Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Targeted Search on Live Remote Systems with AD Enterprise
    Targeted Search on Live Remote Systems with AD Enterprise Steve Sunday, Senior Sales Engineer, AccessData Recorded: Sep 21 2018 16 mins
    AD Enterprise 6.5 introduced new, enhanced targeted search capabilities on live remote systems. Come join us for a short introduction to the new ability. Use it to search and preview data including keywords, hash values, email, security events, etc. These capabilities can be used for any event from post-breach analysis and threat hunting, to searching for unauthorized data and file content.
  • Successful SuccessFactors® Data Migrations
    Successful SuccessFactors® Data Migrations Jan Wade & Nikkia Conley, American Airlines and Nate LaFerle BackOffice Associates Recorded: Sep 21 2018 44 mins
    Preparing your employee data for SuccessFactors® is more complex than you think. American Airlines tackled highly challenging transformations from multiple legacy systems and pre-merger organizations to bring a unified HR platform to life with SuccessFactors®.

    Join Jan Wade, Director, HR Information Systems and Nikkia Conley, Sr. Manager, HR Shared Services, of American Airlines; and Nate LaFerle, Client Partner at BackOffice Associates, as they discuss how they addressed key challenges along the way.
  • Claves en la estrategia de gestión datos para protección en puestos de trabajo
    Claves en la estrategia de gestión datos para protección en puestos de trabajo Ivan Abad - Director Técnico Iberia Recorded: Sep 21 2018 23 mins
    Hoy en día, la mayoría de las organizaciones ya tienen una comprensión práctica de cómo gestionar su centro de datos. Sin embargo, a menudo pasan por alto o deciden no enfocarse a los datos que residen en puestos de trabajo o repositorios de información.

    En este webinar, analizaremos cuáles son los impulsores del negocio y los desafíos técnicos asociados a la protección, gestión y control de los datos de usuario, con independencia de la ubicación de los mismos.

    Además te ayudaremos a contestar la pregunta: ¿es suficiente utilizar un servicio de intercambio de archivos en la nube?
  • Dans la foulée de Wannacry - nouvelles techniques & méthodes des cyber criminels
    Dans la foulée de Wannacry - nouvelles techniques & méthodes des cyber criminels Hervé Doreau, Directeur Technique, Symantec France Recorded: Sep 21 2018 37 mins
    Les cyber criminels continuent d'utiliser des méthodes éprouvées, en 'identifiant de nouveaux vecteurs d'infection pour augmenter le taux de réussite de leurs attaques ciblées. Dans la continuité de WannaCry, l'utilsation de vers connait un regain au sein des réseaux d'entreprise. Les vulnérabilités au niveau du poste de travail devenant néanmoins moins courantes, les attaquants doivent trouver de nouveaux vecteurs et plateformes d'infection : l'IoT est une option de plus en plus intéressante pour eux.

    Lors de ce webcast, vous en saurez plus sur :

    • la diversification des méthodes d'attaque vs leur profitabilité
    • les nouveaux modes de propagation, véritables casse-têtes pour les entreprises
    • les menaces IoT next-gen
    • les récentes campagnes d'attaques ciblées
  • Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture
    Staying Ahead of the Curve: Microservice & MDM Strategies for Agile Architecture Primitive Logic President Kevin Moos, Chief Architect Eric Greenfeder, Technical Director Steve Ernst Recorded: Sep 20 2018 40 mins
    In the race towards digital transformation, fueled by growing competitive pressures, enterprises need an architecture that responds quickly to escalating customer expectations — while also maintaining security and reliability.

    Join Primitive Logic to discover why your EA roadmap must begin with your business priorities … and how microservice architectures and master data management (MDM) strategies can help you achieve your objectives.

    You’ll learn:
    - How to build a secure EA roadmap grounded in your business priorities
    - How microservices let you move quickly in keeping up with customer expectations
    - How MDM helps you deliver the insights businesses need to make data-driven decisions
  • Data Breaches under GDPR - What you need to know
    Data Breaches under GDPR - What you need to know Marc French, Chief Trust Officer and Data Protection Officer, Mimecast Recorded: Sep 20 2018 22 mins
    Whether you're just starting your compliance journey or feel your house is in order, there's still much to learn and understand about GDPR.

    In this video interview, Mimecast Chief Trust Officer and Data Protection Officer (DPO) Marc French explores issues related to data privacy and breach compliance and how requirements under GDPR impact processes and procedures for organizations across the globe.

    Topics explored include:

    * How aspects of GDPR including data breach notifications and the right to be forgotten actually work

    * The role of the Data Protection Officer under GDPR and their responsibilities

    * What your vendors can do to ease pressures related to organizational GDPR compliance
  • Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond
    Executive Insights: Inner Workings of Ransomware and Ways to Detect and Respond Dinah Davis, VP Research & Development - Arctic Wolf Networks Recorded: Sep 20 2018 38 mins
    Last year was all about large Ransomware hacks like WannaCry, Petya/NotPetya, and CRYPSHED to name a few. These various strains of Ransomware can bypass your perimeter controls and infect your critical systems, bringing your business to a grinding halt.

    However, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. So, what are your options?

    In this webinar Dinah Davis, VP of Research & Development, at Arctic Wolf Networks, will share her key insights on a ransomware cyber kill chain from delivery, infection to command and control activity, and walk you through the following:

    - What happens when a ransomware is exploded in a computer, with a demo
    - How do you detect and respond to a ransomware attack?
    - What is coming next in the world of ransomware?

