Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • The Need For Automated Asset Management in ICS
    The Need For Automated Asset Management in ICS IndegyTV Recorded: Jun 22 2018 3 mins
    Why is automated asset management and discovery needed in industrial networks
  • Assessing IT Risk in a Healthcare Environment
    Assessing IT Risk in a Healthcare Environment Scott Breece - Community Health Systems, Sam Abadir - Lockpath Recorded: Jun 21 2018 59 mins
    In this webinar, Lockpath’s Sam Abadir and Community Health System’s Scott Breece will discuss the unique IT landscape of the healthcare industry and the challenges this presents for IT risk management.

    Abadir and Breece will discuss common strategies for identifying and managing IT risks including risk assessment methodologies, best practices for assessing business associates and third parties, incident response plans, and available toolsets to support these activities.
  • What to expect when Ansible meets your organization - what we wish we'd known
    What to expect when Ansible meets your organization - what we wish we'd known Ryan Bontreger, associate platform consultant, Red Hat Scott Knauss, architect, Red Hat Recorded: Jun 21 2018 62 mins
    Thinking about automation in your massive enterprise environment? Ansible® is the wave of the future, but is it right for what you need it to do?

    Join this webinar to hear:
    > About the ins and outs of planning for Ansible in your organization.
    > How to integrate Ansible within your workflow.
    > What not to do with Ansible.
  • Cybercrime Doesn't Discriminate! 7 Questions to Secure Your Business
    Cybercrime Doesn't Discriminate! 7 Questions to Secure Your Business Oriah Longanecker, SkOUT Secure Intelligence Recorded: Jun 21 2018 61 mins
    Our presenter, Oriah Longanecker, has over 20 years of experience as an intelligence and cyber warfare officer in the U.S. Air Force! He's lead a variety of intelligence and cyber warfare units for the National Security Agency and other Intelligence Community organizations, as well as U.S. Cyber Command, and currently leads the cybersecurity and threat intelligence efforts for our partner SkOUT Secure Intelligence in the western U.S.

    Data breaches have gained attention with the increasing use of digital files and companies and users large reliance on digital data and electronic record keeping.
  • How do enterprises use containers? A discussion of 2018 Docker usage.
    How do enterprises use containers? A discussion of 2018 Docker usage. Eric Carter Recorded: Jun 21 2018 45 mins
    What are the top application components running in containers? What is the lifespan of containers, container images, and services? How is orchestrator adoption changing? What keeps container developers and administrators up at night?

    Join us for a discussion of these topics and more in our review of the 2018 Docker Usage Report - based on a sample of 90,000 containers in real-world deployments.
  • Attack Analytics: How to Tackle Too Many Alerts With The Help of AI
    Attack Analytics: How to Tackle Too Many Alerts With The Help of AI Shelly Hershkovitz, Product Management, Imperva and Ajay Uggirala, Product Marketing, Imperva Recorded: Jun 21 2018 43 mins
    A massive overload of security events.
    Constant data breaches.
    Sophisticated threats.

    Combine these three facts, and you get cumbersome and complicated security-related investigations.

    Join this webinar to learn how to:

    • Efficiently manage thousands of daily alerts
    • Effectively analyze each and every event
    • Determine which threats are real vs. false positives

    Find out how Attack Analytics (a new solution from Imperva) addresses all of the above.
  • How to Enable Trust, Interoperability, & Shared Credentials
    How to Enable Trust, Interoperability, & Shared Credentials Ora Niknamfard, Product Marketing Manager Security at CA Technologies Recorded: Jun 21 2018 40 mins
    The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
    The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

    • Managing physical access
    • Protecting PII
    • Delivering cross-agency services
    • Revising digital consumer interaction

    In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

    Implementing a digital identity strategy can be complicated. Let CA help.
  • Nailing it! 5 Ways to Win with the NIST Cybersecurity Framework
    Nailing it! 5 Ways to Win with the NIST Cybersecurity Framework Renee Murphy | Forrester & Josh Mayfield | Absolute Recorded: Jun 21 2018 64 mins
    The NIST Cybersecurity Framework (CSF) is the chosen path for thousands of organizations. Why? Because resilience is their most critical need in the face of changing threats, ever-present vulnerabilities, and a sprawling attack surface. NIST CSF provides a blueprint for cyber resilience. But turning theory into reality can be a challenge.

    In this webinar, you’ll drop in on a conversation between our featured guest, Forrester’s Renee Murphy, Principal Analyst for Security and Risk; and Absolute’s Josh Mayfield, Director of Solutions. They will discuss the clear and tangible steps at work within leading organizations pursuing NIST CSF.

