Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Mar 20 2018 44 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Three Minutes Until the Apocalypse
    Three Minutes Until the Apocalypse John Bradshaw, Director, Solutions Engineering, Acalvio Recorded: Mar 20 2018 47 mins
    Three minutes. In general, front-line security operations analysts have three minutes to evaluate an alert on their front pane of glass and determine if it warrants further investigation or can be dismissed as "not impactful to the organization". Your analysts must be right every single time in order to prevent a breach that could cost millions of dollars, the adversary - they only need to be right one time.

    This session will illustrate:

    - How SOC / IR teams can utilize high-fidelity alerts such as those generated by Deception-based solutions.
    - Power of correlation and data analytics to reduce the time it takes to answer basic triage questions on an alert.
    - How to develop actionable visualizations that improve the hunt for adversaries in your network.
  • Surviving the Ransomware Plague
    Surviving the Ransomware Plague Orli Gan, Head of Product Management and Product Marketing, Threat Prevention, Check Point Software Recorded: Mar 20 2018 48 mins
    Ransomware reached epidemic proportions in 2017. Organizations of all sizes and sectors fell victim to malware that locked down, encrypted – and in some cases threatened to destroy – critical systems and data.

    - How does your organization avoid becoming tomorrow’s headline?
    - How can businesses continue to operate without disruption despite this looming threat?

    Learn how Check Point Anti-Ransomware technology protects against every type of ransomware attack, ensuring continuous access to your data.
  • Is Ransomware the New Normal?
    Is Ransomware the New Normal? Ulf Mattsson, Lance James, Barak Engel, David Morris Recorded: Mar 20 2018 62 mins
    Ransomware was the word on everybody’s mind in 2017 with Petya, WannaCry and more. Will this continue into 2018? And if so, how can you ensure your business is protected from the threat of ransomware?
    This session will cover:
    - An overview of how Ransomware works.
    - Can you realistically prevent Ransomware from infiltrating your organization?
    - What can you do to protect yourself from an attack?
  • Build AI and ML in the Cloud and Reduce IoT Solution Costs with Azure IoT Edge
    Build AI and ML in the Cloud and Reduce IoT Solution Costs with Azure IoT Edge Arjmand Samuel, Principal Program Manager , Microsoft; Chipalo Street, Senior Program Manager, Microsoft Recorded: Mar 20 2018 53 mins
    In today’s connected world, devices and data can be found far outside traditional data centers or offices, in places like oil wells, hospitals or factory floors. For these businesses, connectivity can be expensive and unreliable and get in the way of implementing effective IoT solutions.

    Azure IoT Edge is a service that allows cloud intelligence to run on your IoT devices locally. With Azure IoT Edge, you can deploy cloud workloads such as Artificial Intelligence, Azure Machine Learning, Azure Stream Analytics, Azure Functions or custom code via containers directly on your IoT device to enable real-time insights.

    Curious to learn more? Join us in this webinar, presented by IoT engineering experts, to learn:

    - Why and when you should use edge computing as important part of your IoT solution
    - How to get started with Azure IoT Edge
    - How to create and deploy containers using IoT Edge portal
    - Securing your edge devices and solution
  • Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation
    Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation Naveen Palavalli, Director, Product & GTM Strategy & Anant Vadlamani, Principal Product Manager, Symantec Corporation Recorded: Mar 20 2018 60 mins
    Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

    This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

    Join us to learn how Symantec Email Security can:

    - Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.

    - Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.

    - Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.

    - Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.

    In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.
  • Focus on the Right Stuff – Agile Metrics Matter
    Focus on the Right Stuff – Agile Metrics Matter Andy Jordan, Project Management.com Recorded: Mar 20 2018 61 mins
    There could be many reasons why you started down your Agile journey. There will be many more reasons why you continue with that journey today and in the future. But ultimately you have to deliver meaningful business results, and that requires you to validate your achievements and adjust as needed.

    In many organizations this requires change. You might not be measuring the most important factors, which could result in a misunderstanding of the value of Agile.

    Join ProjectManagement.com SME and industry expert Andy Jordan to discuss:

    -The importance of tying Agile performance to business results
    -Establishing the right, business focused metrics
    -How customer focused metrics drive business performance
    -The need to evolve and mature your metrics over time

    As always in one of Andy’s webinars he will not only make you think and challenge your assumptions, he will provide a tangible plan to help you take the concepts of effective metrics and measurement into your organization to drive even greater Agile success.
  • How To Identify And Measure Your Strategy Execution Risk
    How To Identify And Measure Your Strategy Execution Risk Jorge Tabacman Recorded: Mar 20 2018 59 mins
    What sank the Titanic and is sinking some of our great companies? What will separate future winners from losers?

    50% of the Fortune 500 companies in the year 2000 do not longer exist because they were not able to measure and predict their strategy execution risk and link their decisions to the results of their decisions.

    By the end of the webinar you will be in a better position to identify the risk to your strategy execution and understand why identifying and measuring your strategy execution risk must be an important component of your operational risk.

    The webinar is based on the SIMMETHOD risk and performance methodology and C-suite risk alerts, a top 10 innovation product from the Department of Trade in NSW Australia with top 1% views in LinkedIn’s Slideshare and frequently consulted by over 300 global Universities.

    In spite of Billions of dollars spent on Enterprise Risk Management and analytics, why do companies continue to fail or miss their targets? Can industrial era metrics mislead you into the incorrect decisions?

    According to IBM’s CFO Insights, 53% of CFOs think that they are not effective at measuring and managing performance and according to Deloitte, one of the top CFO concerns is predicting execution missteps.

    According to John Chambers, Cisco’s Chairman, 70% of the S&P 500 will attempt digital transformations during the next years but only 30% will succeed? Why?

    The missing ingredient

    Although the C-suite is aware that digital transformations entail new processes, management procedures, information systems and customer relationships, we continue to use industrial era metrics that were designed for a business environment that does not longer exist. And… in digital transformations, the way you measure will determine your results.

