoT devices.

    Join this presentation to learn:

    •What's needed to enable visibility into millions of events per second
    •How to provide context to the collected data
    •Role of machine learning in real-time correlation and analytics
    •How to prioritize security analyst tasks, optimize resources and save time

    Discover the capabilities powering intelligent security operations that enable you to track alerts and investigate threats at the speed of the attacker.
  • How Process Automation Works Within the NOC & Infrastructure How Process Automation Works Within the NOC & Infrastructure Jeremy Axmacher, Platform Engineer Recorded: Jan 17 2017 45 mins
    To cope with business demand, servers must be built – which is a highly manual process that often lacks standardization. Join this webinar with CA Technologies’ internal IT team, as they discuss how CA Process Automation enables them to automation core infrastructure tasks, including server deployment, maintenance and retirement – and saved their team 20 hours a day of manual work.

    You will learn:
    How CA Technologies’ internal IT team saves time automating triage and remediation
    How workflows can be easily adapted to detect issues quickly
    How new servers are now deployed within a matter of minutes with standardized builds and security protocols
  • The Softer Side of IT: Cultivating hard-to-find soft skills in today's workforce The Softer Side of IT: Cultivating hard-to-find soft skills in today's workforce Experis and Right Management Recorded: Jan 17 2017 60 mins
    IT leaders are increasingly uncovering the value of soft skills within their workforce. They’re telling us that soft skills—specifically communication and collaboration skills—can be as important as some technical competencies. What is causing increasing demands for soft skills in IT talent? How do IT leaders assess the soft skills of new recruits? Can these skills be developed in existing employees?

    During this webinar, you’ll hear experts from Experis and Right Management discuss the need for improved soft skills within today’s IT workforce and how IT leaders can ensure their workforce has the skills required to succeed in today’s world of work.

    By participating in this webinar, you will:
    Understand the increasing importance of communication and collaboration skills in IT roles today
    Gain greater insight from workforce experts about how to assess new IT recruits for soft skill proficiency
    Learn best-practice strategies for developing communication and collaboration skills within your team

    * NOTE: This event qualifies for 1 CPE credit.
    Experis is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org. Should this course need to be cancelled or rescheduled by Experis, a 24-hour notice will be provided. For more information regarding administrative policies such as complaint and refund, contact Learning & Development at 414-319-3400.
  • Learn How the NIST CSF Benefits Small and Medium Businesses Learn How the NIST CSF Benefits Small and Medium Businesses Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Jan 17 2017 60 mins
    Small Businesses are increasingly being targeted by cyber criminals. With precious few resources, how can Small Businesses defend against Ransomware, Data Breach, Insider Threat plus more issues.

    Join this webcast to learn how the NIST Cybersecurity Framework (CSF) can be an important resource to help Small Businesses defend against cyber-attacks. We’ll walk you through the recently released NIST Publication “Small Business Information Security: The Fundamentals” and it’s relation to the NIST CSF.

    - A basic understanding of the Cybersecurity Framework.

    -The purpose and scope of the recently released NIST Small Business Information Security Publication.

    -A review of the alignment of Symantec solutions to the Cybersecurity Framework.

