Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Rick Collette, Cloud Architect at Palo Alto Networks; John Martinez, Director of Public Cloud R&D, Palo Alto NetworksRecorded: Mar 22 201955 mins
As DevSecOps adoption slowly goes mainstream among organizations, it is fundamentally changing the culture and collaboration semantics among security, development and operations teams.
This webinar will explore whether SecOps and DevOps have been effective in fostering collaboration to align their different goals into a single effort or have they slipped into implementing primitive security models of the past. Is the union of DevOps and SecOps on rocky ground and in need of marriage counseling, or are they copacetic? In this webinar, we’ll explore the needs of DevOps, Security and IT and five principles that will help you move at the speed of cloud together without creating gaps in your security posture.
Patrick G. Cohen, VP, Strategic Partnerships, NPower, Inc.Recorded: Mar 22 201930 mins
According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. Key influencers like teachers, parents, state and local officials are encouraged to join this webinar to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.
Jessica Gulick, CEO, Katzcy, MBA | PMP | CISSPRecorded: Mar 21 201955 mins
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Guest: Merissa Villalobos & Kristin Parke from NCC Group
David Monahan, Enterprise Management Associates; Stephen Hinck, Gigamon Insight, Steve Porcello, Gigamon InsighRecorded: Mar 21 201960 mins
Only 28 percent of organizations have alerting systems with enough context to provide highly accurate incident classification, thus requiring manual verification and reclassification of 95 percent of most organizations’ incidents. In addition, 48 percent of organizations had a security incident that caused moderate to severe business impact. Delays in identifying threats and the lack of information that extends the length of incident investigations cause real business problems.
Enterprise Management Associates (EMA) released its 2019 “Top 3 Decision-Makers’ Guide to Security Analytics.” In this webinar David Monahan, Managing Research Director for Security and Risk Management at EMA, Stephen Hinck, Product Manager for Gigamon Insight, and Steve Porcello, Sales Engineer for Gigamon Insight, will discuss the key use cases “Identifying Advanced Threats” and “Enhancing Incident Investigations,” and will also demonstrate how security teams can obtain greater context for decision-making in order to solve these real-world problems faster using Gigamon Insight.
Join leading IT analyst firm Enterprise Management Associates (EMA) and Gigamon to learn more about:
•The methodology behind the report
•What to watch for in selecting a security analytics solution
•How to identify threats faster, thus reducing dwell time
•How threat actors exploit Internet presence within the context of business and security management tools, issues, and practices
•How access to a broad array of network data reduces the attack surface
Rene Kolga, Sr. Director of Product and Robert Zamani, Director, Solutions Architect, NyotronRecorded: Mar 21 201949 mins
Most security solution buyers assume they’re protected against known malware. Numbers like 99.9% are common in vendors’ marketing materials. Hence, efficacy conversations tend to focus instead on the solution’s performance against the unknown, zero-day threats. However, with between half a million and one million new pieces of commodity malware created every day, how are antivirus solutions keeping up? Where is this database of signatures, hashes, reputation and behavior stored for over a billion of known pieces of malware? Is the 99.9% number an illusion or reality?
In this webinar we will leverage a study of three leading antivirus products against 60,000 pieces of known new and old malware. The results will surprise you...
Does the ILOVEYOU virus from the year 2000 still pose a threat? You’ll have to join this webinar to find out.
Speaker: Tim Prendergast, Chief Cloud Officer at Palo Alto NetworksRecorded: Mar 21 201943 mins
As organizations adopt public cloud to accelerate development and reduce reliance on traditional datacenters, risk management remains a top concern. It’s well understood that legacy security tools designed for the datacenter cannot adapt to the distributed, dynamic nature of cloud environments, but what about the security tools offered by the cloud providers? Can they offer the visibility and control needed to effectively manage risk and mitigate vulnerabilities? We take a deep dive into native cloud security to see how these tools work and uncover if they can effectively support the differing security requirements across SecOps, DevOps, and compliance teams.