    Additionally, the webinar will assist you to identify C-level metrics linked to the Best In Class and develop a bridge between you and your C-suite via holistic and industry agnostic actionable indicators.
  • Guide to Protecting Your People & Safeguarding Your Business from Ransomware
    Guide to Protecting Your People & Safeguarding Your Business from Ransomware Richard Davis, Director Cybersecurity Strategy and Patrick Wheeler, Director of Threat Intelligence Recorded: Mar 20 2018 48 mins
    The evolving threat of ransomware is more dangerous than ever and is here to stay! In early 2017, ‘Wannacry’ and ‘Petya’ created havoc and made it to mainstream media. Even more recently, in Q4 2017, ransomware remained the top payload distributed by malicious messages accounting for 57% of all malicious message volume. Showing no signs of abating, cybersecurity professionals must reassess their ransomware-readiness. The best protection from ransomware is to stay informed and learn what critical safety measures your organisation can take to prevent such an attack from occurring.

    Join this webinar for an overview of:

    - How ransomware works and the latest attacks
    - The most common challenges organizations face in combating ransomware
    - Strategies for mitigating ransomware attacks of all varieties
  • The State of Cyber Resiliency in the Age of Attacks
    The State of Cyber Resiliency in the Age of Attacks Dave Klein (GuardiCore) | Craig Dods (Juniper) | Troy Vennon (Columbus Collaboratory) | Jeannie Warner (WhiteHat Security) Recorded: Mar 20 2018 61 mins
    Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.

    Join this panel of experts as they discuss:
    - The biggest trends in cyber crime
    - Impact of Cryptocurrencies
    - Breaches and preventing future fraud and cyber attacks
    - Advancements in security technology
    - Why security awareness training should be a key part of your overall data protection strategy

    - Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
    - Craig Dods, Chief Architect for Security, Juniper Networks' Strategic Verticals
    - Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory
    - Jeannie Warner, Security Manager, WhiteHat Security
  • Live Webinar: Integrierte Buchung & Reisekostenabrechnung
    Live Webinar: Integrierte Buchung & Reisekostenabrechnung SAP Concur Jochen Alig Senior Solutions Consulting Stas Litau Inside Sales Representative Recorded: Mar 20 2018 43 mins
    Aufwendige Reisekostenabrechnungen auf Papier oder in Excel-Tabellen gehören in Unternehmen der Vergangenheit an. Erfahren Sie, warum Automatisierung die Lösung auch für komplexe Reisetätigkeit ist.
  • Best Practices for the prevention of SaaS threats
    Best Practices for the prevention of SaaS threats Anuj Sawani, Product Marketing Manager, Palo Alto Networks Recorded: Mar 20 2018 54 mins
    Almost every line of business within enterprise organizations has adopted SaaS apps to be more productive and successful. Meanwhile, IT organizations are embracing SaaS apps by approving them for company-wide use, in part to regain control of these applications and the data residing within them. This transition often prompts questions from security teams: Who has access to the data? Is sensitive data at risk? Are my users exposed to malware in my SaaS application?

    Join this webinar where you will learn:
    •Best practices to build a strategy for securing your SaaS environment
    •Real-world examples of risks seen in enterprise SaaS environments
    •Steps to protect against the new threats and prevent data exposure
    •How to comply with data residency regulations within Europe
  • As Attackers Evolve, So Must Machines:Advancing Machine Learning Beyond the Hype
    As Attackers Evolve, So Must Machines:Advancing Machine Learning Beyond the Hype Adrian Davis, Director of Cybersecurity Advocacy, (ISC)² EMEA, Jon Ross, Director of Engineering, Carbon Black Recorded: Mar 20 2018 55 mins
    The demand for machine learning (ML) in security is growing fast. There are countless approaches, but there’s also a lot of hype. This webinar provides a frank assessment of the strengths and weaknesses of static analysis, decompilation, detonation, in-context analysis, artificial intelligence and other emerging approaches, all grounded in real-world examples and specific algorithmic details.
  • [FRENCH] RGPD, quelle solutions? Quelles opportunités?
    [FRENCH] RGPD, quelle solutions? Quelles opportunités? Guy Hervier, Rédacteur en Chef, InformatiqueNews.fr, Box: Elena Gilotta, Dir of Legal Compliance, Jeremy Grinbaum,VP Recorded: Mar 20 2018 63 mins
    RGPD, quelles solutions pour héberger vos données ?

    Vous le savez, l’entrée en vigueur du RGPD au 25 mai 2018 va modifier en profondeur la façon dont les organisations conservent et gèrent leurs données, et celles de leurs clients. Vos fournisseurs ont des solutions à vous proposer, mais sont-elles conformes ? Vous vous perdez dans la "jungle" des certifications ?

    Alors pour vous aider à y voir plus clair, nous avons invité deux spécialistes de la société Box, Elena Gilotta , Director of Legal Compliance (Data Privacy) et Jeremy Grinbaum , VP Europe du Sud. Pendant 35 minutes, ils répondront aux questions de Guy Hervier, notre rédacteur en chef.

    Vous pourrez découvrir en détail quelles solutions s'offrent à vous pour héberger vos données dans un cadre strictement conforme à la RGPD.
  • The Rise and Rise of Ransomware: Prepare and Protect
    The Rise and Rise of Ransomware: Prepare and Protect Nick Frost, Principal Consultant, ISF Recorded: Mar 20 2018 49 mins
    The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

    With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

    In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

    About the presenter:

    Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
  • Innovation in GRC 360 Contextual Awareness: Lockpath Keylight Ambassador
    Innovation in GRC 360 Contextual Awareness: Lockpath Keylight Ambassador Michael Rasmussen - GRC 20/20, Sam Abadir - Lockpath Recorded: Mar 20 2018 28 mins
    Join the GRC Pundit, Michael Rasmussen and LockPath’s Sam Abadir for a 60-minute webinar as we review the capabilities of the LockPath Keylight Ambassador, winner of the 2015 GRC 2020 Award for Technology Innovation in Enterprise GRC Integration.

