Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Modern Data Strategies – Moving Beyond RDBMS
    Modern Data Strategies – Moving Beyond RDBMS
    Mike Stone, Lead Architect & CIO, House of Brick Recorded: Oct 16 2019 45 mins
    Relational databases have been the undisputed industry standard for data storage and management since the concept was introduced to the computing community, with the first commercially viable products appearing in the late 1970’s. Today, 50 years later, there continues to be a place for this technology and it is still a pillar of modern computing. However, in the ever-changing landscape of data platforms and technology, how does your organization determine the best options for storing, managing, and retrieving data going forward? Learn how concepts like Virtual, NoSQL, Columnar, and Streaming increase your options as well as offer the potential for improving your ability to truly manage data while maximizing its utility for your business.

    Topics covered:
    • Security
    • Governance
    • Management
    • Self-Service
    • Common Cloud Services
    - Google Spanner
    - Amazon DynamoDB
  • Business Continuity Management and Resiliency for 2020 and Beyond
    Business Continuity Management and Resiliency for 2020 and Beyond
    Sam Abadir, Lockpath Recorded: Oct 17 2019 48 mins
    Business interruptions can hurt an organization's reputation, decrease revenue and loose customer trust. Business continuity and resiliency plans detail the impact of various disaster scenarios and creates a solution for ensuring critical operations remain open during a crisis.

    In this live webinar, Lockpath’s Sam Abadir will share what business continuity and resiliency management for 2020 and beyond looks like, including:

    • What areas business continuity management and resiliency encompasses

    • How your organization can gain efficiency from proper business continuity and resiliency management

    • Advantages of managing business continuity and resiliency on an Integrated Risk Management or Governance Risk and Compliance platform

    • Creating strategies for sustained growth in 2020 and beyond

    Find out what you need to know to manage business continuity and resiliency in 2020 and beyond by attending this educational webinar. Register now!
  • How Lending Tree built an automated, connected service experience
    How Lending Tree built an automated, connected service experience
    Esther Chen, Product Marketing at MuleSoft Recorded: Oct 17 2019 31 mins
    To automate business and service processes requires enabling faster integration between Service Cloud and the ecosystem of surrounding applications. See how LendingTree was able to digitally transform their service experience and provide agents with a single view of their customers. Learn how to use MuleSoft's API approach to integrate Salesforce faster and more efficiently.

    Key Takeaways:
    - Understand the power of MuleSoft + Service Cloud in building a personalized service experience
    - Learn how LendingTree was able to create a single view of their customer using API Designer and Flow Designer
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Oct 17 2019 33 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Protecting Today’s Smart City Through Device Visibility & Control
    Protecting Today’s Smart City Through Device Visibility & Control
    Jonathan Jesse is a Senior Systems Engineer, State & Local, Forescout Technologies Recorded: Oct 17 2019 27 mins
    The vision of smart cities is bright—automating critical public services, improving community interactions and achieving untold levels of efficiency in a connected, technology-driven society. But along with all of this boundless potential comes untold risk of a cybersecurity breach.

    Join us for this insightful webinar to hear how Forescout Technologies is playing a critical role in securing these technologically advanced communities to mitigate risk, increase visibility across the extended enterprise, and provide the necessary controls needed to secure these smart environments.

    Webinar topics include:

    ·Protecting our Law Enforcement technology – from vehicles to dispatch, and all devices in between
    ·Risks and challenges of new technologies with Smart Transportation and Digital Services
    ·Real case studies of Smart Cities and how they manage the risk of IoT and the connected reality

    Sponsored By Forescout Technologies + ISA Cybersecurity
  • What’s Your Organization’s Exposure on the Dark Web?
    What’s Your Organization’s Exposure on the Dark Web?
    Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management, Terbium Labs Recorded: Oct 17 2019 58 mins
    A thriving fraud economy exists in the criminal underground, on the Dark Web and beyond, that trades in compromised information. Even if it’s not your business’s information, it’s still your problem because stolen user credentials are used for large-scale phishing attacks, credential stuffing, and account takeover. Join two Terbium Labs VPs—Emily Wilson, VP of Research, and Dee Liebenstein, VP of Product Management—as they offer insights into how your organization should rethink data security as more information is exposed, and re-exposed, every day.
  • Global Trends in Cloud Access Management, Single Sign On and Authentication
    Global Trends in Cloud Access Management, Single Sign On and Authentication
    Danna Bethlehem, Director of Product Marketing, Thales Recorded: Oct 17 2019 47 mins
    The explosion of cloud applications and identities have set IT decision makers on a quest for reconciling the benefits of the cloud with the security and compliance requirements needs of the enterprise. Much like the user experience offered by mainstream consumer applications, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud applications now a crucial part of day-to-day business operations, the 2019 Thales Access Management Index found that almost half (49%) of IT security professionals believe cloud applications make them a target for cyber-attacks. Cloud applications are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices (54%) and web portals (50%).

