Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Amazon ELB: Your Master Key to a Secure, Cost-Efficient and Scalable Cloud
    Amazon ELB: Your Master Key to a Secure, Cost-Efficient and Scalable Cloud Todd Bernhard, Product Marketing Manager Recorded: Jan 23 2018 16 mins
    Load Balancing automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses. It can handle the varying load of your application traffic in a single Availability Zone or across multiple Availability Zones. Load Balancing offers different types of load balancers that all feature the high availability, automatic scaling, and robust security necessary to make your applications fault tolerant.

    Attendees will:
    -Understand how Load Balancers can help optimize your cloud resource utilization and reduce costs
    -Identify the security implications of Load Balancers
    -Look at why monitoring Load Balancer deployments is so important
  • Top 5 Cybersecurity Trends for 2018
    Top 5 Cybersecurity Trends for 2018 Terry Ray, CTO, Imperva Recorded: Jan 23 2018 56 mins
    Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends for 2018, including:
    · The impending arrival of massive cloud data breaches
    · The growth of crypto-currency mining attacks
    · Malicious use of AI and AI deception
    · Cyber extortion's increasing focus on business disruption
    · The evolution of insider breaches

    About the presenter:
    Terry Ray has global responsibility for Imperva’s technology strategy. He was the first U.S.-based Imperva employee and has been with the company for 14 years. He works with organizations around the world to help them discover and protect sensitive data, minimize risk for regulatory governance, set data security strategy and implement best practices.
  • How Traps Prevents Ransomware
    How Traps Prevents Ransomware Palo Alto Networks Recorded: Jan 23 2018 3 mins
    More than 70% of companies targeted by ransomware attacks have been infected. Learn what makes ransomware so successful and how the unique multi-method approach from Palo Alto Networks can prevent it.
  • Webinar: A Sneak Peek at Exterro's 2018 Federal Judges Survey Results
    Webinar: A Sneak Peek at Exterro's 2018 Federal Judges Survey Results U.S. Magistrate Judge Andrew Peck (SDNY); former U.S. Magistrate Judge Ron Hedges; Michael Hamilton (Exterro) Recorded: Jan 23 2018 67 mins
    Get a sneak peek at new legal research conducted by EDRM/Duke Law, Exterro and BDO Consulting on how judges are enforcing new e-discovery rules in their courtrooms along with judicial insight for improving e-discovery outcomes. In this webinar, two federal judges will walk attendees through the judges survey results and offer their own perspectives for implementing defensible but yet proportional e-discovery practices.

    We'll discuss what federal judges see as:

    - The primary cause of e-discovery problems and how to fix them
    - The easiest way for legal teams to improve e-discovery outcomes
    - The "must-do" preservation activities to ensure your actions are defensible

    Hosted by George Socha, cofounder, EDRM. Sponsored by Exterro.
  • Breaking Down Cloud Security: Discover What it Means to You
    Breaking Down Cloud Security: Discover What it Means to You Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Recorded: Jan 23 2018 37 mins
    Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.

    Join us as we discuss:

    - How cloud security differs from a public cloud, a private cloud or a hybrid cloud
    - How cloud technologies impact a company's security options
    - How do you defend against attacks of third-party providers of IT services
    - How to develop policies and procedures to test and evaluate servers over which you have no physical control

    To better understand what cloud security means to you, register now.
  • The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy
    The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy Eric Avigdor, DIrector of Product Management at Gemalto Recorded: Jan 23 2018 55 mins
    Two critical European regulations are rolling out in 2017 and 2018. The General Data Protection Regulation (GDPR) is designed to strengthen the safeguards around personal data and create a more uniform standard within the European Union (EU), while eIDAS is the European Regulation aimed at creating a framework for cross-border electronic identification and transactions across EU member countries.

    Paperless vs. Privacy is a real issue facing business in the EU, and around the world. Both eIDAS and GDPR have global ramifications and affect a broad group of industries. Complying with both of these regulations can be a real hardship for some small to mid-size companies.

    Please join us for our BrighTalk webinar where our resident Public Key Infrastructure expert, Eric Avigdor, will help you tread the waters of eIDAS vs. GDPR. Which one is most important for your business? What are the consequences of non-compliance? We will also discuss how to comply with multi-factor authentication, physical access, and encryption requirements.
  • Go Beyond PSD2 Compliance with Digital Identity
    Go Beyond PSD2 Compliance with Digital Identity Nick Caley, VP Financial Services and Regulatory, ForgeRock Recorded: Jan 23 2018 49 mins
    As European financial institutions work towards compliance with PSD2, there's an intense focus on securing customer data as it's opened up to third parties.

    Essential requirements around securing APIs to enable direct payments and account aggregation are accompanied by increased regulations for strong customer authentication. Financial institutions are looking to improve their management of digital identities to ensure customer data remains private.

