IT Governance, Risk and Compliance

Community information
Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
  • Most governments have already created, or are in the process of creating, regulations that impose conditions on the safeguard and use of Personally Identifiable Information (PII), with penalties for organizations who fail to sufficiently protect it. Organizations need to treat privacy as both a compliance and business risk issue, in order to reduce regulatory sanctions as well as reputational damage and loss of customers due to privacy breaches.

    So how will organisations manage infrastructure across multiple domains without falling foul of emerging privacy and data management legislation, particularly when cloud services and personal devices are the norm?

    During this webinar, Steve Durbin, Managing Director of ISF, will discuss how the security function and the board will need to work together to ensure that current regulatory trends and emerging technologies are aligned to maintain business effectiveness and connectivity.
  • Companies everywhere are drowning in data. They are collecting more of it, and at an accelerated pace, while at the same time depending on it more than they have before. Data centers are being constructed around the world to house all this information, but research shows that more than two-thirds of what is being kept is worthless.

    That’s where Veritas comes in.

    The demand for our information management services has never been higher, as there will be more than 44 zettabytes of data in the world by 2020. Using current approaches, IT organizations will be incapable of managing that data – they don’t have the financial or human resources. At Veritas, our business is structured on addressing this issue. We are focused on helping companies harness the power of their information – wherever it resides – by driving availability and revealing insights across heterogeneous environments.

    Join this webcast to learn more about the Veritas vision, where an information-centric approach is taken over infrastructure-centric and we explain our three core beliefs;
    • More data does not deliver more value
    • Infrastructure availability does not mean application availability
    • Not all data is created equal
  • NSX brings tremendous power. Do you have the right controls in place?

    In this presentation, see how HyTrust CloudControl NSX, 2015 winner of the Best of VMworld for Security, Compliance and Virtualization, has fortified VMware NSX with better security, enhanced policy enforcement and better compliance.
  • As organizations become more and more data-centric, the way this data is put to use and delivered via applications and services holds the key to the organization’s overall competitiveness and success.

    A consolidated data center environment provides an optimized platform for innovation, applications and services delivery, cost reduction and efficiency.

    Consolidation in the data center has multiple facets, all introducing security challenges and risks that must be recognized and dealt with.

    This session will introduce the consolidated data center environment, the technologies deployed, their related security challenges and the possible solutions available.
  • MDM and MAM solutions for BYOD create a poor user experience. In this video, watch 5-year old Brooke onboard an iPad to Bitglass Mobile Security in seconds, with one step. Easy Peasy!!
  • Now you can get continuous, automated detection and protection against any vulnerability, anytime, with the next generation of Qualys Vulnerability Management (VM). Join us for this webcast to watch a live demonstration of the comprehensive VM solution from Qualys.
  • HyTrust has developed BoundaryControl for virtual machines using Intel TXT hardware technology. In this video learn how HyTrust BoundaryControl can help you control where VMs run, helping with compliance, data sovereignty and security.
  • Learn how to take control of your data by using advanced encryption, centralized key management and cutting edge access controls and policies. In this session, Imam Sheikh, Dir. Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager will discuss how to proactively address PCI Compliance in the cloud, protect intellectual property and comply with data privacy and system integrity regulations. Join this informative webinar to learn about HOSTING and Vormetric data encryption security solutions and best practices that have helped leading Fortune 500 businesses protect their sensitive data across their private, public and hybrid cloud environments!

    What you'll learn:
    • How data encryption helps prevent data breaches
    • How to address PCI compliance requirements in the cloud
    • How to safeguard cardholder information that is stored in a variety of different databases and versions
    • The HOSTING and Vormetric approach to securing data in motion and at rest
  • While network security encompasses both the physical and software preventative measures to prevent and monitor unauthorized accesses or misuse of a computer network, the adoption of a password management policy and strategy can be foundational to the prevention of unauthorized uses of network resources. In many cases, simple password management is the weakest link. In this webcast, we'll explore what needs to be done to strengthen this important and oft overlooked aspect of network security and discuss password synchronization, and self-reset functions that can save time and money - and a lot of post-it notes as well.
  • Dieser Live-Webcast zeigt Ihnen, wie Qualys und Kenna gemeinsam die Schwachstellenscans von Unternehmen mit Bedrohungsdaten verbinden, um effektives Schwachstellenmanagement auf Risikobasis zu ermöglichen. Die Teilnehmer lernen Strategien kennen, um praxisrelevante Bedrohungsdaten auf ihre Schwachstellenmanagement-Pogramme anzuwenden.
  • Was geschieht, wenn Hacker in Ihre Systeme eindringen, und wie Sie schnell reagieren können.

