Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Load Balancing automatically distributes incoming application traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses. It can handle the varying load of your application traffic in a single Availability Zone or across multiple Availability Zones. Load Balancing offers different types of load balancers that all feature the high availability, automatic scaling, and robust security necessary to make your applications fault tolerant.
-Understand how Load Balancers can help optimize your cloud resource utilization and reduce costs
-Identify the security implications of Load Balancers
-Look at why monitoring Load Balancer deployments is so important
Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends for 2018, including:
· The impending arrival of massive cloud data breaches
· The growth of crypto-currency mining attacks
· Malicious use of AI and AI deception
· Cyber extortion's increasing focus on business disruption
· The evolution of insider breaches
About the presenter:
Terry Ray has global responsibility for Imperva’s technology strategy. He was the first U.S.-based Imperva employee and has been with the company for 14 years. He works with organizations around the world to help them discover and protect sensitive data, minimize risk for regulatory governance, set data security strategy and implement best practices.
Get a sneak peek at new legal research conducted by EDRM/Duke Law, Exterro and BDO Consulting on how judges are enforcing new e-discovery rules in their courtrooms along with judicial insight for improving e-discovery outcomes. In this webinar, two federal judges will walk attendees through the judges survey results and offer their own perspectives for implementing defensible but yet proportional e-discovery practices.
We'll discuss what federal judges see as:
- The primary cause of e-discovery problems and how to fix them
- The easiest way for legal teams to improve e-discovery outcomes
- The "must-do" preservation activities to ensure your actions are defensible
Hosted by George Socha, cofounder, EDRM. Sponsored by Exterro.
Cloud Security has recently filled everyone's network security forecast. Everyone is talking about it, but are they talking about the same thing? Today's webinar puts a framework around a term that has become ever-present in today's conversations even though its definition has not.
Join us as we discuss:
- How cloud security differs from a public cloud, a private cloud or a hybrid cloud
- How cloud technologies impact a company's security options
- How do you defend against attacks of third-party providers of IT services
- How to develop policies and procedures to test and evaluate servers over which you have no physical control
To better understand what cloud security means to you, register now.
Two critical European regulations are rolling out in 2017 and 2018. The General Data Protection Regulation (GDPR) is designed to strengthen the safeguards around personal data and create a more uniform standard within the European Union (EU), while eIDAS is the European Regulation aimed at creating a framework for cross-border electronic identification and transactions across EU member countries.
Paperless vs. Privacy is a real issue facing business in the EU, and around the world. Both eIDAS and GDPR have global ramifications and affect a broad group of industries. Complying with both of these regulations can be a real hardship for some small to mid-size companies.
Please join us for our BrighTalk webinar where our resident Public Key Infrastructure expert, Eric Avigdor, will help you tread the waters of eIDAS vs. GDPR. Which one is most important for your business? What are the consequences of non-compliance? We will also discuss how to comply with multi-factor authentication, physical access, and encryption requirements.
As European financial institutions work towards compliance with PSD2, there's an intense focus on securing customer data as it's opened up to third parties.
Essential requirements around securing APIs to enable direct payments and account aggregation are accompanied by increased regulations for strong customer authentication. Financial institutions are looking to improve their management of digital identities to ensure customer data remains private.
Not only can a modern digital identity platform help companies with API security and authentication requirements, it can also drive innovation in areas like consent management, with dashboards that allow customers to control their personal data at a granular level. Banks can embed identity into their digital platforms in order to use PSD2 as a strategic opportunity to build trusted relationships with their customers.
Pushing Docker-based applications into production radically changes the way you monitor & troubleshoot your environment.
Join Sysdig for a review of the challenges of this new infrastructure and get live examples of monitoring and troubleshooting containers and orchestration systems like Kubernetes for optimal efficiency.
During this webinar you’ll learn:
- How should you monitor services built on top of containers?
- What metrics become more relevant in Docker-based environments?
- How do you construct alerts most effectively?
- How do you troubleshoot containers that are rapidly coming and going?
The webinar will focus on demonstrating open source tools, like Prometheus, and commercial tools, such as Sysdig Monitor, that help you solve these new challenges. You’ll walk away with ideas that you can immediately put to work in any scale environment.