    You will gather insights and avoid the pitfalls with your rollout of NIST CSF, including how to:
    1- Identify endpoint devices: on and off network
    2- Validate configurations for optimal data protection
    3- Detect compliance drift within your endpoint population
    4- Respond to endpoint security incidents
    5- Recover from security incidents and iterate for continuous compliance


    Featured Speakers:
    - Renee Murphy | Principal Analyst for Security and Risk Professionals | Forrester
    - Josh Mayfield | Director of Solutions | Absolute
  • How Exclusion Risk Impacts Healthcare Providers and How to Manage It
    How Exclusion Risk Impacts Healthcare Providers and How to Manage It Scott Steinhardt - Kinney Services, Chris Swift, Lockpath Recorded: Jun 21 2018 46 mins
    For healthcare providers that receive Medicare and Medicaid reimbursements, managing exclusion risk is critical. Employees, business associates, suppliers, and more who land on state exclusion lists while employed or engaged by a provider can result in severe regulatory penalties. In this educational webinar, Lockpath and Kinney Services will guide you through the world of exclusion risk and point out what you need to know.

    Attendees will learn:

    * A definition of exclusion risk with real-world examples
    * Challenges encountered with managing exclusion risk
    * Strategies for implementing a consistent, repeatable review process
    * Technology's role in streamlining exclusion risk management

    Are you continually reviewing the exclusion status of employees and business entities? If not or reviews are conducted haphazardly, you run the risk of regulatory penalties and a potential crisis in the reimbursement process. Discover what you need to know to managing exclusion risk in this educational webinar.
  • Customer Driven Features in Hub 4.7
    Customer Driven Features in Hub 4.7 Jeff Michael, Senior Product Manager and Hal Hearst, Principle Product Manager for Black Duck by Synopsys Recorded: Jun 21 2018 43 mins
    Once again, our newest Hub release is packed with features requested by you – our customer! Lead Product Managers for Hub, Hal Hearst and Jeff Michael, will share all the new features. We will dive into:

    -Bulk snippet confirmation
    -BoM hierarchy tree display
    -BoM policy violation comments
    -Cross-project BoM difference comparison
    -Ability to map Hub projects to external application IDs
  • Impersonation Attacks -  The New Email Based Threats, presented by FireEye
    Impersonation Attacks - The New Email Based Threats, presented by FireEye Ken Bagnall, VP, Email Security, FireEye and Levi Lloyd, Sr. Manager, Detection Services, FireEye Recorded: Jun 21 2018 60 mins
    The email threat landscape is changing. Impersonation attacks and malicious URLs are becoming more popular.

    This FireEye webinar features Ken Bagnall, VP Email Security, FireEye and Levi Lloyd, Senior Manager, Detection Services, FireEye who will address changes in email attack tactics:

    • How phishing and impersonation attacks are evolving.
    • How online/email scams develop.
    • What the future of impersonation is.
    • What has the best chance of winning against these attacks.
    • What techniques are used to detect and stop phishing and impersonation attacks.

    Attendees will receive the new FireEye report Changes in Email Attack
    Tactics: Based on Data from July to December of 2017.
  • ¿La continuidad de su negocio está en el aire?
    ¿La continuidad de su negocio está en el aire? RAFAEL ESCALANTE, ITS, Cloud Service Providers, Intel | JUAN JOSÉ GARCÍA, PM, Data Protection, KIO Networks Recorded: Jun 21 2018 37 mins
    Como un seguro de vida, los planes de recuperación ante desastres se adquieren para no usarse. Justo por ello es que un modelo bajo demanda resulta ser la mejor alternativa.
  • Implementing Virtualized Network Encryption to Secure SD-WANs
    Implementing Virtualized Network Encryption to Secure SD-WANs Stan Mesceda, Senior Product Manager at Gemalto and Julian Fay, CTO at Senetas Recorded: Jun 21 2018 60 mins
    Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.

    In this webinar you will learn about:
    •What is the best network fit for virtualized encryption
    •How to implement a virtual network encryption appliance in software-defined network
    •What are the cost, operational and performance benefits of virtual encryption
    •What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4
  • 10 Endpoint Security Problems Solved by the Cloud
    10 Endpoint Security Problems Solved by the Cloud Brian Gladstein, Security Market Strategist, Carbon Black Recorded: Jun 21 2018 47 mins
    Is your team stretched too thin? You aren’t alone. 67% of organizations admit that finding qualified cybersecurity professionals is a struggle. At the same time, attacks are escalating at an alarming rate. In 2017, the number of ransomware attacks increased by 30x and the number of breaches increased by 40%.

    Join us for a live webinar with Brian Gladstein, Security Market Strategist, Carbon Black, who will share how next-generation endpoint security in the cloud can improve your protection and simplify your operations.