    Diese Woche zeigen wir Ihnen, wie Sie einen potenziellen Angriff schnell und noch vor dem Verlust von Daten erkennen können. Mithilfe von ATP-Technologien können Sie schneller und flexibler auf die Situation reagieren und die folgenden drei Fragen leichter beantworten: „Wie?“, „Was?“ und „Wo?“

    Im zweiten Teil dieser dreiteiligen Webcast-Reihe erfahren Sie, wie ATP-Technologien gewährleisten können, dass Ihr Unternehmen darauf vorbereitet ist, schnell zu reagieren, sollte es Ziel eines Angriffs werden.
  • Cyber-attacks are growing in complexity, and the rise of Advanced Persistent Threats (APTs) and insider threats has made organisations and government agencies more aware of their vulnerability. A comprehensive defense requires capabilities that go far beyond the firewall to protect against attackers that have penetrated the network perimeter. While no point security solution—technology-based or otherwise—can fully protect an organisation from cyber-attacks and APTs, today’s availability of cross-domain security solutions can help organisations protect themselves better than ever before.

    In this roundtable discussion, participants from the National Bank of Kuwait, Accenture and CA Technologies will examine the current cyber security challenges facing organisations, including in the Middle East, and debate how the need for identity-centric security is critical today.

    Tamer Gamali, President, (ISC)² Kuwait Chapter; Board Member, (ISC)² EMEA Advisory Council; CISO, National Bank of Kuwait

    Shirief Nosseir, Business Lead, Information Security for the CA Technologies business in the Eastern Europe, Middle East and Africa
    Simone Vernacchia
    IT Strategy, Infrastructure & Security Consulting & Outsourcing Director, Accenture Middle East

    (ISC)² is giving away 3 non-member passes for the ISC)² SecureDubai Conference (November 24) to delegates who view the webinar for a minimum of 45 minutes. Winners will be announced live at the end of the webinar and subsequently emailed with information on how to redeem their prizes. For further details on the prize draw and full T&C’s, please copy and paste the following link to your browser:
  • Qué sucede cuando los elementos maliciosos penetran en su infraestructura y cómo reaccionar rápidamente.

    Durante esta semana comentaremos cómo podemos detectar vulneraciones potenciales rápidamente, antes de que se pierdan los datos. La tecnología para amenazas avanzadas le proporciona una respuesta rápida y ágil, y al mismo tiempo le ayuda a responder tres sencillas preguntas: cómo, qué y dónde.

    Únase a nosotros en nuestro segundo capítulo de esta serie de tres partes, con el fin de que entienda cómo las tecnologías ATP pueden encargarse de que su empresa esté lista para reaccionar rápidamente en caso de que ocurra una vulneración.
  • Sponsored by Avalara

    Whether you’re moving up from Quickbooks or have an enterprise level ERP, you know that you can’t mess around with tax compliance. Imagine getting ready for IPO or hit that big buy from a major Fortune 100 company – and then find that the acquisition tanks due to a major liability in mismanaged sales tax. Ouch! Unfortunately, we’ve seen it happen time and again.

    Let us help you get your organization ready for the next growth phase that will put you into the three comma club. We’ve rounded up some top-notch tax experts with lots of experience working with public and private high-growth tech companies – and they’re not going to let you down in the clutch.

    Tax partners Malcolm Ellerbe, David Sordello, and Jon Davies of the Silicon Valley company Armanino will sit down for an interactive chat with the VentureBeat audience – and are happy to take your questions as you navigate the ins and outs of sales tax in a mobile and startup culture.

