Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Virtualizing Media Broadcast: TV Transformed
    Virtualizing Media Broadcast: TV Transformed Steve Reynolds - Imagine Communications, Limor Schafman - TIA Recorded: Nov 17 2017 46 mins
    Broadcast media is undergoing wholesale change due to demands from consumers, competitors, and creative opportunity for new types of content. Virtualization at multiple points of the distribution and delivery network is recognized as the only way to meet these demands. This webcast will review in detail the technologies involved in the virtualization of broadcast media, from network, to master control centers, to edge device delivery.

    Speakers:
    Steve Reynolds, CTO, Imagine Communications

    Steve Reynolds is Chief Technology Officer at Imagine Communications and responsible for the technical strategy and roadmap of the company, as well as managing business development, partner relationships, and M&A activity. Reynolds brings 20 years of technology leadership in the cable industry to Imagine Communications. At Comcast, he served as Senior Vice President of Premises Technology overseeing the strategy, roadmap and development of all technologies employed in service delivery to the customer premises. Prior to Comcast, Reynolds was Senior Vice President of Technology at OpenTV Incorporated, a world leader in digital and interactive television technology.

    Host: Limor Schafman, Content Development Director, TIA


    NOT BICSI accredited.
  • Best Practices for GDPR when hosting data off-premises
    Best Practices for GDPR when hosting data off-premises Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity Recorded: Nov 17 2017 49 mins
    GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.

    But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?

    Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:

    1) Organisational best practices when working with cloud service providers to adhere to GDPR

    2) Key factors organisations to take into account when complying to GDPR

    3) The steps global enterprises are taking get themselves #fit4GDPR
  • Data Loss Prevention (DLP) v15 - The Information Centric Security Generation
    Data Loss Prevention (DLP) v15 - The Information Centric Security Generation Salah Nassar, Director Product Marketing, Symantec and Ben Yang, Director of Product Management, Symantec Recorded: Nov 17 2017 47 mins
    Symantec launched a major release for DLP, version 15, that focuses on expanding core DLP technology and Information Centric Security.

    In today’s cloud generation, data is shared through personal email, created and shared on cloud apps, and accessed via BYO devices by employees, partners, and vendors. With the persistent threat of a breach looming, maintaining visibility, protection, and control over your sensitive data is key for business and maintaining compliance.

    Join us on this webinar to review what’s new with Symantec DLP 15 and get first-hand view of the revolutionary Information Centric Security approach.

    Register Today
  • Don't Get Stung by the OWASP Top 10 - Getting the Most from Advanced WAF
    Don't Get Stung by the OWASP Top 10 - Getting the Most from Advanced WAF Nathan McKay, Security Solutions Manager, F5 Networks; Danny Luedke, Product Marketing Manager, F5 Networks Recorded: Nov 16 2017 65 mins
    Web application security is complex, difficult, and costly – the problems are well known, but remain prevalent out in the real world. Most development teams do not have the resources to sufficiently protect against the myriad of attacks that are relevant to each vector, and the level of expertise required is difficult to come by even if your project has the time and budget for it. This is further compounded by the need to address these vulnerabilities over and over in every application that goes out the door making it a significant blocker in your path to production.

    The good news is that advanced WAF technology is more accessible and affordable than ever before. F5 has teams of researchers and engineers dedicated to this task, and their industry-leading expertise is packaged and available today to defend apps of any size and variety. With the right tools, comprehensive WAF coverage can not only reduce your exposures and give you better control over your applications but also help optimize your resources and reduce overall operating costs. F5 is committed to supporting the OWASP Top 10 and providing defenses for everything it addresses, but that’s just the tip of the iceberg.

    In this webinar you will learn:
    - About the primary risks to your app, including those addressed by the Top 10.
    - How to make the most of development resources by using WAF to do the heavy lifting for you.
    - How F5’s unique and flexible deployment options will make WAF remediation for your app a snap.
    - How you can go beyond the Top 10 and address additional risk, such as DDoS, bot defense, intellectual property theft, or fraud.
    - How WAF can optimize and filter unwanted traffic to help you cut costs in the cloud.
  • Phishing and Fraud: Latest Trends and Best Practices for Protection
    Phishing and Fraud: Latest Trends and Best Practices for Protection Dee Millard, Anti-Fraud Solutions Consultant, Easy Solutions Recorded: Nov 16 2017 55 mins
    Join us for this live, interactive webinar, where you will learn:

    • What the latest threat trends are that we are seeing in 2017 and going into 2018

    • Which organizations are most at risk

    • How you can implement immediate strategies to proactively protect your institution and your customers