    Join this webcast for a review of the latest NIST guidance and how to apply it to assess and manage Cybersecurity Risks to your business.
  • Information Security and Cyber Risk Information Security and Cyber Risk Ian Beale and Richard Cross Recorded: Jan 17 2017 60 mins
    The continued growth in size and frequency of costly data breaches has increased the pressure on senior leadership and Boards of Directors to take a rigorous approach to understanding and managing cyber security risk. With this in mind, ERM teams are being asked to weigh in the organization’s response to these risks. Join this webinar to learn from CEB how your peers manage and report on cyber security risks and work with their Information Security counterparts to ensure that their organisations are prepared for the inevitable cyber-attack.
  • Drive Customer Growth and Business Success with Cloud Business Applications Drive Customer Growth and Business Success with Cloud Business Applications Eanna Sarah, Tom Yang Recorded: Jan 16 2017 28 mins
    Hear how we’re delivering a new approach to business applications, through a single cloud service of purpose-built apps that will help you manage specific business functions.
    Turn your customers in to fans by reinventing your Sales, Customer Service, Finance, Field Service, Operations, Marketing and Project Service Automation processes. This completely integrated platform includes Productivity and Reporting tools, Internet of Things, and is also extensible through its own easy to use graphical development and workflow tools, allowing IT professionals to implement, build and deploy a new level of functionality for a wide range of business processes, using world-class technology.
  • Empowering Employee Productivity in the Digital Age Empowering Employee Productivity in the Digital Age Michal Gideoni, Director Product Marketing | Kyle Minar, Product Marketing Manager Recorded: Jan 16 2017 43 mins
    The 4th industrial revolution is upon us. Digital transformation is quickly becoming the most important factor of a company’s ability to compete in the fastest and most disruptive period in our history. It’s time to start asking the tough questions. How do I implement tools to enable our employees to achieve more together? How do I make sure we are optimizing mobile teams and networks without opening ourselves up to security, compliance and privacy risks? How do I get the information I need quickly to make decisions that will shape the future of my business? In this session you will learn how Microsoft is bridging the gap between people and technology with Office 365, Skype for Business, and Intelligent productivity tools, all with the built-in security, privacy and compliance you’ve come to expect.
  • How the Heck Did They Miss It? Lessons to Learn from the Yahoo Breach How the Heck Did They Miss It? Lessons to Learn from the Yahoo Breach Chris Roberts, Chief Security Architect at Acalvio Technologies Recorded: Jan 13 2017 49 mins
    With 2016 behind us, is this the last Yahoo breach we’ll hear about? Join Chris Roberts, Chief Security Architect at Acalvio Technologies as he discusses the lessons to be learned from the recently disclosed Yahoo breaches, and the nagging questions infosecurity professionals will try to answer in 2017.
  • The Fortify Ecosystem: Seamless integration into the development toolchain The Fortify Ecosystem: Seamless integration into the development toolchain Scott Johnson, Director of Product Management, Fortify Recorded: Jan 12 2017 39 mins
    Organizations moving at DevOps speed can easily integrate security testing into their Software Development Life Cycle (SDLC) workflow. Join this presentation to discover how built-in application security testing can become a seamless part of your coding process.

    Viewers will learn:

    - How integrations spanning all stages of development, deployment and production enable application security testing into the development tool chain

    - How to empower your developers to test for security vulnerabilities earlier, build better code and secure your software
  • PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply PCI DSS v3.2. A Fast Assessment to Identify What You Must Do to Comply David Kim. ITPG Secure Compliance. SVP, Governance Risk and Compliance Recorded: Jan 12 2017 53 mins
    Your organization has little over a year to comply with the new PCI DSS v3.2 standard. If you have yet to assess your current security controls against these new standards, it’s time to start. We’ll highlight the key changes, the issues to think about, and the time required to assess, plan and implement. As a PCI Qualified Security Assessor, we know what can trip organizations up and how to avoid missteps.
  • IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare IT Operations and Real-Time Performance Monitoring: Keys to Efficient Healthcare John Smith, Principle Solutions Architect from ExtraHop, Darren Carr, Sr. Technology Architect, from Cerner Recorded: Jan 12 2017 49 mins
    Modern Healthcare IT infrastructures are a complex blend of technologies, from mission-critical Electronic Health Record (EHR) applications to the security solutions protecting patient data from ransomware and other threats. Overseeing an entire healthcare system's networks and infrastructure, as well as managing patient data in a private cloud, can be time consuming, costly and pose potential cybersecurity threats and data breaches. That’s why fast, reliable IT is crucial to every step of the patient’s journey through your organization—and why you need a new approach to IT operations and monitoring.

    Learn where your visibility gaps lie, and how closing those gaps with real-time performance monitoring will dramatically improve the quality of care and IT security that your organization provides.
  • What Does the Massive Yahoo Hack Mean for Your Company? What Does the Massive Yahoo Hack Mean for Your Company? Dr. Christopher Pierson, EVP, Chief Security Officer & General Counsel, Viewpost Recorded: Jan 12 2017 37 mins
    With over 1 billion user accounts stolen, the recently disclosed Yahoo breach is the biggest one to date. What does this mean for your organization? Join Chris Pierson, General Counsel and Chief Security Officer at Viewpost as he discusses the Yahoo breaches and the cybersecurity and privacy implications for organizations worldwide.