    - Learn how cloud-based security platforms are solving 10 common problems IT and security professionals are facing
    - Get your questions answered about replacing traditional antivirus with a cloud-based security
    - Discover how Cb Defense can help you prevent non-malware attacks and simplify your stack
  • Best of Box World Tour Europe 2018 - The Future of Work Together
    Best of Box World Tour Europe 2018 - The Future of Work Together Anthony Tate, EMEA Product Marketing at Box Recorded: Jun 21 2018 31 mins
    Catch the latest and greatest highlights from Box World Tour 2018

    Hear from our head of EMEA Product Marketing at Box, Anthony Tate.

    Let's shape the future of work together!
  • Measuring Policy Effectiveness
    Measuring Policy Effectiveness Michael Rasmussen Recorded: Jun 21 2018 36 mins
    Defining Process & Metrics to Demonstrate Policy awareness and adherence.

    Policies are no good if they are left to be documents that are written and forgotten, stored on a physical or electronic shelf collecting real or digital dust. Organizations need policies that are correctly written, but also clearly understood and enforced in the environment. This webinar looks at the key metrics and process to effectively communicate policies in the environment, track awareness, enforce policies, and monitor metrics of policy adherence.

    Attendees will specifically learn how to:
    •Write policies that are clearly understood
    •Develop a policy communication and awareness plan
    •Demonstrate understanding of policies by individuals
    •Enforce policy compliance/adherence
    •Measure and monitor effectiveness of policies
  • Ask The Experts: Part 1 Using Automation to fight automation
    Ask The Experts: Part 1 Using Automation to fight automation Laurence Pitt, Global Security Strategy Director at Juniper Networks Lee Fisher Recorded: Jun 21 2018 3 mins
    Laurence Pitt, Security Strategy Director at Juniper Networks discuss how cyber criminals are using automation to stay ahead of security experts preventative measures. They're using automation to create malware, resulting in an increasingly regular number of security breaches. Laurence also discusses the need for businesses to automate the simpler aspects of their security processes, to free up time for human intelligence to spot behavioral abnormalities.
  • Pourquoi sécuriser sa messagerie sous Office 365 ?
    Pourquoi sécuriser sa messagerie sous Office 365 ? Laura Peytavin, Sales Engineer, CISSP et Miguel Battais, Account Manager France, Proofpoint Recorded: Jun 21 2018 38 mins
    Office 365 est en France et en Europe une solution collaborative de plus en plus adoptée par les organisations.

    La messagerie fait partie des services déployés en priorité.

    Les clients Office365 sont confrontés à deux soucis majeurs :

    1 Obtenir la meilleure sécurité possible contre les attaques sur les courriels, qui représentent encore aujourd’hui 93% des vecteurs de menaces sur vos données et vos postes de travail,

    2 Conserver une continuité de service lorsqu’Office 365 est indisponible.

    Lors de ce webinaire, nous présenterons entre autre comment Proofpoint, fournisseur de solutions de cybersécurité « people-centric » adresse les défis suivants :

    -Protection des identifiants utilisateurs ciblés par du phishing O365 de plus en plus sophistiqué
    -Contrer la fraude email (attaques au président, FOVI) qui n’est pas traitée par O365, quel que soit l’offre souscrite
    -Donner une visibilité en temps réel des attaques
    -Pouvoir faire des corrélations d’attaques qui deviennent de plus en plus multi-vectorielles (liens vers du partage de fichiers dans le Cloud : Box, OneDrive, SalesForce, Sharepoint, GSuite, etc…)
  • Will data privacy kill innovation?
    Will data privacy kill innovation? Olivier Penel, EMEA Data Management Business Director, SAS Recorded: Jun 21 2018 24 mins
    This session is taken from In:Confidence 2018, where Olivier Penel debated whether privacy will one day kill innovation.

    On one side, the dramatic breakthrough and widespread adoption of Artificial Intelligence (AI) technologies create many opportunities for companies to innovate and to create value with data.

    On the other side, increased privacy concerns and regulations bring new standards and rules in the way personal data should be used.

    His insightful session covered questions such as:

    - What will be the impact of the GDPR on data-driven innovative projects?

    - How can organisations use GDPR as a catalyst to accelerate their digital transformation journey and boost innovation?

    GDPR has now come into effect, but how will it affect innovation moving forwards? Tune in to find out.
  • Collaborative Defense—Bringing Business & Security Together for Resiliency
    Collaborative Defense—Bringing Business & Security Together for Resiliency Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD; Ernesto DiGiambattista, CEO, CYBRIC Recorded: Jun 20 2018 39 mins
    Defending your applications, infrastructure and network is constant in today’s persistent threat environment. Organizations can’t do it alone and the tools of detection, defense and response can no longer work in isolation of each other. Resiliency and collaboration were welcome, consistent themes from RSA 2018 and are reinforced by the innovation coming out of the cybersecurity industry. But what does this really mean for IT, security and development teams day-to-day?