    In this webinar, you’ll:

    * Gain greater visibility to common sales tax loopholes that often snag hot tech startups and entrepreneurs
    * Determine whether sales tax is even an issue for your organization -- you might be surprised.
    * Learn ways that international tax in growth stage companies can be the make or break point for that next IPO
    * Get a high level overview of other tax considerations like net operating losses, impact of stock compensation, and the states that are currently taxing cloud computing services.

    Malcolm Ellerbe, Tax Partner, Armanino
    David Sordello, CPA, Corporate Tax, Armanino
    Jon Davies, Tax Partner, International Tax, Armanino
  • You get an alert on an attack. You check it out and you find a real breach. You are able to stop it. Job done.

    Or is it? Do you know how the attacker got in? Do you know if this is the only system they compromised? Do you know what they did next, before you found them?

    In this session, Arbor will show you the importance of understanding lateral movement and the ability to understand the entire extent and impact of a breach. Know if your compromised system was used to attack further hosts and if so what was done. Build an evidence trail that can be used to identify every facet of the attack and the methods used, quickly and simply.
  • The FireEye Advanced Threat Report for EMEA provides an overview of the advanced persistent threats (APT) targeting computer networks that were discovered by FireEye during the first half of 2015.

    In this webinar we will discuss the findings and also the potential implications this may have on organisations within EMEA.

    Motivated by numerous objectives, threat actors are evolving the level of sophistication to steal personal data and business strategies, gain a competitive advantage or degrade operational reliability.

    The webinar will draw on data gleaned from the FireEye Dynamic Threat Intelligence (DTI) cloud. There will be information and insight around Advanced Threats at a country, vertical and government level.
  • What happens when bad stuff gets in, how to react fast

    Even with the best intelligence sitting at your network perimeter to keep ‘bad stuff’ out, the reality is that at some point a breach will occur. Targeted attacks can hide, appearing as ‘good stuff’ until they’re inside the corporate network, able to begin impacting systems and stealing valuable data. Recognizing that an attack has started is only the first phase, understanding the level of penetration is key – and this can only be achieved with advanced threat technologies that can detect and remediate across multiple control surfaces, correlating data and able to focus down to fine-grain levels.

    Missed the first webcast? If a breach is inevitable, what should I do? How best to prevent attack, and keep bad stuff out - View on-demand here -

    Sign up for Webcast 3 - Piecing back the jigsaw, what can I learn? Understanding what happened, and getting back on track fast -
  • Choosing an enterprise-class file sharing service such as Box is a great first step in safely migrating to the cloud. However even with the most robust service, enterprise organizations are still responsible for how their users take advantage of the service, what sensitive content they upload and share, and potential damage due to compromised user credentials.

    In this on-demand webcast, Sergio Castro, Cloud Security Expert at Elastica, will discuss:

    •What base level security Box provides
    •Best practices in identifying sensitive, shared content that may violate compliance policies (PCI, PHI, PII, etc.)
    •Best practices in using data science to uncover risky or anomalous behavior
    •How to automate protection against data breaches, including a demo of the Elastica Securlet™ for Box
  • Fortinet protects the most valuable assets of the largest financial services institutions across the globe. Learn how they provide high-performance protection against cyber-threats by hearing from security experts and key customers.
  • Many have hypothesized about the security impact of the “Internet of Things” (IoT) for enterprises, but for the first time, we have actual data on the potential security risks introduced by these devices—and the results may surprise you!
    Andrew Hay, Director of Security Research at OpenDNS, conducted a multi-month study on the prevalence of IoT devices in enterprise networks. In this webcast, Andrew will walk through the key findings, including:
    The prevalence of IoT devices—even in the most regulated industries—and which devices are most commonly found
    Where IoT hosting infrastructure is located on the internet
    Vulnerabilities found in IoT hosting infrastructure
    Implications to consider for your security program
    How to gain IoT visibility in your enterprise network
    - See more at:
  • Since many compliance and regulation issues come from data, all organizations need a governance plan for data in all of its many forms. One area that is often overlooked is the abundance of data that your marketing team collects – which is used throughout the business for important objectives, including customer communication and revenue generation.