    About the presenter:
    Dr. Chris Pierson is the EVP, Chief Security Officer & General Counsel for Viewpost - a Fintech payments company. He is a globally recognized cybersecurity expert and entrepreneur who holds several cybersecurity and technology patents. Dr. Pierson serves on the Department of Homeland Security’s Data Privacy and Integrity Advisory Committee and Cybersecurity Subcommittee and is a Distinguished Fellow of the Ponemon Institute. Previously, Chris was the first Chief Privacy Officer, SVP for the Royal Bank of Scotland’s U.S. banking operations leading its privacy and data protection program. Chris was also a corporate attorney for Lewis and Roca where he established its Cybersecurity Practice representing companies on security and data breach matters.
  • CA Briefings Part 5: Annual Trends/Predictions CA Briefings Part 5: Annual Trends/Predictions Nick Nikols, Senior VP and Cybersecurity Business CTO, CA; Brandon Dunlap, Moderator Recorded: Jan 12 2017 58 mins
    2016 was a blockbuster year for cybersecurity -- from a hacker influenced national election to a landmark breach into the Internet of Things that caused the largest botnet attacks in history. What’s in store for 2017? On January 12, join CA Technologies’ Nick Nickols, Security CTO, as he examines the evidence and trends that predict what you can expect in 2017. In this webcast, Nick will discuss:
    ·Key areas to focus your attention and investment - from access governance to threat analytics to IDaaS
    ·The changing landscape of regulations and consumer behavior
    ·Technology transformations and new innovations that will influence the way you prepare for 2017
  • Why Agile Seemed Like a Good Idea at the Time - 1 PMI PMP PDU Credit Why Agile Seemed Like a Good Idea at the Time - 1 PMI PMP PDU Credit Andy Jordan, ProjectManagement.com Recorded: Jan 12 2017 60 mins
    Organizations are frequently tempted to modify and adapt their Agile approaches as they become more experienced.  As they then try and expand Agile use into other areas, or as they look for ways to integrate Agile and traditional project execution approaches they realize they are facing some unintended consequences.  Join Andy Jordan, ProjectManagement.com as he discusses how best to look at options for enhancing or modifying Agile at your organization and how to ensure you aren’t causing future problems.

    This session is approved for 1 Project Management Institute (PMI) PMP Credit.
  • CISSP Exam Strategies CISSP Exam Strategies Amar Singh Cyber Management Alliance Recorded: Jan 11 2017 38 mins
    An exclusive interview with CISSP trainer Abhi G about his top tips for preparing for the CISSP exam. Download the CISSP Exam Plan worksheet from the attachments section on this page.
  • Maximize Test Coverage and Software Security Maximize Test Coverage and Software Security Arif Muhammad and Abhijit Mugali CA Technologies Recorded: Jan 11 2017 55 mins
    Traditionally, test data management has involved copying, masking, and subsetting production data. While masking data does offer production-like data, it’s also slow, complex, and often error-prone, increasing the risk of sensitive information making it to less secure test environments.

    View this event to discover how synthetic data generation can create realistic test data that contains no sensitive information. What’s more, this test data will contain the negative paths, future scenarios, and outliers not typically found in production, providing the data needed to maximize test coverage.

    You will also learn:

    -The drawbacks of using production data in testing, from compliance to provisioning time and quality

    -How data visualization can be used to identify any data missing from production needed for rigorous testing

    -How masking can be combined with synthetic data generation to plug any gaps in test data
  • How Process Automation Helps CA Technologies Create a Disaster Recovery Strategy How Process Automation Helps CA Technologies Create a Disaster Recovery Strategy Jeremy Axmacher, Platform Engineer Recorded: Jan 11 2017 40 mins
    When disaster strikes, your number one priority is fast recovery. But trying to determine the root cause of the problem can be a time consuming, manual process. Join this webinar with CA Technologies’ internal IT team, as they discuss how automation has helped them save time with disaster recovery through consistent, predicable processes – and enabled them to get up and running again seamlessly.

    You will learn:
    How to save money and time from outages – even when the worst happens
    •How to shift your focus from manual problem solving to fast recovery through automation and repeatable processes
    •How keeping an audit trail prevented the team from making the same mistakes in the future
  • Encryption for the Now Generation - Build Your 2017 Strategic Roadmap Encryption for the Now Generation - Build Your 2017 Strategic Roadmap Aaron McIntosh, Senior Product Marketing Manager, WinMagic Recorded: Jan 11 2017 34 mins
    The landscape of the traditional work environment has changed and continues to evolve at a rapid pace. And while organizations are reaping the productivity rewards of an increasingly mobile workforce, data loss becomes a growing concern. Businesses need to secure their data without slowing down their employees. Spend 45 minutes with WinMagic’s Senior Product Marketing Manager, Aaron McIntosh, and learn how to be secure when embracing workforce mobility and productivity.