    Join Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD for a discussion on industry direction, the type of collaboration that can yield immediate results to teams and the criticality of protecting application infrastructure.

    Michael Brown is Founder & President, Spinnaker Security LLC, a cybersecurity consultancy focused on understanding, identifying and mitigating business risks associated with cybersecurity. Brown brings executive leadership, including crisis management, from both public and private sector experiences. Prior, he was President, RSA Federal LLC and VP/GM Global Public Sector of RSA Security LLC. Responsibilities also included RSA Information Technology, Security and Enterprise Risk Mgmt portfolios.

    Brown joined RSA after over 31 years in the US Navy. Brown’s last position on active duty was as Dir, Cybersecurity Coordination for DHS, responsible for increasing interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities for the Depts of Defense and Homeland Security. He also served as DHS Deputy Asst Secretary, Cybersecurity & Comms, Acting Asst Secretary, Cybersecurity & Comms and as Asst Deputy Dir Joint Interagency Task Force for the Office of the Dir of National Intelligence. Brown also had various leadership positions, including command of the Naval Information Warfare Activity.
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation
    When the Walls Come Tumbling Down – Network Security for the Cloud Generation Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec Recorded: Jun 20 2018 60 mins
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security

    - The tools you need to provide protection against a variety of attacks

    - Why a proxy belongs at the center of your cloud service

    - Cloud migration strategies

    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • Webinar: Accelerate Technical Sales through Self-Service Demos
    Webinar: Accelerate Technical Sales through Self-Service Demos Pascal Joly, Dir Techology Partnerships, Quali, Matt Branche, Services Lab Engineer, Broadcom Recorded: Jun 20 2018 37 mins
    Featuring: Industry Experts from Broadcom and Quali
    Are you spending too much time prepping demos? Not enough time running killer customer demos? That’s the challenge with demoing complex technology products: they’re hard to setup.

    Join us with industry experts from Broadcom and learn how to create a self-service catalog of demo environments that can serve your sales team effectively, how these environments can be deployed in minutes with built in orchestration, and how to expose "one-click" commands in the sandbox for demoing complex technology products. To be sure, there will also be a live demo :)
  • The Evolving Threat Landscape in the Public Cloud
    The Evolving Threat Landscape in the Public Cloud Fernando Montenegro, 451 Research & Pawan Shankar, Dome9 Security Recorded: Jun 20 2018 51 mins
    Public cloud services are turning information security on its head. Traditional approaches to security that worked well in the datacenter are inadequate in public cloud environments. For example, the growing use of built-in platform services such as Amazon RDS and Amazon Redshift and computing paradigms such as containers and Azure Functions are creating new challenges for security. The public cloud requires a new born-in-the-cloud approach to security.

    In this session, Fernando Montenegro, Senior Analyst on the Information Security team at 451 Research, and Suda Srinivasan, VP of Marketing at Dome9 Security will discuss new security implications and challenges presented by the public cloud and approaches to establish and maintain security and compliance at scale.
  • Collecting Responsive ESI from Difficult Places
    Collecting Responsive ESI from Difficult Places Doug Austin and Tom O'Connor Recorded: Jun 20 2018 66 mins
    Believe it or not, there was a time when collecting potentially responsive ESI from email systems for discovery was once considered overly burdensome. Now, it’s commonplace and much of it can be automated. But, that’s not where all of the responsive ESI resides today – much of it is on your mobile device, in social media platforms and even in Internet of Things (IoT) devices. Are you ignoring this potentially important data? Do you have to hire a forensics professional to collect this data or can you do much of it on your own? This CLE-approved* webcast will discuss what lawyers need to know about the various sources of ESI today, examples of how those sources of data can be responsive to litigations and investigations, and how lawyers may be able to collect much of this data today using intuitive applications and simple approaches. Topics include:

    + Challenges from Various Sources of ESI Data
    + Ethical Duties and Rules for Understanding Technology
    + Key Case Law Related to Mobile Devices, Social Media and IoT
    + Options and Examples for Collecting from Mobile Devices
    + Options and Examples for Collecting from Social Media
    + Examples of IoT Devices and Collection Strategies
    + Recommendations for Addressing Collection Requirements
    + Resources for More Information

    * MCLE Approved in Selected States

    Presentation Leader: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Informatica MDM: Provisioning Tool – A Closer Look
    Informatica MDM: Provisioning Tool – A Closer Look Hazik Afzal, Product Manager, MDM, Informatica, Prash Chandramohan, Director of Product Marketing, MDM, Informatica Jun 22 2018 3:00 pm UTC 60 mins
    Join us for this webinar as we take an in-depth look Business Entity, Business Entity View, and Layout configuration options available in Informatica MDM Provisioning Tool.