    The volume of data collected by the marketing area of your organization is set to grow, as most CMOs say that data acquisition is a top priority, according to a Salesforce Marketing Cloud survey. A data governance strategy for the marketing area, including validating and cleansing this data, will reduce the risks of common compliance issues and their consequences.

    Applying data governance best practices to your organization’s marketing operations can be simple, quick, and highly beneficial to your organization overall. For example, accurate, clean data that meets regulations improves a marketer’s ability to effectively personalize their messaging, which can lead to 5-8 times the ROI on your marketing spending. Join us for this Meet the Experts webinar series to learn from the Data as a Service team about the risks and costs of not having a governance strategy for your marketing data, and how we can help you proactively solve these issues.
  • You can’t defend against something you don’t understand. Most network attacks are actually easy to understand if you have the right background. Join SolarWinds’ Mav Turner to review the basics of network security. He will discuss key concepts and core networking technology necessary for a solid foundation to secure your infrastructure.
  • 60% of breached organisations included in the 2015 Verizon DBIR were initially compromised within minutes, and yet for most of those organisations it took hundreds of days to detect the intruders.

    In the face of modern cyber threats, the Information Security world has embraced the world of intelligence. What is intelligence in this context and how can it be used effectively to reduce the time to detect and respond to cyber-threats?

    Join us to discover what Security Intelligence really means, and how it can be performed effectively in your business to enable better and faster self-detection of threats, resulting in faster response times and a reduction of total risk.

    Security Intelligence is part of the jigsaw that makes up the overall threat intelligence picture for a business. It aims to provide visibility on the actual cyber-threats, and other problems, affecting your network. Time is a critical aspect to any form of intelligence and the more time taken to detect and respond to a threat, the greater the risk of a breach, and the greater the impact of the incident. An advancement of SIEM, Security Intelligence delivers pro-active threat detection and uses greater dimensions of data from different sources and different times.
  • Slavery may seem like a thing of the past but is sadly not absent from the modern world. There are still many examples of human trafficking and exploitation in countries such as Thailand. More often than not, exploited individuals end up ‘paying back’ money earned to traffickers by working in factories and manufacturing plants.

    Supply chain management and transparency is therefore imperative for companies to ensure that slavery is not being used in the production chain. Emotive issues such as slavery can cause significant reputational damage to companies. And this is before one considers the moral obligation companies have to combat slavery and human trafficking.

    This webinar will explore the mechanisms that companies can use to ensure that people are not being exploited at any level of the supply chain. Speakers include The Red Flag Group Executive Chairman Scott Lane and Director of Anti-Slavery International Aidan McQuade
  • Конвергенция используемых Вами традиционных инфраструктур резервного копирования с устройствами Veritas NetBackup ─ это оптимальная стратегия для Вашего бизнеса. Это самый эффективный способ существенно упростить резервное копирование и восстановление данных.
    Одно усовершенствованное решение позволит Вашей компании масштабировать среду любого размера и типа — физическую, виртуальную или облачную. А увеличение производительности и эффективности поможет сэкономить время и деньги. У Ваших сотрудников будет достаточно времени, чтобы сосредоточиться на работе с клиентами и деятельности, которая увеличивает Ваш доход. А увеличение дохода обеспечит Вам больше возможностей для внедрения инновационных решений.
    Сколько же денег можно сэкономить с помощью Veritas NetBackup, особенно в виртуализированной среде?
  • Die Konvergenz herkömmlicher Backup-Infrastrukturen mit Veritas NetBackup-Appliances ist die richtige Strategie für Ihr Unternehmen. Es ist die effizienteste Methode, um Ihr Backup und Ihre Wiederherstellung deutlich zu vereinfachen.
    Mit einer einzigen optimierten Lösung kann Ihr Unternehmen sein Backup für Umgebungen jeder Größe skalieren – ob physisch, virtuell oder cloudbasiert. Leistung und Effizienz werden erhöht und Sie sparen Zeit und Kosten ein. So haben Ihre Teams mehr Zeit, sich auf Ihre Kunden und gewinnbringende Projekte zu konzentrieren. Denn höhere Gewinne bedeuten, dass Sie mehr in Innovation investieren können.
    Wie viel Kosten können Sie also mit Veritas NetBackup einsparen, insbesondere in einer virtualisierten Umgebung?
  • La convergence des infrastructures de sauvegardes personnalisées avec les appliances Veritas NetBackup est la stratégie adaptée à votre entreprise. Il s'agit de la manière la plus efficace de simplifier considérablement votre sauvegarde et votre récupération.
    Grâce à une solution rationalisée, votre entreprise peut évoluer vers n'importe quelle taille et n'importe quel type d'environnement (physique, virtuel ou cloud). Grâce à l'amélioration des performances et de l'efficacité, vous économiserez du temps et de l'argent. Vos équipes auront alors le temps de se concentrer sur vos clients et sur les activités génératrices de revenus. Et grâce à cette augmentation de revenus, vous pourrez innover.
    Alors, combien pouvez-vous économiser avec Veritas NetBackup, en particulier dans un environnement virtualisé ?
    Inscrivez-vous dès maintenant à notre Webcast diffusé le 7 octobre
  • Don’t stay behind. Embrace convergence
    Staggering complexity. Relentless growth. Bare metal, Virtual, Private Cloud? Sound like your data center and the daily challenges you face in your backup infrastructure?