    This webinar will review the findings of the Thales global report and how organizations around the world are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
    - What are the major attack vectors for cyber attacks
    - Which access management technologies organizations are deploying to secure access to the cloud
    - Which access management technologies IT professionals deem the most effective in securing access to the cloud
    - The criteria IT professionals use to determine access policies for users
    - Who are the internal stakeholders involved in Access Management deployments
  • Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program
    Becoming a Leader: An Inside Look at a Level 4 Threat Hunting Program
    Casey Smith Director of Applied Research & with Brian Baskin Technical Director of Threat Research @ Carbon Black Recorded: Oct 17 2019 60 mins
    What is required to take your threat hunting program to the highest level of maturity? Using Red Canary as a case study, this session will provide a behind-the-scenes look at how to bring together MITRE ATT&CK™, CB Response, and Atomic Red Team to analyze massive amounts of data and quickly detect adversaries. This webinar also features David J. Bianco's threat hunting maturity model.

    Attendees will learn how to:

    - Automate the majority of successful data analysis procedure
    - Map adversary techniques to detection coverage
    - Test, validate, and continuously improve visibility
    - Make threat hunting a repeatable process that drives better security outcomes
  • Live Demo: Foundations of People-Centric Cybersecurity
    Live Demo: Foundations of People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Recorded: Oct 16 2019 39 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    1.Protect your people from email-based attacks
    2.Gain visibility into who in your organization is getting the most attacks
    3.Solve for user awareness through threat simulation and training
  • National Cyber Security Awareness Month- Protect IT
    National Cyber Security Awareness Month- Protect IT
    Kevin Haley | Eva Velasquez | Ryan Lawless Recorded: Oct 16 2019 55 mins
    As we wrap up National Cyber Security Awareness month join Symantec and partners The Identity Theft Resource Center and Infolock for our final webinar. Whether you are connecting to networks or collecting customer/consumer data, protection is needed. This group of speakers will help familiarize you on how to check your systems and how to keep others’ data safe.

    Topics will include:

    - If You Connect, You Must Protect: updating to the latest security software, web browser and operating systems

    - Wi-Fi safety

    - If You Collect It, Protect It: keeping customer/consumer data and information safe

    Register Today
  • Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Getting Ahead of the Game in Data Protection: Discover, Classify and Manage
    Gabe Gumbs, Chief Intelligence Officer at Spirion and Ben Rice, VP of Business development at Bitglass Recorded: Oct 16 2019 42 mins
    Businesses today need a solution that identifies and controls high value data, from cloud to device, in an easy-to-deploy, architecture. Seamlessly integrate with your existing IT infrastructure and increase the effectiveness of the security solutions already in use in your organization. Want to learn more?

    Join Spirion’s and Bitglass data protection experts in our joint webinar: Getting Ahead of the Game in Data Protection: Discover, Classify and Manage on October 16, 1 PM ET.

    What you will learn?

    •Data protection challenges to be mindful of
    •Managing digital transformation and unstructured data proliferation
    •How Bitglass and Spirion's solutions work together to protect your data
  • NCSAM Part 2 of 4: Accelerate Incident Response Through Automation
    NCSAM Part 2 of 4: Accelerate Incident Response Through Automation
    Joseph Loomis, CSO, CyberSponse and Steve Sunday, Principal Technical Engineer, AccessData Recorded: Oct 16 2019 28 mins
    When a data breach occurs, every second counts. With the new RESTful API from AccessData, organizations can now automate incident response, saving up to 40 minutes of analysis time per incident. When an attack is detected by an organization’s cybersecurity software, like CyberSponse, the #1 security, orchestration, automation and incident response solution, the API alerts the AD Enterprise agent and initiates a collection job within moments of the attack, immediately preserving data related to the root cause of the breach.