    During this webinar, Informatica MDM product experts will cover following topics:

    - Discuss Business Entity concept and review configuration options.
    - Understand Business Entity View and how to create transformations.
    - A walkthrough of the layout design and create data view layouts.
  • Building Your Application Security Toolkit: A Holistic Approach
    Building Your Application Security Toolkit: A Holistic Approach Stephen Giguere, Solution Engineer, Synopsys Jun 22 2018 4:00 pm UTC 60 mins
    Open source management is a key part of any application security toolkit. But with so many different tools and techniques on the market, how can you decide what other tools you need to fully address the security risks of your applications? In this webinar, you’ll learn the benefits and limitations of several application security tools, including SAST, SCA, DAST, IAST, and fuzzing, as well as how they differ, so you can make informed decisions as you build your AppSec toolkit.
  • GDPR is here – What’s next for organisations?
    GDPR is here – What’s next for organisations? Brian Tuemmler, Information Governance Program Architect & Jack McMillian, Technical Project Manager Jun 25 2018 2:00 pm UTC 60 mins
    After months, and years, of talking about it, the 25th May 2018 has come and gone meaning the EU General Data Protection Regulation (GDPR) is now in force. But what does that mean for organisations around the world? They are now faced with having to adjust their business practices to ensure compliance to the legislation given to data subjects – yet in seems that no one is ready or many have underestimated the extent of the organisational changes that lies ahead. We have already seen many news websites be taken offline for European audiences under the GDPR rules and the big player of Facebook and Google already accused of breaching the framework. It is only a matter of time before EU data subjects begin to fully exercise their rights, such as Subject Access Requests (SAR). How could you cope with the pressure of responding to these requests?
    There Is a silver lining. In this webinar, we review some practical steps that your business can take to address GDPR concerns, specifically when dealing with data subject requests.

    Key takeaways:
    •Explore practical steps that businesses can take to address their GDPR data requirements.
    •Discuss the ability to act post-GDPR, where it is never too late to begin building your infrastructure
    •Outline ways to improve costs and man power to address business GDPR issues, such as responding and producing subject access requests.
  • Schutz vor modernen CEO-Fraud-Angriffen: Live-Hack und umfassende Schutzkonzepte
    Schutz vor modernen CEO-Fraud-Angriffen: Live-Hack und umfassende Schutzkonzepte Chris Wojzechowski,Security Researche,Institut für IT-Sicherheit und Markus Grünenerg, Senior Security Strategist, Proofpoint Jun 26 2018 9:00 am UTC 60 mins
    E-Mail-Betrug, auch CEO-Fraud oder BEC (Business Email Compromise) ist weit verbreitet und kostet Unternehmen Milliarden. Dabei ist ein Großteil dieser E-Mail-Angriffe vermeidbar. Diese Bedrohungen beginnen meist mit einer E-Mail, die von einer hochrangigen Führungskraft, aber auch von Partnern oder Lieferanten zu stammen scheint. Diese E-Mail weist Mitarbeiter an Gelder zu überweisen oder sensible Daten zur Verfügung zu stellen. Die Empfänger erfüllen pflichtbewusst die übertragenen Aufgaben, überweisen zb das angeforderte Geld – und lernen erst später, dass sie betrogen worden sind.

    Erleben Sie in unserem Webinar anhand eines CEO Fraud Live Hack, wie leicht Ihre Mitarbeiter dazu gebracht werden, die betrügerischen Anfragen auszuführen. Anschließend zeigen wir Ihnen auf, wie Proofpoint Ihre Mitarbeiter und Ihr Unternehmen anhand eines mehrstufigen Schutzkonzeptes vor derartigen Angriffen schützen kann.
  • Sales Manager - You’re FIRED!
    Sales Manager - You’re FIRED! Nigel Dunand, ISM Fellow Jun 26 2018 10:00 am UTC 60 mins
    Watch this now to get a job managing the marketing department!
    Here’s why: three processes you never built three behaviours you never mastered and three strategies you never implemented.
  • Demystify the cloud: Stay secure in Microsoft Office 365
    Demystify the cloud: Stay secure in Microsoft Office 365 Edward Rowley, Sales Engineering Manager and Tim Ricketts, Principal Sales Engineer Jun 26 2018 10:30 am UTC 45 mins
    Digital transformation and cloud migration brings many benefits to organisations and one of the main drivers for the rapid adoption is the cloud based email service provided by Office 365.
    While leveraging cloud services unarguably enhances productivity, it can still leave your organisation vulnerable to new risks. It is more important than ever for security professionals to ensure full protection against these new risks in real time.

