Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
There is a lot of confusion around Oracle licensing, especially in virtualized or Cloud environments. In this session, we will provide an overview of the Skytap Cloud, and what Skytap has done to facilitate Oracle license-compliance in their cloud. We will provide education on the principles of Oracle licensing, and information on how those principles are applied to workloads running in the Skytap Cloud.
Hackers don’t wear blaze orange. Sophisticated adversaries are targeting you, your employees and your data. Let’s face it, yesterday’s traditional security defenses leave you exposed and render your corporate network open terrain. Take the target and put it on the attacker’s back.
Join a panel of security experts: Jeremy Linden, Sr. Product Manager Cisco Umbrella, Dhia Mahjoub, Principal Engineer Cisco Umbrella, Craig Williams, Sr. Technical Leader, Cisco Talos, and Robert Simmons, Director of Research, ThreatConnect, for an inside look at how to identify attackers, stalk their internet infrastructures and disrupt cyber-criminals before they disrupt you. Hunt or be hunted.
Join fellow security executives for a roundtable discussion over the necessity and importance of staying secure in a dynamically evolving and competitive landscape.
The cyber resiliency assessments are based on the U.S. Department of Defense’s mission-critical procedures and Unisys’ commercial best business practices. They provide an unbiased 3rd party expert assessment of the client’s Incident Response Capabilities, deliver a Security Enhancement Playbook, and identify the gaps in their cyber defense network that leads to improved cyber resiliency.
These assessments provide leadership with:
- A deeper insight into the effectiveness of decision making
- Understanding of the vulnerabilities in their cyber defenses
- How to enhance adaptability to the unanticipated and the capacity to emerge from a crisis faster with less damage to profitability, brand and customer loyalty.
We will also discuss how crisis-preparedness exercises help your team experience real-world threat scenarios in order to assess the team’s ability to address, contain, respond and mitigate security threats.
Dante Disparte, CEO of Risk Cooperative
John Bone, Global Director of Cyber Resilience, Unisys
Ed Liebig, VP of Global Security, Professional Services, Unisys
Sidney Pearl, Global MSS Executive Architect, Unisys
Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis. But what about the risks? Join me, Stephen McCormack from IBM MaaS360 as I take you step-by-step through the key challenges that mobile devices bring, and how you can easily act to ensure your organisation is protected.
Enterprises have generally responded to the security challenge, recognising that they cannot simply cross their fingers and hope to avoid a major cyber incident. Many have reached for the ‘big security technology catalogue’ and in the past couple of years we have seen increasing numbers of organisations setting out with the intention of deploying some form of SOC. While there is no getting away from the fact effectively deployed technologies and the integration of a well organised SOC can be part of the solution, very few organisations can actually set up and operate a form of SOC that will make a material difference. In this webinar, experts from Fujitsu will discuss the considerations that go into an effective SOC, identify common mistakes and recommend a SOC Strategy which is more likely to yield an improved security posture than blowing a massive budget on a ‘home-grown’ SOC.
Symantec Cloud Workload Protection, our latest offering for securing enterprise data center migrations into the public cloud. This new offering adds workload security to Symantec’s security portfolio for the cloud generation.
Cloud Workload Protection provides elastic security for AWS and Microsoft Azure workloads via cloud-native integration, enabling businesses to enjoy public cloud benefits without worrying about the security and integrity of their brand as they offer new services to their customers.
To learn more, visit the Symantec Cloud Workload Protection product page: https://www.symantec.com/products/threat-protection/cloud-workload-protection
A complete demonstration of CloudNine's SaaS-delivered eDiscovery automation software by industry expert and author Doug Austin. Used extensively by corporations and law firms to simplify legal discovery in litigation, investigations, and audits, CloudNine provides eDiscovery practitioners with a secure platform that enables the upload, review, and production of documents from a fully integrated and automated fourth-generation eDiscovery platform. For a free trial, visit eDiscovery.co.