    Join us on Thursday, August 22nd at 2:00 pm ET for a 60-minute webinar co-presented by AccessData and CyberSponse. In this webinar, you’ll understand how automation can facilitate faster, more secure incident response and you'll see firsthand how the integration between these two platforms using the new AccessData API triggers automated forensics, dramatically accelerating incident response. Collected evidence is then immediately available for analysis in AD Enterprise. Join us to see a live demo of the integration!
  • Best Practices for Secured ICS Deployments
    Best Practices for Secured ICS Deployments
    Barak Perelman Recorded: Oct 16 2019 60 mins
    Manufacturing and critical infrastructure organizations require the right OT solution that can deliver visibility & security from emerging threats. But that is only half the battle. Each environment is a bit different and what may be appropriate for some, will simply not work for others. Whether you are big or small, distributed or centralized will determine the right deployment model for you. Join us as we discuss a variety of deployment best practices based on different organizational models, structures and goals. After all, it is about leveraging the right model for YOUR organization that will ultimately achieve a fully secured environment.
  • 10 Ways to Dramatically Cut Abandonment Rates During Account Onboarding
    10 Ways to Dramatically Cut Abandonment Rates During Account Onboarding
    Dean Nicolls, VP of Global Marketing, Jumio Recorded: Oct 16 2019 31 mins
    Financial institutions are losing almost 40% of applicants during digital on-boarding. There's a number of reasons for this, but often its the online identity verification part of the process where customers are lost. This is because the experience is often too time-consuming, onerous, or clunky.

    In this webcast, Dean Nicolls provides an update on the abandonment crisis and then shares 10 practical tips for improving the onboarding process. He also shares a handy TCO calculator for comparing conversion rates of different identity verification solutions.
  • Unified Data Protection: Part 2
    Unified Data Protection: Part 2
    Ankur Chadda, Senior Product Marketing Manager Recorded: Oct 16 2019 38 mins
    Enterprises are facing new challenges when it comes to protecting regulated data and critical IP.

    Understanding the location of all data, whether at-rest, in-use, and in motion across on-premises and the cloud is essential to keep data safe and secure. This enables companies to identify its riskiest users and behaviors. With Forcepoint, you can automate the identification, classification, and protection of critical data.

    Wednesday, October 16, 2019

    10 a.m. CDT

    This webinar explores how companies should rethink data security. Addressing the challenges of protecting critical data & intellectual property requires a new approach: a risk-adaptive, dynamic approach to data protection, including these three main components.

    Analytics-Driven Visibility – to gain oversight everywhere users work and collaborate

    Risk-Adaptive Controls – to eliminate the complexity of policy enforcement

    Intelligent & Dynamic Automation – to build a better understanding of context and user intent
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing (MIB)
    K. Eric Gentry, Managing Principal, VTRAC Recorded: Oct 16 2019 79 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the social attacks and the current cybersecurity threat landscape.

    We’ll cover:
    •The most common social engineering attacks
    •New insights on phishing attacks
    •Top threat actors in social attacks

    Our Verizon Threat Research Advisory Center presenters will be:
    •K. Eric Gentry, Managing Principal, VTRAC
    •David Kennedy, Managing Principal, Open Source Intelligence

    And then we'll turn things over to David Kennedy, Managing Principal, Open Source Intelligence to cover:
    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com
  • LGPD e o direito ao esquecimento
    LGPD e o direito ao esquecimento
    Luiz Guimaraes, Enterprise Solutions Engineer, ASG Technologies Recorded: Oct 16 2019 53 mins
    Uma nova geração de leis e regulamentos surgiu nos últimos anos com o objetivo de proteger dados e informações de usuários na internet. Na Europa a GDPR, no Brasil a LGPD e nos Estados Unidos (Califórnia), até agora, o CCPA.

    O desafio hoje, para todas as corporações, é não só a gestão de um volume explosivo de dados não-estruturados, tornando-os aderentes as suas Políticas de Governança, como também a geração de valor para o negócio através do uso consistente de seu conteúdo.

    Junte-se a nós em um Quick Demo Webinar, onde você entenderá como o ASG Mobius 9.1 está ajudando seus clientes a obter o máximo de suas informações:
    - Impactos e consequências da nova legislação para as empresas
    - Muito mais que uma abordagem tradicional - entregando escalabilidade, flexibilidade e controle com tecnologia moderna
    - Como tratar aspectos da LGPD em conteúdo dados estruturados e não estruturados
    - Gestão do conteúdo por políticas amplas e auditadas
    - Direito ao esquecimento na Gestão de Registros
  • DNS as a Foundational Security Architecture for Digital Transformations
    DNS as a Foundational Security Architecture for Digital Transformations
    Jerry Wong, Systems Engineer, Infoblox Recorded: Oct 16 2019 57 mins
    The perimeter has shifted. Your users directly access cloud applications from everywhere and data no longer reside only in data centers. Digital transformations like SD-WAN, IoT and cloud make securing your infrastructure, applications and data complicated. SD-WAN enabled branches directly connect to the Internet, but they don’t have the ability to replicate a full HQ security stack. IoT leads to an explosion of non-standard devices using non-standard protocols, making them harder to secure. Every new change doesn’t equal need for a new security tool.