    To discover how to fortify your network with 24/7 monitoring with managed detection and response, register for our upcoming webinar.
  • Legacy IT Evolves: How Cloud Choices like Microsoft Azure Can Conquer the VMware
    Legacy IT Evolves: How Cloud Choices like Microsoft Azure Can Conquer the VMware David Linthicum, C.C.S.O. ,Deloitte - Tim Crawford, CIO, AVOA - David Grimes, V.P. of Engineering, Navisite Recorded: Sep 20 2018 58 mins
    Can organizations gain a future-proof path to hybrid computing that simplifies architecture and makes the most total economic sense?

    Watch this webcast panel discussion which addresses these pressing issues with guests David Linthicum, Chief Cloud Strategy Officer at Deloitte Consulting; Tim Crawford, CIO Strategic Advisor at AVOA; and David Grimes, Vice President of Engineering at Navisite, moderated by Dana Gardner, Principal Analyst at Interarbor Solutions.

    The panel explored the likely evolution of IT platforms from a VMware legacy, and reviewed how cloud providers like Microsoft Azure are addressing hybrid cloud models. The discussion provided a great primer to help IT leaders define the right tradeoffs and best rationale for making the strategic decisions key to your organization’s digital transformation.

    Focused on hybrid cloud technology, managed cloud services, VMware, and Microsoft Azure, experts shared:
    •Major issues organizations must grapple with as they face a crossroads on their infrastructure's future
    •Best metrics for success, defining the right factors for major decisions, and how to execute well
    •Best options for leading adopters as they invest in life after VMware ESX
    •Key benefits of moving to Azure versus AWS and other public cloud providers

    Sign up today to hear a great discussion and learn best practices from industry experts.
  • A Zero Trust Approach to Decoupling Intent from Implementation
    A Zero Trust Approach to Decoupling Intent from Implementation Chase Cunningham, Principal Analyst, Risk & Security, Forrester and Matt Dean, Vice President, Product Strategy, FireMon Recorded: Sep 20 2018 60 mins
    Adopting a Zero Trust model means taking the first steps to redesigning your network in order to strengthen data security, detection, and response.

    In such an ecosystem, it can no longer be about just writing security rules. Instead, enterprises must adopt a method of security intent and separate that desired goal of security from the specific implementation.

    This hierarchy allows you to set a single global policy that’s applied to any network resource with all its defining attributes – regardless of mutations in the network.

    At the same time, you can reduce the number of access requests that need to be managed manually and automatically ensure real-time compliance. And even more, business intent can be fully in line with security policy controlled at speed and scale.

    At most hybrid enterprises right now, these aren't realities -- but they can be, and that's where network security is headed.

    Join our guest, Forrester's Chase Cunningham, with FireMon's Vice President, Product Strategy at FireMon, Matt Dean for a look at the future of network security, which will ultimately enable each business team to fully own their security policies.
  • GDPR Compliance for Contact Centers: Using PCI DSS as a Proven Framework
    GDPR Compliance for Contact Centers: Using PCI DSS as a Proven Framework Jay Trinckes, Principal Security Consultant for Risk Management & Governance, NCC; Aaron Lumnah, Semafone Recorded: Sep 20 2018 47 mins
    On May 25, 2018, the European Union's General Data Protection Regulation (GDPR) went into effect, becoming the world's strictest and most comprehensive data protection legislation. Companies around the world, regardless of whether they are physically located within EU borders, had to meet compliance requirements if they process the data of EU citizens, creating a huge headache for any organization running a call or contact center.

    For contact centers that have troves of sensitive customer information, GDPR compliance can easily become a massive undertaking. However, using preexisting tried-and-true frameworks like the PCI DSS, companies can relieve the burden of meeting compliance obligations.

    Join Semafone and NCC for this informative session, where you'll learn:
    - How to achieve GDPR compliance in your call or contact center
    - How to use existing data security frameworks like the PCI DSS to simplify compliance efforts
    - How to improve data security inside your contact center while enabling a more seamless customer experience

    Additionally, registrants will receive a free copy of Semafone's GDPR Guide for Contact Centers.

    Reserve your space now!

    About Jay Trinckes:

    John ‘Jay’ Trinckes, Jr., CISSP, CISM, CRISC, HITRUST CSF Practitioner leads NCC Group’s healthcare practice by assisting clients in managing their IT risk to ensure they are not subject to cyber-attack along with helping them validate their compliance with IT regulations such as HIPAA. Jay is the author of three books, “How Healthcare Data Privacy Is Almost Dead…and What Can Be Done to Revive It! (2017), "The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules" (2012), and "The Executive MBA in Information Security" (2009), and has a wide range of experience in computer networks, vulnerability and penetration testing, security, compliance, and risk assessment.
  • Ace the Audit with Total Compliance
    Ace the Audit with Total Compliance Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Sep 20 2018 24 mins
    Total Compliance is the newest CloudCheckr module, and it’s free for all of our Security customers. It has three main functions. First, it automatically and continuously monitors your infrastructure for compliance with 35 different standards, such as HIPAA, PCI DSS, CIS, NIST, SOC2 and more. Second, if a problem is found, our software can often fix the issue for you upon your command, or automatically, thanks to Self-Healing Automation. Third, it provides a detailed log for third-party auditors with historical details and remediation notes.

    Attendees will learn the in’s and out’s of this new, valuable feature, with the added advantage of asking questions along the way. Join our experts and find out how Total Compliance can advance your organization.