Deena Thomchick, Sr. Director, Cloud Security, SymantecRecorded: Mar 21 201952 mins
When Securing AWS the Top 5 Things to Consider
Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.
As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.
Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:
- Monitor activity and security configurations
- Control access and prevent risky changes or privileged misuse
- Detect malicious insiders and compromised accounts
- Keep S3 buckets private and secure confidential data with DLP
- Defend S3 buckets from advanced malware threats
Kevin Bender, ASG & Brad Steinmeyer, Zia ConsultingRecorded: Mar 21 201929 mins
As companies strive to make the Cloud a coherent part of their overall IT infrastructure, we often hear customers asking, “Are we taking the best approach to get the most from our Content?” Navigating the best path for your organization is more varied and compelling than ‘just moving content to the Cloud’.
Blending traditional and modern IT models can offer cost savings as well as the agility you need to compete in the digital world. Watch this webinar to hear ASG and Zia Consulting discuss best practices developed while helping organizations construct and implement successful cloud strategies:
• How Cloud migration can enhance IT agility and business competitiveness
• What Consolidation vs. Migration really means
• How Efficiency and Security can and should ‘work together’
• How to measure immediate gains that align with your long-term vision
• Why the Cloud is important as you drive digital transformation
Thomas Nuth, Sr. Director of Marketing, OT at ForescoutRecorded: Mar 21 201949 mins
Many organizations reliant on critical infrastructure networks are striving to reduce risk with cybersecurity strategies that bridge both IT and OT asset domains. However, achieving comprehensive IT/OT cybersecurity is often a more challenging task in practice than it is conceptually.
Security professionals interested in effectively executing an integrated IT/OT cybersecurity strategy should join this webinar to learn how they can achieve end-to-end visibility into the full spectrum of both IT and OT network devices, as well as unified business risk management for today’s continuously evolving cyberthreat landscape. During this webinar, we will dive into four foundational elements of a comprehensive IT/OT cybersecurity strategy, including asset visibility, asset management, risk & compliance and investigation & response, with use cases of each.
Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro FocusRecorded: Mar 21 201932 mins
Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.
Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.
Join this webinar to learn about:
• Ransomware challenges and impact
• Why malware detection alone is not enough
• How to close the gap with holistic endpoint data and device management
Pawan Shankar, Senior Product Marketing Manager, Sysdig & Binoy Das, Solutions Architect, Amazon Web ServicesRecorded: Mar 21 201945 mins
With the rise of technologies like Docker, Kubernetes, and underlying cloud infrastructures, enterprises are moving towards cloud-native architectures that leverage microservices to run their critical business applications. While this shift has tremendous business advantages, it also creates significant security and compliance challenges.
In this webinar, Sysdig & AWS experts will explore the 4 key steps you must take to ensure you are continuously meeting your security and compliance requirements for your microservices stack. Learn how to:
>Leverage compliance policies for scanning images in your CI/CD pipeline
>Scan Kubernetes and Docker environments and visualize compliance posture
>Enforce runtime container compliance
>Investigate policy violations post-mortem by using forensics after container is disposed
Gary Sockrider, Director – Security Technologist, NETSCOUTRecorded: Mar 21 201930 mins
NETSCOUT’s 14th Annual Worldwide Infrastructure Security Report (WISR) offers a unique view into the most critical security challenges facing today's network operators. The report covers a wide variety of topics, from attack vectors to DNS pitfalls, to key organizational issues such as incident response training and staffing challenges.
This year, the survey is further enhanced by regional break downs of the Enterprise respondents, thanks to our partners at Intelliclear. Attack types, targets, techniques, motivations, impacts, and costs are all broken out for US and Canada, Brazil, UK, Germany, France, and Japan.
Join this webcast to learn:
The challenges ahead for those involved in day-to-day network and security operations.
How your network infrastructure may be impacted by the rapidly changing threat landscape.
What your peers are doing to address the threats, as well as persistent staffing challenges.
