Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • CISO of William’s Engineering Shares How They Solved O365 Security Challenges
    CISO of William’s Engineering Shares How They Solved O365 Security Challenges
    Graeme Hackland, Chief Informations Officer, Williams Group Recorded: Mar 22 2019 3 mins
    (2:28 Customer Testimonial Video)
    Learn how William’s Racing Group has secured email, data, and threat from account takeover in their Office 365 (O365) environment.
  • CISO of Natural Gas Distribution Company Discusses Security for Office 365
    CISO of Natural Gas Distribution Company Discusses Security for Office 365
    Mo Ahddoud, Chief Information Security Officer, SGN Recorded: Mar 22 2019 2 mins
    (1:47 Customer Testimonial Video)
    Hear how SGN secures their Office 365 instance with Symantec solutions for cloud visibility and control
  • Build Security In: Cloud Security at DevOps Speed
    Build Security In: Cloud Security at DevOps Speed
    Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto Networks Recorded: Mar 22 2019 55 mins
    As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
    This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
  • The Digital Workforce Wants YOU: Consider a Career in Cybersecurity
    The Digital Workforce Wants YOU: Consider a Career in Cybersecurity
    Patrick G. Cohen, VP, Strategic Partnerships, NPower, Inc. Recorded: Mar 22 2019 30 mins
    According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. Key influencers like teachers, parents, state and local officials are encouraged to join this webinar to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.
  • Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group
    Career Conversations w/ Merissa Villalobos & Kristin Parke from NCC Group
    Jessica Gulick, CEO, Katzcy, MBA | PMP | CISSP Recorded: Mar 21 2019 55 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Merissa Villalobos & Kristin Parke from NCC Group
  • Accelerating Enhanced Threat Identification and Incident Investigation
    Accelerating Enhanced Threat Identification and Incident Investigation
    David Monahan, Enterprise Management Associates; Stephen Hinck, Gigamon Insight, Steve Porcello, Gigamon Insigh Recorded: Mar 21 2019 60 mins
    Only 28 percent of organizations have alerting systems with enough context to provide highly accurate incident classification, thus requiring manual verification and reclassification of 95 percent of most organizations’ incidents. In addition, 48 percent of organizations had a security incident that caused moderate to severe business impact. Delays in identifying threats and the lack of information that extends the length of incident investigations cause real business problems.

    Enterprise Management Associates (EMA) released its 2019 “Top 3 Decision-Makers’ Guide to Security Analytics.” In this webinar David Monahan, Managing Research Director for Security and Risk Management at EMA, Stephen Hinck, Product Manager for Gigamon Insight, and Steve Porcello, Sales Engineer for Gigamon Insight, will discuss the key use cases “Identifying Advanced Threats” and “Enhancing Incident Investigations,” and will also demonstrate how security teams can obtain greater context for decision-making in order to solve these real-world problems faster using Gigamon Insight.

    Join leading IT analyst firm Enterprise Management Associates (EMA) and Gigamon to learn more about:
    •The methodology behind the report
    •What to watch for in selecting a security analytics solution
    •How to identify threats faster, thus reducing dwell time
    •How threat actors exploit Internet presence within the context of business and security management tools, issues, and practices
    •How access to a broad array of network data reduces the attack surface
  • Can ILOVEYOU Still Infect You?
    Can ILOVEYOU Still Infect You?
    Rene Kolga, Sr. Director of Product and Robert Zamani, Director, Solutions Architect, Nyotron Recorded: Mar 21 2019 49 mins
    Most security solution buyers assume they’re protected against known malware. Numbers like 99.9% are common in vendors’ marketing materials. Hence, efficacy conversations tend to focus instead on the solution’s performance against the unknown, zero-day threats. However, with between half a million and one million new pieces of commodity malware created every day, how are antivirus solutions keeping up? Where is this database of signatures, hashes, reputation and behavior stored for over a billion of known pieces of malware? Is the 99.9% number an illusion or reality?

    In this webinar we will leverage a study of three leading antivirus products against 60,000 pieces of known new and old malware. The results will surprise you...