    About our presenter:
    Dee Millard is an experienced risk management consultant with over two decades of experience in helping organizations of all sizes exceed their fraud prevention programs and compliance requirements. Her expertise includes online and mobile banking fraud prevention, enterprise financial crimes management, digital banking, and anti-money laundering.
  • Threat Intelligence for Every Security Function
    Threat Intelligence for Every Security Function Dave Shackleford, SANS and Chris Pace, Recorded Future Recorded: Nov 16 2017 61 mins
    There's a common misconception that threat intelligence simply means feeds of indicators just for SOCs or high-level reports only useful to security leaders. The fact is threat intelligence can be a valuable weapon in every part of your information security strategy. In this webinar, we'll take a close look at five different roles generally found within information security organizations: vulnerability management, incident response, security operations, threat analysis, and CISOs. Discover what specific processes and responsibilities are found in each team and how threat intelligence can be integrated into each to improve accuracy and reduce time to action.
  • Got budget? Building the business case for your 2018 GDPR project
    Got budget? Building the business case for your 2018 GDPR project Terry Blake, SureCloud, Nick Rafferty, SureCloud, Michael Rasmussen, GRC 20/20 Recorded: Nov 16 2017 45 mins
    The deadline to comply with the European Union General Data Protection Regulation is May 25, 2018. Non-compliance could result in hefty fines to your company and impact your ability to do business in the EU. With calendar year budget planning now underway, this webinar will help you build the case to fund your GDPR project and gain alignment within your organization. You'll also get a demo of the Cloud-based SureCloud GDPR Suite. Deadline-driven demand will surely drive costs up so the time to act is now to secure both your funding and resources.
  • CISO Insights: How to Eliminate Challenges in Fintech Compliance
    CISO Insights: How to Eliminate Challenges in Fintech Compliance Angelo Purugganan, Chief Information Security Officer at Arctic Wolf Networks Recorded: Nov 16 2017 27 mins
    In today's business environment, most fintech transactions happen at a fast pace, served through web applications using a combination of mobile devices and legacy systems, with some level of protection. While beneficial to small and medium fintech companies, consumers and regulatory agencies are apprehensive about protecting customers personal data and detecting cyber attacks over the internet which impact the integrity of financial transactions.

    In this webinar, we are going to:

    - Explore top cyber threats that fintech companies face
    - Identify what are the Compliance regulations and standards that apply to fintech companies
    - Determine how continuous monitoring and security analytics help meet compliance regulations/standards requirements

    Chief Information Security Officer, Angelo Purugganan, will also be joining us in this discussion. He will be sharing his insights on how security analytics and continuous monitoring can simplify compliance using a SOC-as-a-Service provider.

    To see how you can eliminate challenges in fintech compliance, register now.

    About our CISO speaker:

    Angelo has 15+ years of information security and compliance and 10+ years of software development experience. He has led information security programs for cloud providers and various enterprise clients using frameworks, such as Trust Services Principles, PCI-DSS, HIPAA, FISMA, Euro Directives, ISO-27000, and SOX. He has conducted information security audits in sectors such as SaaS CRM providers, logistics and distribution, manufacturing supply chain, finance ERP, foreign exchange and hedging operations, airline and travel.
  • The Emerging ITSM Technologies Behind Intelligent Self-Service
    The Emerging ITSM Technologies Behind Intelligent Self-Service Dr. Lawrence Hall, Professor of Computer Science and Engineering, University of South Florida Recorded: Nov 16 2017 46 mins
    This webinar will take a deep dive behind some of the most prevalent emerging technology behind self-service. Items like machine learning, deep learning, natural language processing, chatbots, data mining, predictive analytics, etc. will be explored by the distinguished Dr. Lawrence Hall of the Computer Science and Engineering Department at the University of South Florida. We will also take a close look at some of these technologies as they apply to IT Service Management through real-world use cases.

    Presenters:
    -Dr. Lawrence Hall, Professor of Computer Science and Engineering, University of South Florida
    -Jaime Spector, Product Marketing Manager, SunView Software
  • IDC FutureScape: Worldwide Utilities 2018 Predictions
    IDC FutureScape: Worldwide Utilities 2018 Predictions John Villali, Research Director, IDC Energy Insights, Gaia Gallotti, Research Manager, EMEA, IDC Energy Insights Recorded: Nov 16 2017 49 mins
    In this IDC FutureScape presentation, the IDC Worldwide Utilities team discusses the key predictions that will impact CIOs and IT professionals in the worldwide utilities industry over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • Digital GRC: Innovations for Early Identification and Management of Risk
    Digital GRC: Innovations for Early Identification and Management of Risk Moderated by Colin Whittaker; Yo Delmar, MetricStream; Jason Ford, Contegix; and Cameron Jackson, Riskonnect Recorded: Nov 16 2017 62 mins
    Attendees can earn 1 CPE credit on this session.

    Digitization has become deeply embedded in enterprise strategy, as nearly all businesses and activities have been slated for digital transformations. The significant advantages of digitization, with respect to customer experience, revenue, and cost, have become increasingly compelling, and we are starting to see digital transformations in risk create real business value by improving efficiency and the quality of risk decisions.