    Organizations need to move beyond the concept of a GRC platform and focus on an integrated view of GRC data and systems through a GRC architecture that is a cohesive part of the broader business fabric of the organization. This is what GRC 20/20 refers to as 360° GRC contextual awareness. Where risk and compliance is monitored and understood in the course of business operations, changing risks and regulations, and interactions. Delivery of GRC contextual awareness requires that GRC be a central nervous system to capture signals found in processes, data, and transactions as well as changing risks and regulations for interpretation, analysis, and holistic awareness of risk in the context of business. LockPath Keylight Ambassador is a GRC solution that offers a hybrid agent architecture that enables organizations to collect distributed GRC related data from applications installed across the organization and in the cloud. Keylight’s Ambassador innovation and advancement of GRC technology is its ability to securely and automatically transmit on premise data to the cloud from business systems and information security tools.
  • Overcoming Objections through Creating Certainty
    Overcoming Objections through Creating Certainty Paul Blair Recorded: Mar 20 2018 24 mins
    I will share my thoughts on how we overcome a lot of objections by creating certainty around our products/services, us and our companies. Increase credibility, position ourselves as the expert or authority figure to gain control of an inquiry so we may find it easier to close. I will also look at how this will have a positive impact upon your prospect.
  • A New Horizon in the Digital Age: Open Banking, PSD2 and UMA
    A New Horizon in the Digital Age: Open Banking, PSD2 and UMA Johan Fantenberg and Adam Biviano, Senior Solution Architects, ForgeRock Recorded: Mar 20 2018 57 mins
    Today’s customers expect tech-savvy, efficient and proactive services that fit conveniently into their digital lives. To meet these expectations, organisations are now competing as digital businesses, offering unique, personalised services that are available from any device – all whilst maintaining security and compliance requirements.

    Join us on this webinar to learn how identity management can enable you to take the lead in today’s competitive digital landscape:
    · The evolving customer, regulatory and business requirements
    · The impact of PSD2, GDPR and Open Banking
    · How to ensure privacy and consent with UMA
  • Unpacking the Hype: What do the new privacy laws really mean to your business?
    Unpacking the Hype: What do the new privacy laws really mean to your business? Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan Recorded: Mar 20 2018 60 mins
    With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.

    Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.

    " Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
    " Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
    "Understand how these regulations can enable you to gain trust and enhance customer experiences
  • Our Cyberthreat Landscape: why collaboration is key
    Our Cyberthreat Landscape: why collaboration is key Nahim Fazal and Ramón Vicens Recorded: Mar 19 2018 58 mins
    As the ‘public profile’ of cybercrime continues to increase, enterprises are encouraged to look at how they keep their businesses and customers safe by sharing intelligence, best practice and defense measures.

    Join Nahim Fazal, Head of Cyberthreat Intelligence at Blueliv, for a webinar reflecting on the incidents and trends discussed in Blueliv’s annual cyberthreat report, and guidance on how organizations of all sizes can protect themselves in an ever-more sophisticated threat landscape.

    The report combines intelligence gathered through Threat Compass with insight from the Blueliv analyst team, leading to informed assessments about the current state of play and areas which require immediate attention.

    Register today to reserve your spot.

    Blueliv is leading a new wave of proactive, real-time threat monitoring that protects organizations from the outside in, radically reducing attack success rates and improving incident response performance through fresh, actionable intelligence. The in-house team is bolstered by the Blueliv Threat Exchange Network, a global community of thousands of security experts united in the fight against cybercrime.
  • Meet Box GxP Validation: Regulated and unregulated content now in the same cloud
    Meet Box GxP Validation: Regulated and unregulated content now in the same cloud Riju Khetarpal, Life Sciences Managing Director, Box & Manu Vohra, Life Sciences Vice President, Content Management, USDM Recorded: Mar 19 2018 58 mins
    To quickly bring life-saving therapies to market, the drug development process relies on secure collaboration across the extended enterprise. However, organizations find that today's legacy content management systems lead to silos between their regulated and unregulated content.

    With Box GxP Validation, pharma and life sciences companies can now validate Box so they can collaborate on, manage and distribute regulated clinical, lab and manufacturing content in Box. That means all of your content is standardized on a single content platform that meets regulatory and compliance standards, so you can eliminate inefficient silos, enable seamless collaboration and accelerate the validation process.

    Join our webinar to learn how to:
    - Leverage Box for your GxP content — such as collaborating with CROs — and consolidate expensive GxP-specific systems
    - Cut validation time in half and save up to 75% in validation costs with always-on testing
    - Meet CFR Part 11 requirements by integrating Box with e-signature providers, such as DocuSign

    Hear about this new game-changing model for maintaining GxP compliance in the cloud with Riju Khetarpal, Life Sciences Managing Director at Box, and Manu Vohra, VP of Content Management at USDM Life Sciences.
  • Mitigating Risk Outside the Firewall Needs a Strategy: Start with Risk Reporting
    Mitigating Risk Outside the Firewall Needs a Strategy: Start with Risk Reporting Edward Amoroso – TAG Cyber Founder & CEO, Vamsi Gullapalli – RiskIQ Product Manager, Sam Curcuruto – RiskIQ Product Marketing Recorded: Mar 16 2018 45 mins
    For most security professionals, fixing vulnerabilities and security gaps can feel like a game of Whack-a-Mole. New threats come online; new weaknesses are exploited, old gaps are exploited, new vulnerabilities are disclosed. The process is challenging to manage and prioritise. But a strategy that includes automated, up-to-date analysis of your security posture, especially as it relates to internet-exposed assets can help calm the storm.