Los puestos de trabajo y los dispositivos móviles son habitualmente los aspectos más olvidados en la estrategia de gestión de datos empresarial. Sin embargo, la información presente en ordenadores portátiles, de escritorio y dispositivos móviles es uno de los activos de mayor valor para la organización, pese a que potencialmente se encuentra en máximo riesgo. De acuerdo con IDC hay alrededor de 1.300 millones de trabajadores móviles hoy en día, pero tan solo la mitad de las empresas utiliza algún tipo de backup para puestos de trabajo.
La fuerza de trabajo móvil es cada vez mayor. Dichos usuarios manejan información fuera del dominio tradicional del departamento de TI y emplean soluciones de colaboración no corporativas. El coste potencial y el riesgo asociados al cumplimiento de la normativa y al eDiscovery, la necesidad de proteger el puesto de trabajo y de aportar soluciones de colaboración corporativas están claros y se encuentran en un punto de inflexión crucial.
Acompáñenos en este webinar, donde analizaremos:
- Cómo recuperar el control sobre lo que ocurre en los dispositivos móviles de los trabajadores
- Cómo mitigar los riesgos asociados con los ataques cada vez más frecuentes de ransomware
- Cómo aumentar la productividad con una plataforma segura para la compartición de archivos
À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en :
- Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
- Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.
Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:
• What are your options if you’re a victim of ransomware
• Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
• How Symantec technologies work together for maximum protection
And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.
Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
Working in silos, while never a good idea, is a reality in many organizations today. Security and network operations teams have different priorities, processes and systems. Security teams use various controls and tools to mitigate different kinds of threats which provides them with thousands of alerts on a daily basis. They often find it difficult to prioritize the threats to address first. What they may not know is that there is a whole piece of the puzzle they could be missing - core network services like DNS, DHCP and IPAM. These can provide a wealth of information and context on threats, which can help prioritize response based on actual risk and ease compliance. Join Infoblox and (ISC)2 on February 23, 2017 at 1:00PM Eastern for a roundtable discussion on how to use ecosystem integrations between network and security tools for better security and compliance.
Cyber security is front and center like never before, and cyber leaders are working to speed cyber response times for threat prevention, detection, and mitigation for known, and more importantly, unknown threats.
A recent study shows Feds are losing the race against hackers– with 85% of security operations professionals taking hours, even days, to create protections against newly discovered cyber threats.
View the on-demand “Pedal to the Metal” webinar and hear from Federal and industry cyber experts as they discuss MeriTalk’s newest cyber study findings, including:
•How much time and manpower is expended analyzing threat intelligence?
•What advanced automatic capabilities can Feds utilize to act rapidly and decisively against advanced threats?
•Is threat intelligence is helping Feds prevent attacks – from never-before-seen threat actors and tactics – faster?
Featured Speakers Include:
•Paul Morris, Acting CISO/Acting Director, Information Assurance and Cybersecurity Division, TSA
•Pamela Warren, Director, Government and Industry Initiatives, Palo Alto Networks
With over 1 billion monthly active users, Facebook Messenger is beginning to change the world for companies looking for ways to connect with, engage, and retain an unprecedented number of customers. And we’re guessing that’s probably you.
It’s all because of Messenger’s developer tools, which have leapt on the promise of bots for customer service and native payments without ever leaving the platform--and have thoroughly delivered on it. Users stay cozily inside the Messenger platform to play games, search, shop, pay, and more, meaning they’re fully engaged with your brand in multiple ways in a single brand context.
Facebook’s long-term plan: make Messenger the center of users’ lives. Your short-term plan: start positioning yourself to take advantage of this revolution in messenger tech innovation. Register for this free VB Live event now and learn how you can monetize Messenger.
In this webinar, you’ll:
* Understand the broader digital wallet strategy to connect with customers through chatbots
* Get valuable tips to spin chatbots into gold
* Learn the biggest mistake organizations are making with payments through Messenger
* Laura Knapp, Managing Director, SRAX Social, Social Reality
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Wendy Schuchart, Moderator, VentureBeat
PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.
For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.
Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:
•PKI use cases in an enterprise environment to secure access and protect data
•Budgeting for your PKI deployment of modernization
•Outlining the deployment size, scope and timeline
•Analyzing and reviewing current and/or future security policies
•Maintenance and administration of the PKI system
•Configuring and understanding certificate authorities
•Developing a scalable approach to prepare for future needs
•Addressing the protection of sensitive keys and the ecosystem integration
Today’s reality is that organizations will continue to be confronted by increasingly frequent and complex cyber threats. It’s not a matter of if your organization will be compromised, but when.
The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. It begins with the ability to see broadly and deeply across your IT environment and ends with the ability to quickly mitigate and recover from security incidents. The result? A reduction in your mean time to detect and mean time to respond without adding staff to accomplish the job.
In this webcast, Chris Martin, LogRhythm security expert, will explain what TLM is and demonstrate how the end-to-end security workflow helps reduce your mean time to detect and respond to cyber threats.
•The definition and details of the TLM framework
•How TLM enables you to sort through the noise to highlight and investigate concerning incidents
•How TLM works to streamline processes through automated workflow
•Specific use cases TLM can address to prevent major data breaches
Register now to learn how to enhance your threat detection and response capabilities with LogRhythm and Threat Lifecycle Management (TLM).
The cyber threat landscape is constantly evolving and conventional security products (Firewalls, IPS/IDS and web proxies) are unable to address emerging threats in a fast and efficient manner. LookingGlass’ newest threat mitigation appliance, the ScoutShield Threat Intelligence Gateway, provides a zero-touch solution to automate the threat response.
Join our Director of Product Management, Kinshuk Pahare as he discusses the:
1. Challenges with conventional security appliances and the need for a Threat Intelligence Gateway.
2. Importance of having high quality threat intelligence.
3. Must-have characteristics of a Threat Intelligence Gateway appliance.
With all of the hype about Technology Assisted Review, does keyword search still have a place in eDiscovery? You bet it does – if it is conducted properly. This CLE-approved* webcast session will cover goals for effective searching, what to consider prior to collecting ESI that will be subject to search, mechanisms for culling prior to searching, mechanisms for improving search recall and precision, challenges to effective searching and recommended best practices for searching and validating your search results to ensure effective search results.
+ Search Fundamentals
+ Considerations Before Searching
+ Mechanisms for Culling Before and After Searching
+ Mechanisms for Improving Recall and Precision
+ Searching Considerations and Challenges
+ Using Sampling for Defensible Searching
Doug Austin: Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients. Doug is also the editor of the CloudNine sponsored eDiscovery Daily blog.
Karen DeSouza: Karen is the Director of Review Services, In-House Counsel, and a Professional Services Consultant for CloudNine. Also, Karen helps attorneys with CloudNine's software and Pre-Litigation Consulting Services. Karen is a licensed attorney in Texas and has over 15 years of legal experience. She also has a Bachelor of Science in Legal Studies - American Jurisprudence. Before CloudNine, Karen worked as an E-Discovery Director, Project Manager, and as an Associate at various law firms in Houston area where her primary focus was litigation.
* Approved in Selected States (To Be Published Prior To Webcast Delivery)
In today’s digital landscape, it’s much easier for criminals to access sensitive payment card data, not only gaining direct access to a consumer’s available funds, but also their personal identity. With cyber attacks becoming much more advanced, the PCI DSS standard has been forced to adapt to address these new threats.
However, PCI compliance is something that any organization can successfully achieve. The requirements of PCI DSS are clear, but it takes work to accomplish compliance across an organization. On this webinar our panel will discuss some best practices, and solutions that provides your business with an easy, cost effective and highly automated way to achieve compliance with PCI DSS in 2017.
A View of the World's Largest & Fastest Growing Data Center Spot and why you should be there
The Northern Virginia market, which includes multiple locations in/around Washington DC, continues to be one of the largest and fastest growing datacenter hot spots in the world and top market for cloud providers. While much has been said about the area, please join us to discuss the latest in: what makes the market special, why so many firms want datacenter space there, how the market is evolving, and which locations to consider when thinking about a deployment in the area.
Please join us for a webinar with Kelly Morgan, Vice President at 451 Research and Mark Kidd, Senior Vice President and General Manager for Iron Mountain Data Centers, for a discussion on the Northern Virginia market and Iron Mountain’s approach to the market.