Colin Whittaker, with Sam Abadir, Lockpath; Allan Liska, Recorded Future; and Gina Mahin, Lynx TP; David McNeely, CentrifyRecorded: Mar 21 201979 mins
In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of adaptive cyber security strategies is becoming inevitable to achieve that goal.
Adaptive cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:
- Getting a clear picture of the current health of your organizations' defenses
- Defining your security road map using NIST CSF as a framework
- Conducting gap analysis and executing remediation actions
- Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
There is risk in any M&A transaction but having the right tech due diligence approach can help mitigate that risk. If software is a large part of the deal valuation, you need to understand any potential legal and security risks in the target’s codebase that could affect the value of the IP, and the remediation required to address those risks.
Join Phil Odence, General Manager of Black Duck On-Demand with Synopsys, to take a closer look at how you can identify and reduce risks in M&A tech due diligence. He’ll cover the following points and more:
• Uncovering application risks: What’s in the code
• Taking a comprehensive approach to security audits
• Choosing the right partner for audits
Don’t miss this informational webinar. Register today!
Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide BaillyRecorded: Mar 21 201951 mins
More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach:
• Understand responsibilities and ramifications of ever-tightening data privacy rules
• Minimize damages and mitigate risk exposure with rapid response strategies
• Identify various breach threats and common network vulnerabilities
• Analyze key learnings from prominent breach events
• See how technology can help you investigate, automate and document key processes
Dr. V. N. Berlin, CEO, Mission Critical Institute, Mr. Rob Chubbuck, Information Assurance Systems EngineerRecorded: Mar 21 201955 mins
Learn why employer’s find that certified NIST RMF/FedRAMP professionals provide the best breach prevention strategy.
You will learn exactly what are the NIST RMF/FedRAMP tools and how they work. Then you will learn how certified professionals employ these tools to ensure enterprises establish the best breach prevention strategy.
You will then discover what makes a certified NIST RMF/FedRAMP professional and why they are critical to helping enterprises create the strongest breach prevention strategy.
Next, you will examine the strategies enterprises follow to build teams of effective, certified NIST RMF/FedRAMP professionals.
Last, you will see how to become a certified NIST RMF/FedRAMP professional. The webinar covers the key certifications including the CISSP, CEH and Certified Cloud Risk Management Professional (CCRMP) certification.
To help motivate interested candidates to pursue this career path, MCI offers qualified attendees access to complimentary $500 CISSP Exam Vouchers and $1995 CISSP Exam Prep Course Vouchers.
Husayn Kassai (Onfido), Jeremy Grant (The Better Identity Coalition), Nathan Spanier (Remitly), Neil Chapman (ForgeRock)Recorded: Mar 21 201945 mins
Our panelist will discuss:
-The benefits of a secure digital identity system
-Where does blockchain come into play?
-Cutting through the hype: real use cases
-Reducing risk and mitigating fraud
-New advancements in biometrics
Angela Vacca, Giulia CarosellaRecorded: Mar 21 201933 mins
The European vertical market digital scenario is more vibrant than ever, – with some industries that are on the edge of technological change, and others that are rapidly catching-up and showing interesting pockets of growth.
In this IDC Web Conference Angela Vacca and Giulia Carosella from the IDC Customer Insights and Analysis team will discuss how European industries, such as transportation, finance, public sector and others, are ripe for the 2019 digital evolution, answering questions such as:
•What are the key vertical trends that are driving IT spending in Europe?
•How to spot technology hypergrowth pockets?
•What is the digital disruption ‘butterfly effect’, and how will it affect European industries?
Our webinar will help you improve your vertical go-to-market strategy and tactical planning, – highlighting what is under the spotlight for European industries, learning about real-life examples, and charting out a successful vertical digital roadmap for 2019.
Joel Sacmar, Solutions Engineer & James Hiller, Account ExecutiveRecorded: Mar 21 201919 mins
Watch product demo to see the latest and greatest from Onfido. During the session we'll showcase our product in action, showing you how our AI-based technology can safely and smoothly verify identities in seconds.