    In this webinar, we cover how a CISO professional looks at risk as it relates to your digital footprint, and how RiskIQ’s Risk Reporting is different from other Risk Scoring and Risk Reporting solutions. We also cover essential perspectives, methods, and capabilities that are important for any digital threat management programme.

    Join us for our webinar to learn more from Edward Amoroso, former CISO of AT&T and current CEO of TAG Cyber as he offers his advice on a comprehensive Outside the Firewall strategy.
  • GDPR : plus que 2 mois
    GDPR : plus que 2 mois Symantec Recorded: Mar 16 2018 47 mins
    Il ne vous reste que quelques mois avant l’entrée en vigueur du GDPR. Que pouvez-vous faire dès aujourd’hui pour mieux vous y préparer ? Animé par Patrice Payen, Team leader Risk, Compliance & GDPR, et Hervé Doreau, Directeur Technique, ce webcast a pour but de vous aider à évaluer votre degré de préparation et vous indiquer les mesures à prendre avant la date butoir du mois de mai.

    Avant d’assister à ce webcast, faites le point avec l’évaluation d’IDC. Elle vous montrera où vous en êtes dans votre préparation au GDPR. http://symantecgdpr.idcready.net/fr/?utm=sLVdLk56zk
  • Produktinformationen als Grundlage für erfolgreiche Digitalisierung im Handel
    Produktinformationen als Grundlage für erfolgreiche Digitalisierung im Handel Vita Berneburg - Informatica GmbH, Marc auf der Mauern - Bayard Consulting Recorded: Mar 16 2018 31 mins
    Die Digitalisierung im Handel stellt Unternehmen vor gänzlich neue Herausforderungen.

    Notwendig ist eine Digitalisierungsstrategie, die Ihre Geschäftsprozesse effizient und bedarfsgerecht digital gestaltet.

    Genau hier unterstützt Product Information Management (PIM).

    Mit der führenden PIM Lösung von Informatica können alle weiterführenden Prozesse auf Ihre Unternehmensstrategie und –ziele abgestimmt werden. Ihre Metriken und KPI´s können definiert und gemessen werden und tragen so automatisch zur Optimierung Ihrer gesamten Wertschöpfung bei.

    Ihre Organisation und Prozesse werden ganzheitlich und von Beginn an in die digitale Umsetzung gebracht.

    In unserem 30-minütigen Webinar, das wir gemeinsam mit unserem Partner Bayard Consulting durchführen, zeigen wir typische Herausforderungen und Best Practices sowie passende Lösungen für Ihre Digitalisierungsstrategie.
  • Exclusive Q&A session : APT37
    Exclusive Q&A session : APT37 Benjamin Read, Senior Manager, Cyber Espionage at FireEye Recorded: Mar 16 2018 19 mins
    An exclusive 30-minute Q&A session with the presenter, Benjamin Read, Senior Manager, Cyber Espionage at FireEye

    Learn more about:
    •APT37’s historic support of North Korean interests.
    •Details on the malware suite employed by the actor.
    •Why APT37 is an emerging threat beyond the Korean peninsula.
  • Cómo Scale-Out resuelve los dolores de cabeza del almacenamiento secundario
    Cómo Scale-Out resuelve los dolores de cabeza del almacenamiento secundario Ivan Abad - Director Técnico Iberia Mar 21 2018 8:30 am UTC 45 mins
    Muchos departamentos de TI no se dan cuenta de que más del 70% de sus datos vive en almacenamiento secundario. Pero conocen de primera mano los dolores de cabeza asociados con el enfoque scale-up para lidiar con el crecimiento de ese almacenamiento y la necesidad de migrar a sistemas cada vez más grandes a medida que se expanden los datos.

    La alternativa es una arquitectura scale-out que le permite simplemente expandir la capacidad a medida que la necesita. Además de resolver el problema de escalabilidad, este enfoque es más barato, más fiable y ofrece un coste de rendimiento predecible.

    Gartner dice que el 30%1 de los datos ya se ha movido a una infraestructura scale-out, principalmente para almacenamiento primario. Su éxito ahora está impulsando el interés en aplicar los mismos principios al almacenamiento secundario.

    En este webinar examinaremos cómo la infraestructura Scale-Out:
    •Simplifica la gestión del almacenamiento
    •Reduce los costes de infraestructura
    •Mejora la fiabilidad y disponibilidad
    •Dirige el rendimiento
    •Expande el almacenamiento sin fisuras

    1Gartner Magic Quadrant for Distributed File Systems and Object Storgae, October 2017
  • Verizon Threat Research Advisory Center - Protected Health Information
    Verizon Threat Research Advisory Center - Protected Health Information John Grim and David Kennedy, Verizon Enterprise Solutions Mar 21 2018 2:00 pm UTC 90 mins
    Fellow Cybersecurity Practitioner:
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
    This month's theme: Protected Health Information
  • Software Development with Open Source: Securing Applications and IP
    Software Development with Open Source: Securing Applications and IP Tim Mackey, Sr. Technology Evangelist at Black Duck by Synopsys Mar 21 2018 3:00 pm UTC 60 mins
    Open source software is embraced by developers, enterprises, and governments at every level, and with it comes many strong opinions and few facts. How much open source is really being used in the applications you buy? Does the "many eyes" theory make open source more secure? Does traditional security testing address vulnerabilities in open source?