    Does the ILOVEYOU virus from the year 2000 still pose a threat? You’ll have to join this webinar to find out.
  • Cloud Native Security: What’s Missing?
    Cloud Native Security: What’s Missing?
    Speaker: Tim Prendergast, Chief Cloud Officer at Palo Alto Networks Recorded: Mar 21 2019 43 mins
    As organizations adopt public cloud to accelerate development and reduce reliance on traditional datacenters, risk management remains a top concern. It’s well understood that legacy security tools designed for the datacenter cannot adapt to the distributed, dynamic nature of cloud environments, but what about the security tools offered by the cloud providers? Can they offer the visibility and control needed to effectively manage risk and mitigate vulnerabilities? We take a deep dive into native cloud security to see how these tools work and uncover if they can effectively support the differing security requirements across SecOps, DevOps, and compliance teams.
  • How to Protect Your Business Critical Operations in AWS
    How to Protect Your Business Critical Operations in AWS
    Deena Thomchick, Sr. Director, Cloud Security, Symantec Recorded: Mar 21 2019 52 mins
    When Securing AWS the Top 5 Things to Consider

    Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.

    As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.

    Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:

    - Monitor activity and security configurations
    - Control access and prevent risky changes or privileged misuse
    - Detect malicious insiders and compromised accounts
    - Keep S3 buckets private and secure confidential data with DLP
    - Defend S3 buckets from advanced malware threats
  • 5 Key Considerations for Your Hybrid Cloud Content Management Strategy
    5 Key Considerations for Your Hybrid Cloud Content Management Strategy
    Kevin Bender, ASG & Brad Steinmeyer, Zia Consulting Recorded: Mar 21 2019 29 mins
    As companies strive to make the Cloud a coherent part of their overall IT infrastructure, we often hear customers asking, “Are we taking the best approach to get the most from our Content?” Navigating the best path for your organization is more varied and compelling than ‘just moving content to the Cloud’.

    Blending traditional and modern IT models can offer cost savings as well as the agility you need to compete in the digital world. Watch this webinar to hear ASG and Zia Consulting discuss best practices developed while helping organizations construct and implement successful cloud strategies:
    • How Cloud migration can enhance IT agility and business competitiveness
    • What Consolidation vs. Migration really means
    • How Efficiency and Security can and should ‘work together’
    • How to measure immediate gains that align with your long-term vision
    • Why the Cloud is important as you drive digital transformation
  • Overcoming Cyberthreats to Critical Infrastructure with IT/OT Cybersecurity
    Overcoming Cyberthreats to Critical Infrastructure with IT/OT Cybersecurity
    Thomas Nuth, Sr. Director of Marketing, OT at Forescout Recorded: Mar 21 2019 49 mins
    Many organizations reliant on critical infrastructure networks are striving to reduce risk with cybersecurity strategies that bridge both IT and OT asset domains. However, achieving comprehensive IT/OT cybersecurity is often a more challenging task in practice than it is conceptually.

    Security professionals interested in effectively executing an integrated IT/OT cybersecurity strategy should join this webinar to learn how they can achieve end-to-end visibility into the full spectrum of both IT and OT network devices, as well as unified business risk management for today’s continuously evolving cyberthreat landscape. During this webinar, we will dive into four foundational elements of a comprehensive IT/OT cybersecurity strategy, including asset visibility, asset management, risk & compliance and investigation & response, with use cases of each.
  • Close the gap in your ransomware defense
    Close the gap in your ransomware defense
    Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro Focus Recorded: Mar 21 2019 32 mins
    Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.

    Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.

    Join this webinar to learn about:

    • Ransomware challenges and impact
    • Why malware detection alone is not enough
    • How to close the gap with holistic endpoint data and device management
  • 4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
    4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
    Pawan Shankar, Senior Product Marketing Manager, Sysdig & Binoy Das, Solutions Architect, Amazon Web Services Recorded: Mar 21 2019 45 mins
    With the rise of technologies like Docker, Kubernetes, and underlying cloud infrastructures, enterprises are moving towards cloud-native architectures that leverage microservices to run their critical business applications. While this shift has tremendous business advantages, it also creates significant security and compliance challenges.

    In this webinar, Sysdig & AWS experts will explore the 4 key steps you must take to ensure you are continuously meeting your security and compliance requirements for your microservices stack. Learn how to:

    >Leverage compliance policies for scanning images in your CI/CD pipeline
    >Scan Kubernetes and Docker environments and visualize compliance posture
    >Enforce runtime container compliance
    >Investigate policy violations post-mortem by using forensics after container is disposed
  • NETSCOUT Worldwide Infrastructure Security Update
    NETSCOUT Worldwide Infrastructure Security Update
    Gary Sockrider, Director – Security Technologist, NETSCOUT Recorded: Mar 21 2019 30 mins
    NETSCOUT’s 14th Annual Worldwide Infrastructure Security Report (WISR) offers a unique view into the most critical security challenges facing today's network operators. The report covers a wide variety of topics, from attack vectors to DNS pitfalls, to key organizational issues such as incident response training and staffing challenges.