    Key Learnings:
    1. How you can support a multi-OS or BYOD environment with an consistent security policy
    2. How you can increase security awareness and adoption using an employee-centric mindset
    3. Discover how to build your 2017 strategic roadmap for PCs, tablets and other managed endpoints
  • RegTech 101: Implementing a RegTech Solution in your Organization RegTech 101: Implementing a RegTech Solution in your Organization Jose Caldera, IdentityMind; Oscar Jofre, KoreConX; Juan Lozada, AML/CTF Expert; Lisa Dawson, BSA/AML Expert Recorded: Jan 11 2017 70 mins
    For corporations and financial institutions RegTech is the vehicle to decrease compliance costs, control risks, and minimize the potential for regulatory actions and fines, while gaining operational efficiencies from the automation of manual processes. For regulators, it is the bridge between reactive supervision of financial activities and proactive and preventive real-time monitoring of all market participants. And this is only the beginning; the potential of RegTech is far greater than we can appreciate presently.

    With such an outlook, it is important we understand what RegTech is, and what its not. How to leverage RegTech solutions in order to reap the benefits of automated compliance, monitoring, and risk management; and most importantly how we can implement such solutions in our organizations.

    As with any piece of new technology, the process of discovering, researching, choosing and implementing a RegTech solution is no task for the faint hearted. And, even though we do know the benefits far outweigh the costs, it wouldn’t hurt to have a guiding hand; a roadmap for your first RegTech implementation, and how to achieve successful onboarding.

    Join us for a walk down RegTech Lane. At the end of the webinar you will:

    - Have a clear concept of RegTech, its benefits and potential
    - Know what to take into consideration when researching RegTech solutions for your organization
    - Understand the hurdles to implement a RegTech solution
    - Have a list of action items necessary to overcome these implementation obstacles
  • The hybrid portfolio: Can’t we all just get along? 1 PMI PDU The hybrid portfolio: Can’t we all just get along? 1 PMI PDU Andy Jordan, ProjectManagement.com and Jim Tisch, Dir Product Marketing, PPM Recorded: Jan 11 2017 55 mins
    Agile is here to stay, waterfall’s not going away anytime soon, and more and more organizations are creating hybrid project execution models that combine both. What does that mean at the portfolio level? If you’re struggling to manage a portfolio of different project approaches, if you have executives looking for common reporting metrics, or if you have frustrated project teams, this webcast is for you. Join PPM expert Andy Jordan as he explains:
    •Value based reporting that ignores the project execution approach
    •The importance of flexibility in portfolio planning and delivery
    •The need to create an environment that supports both Agile and waterfall
    •Some simple steps you can take today to improve hybrid portfolios
    The future of portfolio management will include both Agile and waterfall, unless you’ve mastered them both you need to attend this webinar.
  • SANS 2016 Incident Response Survey: Emerging Trends in Incident Response SANS 2016 Incident Response Survey: Emerging Trends in Incident Response Matt Bromiley, SANS Analyst and Incident Response Expert, Rob Lee, SANS Curriculum Lead Recorded: Jan 11 2017 66 mins
    This webinar will cover the results of the third annual SANS survey on incident response. It will explore the continuing evolution of incident response, how tactics and tools have changed in the last three years and how security professionals are dealing with increasing numbers and kinds of attacks.

    You’ll discover:

    •How integrated incident response tools are in the typical organization
    •What impediments hamper effective incident response
    •How budget allocations are projected to change over the next 12 months
    •Improvements planned in the next 12 months

    Complete the form to learn takeaways and recommendations for incident response from industry experts.
  • Leveraging your SIEM to Catch and Respond to Ransomware Leveraging your SIEM to Catch and Respond to Ransomware Randy Franklin Smith: Windows Security Expert. Nathaniel Quist: Incident Response Engineer, LogRhythm, Inc. Recorded: Jan 11 2017 103 mins
    Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape.