    With organizations becoming more agile but facing increasing regulatory governance, understanding how open source software development works, and how to secure open source, is increasingly important. In this session we’ll cover:
    - Code contribution and IP management
    - Fork management
    - Release process
    - Security response processes
    - Realities of IP risk and open source
    - Pass through security risk and responsibility
    - Keeping up with scope of impact changes within a single disclosure
    - Automating awareness of security risk from development through integration and delivery to deployment
  • Crucial Components of  your SWIFT Customer Security Programme (CSP) Compliance
    Crucial Components of your SWIFT Customer Security Programme (CSP) Compliance Matt Buller, CTO Financial Services, ForeScout & Adam Kohler, Sr. Engineer, ForeScout Mar 21 2018 3:00 pm UTC 60 mins
    In the wake of the high-profile, multi-million-dollar breaches using their infrastructure, SWIFT created the Customer Security Programme (CSP) to ensure their customers meet the required levels of security and compliance. Learn how ForeScout plays a crucial role in helping ensure SWIFT CSP compliance from ForeScout experts Matt Buller and Adam Kohler.
  • Dynamic Scanning with CA Veracode
    Dynamic Scanning with CA Veracode Patrick Hayes, CA Veracode Solution Architect Mar 21 2018 3:30 pm UTC 30 mins
    Test any web application with as little as a URL!

    Join this 20-minute webinar to see how Veracode can help you unlock the capabilities of DynamicDS and DynamicMP. With these deeper scanning abilities, your organization can identify and remediate application vulnerabilities and comply with several compliance standards, such as PCI and other financial industry regulations. See firsthand how Veracode’s dynamic scanning capabilities enable teams to:

    •Secure individual web apps during SDLC or while in production
    •Automate the overall dynamic scanning process to become an easy-to-use self-service offering
    •Improve quality through vulnerability verification and login configuration assistance
  • GDPR: The AppSec Twist
    GDPR: The AppSec Twist Roman Garber, Development Manager at Security Innovation and Edward Skraba, Lead Penetration Tester at Smarttech247 Mar 21 2018 4:00 pm UTC 60 mins
    When GDPR becomes law in a few months, it will be the most wide-ranging and stringent data protection initiative in history. To prepare for this sea change, most organizations have streamlined and detailed their information security policies; however, many are unaware that immature application security programs arguably pose the biggest threat of a data breach. This oft-forgotten piece of data protection puts organizations at risk of GDPR fines.  

    Attend this joint webinar with Security Innovation and Smarttech247 to learn practical tips on incorporating application security best practices into an InfoSec program to achieve GDPR compliance. 

    Topics include:  
    * Summary of GDPR key concepts
    * Security of data processing in software and the CIA triad
    * The people and process problem of GDPR: Governance
    * Using Data Protection by Design for secure design and business logic
    * Assessments to verify the security of processing

    Roman Garber, Security Innovation
    Edward Skraba, Smarttech247
  • Data: Don't Let Your Greatest Asset Become a Liability
    Data: Don't Let Your Greatest Asset Become a Liability Laurence Pitt, Global Security Strategy Director at Juniper Networks Mar 21 2018 4:00 pm UTC 60 mins
    A discussion around the role and the evolution of data. We will also cover the importance of protecting data throughout its lifecycle.

    We will look at:
    - Fundamental changes in the way we live, work and communicate
    - How we have become highly reliant on data, so it means more to us
    - The increasing value of data and why we need to protect it

    Presenter: Laurence Pitt, Global Security Strategy Director at Juniper Networks
  • How to Automate Phishing Investigations
    How to Automate Phishing Investigations Tom D’Aquino, Director of Security Solutions at LogicHub Mar 21 2018 5:00 pm UTC 45 mins
    Get to Inbox Zero everyday with Automated Threat Ranking

    Do you struggle with getting too many phishing alerts? Does it take a long time to investigate and respond effectively?

    Join us for a special presentation to see how some of the most sophisticated security teams are applying automated threat ranking to phishing reports from their users and detection tools, helping them get to inbox zero every single day.

    Timely analysis and response is key to combating phishing threats while tracking and rewarding submissions helps keep submitters engaged and participating.

    Join this webinar to gain insight into:
    * The basics of Phishing investigations
    * What automation can and cannot accomplish
    * How to build the automation steps easily
    * Best practices from industry experts

    Learn how you can help make your phishing reporting initiative an asset that drives other security capabilities rather than a burden that exhausts your team!

    Speaker: Tom D’Aquino, Director of Security Solutions at LogicHub
  • Understanding eDiscovery in Criminal Cases
    Understanding eDiscovery in Criminal Cases Doug Austin and Tom O'Connor Mar 21 2018 5:00 pm UTC 75 mins
    Criminal cases have long been thought of as an arena devoid of electronic discovery issues. But attorneys who regularly handle criminal cases know that’s not the case. So, are there any guidelines and best practices for handling eDiscovery in criminal cases? This CLE-approved* webcast session will take a look at the history of the development of standards and highlight specific issues of importance regarding eDiscovery in criminal matters. Topics include:

    + Overview of Rules for Criminal Matters
    + How Data is Acquired in Criminal Matters
    + Common Data Types and Examples of Cases
    + Data Exchange Formats and Protocols
    + Time Issues Specific to Criminal ESI
    + Working with Social Media as Evidence
    + Border Entry Considerations and Examples
    + Resources for More Information

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • [Webcam Panel] Threats and Cyber Resilience
    [Webcam Panel] Threats and Cyber Resilience Dan Paltiel (US Bank) | Ben Johnson (Obsidian Security) | Roselle Safran (Rosint Labs) Mar 21 2018 5:00 pm UTC 60 mins
    Cybersecurity is a key priority for CISOs in 2018. What are the cyber threats CISOs should be aware of? How can we build more resilient enterprises in an age of relentless cyber attacks?

    Join this interactive panel to learn more about:
    - The latest cyber threats
    - New attack trends
    - Fighting cyber crime in an age of breaches and stolen personal information
    - Understanding your cyber risk
    - CISO priorities for 2018

    - Dan Paltiel, Security Intelligence Analyst, ‎U.S. Bank
    - Ben Johnson, CTO and Co-founder of Obsidian Security
    - Roselle Safran, President of Rosint Labs
  • Top 7 Docker Vulnerabilities & Threats
    Top 7 Docker Vulnerabilities & Threats Knox Anderson, Product Marketing Manager, Sysdig Mar 21 2018 5:00 pm UTC 60 mins
    Docker comes bundled with some neat security safeguards by default: isolation, a smaller attack surface, and task specific workloads.