Operational risk management (ORM) is a growing discipline within an organization’s integrated risk management program. Practitioners identify how daily managed activities and external events impact strategic goals, value creation, and operations. Managing operational risk can be challenging, in part, because of the inability to fully understand how risk impacts value.
In this fast-paced webinar, LockPath’s Sam Abadir shares current ORM trends and challenges, Lockpath’s ORM maturity model and how a governance, risk management, and compliance (GRC) processes can address ORM.
Specifically, you’ll learn about the following:
• A practical guide to ORM processes, including current trends and challenges
• The impact of daily managed activities and external events on overall business operations and strategic goals
• One organization that uses a GRC solution to conduct ORM and create value
• How a GRC platform can help you avert crisis and embrace risk
"Your fees are too high; can you do it for less?" In the highly competitive marketplace we hear dreaded phrases like this all of the time. The easy thing to do is to offer a discount, but that cuts into your profit margins and sets a precedent for the future. You don’t want to become a victim of discounting gone wrong. So what do you do when clients push back on your fees? This webinar runs through the 4 things you can do when clients put pressure on you to lower your fees
Learn the pragmatic and simple approach to deal with GDPR
Join Fred Streefland, senior product marketing manager at Palo Alto Networks and guest speaker Mark Child, managing director at Xcina Consulting, for an informative webinar about taking a pragmatic approach to the GDPR and compliance.
Attend this event to understand:
- New cybersecurity legislation and the main elements of the GDPR
- What’s in the GDPR and what’s not
- Security-specific recitals and articles
- The U.K. Data Protection Bill and modifications to the GDPR
- How Palo Alto Networks can help you become GDPR-compliant
We do hope you can join us for this exclusive webinar.
Is your data protection infrastructure slowing you down? Staff and time are a limited resource. But all too often, addressing tactical matters supporting your systems consumes most, or all, of both.
Eliminate the slowdown and consolidate the point solutions and appliances that consume your time.
In this webinar we will introduce you to an appliance that gives you a turnkey data protection solution that’s designed, tested, built and supported entirely by Commvault. With it, you’ll save time across:
Acquisition: you won’t have to research components and compatibilities, or manage complicated orders
Installation and Integration: no need for your team to assemble, test, and monitor multiple components
Administration: with a simple, intuitive graphical user interface, an IT generalist can monitor performance, set policies, and enable self-service capabilities
Patching: a single update puts you on the latest software version, eliminating the need to track compatibility across vendors
Support: one call is all you’ll need to resolve any issue across the entire hardware and software stack
You can choose to scale out the appliance, or choose Commvault HyperScale™ Software with your preferred hardware vendor.
Join us to learn more about this game-changing solution.
Overcome your organization's hurdles to regulatory compliance
Achieving organizational compliance is no easy task, what with an average of 201 updates every day from 750 different regulatory bodies. Research shows that 65% of firms rank “design and implementation of internal processes” as their biggest hurdle to achieving GDPR compliance.
Join this webinar to:
- Learn the shared responsibility model for managing data on Microsoft Cloud Services.
- Discover how Compliance Manager works to help you improve your compliance posture.
- Find out how you can sign up for the Compliance Manager preview program.
Most enterprise business litigation costs add up to more than $1 million when executing traditional e-discovery document review processes. Office 365 Advanced eDiscovery reduces the volume of data by eliminating duplicate files, reconstructing email threads and identifying key themes and data relationships.
Join this webinar to learn how to:
- Reduce your e-discovery costs significantly.
- Streamline and speed up the document review process.
- Focus on key documents to make quick, informed decisions on case strategy.
It pays to be discerning when it comes to data retention. As organizations handle increasingly large amounts of data, many struggle to enforce data governance policies. What many organizations don't know is that they're exposing themselves to risk by retaining data they no longer need.
Office 365 Advanced Data Governance applies machine learning to help customers find and retain important data while eliminating trivial, redundant and obsolete data that could cause risk if compromised.
Join this webinar to learn how to:
- Get proactive policy recommendations and automatic data classifications so you can know which data to retain and which to delete.
- Set alerts to identify data governance risks.
- Apply compliance controls to on-premises data and migrate it to Office 365.
All the essentials you need to know about the cloud, boiled down into a single webinar.
OK, maybe it’s not that simple. But this webinar will give you a collection of tips and strategies for moving both your company and your skillset to the cloud.