    The state of risk management at most global, multiregional, and regional banks is abundant with opportunity. Current processes are resource intensive and insufficiently effective, as indicated by average annual fines above $400 million for compliance risk activities alone. By improving the efficiency and effectiveness of current risk-management approaches, digital risk initiatives can reduce operating costs for risk activities by up to 30 percent, and a digitized risk function can provide better monitoring and control and more effective regulatory compliance. On this webinar our panel of experts will discuss digital innovations for risk management success.
  • Three Steps to Eliminating Storage Silos
    Three Steps to Eliminating Storage Silos Storage Switzerland, Nexsan Recorded: Nov 16 2017 51 mins
    As an organization grows the number of use cases the data center needs to support increases with it. What starts out as a NAS for file sharing, moves to a SAN for database applications, and then storage for data protection. As the organization hits full stride it might look at arching to limit growth and a mobility solution to support a distributed workforce. The problem is each one of these storage types are silo’ed and have to be implemented, operated and maintained separately. As a result, storage ends up consuming a large chunk of the IT budget.
  • AI and the Scientific Method for Cyber Investigation Automation
    AI and the Scientific Method for Cyber Investigation Automation Shawn Riley, Chief Data Officer | Cybersecurity Scientist at DarkLight Recorded: Nov 16 2017 48 mins
    "Artificial Intelligence" is arguably one of the most over-used terms in cybersecurity today and despite the potential, most organizations are in the dark about how best to apply it -- and more importantly, how to explain the results it produces. We will discuss how encoding expert tradecraft using scientific methods and common knowledge / data models - can produce AI with explainable results for improved investigation and an active cyber defense.
  • State of the Market Q3 2017: IT Spending Review and Outlook
    State of the Market Q3 2017: IT Spending Review and Outlook Stephen Minton, Vice President, Customer Insights & Analysis Recorded: Nov 16 2017 63 mins
    2017 is shaping up to be a good year for IT spending. New technologies including IoT, robotics, and AR/VR are expanding the overall market, while traditional categories migrate to cloud and mobile platforms and businesses ramp up their investment in analytics or social collaboration to boost productivity. Digital transformation initiatives are driving an uptick in project-oriented spending, as end-users seek to leverage technology innovation into business benefits. A stable global economy has also helped, with emerging markets rebounding while mature economies have continued to post stable growth despite wild cards like Brexit. While economic risks remain, the short-term outlook has improved in recent months. However, beneath this picture of apparent calm and positive growth, seismic shifts are taking place which will reshape the industry for the next decade and beyond.
    In this IDC Web conference, Stephen Minton will review the latest IT spending data and leading economic indicators for IT buyer behavior, alongside updated market sizing and forecasts from the IDC Worldwide Black Book.
  • Integrate Security into DevOps - SecDevOps
    Integrate Security into DevOps - SecDevOps Ulf Mattsson, CTO Atlantic BT Security and David Morris, Thought Leader and Pioneer in the Cybersecurity space Recorded: Nov 16 2017 63 mins
    Topics:
    1.Security Controls Must Be Programmable and Automated Wherever Possible
    2.Implement a Simple Risk and Threat Model for All Applications
    3.Scan Custom Code, Applications and APIs
    4.Scan for OSS Issues in Development
    5.Treat Scripts/Recipes/Templates/Layers as Sensitive Code
    6.Measure System Integrity and Ensure Correct Configuration at Load
    7.Use Whitelisting on Production Systems, Including Container-Based Implementations
    8.Assume Compromise; Monitor Everything; Architect for Rapid Detection and Response
    9.Lock Down Production Infrastructure and Services
    10.If Containers Are Used, Acknowledge and Address the Security Limitations
  • Exchanging Cyber Threat Intelligence: There has to be a better way
    Exchanging Cyber Threat Intelligence: There has to be a better way Dr. Larry Ponemon, Founder, Ponemon Institute; Krupa Srivatsan, Infoblox; Tom Gorup, Rook Security; B. Dunlap (Moderator) Recorded: Nov 16 2017 62 mins
    Today’s increasingly complex and stealthy threats are causing organizations difficultly in defending against them on their own. More and more companies are using multiple threat intelligence sources and reaching out to their peers for threat intelligence data. In fact, 66% of respondents in the recent 2017 Ponemon survey, “The Third Annual Study on Exchanging Cyber Threat Intelligence: There Has to Be a Better Way”, report that threat intelligence could have prevented or minimized the consequences of a cyber attack or data breach. Join Infoblox and (ISC)2 on November 16, 2017 at 12:00pm (Noon) Eastern where our panel will discuss top trends that describe the current state of threat intelligence sharing, how threat intelligence sharing and usage has changed from previous years and best practices to using threat intelligence effectively to counter attacks.
  • Lessons from Equifax: Open Source Security & Data Privacy Compliance
    Lessons from Equifax: Open Source Security & Data Privacy Compliance Bob Canaway, CMO, Black Duck; Mike Pittenger, VP Security Strategy, Black Duck Recorded: Nov 16 2017 46 mins
    The Equifax breach provided a unique look into “how” many breaches occur. In Equifax’s case, hackers exploited an unpatched Apache Struts component, resulting in the exposure of over 140 million consumer records. The exploit of this vulnerability highlights the need for visibility to open source in custom applications and just how ineffective traditional security solutions are when it comes to open source vulnerabilities.
     