Watch the demo to see:
- How our identity record, document and facial verification checks work
- How our SDKs, APIs and dashboards work on web and mobile.
- Insights into how we process checks in the backend
- What a frictionless verification process looks like for your users.
Delivered endpoint security services can provide powerful threat protection efficacy using the IT headcount already in place supporting your business. In this 5 minute video we will demonstrate the Symantec Endpoint Protection Cloud solution, and show how to get
endpoint security up and running in as little as 5 minutes using the same powerful protection as large enterprises.
This webinar introduces some important techniques for making decisions under stress, on time, without bias, and in group environments.
As an introduction to the one day seminar on Improving Decision Making and Expert Judgement on 4th April 2019, you will get a flavour of the course to help you understand the breadth and depth of the subject and techniques taught.
Site Reliability Engineering (or SRE) has been gaining popularity recently to help improve reliability of systems as well as a prescriptive approach to implementing DevOps. Testers similarly play a key role in helping to balance the needs of velocity with overall system quality.
SREs develop, maintain and operate software that automates the traditional roles of the system administrator at large scale, such as configuration and cluster management systems, and that support reliability and scalability goals, such as container virtualization and the systems architecture of microservices
In this webinar we’ll explore:
* The synergies and differences between SREs and testers
* How testers can work with SREs and development teams to balance the needs of velocity and quality
* Tools to help integrate SRE into Continuous Testing and Continuous Delivery
Kevin Fielder, CISO, Just Eat, Justin Shaw-Gray, Sales Director, SynackMar 26 20199:00 amUTC60 mins
Consumers are upping the ante for CISOs in 2019! >19% of consumers reported that they would not feel comfortable shopping at a store that has been breached or using an online service and 50% of consumers claim that security was a priority when choosing a bank. From eCommerce to Financial Services: trust is top of mind for consumers, and trust is becoming a core part of the CISO charter.
Join Synack's Justin Shaw-Gray as he interviews Kevin Fielder, CISO, Just Eat
- The security challenges CISOs face in eCommerce and how they are integrating crowdsourced security into their day-to-day operations to build trust with the board and with customers.
- What security’s role is in building a trusted business
- How to plug security into DevOps
- And Kevin's perspective on which security programs are actually worthwhile and where innovation is needed. What works? What doesn’t?
Marco Miska, Technical Account Manager EMEAMar 26 20199:00 amUTC60 mins
Ihre Teams haben Schwierigkeiten, mit der Häufigkeit von Netzwerksicherheitsanfragen Schritt zu halten, während sie gleichzeitig versuchen die Agilitätsinitiativen Ihres Unternehmens zu unterstützen und die Sicherheit zu wahren.
Sie kennen die Vorteile der Automatisierung, fragen sich aber wahrscheinlich: "Wo fangen wir an?"
Besuchen Sie die Experten von Tufin am 26. März um 10.00 Uhr, um nützliche Tipps für den Einstieg in die Zero-Touch-Automatisierung zu erhalten:
• Warum aktuelle Ansätze nicht funktionieren
• Wie können begrenzte Ressourcenherausforderungen überwunden werden?
• Die Schritte, die Sie unternehmen müssen, um das ultimative Ziel zu erreichen: Zero-Touch-Automatisierung
Erik Bartholomy (LogRhythm) and Eric Parent (Sonepar)Mar 26 201910:00 amUTC47 mins
Building a Cybersecurity Architecture to Combat Today’s Risks:
Foundations, Visions, Testing and the Role of SIEM
The rapid development and adoption of cloud infrastructure, mobile workforces, IoT and other susceptible environments has mandated a reappraisal of security architecture. Modern organisations are recognising their security posture may not be keeping up with the threat landscape, and this leads to frightening discoveries around the safety of their data and networks.