    In fact, during 2015 the FBI received 2,453 complaints related to ransomware malware attacks, which resulted in $24.1 million in losses for victims.

    In this webinar, Randy Franklin Smith of Ultimate Windows Security will be joined by Nathaniel “Q” Quist to discuss how to leverage SIEM technology to catch and respond—even automatically within seconds—to ransomware to prevent it from spreading and reaching the critical mass.

    The duo will also share some cool technical tips for creating signature-based rules for catching specific ransomware and explore how to use behavioral rules to detect late stage ransomware on a given endpoint.

    Join us for this technical, insightful event.
  • Financial Impact of Data Breaches Financial Impact of Data Breaches Roger J. Francis, Senior Consultant at Mandiant, a FireEye company Recorded: Jan 10 2017 49 mins
    Cyber threats are constantly evolving, increasing in both sophistication and how they impact victims. In today’s world, you must battle a wide range of adversaries, from hacktivists to state-sponsored threats. The most significant of these threats are advanced attackers who carefully plan and execute breaches into victim organisations.

    In this live webinar, Roger J. Francis, Senior Consultant at Mandiant, a FireEye company, will discuss real-world incidents and steps organisations should take to minimise the financial impact of a data breach.
  • Insights with Cyber Leaders - Eugene Kaspersky Insights with Cyber Leaders - Eugene Kaspersky Amar Singh Cyber Management Alliance Recorded: Jan 10 2017 24 mins
    An exclusive interview with Kaspersky Lab founder and CEO Eugene Kaspersky. Find out about how Eugene made it and his thoughts about the future of cyber security. The first in the series of Insights with Cyber Leaders videos created by Cyber Management Alliance featuring our CEO Amar Singh.
  • Auditing Neglected Critical Infrastructure Auditing Neglected Critical Infrastructure Ian Whiting - CEO Titania Group Jan 18 2017 2:00 pm UTC 45 mins
    Key network infrastructure devices are overlooked yet they provide critical functionality. Exploiting web application weaknesses and service buffer overflows is exciting, but the housekeeping of network infrastructure is not. Issues in network infrastructure devices can lead to network wide problems that would cause system admininstration nightmares. This presentation provides a review of key security devices, often side-lined when looking at security. It covers the value of these devices to "Blue Teams", issues "Red Teams" can highlight, desired outcomes and auditing practices.
  • What’s Next In Securing Identities? Key Identity & Access Management Trends What’s Next In Securing Identities? Key Identity & Access Management Trends Danna Bethlehem Jan 18 2017 4:00 pm UTC 60 mins
    Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

    Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

    -The status of the two-factor authentication market and what we can expect in the years to come
    -The enterprise risk issues of using social media credentials to access to corporate resources
    -The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
    -The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
  • Successful Identity Management Deployments – Don’t forget the user experience Successful Identity Management Deployments – Don’t forget the user experience Sumner Blount, Director, Security Solutions, CA Technologies Jan 18 2017 6:00 pm UTC 60 mins
    A critical element to the success of an identity management deployment is the user experience, but it’s often overlooked, or not given high enough priority. An identity management deployment without a seamless, convenient user experience could be the make or break point for success.

    This webcast will highlight critical components of a convenient and secure user experience. Attendees will learn:
     Current trends in identity management and governance
     Essential characteristics of employee, partner, and customer identity management
     Key attributes of a successful identity management user experience with examples
     Recommendations for a successful identity management deployment
  • The Tech Tools Empowering National Security in a Digital World The Tech Tools Empowering National Security in a Digital World Iveta Topalova, WW Public Sector Architect Manager Jan 18 2017 7:00 pm UTC 60 mins
    National security agencies face significant challenges today. From new and unknown threats, to operating tempo and budget challenges, having the right technology in place is key to ensuring security in an increasingly evolving threatscape.

    What if technology could help you:
    Gain a common operating picture through shared awareness and visualization of unfolding events
    Harness and validate new and existing sources of data to unlock key patterns and insights
    Align and modernize systems for improved anytime, anywhere command and operations communication
    Improve operational readiness and impact through the use of devices and apps tailored to specific roles and missions

    In this webcast, we begin with the end in mind: the need for the optimization of data insights through analytics, the alignment of platforms and devices for enhanced security and readiness, and the enablement of command and operations within an agile, data-driven national security ecosystem.