We’ve invited the authors of the popular e-book Enterprise Cloud Strategy Second Edition to discuss ways you can migrate your applications to the cloud and capitalize on the potential of artificial intelligence, big data, and other transformative technologies.
You’ll get an overview of how to:
- Prepare your organization to move to the cloud
- Use cloud features like backup, restore and disaster recovery
- Make your cloud operations more efficient and responsive to your business through DevOps
- Leverage large scale data, cloud analytics and AI
Join to hear Palo Alto Networks cybersecurity predictions for 2018 and get recommendations on how to mitigate against them to achieve a more resilient posture in the new year. Experts will dive into predictions on the threat landscape, cloud security, cyber hygiene, endpoint protection, IoT, machine learning and more.
Here’s a sampling of some of the predictions our cybersecurity experts will review:
•Ransomware Prevention more important than ever
•The Internet of Things blurs the line between personal and corporate security
•The era of Software Supply-Chain attacks has begun
•The Cloud will accelerate channel partner migration to next-generation security innovators
•Advances in Machine Learning will improve both patient care and cybersecurity
•Cyber hygiene for financial institutions found non-compliant with SWIFT mandatory security controls
The 2017 BESMA Awards was hosted by Jimmy Carr and attracted hundreds of entries from leading organisations across the UK & Europe. BESMA has been celebrating the expertise, talent and achievements of the sales industry over the last decade and is regarded as the premiere celebration of sales excellence and recognition in the UK.
The awards attract hundreds of entries from the leading sales organisations based elsewhere around the globe and through BESMA, the ISM seeks to reward the efforts of the individuals and the teams that drive company performance and recognises the roles played by sales professionals in driving the UK economy forward.
The awards feature 19 categories celebrating the very best in sales and the teams and individuals behind them. All categories were judged by an influential and respected judging panel. The judging is a robust, credible and transparent process, involving pre-scoring and a face to face panel discussion.
The winners were announced at Old Billingsgate in London on Thursday 9th November 2017.
For future interest please click here https://www.ismprofessional.com/besma/
What is the Revised Payment Services Directive (PSD2)? And how is the ForgeRock Identity Platform uniquely suited to address its requirements around strong customer authentication, data sharing via secure APIs, and explicit customer consent for data sharing? This short video explains.
Meltdown and Spectre have set the scene for 2018 and make attending our webinar even more of an imperative. This year is going to see it all and we have top panellists and audience members joining. The US Secret Service’s Mark Grantz, Middle East’s top Cybersecurity executive, Tushar Vartak, Europes most recognised Cybersecurity and AI visionary Ramses Gallego, Cybersecurity SME Wieland Alge, a NATO cleared hacker and of course, your very own Amar Singh, CISO and co-founder of Wisdom of Crowds and Cyber Management Alliance Ltd.
Join the debate, Share your opinions and hear a wide range of experts share their experience and insights.
Cyber Management Alliance brings you our interactive and educational webinar, inaugurating the new year with an exclusive webinar on what to expect, how and what the criminals are going to do (or not do) and what you can do to protect yourself.
Yes, we know GDPR is around the corner, but we believe there is much more ahead than just privacy concerns.
A snapshot demonstration of the process required to quickly generate an Early Data Assessment (EDA) report from within the CloudNine eDiscovery Platform and to review the information provided in the report.
EDA reports provide a comprehensive view of the content and context of a collection of electronically stored information (ESI) early in the litigation, audit, or investigation lifecycle to help eDiscovery practitioners better understand, estimate, and plan discovery efforts.
Training Snapshot Presenter: Brian Kelley
Brian is the Director of Customer Success for CloudNine. At CloudNine, Brian manages training, support and customer success efforts for CloudNine's Software-as-a-Service (SaaS) eDiscovery clients. Brian has extensive experience providing legal technology consulting and technical support services to numerous commercial and government clients ranging from multinationals corporations and large law firms to litigation support providers and governmental agencies.
Security Information Event Management (SIEMs) systems have become the go-to application for cybersecurity practitioners, but it doesn’t come without a hefty cost or tradeoffs. These costs can include historic data being unreachable, advanced analytic limitations, and reduced enterprise visibility. Pairing SIEMs with a big data machine learning platform allows enterprises to proactively assess risk by accelerating anomaly detection, investigation, and response with machine learning and complete enterprise visibility.