The National Credit Union Administration (NCUA) requires every credit union to protect their members’ personal, private data. But with a host of mandates and a range of technology options, where should credit union IT administrators begin? Encryption and key management can address a number of the requirements set out in these guidelines. Together they can help credit unions become compliant and can keep customer data safe.
Join our live webinar "Navigating the National Credit Union Administration (NCUA) Privacy Guidelines:
Securing Customer Records with Encryption and Key Management" on February 7th to learn about:
•Which specific guidelines concern customer information at rest and in transit
•How encryption and key management addresses these requirements
•The benefits of a centralized encryption management
Ransomware can be more disturbing and damaging than any other cyber crime, and payouts seem to be on the rise. Now, a new brand of extortion is emerging, where criminals threaten to sell data obtained from ransomware campaigns on the cyber criminal underground. Join this webinar to learn about the mastermind behind an infamous ransomware campaign, the mindset of criminals no longer content with small payouts, what role threat intelligence plays, and the pros and cons of paying off criminals.
With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.
SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.
Learn how to:
•Stay safe from ransomware and other advanced attacks
•Practice good security hygiene
•Use trusted automated tools to protect your network and endpoints
The Nuix Black Report takes a unique perspective on cybersecurity. Most security industry reports compile data about incidents that have already taken place or trends in data breaches—but these are clearly the symptoms of a deeper problem. Instead, Nuix has focused on the source of the threat landscape: the attackers themselves.
Join this webinar with report author and Nuix Chief Information Security Officer Chris Pogue to discover the true nexus between attacker methodology and defensive posture:
• Which countermeasures will actually improve your security posture (they’re not the ones you think)?
• What is the best spend for your security dollar and why?
• If hackers could speak to your CEO or board of directors, what would they say?
Join Nuix and (ISC)² on Mar 1 (Wed) at 13:00 (Singapore time) and find out what hackers are really thinking.
Everyone knows two-factor authentication right? or do you just know how to use it? Something you know and something you own is a phrase we can all recite but very few actually understand two-factor authentication and its true benefits. How it works, why two solutions are not alike or what to look for in a true secure solution are just some of the conversation topics covered in this webinar.
Das Internet der Dinge (IoT) optimiert Unternehmensprozesse und ermöglicht neue Arten der Kommunikation. Zudem ergeben sich für Organisationen neue Wege zur Kundeninteraktion. Im Jahr 2017 werden IoT-Devices die Anzahl der klassischen Endgeräte weltweit zum ersten Mal übertreffen. Im Jahr 2020 schätzt man das insgesamt 30 Milliarden Endgeräte online sein werden – dies entspricht einer Verdreifachung, hauptsächlich verursacht durch IoT. Dieser unglaubliche Anstieg vergrößert die Angriffsfläche von Netzwerken, daher müssen bestehende Sicherheitsmechanismen angepasst werden.
Besuchen Sie das Webinar Visibilität und Verwaltung von IoT-Geräten und sehen Sie Auswirkung von IoT auf deutsche Unternehmen. Mit Hilfe neuester Untersuchungen zeigen wir Ihnen, welche Sicherheitsbedenken entstehen und wie mit Sie ForeScout IoT Best-Practices umsetzen können.
It’s that time of year again: RSA Conference 2017 is upon us. The trends in the security industry are moving more quickly than ever, and the newest methods of preventing cyberattacks have quickly shifted away from solely building walls of defense and into analytics of the data gathered about your network and the way users and attackers use it.
But what about the tried and true methods for thwarting hackers like traditional Vulnerability Management programs? Many organizations have allowed their VM programs to languish and become ineffective because it’s often seen as too old of a technology and too difficult to make successful.
But that’s only because they’ve really never done it right.
Join Nathan Wenzler, Principal Security Architect at AsTech Consulting, to learn why Vulnerability Management is still a critically key component to a successful security program.
This discussion will highlight:
- The issues that lead companies to ignore their VM programs
- Real-world examples and case studies of solutions you can use to resurrect one of the best tools in your security arsenal
About the Presenter:
Nathan Wenzler is the Principal Security Architect at AsTech Consulting, a leading information security consulting firm. Wenzler has nearly two decades of experience designing, implementing and managing both technical and non-technical solutions for IT and Information Security organizations.