    Attendees will learn:
    - Best Practice Checks
    - *New* Total Compliance module
    - Automated “Fix Now” capabilities that can save time and effort
    - Leverage Change Monitoring and Logs to Ace the Audit!
  • DDoS Attack and Bot Protection: Defending your Applications
    DDoS Attack and Bot Protection: Defending your Applications Chad Lavoie, Senior Support Engineer Recorded: Sep 20 2018 52 mins
    We read about DDoS attacks and bot threats causing companies millions in lost revenues and battered reputations almost every day. By leveraging an extremely efficient and innovative design, including extensive ACL and Stick Table tracking systems, HAProxy Enterprise Edition is able to perform the real time behavioral analysis that mitigating today’s threats demands. Rather than being caught off guard, join this webinar to see how you can use HAProxy Enterprise Edition to create an effective, high performance threat protection solution.

    In this webinar we will present how to:

    •Protect against application-based DDoS attacks such as HTTP request flooding
    •Protect against bot threats such as web scraping, brute forcing, and vulnerability scanning
    •Implement an advanced threat response policy with Antibot and Google reCAPTCHA
    •Implement cluster wide threat protection with a Stick Table Aggregator
    •Enhance bot threat protection with WAF and Fingerprint modules
    •Dynamically maintain cluster wide whitelists and blacklists
    •Monitor threat protection status
  • Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7
    Detect Unplanned Changes & Create Security Incidents in ServiceNow® with Gen7 NNT Recorded: Sep 20 2018 4 mins
    For the first time ever, ServiceNow customers are able to reconcile changes that occur with the IT environment with the actual changes approved in ServiceNow.

    NNT has integrated its award-winning Change Tracker Gen7™ with ServiceNow's service management tool to enable a closed-loop environment for change management. This integration provides zero tolerance to changes –leaving no place to hide for unwanted changes or breach activity. To further help reduce change noise, NNT Change Tracker leverages the worlds largest whitelisting service to automatically analyze changes in real-time using NNT's File Assured Safe Technology (FAST).

    See how NNT Change Tracker Gen 7 ™ delivers "closed loop" SecureOps, reconciling all actual changes made with ServiceNow® change requests.
  • OpenDemo: Network Automation with Ansible
    OpenDemo: Network Automation with Ansible Eric McLeroy, Senior Solution Architect, Red Hat Recorded: Sep 20 2018 56 mins
    Ansible's simple automation framework means that previously isolated network administrators can finally speak the same language of automation as the rest of the IT organization, extending the capabilities of Ansible to include native support for both legacy and open network infrastructure devices. Network devices and systems can now be included in an organization's overall automation strategy for a holistic approach to application workload management.
    The original airdate of this demo was Sept. 18.
  • Securing AWS Fargate from Build to Runtime
    Securing AWS Fargate from Build to Runtime Kevin Lewis, Principal Solution Architect, Twistlock Recorded: Sep 20 2018 24 mins
    Since the announcement of AWS Fargate at AWS re:Invent 2018, enterprises have been working with their development and devops teams to explore how this new technology aligns with their application modernization strategy. With this new CaaS platform comes new operational concerns and security threats.

    Join Principal Solution Architect Kevin Lewis to learn more about:
    • How enterprises are beginning to leverage AWS Fargate
    • Potential risk and security concerns from this emerging paradigm
    • Different security approaches and how Twistlock looks to provide runtime protection for applications using Fargate
  • Keys of Success to Full Lifecycle API Management
    Keys of Success to Full Lifecycle API Management Chirag, Sr. Director, Product Management at MuleSoft and Sanjna Verma, Manager, Product Marketing at MuleSoft Recorded: Sep 20 2018 52 mins
    One emerging API best practice involves treating APIs like products. Similar to products, APIs should be designed with a specific purpose and teams should also deliver APIs using a Software Development Lifecycle (SDLC) framework. Join us for this webinar to get a walkthrough of Anypoint Platform's capabilities, and learn how the platform addresses the full API lifecycle––from design and implementation to security and governance of APIs.
  • Technical Education Series: Further Securing the SaaS Model
    Technical Education Series: Further Securing the SaaS Model Hari Nanda, Sr. Systems Engineer, Symantec Recorded: Sep 20 2018 59 mins
    In this webinar you will learn how to utilize and configure Symantec’s CoudSOC service to protect access to an Office 365 SaaS environment.
  • CIO Insights: Bridging Security Gaps with a Risk-based Approach
    CIO Insights: Bridging Security Gaps with a Risk-based Approach Julie Cullivan, CIO & Sr. VP Business Ops, ForeScout; Nir Gertner, Chief Security Strategist, CyberArk Recorded: Sep 20 2018 49 mins
    Embedding security into business processes and employee awareness, particularly outside of information security teams, can be especially challenging. Yet security operations is vital to protecting the health, safety and intellectual property of any organization and therefore cannot operate in a silo. Learn how to apply a risk-based approach that leverages continuous visibility of devices and privileged accounts on heterogenous networks to enhance organizational trust and business success.

    Speakers:
    Julie Cullivan, Chief Information Officer and Senior Vice President, Business Operations, ForeScout
    Nir Gertner, Chief Security Strategist, CyberArk
  • What Keeps a Bank's CFO Up at Night
    What Keeps a Bank's CFO Up at Night Leif Easterson, former CFO, Information Security and Risk Management, Citigroup Recorded: Sep 20 2018 56 mins
    Fraudsters are ever-evolving and constantly discovering new methods of stealing money from institutions worldwide. The drive to digital transformation is providing new opportunities for fraudsters to exploit businesses and consumers remotely. The losses from cybercrime continue to rise year-after-year with the number of cyber incidents targeting businesses nearly doubling between 2016 and 2017 according to the Online Trust Alliance. 2018 is not showing any reduction in these trends.