Join TJ Laher, Cybersecurity Solutions Lead, as he discusses how big data and machine learning empowers cybersecurity innovators to optimize SIEM deployments. During this discussion, you will learn how open source technology is helping optimize SIEM deployments allowing organizations to:
• Infinitely scale data storage, access, and machine learning
• Deploy a community defined open data model to break vendor lock-in and gain complete enterprise visibility
• Open up application flexibility while building on a future-proofed architecture
As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.
Attend this webinar to discover:
•Where vulnerability management for today’s assets needs to start
•What the new faces of attacks and remediation look like
•Why prioritization should not be based on scan results
•Why reports using Excel are no longer the answer
•How DevOps can be part of the solution to incorporate security
Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.
Presenter: Robert Healey, Senior Director Marketing, APAC, Tenable Network Security
Moderator: Clayton Jones, Regional Managing Director, APAC, (ISC)²
How Data Classification can help support your Data Governance and Protection Initiatives.
Data classification is no longer a nice to have – it is a necessity – particularly with new data protection regulations like the GDPR just around the corner. Join us for this webinar featuring guest speaker Sue Robinson from Aspen Insurance, who have recently implemented a best-of-breed data classification solution across their organisation globally.
Watch this webinar to learn:
• How to approach a data classification project
• Learnings from planning and implementing a data classification project
• How data classification supports more effective data governance
• What to consider when evaluating a classification solution
The challenges of SaaS applications such as Office 365 or Box are already here whether they are enabled by IT or end users themselves. With the adoption of SaaS, your data is now outside your traditional network perimeter and any changes to how the data is shared, who it is shared with and if it is free of malware is no longer known by your organization. History has shown that when a significant risk arises, a point solution is applied to address it. Defenses made up of multiple point products that do not integrate leave gaps that may expose your organization to attack.
Join us for this live webinar where we will examine the various stages of a real-world attack targeting your SaaS applications. You will learn how to prevent these attacks at every single point in the security kill chain with a natively integrated Next Generation Security Platform and learn how to:
* Gain visibility and granular, context-based control of SaaS applications
* Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
*Satisfy compliance requirements while still maintaining the benefits of SaaS based application services
In today’s threat landscape, modern security teams recognise that compromise is inevitable. However, that does not mean that a breach should be inevitable too.
Today’s security leaders must bring together the people, process and technology to enable threat hunting. Detect and alert strategies need to be revamped to shift from reactive forms of incident response to proactive threat hunting.
Join Rick McElroy, Security Strategist for Carbon Black, to learn how better to enable your hunt.
1.Understand the role of threat hunting in a resilient cybersecurity strategy
2.Learn how to create a culture of threat hunting and embed it within your security strategy
3.Discover how to mature your threat hunting program
4.Learn how to create an ROI for threat hunting
5.Gain practical insight into the steps to take in order to start threat hunting
Moderator: Adrian Davis, Managing Director, (ISC)² EMEA
Rick McElroy, Security Strategist, Carbon Black
Joe Moles, Director of Detection Operations, Red Canary
Please join Tufin as we brief our customers on the release of Tufin Orchestration Suite™ R17-3, Advancing Our Leadership in Automation: Pioneering the Automation Journey to the SDN and More. We’ll cover the different facets of automation features in the release including automation and provisioning for VMware NSX, support for Check Point Identity Awareness Blade, and end-to-end group modification automation.
Other items covered include:
Policy optimization for Cisco Firepower
Enhancements to topology to further support “what-if” analysis
Policy Browser search enhancements
Changes to cloud license enforcement
During this 20-minute webinar, learn how developers can stay ahead of vulnerabilities that can disrupt the software development lifecycle (SDLC). See how Veracode Greenlight finds security defects and provides contextual remediation advice to help you fix issues in seconds, right within your IDE. Coupled with the use of Veracode’s developer sandbox, teams can scan code without alerting security or affecting an application’s overall compliance with policy.