    Further, while class action lawsuits have already begun, Equifax faces other regulatory challenges as well. The US Federal Trade Commission started investigations into the company’s security policies and controls that will likely result in financial penalties. Since the exposed data included non-US citizens, foreign data protection and data privacy regulations also come into play.
     
    Join Mike Pittenger and Bob Canaway as they discuss how organizations can more effectively manage open source, the strengths and weaknesses of testing methodologies in identifying vulnerable open source components, and how data privacy standards such as PCI, Section 5 of the FTC Act, and GDPR necessitate a change in how organizations address vulnerabilities in their code.
  • Security Heretic: What got us here, won't get us there
    Security Heretic: What got us here, won't get us there Gary Marsden, Senior Director of Data Protection Solutions at Gemalto Recorded: Nov 16 2017 57 mins
    Cybersecurity is at a crossroads and requires a dramatic shift to adequately support the needs of business owners and security administrators as digital transformation challenges their needs and investments. Managing multiple cloud providers and dramatic increases in the number of endpoints generating data and the subsequent volume of data means enterprise security teams no longer have the requisite skills and bandwidth to deal with complicated security products. Building in security from the beginning quickly and cost-effectively is an industry game changer, especially with new growth markets like Big Data, Blockchain, Cloud Computing, Internet of Things and Digital Payments.

    Multi-cloud environments and government regulations and industry compliance add to the complexity of maintaining a manageable and effective data protection strategy. Transforming encryption and key management (data protection in general) into a click and deploy model reduces internal business barriers between security teams, DevOps and product teams and alleviates disparate security policies, so you know where your data is and that it is secure. The way people consume security is changing by taking an on-demand approach similar to the Netflix philosophy. In this webinar, we will discuss how cloud-based security is simplifying workflow processes, changing cost/benefit models to drive us towards a pervasiveness of encryption and key management that will de-risk data and connectivity in similar ways to anti-virus and firewalls.

    Join this interactive presentation to learn about:
    • The role of security in today's connected world
    • The drivers for and impact of simplifying security on business and workflow
    • How security is providing valuable business intelligence through connected systems and meeting compliance mandates
    • Gemalto’s solution to solving on-demand data protection
    • Upcoming cybersecurity trends and how to prepare
  • Unite InfoSec and DevOps and Still Achieve Enterprise-wide Security
    Unite InfoSec and DevOps and Still Achieve Enterprise-wide Security Gary Southwell, General Manager, CSPi Recorded: Nov 16 2017 46 mins
    As organizations move to an agile DevOps model, they are confronted with one major question: How can they manage existing information-security processes to ensure data privacy?

    Since data breaches are not going to go away, organizations really need to focus on how to make breaches irrelevant so that in the event of a breach the data either will not be accessed, or if it is it won’t be in usable form.

    In this webinar, created for application developers and data security resources, CSPi will not only review best practices but also present a software framework to show how organizations can achieve uncompromised enterprise-wide security. Created for application developers and data-security resources, this webinar will also show you how this new approach complements established InfoSec security requirements and maintains the agile benefits of DevOps – all while providing the automated protection of critical data under any use.

    Don’t miss this webinar! Register today.

    Webinar highlights:
    Join us for this valuable webinar to learn how you can:
    1.Uniformly and automatically apply security policies across the enterprise, including containers and VMs as they spawn.
    2.Offload core-intensive security functions while improving application performance.
    3.Secure critical assets in all cases – in motion, at rest, and in use.
  • Adaptive Thinking: How Capital One Combats Fraud
    Adaptive Thinking: How Capital One Combats Fraud Dave Laramy, Director of Fraud Strategy, Capitol One & Hannah Preston, Solution Strategist, Payment Security, CA Recorded: Nov 16 2017 40 mins
    Capital One is a Top 10 credit card issuer in the UK and is recognized as an award winner for its exceptional customer experience. The team's philosophy to continually try new things, allows them to successfully balance tighter fraud prevention and increased customer satisfaction. In fact, Capital One readily adopted the CA Payment Security Suite to help ensure that balance.

    Join Dave Laramy, Director of Fraud Strategy at Capital One and Hannah Preston, Solution Strategist, Payment Security at CA as they share tactics to eliminate legacy fraud controls and embrace more efficient ways to battle the bad guys with intelligent data and authentication.