    This year, the survey is further enhanced by regional break downs of the Enterprise respondents, thanks to our partners at Intelliclear. Attack types, targets, techniques, motivations, impacts, and costs are all broken out for US and Canada, Brazil, UK, Germany, France, and Japan.

    Join this webcast to learn:

    The challenges ahead for those involved in day-to-day network and security operations.

    How your network infrastructure may be impacted by the rapidly changing threat landscape.

    What your peers are doing to address the threats, as well as persistent staffing challenges.

    Register today, space is limited.
  • [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    [Earn 1 CPE] Implementing a NIST Framework for Adaptive Cybersecurity
    Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, Centrify Recorded: Mar 21 2019 79 mins
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.

    Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • Top Considerations for Software Audits in M&A Due Diligence
    Top Considerations for Software Audits in M&A Due Diligence
    Phil Odence, Synopsys Recorded: Mar 21 2019 61 mins
    There is risk in any M&A transaction but having the right tech due diligence approach can help mitigate that risk. If software is a large part of the deal valuation, you need to understand any potential legal and security risks in the target’s codebase that could affect the value of the IP, and the remediation required to address those risks.

    Join Phil Odence, General Manager of Black Duck On-Demand with Synopsys, to take a closer look at how you can identify and reduce risks in M&A tech due diligence. He’ll cover the following points and more:

    • Uncovering application risks: What’s in the code
    • Taking a comprehensive approach to security audits
    • Choosing the right partner for audits

    Don’t miss this informational webinar. Register today!
  • After the Attack—Surviving and Thriving Post-Breach
    After the Attack—Surviving and Thriving Post-Breach
    Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly Recorded: Mar 21 2019 51 mins
    More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:

    • Understand responsibilities and ramifications of ever-tightening data privacy rules
    • Minimize damages and mitigate risk exposure with rapid response strategies
    • Identify various breach threats and common network vulnerabilities
    • Analyze key learnings from prominent breach events
    • See how technology can help you investigate, automate and document key processes
  • How to Plan & Execute a Successful SAP Migration to AWS
    How to Plan & Execute a Successful SAP Migration to AWS
    Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert. Recorded: Mar 21 2019 43 mins
    Join us to learn how to:

    - Plan & Execute SAP Business workloads migrations on AWS.

    - Cover the routes on each scenario: OS/DB platform, database size, downtime window and connection bandwidth.

    - Impact of each variable on the overall migration project and combine all together to shape the right migration strategy to AWS.

    This is a technical webinar aimed for Infrastructure Engineers, SAP Basis and OS/DB migration experts and technical decision makers.
  • Best Cyber Breach Prevention: Certified NIST RMF/FedRAMP Professionals
    Best Cyber Breach Prevention: Certified NIST RMF/FedRAMP Professionals
    Dr. V. N. Berlin, CEO, Mission Critical Institute, Mr. Rob Chubbuck, Information Assurance Systems Engineer Recorded: Mar 21 2019 55 mins
    Learn why employer’s find that certified NIST RMF/FedRAMP professionals provide the best breach prevention strategy.

    You will learn exactly what are the NIST RMF/FedRAMP tools and how they work. Then you will learn how certified professionals employ these tools to ensure enterprises establish the best breach prevention strategy.

    You will then discover what makes a certified NIST RMF/FedRAMP professional and why they are critical to helping enterprises create the strongest breach prevention strategy.

    Next, you will examine the strategies enterprises follow to build teams of effective, certified NIST RMF/FedRAMP professionals.

    Last, you will see how to become a certified NIST RMF/FedRAMP professional. The webinar covers the key certifications including the CISSP, CEH and Certified Cloud Risk Management Professional (CCRMP) certification.