    Join us as we discuss the potential threats and solutions you can implement to ensure protection and productivity. What to expect:

    --Threats: credential phishing, email fraud, targeted attacks etc
    -- Enabling secure digital transformation: people centric security at the heart of the transformation
    -- Solutions: regulatory compliance and tools to implement
  • Cybercrime, Cults and Confraternities: The Evolution of Nigerian 419 Email Scams
    Cybercrime, Cults and Confraternities: The Evolution of Nigerian 419 Email Scams Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Zeki Turedi, Technology Strategist EMEA, CrowdStrike Jun 26 2018 11:00 am UTC 60 mins
    As eCrime has evolved over the past decade, Nigerian cybercriminals have evolved too. 419 scammers or 'Yahoo Boys' running simple Nigerian prince scams have graduated to criminal confraternities conducting sophisticated business email compromise (BEC).

    In 2017 CrowdStrike Services were repeatedly called in to organisations affected by BEC. Although non-technical in nature, the operations yield highly effective results.

    In this webinar we'll share CrowdStrike Intelligence outlining:
    - The techniques, tactics and procedures of these threat actors
    - How BEC affects all geographical regions, involving fraud on multiple continents
    - Steps you can take to protect your organisation
  • Business Strategy requires Data Strategy
    Business Strategy requires Data Strategy Guest speaker Michele Goetz, Principal Analyst at Forrester Research and Rex Ahlstrom, Chief Strategy and Technology Officer Jun 26 2018 3:00 pm UTC 60 mins
    Analytics, machine learning, and artificial intelligence will have a bigger impact on your business strategy. None will be effective without the right data. Therefore when defining your business strategy, it must be aligned with your data strategy.

    This webinar will help your organization find that right combination by demonstrating how:

    • Organizations are aligning data to business strategy
    • New collaboration models accelerate data activation and outcomes
    • Augmenting data management processes with Agile Process scales and accelerates data capabilities
    • Harnessing enterprise tribes overcomes resistance and shadow IT for data
  • Malware versus AI
    Malware versus AI Keith Rayle, Security Strategist, Fortinet Jun 26 2018 4:00 pm UTC 60 mins
    During this presentation, you'll learn about deep learning, the history of artificial intelligence, the history of malware management, and the current approach to eliminating malware threats to the enterprise using AI.
  • Kubernetes Run-Time Security, an Example of Blocking an Application Attack
    Kubernetes Run-Time Security, an Example of Blocking an Application Attack Knox Anderson Jun 26 2018 5:00 pm UTC 30 mins
    Join us for an online demo of blocking an application attack in your Kubernetes cluster.
  • Surgical Threat Mitigation: Sharpen Your Response
    Surgical Threat Mitigation: Sharpen Your Response Paul Roberts, Security Ledger & Brandon Dobrec, LookingGlass Cyber Solutions Jun 26 2018 5:00 pm UTC 60 mins
    Cyber threat intelligence – when properly gathered, refined, and applied – can help organizations identify business risks and target both protections and mitigations. But what distinguishes high-quality and actionable threat intelligence from low-quality security "noise"? How are cutting edge CISOs and IT security teams applying threat intelligence to respond to incidents and slam shut windows of compromise?

    Find out in this webinar moderated by Paul Roberts, the Editor in Chief at The Security Ledger. Paul will be joined by LookingGlass’ Brandon Dobrec, and an industry speaker. Together they will review the value of threat intelligence to organizations, discuss how cutting edge firms are using threat intelligence to their advantage, and review how to orchestrate threat intelligence to automate mitigation and combat third party risk.

    Tune in on Tuesday, June 26 @ 1PM ET!!
  • [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program
    [Earn 1 CPE] Practical Steps to Scale Your Vendor Risk Management Program Rebecca Herold. Panel: Jake Olcott, BitSight; Todd Boehler, ProcessUnity; Matt Kunkel, LogicGate; Scott Schneider, CyberGRX. Jun 26 2018 5:00 pm UTC 75 mins
    As organizations rely on third parties to grow and thrive, they’re exposed to major cybersecurity risks. Mitigating this risk means confronting the potential security vulnerabilities that are present in your third party network, but traditional vendor risk management (VRM) methods are no match for modern threats. According to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Join our panel of experts on this CPE accredited webinar to learn how your organization can create a VRM program that’s ready and able to stand up to today's third party threat landscape.

    Learning objectives:

    - Find out why traditional vendor risk management programs don’t work
    - Learn how to perform quantifiable vendor security analyses
    - Discover how to build a scalable VRM program
  • Next-Level Data Lake Management with the Zaloni Data Platform
    Next-Level Data Lake Management with the Zaloni Data Platform Scott Gidley, VP of Product at Zaloni Jun 26 2018 6:00 pm UTC 120 mins
    The modern, data-rich enterprise demands access to data at a pace that has outclassed traditional data management platforms. Whether they are utilizing a cloud, hybrid, or on-prem solution, these organizations require capabilities that are vendor-neutral and often implemented with microservices to ensure an agile environment at scale.