    Not only can a modern digital identity platform help companies with API security and authentication requirements, it can also drive innovation in areas like consent management, with dashboards that allow customers to control their personal data at a granular level. Banks can embed identity into their digital platforms in order to use PSD2 as a strategic opportunity to build trusted relationships with their customers.
  • Docker Monitoring: Best Practices for Optimal Efficiency
    Docker Monitoring: Best Practices for Optimal Efficiency Eric Carter, Product Marketing Manager, Sysdig Recorded: Jan 23 2018 64 mins
    Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.

    Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.

    During this webinar you’ll learn:

    - How should you monitor services built on top of containers?
    - What metrics become more relevant in Docker-based environments?
    - How do you construct alerts most effectively?
    - How do you troubleshoot containers that are rapidly coming and going?

    The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
  • Using GRC to Tackle Operational Risk Management
    Using GRC to Tackle Operational Risk Management Sam Abadir - VP of Industry Solutions, Lockpath Recorded: Jan 23 2018 39 mins
    Operational risk management (ORM) is a growing discipline within an organization’s integrated risk management program. Practitioners identify how daily managed activities and external events impact strategic goals, value creation, and operations. Managing operational risk can be challenging, in part, because of the inability to fully understand how risk impacts value.

    In this fast-paced webinar, LockPath’s Sam Abadir shares current ORM trends and challenges, Lockpath’s ORM maturity model and how a governance, risk management, and compliance (GRC) processes can address ORM.

    Specifically, you’ll learn about the following:

    • A practical guide to ORM processes, including current trends and challenges
    • The impact of daily managed activities and external events on overall business operations and strategic goals
    • One organization that uses a GRC solution to conduct ORM and create value
    • How a GRC platform can help you avert crisis and embrace risk
  • 4 Things to Do When Clients Pressure You for Lower Fees
    4 Things to Do When Clients Pressure You for Lower Fees Tim Robertson Recorded: Jan 23 2018 49 mins
    "Your fees are too high; can you do it for less?" In the highly competitive marketplace we hear dreaded phrases like this all of the time. The easy thing to do is to offer a discount, but that cuts into your profit margins and sets a precedent for the future. You don’t want to become a victim of discounting gone wrong. So what do you do when clients push back on your fees? This webinar runs through the 4 things you can do when clients put pressure on you to lower your fees
  • Cyber Security Webinar: The Journey Towards GDPR Compliance
    Cyber Security Webinar: The Journey Towards GDPR Compliance Fred Streefland, senior product marketing manager at Palo Alto Networks and Mark Child, managing director at Xcina Consulting Recorded: Jan 23 2018 47 mins
    Learn the pragmatic and simple approach to deal with GDPR

    Join Fred Streefland, senior product marketing manager at Palo Alto Networks and guest speaker Mark Child, managing director at Xcina Consulting, for an informative webinar about taking a pragmatic approach to the GDPR and compliance.

    Attend this event to understand:

    - New cybersecurity legislation and the main elements of the GDPR
    - What’s in the GDPR and what’s not
    - Security-specific recitals and articles
    - The U.K. Data Protection Bill and modifications to the GDPR
    - How Palo Alto Networks can help you become GDPR-compliant

    We do hope you can join us for this exclusive webinar.
  • Scale Out, Not Up: Modernise and Simplify your Data Management Infrastructure
    Scale Out, Not Up: Modernise and Simplify your Data Management Infrastructure Marc Lucas, Commvault and Alex Raben, COOLSPIRiT Recorded: Jan 23 2018 34 mins
    Is your data protection infrastructure slowing you down? Staff and time are a limited resource. But all too often, addressing tactical matters supporting your systems consumes most, or all, of both.

    Eliminate the slowdown and consolidate the point solutions and appliances that consume your time.

    In this webinar we will introduce you to an appliance that gives you a turnkey data protection solution that’s designed, tested, built and supported entirely by Commvault. With it, you’ll save time across:

    Acquisition: you won’t have to research components and compatibilities, or manage complicated orders

    Installation and Integration: no need for your team to assemble, test, and monitor multiple components

    Administration: with a simple, intuitive graphical user interface, an IT generalist can monitor performance, set policies, and enable self-service capabilities

    Patching: a single update puts you on the latest software version, eliminating the need to track compatibility across vendors

    Support: one call is all you’ll need to resolve any issue across the entire hardware and software stack

    You can choose to scale out the appliance, or choose Commvault HyperScale™ Software with your preferred hardware vendor.

    Join us to learn more about this game-changing solution.
  • Help protect your organization with compliance solutions
    Help protect your organization with compliance solutions Tina Ying and Om Vaiti, Microsoft Recorded: Jan 22 2018 43 mins
    Overcome your organization's hurdles to regulatory compliance

    Achieving organizational compliance is no easy task, what with an average of 201 updates every day from 750 different regulatory bodies. Research shows that 65% of firms rank “design and implementation of internal processes” as their biggest hurdle to achieving GDPR compliance.