    To help motivate interested candidates to pursue this career path, MCI offers qualified attendees access to complimentary $500 CISSP Exam Vouchers and $1995 CISSP Exam Prep Course Vouchers.
  • Reimagining Identity Management
    Reimagining Identity Management
    Husayn Kassai (Onfido), Jeremy Grant (The Better Identity Coalition), Nathan Spanier (Remitly), Neil Chapman (ForgeRock) Recorded: Mar 21 2019 45 mins
    Our panelist will discuss:
    -The benefits of a secure digital identity system
    -Where does blockchain come into play?
    -Cutting through the hype: real use cases
    -Reducing risk and mitigating fraud
    -New advancements in biometrics
  • The digital disruption butterfly effect across European industries in 2019
    The digital disruption butterfly effect across European industries in 2019
    Angela Vacca, Giulia Carosella Recorded: Mar 21 2019 33 mins
    The European vertical market digital scenario is more vibrant than ever, – with some industries that are on the edge of technological change, and others that are rapidly catching-up and showing interesting pockets of growth.
    In this IDC Web Conference Angela Vacca and Giulia Carosella from the IDC Customer Insights and Analysis team will discuss how European industries, such as transportation, finance, public sector and others, are ripe for the 2019 digital evolution, answering questions such as:
    •What are the key vertical trends that are driving IT spending in Europe?
    •How to spot technology hypergrowth pockets?
    •What is the digital disruption ‘butterfly effect’, and how will it affect European industries?
    Our webinar will help you improve your vertical go-to-market strategy and tactical planning, – highlighting what is under the spotlight for European industries, learning about real-life examples, and charting out a successful vertical digital roadmap for 2019.
  • Onfido Product Demo: Identity Verification in action
    Onfido Product Demo: Identity Verification in action
    Joel Sacmar, Solutions Engineer & James Hiller, Account Executive Recorded: Mar 21 2019 19 mins
    Watch product demo to see the latest and greatest from Onfido. During the session we'll showcase our product in action, showing you how our AI-based technology can safely and smoothly verify identities in seconds.

    Watch the demo to see:
    - How our identity record, document and facial verification checks work
    - How our SDKs, APIs and dashboards work on web and mobile.
    - Insights into how we process checks in the backend
    - What a frictionless verification process looks like for your users.
  • SEP Cloud Powerful, yet simple to use
    SEP Cloud Powerful, yet simple to use
    Symantec Mar 25 2019 10:00 am UTC 5 mins
    Delivered endpoint security services can provide powerful threat protection efficacy using the IT headcount already in place supporting your business. In this 5 minute video we will demonstrate the Symantec Endpoint Protection Cloud solution, and show how to get
    endpoint security up and running in as little as 5 minutes using the same powerful protection as large enterprises.
  • Improving Decision Making and Expert Judgement
    Improving Decision Making and Expert Judgement
    Liz Taylor Mar 25 2019 11:00 am UTC 75 mins
    This webinar introduces some important techniques for making decisions under stress, on time, without bias, and in group environments.

    As an introduction to the one day seminar on Improving Decision Making and Expert Judgement on 4th April 2019, you will get a flavour of the course to help you understand the breadth and depth of the subject and techniques taught.
  • The Role of SRE in Continuous Testing and Continuous Delivery
    The Role of SRE in Continuous Testing and Continuous Delivery
    Shamim Ahmed Mar 25 2019 5:00 pm UTC 60 mins
    Site Reliability Engineering (or SRE) has been gaining popularity recently to help improve reliability of systems as well as a prescriptive approach to implementing DevOps. Testers similarly play a key role in helping to balance the needs of velocity with overall system quality.

    SREs develop, maintain and operate software that automates the traditional roles of the system administrator at large scale, such as configuration and cluster management systems, and that support reliability and scalability goals, such as container virtualization and the systems architecture of microservices

    In this webinar we’ll explore:
    * The synergies and differences between SREs and testers
    * How testers can work with SREs and development teams to balance the needs of velocity and quality
    * Tools to help integrate SRE into Continuous Testing and Continuous Delivery
  • Trust in Action: A Discussion with Kevin Fielder, CISO, Just Eat
    Trust in Action: A Discussion with Kevin Fielder, CISO, Just Eat
    Kevin Fielder, CISO, Just Eat, Justin Shaw-Gray, Sales Director, Synack Mar 26 2019 9:00 am UTC 60 mins
    Consumers are upping the ante for CISOs in 2019! >19% of consumers reported that they would not feel comfortable shopping at a store that has been breached or using an online service and 50% of consumers claim that security was a priority when choosing a bank. From eCommerce to Financial Services: trust is top of mind for consumers, and trust is becoming a core part of the CISO charter.