    Register for this webcast and get straight answers on simplifying enterprise data protection, scaling for growth, and increasing agility. You’ll learn how Veritas NetBackup reduces complexity through comprehensive integration, a converged platform, and efficiencies through automation and self-service operation.

    Attend the webcast and learn how to:
    •Reduce the increasing complexity of protecting a modern enterprise IT environment
    •Scale with the relentless growth of the modern enterprise data center
    •Adapt your backup infrastructure to challenge your traditional backup model?
    •Ensure you understand how your can modernize your backup with converged backup appliances

    Learn how to you can focus your team on activities that drive revenue.
  • Last year, hackers targeted retail companies and their POS systems to steal vast amounts of credit card and financial data. This year, things have changed as cyber criminals are now going after identities, making data breaches much more personal. While credit cards can be easily replaced, personal identities cannot. This webinar looks at the major data breach trends in 2015. Who is doing the hacking, how they are doing it, and what industries are being targeted most. In addition, listeners can get a new understanding of how to approach to data security and “Secure the Breach”.
  • This webinar explores the best practices for distributing policies, determining when and how to provide education and how to build awareness campaigns. We often think that once a policy has been formally issued the job is done, but that is far from the truth. Properly communicating the policy is only the start.

    Attendees will learn the challenges, best practices, and benefits of a well thought out policy communication plan.
    Register now to join IT GRC industry expert, Michael Rasmussen as he discusses best practices in policy awareness and communication.
    Learning Objectives:
    - Define the key parts of a policy communication plan
    - Identify methods for tracking and delivering training and attestations
    - Determine ways to enable employee access to policies and related materials
    - The role of training and education
    - The policy portal – delivering an interactive employee experience for policy management
    - Getting employee questions answered
    - Attestations, read and understood, certifications
    - How technology enables employee engagement on policy
  • Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.

    Discover how:
    • HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
    • Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
    • Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
    • Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
    • The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
  • Comprenez ce qui s’est passé et rétablissez l’activité rapidement

    Au cours des deux premiers webcasts, nous avons vu pourquoi les violations sont inévitables et comment détecter rapidement un menace avancée. Dans ce dernier épisode, nous allons voir comment Advanced Threat Protection peut efficacement résoudre le problème et supprimer les malwares de vos systèmes. Rétablir l’activité, cependant, ne suffit pas : il faut aussi améliorer sa préparation pour l’avenir. Nous y viendrons également

    Inscrivez-vous ici.