    Join this webinar to:
    - Learn the shared responsibility model for managing data on Microsoft Cloud Services.
    - Discover how Compliance Manager works to help you improve your compliance posture.
    - Find out how you can sign up for the Compliance Manager preview program.
  • Manage data intelligently with Advanced eDiscovery
    Manage data intelligently with Advanced eDiscovery Raman Kalyan, Microsoft; Nishan Delsilva, Office Information Protection Team, Microsoft Recorded: Jan 22 2018 42 mins
    Your e-discovery process just got easier

    Most enterprise business litigation costs add up to more than $1 million when executing traditional e-discovery document review processes. Office 365 Advanced eDiscovery reduces the volume of data by eliminating duplicate files, reconstructing email threads and identifying key themes and data relationships.

    Join this webinar to learn how to:
    - Reduce your e-discovery costs significantly.
    - Streamline and speed up the document review process.
    - Focus on key documents to make quick, informed decisions on case strategy.
  • Safeguard the right data with Advanced Data Governance
    Safeguard the right data with Advanced Data Governance Raman Kalyan, Microsoft; Nishan Delsilva, Office Information Protection Team, Microsoft Recorded: Jan 22 2018 33 mins
    It pays to be discerning when it comes to data retention. As organizations handle increasingly large amounts of data, many struggle to enforce data governance policies. What many organizations don't know is that they're exposing themselves to risk by retaining data they no longer need.

    Office 365 Advanced Data Governance applies machine learning to help customers find and retain important data while eliminating trivial, redundant and obsolete data that could cause risk if compromised.

    Join this webinar to learn how to:
    - Get proactive policy recommendations and automatic data classifications so you can know which data to retain and which to delete.
    - Set alerts to identify data governance risks.
    - Apply compliance controls to on-premises data and migrate it to Office 365.
  • Migrate to the cloud and transform your company
    Migrate to the cloud and transform your company Barry Briggs, Author, Independent Cloud Consultant, Speaker Eduardo Kassner, Chief Technology & Innovation Officer, Microsoft Recorded: Jan 22 2018 46 mins
    All the essentials you need to know about the cloud, boiled down into a single webinar.

    OK, maybe it’s not that simple. But this webinar will give you a collection of tips and strategies for moving both your company and your skillset to the cloud.

    We’ve invited the authors of the popular e-book Enterprise Cloud Strategy Second Edition to discuss ways you can migrate your applications to the cloud and capitalize on the potential of artificial intelligence, big data, and other transformative technologies.

    You’ll get an overview of how to:
    - Prepare your organization to move to the cloud
    - Use cloud features like backup, restore and disaster recovery
    - Make your cloud operations more efficient and responsive to your business through DevOps
    - Leverage large scale data, cloud analytics and AI
  • [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations
    [Breach Prevention] 2018 Cybersecurity Predictions and Recommendations Palo Alto Networks Cybersecurity Experts Recorded: Jan 22 2018 63 mins
    Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.

    Here’s a sampling of some of the predictions our cybersecurity experts will review:

    •Ransomware Prevention more important than ever
    •The Internet of Things blurs the line between personal and corporate security
    •The era of Software Supply-Chain attacks has begun
    •The Cloud will accelerate channel partner migration to next-generation security innovators
    •Advances in Machine Learning will improve both patient care and cybersecurity
    •Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls
  • Judging Day Highlights 2017
    Judging Day Highlights 2017 Institute of Sales Management Recorded: Jan 22 2018 4 mins
    To register your interest or to find out more about Judging Day and our BESMA Awards please click here https://www.ismprofessional.com/besma/
  • BESMA 2017 Awards Highlight Reel
    BESMA 2017 Awards Highlight Reel Institute of Sales Management Recorded: Jan 22 2018 4 mins
    The 2017 BESMA Awards was hosted by Jimmy Carr and attracted hundreds of entries from leading organisations across the UK & Europe. BESMA has been celebrating the expertise, talent and achievements of the sales industry over the last decade and is regarded as the premiere celebration of sales excellence and recognition in the UK.

    The awards attract hundreds of entries from the leading sales organisations based elsewhere around the globe and through BESMA, the ISM seeks to reward the efforts of the individuals and the teams that drive company performance and recognises the roles played by sales professionals in driving the UK economy forward.

    The awards feature 19 categories celebrating the very best in sales and the teams and individuals behind them. All categories were judged by an influential and respected judging panel. The judging is a robust, credible and transparent process, involving pre-scoring and a face to face panel discussion.

    The winners were announced at Old Billingsgate in London on Thursday 9th November 2017.