    Join Synack's Justin Shaw-Gray as he interviews Kevin Fielder, CISO, Just Eat
    They'll discuss:

    - The security challenges CISOs face in eCommerce and how they are integrating crowdsourced security into their day-to-day operations to build trust with the board and with customers.
    - What security’s role is in building a trusted business
    - How to plug security into DevOps
    - And Kevin's perspective on which security programs are actually worthwhile and where innovation is needed. What works? What doesn’t?

    You won’t want to miss this lively discussion
  • Webinar: Das Reifegradmodell für die Verwaltung von Sicherheitsrichtlinien
    Webinar: Das Reifegradmodell für die Verwaltung von Sicherheitsrichtlinien
    Marco Miska, Technical Account Manager EMEA Mar 26 2019 9:00 am UTC 60 mins
    Ihre Teams haben Schwierigkeiten, mit der Häufigkeit von Netzwerksicherheitsanfragen Schritt zu halten, während sie gleichzeitig versuchen die Agilitätsinitiativen Ihres Unternehmens zu unterstützen und die Sicherheit zu wahren.

    Sie kennen die Vorteile der Automatisierung, fragen sich aber wahrscheinlich: "Wo fangen wir an?"

    Besuchen Sie die Experten von Tufin am 26. März um 10.00 Uhr, um nützliche Tipps für den Einstieg in die Zero-Touch-Automatisierung zu erhalten:

    • Warum aktuelle Ansätze nicht funktionieren
    • Wie können begrenzte Ressourcenherausforderungen überwunden werden?
    • Die Schritte, die Sie unternehmen müssen, um das ultimative Ziel zu erreichen: Zero-Touch-Automatisierung
  • The role of  SIEM: Combating todays cybersecurity risks
    The role of SIEM: Combating todays cybersecurity risks
    Erik Bartholomy (LogRhythm) and Eric Parent (Sonepar) Mar 26 2019 10:00 am UTC 47 mins
    Building a Cybersecurity Architecture to Combat Today’s Risks:
    Foundations, Visions, Testing and the Role of SIEM

    The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organisations are recognising their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.

    Join Erik Bartholomy – a Security Architect at LogRhythm – and Eric Parent – CISO at Sonepar – to discover how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.

    During the webinar you will learn:

    • How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency

    • The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework

    • How security architecture helps align IT security with business strategy and current threats

    • Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud
  • Airheads Tech Talks: Cloud Guest SSID on Aruba Central
    Airheads Tech Talks: Cloud Guest SSID on Aruba Central
    Akhil R, Aruba TAC Team Mar 26 2019 10:00 am UTC 90 mins
    Aruba Central user may need a centralized web-server to host captive portal page for their distributed networks across the globe like coffee shops, restaurant or hotels.

    Aruba central 2.0 has a new feature called Cloud Guest or Guest Management that allows administrator to create a splash page for guest users using Web server and radius server running in the cloud.

    During this webinar we will cover the below topics:

    · Quick introduction to Cloud Guest SSID on Central
    · Need for Cloud Guest SSID in the field
    · Different Authentication Types
    · Configuration
    · Verification and Troubleshooting
  • ISM Webinar: Lack of Pipeline - The number 1 reason you are not hitting Quota
    ISM Webinar: Lack of Pipeline - The number 1 reason you are not hitting Quota
    ISM Fellow, Steve Burton Mar 26 2019 11:00 am UTC 30 mins
    Let’s face it… selling isn't easy. Sometimes it seems easier to lure a ravenous lion with a lettuce leaf than hit your monthly sales target. Even the best, most seasoned salespeople will feel pressurized from time to time and result in them not hitting the target. It’s this pressure that spawns excuses – excuses that detract attention away from a salesperson’s performance (or lack of it).