    Webcast 1: Advanced Threat: que faire en cas de violation de sécurité inévitable? -

    Webcast 2 - Advanced Threat Protection : j’ai subi une violation de sécurité, que s’est-il passé ? -
  • Entienda qué ha ocurrido y cómo restablecer sus operaciones rápidamente

    En este último capítulo hablaremos sobre cómo la tecnología para las amenazas avanzadas puede también solucionar y eliminar de forma efectiva el malware de sus sistemas. Pero sabemos que no quiere simplemente reanudar sus operaciones, sino que también prefiere estar mejor preparado de cara al futuro. Por ello también describiremos un enfoque concreto para ayudarle a conseguirlo.

    En los dos primeros webcasts hemos comentado por qué una vulneración puede ser inevitable y cómo puede detectar rápidamente una amenaza avanzada.

    1) Inscríbase ahora -
    2) Inscríbase ahora -
  • The growing sophistication and evasiveness of cyber threats have redesigned the paradigms of the information security landscape. Since traditional signature-based technologies alone cannot keep the pace with advanced threats, a breed of new technologies has been developed to fill the gap in what seems an endless arms race against malware creators. In the same time, the volatility of the perimeter, direct consequence of the growing adoption of cloud services, dramatically broadens the vulnerability surface of the organizations, requiring a new approach for the CISOs in terms of both technologies and policies.

    In this webcast we will analyse the current threat landscape related to advanced malware, demonstrating that, unlike what is commonly believed, it is not necessarily related to state-sponsored operations, but it is frequently used even in opportunistic attacks (and in several cases also available as a P/SaaS model).

    After showing the characteristics that make a malware “advanced” (evasion at the endpoint and network level, polymorphism, etc), the webcast will outline the foundations of a multi-layered approach needed to detect, contain and mitigate the threats posed by advanced threats.
  • Veritas NetBackup appliance è la soluzione efficace e innovativa che semplifica e ottimizza le procedure di backup e recovery.
    Una soluzione pratica che garantisce la scalabilità necessaria per adattare il tuo business ad ambienti, fisici, virtuali e cloud. Performance ed efficienza cresceranno insieme ai profitti: i tuoi team potranno dedicarsi ai clienti e alle attività di business, promuovendo al meglio l'innovazione!
    Che benefici puoi ottenere con le appliance NetBackup di Veritas?
    Scoprilo partecipando al nostro Webcast del 7 ottobre.
  • Businesses are spending so much money on security -- almost $47 billion in 2013 -- and yet the number of breaches continues to increase. To mitigate the risks of increasingly sophisticated, innovative and persistent threats, we need to change the way we think about our security programs. In this webcast, Art Gilliland, General Manager of HP Enterprise Security Products, talks about the challenges all enterprises face from the bad guys -- and the critical steps businesses must take to defend against today's most advanced threats.
  • Jason will introduce some of the major challenges associated with monitoring and logging cyber security events, highlighting the need to identify indicators of compromise at a much earlier stage and in a more consistent, insightful manner.

    He will present a cyber-security monitoring framework, emphasising the benefits of taking a balanced, intelligence-led approach, based on fundamental log management and situational awareness. He will then look at what a cyber-security incident actually is and outline how to prepare for and respond to a cyber-security incident effectively – ensuring that it is properly followed up - helping to reduce the frequency and impact of future cyber security incidents.

    Finally, Jason will introduce a cyber-security incident response maturity model, showing how you can measure the maturity of a cyber-security incident response capability.
  • Today’s cyber attacks have become increasingly more sophisticated, requiring organisations to embrace an agile and ever more adaptive approach to their cyber security strategy. Join our webinar as we discuss the changing landscape of advanced threats in EMEA, look into the anatomy of APTs and explain why conventional security methods are no longer equipped to deal with these advanced attacks. In addition, we’ll share insights into real-life case studies of advanced threat actors using zero-day attacks and how an adaptive defense model allows FireEye to quickly respond, detect and remediate such attacks.
  • According to Verizon’s “2015 Data Breach Investigation Report,” the cyberattacks are becoming increasingly sophisticated. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. Under these conditions, what would be your approach to dealing with security threats?

    Join us for a live webinar session and discover how auditing can help mitigate the risk of data breaches and solidify your security strategy overall. During the session, we will talk about:
    - The latest data breaches and their ramifications;
    - How auditing complements threat-defense mechanisms;
    - What should be audited and why.
  • Wishful thinking or a cursory security assessment may have worked in the past but dealing with persistent and advanced threats requires an equally sophisticated and mature approach.