    For future interest please click here https://www.ismprofessional.com/besma/
  • Revised Payment Services Directive – PSD2
    Revised Payment Services Directive – PSD2 ForgeRock Recorded: Jan 19 2018 3 mins
    What is the Revised Payment Services Directive (PSD2)? And how is the ForgeRock Identity Platform uniquely suited to address its requirements around strong customer authentication, data sharing via secure APIs, and explicit customer consent for data sharing? This short video explains.
  • 2018 - The Best Year for Cyber Criminals. Period
    2018 - The Best Year for Cyber Criminals. Period Amar Singh, Wieland Alge, Ramses Gallego, Mark Grantz, Tushar Vartak Recorded: Jan 19 2018 76 mins
    Meltdown and Spectre have set the scene for 2018 and make attending our webinar even more of an imperative. This year is going to see it all and we have top panellists and audience members joining. The US Secret Service’s Mark Grantz, Middle East’s top Cybersecurity executive, Tushar Vartak, Europes most recognised Cybersecurity and AI visionary Ramses Gallego, Cybersecurity SME Wieland Alge, a NATO cleared hacker and of course, your very own Amar Singh, CISO and co-founder of Wisdom of Crowds and Cyber Management Alliance Ltd.

    Join the debate, Share your opinions and hear a wide range of experts share their experience and insights.

    Cyber Management Alliance brings you our interactive and educational webinar, inaugurating the new year with an exclusive webinar on what to expect, how and what the criminals are going to do (or not do) and what you can do to protect yourself.

    Yes, we know GDPR is around the corner, but we believe there is much more ahead than just privacy concerns.
  • Training Snapshot: Early Data Assessment from CloudNine
    Training Snapshot: Early Data Assessment from CloudNine Brian Kelley Recorded: Jan 18 2018 4 mins
    A snapshot demonstration of the process required to quickly generate an Early Data Assessment (EDA) report from within the CloudNine eDiscovery Platform and to review the information provided in the report.

    EDA reports provide a comprehensive view of the content and context of a collection of electronically stored information (ESI) early in the litigation, audit, or investigation lifecycle to help eDiscovery practitioners better understand, estimate, and plan discovery efforts.

    Training Snapshot Presenter: Brian Kelley

    Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
  • Supercharge Your SIEM with Big Data and Machine Learning
    Supercharge Your SIEM with Big Data and Machine Learning TJ Laher, Cybersecurity Solutions Lead, Cloudera Recorded: Jan 18 2018 44 mins
    Security Information Event Management (SIEMs) systems have become the go-to application for cybersecurity practitioners, but it doesn’t come without a hefty cost or tradeoffs. These costs can include historic data being unreachable, advanced analytic limitations, and reduced enterprise visibility. Pairing SIEMs with a big data machine learning platform allows enterprises to proactively assess risk by accelerating anomaly detection, investigation, and response with machine learning and complete enterprise visibility.

    Join TJ Laher, Cybersecurity Solutions Lead, as he discusses how big data and machine learning empowers cybersecurity innovators to optimize SIEM deployments. During this discussion, you will learn how open source technology is helping optimize SIEM deployments allowing organizations to:
    • Infinitely scale data storage, access, and machine learning
    • Deploy a community defined open data model to break vendor lock-in and gain complete enterprise visibility
    • Open up application flexibility while building on a future-proofed architecture
  • Minimize Cyber Exposure in a World of Cloud, Containers and Other Modern Assets
    Minimize Cyber Exposure in a World of Cloud, Containers and Other Modern Assets Robert Healey, Senior Director Marketing, APAC, Tenable Network Security Jan 24 2018 6:00 am UTC 60 mins
    As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.

    Attend this webinar to discover:
    •Where vulnerability management for today’s assets needs to start
    •What the new faces of attacks and remediation look like
    •Why prioritization should not be based on scan results
    •Why reports using Excel are no longer the answer
    •How DevOps can be part of the solution to incorporate security

    Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.

    Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
    Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
  • Driving your Information Governance Programme with Data Classification
    Driving your Information Governance Programme with Data Classification Sue Robinson, Data Security Manager, Aspen Insurance & Ross Manley, Boldon James Jan 24 2018 10:00 am UTC 60 mins
    How Data Classification can help support your Data Governance and Protection Initiatives.

    Data classification is no longer a nice to have – it is a necessity – particularly with new data protection regulations like the GDPR just around the corner. Join us for this webinar featuring guest speaker Sue Robinson from Aspen Insurance, who have recently implemented a best-of-breed data classification solution across their organisation globally.