    I hate hearing excuses; it feels like people are trying to blame others rather than accepting their own failings. But what are the top excuses you’ll hear from a salesperson?
  • La sécurité Intelligente
    La sécurité Intelligente
    Gert De Wever, Security CSE, EU North & Koen Chiau, Sales & Channel Manager BeNeLux, Aruba Security Solutions Mar 26 2019 1:00 pm UTC 75 mins
    Mars, c'est le mois de la Cybersécurité !
    C'est l'occasion de (re)découvrir l'offre de sécurité Aruba à 360º !
    Mardi 26 mars à 14h, nos experts Sécurité d'Aruba Belux, Gert De Wever & Koen Chiau aborderont pour vous les 360º de l'offre sécurité d'Aruba :
    · Le défi
    · Les 4 piliers de la sécurité : identifier, protéger, détecter et remédier
    · Mise en place et automatisation de la sécurité
    · Approche 360° de l'expérience utilisateur sur le réseau
    · Demo live
    · Q&A
  • Active EDR - Automated Investigation with Artificial Intelligence
    Active EDR - Automated Investigation with Artificial Intelligence
    Jared Phipps, VP Worldwide Sales Engineering, SentinelOne, Brandon Dunlap, Moderator, (ISC)² Mar 26 2019 1:00 pm UTC 60 mins
    If you ask Gartner about the problems with today’s EDR technologies, they will say most solutions don’t deliver EDR capabilities in an operationally feasible or complete manner.

    The purpose of an EDR solution is to provide advanced detection & response capabilities to complement an EPP solution. At SentinelOne, we deliver the very best of EDR & EPP in a highly differentiated manner and in one single lightweight agent.

    Join us and learn about a new EDR- Active EDR - a new world of EDR capabilities and user experience. Explore how to:

    - Eradicate benign alert noise, focus on what’s important.
    - Optimise threat hunting time with curated and focused story lines.
    - Maximise staff efficiency and let staff become expert threat hunters.
  • Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Ask the Experts – Challenges & Opportunities with Mobile Workforces & UC
    Mark Elwood - Marketing Director, TeleWare Mar 26 2019 2:00 pm UTC 30 mins
    Mobile working is happening in increasing numbers of businesses. The prize is enormous for businesses who get mobile working right in terms of productivity improvements and happier employees. However recent research carried out on behalf of TeleWare highlight several challenges employers and employees face with increasingly mobile workforces.

    So, why aren’t more businesses and employees getting more benefits out of mobile working?

    Join our panel discussion to find out more about these insights and toget all your questions answered live on how to overcome these challenges.

    Topics we plan to cover:
    • The top 3 challenges employees face when working remotely
    • Is GDPR holding you back unnecessarily?
    • Which types of applications, unified communications and collaboration tools are making an impact
    • Why cloud communication technology is crucial to mobility, productivity and connectivity

    As well as sharing exclusive content, there will be opportunities to ask our expert panellists about any burning issues around mobile working beforehand or during the webinar. So, if there is anything you would like to cover, please get in touch.

    Marketing Director, Mark Elwood will host the session and he will be joined by experts:

    • Steve Haworth – TeleWare CEO
    • Nigel Simpson – Sales Manager
  • IT Org Transformation – Seven Strategies We Can Implement This Week
    IT Org Transformation – Seven Strategies We Can Implement This Week
    Joe Pucciarelli / Marc Strohlein / Cora Carmody Mar 26 2019 3:00 pm UTC 60 mins
    Many enterprises and their IT teams continue to struggle with the accelerating pace of change being brought about by the new digital technologies, business model innovation and increased competitive tempo. This challenge is more than “change management”; this is a broader problem – a need to accelerate organization transformation and evolve cultural norms. During this IDC web conference, our analysts will share both cultural frameworks and specific, tangible tactics for executive IT leaders, noted within our research, that have been found to power IT’s broader organizational transformation.
  • AI-based Fraud Detection & Verification: Why Identity is the Key to Access
    AI-based Fraud Detection & Verification: Why Identity is the Key to Access
    Husayn Kassai (Onfido) & Marianna Rossell (BrightTALK) Mar 26 2019 4:00 pm UTC 28 mins
    Identity fraud is one of the fastest growing crimes across the globe. Financial institutions are at an even greater risk due to the sensitive data and assets that they protect. Join this session where we will discuss:

    -What are the problems with current methods of identity verification?
    -How can a hybrid human-AI approach mitigate common risks?
    -How will we be able to use our identities in future?
    -What are the benefits of biometrics, machine learning, and facial liveliness?
  • Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Hadoop Creator Doug Cutting: How to Operationalize Machine Learning and Advanced
    Doug Cutting - Hadoop Creator & Chief Architect - Cloudera | Arvind Prabhakar - Co-Founder & CTO - StreamSets Mar 26 2019 5:00 pm UTC 56 mins
    When streaming data meets machine learning and advanced analytics, the innovation possibilities can be endless. Operationalization of data movement in a hybrid cloud architecture is key to making your technology investments deliver on their promises. Without it comes frustrated developers, failed projects and technology disillusionment.