    Join this discussion to:
    - Discuss current trends that are presenting significant challenges to protecting US citizens from terrorism and crime
    - See how advancements in technology are empowering national security and federal law enforcement agencies to meet these challenges
    - Learn how agencies are implementing a digital transformation strategy to enhance how they better protect citizens
  • Escaping the Storage Licensing Money Pit Escaping the Storage Licensing Money Pit Dave Wright - Vice President & General Manager, NetApp SolidFire and Tim Stammers - Senior Storage Analyst, 451 Research Jan 18 2017 7:00 pm UTC 60 mins
    The tables have been stacked against storage buyers for decades, but a change is coming. Forget the endless refresh treadmill of monolithic storage systems, and licensing models that are not just inflexible, but also force you to pay again and again for the same technology. Join this webinar to learn how to liberate your storage budget, and pay for storage the way that suits your business rather than the vendors, with 451 Research senior analyst Tim Stammers, and NetApp SolidFire’s Vice President & General Manager, Dave Wright.
  • Your 2017 Cloud Security Action Plan Your 2017 Cloud Security Action Plan Maxim Integrated - Matt Hollcraft, CISO & Dave Ruedger, Chief Security Architect; Bitglass - Rich Campagna, SVP Products Jan 18 2017 9:00 pm UTC 60 mins
    We are now three plus years into widespread adoption across industries of public SaaS apps like Office 365. Despite this momentum, security and compliance remain top challenges. This webinar, featuring Matt Hollcraft, CISO for Maxim Integrated, Dave Ruedger, Chief Security Architect for Maxim Integrated, and Rich Campagna, SVP of Products for Bitglass, will help you build a 2017 action plan to embrace public cloud without sacrificing security and compliance.

    While offering practical, actionable advice for major apps like Office 365, Matt, Dave and Rich will address your top concerns, such as unmanaged device access, external sharing, and mitigating controls. They also will provide real world examples of how other organizations have securely navigated the public cloud.
  • 8 Things to Analyze in Outbound Packets 8 Things to Analyze in Outbound Packets Randy Franklin Smith, Windows Security Subject Matter Expert, and Rob McGovern, Sr. Technical Product Manager at LogRhythm Jan 19 2017 12:00 am UTC 90 mins
    Most modern malware operates as part of a system. Whether it’s a multi-part kill chain with droppers and payloads, a botnet with command and control servers, or ransomware encrypting files, the malware on the compromised system talks to other systems over the internet.

    If you have been compromised, and didn’t catch malware on the way in, you can often find it by monitoring outbound network connections.

    In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Rob McGovern, Sr. Technical Product Manager at LogRhythm, discuss the top 8 things to analyze in outbound connections from your network to the Internet.

    The duo also shows you how Network Monitor tools can help you improve your network analysis and forensics capabilities.

    Join this webcast to learn how monitoring your network can help you detect and investigate potential malicious behavior within your IT environment.
  • Is Enterprise Security Positioned to Succeed? Is Enterprise Security Positioned to Succeed? Daniel Kennedy, Research Director, 451 Research, Adrian Davis, Managing Director, (ISC)² EMEA Jan 19 2017 2:00 pm UTC 60 mins
    Two themes emerge from 451 Research's recent study of the organizational dynamics of enterprise information security teams: that security teams are understaffed and potentially incorrectly positioned in organizations. Join us to review the the study's results based on more than 930 online surveys and 20 live interviews with enterprise security leaders.
  • 5G RAN: A Reality Check 5G RAN: A Reality Check Brian Daly-AT&T, Adam Drobot-OpenTechWorks, Inc.,Steven Glapa-Tarana Wireless,Robert Azzi-Argyle Griffin Grp Jan 19 2017 4:00 pm UTC 60 mins
    High speed and autonomous transportation, remote surgical procedures, and mixed reality experiences are just a few of the upcoming Internet of Things (IoT) technological game changers that require high speed and low latency communications infrastructure. 5G Radio Access Network (RAN) technologies continue to evolve to meet the complex and continually evolving network requirements of IoT applications.

    This webcast will explore the latest advances in RAN, including:
    • Which technologies will see the earliest deployments?
    • How important will the 3.5 GHz band networks (also known as the Citizen’s Broadband Radio Service (CBRS)) be in future 5G applications?
    • Will mmWave networks change the game in the last mile?
    • How far will the industry advance in real deployments in the next year or two?
    • Where are companies participating in this ecosystem investing their money?
    • Are there concerns for Return on Investment (ROI) that companies are trying to resolve?