    Watch this webinar to learn:
    • How to approach a data classification project
    • Learnings from planning and implementing a data classification project
    • How data classification supports more effective data governance
    • What to consider when evaluating a classification solution
  • Rethink Security for SaaS: Power of the Platform
    Rethink Security for SaaS: Power of the Platform Anuj Sawani, Product Marketing Manager, Navneet Singh, Product Marketing Director Jan 24 2018 1:00 pm UTC 60 mins
    The challenges of SaaS applications such as Office 365 or Box are already here whether they are enabled by IT or end users themselves. With the adoption of SaaS, your data is now outside your traditional network perimeter and any changes to how the data is shared, who it is shared with and if it is free of malware is no longer known by your organization. History has shown that when a significant risk arises, a point solution is applied to address it. Defenses made up of multiple point products that do not integrate leave gaps that may expose your organization to attack.

    Join us for this live webinar where we will examine the various stages of a real-world attack targeting your SaaS applications. You will learn how to prevent these attacks at every single point in the security kill chain with a natively integrated Next Generation Security Platform and learn how to:

    * Gain visibility and granular, context-based control of SaaS applications

    * Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.

    *Satisfy compliance requirements while still maintaining the benefits of SaaS based application services
  • Speed Up the Hunt: Make the Bad Guys’ Lives Harder with Threat-hunting
    Speed Up the Hunt: Make the Bad Guys’ Lives Harder with Threat-hunting Adrian Davis (ISC)² EMEA, Rick McElroy Carbon Black, Joe Moles Red Canary Jan 24 2018 2:30 pm UTC 60 mins
    In today’s threat landscape, modern security teams recognise that compromise is inevitable. However, that does not mean that a breach should be inevitable too.
    Today’s security leaders must bring together the people, process and technology to enable threat hunting. Detect and alert strategies need to be revamped to shift from reactive forms of incident response to proactive threat hunting.
    Join Rick McElroy, Security Strategist for Carbon Black, to learn how better to enable your hunt.
    Key takeaways:
    1.Understand the role of threat hunting in a resilient cybersecurity strategy
    2.Learn how to create a culture of threat hunting and embed it within your security strategy
    3.Discover how to mature your threat hunting program
    4.Learn how to create an ROI for threat hunting
    5.Gain practical insight into the steps to take in order to start threat hunting

    Moderator: Adrian Davis, Managing Director, (ISC)² EMEA
    Speakers:
    Rick McElroy, Security Strategist, Carbon Black
    Joe Moles, Director of Detection Operations, Red Canary
  • Advancing Our Leadership in Automation with Tufin R17-3
    Advancing Our Leadership in Automation with Tufin R17-3 Amnon Even-Zohar,Senior Product Manager, Tufin & Dan Rheault, Sr. Product Marketing Manager, Tufin Jan 24 2018 4:00 pm UTC 45 mins
    Please join Tufin as we brief our customers on the release of Tufin Orchestration Suite™ R17-3, Advancing Our Leadership in Automation: Pioneering the Automation Journey to the SDN and More. We’ll cover the different facets of automation features in the release including automation and provisioning for VMware NSX, support for Check Point Identity Awareness Blade, and end-to-end group modification automation.

    Other items covered include:

    Policy optimization for Cisco Firepower
    Enhancements to topology to further support “what-if” analysis
    Policy Browser search enhancements
    Changes to cloud license enforcement
  • Reduce Application Risk with Veracode Greenlight and Developer Sandbox
    Reduce Application Risk with Veracode Greenlight and Developer Sandbox Robert Larkin, CA Veracode Solution Architect Jan 24 2018 4:30 pm UTC 30 mins
    During this 20-minute webinar, learn how developers can stay ahead of vulnerabilities that can disrupt the software development lifecycle (SDLC). See how Veracode Greenlight finds security defects and provides contextual remediation advice to help you fix issues in seconds, right within your IDE. Coupled with the use of Veracode’s developer sandbox, teams can scan code without alerting security or affecting an application’s overall compliance with policy.

    As a result you will be able to:
    •Reduce overall costs by 3x when compared to testing during the QA phase
    •Increase the fix rate of flaws using sandbox scans
    •Get your organization on track to move towards a DevOps and continuous release cycle
  • [Webinar] Balancing DevOps Speed with Quality
    [Webinar] Balancing DevOps Speed with Quality Forrester Research (Chris Condo), Quali (Shashi Kiran) Jan 24 2018 6:00 pm UTC 75 mins
    Balancing DevOps Speed with Quality: Environment Automation to the Rescue
    A Prescriptive Approach to Innovation for the Modern Enterprise
    Organizations in every industry face opportunities and threats caused by digitally empowered customers. Acquiring new customers — or losing existing ones — has never been easier. Companies can't afford to move fast only in some areas; the whole organization must race together toward customer obsession. Application development and delivery (AD&D) professionals must master development and operations (DevOps) and modern application delivery processes across their entire software portfolio to win in the digital marketplace. As software environments become increasingly distributed and complicated, modeling such environments authentically in the Dev/Test stage becomes critical to speed and quality. Giving timely access to such environments early on in the Dev/Test cycle, with self-service can help break silos and increase productivity allowing organizations to scale their software development and shift into higher gear – all with better governance and business insights.