    There are, however, some specific parts of Docker based architectures which are more prone to attacks. In this webinar we are going to cover 7 fundamental Docker security vulnerabilities and threats.

    Each section will be divided into:
    -Threat description: Attack vector and why it affects containers in particular.
    -Docker security best practices: What can you do to prevent this kind of security threats.
    -Proof of Concept Example(s): A simple but easily reproducible exercise to get some firsthand practice.
  • Making Threat Intelligence Affordable for the Mid-Market
    Making Threat Intelligence Affordable for the Mid-Market Vice President of Customer Support James Carnall and Vice President of Intelligence Operations Eric Olson Mar 21 2018 6:00 pm UTC 60 mins
    Phishing, ransomware, and data breaches plague organizations of all sizes and industries, but the financial services market has always had the largest target on its back. As a mid-market financial organization, how do you fend off these attacks when you don’t have the budget for everything you need: data feeds, tools, analysis and mitigation?

    The answer: “Threat Intelligence-as-a-service.” This, robust, cost-effective option, brings together dozens of structured threat intelligence feeds, online monitoring of social media and the dark web, and round-the-clock human review to give you vetted, relevant intelligence specific to your organization. Even better, there is no hardware or software to install, this is a completely managed service that can be up and running in hours or days. It finally puts “big bank” threat intelligence capabilities within the reach of smaller organizations.

    Join LookingGlass’ Vice President of Customer Support James Carnall and Vice President of Intelligence Operations Eric Olson on Wednesday, March 21 @ 2pm ET as they discuss how threat intelligence can be affordable for mid-market organizations with LookingGlass’ Information Security-as-a-Service package, a new offering tailor made for your organization’s cybersecurity needs.
  • 5 Cyber Attack Trends from the Threatscape
    5 Cyber Attack Trends from the Threatscape Corey Williams, Senior Director of Products and Marketing Mar 21 2018 6:00 pm UTC 60 mins
    2017 was full of sensational breach headlines—a year full of high-profile news about companies impacted by all sorts of malware and ransomware.

    It’s not surprising, then, that CEOs are reacting to these reports. CEOs overwhelmingly cite malware as the most important cybersecurity risk threatening their organization’s success.

    But technical officers on the front lines (CIOs, CTOs and CISOs) see it differently: They point to identity breaches—including privileged user identity attacks and default, stolen or weak passwords—as the biggest threat.

    Join us for a live webinar that examines recent trends and research on cyber attacks. You will learn about:

    - Recent malware attacks including wannacry, petya, notpetya and badrabbit
    - Current research asking CEOs about cyber security strategy and spending
    - The most common cause of breaches that you may be overlooking — compromised credentials
    - A surefire way to secure access without boundaries through the power of Zero Trust Security
  • State of Cyber-Security Arms Race: Preparing for what's coming in 2018
    State of Cyber-Security Arms Race: Preparing for what's coming in 2018 Ken Dang Mar 21 2018 6:00 pm UTC 60 mins
    Examining 2017 to prepare for what's coming in 2018

    The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.

    Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
  • No Safe Harbors: Charting a Smarter Course
    No Safe Harbors: Charting a Smarter Course Mark DuPont, Alan Rudd, Sage Wagner Mar 21 2018 6:00 pm UTC 60 mins
    Is the status quo really an option? What do maritime stakeholders (shipping companies, terminal operators, cruise lines, port authorities) need to do to prevent, prepare for and respond to the next attack on the horizon?

    To coin an old adage that has been used in many sports discussions and is also known as a principal of war, "The best defense is a good offense." This webinar will demonstrate tools and resources that maritime stakeholders can utilize to be Proactive and control their cyber risk.

    This webinar, focused on maritime operations, will provide unique insights of the recent cyber events and emerging threats. We will also:
    • Discuss nationally-recognized solutions and management approaches that can lead your organization to a proactive and predictive posture with a Cyber Risk Management strategy,
    • Include experts from a “bench” of cybersecurity experts that are recognized internationally for their knowledge and skills,
    • Demonstrate our Cyber Risk Management platform that can give you the “Situational Analysis and Awareness” that you need in today’s rapidly expanding and complex environment, and
    • Learn how we can provide you the same resources that the Department of Defense, NASA, and other federal agencies use and trust, with RiskSense.

    Attending this webinar will provide you and your staff valuable insights and offer a course of action that can be a game changer for all maritime organizations
  • Is Microsoft Office 365™ Good Enough Protection and Recovery?
    Is Microsoft Office 365™ Good Enough Protection and Recovery? Shane Harris - Director Product Marketing, Mimecast & Glenn Brown - Director Product Management, Mimecast Mar 21 2018 6:00 pm UTC 60 mins
    While every organization needs to keep data protected and accessible for its users, many are unaware of the risky protection and recovery gaps when malicious attacks occur or point-in-time recovery is required. Many organizations are asking themselves, “Is Microsoft O365 good enough protection and recovery?” or “Is my on-premises backup solution enough?” Join this webinar to learn where your biggest risks are and how to mitigate them.

    Presenter Info:

    Shane Harris - Director Product Marketing, Mimecast

    Shane Harris has had varied experience spanning 20 years across IT, Product Management, Sales, Engineering and Research Analyst roles in the areas information management, eDiscovery, archive and compliance. Prior to Mimecast , Shane was the lead analyst for the Enterprise Information Archiving Magic Quadrant at Gartner and has held executive leadership positions at kCura, Commvault and Johns Hopkins. In these roles, he has held countless customer conversations across all verticals and was a frequent speaker, presenter and thought-leader at industry events.