    How should businesses balance risk against Information Security costs and investments? What is the true ROI of fraud investments? Join us as Leif Easterson, former CFO, Information Security and Risk Management at Citigroup, examines these issues and more. Using experience from his days at Citigroup, where these were challenges that he faced on a daily basis, Leif will examine the true cost of fraud to financial institutions - both the actual fraud and the operational costs associated with fraud and risk managements. Additionally, BioCatch will be unveiling a new ROI calculator to help companies determine what the impact of next generation solutions like behavioral biometrics to the bottom line.
  • Data Breach: How to Identify the Early Signs
    Data Breach: How to Identify the Early Signs Shiri Margel - Machine Learning Research Manager at Imperva Recorded: Sep 20 2018 40 mins
    With the escalating threat landscape and the exponential growth of data and users, it’s no longer about whether you’ll get breached; it’s about when. The ideal situation would be to detect a data breach at an early stage. The reason why early breach detection is more practical is that often times bad actors are already inside the organization, abusing legitimate permissions to access sensitive data. To quickly detect a potential data breach, we need to be able to identify “early signs” of a breach.

    Join this webinar to learn more about:

    - The challenges of detecting data breaches
    - Why early breach detection is a more practical goal
    - Introducing the data breach kill chain
    - Protecting data in your databases – the importance of defense in depth
  • How to Easily Integrate Security into your Development Process
    How to Easily Integrate Security into your Development Process Marina Kvitnitsky (Senior Product Manager, CA Veracode) & Val Zolyak (Director, Product Management, CA Agile Central) Recorded: Sep 20 2018 29 mins
    Software development deadlines are getting shorter, business requirements are getting more complex, and cybersecurity threats are becoming more real. CA Veracode is responding to this need for rapid development of secure applications by integrating security solutions directly into application development workflows. Specifically, we make our security scanning solutions available from within customer-selected, industry-leading software development tools, such as CA Agile Central. In this webinar, we will discuss why integrating security into your development pipeline is a necessity in todays ever-changing threat landscape and how different stakeholders can benefit from automating security checks. Finally, we will demonstrate the functionality of the integration between CA Agile Central and CA Veracode and outline how easy it is to implement this integration.
  • Evasions: A Growing Threat for Government Networks
    Evasions: A Growing Threat for Government Networks Opi Niemi, Senior Research Director & Michael Knapp, Director of Network Security Sales Engineers at Forcepoint Recorded: Sep 20 2018 40 mins
    Network protocol normalization and reassembly is the basis of traffic inspection performed by next generation firewalls (NGFW) and intrusion prevention systems (IPS). But even common network protocols are complex, with multiple possible interpretations for the same traffic sequence.

    In this webinar, learn how targeted protocol stack fuzzing can be used for automated discovery of traffic normalization errors. Attackers can use these errors to evade detection, bypass security devices, and allow exploits and malware (including aggressive ransomware attacks like WannaCry) into your network undetected. We will demonstrate how many up-to-date security devices still have vulnerabilities to basic evasive techniques and how to test your solution’s efficacy.

    Specific topics include:

    - A brief introduction to evasion vulnerabilities
    - Forcepoint’s approach of targeted protocol fuzzing to automatically discover evasions
    - Applying evasion to attack to demonstrate efficacy
    - A demo of attackers’ methods to evade detection and bypass NGFW and IPS devices
  • Legacy IT Evolves: How Cloud Choices like Microsoft Azure Can Conquer the VMware
    Legacy IT Evolves: How Cloud Choices like Microsoft Azure Can Conquer the VMware David Linthicum, C.C.S.O. ,Deloitte - Tim Crawford, CIO, AVOA - David Grimes, V.P. of Engineering, Navisite Recorded: Sep 20 2018 58 mins
    Can organizations gain a future-proof path to hybrid computing that simplifies architecture and makes the most total economic sense?

    Watch this webcast panel discussion which addresses these pressing issues with guests David Linthicum, Chief Cloud Strategy Officer at Deloitte Consulting; Tim Crawford, CIO Strategic Advisor at AVOA; and David Grimes, Vice President of Engineering at Navisite, moderated by Dana Gardner, Principal Analyst at Interarbor Solutions.

    The panel explored the likely evolution of IT platforms from a VMware legacy, and reviewed how cloud providers like Microsoft Azure are addressing hybrid cloud models. The discussion provided a great primer to help IT leaders define the right tradeoffs and best rationale for making the strategic decisions key to your organization’s digital transformation.

    Focused on hybrid cloud technology, managed cloud services, VMware, and Microsoft Azure, experts shared:

    •Major issues organizations must grapple with as they face a crossroads on their infrastructure's future
    •Best metrics for success, defining the right factors for major decisions, and how to execute well
    •Best options for leading adopters as they invest in life after VMware ESX
    •Key benefits of moving to Azure versus AWS and other public cloud providers

    Sign up today to hear a great discussion and learn best practices from industry experts.
  • GDPR Comes to America (CCPA) — Be Prepared
    GDPR Comes to America (CCPA) — Be Prepared Kevin Moos, President of Primitive Logic; Ian Rowlands, Director of Product Marketing, ASG Recorded: Sep 20 2018 52 mins
    The State of California recently passed the strictest data privacy law in the United States: the California Consumer Privacy Act of 2018 (CCPA). The new law grants California residents a broad array of rights related to their personal information and requires companies to rethink their entire approach to capturing, storing, and sharing personal data.