    What’s needed is a scalable, simple, and integrated security solution that leverages existing infrastructure that organizations already own. DNS is critical to the fabric of the internet and any IP based communication (on-premises, cloud, SD-WAN and IoT environments). It serves as the perfect foundation for security because it is simple to deploy, ubiquitous in networks, is needed anyway for connectivity and can scale to the size of the Internet.

    Join Infoblox and (ISC)² on Oct 16, 2019 (Wed) at 14:00 (GMT +8) to learn how leveraging DNS as a foundational security architecture for digital transformations can:

    • Protect your brand by securing your traditional networks and transformations like SD-WAN, Cloud and IoT
    • Reduce time and cost of your enterprise threat defense
    • Automate response when it sees things happening and provide data to the rest of the ecosystem

    Presenter: Jerry Wong, Systems Engineer, Infoblox
    Moderator: Sam Goh, CISSP, GM for Korea and Japan, Ensign InfoSecurity
  • What Happens When Your Bank is Hacked?
    What Happens When Your Bank is Hacked?
    David Morris, Lance James, Steven Teppler, and Mark Rasch Recorded: Oct 15 2019 61 mins
    This session will delve into the legal responsibilities of your Bank's liability and your requirements to protect your banking credentials from the unauthorized transfer of funds as a result of a hack.
  • [PANEL] How to Simplify Cyber Risk Management?
    [PANEL] How to Simplify Cyber Risk Management?
    Panelists TBA Nov 20 2019 5:00 pm UTC 60 mins
    In today’s multi-cloud and hybrid environments, CISO's are struggling to secure assets, manage security policies across clouds, monitor and mitigate risks, while also supporting the business. How are CISOs solving the challenge of complexity?

    Join this panel of experts to learn how to simplify cyber risk management as well as maximize the value of your team and technology.
    - Risk scoring and security controls
    - How to identify risks for organizations and their third-party vendors
    - How to prevent, detect, and respond to, privacy and network security incidents
    - Best of vulnerability and risk management in a multi-vendor environment
    - Best practices and use cases across industries
  • No Geek-Speak Allowed: The Financial View of Cyber Risk
    No Geek-Speak Allowed: The Financial View of Cyber Risk
    Jerry Caponera, VP of Products & Cyber Risk, Nehemiah Security Recorded: Oct 15 2019 50 mins
    Join us for this webinar to explore how cyber risk models have evolved to more accurately predict financial outcomes through better alignment with frameworks and models like NIST and MITRE ATT&CK. Jerry Caponera, VP of Products and Cyber Risk at Nehemiah Security, will share insights from global cybersecurity leaders who have risen above cyber geek talk and successfully translated risk into business terms. He will cover managing risk by tracking associated potential financial losses; what’s behind the hype surrounding financial data risk assessment (FinDRA); how to calculate ROI for security and mitigation investments; and how to brief your Board on cyber risk in financial terms.
  • Streamline your Data Transformation to SAP S/4HANA
    Streamline your Data Transformation to SAP S/4HANA
    Susan Nee, Sr. Value Engineer at Syniti Recorded: Oct 15 2019 57 mins
    Running an on time, on budget migration is a daunting task. How do you ensure your source data is complete, your mappings are correct, and your team is used efficiently? How do you hit your timeline goals when your project is stalling? Get answers to these questions and more today.
  • Enterprise Content Management: A Digital Operations Future?
    Enterprise Content Management: A Digital Operations Future?
    John Newton, Founder, Alfresco / Charles Araujo, Principal Analyst, Intellyx Recorded: Oct 15 2019 56 mins
    What are the content management trends influencing the market and which new capabilities will help you unlock the value hidden in your organization's content?

    Alfresco founder John Newton, believes working towards a state of ‘Digital Operations’ is key to putting content at the heart of your digital transformation.