Join Erik Bartholomy – a Security Architect at LogRhythm – and Eric Parent – CISO at Sonepar – to discover how security architecture is developing to face the current threat landscape. Failures in past layered approaches are frequent, and serve as valuable learning lessons on the importance of proactive monitoring and response.
During the webinar you will learn:
• How LogRhythm’s POC enabled Sonepar’s team to efficiently expedite threat detection, and improve their SOC and analyst efficiency
• The guiding principles and technology behind modern security frameworks and architecture, including the rise in popularity and value of the Zero Trust Framework
• How security architecture helps align IT security with business strategy and current threats
• Adapting architecture to accommodate different environments, including on-premises, cloud, and hybrid cloud
ISM Fellow, Steve BurtonMar 26 201911:00 amUTC30 mins
Let’s face it… selling isn't easy. Sometimes it seems easier to lure a ravenous lion with a lettuce leaf than hit your monthly sales target. Even the best, most seasoned salespeople will feel pressurized from time to time and result in them not hitting the target. It’s this pressure that spawns excuses – excuses that detract attention away from a salesperson’s performance (or lack of it).
I hate hearing excuses; it feels like people are trying to blame others rather than accepting their own failings. But what are the top excuses you’ll hear from a salesperson?
Gert De Wever, Security CSE, EU North & Koen Chiau, Sales & Channel Manager BeNeLux, Aruba Security SolutionsMar 26 20191:00 pmUTC75 mins
Mars, c'est le mois de la Cybersécurité !
C'est l'occasion de (re)découvrir l'offre de sécurité Aruba à 360º !
Mardi 26 mars à 14h, nos experts Sécurité d'Aruba Belux, Gert De Wever & Koen Chiau aborderont pour vous les 360º de l'offre sécurité d'Aruba :
· Le défi
· Les 4 piliers de la sécurité : identifier, protéger, détecter et remédier
· Mise en place et automatisation de la sécurité
· Approche 360° de l'expérience utilisateur sur le réseau
· Demo live
Jared Phipps, VP Worldwide Sales Engineering, SentinelOne, Brandon Dunlap, Moderator, (ISC)²Mar 26 20191:00 pmUTC60 mins
If you ask Gartner about the problems with today’s EDR technologies, they will say most solutions don’t deliver EDR capabilities in an operationally feasible or complete manner.
The purpose of an EDR solution is to provide advanced detection & response capabilities to complement an EPP solution. At SentinelOne, we deliver the very best of EDR & EPP in a highly differentiated manner and in one single lightweight agent.
Join us and learn about a new EDR- Active EDR - a new world of EDR capabilities and user experience. Explore how to:
- Eradicate benign alert noise, focus on what’s important.
- Optimise threat hunting time with curated and focused story lines.
- Maximise staff efficiency and let staff become expert threat hunters.
Mark Elwood - Marketing Director, TeleWareMar 26 20192:00 pmUTC30 mins
Mobile working is happening in increasing numbers of businesses. The prize is enormous for businesses who get mobile working right in terms of productivity improvements and happier employees. However recent research carried out on behalf of TeleWare highlight several challenges employers and employees face with increasingly mobile workforces.
So, why aren’t more businesses and employees getting more benefits out of mobile working?
Join our panel discussion to find out more about these insights and toget all your questions answered live on how to overcome these challenges.
Topics we plan to cover:
• The top 3 challenges employees face when working remotely
• Is GDPR holding you back unnecessarily?
• Which types of applications, unified communications and collaboration tools are making an impact
• Why cloud communication technology is crucial to mobility, productivity and connectivity
As well as sharing exclusive content, there will be opportunities to ask our expert panellists about any burning issues around mobile working beforehand or during the webinar. So, if there is anything you would like to cover, please get in touch.