As a result you will be able to:
•Reduce overall costs by 3x when compared to testing during the QA phase
•Increase the fix rate of flaws using sandbox scans
•Get your organization on track to move towards a DevOps and continuous release cycle
Balancing DevOps Speed with Quality: Environment Automation to the Rescue
A Prescriptive Approach to Innovation for the Modern Enterprise
Organizations in every industry face opportunities and threats caused by digitally empowered customers. Acquiring new customers — or losing existing ones — has never been easier. Companies can't afford to move fast only in some areas; the whole organization must race together toward customer obsession. Application development and delivery (AD&D) professionals must master development and operations (DevOps) and modern application delivery processes across their entire software portfolio to win in the digital marketplace. As software environments become increasingly distributed and complicated, modeling such environments authentically in the Dev/Test stage becomes critical to speed and quality. Giving timely access to such environments early on in the Dev/Test cycle, with self-service can help break silos and increase productivity allowing organizations to scale their software development and shift into higher gear – all with better governance and business insights.
How do you move fast with increased agility without increasing risk?
This webinar will share state-of-the-art research from Forrester including trends and best practices, and information from Quali on how to drive this with cloud sandboxes as part of the release cycle with on-demand, self-service environments.
Enterprise DevOps architects, Release Management professionals, Cloud architects and professionals from ITOps are encouraged to attend.
While there have been many improvements around securing containers, there is still a large gap in monitoring the behavior of containers in production and taking action on any abnormal behavior. That’s why we created Sysdig Falco, the open source behavioral activity monitor for containerized environments.
Sysdig Falco can detect and alert on anomalous behavior at the application, file, system, and network level. In this webinar attendees get a deep dive into Falco and learn:
-How does behavioral security differ from existing security solutions like image scanning?
-How does Falco work?
-What can it detect?
-How to build and customize rules.
-How to extend with alerting options.
Who should attend?
If you're managing containers in production, or just beginning our container exploration, you'll want to attend to understand the security paradigms of containers and how to secure them.
It’s that time when we strive to rid ourselves of old habits and embrace fresh ideas. In security, threat intelligence is certainly seen as one of those fresh ideas. According to Gartner’s recent “Market Guide for Security Threat Intelligence Products and Services,” “One benefit of threat intelligence is that it improves decision making in core security processes, such as incident response and policy enforcement. Better visibility of the threat landscape helps CISOs justify the need for additional resources and understand the problems they encounter.”
In this webinar, Allan Liska, author of “Threat Intelligence in Practice,” will address five practical steps from Gartner’s report to help you make better use of threat intelligence in your organization, including:
• Understanding the threat intelligence lifecycle.
• Knowing the difference between data feeds and threat intelligence.
• Centralizing, customizing, and collaborating with intelligence.
• Integrating with your existing security infrastructure.
• Using vulnerability intelligence to power smarter patching.
Join us live on Thursday, January 25th at 10:00 am for a 45-minute FREE webinar& demo to discover how SAP Learning Hub gives unlimited access to all of SAP’s learning content and certification paths, as well as opportunities for collaboration, social learning and access to live systems in which to practice. SAP Education and the UK & Ireland SAP User Group have collaborated to offer SAP customers a significant discount on an SAP Learning Hub subscription.
Caroline Kinsman is an experienced senior education architect who has worked within the field of SAP Education Solutions for over seventeen years. Responsible for designing and delivering successful education programmes for ERP system implementations at both national and multinational organisations. A qualified Chartered Accountant and fluent in three languages Caroline is able to bring her considerable wealth of business experience to a range of stakeholders and sponsors at many levels within an organisation. With twenty years of experience in project team training and consulting, she is able to engage on multiple levels from the strategic to the practical within a project environment. Caroline's experience covers a multitude of sectors including pharmaceutical, public sector, financial services, utilities, oil and gas, consumer goods and automotive. Specialties: A holistic education approach from cradle to grave; detailed knowledge of Project Team Training and SAP Learning Hub.
Nigel Williams presents a data management perspective driven both by GDPR together with the shift to digital business. In it, we propose an approach that takes the requirements of GDPR as a catalyst for change and seek a wider set of benefits from the investment made to meet the new privacy requirements - including deriving business value and protecting data more effectively.
Government agencies must collaborate to solve complex problems in healthcare, Human Services, Law Enforcement and Emergency Management. However, many of the legacy systems agencies use to coordinate and manage information are not easily extensible outside the agency boundary, requiring either expensive customized portal based solutions, or insecure data exchange via emails and DVDs.