    Speakers:
    Brian Daly, Director - Core & Government/Regulatory Standards, AT&T Access Architecture & Devices
    Adam Drobot, Chairman, OpenTechWorks, Inc.
    Steven Glapa, VP of Marketing, Tarana Wireless
    Robert Azzi, Executive Managing Partner. Argyle Griffin Group (Moderator)
  • Risk-Ranking Open Source Vulnerabilities Risk-Ranking Open Source Vulnerabilities Mike Pittenger, VP Security Strategy, Black Duck Jan 19 2017 4:00 pm UTC 60 mins
    Increase security effectiveness and maintain dev agility

    Three certainties in 2017: organizations worldwide will continue to increase their use of open source software; new open source security vulnerabilities will be discovered; exploits of open source vulnerabilities will occur.

    With dev teams under constant pressure to accelerate application delivery and with security resources often scarce, organizations need more effective ways to determine which open source vulnerabilities to fix first and the options available to reduce risk during remediation.

    Join Black Duck VP of Security Strategy Mike Pittenger as he discusses strategies and emerging best practices for risk-ranking open source vulnerabilities. He will cover:
    - the most important considerations in prioritizing open source security issues
    - ways to determine the risk associated with a discovered open source vulnerability
    - options for dealing with open source security vulnerabilities beyond simply replacing the component
  • I Heart Security: Developing Enterprise Security Programs for Millennials I Heart Security: Developing Enterprise Security Programs for Millennials Mary Jane Kelly, Security Consultant at NCC Group Jan 19 2017 6:00 pm UTC 45 mins
    Open-minded, collaborative, and engaged, Millennials embrace values that can be effectively directed to reduce risk across an organization. While some may view the Millennial spirit as a security liability, with the right support, their views and priorities can actually help cultivate a stronger security mindset within their teams.

    In this talk, MJ Kelly explores how to develop security programs that resonate with Millennials. She presents practical approaches that incorporate deeply held priorities of the new generation, while ensuring that experienced team members remain included and engaged. Strategies include determining appropriate incentives, varying motivational focus, and testing new tactics such as gamification and novel information distribution channels to foster a strong security culture throughout the entire organization.
  • Top Cyber Security Trends for 2017 Top Cyber Security Trends for 2017 Amichai Shulman, CTO and Co-Founder, Imperva Jan 19 2017 6:00 pm UTC 60 mins
    CTO and co-founder, Amichai Shulman provides valuable insight into cyber security trends and best practices to protect your organization.

    Data breach after DDoS attack after insider threat… hackers upped their game with all signs pointing to more threats, not less. What does this mean for 2017? Attend this webinar and learn:

    · What top 3 cyber security trends will have the largest impact in 2017
    · Why cyber attacks are on the rise and multiplying quickly
    · How to combat the increasing number of breaches
    · What to consider in building a security plan that is right for your organization
  • Best Practices for Securing your DNS against Advanced Malware Best Practices for Securing your DNS against Advanced Malware Chip Mesec, Product Manager and Sam Pierre, Product Marketing Manager, Hewlett Packard Enterprise Jan 19 2017 6:00 pm UTC 45 mins
    The challenge with detecting malware is that it easily gets past traditional security solutions, placing your DNS infrastructure in harm’s way before you even notice it’s there. Hear how DNS operates and malware utilizes the DNS protocol to communicate with outside threats and exfiltrate data from an enterprise.

    This webinar is ideal for IT and security managers who have limited experience with DNS or malware but are interested in how threats use this often overlooked protocol.

    Viewers will learn:
    •Practical strategies to protect your enterprise from bad DNS traffic
    •Best practices for securing your DNS infrastructure
  • Current State of Ransomware in State & Local Government Current State of Ransomware in State & Local Government Kevin Haley, Director of Product Management for Symantec Security Technology and Response Jan 19 2017 6:00 pm UTC 60 mins
    Ransomware has become extremely popular with cyber criminals because it’s easy and very profitable. Organizations can defend themselves and lower the risk of ransomware or other common threats costing them time and money.

    Key Learning Objectives:

    - A look at the current state of ransomware

    - Simple and inexpensive steps that can advance state and local government security posture

    - Better understanding of the cyber security landscape

    - Best practices to take in cyber defense

    Join us for a review on simple ways, state and local government can protect themselves against ransomware attacks.