    How do you move fast with increased agility without increasing risk?

    This webinar will share state-of-the-art research from Forrester including trends and best practices, and information from Quali on how to drive this with cloud sandboxes as part of the release cycle with on-demand, self-service environments.
    Enterprise DevOps architects, Release Management professionals, Cloud architects and professionals from ITOps are encouraged to attend.
  • Container Runtime Security with Sysdig Falco
    Container Runtime Security with Sysdig Falco Michael Ducy, Director of Community and Evangelism, Sysdig Jan 24 2018 6:00 pm UTC 60 mins
    While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.

    Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:

    -How does behavioral security differ from existing security solutions like image scanning?

    -How does Falco work?

    -What can it detect?

    -How to build and customize rules.

    -How to extend with alerting options.

    Who should attend?

    If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.
  • 5 Threat Intelligence Resolutions to Keep This New Year
    5 Threat Intelligence Resolutions to Keep This New Year Allan Liska, Threat Intelligence Analyst, Recorded Future Jan 24 2018 7:00 pm UTC 45 mins
    It’s that time when we strive to rid ourselves of old habits and embrace fresh ideas. In security, threat intelligence is certainly seen as one of those fresh ideas. According to Gartner’s recent “Market Guide for Security Threat Intelligence Products and Services,” “One benefit of threat intelligence is that it improves decision making in core security processes, such as incident response and policy enforcement. Better visibility of the threat landscape helps CISOs justify the need for additional resources and understand the problems they encounter.”

    In this webinar, Allan Liska, author of “Threat Intelligence in Practice,” will address five practical steps from Gartner’s report to help you make better use of threat intelligence in your organization, including:

    • Understanding the threat intelligence lifecycle.
    • Knowing the difference between data feeds and threat intelligence.
    • Centralizing, customizing, and collaborating with intelligence.
    • Integrating with your existing security infrastructure.
    • Using vulnerability intelligence to power smarter patching.
  • Knowledge Fuels Digital Transformation
    Knowledge Fuels Digital Transformation Caroline Kinsman, senior education architect at SAP Jan 25 2018 10:00 am UTC 45 mins
    Join us live on Thursday, January 25th at 10:00 am for a 45-minute FREE webinar& demo to discover how SAP Learning Hub gives unlimited access to all of SAP’s learning content and certification paths, as well as opportunities for collaboration, social learning and access to live systems in which to practice. SAP Education and the UK & Ireland SAP User Group have collaborated to offer SAP customers a significant discount on an SAP Learning Hub subscription.

    Caroline Kinsman is an experienced senior education architect who has worked within the field of SAP Education Solutions for over seventeen years. Responsible for designing and delivering successful education programmes for ERP system implementations at both national and multinational organisations. A qualified Chartered Accountant and fluent in three languages Caroline is able to bring her considerable wealth of business experience to a range of stakeholders and sponsors at many levels within an organisation. With twenty years of experience in project team training and consulting, she is able to engage on multiple levels from the strategic to the practical within a project environment. Caroline's experience covers a multitude of sectors including pharmaceutical, public sector, financial services, utilities, oil and gas, consumer goods and automotive. Specialties: A holistic education approach from cradle to grave; detailed knowledge of Project Team Training and SAP Learning Hub.
  • Data Management in the Era of GDPR and Digital Transformation
    Data Management in the Era of GDPR and Digital Transformation Nigel Williams, Commvault Jan 25 2018 2:00 pm UTC 30 mins
    Nigel Williams presents a data management perspective driven both by GDPR together with the shift to digital business. In it, we propose an approach that takes the requirements of GDPR as a catalyst for change and seek a wider set of benefits from the investment made to meet the new privacy requirements - including deriving business value and protecting data more effectively.
  • Secure Information Sharing across Agency Boundaries
    Secure Information Sharing across Agency Boundaries Chris Tonjes, CIO, DC Office of the Attorney General & Sonny Hashmi, Managing Director, Global Public Sector, Box Jan 25 2018 4:00 pm UTC 60 mins
    Government agencies must collaborate to solve complex problems in healthcare, Human Services, Law Enforcement and Emergency Management. However, many of the legacy systems agencies use to coordinate and manage information are not easily extensible outside the agency boundary, requiring either expensive customized portal based solutions, or insecure data exchange via emails and DVDs.

    Box allows agencies to securely work together across agency boundaries, while maintaining the security and compliance that government agencies need. leveraging box, agencies can quickly form inter-agency working groups, collaborate on mission sensitive data, and ensure that all stakeholders remain informed of programs and initiatives, without sacrificing security.