    Join him for this webinar, hosted by Charles Araujo, Principal Analyst at Intellyx, where they will explore:
    - Digital Operations that lead to meaningful Digital Customer Experiences and instant services.
    - Why several independent analysts all agree Alfresco is an ECM market leader.
    - The impact of Open Source, API-driven Microservices and Containerization and AI.
  • Live Interview with Graeme Payne, former VP and CIO of Equifax
    Live Interview with Graeme Payne, former VP and CIO of Equifax
    David Morris, Graeme Payne and Reid Eastburn Recorded: Oct 14 2019 61 mins
    Tune in for this live interview with Graeme Payne, former VP and CIO for Global Corporate Platforms at Equifax. This session will give you first hand insights into what happened at Equifax, and lessons learned.
  • Die Cloud ist sicher, Ihre Konfiguration ist es möglicherweise nicht!
    Die Cloud ist sicher, Ihre Konfiguration ist es möglicherweise nicht!
    Maximilian Bode, Sales Engineer, FIreEye Oct 22 2019 9:00 am UTC 45 mins
    Wussten Sie, dass Angreifer die eDiscovery-Funktionen von Office 365 verwenden, um nach vertraulichen Daten zu suchen? FireEye nutzt Regeln, die z.B. speziell auf die Verwendung von eDiscovery und den Export von eDiscovery abzielen, welche in einem regulären Büroalltag im Allgemeinen selten sind.

    Nehmen Sie an diesem Webinar teil, um mehr über FireEye‘s Security Maßnahmen in O365 zu erfahren. FireEye’s Sales Engineer Maximilian Bode teilt:

    Einblicke in Microsoft Azure Events
    - Azure Audit und Azure AD
    - MS Exchange und Office365

    Schaffen Sie Transparenz: Durch Erkennung von Anomalien in Logs kann der Diebstahl von Anmeldeinformationen identifiziert werden. Wir zeigen Ihnen, wie Sie verdächtige Ereignisse und kritische Konfigurationen durch die Verwendung von Regeln erkennen.
  • Sharing Cyber Threat Information: Why, When and How?
    Sharing Cyber Threat Information: Why, When and How?
    Troy Vennon, Director of Security Innovation, the Columbus Collaboratory Oct 22 2019 3:00 pm UTC 60 mins
    It’s been 20+ years since the US government first issued a directive mandating that critical infrastructure providers in the public and private sectors share information about cyber threats. This directive, PDD63, recognized that, in the face of increasing threats, organizations that band together to share information and coordinate responses stand a better chance of protecting themselves. Thus, the realm of threat intelligence sharing was created. Join Troy Vennon, Director of Security Innovation at Columbus Collaboratory, as he reviews the basics of sharing threat intelligence and how it can benefit an organization of any size in any industry.
  • The challenge of the Nth Party in 3rd party risk management
    The challenge of the Nth Party in 3rd party risk management
    Brad Keller, JD, CTPRP, CTPRA Chief Strategy Officer & Sr. Vice President Santa Fe Group Oct 22 2019 3:00 pm UTC 60 mins
    n this BrightTALK, Brad will be discussing the ongoing and emerging risk challenges your 3rd party's 3rd parties can present, positive solutions and the future as he sees it.
  • Part 1: Why State and Local Governments are Prime Targets for Ransomware
    Part 1: Why State and Local Governments are Prime Targets for Ransomware
    David Morris, Roy E. Hadley Jr., Reid Eastburn and Skeet Spillane Oct 22 2019 5:00 pm UTC 60 mins
    This session will cover why State and Local Governments have headed the list of Ransomware Attacks. Part 1 will delve into why is this the case and Part 2 will address what can be done to prevent these attacks.
  • How SAP Advanced Data Management simplifies your SAP S/4HANA Migration
    How SAP Advanced Data Management simplifies your SAP S/4HANA Migration
    Kate Holthouse, Sr. Value Engineer at Syniti Oct 22 2019 3:00 pm UTC 60 mins
    The demonstration will focus on Syniti's SAP Solution Extension – SAP's Advanced Data Migration. You will see how to transform your project by streamlining the migration using an agile methodology in a web-based platform. This solution provides a simple, auditable and reusable workflow to enhance collaboration between IT and business users to drive the success of your SAP S/4HANA migration.
  • Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Five Keys to Fixing Healthcare Provider Data Quality Once and for All
    Richard Cramer, Chief Healthcare Strategist, Informatica & Tony Sheaffer, Master Data Management Specialist, Informatica Oct 22 2019 5:00 pm UTC 30 mins
    Health plans have made big investments and great progress in improving operations, enhancing the member experience and becoming more data-driven. However, inaccurate and unreliable provider data continues to be a source of inefficiency, unnecessary rework, and a barrier to innovation.
  • Cloud Native SIEM: How to take ownership in a shared responsibility model
    Cloud Native SIEM: How to take ownership in a shared responsibility model
    Tafi Makamure, Technical Engineer Oct 23 2019 9:00 am UTC 45 mins
    One of the key obstacles in accelerating adoption of the cloud is ensuring the compliance and security posture of workloads in new cloud environments. Learn how to gain visibility and secure your workloads in modern hybrid or multi-cloud environments.
  • Combating New Account Fraud with Behavioral Biometrics
    Combating New Account Fraud with Behavioral Biometrics
    Julie Conroy, Research Director, Aite Group & Uri Rivner, Chief Cyber Officer, BioCatch Oct 23 2019 3:00 pm UTC 75 mins
    New account fraud continues to grow at a rapid pace, threatening new digital banking business models and fintech platforms such as Zelle, that are in a customer acquisition race. Convenience, speed and ease of use make digital the preferred channel for consumers, but also open the door for criminals. With 14.7 billion personal records stolen in the last 6 years and the proliferation of synthetic identities making it very difficult to tell the difference between a legitimate applicant and one that will result in loss, new models for identity verification are starting to emerge, with behavioral biometrics as a key component.