    Tune in and explore how to:
    • Implement best practices and strategies for leveraging data and authentication
    • Improve fraud prevention and the checkout experience with 3DS 2.0
    • Prepare for regulatory changes, scheme mandates, and future transformations
  • IDC FutureScape: Worldwide Financial Services 2018 Predictions
    IDC FutureScape: Worldwide Financial Services 2018 Predictions Marc DeCastro, Research Director, Jerry Silva, Research Director, Thomas Zink, Associate Research Director, IDC Recorded: Nov 16 2017 46 mins
    In this IDC FutureScape presentation, the IDC Worldwide Financial Services team discusses the key predictions that will impact CIOs and IT professionals in the worldwide financial services industry over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • Official Launch of Symantec Control Compliance Suite 12.0
    Official Launch of Symantec Control Compliance Suite 12.0 Anand Visvanathan, Principal Product Manager, Symantec Nov 21 2017 5:00 am UTC 45 mins
    The release of Symantec Control Compliance Suite version 12.0 is here! Please join us for a special webinar on Tuesday, November 21 to find out what’s new in this release and how it will better help you to:

    Measure and prove compliance with security regulations, mandates, and best practices

    Determine risk and prioritise remediation

    Don’t miss this great opportunity to get the latest news and information on Control Compliance Suite!
  • Symantec Endpoint Protection Mobile – Was die SkyCure-Übernahme für Sie bedeutet
    Symantec Endpoint Protection Mobile – Was die SkyCure-Übernahme für Sie bedeutet Alexander Peters, Symantec (Deutschland) GmbH; Sven von Kreyfeld, Symantec (Deutschland) GmbH Nov 21 2017 9:00 am UTC 60 mins
    Im Webinar erfahren Sie:
    •Wie SEP Mobile Crowd-basierte Threat-Informationen mit Endpoint- und Server-basierte Analysen kombiniert, um bekannte und unbekannte Mobile Threats zuverlässig und proaktiv zu stoppen
    •Wie die Lösung Malware, Netzwerk-basierte Threats sowie Exploits auf Anwendungs- und OS-Ebene erkennt – und zwar sowohl auf iOS als auch auf Android-Geräten, egal ob online oder offline
    •Wie Sie mit vorausschauenden Analysen verdächtige Netzwerke und Anwendungen bewerten können, ehe sie Schaden im Netzwerk anrichten
    •Wie einfach und schnell das Onboarding mittels nativer iOS- und Android-Apps funktioniert und wie Sie die Lösung mit Ihren vorhandenen EMM-, MDM-, SIEM-, IAM- und VPN-Umgebungen verzahnen
    Darüber hinaus verraten wir Ihnen, wie die weitere Roadmap zur Integration der SkyCure-Produkte in unser bestehendes Portfolio aussieht, und geben Ihnen einen kurzen Überblick über alle anderen wichtigen Neuerungen in unserem Portfolio.

    Hintergrund:
    Angriffe auf mobile Endgeräte nehmen rasant zu: Immer öfter nutzen Angreifer maßgeschneiderte Malware und Advanced Persistent Threats, um Smartphones und Tablets zu kompromittieren und auf diese Weise Zugriff auf sensible Daten oder Unternehmensnetz zu erlangen.
    Symantec trägt diesen steigenden Sicherheitsanforderungen mit der Akquisition des Mobile-Security-Spezialisten SkyCure Rechnung – und integriert dessen innovative Technologie jetzt als Symantec Endpoint Protection Mobile (SEP Mobile) in das marktführende Endpoint-Security-Portfolio.

    Wir freuen uns auf Sie!
  • The 3 Pillars of Social Selling. Part 3:Social Selling Top Tips & Tricks
    The 3 Pillars of Social Selling. Part 3:Social Selling Top Tips & Tricks Daniel Disney Nov 21 2017 11:00 am UTC 60 mins
    This 3 part webinar series will give show you the 3 key pillars to achieving social success in sales. Learn how to create the ultimate profile, build a winning personal brand, create great and consistent content and build a winning strategy. The final session will be packed with the best industry tips and tricks to make social work for you.

    Part 3 - Social Selling Top Tips & Tricks

    From LinkedIn searching secrets all the way to email address generating hacks, these are the top tips and tricks that will give you a huge advantage in the world of social selling. This webinar will bring everything together in the social selling series and will give you the ultimate list of tools use social to dramatically enhance your pipeline and sales process.
  • Understanding your Attack Surface - Research into FT30 organisations
    Understanding your Attack Surface - Research into FT30 organisations Terry Bishop, EMEA Technical Director, RiskIQ Nov 21 2017 2:00 pm UTC 45 mins
    Businesses are accelerating their digital transformation, expanding their online presence to enrich products, deepen customer relationships, and boost their brand ecosystems. However, with this rapid growth comes security challenges as web assets get created outside of corporate controls and the overall Internet presence expands to unmanageable proportions. Cyber adversaries are taking advantage of this sprawling digital attack surface, looking forweaknesses to exploit. The attack surface has become the battle line between malicious actorsand an organisation’s external threat defenders and its compromise is behind many of the breaches that get reported with alarming frequency.