    In this webinar, Scott Gidley, Zaloni’s Vice President of Product, will showcase the latest version of the Zaloni Data Platform. This version provides exciting new features to address the growing demands of data-driven companies, including:
    - Managing hybrid and multi-cloud environments
    - Managing your data with zones
    - Cloud-native support
    - Ingestion wizard
    - Platform global search
    - Persona-driven homepage
  • Inoculation Against Healthcare Cyber Attacks
    Inoculation Against Healthcare Cyber Attacks RYAN WITT Healthcare Industry Practice Leader and RYAN TERRY Sr. Product Marketing Manager Jun 26 2018 6:00 pm UTC 60 mins
    Though Ransomware was the clear malware du jour for much of 2017, new Proofpoint research focused on the healthcare industry market suggests that this attack vector is subsiding and that healthcare will have to pivot to address a rapidly evolving threat environment.

    Join us for a discussion of:

    - Just released research that outlines healthcare's most likely threat vectors of 2018
    - How to leverage technology to mitigate against the rising tide of email fraud current plaguing healthcare
    - Isolation solutions that allow clinicians to use personal messaging applications WITHOUT compromising the security of the health institution
    - New techniques that allow meaningful cyber awareness training without adversely impacting clinical workflow
  • Judge Peck and the Adventure of the Missing 502(d) Order
    Judge Peck and the Adventure of the Missing 502(d) Order Judge Andrew J. Peck, Michael Simon Jun 26 2018 6:00 pm UTC 60 mins
    It may be the greatest unsolved mystery in the legal practice: the case of the missing 502(d) order. These orders can act as a strong shield against the waiver of privilege or protection when information is inadvertently produced during litigation—providing much more protection than a clawback agreement alone.

    Yet observe the typical courtroom today and such orders will almost never be found. Why?

    Join Judge Andrew J. Peck as he discusses the potential benefits of 502(d) orders, why and how to use them, and why so many lawyers are failing to fully protect client information during litigation.

    About Judge Peck:

    Judge Andrew J. Peck has been a leading name in eDiscovery since 1995, when he was first appointed Magistrate Judge for the Southern District of New York. Just a few months after taking the bench, shortly after O.J. Simpson’s trial concluded and Windows 95 was released, Judge Peck issued a key eDiscovery opinion, ruling that companies must make electronic versions of their computerized data available during discovery.

    In the years that followed, Judge Peck penned several widely influential opinions, from the first opinion approving the use of predictive coding in Da Silva Moore v. Publicis Groupe to a recent warning to the bar over boilerplate discovery objections in Fischer v. Forrest. Judge Peck retired from the bench in March and now serves as senior counsel at DLA Piper.
  • How to Optimally Configure Email Security.cloud
    How to Optimally Configure Email Security.cloud Jimmy Lin, Product Manager, Email Security.cloud, Symantec Jun 26 2018 6:00 pm UTC 60 mins
    In 2018, organizations worldwide are expected to invest up to $93 billion dollars in security solutions to protect their users and data. Yet, most companies are still vulnerable to the latest cyber-attacks and breaches, in no small part due to service misconfigurations. Attackers are looking for systems that have default settings that are immediately vulnerable.

    Join us for our upcoming webinar, and we will:

    1.Take you through the Symantec Email Security.cloud administration console

    2. Highlight the key protection features that every organization should enable to protect themselves against malware, phish and spam emails.

    Take full advantage of the industry’s most complete email security solution by properly configuring your Email Security.cloud solution.

    Register Today
  • Pick Any Three: Good, Fast, or Safe. DevOps from Scratch
    Pick Any Three: Good, Fast, or Safe. DevOps from Scratch Pete Cheslock, Threat Stack’s Head of Ops Jun 26 2018 6:00 pm UTC 45 mins
    If you ask ten people to define DevOps, you’ll likely get a dozen different answers. Somehow it’s 2018 and we still can’t agree on what DevOps is, only what it looks like. The truth is that successful DevOps implementations require hard work over long periods of time.


    DevOps at Threat Stack is a survival mechanism – it’s how we turn ideas into reality quickly and safely. Learn how we design our telemetry system to support useful, actionable metrics and the steps we take to level up our engineers, giving them the necessary accountability to truly own the applications they build.