    Glenn Brown - Director Product Management, Mimecast

    Glenn joined Mimecast in 2007 and is responsible for Mimecast’s archiving, compliance and data resilience products group. He is tasked with defining and bringing the product roadmap from vision to reality and is a passionate advocate of cloud technology enabling strong data resilience strategies.
  • Wie zukunftsSICHER ist Ihr Unternehmen?
    Wie zukunftsSICHER ist Ihr Unternehmen? Jochen Rummel, Regional Director D/A/CH Mar 22 2018 9:00 am UTC 60 mins
    Knapp 70 Prozent der Unternehmen und Institutionen in Deutschland sind in den Jahren 2016 und 2017 Opfer von Cyber-Angriffen geworden. In knapp der Hälfte der Fälle waren die Angreifer erfolgreich und konnten sich Zugang zu IT-Systemen verschaffen, die Funktionsweise von IT-Systemen beeinflussen oder Internet-Auftritte manipulieren.
    Aufgrund der hohen Anzahl von Risiken und Lösungen brauchen Unternehmen zunächst Klarheit, welchen Grad an Sicherheit sie erreichen möchten, um Budget und Ressourcen optimal einzusetzen. Wollen Sie lediglich die gesetzlichen Vorgaben einhalten, den Branchenstandard erfüllen oder Sicherheit als Alleinstellungsmerkmal für Ihr Unternehmen definieren?
    Wir erläutern Ihnen unseren Ansatz zum Aufbau einer effektiven Sicherheitsarchitektur, die auf die individuellen Bedürfnisse Ihres Unternehmens abgestimmt ist und bieten Entscheidungshilfen zur Festlegung des notwendigen Grads an Sicherheit. Dabei fokussieren wir folgende Themen:
    Bewertung der Ausgangssituation (bestehende Sicherheitsarchitektur)
    "Bewertung von Sicherheitsprogrammen
    "Fazit: Erstellung eines Aktionsplans in Abhängigkeit von Budget und Ressourcen

    Zielgruppe: Geschäftsführer, Sicherheitsbeauftragte, IT-Leiter, Datenschutzbeauftragte und Fachabteilungen, die an der Ausarbeitung von nachhaltigen Sicherheitskonzepten beteiligt sind.
  • Webinar: Transitioning to Instant Payments in Germany
    Webinar: Transitioning to Instant Payments in Germany Britta Kotthaus-Kramer, Accenture Corinna Lauer, UniCredit, Elisabeth Kern-Thüringer, Raiffeisen Gene Neyer, Icon Solutions Mar 22 2018 12:00 pm UTC 60 mins
    How can Banks in Germany prepare for Instant Payments whilst controlling costs and managing risks? And what can we learn from those who have already travelled the path to Instant Payments?

    This InstaPay webinar will explore some of the challenges in adopting instant payments in Germany and provide insights on how to prepare. You will hear from three very different perspectives, global industry insights from consultants Accenture, real world experiences from UniCredit and Raiffeisen, early joiners of the RT1 scheme, and from Icon Solutions a leading global payments practitioner currently implementing real time solutions internationally.


    - Britta Kotthaus-Kramer, Principal Director at Accenture GMBh
    - Corinna Lauer, Director, Global Transaction Banking at UniCredit Bank
    - Elisabeth Kern-Thüringer, Senior Product Manager, Raiffeisen Bank International AG
    - Gene Neyer, Executive Advisor, Icon Solutions
  • Security Operation Platform: Une nouvelle réponse avec FireEye Helix
    Security Operation Platform: Une nouvelle réponse avec FireEye Helix Jerome Delaville, System Engineer, FireEye France Mar 22 2018 1:00 pm UTC 45 mins
    Les plateformes de sécurité présentent aujourd'hui beaucoup de challenges qui les rendent difficiles à gérer : manque de visibilité, trop volume d'alertes, peu de contextualisation… Le résultat est une perte d'efficacité, et de vitesse dans la prise en compte des incidents de sécurité.
    FireEye a conçu une plateforme de gestion des opérations de sécurité avec ces objectifs en tête, plus de visibilité, une meilleure lisibilité et une contextualisation de la menace, le but ultime étant de fournir une plateforme facile à déployer, à administrer et qui répond aux besoins d'aujourd'hui.

    Lors de ce webinaire nous couvrirons les points suivants :
    Comment HELIX centralise les opérations de sécurité :
    - Améliore la visibilité de bout en bout
    - Aide à la Priorisation et la contextualisation des alertes
    - Accompagne à la prise Prise de décisions et à la levée de doutes

    Nous terminerons par une démonstration de la plateforme à travers un Business Case réel et nous laisserons le temps aux différentes questions en live.
  • GDPR: durante e dopo le 72 ore
    GDPR: durante e dopo le 72 ore Marco Rottigni, Senior Manager, Product Marketing, FireEye Mar 22 2018 1:30 pm UTC 60 mins
    Sebbene il GDPR sia soprattutto una questione legale e di compliance, un evento di "data breach" evidenzia la presenza di carenze nel sistema aziendale di protezione dei dati e più in generale nella security posture.
    L'articolo 33 del GDPR richiede la notifica delle brecce informatiche entro 72 ore dalla scoperta.
    Un tempo decisamente limitato per notificare la natura della breccia, il numero di record e soggetti coinvolti e le possibili conseguenze. Ogni ora conta ed è fondamentale disporre di una visibilità del proprio ambiente completa ed approfondita.
    In questo scenario, la rapidità di risposta diventa un fattore critico. Per questo è necessario potersi affidare ad un partner che abbia un'elevata competenza nell'incident response, che disponga di soluzioni di threat intelligence di qualità e di tecnologia atta non solo a garantire una prima notifica rapida, ma anche a supportare le notifiche successive sullo stato di avanzamento del processo di risposta e di rimedio all'incidente.

