Tripwire

Channel profile:

Leading Provider of IT Security and Compliance Automation Solutions

Tripwire’s powerful IT security and compliance automation solutions help businesses and government agencies take control of their IT infrastructure.

Subscribers (1,487)
Retail Security – Closing The Threat Gap Charles Kolodgy & Dwayne Melancon Attendees will learn:
•How they can detect key indicators of a threat earlier in the threat kill chain to avoid or limit the financial damage as well as the damage to their reputation.
•The importance of end point security across your business critical systems, including your POS systems.
•How implementing critical security controls can make you an unattractive target.
Read more >
Jun 12 2014
58 mins
Play
  • Live and recorded (74)
  • Upcoming (0)
  • Date
  • Rating
  • Views
  • Attendees will learn:
    •How they can detect key indicators of a threat earlier in the threat kill chain to avoid or limit the financial damage as well as the damage to their reputation.
    •The importance of end point security across your business critical systems, including your POS systems.
    •How implementing critical security controls can make you an unattractive target.
  • In this webcast, we will:

    •Discuss how to translate security information into specific and scalable action
    •Describe the remediation plan for the controls, starting with the Top 5
    •Discuss how the Council on CyberSecurity uses a community approach to this translation problem to create and sustain the Critical Security Controls.
    •Discuss how the community will help advise and support your risk management efforts with a formalized framework
  • In this webcast we will show:

    The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    How you can identify your business exposure and what systems are vulnerable
    How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • In this webinar we will:

    • Discuss how human resources, legal and IT can work together to help prevent insider threats before they become a problem.
    • Identify risk indicators with employee attitudes and behavior and how it correlates to their patterns of activity on your network.
    • Show how you can use log intelligence and security analytics to automate actions and alerts and rapid reporting and forensics.
  • In this webcast we will show:
    1. The Heartbleed vulnerability in detail, how it occurred with examples of how it can be used against your organization
    2. How you can identify your business exposure and what systems are vulnerable
    3. How Tripwire’s solutions work together to help you close the detection, remediation and prevention gaps around Heartbleed
  • Tim Masey, Director of Enterprise Information Security at AAA, will share his company’s PCI journey.
    In this Q&A-style webcast you will learn:
    •How to move your PCI efforts from a small tactical implementation to a key critical component of your security posture.
    •How to align your compliance efforts with the needs of the business, which will allow you to gain more resources—financial, human and technical.
    •How to utilize security and policy driven dashboards to get your management’s support.
  • Jason Clark, CISSP, Tripwire Technical Manager (Middle East), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:
    •Which systems can be trusted?
    •What is the extent of the compromise?
    •How quickly can you attain situational awareness?
    Jason will also provide participants with a practical, five-step approach to restore trust in your critical systems after a data breach. Register today to join us for this informative webcast.
  • Tripwire’s Senior Pre-Sales Consultant, Michael Rohse (DACH), will be sharing how to achieve trust after a data breach in this UK focused webcast, which will cover crucial questions such as:
    •Which systems can be trusted?
    •What is the extent of the compromise?
    •How quickly can you attain situational awareness?
    Michael will also provide participants with a practical, five-step approach to restore trust in your critical systems after a data breach. Register today to join us for this informative webcast.
  • In this webcast, Joel Barnes, UK Senior Systems Engineer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you attain situational awareness? He will also provide participants with an approach to restore trust in your critical systems after a data breach, following five steps:
    1.Know what you have and prioritize by risk levels
    2.Define what “good” looks like
    3.Harvest system state information from your production systems
    4.Perform a reference node variance analysis to identify compromised systems
    5.Remove suspect systems from the environment and return to a trustworthy state
    Join us for this informative webcast!
  • In this webcast, Dwayne Melancon, Tripwire’s Chief Technology Officer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you attain situational awareness? He will also provide participants with an approach to restore trust in your critical systems after a data breach, following five steps:
    1.Know what you have and prioritize by risk levels
    2.Define what “good” looks like
    3.Harvest system state information from your production systems
    4.Perform a reference node variance analysis to identify compromised systems
    5.Remove suspect systems from the environment and return to a trustworthy state
    Join us for this informative webcast!

Embed in website or blog