    In an effort to highlight and quantify the risks which organisations have in their attack surface, we conducted research on the top 30 UK organisations (FT30) to highlight the issues we believe all companies face. We will present the various types of risk we uncovered and offer practical advice on ways to mitigate them and harden your attack surface.
  • IDC FutureScape: Worldwide Mining 2018 Predictions
    IDC FutureScape: Worldwide Mining 2018 Predictions Emilie Ditton, Research Director, IDC Energy Insights Nov 21 2017 2:00 pm UTC 60 mins
    In this IDC FutureScape presentation, the IDC Worldwide Mining team discusses the key predictions that will impact CIOs and IT professionals in the worldwide mining industry over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018
    Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Jeffrey Ritter Nov 21 2017 3:00 pm UTC 60 mins
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • What I Learned About Risk and Control from “The Mouse” (2 Hour Ethics)
    What I Learned About Risk and Control from “The Mouse” (2 Hour Ethics) Don Levonius Nov 21 2017 4:30 pm UTC 120 mins
    In this webinar, former Disney loss prevention and investigations leader Don Levonius shares what he learned about using internal controls to prevent fraud, mitigate risk, and protect the magic at the happiest place on earth. Disney, an extremely complex control environment, not only uses internal controls to achieve impressive operational and financial results, “The Mouse” also uses controls to protect intangible assets, promote ethical behavior, ensure business continuity, and mitigate the impact of tragedies.
    By the end of this webinar, participants should be able to:
    •Discuss how one of the most trusted brands in the world manages reputation risk
    •Describe why monitoring an ineffective control is like weighing yourself on a broken scale
    •Examine the relationship between unethical employee behavior and the failure of weak controls
    •Explain what business continuity looks like when catastrophic risk becomes reality
    The views expressed in this webinar are the recollections and opinions of the presenter and are offered in accordance with fair use doctrine. His stories are compiled from “common knowledge” and published media reports, which may or may not be factually accurate. They are presented as hypothetical situations and are included for illustrative teaching purposes only. The presenter is not responsible for errors or omissions. This webinar is not sanctioned, authorized, or endorsed by the Walt Disney Company or its affiliates.
  • IDC FutureScape: Worldwide Mobility 2018 Predictions
    IDC FutureScape: Worldwide Mobility 2018 Predictions Carrie MacGillvray, VP, Mobility, and John Jackson, Research VP, Mobile & Connected Platforms Nov 21 2017 7:00 pm UTC 60 mins
    In this IDC FutureScape presentation, IDC's Carrie MacGillivray and John Jackson will discuss the key predictions that will impact enterprise mobility decisions over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • Are you Ready for Australia's Privacy Act? A Gemalto Case Study
    Are you Ready for Australia's Privacy Act? A Gemalto Case Study Jean -Pierre Mistral, Legal Counsel for Data Privacy and Graeme Pyper, Regional Director of Enterprise and Cybersecurity Nov 22 2017 12:00 am UTC 60 mins
    Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
    Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •The Mandatory Data Breaches scheme
    •Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • Equifax Breach and Managing Your Vulnerabilities
    Equifax Breach and Managing Your Vulnerabilities Carl Wright (AttackIQ), Igor Baikalov (Securonix), Chris Petersen (LogRhythm), Sam Abadir (LockPath) Nov 22 2017 12:00 am UTC 60 mins
    With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.

    What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?

    Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
    - The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
    - Managing IT risk and vulnerabilities
    - How to improve breach prevention, detection and response
    - What to expect in the future

    Speakers:
    - Igor Baikalov, Chief Scientist, Securonix
    - Chris Petersen, CTO, SVP of R&D & Co-Founder, LogRhythm
    - Sam Abadir, Director of Product Management, LockPath

    Moderator:
    - Carl Wright, CRO, AttackIQ
  • IT Security Attacken 2017 und 2018 in Deutschland, Österreich und der Schweiz: W
    IT Security Attacken 2017 und 2018 in Deutschland, Österreich und der Schweiz: W Candid Wueest, Symantec Nov 22 2017 10:00 am UTC 60 mins
    Die Bedrohungslage | November 2017

    Was Sie beachten sollten,um Ihre IT-Security 2018 zu stärken

    Was können Sie von den jüngsten Datenschutzverletzungen und Malware-Wellen lernen? Welche Schlüsse ziehen Sie, um die Sicherheitsvorfälle signifikant zu reduzieren? Wie bereiten Sie Ihre Netzwerke, Server und Endgeräte auf die neuen Angriffsmethoden vor, die 2018 kommen könnten und wie erfüllen Sie gleichzeitig die Regularien, wie GDPR?