    Tune in to learn concrete ideas you can take home to improve how work gets done within your organization including:

    - Engineering for rapid change
    - Measuring and optimizing system health
    - Making engineers accountable
  • Vulnerability Analytics : The Visual Language of Vulnerability Management
    Vulnerability Analytics : The Visual Language of Vulnerability Management Syed Abdur, Brinqa, Director of Product and James Walta, Brinqa, Sales Engineer Jun 26 2018 7:00 pm UTC 60 mins
    Join us for this webinar as we discuss the visual language necessary to communicate with all the varied stakeholders that are impacted by or part of the vulnerability risk management process: business users, application owners, IT administrators, security professionals, compliance regulators, and others.
    We will discuss the data analysis necessary to create and communicate different types of metrics, including :

    Business Exposure: What risks are different business entities exposed to due the vulnerabilities?

    Vulnerability Impact: How do different technologies and various types of vulnerabilities contribute to risk?

    Remediation Performance: How effective and efficient are current remediation efforts?

    And More...
  • Raising the Bar on Device Classification
    Raising the Bar on Device Classification Len Rosenberg, Vice President Engineering, ForeScout Technologies Jun 27 2018 2:30 am UTC 60 mins
    The device landscape on enterprise networks has evolved from a static set of laptops, workstations and servers to a diverse mix of mobile, BYOD, IoT and OT devices, as well as virtual machines. Many of these devices are transient and come and go with increasing frequency. Without continuous visibility and classification of connected devices, it’s impossible to establish an accurate device inventory or an in-depth understanding of device risk profiles. This visibility gap is being targeted by bad actors to gain a foothold on the network and access sensitive information or cause business disruption.

    Join us to learn how the ForeScout platform helps organizations classify devices across their extended enterprise. Gain insight into the new capabilities of CounterACT 8, including:

    • Real-time, granular auto-classification of enterprise devices without relying on agents
    • Device profile updates from ForeScout Device Cloud, a crowd-sourced repository of IoT device insight from more than 500 real-world customer environments
    • Extending built-in classification capabilities to create your own custom classification policies
  • Achieve Your Security Goals with Inline Prevention Tools
    Achieve Your Security Goals with Inline Prevention Tools Ian Farquhar, Distinguished Engineer, Security, Gigamon Jun 27 2018 4:00 am UTC 60 mins
    Inline security tools operate by actively preventing threats in your network, but deploying and optimizing these tools presents several challenges to both network and security engineers. The downsides can include a potential point of failure, degradation of network and application performance, difficulty to scale and upgrade. The use of a next-generation packet broker and its inline bypass functionality can mitigate these challenges. Join Gigamon and (ISC)² on Jun 27, 2018 (Wed) at 12:00 noon (Singapore Time) to examine how inline bypass can overcome physical deployment obstacles, maximize network availability, increase the scale of inspection and reduce the impact to network performance.
  • Why Visibility is Key to GDPR
    Why Visibility is Key to GDPR Adrian Rowley, EMEA Technical Director at Gigamon Jun 27 2018 8:00 am UTC 45 mins
    The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.

    Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.

    In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:

    - Eliminate monitoring blind spots
    - Vastly improve the accuracy and precision of data risk detection
    - Help organisations meet the GDPR challenge

    About the Presenter

    Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
  • Why Brexit will hurt productivity in Financial Services the most...
    Why Brexit will hurt productivity in Financial Services the most... Mark Elwood - Marketing Director, TeleWare Jun 27 2018 10:00 am UTC 60 mins
    ... and the technologies that will prevent it.

    Join this webinar to hear how technology is creating a mobility enabled workforce to increase productivity in financial services and the lessons other sectors can learn.

    In the words of Nobel Laureate Paul Krugman ‘productivity isn't everything, but in the long run it is almost everything.’

    Creating a modern workforce that has access to the technology that will improve productivity is key to ending the productivity crisis. TeleWare, working with Financial Services clients are helping create a mobile enabled workforce designed to improve productivity. These lessons can be adopted in many vertical sectors, particularly in a post GDPR and Brexit world.

    Find out:
    • Why you should be focusing on increasing productivity in your business
    • How enabling your employees to use the latest technology with no cost to your business can improve employee satisfaction and create growth
    • Why mobility is the secret weapon in the fight against stagnant productivity growth
    • Which technologies you should be thinking about to create a mobility enabled workforce

    Target Audience:
    • Finance, Retail, Professional Services, Manufacturing, Construction, Health
    • UK & Ireland
    • SME – Enterprise
    • IT, Operations role profiles

    Join us for this insightful webinar that explores the technologies firms are adopting to help increase productivity and to beat their competition.
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation
    When the Walls Come Tumbling Down – Network Security for the Cloud Generation Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic EMEA Jun 27 2018 1:00 pm UTC 60 mins
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security

    - The tools you need to provide protection against a variety of attacks

    - Why a proxy belongs at the center of your cloud service

    - Cloud migration strategies

    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today