    Join us on this webinar to learn how government agencies are designing modern solutions using cloud technologies to securely share sensitive information between agencies and non-governmental stakeholders. Whether working with citizens and private sector health providers in health and human services, or coordinating across jurisdictions in law enforcement, or collaborating across Federal, State and Local government boundaries in emergency management, agencies are implementing new ways to share relevant information in real time, without compromising the security and privacy of sensitive data. Hear from government CIOs on how they have approached these challenges.
  • Risk Mitigation: Making Office 365 Safer for Business
    Risk Mitigation: Making Office 365 Safer for Business J. Peter Bruzzese, Microsoft MVP, Mimecast Jan 25 2018 4:00 pm UTC 75 mins
    A move to the Microsoft Office 365™ cloud is going to reduce administrative overhead and provide end-users with modern communication and collaboration tools.  However, there are several areas that require further attention (security, archive and continuity) if you want a risk-free move to Office 365.  In this lively session by Microsoft MVP J. Peter Bruzzese, you will hear a non-FUD focused discussion of those gaps and how to close them.

    Presenter Info:
    J. Peter Bruzzese is a six-time-awarded Microsoft MVP (currently for Office Servers and Services, previously for Exchange/Office 365). He is a technical speaker and author with more than a dozen books sold internationally. He's the co-founder of ClipTraining, the creator of ConversationalGeek.com, instructor on Exchange/Office 365 video content for Pluralsight, and a consultant for Mimecast and others.
  • Show Me the Mandates! How to Interpret PSD2 RTS SCA / GDPR / 3DS 2.0
    Show Me the Mandates! How to Interpret PSD2 RTS SCA / GDPR / 3DS 2.0 CA Technologies Payment Security gurus, Product Management Advisor Jayakuma & Presales Director Matt Berryman Jan 25 2018 4:00 pm UTC 60 mins
    Recently, there have been several payment industry initiatives designed to make electronic payments safer. Consequently, financial entities like merchants, PSPs, and consumers will soon face many changes. Although the initiatives’ premise − to eliminate vulnerabilities in the payments cycle − is welcome; businesses must now prepare to comply. Are you ready?

    Join our CA Technologies Payment Security gurus, Product Management Advisor Jayakumar Krishnasamy and Presales Director Matt Berryman to find out:
    • How to interpret the recent payment initiatives
    • If risk-based authentication satisfies mandates
    • Which strong authentication methods are compliant
  • Cyber security Skills Gap: How modern attack vectors affect the cyber workforce
    Cyber security Skills Gap: How modern attack vectors affect the cyber workforce Regine Bonneau Jan 25 2018 4:30 pm UTC 60 mins
    Cybersecurity Skills Are in High Demand, Yet in Short Supply. The growing number of recent cybersecurity attacks highlights a shortage of skilled workforce in the cybersecurity industry, predicted to reach around 1.8 million workers by 2022. These challenges will also be impacted by evolution of IoT/ IoE and Artificial intelligence, which represents an unprecedented opportunity to connect people, processes, data, and things.


    Key Takeaways include:

    - Is Automation an answer to the skill gap?

    - Maintaining security in the face of growing cyber risks and threats

    - How the arrival of AI & IoT in both our personal and business lives will create a skills gap that will require both the retooling of people’s existing skillsets and the wide-scale hiring of new workers
  • Thrive in the DX Era with Data Services for Hybrid Cloud
    Thrive in the DX Era with Data Services for Hybrid Cloud Ritu Jyoti and Robert Westervelt Jan 25 2018 5:00 pm UTC 60 mins
    This IDC Web Conference will feature data highlights from the inaugural IDC Worldwide Data Services for Hybrid Cloud Forecast. Every vertical industry is now seeing the impact of digital transformation (DX). In DX, data is core as every change and process relies on converting data into actionable insights. And the leading digital organizations are discovering that the cloud – in terms of its power to deliver agility and flexibility in data management and faster time to insights – is indispensable for achieving their DX business objectives.

    IDC's Ritu Jyoti and Robert Westervelt will discuss the latest trends in hybrid/multicloud deployments, proliferation of application deployment models and data formats across hybrid IT, associated data management challenges, and how data services for hybrid cloud can help organizations gain a competitive edge and thrive in the DX era.
  • OCC 2018 Part 3: Change Management to Address New Regulations
    OCC 2018 Part 3: Change Management to Address New Regulations Sam Abadir, Director of Product Management, LockPath Jan 25 2018 5:00 pm UTC 60 mins
    The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. A top priority is change management to address new regulation requirements. Whether you’re a banker or service provider to the financial industry, you may be aware of updated or new regulations like the National Flood Insurance Reform Act of 1994, the Military Lending Act, and the Prepaid Card Rule. In this webinar, you’ll learn what OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.