Box allows agencies to securely work together across agency boundaries, while maintaining the security and compliance that government agencies need. leveraging box, agencies can quickly form inter-agency working groups, collaborate on mission sensitive data, and ensure that all stakeholders remain informed of programs and initiatives, without sacrificing security.
Join us on this webinar to learn how government agencies are designing modern solutions using cloud technologies to securely share sensitive information between agencies and non-governmental stakeholders. Whether working with citizens and private sector health providers in health and human services, or coordinating across jurisdictions in law enforcement, or collaborating across Federal, State and Local government boundaries in emergency management, agencies are implementing new ways to share relevant information in real time, without compromising the security and privacy of sensitive data. Hear from government CIOs on how they have approached these challenges.
A move to the Microsoft Office 365™ cloud is going to reduce administrative overhead and provide end-users with modern communication and collaboration tools. However, there are several areas that require further attention (security, archive and continuity) if you want a risk-free move to Office 365. In this lively session by Microsoft MVP J. Peter Bruzzese, you will hear a non-FUD focused discussion of those gaps and how to close them.
J. Peter Bruzzese is a six-time-awarded Microsoft MVP (currently for Office Servers and Services, previously for Exchange/Office 365). He is a technical speaker and author with more than a dozen books sold internationally. He's the co-founder of ClipTraining, the creator of ConversationalGeek.com, instructor on Exchange/Office 365 video content for Pluralsight, and a consultant for Mimecast and others.
Recently, there have been several payment industry initiatives designed to make electronic payments safer. Consequently, financial entities like merchants, PSPs, and consumers will soon face many changes. Although the initiatives’ premise − to eliminate vulnerabilities in the payments cycle − is welcome; businesses must now prepare to comply. Are you ready?
Join our CA Technologies Payment Security gurus, Product Management Advisor Jayakumar Krishnasamy and Presales Director Matt Berryman to find out:
• How to interpret the recent payment initiatives
• If risk-based authentication satisfies mandates
• Which strong authentication methods are compliant
Cybersecurity Skills Are in High Demand, Yet in Short Supply. The growing number of recent cybersecurity attacks highlights a shortage of skilled workforce in the cybersecurity industry, predicted to reach around 1.8 million workers by 2022. These challenges will also be impacted by evolution of IoT/ IoE and Artificial intelligence, which represents an unprecedented opportunity to connect people, processes, data, and things.
Key Takeaways include:
- Is Automation an answer to the skill gap?
- Maintaining security in the face of growing cyber risks and threats
- How the arrival of AI & IoT in both our personal and business lives will create a skills gap that will require both the retooling of people’s existing skillsets and the wide-scale hiring of new workers
This IDC Web Conference will feature data highlights from the inaugural IDC Worldwide Data Services for Hybrid Cloud Forecast. Every vertical industry is now seeing the impact of digital transformation (DX). In DX, data is core as every change and process relies on converting data into actionable insights. And the leading digital organizations are discovering that the cloud – in terms of its power to deliver agility and flexibility in data management and faster time to insights – is indispensable for achieving their DX business objectives.
IDC's Ritu Jyoti and Robert Westervelt will discuss the latest trends in hybrid/multicloud deployments, proliferation of application deployment models and data formats across hybrid IT, associated data management challenges, and how data services for hybrid cloud can help organizations gain a competitive edge and thrive in the DX era.
The Office of the Comptroller of the Currency (OCC) recently released its operating plan priorities for 2018. A top priority is change management to address new regulation requirements. Whether you’re a banker or service provider to the financial industry, you may be aware of updated or new regulations like the National Flood Insurance Reform Act of 1994, the Military Lending Act, and the Prepaid Card Rule. In this webinar, you’ll learn what OCC’s Compliance and Community Affairs (CCA) Department intends to focus on and the role of technology in managing compliance and risk.
Attendees will learn:
• What to consider when designing, operating or improving their change management process
• The increased focus on fair lending from a quantity and quality perspective
• Policies, procedures, and processes for credit offered under the Military Lending Act
• What CCA examiners are looking for with banks relying on third-party relationships
• How GRC technology supports compliance and integrated risk management programs
Don’t miss this future focused webinar on an OCC priority for 2018. Make plans now to attend.