    Join Kevin Moos, President of Primitive Logic and Ian Rowlands, Director of Product Marketing, ASG, to learn:
    • How this regulation affects your company, regardless of where you’re located
    • What you need to do now to get ready for CCPA’s deadline of January 2020
    • If you’re ready for GDPR, do you have to do anything more for CCPA?
    • Useful tools and technologies to help you meet the new law’s requirements
    • How you can turn CCPA readiness into a benefit (not just a cost)
  • What is a Secure Enterprise Architecture Roadmap?
    What is a Secure Enterprise Architecture Roadmap? Juanita Koilpillai, Bob Flores, Mark Rasch, Ulf Mattsson, David Morris Recorded: Sep 20 2018 69 mins
    This session will cover the following topics:

    * What is a Secure Enterprise Architecture roadmap (SEA)?
    * Are there different Roadmaps for different industries?
    * How does compliance fit in with a SEA?
    * Does blockchain, GDPR, Cloud, and IoT conflict with compliance regulations complicating your SEA?
    * How will quantum computing impact SEA roadmap?
  • CISSP Exam Prep Clinic #4: Pass the CISSP the 1st Time - Best Answer Selection
    CISSP Exam Prep Clinic #4: Pass the CISSP the 1st Time - Best Answer Selection Mission Critical Institute Sep 22 2018 3:15 pm UTC 45 mins
    Learn how to analyze exam answer choices so you can select the best answers.

    In Clinic #4, you will learn tactics for analyzing the answer choices and then selecting the “best answer”. Often there is no “right” answer and you need to eliminate the less likely answers.

    If you want to pass your CISSP Exam the first time, you’ll want to attend and then review this series of five live online CISSP Exam Prep Clinics. In these five valuable CISSP exam clinics you will learn about:

    • The new CISSP exam format, the “adaptive exam format”
    • How hands-on labs will help you prepare for your exam
    • Tactics to select the best answer for each question
    • How to get your employment endorsement and what happens if you need more experience

    These five Clinics include tips for all 8 CISSP domains covered in the exam.

    Register today and move closer to your goal!

    SPONSORED BY: Mission Critical Institute
  • What is the EU NIS Directive… and how can a Security Operating Platform help?
    What is the EU NIS Directive… and how can a Security Operating Platform help? Danielle Kriz, Senior Director Global Policy, Palo Alto Networks & Greg Day, VP & CSO EMEA, Palo Alto Networks Sep 24 2018 8:00 am UTC 45 mins
    The NIS Directive calls for technical and organisational security measures with regard to the state of the art and appropriate measures to prevent and minimise the impact of incidents. Legacy security systems made up of cobbled-together point products have proven inadequate to provide the level of visibility and control required to prevent the rising volume and sophistication of cyberattacks.

    In this webinar Danielle Kriz, Senior Director Global Policy, and Greg Day, VP & CSO EMEA, discuss how the Palo Alto Networks® Security Operating Platform can help organisations along their road to compliance. The Security Operating Platform prevents successful cyberattacks through data-driven automation and takes advantage of precise analytics to streamline routine tasks so that security teams can focus on the threats that really matter. Visibility into all traffic, classified by application, user and content, provides the context to enforce dynamic security policy to prevent known and unknown threats throughout the attack lifecycle.
  • Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY
    Symantec CASB - Cloud Access Security Broker (CASB) - CLOUD SECURITY Martin Krömer, Regional Director CEEUR Cloud Security, Symantec (Deutschland) GmbH Sep 24 2018 12:00 pm UTC 75 mins
    Nutzen Sie Cloud-Anwendungen und -Services auf sichere Weise, während Ihr Unternehmen dabei sicher, geschützt und richtlinienkonform bleibt.
    Erhalten Sie Einblick in die Schatten-IT, Kontrolle über Ihre Daten in Cloud-Anwendungen sowie Schutz vor Bedrohungen, die auf Cloud-Benutzerkonten abzielen – mit der Lösung, die Forrester als "Leader" im Bereich Cloud Security Gateways bezeichnet.
  • Las nuevas formas de propagación de amenazas causan estragos a las empresas
    Las nuevas formas de propagación de amenazas causan estragos a las empresas Ramses Gallego, Strategist, Symantec Sep 24 2018 12:00 pm UTC 60 mins
    Los nuevos métodos de la propagación de amenazas que están causando dolores de cabeza a las organizaciones

    Los cibercriminales y los grupos de ataques dirigidos continúan aprovechando los métodos actuales e identificando nuevos canales de infección para llevar a cabo su cometido. Siguiendo los pasos de WannaCry, los Worms están experimentando un resurgimiento y se están extendiendo con agresividad en las redes corporativas. Por otra parte, a medida que los equipos de oficina son cada vez más escasos, los atacantes necesitan buscar nuevos canales y plataformas de infección, como por ejemplo el IoT, que cada vez resulta ser una opción más tentadora.

    En este seminario web descubrirá:
    • Cómo se están diversificando los cibercriminales para seguir generando beneficios.
    • Los nuevos métodos de la propagación de amenazas que están causando dolores de cabeza a las organizaciones.
    • La nueva generación de las amenazas contra el IoT.
    • Las campañas de ataques dirigidos más recientes.
  • Leveraging the Power of the Cloud to Protect VMware Data
    Leveraging the Power of the Cloud to Protect VMware Data Steven Hill Senior Research Analyst, 451 Research Sep 24 2018 2:00 pm UTC 60 mins
    Please join us for this interactive webinar with a special guest speaker Steven Hill, Senior Analyst at 451 Research, where we discuss:
    - Virtualization and cloud adoption trends, usage and business drivers
    Data protection and instant disaster recovery for VMware workloads on-premises and in the cloud
    - How a unified data protection solution can help decrease costs, by reducing both hardware and complexity
    - Other benefits of direct integration with vSphere & VMC (VMware Cloud on AWS)
  • Data Security in the Cloud, with Ivionics and SkOUT Secure Intelligence
    Data Security in the Cloud, with Ivionics and SkOUT Secure Intelligence Lee Noriega, SkOUT Co-Founder and Cyber Strategist; Pierre Radecki, Ivionics Director of Service Delivery Sep 24 2018 3:00 pm UTC 45 mins
    This webinar will touch on the critical and emerging threats in the cloud that organizations a struggling to manage. Join experts from Ivionics and SkOUT, featuring former government hacker and cyber strategist Lee Noriega and Ivionics Director of Service Delivery Pierre Radecki.