    Join Aite Group Research Director, Julie Conroy, and BioCatch Chief Cyber Officer, Uri Rivner, for a lively discussion, as they examine how fraudsters exploit the account opening process and provide insights into how behavioral biometrics are woven into technical workflows and operational models to drive higher rates of conversion without compromising risk and security.
  • Getting Inside Insider Threats: Building a Chain of Evidence
    Getting Inside Insider Threats: Building a Chain of Evidence
    Ryan Lai, EVP of Professional Services, Nisos Oct 23 2019 3:00 pm UTC 60 mins
    Insider threats can wreck your network, your business, and your company's reputation. But stopping malicious or simply incompetent insiders from doing damage isn't just an exercise in analyzing where the damage came from. This forensic investigation may become part of a criminal investigation, and therefore requires careful, step-by-step analysis and traceability. You must identify and attribute the actions taken but the insider while confirming to legal requirements, privacy concerns, and the requirements of a chain of evidence. Join Ryan Lai, EVP of Professional Services at Nisos, as he discusses the wide-ranging complexities of an insider threat investigation.
  • [PANEL] IoT Security in 2020
    [PANEL] IoT Security in 2020
    Panelists TBA Dec 17 2019 5:00 pm UTC 60 mins
    With the proliferation of the Internet of Things, IoT devices are often added into enterprise environments without due consideration for the security and privacy risks they pose to the business. Oftentimes, IT security teams do not have full visibility into how many IoT devices are connected to the network. This creates security gaps, as IoT devices are notoriously vulnerable to hacks and attacks.

    Join this interactive panel experts to learn about how enterprises can enhance endpoint, and therefore IoT security.

    Attendees will learn more about:
    - IoT and today's enterprise
    - What's on your network? How do you evaluate IoT devices?
    - Why visibility is key
    - Controlling access to your IoT environment
    - Vendor risk and holding vendors accountable for their IoT equipment
    - Areas for automation and where to reduce your IT security team's involvement
    - Patching and upgrading
    - Expert recommendations for enhancing IoT security
  • Using Evidence-Based Security in Your Secure Development Life Cycle
    Using Evidence-Based Security in Your Secure Development Life Cycle
    Andrew van der Stock, Senior Principal Consultant, Managed Services SIG Consulting​, Synopsys Oct 23 2019 5:00 pm UTC 60 mins
    All too often, security is stuck in the 1960s doing slow desk checks, the results of which are out of date before the PDF report lands on an auditor’s desk. If developers see this report, they’ll find it’s full of hot garbage. Security folks must become agile, thinking like developers and helping build secure applications, not criticizing and using recommendations from the last century. In this talk, you’ll learn how you can contribute data, offer better remediation advice, and use modern evidence-based standards such as the forthcoming OWASP Top 10 2020 and the OWASP Application Security Verification Standard 4.0 in your development pipeline. Security professionals have heard this all before, but we persist in doing the wrong things. Let’s not do security like it’s 1998; let’s build assurance in from the get-go, with each and every build.
  • Enterprise Data Governance -- Dream Work vs. Team Work
    Enterprise Data Governance -- Dream Work vs. Team Work
    Thomas Brence, Dir Product Marketing, Data Quality and Governance, & Patrick Dewald, Sr. Dir of Data Governance Strategy Oct 23 2019 6:00 pm UTC 39 mins
    For too long, Data Governance was seen as a hindrance to growth in organizations. Often stuck with the same perception as Legal or Regulatory, the Data Governance team was seen as red-tape. In order to overcome this perception, effective data governance leaders have turned to Collaboration instead of Control. By working with each team across the organization, effective data governance leaders can overcome the stigma and ensure that enterprise-wide programs can be built and goals can be met.
  • Accelerate Life Sciences R&D with the Veeva Vault Connector
    Accelerate Life Sciences R&D with the Veeva Vault Connector
    Henry Galio, Senior Director, Veeva Vault CTMS and Kevin Flanagan, Life Sciences Product Marketing Manager, MuleSoft Oct 24 2019 5:00 pm UTC 42 mins
    Veeva Systems is a cloud solution for the global life sciences industry. Veeva helps hundreds of top life sciences companies accelerate critical functions from R&D pipeline through commercial. Join this webinar to learn how MuleSoft's new Veeva Vault Connector enables Veeva and Salesforce customers to accelerate R&D, drive new capabilities for on-premises clinical data analysis, and improve marketing operations.