    Das folgende Webinar von Orla Cox, Director Security Response Team, sollten Sie daher nicht verpassen!
    Das Webinar behandelt:
    •Analyse der grössten IT Security Vorfälle in 2017: Die Methodik und Hintergründe
    •Die wichtigsten Maßnahmen, die sie sofort ergreifen sollten
    •Eine Prognose für 2018 und besten Schutzmechanismen für 2018 und danach

    Heute noch registrieren
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Nov 23 2017 5:00 am UTC 60 mins
    Three major trends define the Cloud Generation chaos that organisations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organisations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for organisations who face a severe shortage of skilled IT security personnel.

    Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:

    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security

    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response

    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • How CASB Needs to Evolve to Integrate with Your Security Infrastructure
    How CASB Needs to Evolve to Integrate with Your Security Infrastructure Martin Kroemer, Symantec Nov 23 2017 9:00 am UTC 60 mins
    Rapid adoption of cloud apps and services is driving the need for Cloud Access Security Brokers (CASB)

    It is time for CASB systems to weave into your overall security infrastructure. There are many intersections to consider, such as DLP, Advanced Malware Protection, Web Security and Endpoint where organizations are navigating how to best integrate cloud security solutions into their environment to improve security and reduce operational overhead.

    This talk will explore this next frontier of CASB solutions.

    Register Today
  • APTs - Cómo funcionan y cómo protegerse
    APTs - Cómo funcionan y cómo protegerse Alvaro Culebras Sanchez, Cybersecurity Engineer; Noa Blanco Fernandez, Cybersecurity Engineer Nov 23 2017 3:30 pm UTC 45 mins
    Crees que estas protegido frente a las APTs? Te explicamos cómo funcionan y como protegerse

    Los ataques de hoy en día se han vuelto cada vez más sofisticados, lo que ha provocado que las medidas de seguridad tradicionales ya no sean eficaces. Las organizaciones deben adoptar nuevas estrategias de Ciberseguridad que permitan una mayor protección, adaptándose a estas nuevas amenazas.

    En este webinar FireEye y Minsait, la unidad de negocio de Indra encargada de la transformación digital de las empresas, muestran qué son las Amenazas Persistentes Avanzadas (Advanced Persistent Threats), cómo funcionan y qué medidas se deben implementar en las organizaciones para protegerse ante las APTs que utilizan el correo electrónico como principal vector de ataque.
  • SafeNet Authentication Service Live Product Demo
    SafeNet Authentication Service Live Product Demo Ms. Mukta Gupta - Technical Consultant Engineer, Identity & Data Protection, India & SAARC, Gemalto Nov 24 2017 5:30 am UTC 30 mins
    SafeNet Authentication Service (SAS) delivers fully-automated, highly secure strong authentication-as-a service. A new product demo webinar is now available.

    Register now for our 30 minute demo and see how easy and simple it is to:
    - Set up a strong authentication account on SAS
    - Add users to an account
    - Assign tokens to users
    - Generate reports

    Please email us at InfoAPAC@gemalto.com if you have any questions or problems registering.
  • Rôle crucial du proxy dans la protection de votre entreprise
    Rôle crucial du proxy dans la protection de votre entreprise Hervé Doreau, Directeur Technique, Symantec France Nov 24 2017 1:00 pm UTC 60 mins
    Pour relever les défis de sécurité les plus complexes, il vous faut une approche avancée bâtie sur une architecture proxy.
    Une telle approche vous permet de vous appuyer sur les meilleures technologies pour offrir sécurité et confiance aux utilisateurs cloud et réseau.
    Symantec Secure Web Gateway vous apporte une solution de sécurité optimale sous la forme qui vous convient le mieux : appliance sur site, appliance virtuelle, solution dans le cloud ou une architecture hybride unifiée.
    L'architecture proxy unique de cette solution lui permet de surveiller, contrôler et sécuriser le trafic pour offrir une expérience sécurisée sur le Web et dans le cloud.
    Ce webcast vous explique :
    - Pourquoi l’architecture proxy est plus importante que jamais dans la composition de votre sécurité réseau
    - Comment un proxy web peut servir de plate-forme de détection des menaces et de protection des données
    - En quoi un filtrage en amont du sandbox via l’architecture proxy permet d’optimiser votre SOC sans grever votre budget

    Inscrivez-vous dès aujourd'hui
  • Maîtriser le chaos du cloud
    Maîtriser le chaos du cloud Hervé Doreau, Directeur Technique, Symantec France Nov 24 2017 2:00 pm UTC 45 mins
    Sécuriser l’accès au web et protéger les données avec une solution de sécurité mise en œuvre dans le cloud.