    Pierre is responsible for overseeing the design, implementation, and support of all IT solutions, as well as establishing and refining processes to ensure consistent delivery of the highest level of customer service. He oversees the employees involved in the delivery process and assesses client feedback to develop quality improvement processes.

    Pierre has been designing and implementing networking hardware and software solutions for the legal market in New York, Florida, North Carolina, and Washington DC. Pierre has authored several articles, and been a featured speaker and participant on panel discussions for industry events nationally.
  • Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten
    Managed Defense – Schützt auch vor gut getarnten Hackeraktivitäten Florian Siebert, Senior Systems Engineer, Global Services & Intelligence Sep 25 2018 8:00 am UTC 60 mins
    FireEye Managed Defense greift auf langjährige Erfahrung aus unseren Mandiant Incident Response Einsätzen zurück: wir nutzen die Daten und Erkenntnisse aus der Abwehr realer Angriffe, um Bedrohungen schneller zu erkennen und abzuwehren. Dadurch können wir Ihnen einen unternehmensweiten Überblick von Bedrohungen in Ihrem Netzwerk in Echtzeit geben und die Fähigkeit Ihres bestehendes CERT, Security Operation Center oder Sicherheitsteams ergänzen oder erweitern.
  • How to create the self belief and self confidence to sell brilliantly
    How to create the self belief and self confidence to sell brilliantly Leigh Ashton Sep 25 2018 10:00 am UTC 30 mins
    Key Takeaways:

    This webinar is for you if you struggle with sales or specific sales activities and will open the door to understanding how you get in your own way of sales success...and how to develop a winning sales mindset that attracts success!

    Reasons to Attend:

    -Discover how your thoughts impact on your sales results
    -Learn how to identify your inner barriers...and how to eliminate them
    -Create your personal way of generating consistently great sales

    Many people feel uncomfortable selling. Part of it is to do with rejection – people saying “no” to you.

    Another part of it is to do with ethics – we don't want to be seen to be taking people's money!

    However, selling is not what it used to be.

    You can only succeed – in the long term - if you give value and help customers.
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis? Mark Elwood, Marketing Director, TeleWare Sep 25 2018 10:00 am UTC 60 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • Consistent, Repeatable, Powerful NUIX 7.6 enhances ediscovery and investigations
    Consistent, Repeatable, Powerful NUIX 7.6 enhances ediscovery and investigations Dr Nicholas Sharples Sep 25 2018 10:00 am UTC 45 mins
    Our latest release is designed to give eDiscovery professionals, legal operations, lawyers, investigators, information governance professionals, and law enforcement additional freedom and functionality to automate and simplify their workflows. Users will find it easier to add, organize, and share information within and across cases, incorporate social media into investigations, and load and process files with additional data inputs, bulk load capabilities, and workflow templates.
  • Uncovering the Power of Box Governance
    Uncovering the Power of Box Governance Eleonore Hebrard - Box Implementation Consultant & Frederico Costa - Box Customer Success Manager  Sep 25 2018 1:00 pm UTC 45 mins
    Get your Box Governance package set up and deployed with the Customer Success Team. 

    It has now been 6 months since GDPR has been adopted in the EU and as a Box Governance customer, we want to ensure you deploy and get value out of our legal and compliance solution. 

    Companies and institutions like Metropolitan Police, General Electrics and AstraZeneca have already entrusted their content to Box Governance. 
    We want to show you how you can be on top of your Industry Legal and Compliance standards by providing you a hands-on webinar "Uncovering the power of Box Governance", hosted by a member of our Box Consulting Team. 

    Agenda:
    Use cases for Legal hold, Security Classification, Retention Management.
    Checklist for successful deployment at scale
    Questions and Next Steps
  • Increase Performance with KPIs for Security Operations and Incident Response
    Increase Performance with KPIs for Security Operations and Incident Response John Moran, Senior Product Manager at DFLabs,and Mike Fowler, CISSP, Vice President of Professional Services at DFLabs Sep 25 2018 3:00 pm UTC 51 mins
    Security operations KPIs vary from organization to organization. To be effective, it is crucial that KPIs are selected based on the SMART criteria.

    KPIs provide the critical information required to make fact-based decisions. However, tracking too many KPIs can become a burden to analysts.

    Join our new webinar to discover the best practices for Key Performance Indicators (KPIs) for Security Operations and Incident Response.

    Key takeaways:
    - Why are KPIs important?
    - How to choose the best KPIs?
    - How many KPIs are appropriate to measure?
  • Threat Hunter: Implications of an Active Cyber Defense
    Threat Hunter: Implications of an Active Cyber Defense Griff James (Damrod Analysis) | Wyatt Hoffman (CEIP) | Will Lymer (Loki Labs) | Philip Thomas (Reed Smith) Sep 25 2018 5:00 pm UTC 62 mins
    It is beyond the ability or willingness of the world’s governments to protect and secure information technology. What role then can the private sector play in making cyberspace safer? Can private enterprises do anything to strike back at attackers, curtailing their freedom of action and raising the costs of malicious activity?

    Consisting of academics and industry experts, this panel will explore the potential for active cyber defence to impede and deter malicious activity and the conditions under which it could be conducted responsibly.