    Attendees will learn:

    • What to consider when designing, operating or improving their change management process
    • The increased focus on fair lending from a quantity and quality perspective
    • Policies, procedures, and processes for credit offered under the Military Lending Act
    • What CCA examiners are looking for with banks relying on third-party relationships
    • How GRC technology supports compliance and integrated risk management programs

    Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
  • FEDRAMP - What is it and why should I care?
    FEDRAMP - What is it and why should I care? David Morris, Juanita Koilpillai, Merrick Watchorn, Aaron Bishop Jan 25 2018 5:00 pm UTC 60 mins
    Come and get educated by the leading FedRAMP Experts:
    Juanita Koilpillai: Former CTO of one of the first FedRAMP Third Party Assessors (3PAOs)
    Dr. Merrick Watchorn: FedRAMP High Security Control Baseline Team Lead, Cloud Computing Standards Roadmap, High Performance Computing Work Group
    Aaron Bishop:Former CISO at SAIC, General Manager at National Security Group, Microsoft, CIO at ANSTEC

    This session will cover FEDRAMP - the Government's complicated process for the protection of information assets. The difference between infrastructure and application security.The challenges & pitfalls in meeting the NIST framework for Federal Cloud adoption.
  • 20 Docker Security Tools Compared
    20 Docker Security Tools Compared Jorge Salamero Sanz and Knox Anderson Jan 25 2018 6:00 pm UTC 60 mins
    There are quite a few Docker security tools in the ecosystem; how do they compare?

    Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/

    We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.

    Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:

    -How to secure Docker containers and what are the best practices
    -Why you need to both static and dynamic (run-time) scanning for your images
    -What other container security measures and policies are necessary in production

    Demo: Comparing and implementing docker security basics with the most popular container security tools
  • Putting the Power of Proxy to Work
    Putting the Power of Proxy to Work Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products, Symantec Jan 25 2018 6:00 pm UTC 45 mins
    Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.


    Join us for our webinar “Putting the Power of Proxy to Work” to learn how:

    - Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud

    - Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365

    - A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization

    Register Today
  • Strengths and Weaknesses of AWS Native Tools
    Strengths and Weaknesses of AWS Native Tools Todd Bernhard, Product Marketing Manager Jan 25 2018 7:00 pm UTC 45 mins
    Can you reach the full potential of the cloud using the tools provided by the cloud vendor? Take a closer look at the various tools built into the AWS (Amazon Web Services) platform, including advantages and shortcomings.

    In this webinar attendees will learn:
    -The strengths and weaknesses of AWS native tools.
    -Understand the shortcomings of those tools to see where additional third-party tools are needed.
  • How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart
    How the Counter Threat Unit™ Sets Secureworks Consulting Services Apart Panel of Secureworks Information Security Strategic and Technical Consultants Jan 25 2018 7:00 pm UTC 60 mins
    As the scope for security skill and expertise demanded of organizations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.

    There are a broad range of organizations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organization with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritize and build out programs that enable business objectives, as well as advise on how to effectively engage with the C-suite.

    What truly sets Secureworks’ information security consulting services apart is how we utilize our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organization.

    Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.

    Key topics discussed include:

    • Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
    • Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organization
    • Lessons learned from our most strategic and complex engagements
  • Counter the Careless Click, Tools to Help You Train Your Users
    Counter the Careless Click, Tools to Help You Train Your Users Erich Kron CISSP, Security Awareness Advocate Jan 25 2018 7:00 pm UTC 60 mins
    Cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employee training is tied as the third-most-effective method (higher than antivirus) of decreasing the cost of a data breach.*

    Many IT pros know users are the weakest link in network security but don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization.

    Join this 30-minute webinar “Counter the careless click, tools to help you train your users” where Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will provide a practical session with tips and free tools you can implement now to help you create your “human firewall”.

    Erich will cover:

    * Current threat landscape
    * Top 5 tips for security awareness
    * How to easily create your security awareness program
    * Outlining how and where tools are helpful

    * Based on recent research by the Ponemon Institute
  • GDPR - Countdown to Compliance
    GDPR - Countdown to Compliance Jacob Serpa, Product Marketing Manager, Bitglass Jan 25 2018 10:00 pm UTC 30 mins
    As GDPR comes into effect May 2018, organizations are scrambling to reach compliance with its many requirements - particularly as they relate to the cloud. The regulation takes a comprehensive approach to guaranteeing that organizations protect EU citizen data, even after that data moves beyond the firewall via cloud and mobile. Fortunately, there are technology solutions that can address a breadth of GDPR-related concerns.

    In this webinar, gain concrete, actionable advice on how your organization can ensure GDPR compliance with technologies like Cloud Access Security Brokers (CASBs).
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities
    Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Nathaniel Ford, (ISC)² EMEA, Membership Services Team, (ISC)² EMEA Jan 29 2018 12:00 pm UTC 60 mins
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session