Marketing Director, Mark Elwood will host the session and he will be joined by experts:
• Steve Haworth – TeleWare CEO
• Nigel Simpson – Sales Manager
Joe Pucciarelli / Marc Strohlein / Cora CarmodyMar 26 20193:00 pmUTC60 mins
Many enterprises and their IT teams continue to struggle with the accelerating pace of change being brought about by the new digital technologies, business model innovation and increased competitive tempo. This challenge is more than “change management”; this is a broader problem – a need to accelerate organization transformation and evolve cultural norms. During this IDC web conference, our analysts will share both cultural frameworks and specific, tangible tactics for executive IT leaders, noted within our research, that have been found to power IT’s broader organizational transformation.
Husayn Kassai (Onfido) & Marianna Rossell (BrightTALK)Mar 26 20194:00 pmUTC28 mins
Identity fraud is one of the fastest growing crimes across the globe. Financial institutions are at an even greater risk due to the sensitive data and assets that they protect. Join this session where we will discuss:
-What are the problems with current methods of identity verification?
-How can a hybrid human-AI approach mitigate common risks?
-How will we be able to use our identities in future?
-What are the benefits of biometrics, machine learning, and facial liveliness?
When streaming data meets machine learning and advanced analytics, the innovation possibilities can be endless. Operationalization of data movement in a hybrid cloud architecture is key to making your technology investments deliver on their promises. Without it comes frustrated developers, failed projects and technology disillusionment.
Join Doug Cutting, Apache Hadoop creator and Chief Architect at Cloudera, and Arvind Prabhakar, co-founder and CTO at StreamSets as they discuss how to use DataOps to avoid common pitfalls associated with adopting modern analytics platforms.
Colin Gibbens (Dir Prod Mgmt, Enterprise Security Products) and Don Leatham (Sr Manager, Global Strategic Alliances)Mar 26 20195:00 pmUTC60 mins
Cyber attackers are using sophisticated automation tactics to quickly find and exploit weaknesses in organizational defenses. Normal response tactics fail to mitigate or stop these “machine speed” attacks. The information necessary to address these attacks is often in different security tools, none of which are easily connected and coordinated.
In this webinar, you will learn how Symantec and Splunk products address this problem by working together to automate a complete, closed-loop security system.
Wade Ellery, Senior Solutions Architect with Radiant Logic. Wade has extensive experience in enterprise IT direct and channelMar 26 20196:00 pmUTC56 mins
Whether your goal is streamlining authentication/authorization processes after a merger, providing a unified view of users for existing on-premises applications and cloud applications (moving to Azure AD/Office 365), or boosting the security of your system, there is most likely an Active Directory consolidation project in your future.
The challenge for any medium to large enterprises and organizations is that their identity infrastructures often contain multiple AD domains and forests. This fragmentation is a technical challenge for multiple applications and use cases that require a more unified view of workforce identity for security, authentication, and authorization.
This webinar will show you how to:
•leverage virtualization and federated identity to solve the challenges of physical AD consolidation with a logical consolidation.
•achieve full integration and rationalization of identity data from across multiple AD domains and forests—without a system overhaul.
•achieve flexible new group definition and remapping of existing groups in environments where identity from multiple silos needs to be consolidated.
•simplify authentication/SSO and authorization for multiple classes of applications, including legacy LDAP, traditional Web Access Management, and Federation/Cloud IdP.
Forescout Product TeamMar 27 20192:00 amUTC60 mins
As digital transformation continues, organizations are using increasing numbers of smart devices on their networks. They are connecting previously separated IT and OT networks to automate business operations and boost efficiency. This convergence of IT and OT is putting new demands on CIOs and CISOs as they are being tasked with protecting the entire business ecosystem, well beyond enterprise IT systems. Join us to learn how Forescout 8.1 enables organizations to gain complete situational awareness of all devices in their interconnected environment to understand both their cyber and operational risk. Topics include:
• Visibility and continuous monitoring of all layers of the OT network stack
• Auto-classification of medical, industrial, networking and IoT devices
• Multi-cloud and data center visibility into Azure, AWS, VMware and Cisco ACI environments
James Bonamico, Senior Engineer (syslog-ng product specialist)Mar 27 201910:00 amUTC32 mins
We can help eliminate your struggle to reliably collect and send your log data to Splunk.