    Speakers:
    - Griff James, Director at Damrod Analysis
    - Wyatt Hoffman, Research Analyst, Cyber Policy Initiative at Carnegie Endowment for International Peace
    - Will Lymer, Chief Growth Officer at Loki Labs
  • Pacific Dental Cloud Migration Strategy on AWS
    Pacific Dental Cloud Migration Strategy on AWS Nemi George, Sr Director, Information Security & Service Operations, Pacific Dental Services & Thomas Robinson, AWS Solutions Sep 25 2018 5:00 pm UTC 57 mins
    Pacific Dental Service (PDS) is one of the country’s leading dental support organizations, providing supported autonomy to more than 630 dental practices. As a support services provider in the healthcare space, PDS is subject to HIPAA and other regulations, which plays a vital role in their journey to the AWS cloud.

    Join us on September 25th as Nemi George, Sr. Director of Information Security and Service Operations at PDS, walks us through the AWS cloud journey: the required planning, timing, best practices, and their experience to-date. Plus, how Cavirin’s CyberPosture intelligence continues to strengthen Pacific Dental’s security posture and meet compliance regulations.

    Then we are lucky to have Thomas Robinson, Solution Architect for AWS look at the shared responsibility model, validating AWS responsibilities, and the tools available for building HIPAA workloads and maintaining compliance. Topics include AWS CloudTrail and Lambda Functions.

    If you are considering migrating to the cloud, this is a must-see event.
  • The Complete Guide to Responsible Disclosure Programs
    The Complete Guide to Responsible Disclosure Programs Rajesh Krishnan, Product Marketing, Synack. Sep 25 2018 5:00 pm UTC 60 mins
    To beat criminal hackers, it helps to have ethical ones on your side. Responsible Disclosure Programs - where companies invite suspected security vulnerability reports from the public - have been on the rise in the past few years. Should your company consider Responsible Disclosure? Learn more about the ins and outs of these types of programs and how they can differ in the level of liability and management incurred. Technical. Social, Legal, and other indicators will all be raised.
  • Creating a California Consumer Privacy Act Action Plan
    Creating a California Consumer Privacy Act Action Plan Tom Mighell, Esq., VP of Delivery Services and Greg Forest, CTO, Contoural Sep 25 2018 6:00 pm UTC 60 mins
    The California Consumer Privacy Act (CCPA) will go into effect on January 1, 2020, providing a relatively short window for companies to prepare. While final details of the CCPA need to be sorted out by the CA Legislature, enough is known to start preparing now. Join Tom Mighell, Esq. and Greg Forest as they present a CCPA Action Plan: what specific steps you need to take to get ready.

    Topics include:
    • Key steps in getting ready for CCPA, including policies, processes, technology and training
    • If you are already GDPR compliant, what you can and can’t leverage to comply with CCPA
    • What areas can be addressed today, even though the rules may change
    • What areas you should wait for until the law is finalized

    Join us for a lively discussion!
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Sep 25 2018 6:00 pm UTC 45 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Software-Defined Wide Area Network (SD-WAN) 1.0 Group Test Results webinar
    Software-Defined Wide Area Network (SD-WAN) 1.0 Group Test Results webinar Phuong Nguyen, Director, Product Marketing, NSS Labs & Bhaarath Venkateswaran, Director, Product Management, NSS Labs Sep 25 2018 6:00 pm UTC 75 mins
    The software-defined wide area network (SD-WAN) has gained wide adoption in the past few years. In a recent NSS Labs survey, 82.2% of the survey respondents indicated that their organization has already adopted SD-WAN technology. These products provide robust control, and optimization which makes them a compelling alternative to traditional WAN products.

    In this groundbreaking inaugural test, nine of the industry’s leading SD-WAN products were examined to help enterprises understand the merits of products in the market and identify the capabilities best suited to meet their use case requirements.

    Tune in to our webinar to learn how each of the participating vendors scored!
  • After the incident: investigating and responding to a data breach
    After the incident: investigating and responding to a data breach EDRM and AccessData Sep 25 2018 6:00 pm UTC 60 mins
    Frequent news of high-profile data breaches at companies like Equifax, Target, Yahoo and more are proof that it’s no longer a matter of if, but when, the next company will make headlines for having personal customer data exposed, their brand and reputation left in ruins. Will your company or client be the next victim?

    During this webinar, panelists will discuss where to begin after the breach―from the initial identification and investigation, through reporting findings and learning from the incident. We’ll discuss the important role of legal throughout the process, and how legal and IT/Security teams must effectively collaborate to ensure a successful investigation.
  • Manage Oracle e-Biz Suite Cost & Growth with Micro Focus Structured Data Manager
    Manage Oracle e-Biz Suite Cost & Growth with Micro Focus Structured Data Manager Eric Popiel and Luis M Burgos, Micro Focus Sep 25 2018 6:30 pm UTC 60 mins
    Organizations that use Oracle e-Business Suite often find that they have waited too long to implement archiving and data management strategies for their application databases. This reactive approach can be much more costly and difficult to implement when your business begins to experience issues. With the right data management strategy in your Oracle environment, you gain benefits in a range of areas, including application performance, long-term compliance, manageability, and infrastructure costs.

    Micro Focus Structured Data Manager software, with its ‘ready-to-run’ modules, for Oracle e-Business Suite, manages production and related non-production databases that support the Oracle e-Business Suite environment. This allows you to gain the right data management strategy to make sure that your business can remain responsive, while keeping costs under control and meeting data retention and compliance requirements.