    Join Doug Cutting, Apache Hadoop creator and Chief Architect at Cloudera, and Arvind Prabhakar, co-founder and CTO at StreamSets as they discuss how to use DataOps to avoid common pitfalls associated with adopting modern analytics platforms.
  • Advanced Automated Security with Symantec and Splunk
    Advanced Automated Security with Symantec and Splunk
    Colin Gibbens (Dir Prod Mgmt, Enterprise Security Products) and Don Leatham (Sr Manager, Global Strategic Alliances) Mar 26 2019 5:00 pm UTC 60 mins
    Cyber attackers are using sophisticated automation tactics to quickly find and exploit weaknesses in organizational defenses. Normal response tactics fail to mitigate or stop these “machine speed” attacks. The information necessary to address these attacks is often in different security tools, none of which are easily connected and coordinated.
    In this webinar, you will learn how Symantec and Splunk products address this problem by working together to automate a complete, closed-loop security system.
  • Docker & Forrester Webinar - A Guide to Adopting Container Platforms
    Docker & Forrester Webinar - A Guide to Adopting Container Platforms
    Dave Bartoletti, VP & Principal Analyst at Forrester & Jenny Fong, Director of Product Marketing at Docker Mar 26 2019 5:00 pm UTC 58 mins
    Learn what you should be evaluating and how containers will be essential to powering your next phase of digital transformation.

    Webinar will dive into the state of the container platform market with insights into:

    - The state of the cloud and container platform markets heading into 2019: what’s driving all this digital transformation?

    - The rise of the enterprise container platform market and the core capabilities enterprises look for in their next development and operations platform

    - How to evaluate the market for enterprise container platforms and find the best solution to help you create new applications and modernize your key existing applications

    - Why we believe Docker Enterprise has been named a Leader in the enterprise container platform market
  • How to Get the Benefits of AD Consolidation Without Disruption
    How to Get the Benefits of AD Consolidation Without Disruption
    Wade Ellery, Senior Solutions Architect with Radiant Logic. Wade has extensive experience in enterprise IT direct and channel Mar 26 2019 6:00 pm UTC 56 mins
    Whether your goal is streamlining authentication/authorization processes after a merger, providing a unified view of users for existing on-premises applications and cloud applications (moving to Azure AD/Office 365), or boosting the security of your system, there is most likely an Active Directory consolidation project in your future.

    The challenge for any medium to large enterprises and organizations is that their identity infrastructures often contain multiple AD domains and forests. This fragmentation is a technical challenge for multiple applications and use cases that require a more unified view of workforce identity for security, authentication, and authorization.

    This webinar will show you how to:

    •leverage virtualization and federated identity to solve the challenges of physical AD consolidation with a logical consolidation.

    •achieve full integration and rationalization of identity data from across multiple AD domains and forests—without a system overhaul.

    •achieve flexible new group definition and remapping of existing groups in environments where identity from multiple silos needs to be consolidated.

    •simplify authentication/SSO and authorization for multiple classes of applications, including legacy LDAP, traditional Web Access Management, and Federation/Cloud IdP.
  • Unified Device Visibility for IT and OT Environments
    Unified Device Visibility for IT and OT Environments
    Forescout Product Team Mar 27 2019 2:00 am UTC 60 mins
    As digital transformation continues, organizations are using increasing numbers of smart devices on their networks. They are connecting previously separated IT and OT networks to automate business operations and boost efficiency. This convergence of IT and OT is putting new demands on CIOs and CISOs as they are being tasked with protecting the entire business ecosystem, well beyond enterprise IT systems.

Join us to learn how Forescout 8.1 enables organizations to gain complete situational awareness of all devices in their interconnected environment to understand both their cyber and operational risk. Topics include:
    
• Visibility and continuous monitoring of all layers of the OT network stack
    
• Auto-classification of medical, industrial, networking and IoT devices
    
• Multi-cloud and data center visibility into Azure, AWS, VMware and Cisco ACI environments
  • Got a Hungry Splunk? Feed it Smartly with syslog-ng
    Got a Hungry Splunk? Feed it Smartly with syslog-ng
    James Bonamico, Senior Engineer (syslog-ng product specialist) Mar 27 2019 10:00 am UTC 32 mins
    We can help eliminate your struggle to reliably collect and send your log data to Splunk.