Register for our free webinar to learn how you can easily manage and scale log ingestion across your whole enterprise environment.
In this webinar we will demonstrate:
•syslog-ng Premium Edition’s high-performance Splunk HTTP Event Collector (HEC) destination
•How to batch and send messages to multiple Splunk HEC nodes
•How to eliminate the need for forwarders and external load balancers
Yonatan Klein, Director of Product Management (AlgoSec)Mar 27 20192:00 pmUTC45 mins
Good old perimeter security, enforced by traditional firewall protection, is now combined with distributed firewalls, public cloud native security controls and third-party security services. The shared-responsibility security model means that IT organizations need to assume accountability for the data and overall security posture, as this is not exclusively the cloud providers’ responsibility.
Today, more than ever, enterprise security teams are challenged to stretch their tried-and-true security policies to their extended deployments. They lack visibility across this growing estate, they can’t keep up with DevOps, and they are unable to properly analyze risk. They need integrated security policy management solutions for hybrid-cloud environments.
Join Yonatan Klein, Director of Product Management at AlgoSec to learn how to take advantage of all the benefits of cloud and virtual deployments while maintaining your current security fundamentals.
Yonatan will cover how to:
•Easily and automatically identify security risks and misconfigurations in your cloud
•Centrally manage security controls across accounts, regions and VPCs/VNETs
•Gain complete visibility across subnets and instances, including security groups, network security groups and NACLs
•Obtain a cross-network-estate risk analysis
Anand Visvanathan, Director of Product Management, and LindaPark, Senior Manager, IaaS, Security & Compliance, SymantecMar 27 20192:00 pmUTC45 mins
Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.
Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.
Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.
During this webinar, you'll learn:
- Why traditional security monitoring tools cannot provide visibility into cloud compliance risks
- Why Security and DevOps teams need automated cloud security
posture management (CSPM) tools to remove compliance bottlenecks
- How to migrate your legacy infrastructure to the cloud without compromising security and compliance
Jim Fulton, Director Product Marketing, ForcepointMar 27 20193:00 pmUTC35 mins
Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps.
In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security solution enables highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
Carole Murphy, Product Marketing, Data Security – Voltage & Becky Arenson, Solutions Marketing, Data Security, Micro FocusMar 27 20193:00 pmUTC60 mins
Privacy represents a major challenge for the modern enterprise. The flexibility of hybrid IT and insights of data analytics are essential to business. But the digital transformation that is key to business success and competitive advantage is also a major vulnerability when it comes to data privacy.
Organizations are rightfully concerned about CCPA, GDPR, PIPEDA, and the growing number of regulations now being enacted means they need to figure out how to reduce their risk. But current privacy protection approaches fall short. What’s needed is a unified technology framework that lets you take a holistic, analytics-driven approach to securing what matters most—a framework flexible enough to meet the needs of your enterprise, but specific enough to offer a guide to risk reduction.
Join us for this webinar, to learn about:
• The attributes of a flexible, unified framework to address disparate regulations
• Five critical technology capabilities to enable compliance
• Data discovery and classification to manage risk
• Governing identity privileges, access, and stores
Pej Pourmousa, Vice President Security Program Management, Veracode and Johnny Wong, Director Presales, VeracodeMar 27 20193:00 pmUTC45 mins
Once you define, adopt and standardize application security best practices for protecting your software, the next step is to determine how your program integrates into your existing environment. The Veracode Platform integrates with the development, security and risk-tracking tools you already use. Coupled with our broad range of APIs, your teams can create your own custom integrations or leverage those from open source community.
Join Pej Pourmousa, Vice President Security Program Management at Veracode and Johnny Wong, Director Presales, Veracode for a webinar that will outline the ways your organization can integrate application security into your development environment. Specifically he will discuss how Veracode integrates into your development and DevOps processes using:
•Integrated Development Environments (IDEs)
•Defect Tracking Systems