    Structured Data Manager helps you:
    ● Archive and manage your Oracle e-Business Suite database and reduce its size
    ● Discover and mask/encrypt sensitive data for GDPR & CCPA compliance and test data management
    ● Manage the lifecycle of your data and comply to privacy laws

    Join this live webcast to understand how your organization can enhance your Oracle e-Busi­ness Suite environment with Micro Focus Structured Data Manager.
  • Unternehmen müssen sich vor einer Reihe neuer Angriffsvektoren schützen
    Unternehmen müssen sich vor einer Reihe neuer Angriffsvektoren schützen Andre Engel and Lars Kroll Symantec Sep 26 2018 9:00 am UTC 60 mins
    Cyberkriminelle und professionelle Angreifer investieren viel Zeit und Mühe, um neue Angriffspunkte zu identifizieren und bestehende Attacken zu perfektionieren. Seit WannaCry feiern zum Beispiel Würmer ein Revival – und breiten sich immer öfter aggressiv in Unternehmensnetzen aus. Da die Zahl der Schwachstellen auf Desktop-PCs stetig abnimmt, suchen die Angreifer verstärkt nach neuen Kanälen und Plattformen, um Systeme zu infizieren – und entscheiden sich zunehmend für IoT-basierte Tools.

    In diesem Webinar erfahren Sie:
    • Mit welchen neuen Angriffsformen sich Cyberkriminelle heute bereichern
    • Vor welchen neuen Angriffsvektoren sich Unternehmen schützen müssen
    • Welche Gefahren in IoT-Umgebungen drohen
    • Welchen gezielten Angriffen Unternehmen jüngst ausgesetzt waren
  • Solution de data privacy dans un contexte GDPR
    Solution de data privacy dans un contexte GDPR Carine Lecadre Perrier, Head of Compliance, Partech avec Sebastien Cognet & Leonardo L’ecaros, Privitar Sep 26 2018 11:00 am UTC 45 mins
    Comment renforcer la confidentialité des données dans un contexte de risque et de nouvelles obligations?

    Privitar est une plateforme logicielle centrale de gouvernance de la confidentialité des données permettant non seulement de répondre à certains enjeux de la GDPR mais également d’avoir une approche fonctionnelle de “Privacy by Design” sur des cas d’usage précis. La plateforme Publisher vous permet de livrer à la demande ou en streaming des jeux de données anonymisées par des techniques de masquage, de perturbation ou de généralisation tout en conservant l’intégrité de vos données sensibles. Il est également possible d’insérer des filigranes invisibles afin d’auditer l’origine d’une donnée en cas de fuite de fichier et ainsi de protéger votre e-réputation. Ce webinar soulignera en premier lieu les obligations du contexte GDPR pour ensuite se concentrer sur l’illustration concrète de deux clients. Il s’achèvera par une démonstration de la solution. Il est important de noter que nos solutions s’insèrent dans vos environnements Big Data et facilitent ainsi le développement de processus analytiques sans compromettre la valeur des données et en respectant la confidentialité due à vos clients et utilisateurs.

    Les speakers:

    Carine Lecadre Perrier | Head of Compliance @Partech
    Sébastien Cognet | Responsable Avant-Vente Europe du Sud @Privitar
    Leonardo L’ecaros | Responsable Commercial Europe du Sud @Privitar
  • Jumpstart Workforce Productivity with Digital Workspaces
    Jumpstart Workforce Productivity with Digital Workspaces Licia Williams, EVP Global HR & Corporate Counsel, & Taj Aljundi, Enterprise Solution Engineer, ASG Technologies Sep 26 2018 12:00 pm UTC 60 mins
    Successful onboarding is NOT just a matter of completing paperwork, selecting benefits, and getting a tour of the office. Getting your workforce up and running quickly and effectively will accelerate productivity. With digital workspaces, IT and HR can partner to ensure every new employee hits the ground running on Day 1.

    Join ASG Technologies on Wednesday, September 26th, to hear from digital workspace expert, Taj Aljundi, and Global Head of HR, Licia Williams, on how you can quickly onboard new staff, whether employees, contractors, or consultants, with the tools and information that they need, right from the start. All while reducing your onboarding costs substantially. You’ll learn how digital workspaces:
    • Support any device, anywhere – so you can engage the best talent regardless of location.
    • Embed IT policies regarding security, governance, and regulatory compliance.
    • Are tailored to an employee’s role, but support personalization to suit individual work styles.
    • Offer a single point of control to facilitate a secure offboarding process.

    Wondering how to maximize your workforce’s productivity? It all starts with their first day and your company’s onboarding process. Effective onboarding can mean 50% greater new-hire productivity, and with talent acquisition costs at 1/3 an employee’s compensation that’s a fact that can’t be ignored. Yet, many organizations struggle to develop a cost-effective and streamlined approach to technology enablement, though it’s critical to their onboarding efforts.

    Join us on September 26th and find out how.
  • Enabling Digital Transformation - What to Expect at IP EXPO Europe 2018
    Enabling Digital Transformation - What to Expect at IP EXPO Europe 2018 Simon Bitton, Sean McAvan Sep 26 2018 2:00 pm UTC 60 mins
    With just a few weeks to the must-attend IT event of the year for CIOs, IT Managers and Directors, Security specialists, Technical experts, we've gathered some of the elite speakers who will be taking the stage to debate the hottest solutions, trends and the biggest opportunities and challenges for businesses to successfully embrace digital change.

    Topics to be covered include:

    - Cyber Security
    - DevOPs
    - AI Analytics
    - Blockchain
    - Internet of Things

    What will they be talking about at ExCeL London, on the 3-4 of October 2018, what do they want to hear about, what are they looking forward to?

    Presenters
    Simon Bitton, Director of Marketing, Europe, Park Place Technologies
    Sean McAvan, Managing Director, Navisite Europe