    L’accroissement de l’adoption du cloud, l’usage du mobile et la croissance spectaculaire du télétravail met les infrastructures de sécurité existantes sous pression.
    Dans un tel environnement, les équipes de sécurité de l’entreprise doivent faire face aux préoccupations suivantes :
    - Comment harmoniser l’application des politiques encadrant l’usage du web et du cloud ?
    - Comment protéger efficacement les utilisateurs des menaces web ?
    - Comment sécuriser les données sensibles et respecter les réglementations ?
    Pour relever ces défis, les entreprises se tournent vers une solution de sécurité mise en œuvre dans le cloud.

    Assistez à ce webcast pour apprendre à tirer parti de Symantec Cloud Security Services pour protéger les utilisateurs, les données et les terminaux, et relever les défis de la génération cloud.
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities
    Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Adrian Davis, Managing Director, (ISC)² EMEA, Membership Services, (ISC)² EMEA Nov 27 2017 12:00 pm UTC 60 mins
    Are you an (ISC)² member with questions about your certification and member benefits, or want to keep in touch with (ISC)² news in EMEA? Are you thinking about joining, and curious to hear more about what membership means and how (ISC)² can help you?

    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session
  • In-house or Outsourced Security Operations Center?
    In-house or Outsourced Security Operations Center? Oliver Rochford, VP of Security Evangelism - DFLabs, Sebastian Hess, AIG Cyber Risk Exec Nov 27 2017 3:00 pm UTC 45 mins
    The need to have a Security Operations Center (SOC) is becoming increasingly evident with each passing day, with data breaches being a common occurrence for many organizations around the globe. But, when organizations start thinking about setting up a SOC, they face a big dilemma - whether to build one in-house, or go with an outsourced or managed services model.

    This webinar offers a deeper look into the factors that should play a role in deciding which option is a better fit for organizations, based on their needs and the resources at their disposal.

    Key takeaways:
    - A SOC must strike a proper balance between people, processes and technology
    - People are the key to any SOC, but are scarce due to a skills shortage
    - The right technologies are a key enabler for any SOC, but can often also be remotely delivered
    - Getting processes right in an outsourced SOC model can be challenging, but the unavailability of skilled resources may be the bigger challenge

    Join us on this webinar as we try to answer the question of how best to handle your security needs, by explaining the pros and cons of both an in-house SOC and an outsourced one, so you can make an informed decision that would be best suited for your organization.
  • Are you Prepared for the General Data Protection Regulations?
    Are you Prepared for the General Data Protection Regulations? Ilias Chantzos, Senior Director EMEA and APJ, Global CIP and Privacy Advisor, Government Affairs, Symantec Corporation Nov 28 2017 5:00 am UTC 60 mins
    On 25 May 2018, the European General Data Protection Regulation (GDPR) will come into effect – and while it is an European Union’s regulation, it may still affect your organisation here in the Asia Pacific.

    But how do you know if your organisation needs to comply with the GDPR, and what is required for compliance? With top level fines of over $20 million for non-compliance, it is better to be safe and sure than sorry.

    Join us at our webinar as we discuss:

    • How to find out if your company will be impacted by the GDPR
    • What is needed to comply with the GDPR
    • How the GDPR will be enforced in Asia Pacific
    • Capitalising on the GDPR to improve your business
    • Real-life issues faced by organisations and how technology can help fix them

    Don’t be caught unaware by the GDPR. Register for our webinar today and learn how Symantec technologies help to facilitate GDPR compliance.
  • What's New: The Latest Proofpoint Email Security Release
    What's New: The Latest Proofpoint Email Security Release Jeff Burstein, Sr. Director, Product Management Nov 28 2017 11:00 am UTC 45 mins
    Proofpoint always strives to offer the most advanced security to our customers and invests around 20% of our revenue back into R&D.

    The latest Proofpoint Email Security release has added additional defenses against a changing threat landscape. Join this webinar to learn how upgrading to the latest version brings significant benefits across email security including:

    * Email Authentication
    * Attachment Sandboxing
    * Data Loss Prevention
    * Encryption
  • The Forrester Total Economic Impact of Palo Alto Networks Traps
    The Forrester Total Economic Impact of Palo Alto Networks Traps Bob Cormier, VP, Principal Consultant at Forrester Consulting & Dal Gemmell, Head of Endpoint Marketing at Palo Alto Networks Nov 28 2017 12:00 pm UTC 45 mins
    Guest Speaker Bob Cormier, VP & Principal Consultant of Forrester, will discuss the results of The Total Economic Impact™ of the Palo Alto Networks Traps solution, an October 2017 commissioned study conducted by Forrester Consulting on behalf of Palo Alto Networks. Watch this Webinar to see how companies:

    • Attained economic total benefits with Traps
    • Realized a ROI and the payback period.
    • Prevented malicious executables (malware) and prevented vulnerability exploits.

    Deep dive with Forrester to discover the findings of how Palo Alto Networks Traps achieved the above benefits, and how Traps advanced endpoint protection replaced antivirus solutions and secured endpoints with a multi-method approach.