    Ne parliamo il 22 marzo con Marco Rottigni, Sr. Product Marketing Manager EMEA, per comprendere come FireEye possa:
    "aiutarti a soddisfare il requisito di notifica incidente entro le 72 ore dalla scoperta della breccia
    "ridurre il rischio e l'impatto di una potenziale breccia con la messa in sicurezza di dati sensibili e confidenziali, migliorando le capacità di risposta agli incidenti prima, durante e dopo un cyber attack
  • How to Cope with GDPR Strict Breach Reporting Rules
    How to Cope with GDPR Strict Breach Reporting Rules Stuart McKenzie, VP, Mandiant Consulting Mar 22 2018 2:00 pm UTC 45 mins
    Although GDPR is primarily a legal and compliance issue, a data breach is the point of failure that will highlight any deficiencies in an organization’s data protection and larger security posture.

    GDPR Article 33 requires breaches to be reported within 72 hours of discovery. With just 72 hours after breach discovery to report the nature of the breach, number of records and subjects affected, and likely consequences, every hour matters, and visibility across the environment becomes a must.

    With speed of response being critical, you need a trusted partner with the incident response expertise, threat intelligence and purpose-built technology to enable rapid initial notification, and to provide support with subsequent notifications once further data points are identified/obtained.

    Join the conversation with Stuart McKenzie, Vice President Mandiant EMEA, to talk about :
    · How FireEye can help you meet the GDPR 72-hour breach reporting requirement, should you be breached, and
    · How FireEye can help reduce the risk and impact of a breach by securing sensitive and confidential data and improving breach response readiness—before, during, and after a cyber-attack.
  • Optimize Phishing Detection and Response with LogRhythm and Office 365
    Optimize Phishing Detection and Response with LogRhythm and Office 365 Randy Franklin Smith (UWS) | Greg Foss (LogRhythm) Mar 22 2018 4:00 pm UTC 120 mins
    Today’s hackers often favor the phishing email as their weapon of choice. Phishing attacks are not only common, but are also very difficult to defend against. What if you could detect and mitigate a phishing attack before its intended target clicks on that fatal link or opens that malicious attachment?

    When your Exchange server is in the Office 365 cloud, solutions such as constant inbox scanning or relying on synchronous mail flow aren’t viable options. Instead, you can find a strong defense against phishing emails in the Message Tracking log in Exchange.

    The Message Tracking log is available in both on-prem Exchange and Office 365 Cloud’s Exchange Online. Message Tracking logs include valuable information about the client, servers, sender, recipients, message subject, and more. If you can access this information and know how to mine it, you can detect likely phishing emails.

    In this webinar, you’ll learn how to:

    - Recognize the format of message tracking logs
    - Pull message tracking logs from Office 365 using PowerShell’s Get-MessageTrackingLog cmdlet
    - Work through a list of checks to perform against message tracking events to detect phishing emails
    - Move suspect emails to a sandbox where you can use analysis tools like PhishTank, ThreatGRID, or OpenDNS
    - Remove copies of phishing emails from other recipients
    - Automatically detect and respond to phishing attacks with no analyst intervention
    - To optimize your phishing response efficiency, LogRhythm has introduced a new open-source Phishing Intelligence Engine (PIE). PIE is a PowerShell framework focused on phishing attack detection and response.

    Register for the webinar now to learn how you can use LogRhythm’s PIE and Office 365 to better detect and respond to phishing attacks.
  • AI-Powered Cyber Defense for Financial Institutions
    AI-Powered Cyber Defense for Financial Institutions Dan Fein, Senior Cyber Technology Lead, Darktrace & Chris Sprague, Security Engineer, TruWest Credit Union Mar 22 2018 4:00 pm UTC 45 mins
    With a vast supply of wealth and information, the financial services industry has long been a target for cyber-attacks and data breaches. In a post-Equifax world characterized by evolving, automated threats, stretched security teams, and increased regulations, financial institutions are struggling to stay one step ahead.

    Join Dan Fein, Darktrace's Senior Cyber Technology Lead, and Chris Sprague, TruWest Credit Union's Security Engineer, as they discuss the security challenges that the financial services sector faces - and how they can be overcome leveraging AI technology.

    In this webinar, you will learn:
    - Why financial services organizations are struggling to detect and respond to emerging threats before they do damage
    - How TruWest Credit Union has implemented AI to bolster its security strategy
    - How Darktrace uses AI and machine learning to defend financial services organizations worldwide
  • Open Source Projects That Break Boundaries
    Open Source Projects That Break Boundaries Steven Zimmerman, Product Marketing Manager, Black Duck by Synopsys Mar 22 2018 5:00 pm UTC 60 mins
    Over the last decade, Black Duck by Synopsys has recognized some of the most innovative and influential open source projects launched during the previous year, as recognition to the success and momentum of these projects, and affirmation of their prospects going forward.
    In this webinar, we'll explore the origins and evolution of this year's most outstanding Open Source Rookies, who are investing their efforts in everything from Autonomous Driving, through Scalable Blockchain, and VNF Orchestration, to Personal Security and Relationship Management.
  • [Earn 1 CPE]  Enabling Cybersecurity: Ignite Your ERM Program
    [Earn 1 CPE] Enabling Cybersecurity: Ignite Your ERM Program Colin Whittaker with Tim White, Qualys, Alon Yaffe, Barracuda; Cameron Jackson, Riskonnect; and Marc French, Mimecast Mar 22 2018 5:00 pm UTC 75 mins
    Effective risk management is critical for every organization, especially in the current era of increasingly frequent and complex cyber threats. Organizations with the ability to detect changes across global IT environments in real time can better prevent and respond to malicious acts such as ransomware/malware attacks and configuration tampering.

    Join our panel of InfoSec experts on this CPE accredited webinar to learn how your organization can take command of risk to proactively prioritize and address the risks that matter most, and ignite your risk management program to enable cybersecurity.

    Qualifying participants will earn 1 CPE credit.

    Learning Objectives:

    - Discover how to identify, catalog, and prioritize risks across the enterprise
    - Find out how to quickly measure critical activities and address inherited risk
    - Learn how to gain efficiency and effectiveness of current risk-management approaches