    Register for our free webinar to learn how you can easily manage and scale log ingestion across your whole enterprise environment.

    In this webinar we will demonstrate:
    •syslog-ng Premium Edition’s high-performance Splunk HTTP Event Collector (HEC) destination
    •How to batch and send messages to multiple Splunk HEC nodes
    •How to eliminate the need for forwarders and external load balancers
  • Taming the storm clouds: managing network security across hybrid and multi-cloud
    Taming the storm clouds: managing network security across hybrid and multi-cloud
    Yonatan Klein, Director of Product Management (AlgoSec) Mar 27 2019 2:00 pm UTC 45 mins
    Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.

    Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.

    Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.

    Yonatan will cover how to:
    •Easily and automatically identify security risks and misconfigurations in your cloud
    •Centrally manage security controls across accounts, regions and VPCs/VNETs
    •Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs
    •Obtain a cross-network-estate risk analysis
  • How to Eliminate Cloud Compliance Bottlenecks
    How to Eliminate Cloud Compliance Bottlenecks
    Anand Visvanathan, Director of Product Management, and LindaPark, Senior Manager, IaaS, Security & Compliance, Symantec Mar 27 2019 2:00 pm UTC 45 mins
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:
    - Why traditional security monitoring tools cannot provide visibility into cloud compliance risks
    - Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks
    - How to migrate your legacy infrastructure to the cloud without compromising security and compliance
  • Cisco’s New UCS 480 ML Platform & Architectures for AI & Machine Learning
    Cisco’s New UCS 480 ML Platform & Architectures for AI & Machine Learning
    Jason Masker, Practice Director - Data Center, Presidio Mar 27 2019 2:30 pm UTC 45 mins
    Join our team of experts as they dive into:
    Cisco’s New UCS 480 ML Platform and Architectures for AI and Machine Learning.

    We’ll wrap things up at the end of the training with Q&A.
  • Transforming Cloud Connectivity & Security in Distributed Networks
    Transforming Cloud Connectivity & Security in Distributed Networks
    Jim Fulton, Director Product Marketing, Forcepoint Mar 27 2019 3:00 pm UTC 35 mins
    Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps.
     
    In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security solution enables highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
  • Ensure Privacy Protection Through Your Digital Transformation
    Ensure Privacy Protection Through Your Digital Transformation
    Carole Murphy, Product Marketing, Data Security – Voltage & Becky Arenson, Solutions Marketing, Data Security, Micro Focus Mar 27 2019 3:00 pm UTC 60 mins
    Privacy represents a major challenge for the modern enterprise. The flexibility of hybrid IT and insights of data analytics are essential to business. But the digital transformation that is key to business success and competitive advantage is also a major vulnerability when it comes to data privacy.

    Organizations are rightfully concerned about CCPA, GDPR, PIPEDA, and the growing number of regulations now being enacted means they need to figure out how to reduce their risk. But current privacy protection approaches fall short. What’s needed is a unified technology framework that lets you take a holistic, analytics-driven approach to securing what matters most—a framework flexible enough to meet the needs of your enterprise, but specific enough to offer a guide to risk reduction.

    Join us for this webinar, to learn about:

    • The attributes of a flexible, unified framework to address disparate regulations
    • Five critical technology capabilities to enable compliance
    • Data discovery and classification to manage risk
    • Governing identity privileges, access, and stores
  • Integrating Application Security Into Your Development Environment
    Integrating Application Security Into Your Development Environment
    Pej Pourmousa, Vice President Security Program Management, Veracode and Johnny Wong, Director Presales, Veracode Mar 27 2019 3:00 pm UTC 45 mins
    Once you define, adopt and standardize application security best practices for protecting your software, the next step is to determine how your program integrates into your existing environment. The Veracode Platform integrates with the development, security and risk-tracking tools you already use. Coupled with our broad range of APIs, your teams can create your own custom integrations or leverage those from open source community.

    Join Pej Pourmousa, Vice President Security Program Management at Veracode and Johnny Wong, Director Presales, Veracode for a webinar that will outline the ways your organization can integrate application security into your development environment. Specifically he will discuss how Veracode integrates into your development and DevOps processes using:
    •Integrated Development Environments (IDEs)
    •Build Servers
    •Defect Tracking Systems
    •APIs