    Register for this free webinar today.
  • Visibility and Security - Two Sides of the Same Coin Visibility and Security - Two Sides of the Same Coin Cricket Liu, Exec VP, Infoblox; Dan York, Sen Content Strategist, Internet Society; Dave Lewis, Global Sec Advocate, Akamai Jan 19 2017 6:00 pm UTC 75 mins
    You can't secure what you can't see and not knowing what's on your network can be damaging. While security is about proactively detecting and mitigating threats before they cause damage, it is also about gaining deep visibility into today's complex networks which may include diverse platforms and architectures. A truly enterprise grade DNS, DHCP and IPAM (DDI) platform can provide that visibility because of where it sits in networks. On the downside, DNS is a top threat vector but it can be used as strategic control points to block malicious activity and data exfiltration. Join Infoblox and (ISC)2 on January 19, 2017 at 1:00PM Eastern for a round table discussion featuring Cricket Liu, a well known authority on the Domain Name System and the co- author of all of O'Reilly & Associates' Nutshell Handbooks on DNS, as we examine how strategic DNS can be used for visibility and security.
  • Git high availability Git high availability Doug Robinson - Senior Product Manager, WANdisco Jan 19 2017 6:00 pm UTC 60 mins
    What does “high availability” mean in practical terms? Join our free webinar detailing what it takes to make your Git deployment highly available, including some of the trade-offs to expect. If you’ve got questions, this webinar is your chance to get answer from our Senior Product Manager and resident expert Doug Robinson.
  • Preventing Threats in Modern Government Networks -Replacing Proxy Technology Preventing Threats in Modern Government Networks -Replacing Proxy Technology Pamela Warren, Director, Government & Industry Initiatives & Scott Brunstrom, Sr. Fed. Systems Engineer, Palo Alto Networks Jan 19 2017 6:00 pm UTC 60 mins
    Proxy deployments today have outlived their usefulness and practicality with limited security functionality against today’s advanced threats. Today's security must consider new applications, access options and capabilities within our networks. This webinar provides insights on a next generation security approach to today's networks that considers the changing nature of our networks without compromising the protection of our data and the integrity of our networks.
  • Exploring the Current State of Cybersecurity in the Legal Sector Exploring the Current State of Cybersecurity in the Legal Sector Jake Olcott, VP of Business Development at BitSight Technologies and Jay Jacobs, Sr. Data Scientist at BitSight Technologies Jan 19 2017 6:00 pm UTC 45 mins
    Despite the fact that third party breaches have been on the rise, organizations may not be doing enough to manage the cybersecurity of all of their critical vendors. Law firms, in particular, are one of the most widely used third parties, yet the Legal sector may be getting overlooked in vendor security discussions.

    In fact, the latest BitSight Insights Industry Index report revealed that although companies in the Legal sector have high security ratings and low rates of vulnerabilities, the industry remains a key target for cyber criminals. Therefore, it’s crucial for organizations in this space to understand their cybersecurity posture and improve their vendor risk management techniques.

    Join Jake Olcott, VP at BitSight, and Jay Jacobs, Sr. Data Scientist at BitSight as they discuss data security in the Legal sector and beyond. In this webinar, you’ll learn:

    - How the cybersecurity posture of the Legal sector has changed over time
    - How the Legal sector stacks up against six other industries
    - The importance of cybersecurity in the Legal sector
  • 5 Highest-Impact CASB Use Cases 5 Highest-Impact CASB Use Cases Bob Gilbert, Chief Evangelist at Netskope​ Jan 19 2017 9:00 pm UTC 60 mins
    Cloud app security is a top priority for many enterprises. Whether securing data in the Office 365 suite, ensuring compliance in ServiceNow, or getting control over shadow IT, information security leaders are exploring how Cloud Access Security Brokers can make an impact in their organizations.

    Join Bob Gilbert, chief evangelist of Netskope, for a session on the top five CASB use cases that have the highest impact on cloud-consuming enterprises.

    Attendees will learn:

    •Industry-specific data that’s foundational to any cloud security business case;

    •The five highest-impact CASB use cases from our customers, demonstrated from the perspective of users and security professionals; and

    •How those use cases translate to “must have” requirements for any CASB evaluation.