Cybersecurity continues to be a top priority; leaders must constantly judge how to balance business enablement and cyber protection priorities as they support the digital transformation of their organizations.
Join Microsoft's CISO, Bret Arsenault, as he discusses examples of this balancing act in action and where Microsoft can help to improve your security posture.
Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for 2017.
Joanna Belbey, Compliance Subject Matter Expert, Proofpoint, Dan Nadir, VP, Product Management, Proofpoint and Martin Tuip, Senior Product Marketing Manager will discuss some of the risks spotlighted for 2017:
• Supervision and controls to protect investors
• Suitability, particularly for seniors
• Social media and electronic communications retention and supervision
• Cybersecurity controls
Learn how Proofpoint can help you and your firm meet these and other regulatory challenges in the year ahead. Live Q & A will follow.
Time not convenient? Sign up anyway and we’ll send you the link to the recorded webinar plus valuable materials.
As you become a more sophisticated Chef, the complexity of the recipes you write increases. You find yourself querying data from the Chef server or requesting the state of an operating system component. You’re using complex logic that is abstracted behind helper methods. However, these advanced recipes require equally advanced tests.
In this webinar, Franklin Webber, Training and Technical Content Lead at Chef, will show you some approaches to testing complex recipes. He’ll explain mocking and stubbing and then apply those techniques to verify recipes that use search, resource guards, and helper methods.
Join us to learn:
- How to test recipes that are powered by search and data bags
- How to test resource guards
- How to test helper methods
Who should attend:
Chef users with experience using ChefSpec, InSpec, and Test Kitchen
Digital identities are the lifeblood of the modern digital economy
As human activity migrates online, challenges for authenticating physical identities arise, while businesses and consumers look around for guidance.
Increasing demand for answers to the identity verification dilemma was just one of the contributing factors for the emancipation of the identity space as an industry of its own, vertical-agnostic.
With such an outlook, it is important to understand what a Digital Identity is, and their current role in our society. Furthermore, how to leverage the identities to build better business models, deliver better products and services; and most importantly, how to take the leap and hop on the Identity Evolution train - after all, you don’t want to get left behind.
We know implementing new technologies, and changing your current operations and processes can be a challenge. And even though the benefits far outweigh the costs, it always helps to have a guiding hand. Today, that guiding hand comes as a framework to understand how digital identities play a beneficial role in each industry and YOUR business, so you can start the journey from analog to digital identities within your organization.
At the end of the webinar you will:
- Be able to differentiate physical from digital identities, and the attributes that shape them.
- Appreciate the function digital identities play today, and their potential to help overcome present [and future] social and economic challenges.
- Understand the role of Blockchain in the Digital Identity Ecosystem.
- Recognize the business models that are placing identity at the center: Identity-as-a-Service, or Identity APIs - and how they can reshape the world as we know it.
- Know WHY and HOW to make the leap over to digital identities within your business.
Join Mike Vien, Malware and Forensic Expert, for an interactive demonstration of determining the infection of know and non-know malware thru endpoint scanning using CounterTack’s powerful DDNA core that relies on behavioral intelligence, not signatures or patterns.
Unknown threats don’t execute with any indicators and are not previously seen in an organization’s network, data center or within the user base. These are commonly referred to as zero-day threats. And most endpoint detection engines will not identify the right behaviors associated with unknown threats because they rely on signatures.
ThreatScan PRO lets IT and security teams of any size and skill level apply the most powerful memory-based, endpoint scanning technology to determine the infection state based on malware infiltration. CounterTack delivers visibility into endpoint state for teams with a 100% cloud-delivered technology, and the expertise of a CounterTack expert to analyze critical scans. Leverages behavioral intelligence to identify malware artifacts and other indicators of potential compromise, calculating a module-level threat score, to give users the data they need, or the capability to remove it and eradicate it automatically.
Attendees of this session will receive a limited-time only incentive to buy ThreatScan PRO.