    While APT’s are on the rise and the use of zero-day vulnerabilities can be one of the weapons for such attacks, reality is that the large majority of incidents – advanced or not – occur using known vulnerabilities. Resolving these is, therefore, paramount to reducing the attack surface for cyber criminals.

    Join Amar as he shares his tips on adopting a mature and continuing vulnerability management process that can help organizations reduce risk and be better prepared to respond to APT’s.
  • In this 30-minute webcast, industry experts Mike Rothman, president of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.

    During this webcast, attendees will learn
    * Which tactics have the greatest effect on fostering cyber security awareness throughout the enterprise

    * How to foster a risk-aware security culture while still encouraging trust among your employees and partners

    * How to bridge the gap between IT security and IT operations (hint: knowing more about your assets is the first step)
  • Next-generation firewalls and sandboxes stop attacks at various steps, but they only react to malicious communications and code after attacks have launched.

    There’s another way—observing where attacks are ‘staged’.

    We’re going to demonstrate how we can visualize Internet infrastructures for visibility into where attacks will emerge. Then, we’ll know where advanced malware will be downloaded and where compromised systems will callback—before attacks launch.

    In this live session, you’ll learn:

    7 steps of an attack and how you can use this data to get ahead of new security events.
    3 ways to uncover malicious activity by looking at domain names, IP addresses, and autonomous system numbers (ASNs).
    How to apply this intelligence to your current defenses.
  • Many organizations have struggled with BYOD programs due to MDM/MAM deployment challenges, user privacy concerns, and low adoption. This is causing some to question BYOD altogether. Fortunately, data shows that there is huge demand for BYOD, but such programs must meet employee needs in addition to IT needs.

    In this webinar, you'll learn where existing BYOD programs have fallen short, and how the next-generation of mobile security products will ensure secure, broad adoption of BYOD.

    Receive (ISC)² CPE credits for attending this webinar.
  • Come capire cosa è accaduto e ripristinare rapidamente l'operatività

    Nei primi due Webcast abbiamo parlato del perché una violazione sia un problema inevitabile e come rilevare rapidamente una minaccia avanzata. Nell'ultimo appuntamento, illustreremo come la tecnologia Advanced Threat Protection può rimediare al problema rimuovendo con efficacia il malware dai tuoi sistemi. Ma il tuo obiettivo non è solo ripristinare l'operatività, è soprattutto evitare che il problema si ripeta in futuro. Quindi ti proporremo un approccio utile anche per approfondire questo aspetto.

    Hai perso i primi due Webcast della serie? Puoi guardarli on-demand adesso.

  • Advanced Threat Protection is built on the principle of Prevention, Detection and Mitigation. However, if the different technologies within each of these areas operate independently, there will be gaps between the different elements, gaps that can and will be exploited during an attack.

    This session will focus the concept of bringing together all of the elements of Advanced Threat Protection to form a holistic, collaborative solution that encompasses all of the network.
  • Many security vendors claim to have access to the security intelligence and analytical capabilities needed to identify the trace elements of malware activity before cyber-attacks take place.

    They claim the ability to identify threats and data breaches at the earliest possible stage. Even accepting that the average time to detect a breach has halved over the last eighteen months, a discovery and remediation timeline that is still close to 200 days is by any standards far too long.

    This presentation looks at what can be done to improve things and what businesses should be demanding from there security service providers.
  • We live in a world where technological change is rapid. There is a race against time to be faster and better than the competition. Businesses will need to change as a result of technology disruption or risk becoming irrelevant to their customers. It is during these times of tumultuous change and uncertainty when the unexpected - new attack opportunities and tools - are presented to cybercriminals to steal, harm or destroy the digital assets of organisations in an unprecedented way and scale.

    In this presentation, Rik will identify the top disruptive technologies to government and business today and examine the impact of such innovations on the cybersecurity of corporate networks. He will also provide recommendations to assist organisations to prepare for the unexpected threats and challenges that will arise from technology disruption in the future.