    Watch this webinar with a Veeva Vault Connector demo to learn how to:
    - Securely integrate Veeva Vault with ERP, MDM, legacy third-party systems, and business applications with MuleSoft’s Veeva Vault Connector.
    - Easily surface clinical data to power new R&D initiatives while ensuring compliance every step of the way.
    - Deliver omnichannel customer interactions with integrated customer data and digital asset management.
  • What is an OSPO? The Rise of the Open Source Program Office
    What is an OSPO? The Rise of the Open Source Program Office
    Taylor Udell, Director of Product Marketing at FOSSA Oct 24 2019 5:00 pm UTC 45 mins
    Managing your open source program is all about improving efficiency and decreasing risk. Determining what packages to leverage, when developers should contribute, and what internal projects you may want to publish are all strategic business decisions. An Open Source Program Office (OSPO) helps to define your open source management strategy while considering the implications of open source components on product viability, competitiveness, resources, security and the risk profile of your company.

    In this webinar you will learn:
    ●Things to know when evaluating your need for an OSPO
    ●Areas managed by an OSPO
    ●Roles key to an OSPO's success
    ●The key pillars of a successful OSPO
    ●A list of resources to read if you want to build an OSPO

    FOSSA Director of Product Marketing Taylor Udell will share how getting the most from open source is not about how much code is deployed, but rather how about how developing the right open source management strategy can impact business goals, revenue, risk, recruiting and reputation. Move away from tactical, manual OSS management and into a strategic, holistic OSPO program that serves the needs of the company, your customers and your developers.
  • Airheads Tech Talks: SD-WAN-Routing(Underlay and Overlay) and PBR Enhancement
    Airheads Tech Talks: SD-WAN-Routing(Underlay and Overlay) and PBR Enhancement
    Karthikeyan Mookkandi, Aruba TAC Oct 29 2019 10:00 am UTC 90 mins
    Aruba’s SD-Branch solution leverages WAN services that interconnect hub and spoke sites to establish VPN tunnels which encapsulate and forward corporate traffic. Each WAN service is referred to as the underlying network while the VPN tunnels form the overlay network.

    Reachability and forwarding through the underlay and overlay networks is achieved using IP routing on gateways. The VPNCs and BGWs each implement their own routing tables to determine the next-hop for each IP packet on its way to the desired destination. The routing tables on the BGWs consist of default gateways and static routes while the routing tables on VPNCs consist of default gateways, static, IKEv2, and OSPF routes

    Agenda:

    1. Introduction to underlay and overlay routing.
    2. Configuration of Overlay routing.
    3. What is PBR.
    4. Traffic using with PBR/DPS
    5. Configuration and troubleshooting.
  • Part 2: What can State and Local Governments do to Prevent Ransomware?
    Part 2: What can State and Local Governments do to Prevent Ransomware?
    David Morris, Reid Eastburn and Skeet Spillane Oct 29 2019 5:00 pm UTC 60 mins
    This session will be a short recap of Session 1 and will then go into detail as to what State and Local Governments can do to prevent Ransomware Attacks.
  • Salesforce Lightning Platform and MuleSoft: Deliver employee apps, fast
    Salesforce Lightning Platform and MuleSoft: Deliver employee apps, fast
    Alexis Kushner, Director of Product Marketing, Salesforce and Sam Steiny, Product Marketing Manager, MuleSoft Oct 30 2019 3:00 pm UTC 44 mins
    Business efficiency is the No. 1 priority for CEOs and CIOs. In fact, 84% of IT leaders say improving employee-facing technology is critical for their company’s success.