Come and get educated by the leading FedRAMP Experts:
Juanita Koilpillai: Former CTO of one of the first FedRAMP Third Party Assessors (3PAOs)
Dr. Merrick Watchorn: FedRAMP High Security Control Baseline Team Lead, Cloud Computing Standards Roadmap, High Performance Computing Work Group
Aaron Bishop:Former CISO at SAIC, General Manager at National Security Group, Microsoft, CIO at ANSTEC
This session will cover FEDRAMP - the Government's complicated process for the protection of information assets. The difference between infrastructure and application security.The challenges & pitfalls in meeting the NIST framework for Federal Cloud adoption.
There are quite a few Docker security tools in the ecosystem; how do they compare?
Everyone starts with image vulnerability scanning, but that's just the beginning and usually stops where your CI/CD pipeline ends. That’s why we created this extensive list of 20 container and Docker specific security tools that can help keep containers secure in production. https://sysdig.com/blog/20-docker-security-tools/
We got lots of feedback and questions from many of you, so we decided to pick some of the most popular open source tools and commercial products, look at them in detail, and show them to you live in a webinar.
Join Knox and Jorge from the Sysdig Team, for a 1 hour session to run through:
-How to secure Docker containers and what are the best practices
-Why you need to both static and dynamic (run-time) scanning for your images
-What other container security measures and policies are necessary in production
Demo: Comparing and implementing docker security basics with the most popular container security tools
Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.
Join us for our webinar “Putting the Power of Proxy to Work” to learn how:
- Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud
- Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365
- A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization
Can you reach the full potential of the cloud using the tools provided by the cloud vendor? Take a closer look at the various tools built into the AWS (Amazon Web Services) platform, including advantages and shortcomings.
In this webinar attendees will learn:
-The strengths and weaknesses of AWS native tools.
-Understand the shortcomings of those tools to see where additional third-party tools are needed.
As the scope for security skill and expertise demanded of organizations extends, CISOs are increasingly turning to security consulting partners for strategic guidance and technical and advisory expertise.
There are a broad range of organizations in today’s market offering security consultancy services based on best practices and standard frameworks. Partnering with one of these firms can provide your organization with the technical expertise to improve network visibility and gain a clearer understanding of your vulnerabilities, provide the strategic and practical guidance that helps you prioritize and build out programs that enable business objectives, as well as advise on how to effectively engage with the C-suite.
What truly sets Secureworks’ information security consulting services apart is how we utilize our Counter Threat Unit™ and knowledge garnered from thousands of client engagements to ensure you are being consulted on the latest industry trends and threats. This way, the outcome is based on real-world scenarios that matter to your organization.
Join consultants across our technical and strategic practices as they share lessons learned from their most challenging engagements and the value that real-time threat intelligence has brought to those engagements.
Key topics discussed include:
• Examples of real-world engagements where the CTU™ and Consulting Practice improved the outcomes for clients
• Tools consultants use to ensure that your outcome is based on real-world scenarios and threats that matter to your organization
• Lessons learned from our most strategic and complex engagements
Cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employee training is tied as the third-most-effective method (higher than antivirus) of decreasing the cost of a data breach.*
Many IT pros know users are the weakest link in network security but don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization.
Join this 30-minute webinar “Counter the careless click, tools to help you train your users” where Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will provide a practical session with tips and free tools you can implement now to help you create your “human firewall”.
Erich will cover:
* Current threat landscape
* Top 5 tips for security awareness
* How to easily create your security awareness program
* Outlining how and where tools are helpful
* Based on recent research by the Ponemon Institute
As GDPR comes into effect May 2018, organizations are scrambling to reach compliance with its many requirements - particularly as they relate to the cloud. The regulation takes a comprehensive approach to guaranteeing that organizations protect EU citizen data, even after that data moves beyond the firewall via cloud and mobile. Fortunately, there are technology solutions that can address a breadth of GDPR-related concerns.
In this webinar, gain concrete, actionable advice on how your organization can ensure GDPR compliance with technologies like Cloud Access Security Brokers (CASBs).
Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
- CPE opportunities, member benefits and getting involved
- Updates on (ISC)² news, developments and changes in your region
- Your membership requirements summarized
- Who are the (ISC)² EMEA team and how we can help you
- Focus discussions
- Q&A session