    Join this webinar for a live demo of Salesforce Lightning Platform with MuleSoft-powered integrations. Learn how to:
    - Deliver a connected experience by integrating back-office applications and systems like Workday and Salesforce.
    - Overcome data silos, IT backlogs, and outdated development tools.
    - Modernize and automate internal processes like onboarding to improve employee experience.
  • Live Demo: Ramping Up People-Centric Cybersecurity
    Live Demo: Ramping Up People-Centric Cybersecurity
    Joel Sierra, Sales Engineer at Proofpoint Oct 30 2019 5:00 pm UTC 45 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the second phase of this maturity model, and see for yourself how the tools work. We'll discuss how to:

    1. Identify and remediate account compromise attacks
    2. Solve for data loss through email
    3. Make your users more resilient against attacks through awareness training
  • Digital Transformation: Identity Verification and Authentication
    Digital Transformation: Identity Verification and Authentication
    Sean Sposito, Javelin Strategy | Robert Prigge, Jumio | Chris Fletcher, Western Union | Adam Englander, iovation Oct 30 2019 8:00 pm UTC 60 mins
    Reducing friction and staying compliant is often a hard act to juggle. How can financial institutions and eCommerce players bridge the gap?

    Join this panel to hear about:

    - Best practices for KYC & AML in the digital age
    - Providing a frictionless experience for customers
    - The future of eCommerce security
    - Rethinking digital identity

    Speakers:
    Sean Sposito, Sr. Analyst, Security, Javelin Strategy & Research (Moderator)
    Robert Prigge, President, Jumio
    Chris Fletcher, Vice President and Head of Digital, Western Union
    Adam Englander, Product Lead at iovation, a TransUnion Company
  • CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization
    CCS [Ep.6]: Next-Generation Cybersecurity - Policy Process and Organization
    Johna Till Johnson, CEO and Founder, Nemertes Research Oct 31 2019 3:00 pm UTC 60 mins
    Cloud and Cybersecurity Series [Ep.6]: Next-Generation Cybersecurity: Policy Process and Organization

    Resources are finite. So deploying them wisely is what differentiates successful cybersecurity organizations from those that are less successful. Find out how these successful cybersecurity organizations are structured, what policies they have in place, and what strategies they do—and don’t—follow to protect their enterprise organizations.
  • Live Demo: Proofpoint Security Awareness Training
    Live Demo: Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Oct 31 2019 4:00 pm UTC 45 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • [Earn CPE] Key Steps to Mature Your Third-Party Risk Management Program
    [Earn CPE] Key Steps to Mature Your Third-Party Risk Management Program
    Colin Whittaker with Todd Boehler, Process Unity; Jason Sabourin, OneTrust; Mark Deluca, Coupa; and Chris Poulin, BitSight Oct 31 2019 5:00 pm UTC 75 mins
    High-Profile Data Breaches have placed a spotlight on the risk of cyber security breaches with vendors and subcontractors, expanding the need to have greater rigor in third party risk management and ongoing risk assessments. Maintaining an effective third-party risk management program doesn't happen overnight. It's a journey that involves continual learning, refinement and evolution.

    And as a program matures over time, it results in the management of vendors and other third parties with fewer risks, lower costs, better performance and stronger compliance. Since every company is at a different place in their journey towards better vendor management, it's important to identify steps that you can follow as you mature your program, and to consider your vendor risk ecosystem and the data and services that can have an enormous impact on risk reduction. On this CPE accredited webinar our panel of experts will address some key steps to mature your third-party risk management program, including how to:

    - Create a third-party risk-management maturity roadmap.
    - Connect with enterprise systems to create a centralized data repository and enable seamless vetting activities across processes
    - Incorporate external content sources for a more wholistic view of your vendors plus more sustainable ongoing monitoring
    - Strengthen and streamline your third-party risk management efforts.
  • DigiCert Trends and Threats Briefing - October 2019
    DigiCert Trends and Threats Briefing - October 2019
    Jeff Barto, Value Strategist, DigiCert Nov 5 2019 4:00 pm UTC 60 mins
    Stay updated on the month’s news and insights regarding the trends and threats in digital certificates (including TLS, SSL and code signing), plus PKI, IoT, encryption, identity and trust.

    In this month’s briefing, we’ll cover:
    - digital certificates, including TLS/SSL, code signing and PKI,
    - trust trends in ACME, blockchain, quantum cryptography, the IoT and more
    - financial impacts of (and to) your security investment.

    We'll also reward you with some fun and positivity.

    Benefit from elevated awareness of current trends, real-world context for your security choices, and refreshed credibility & expertise in website security.

    #cybersecurity #security #TLS