Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • A New Horizon in the Digital Age: Open Banking, PSD2 and UMA
    A New Horizon in the Digital Age: Open Banking, PSD2 and UMA Johan Fantenberg and Adam Biviano, Senior Solution Architects, ForgeRock Recorded: Mar 20 2018 57 mins
    Today’s customers expect tech-savvy, efficient and proactive services that fit conveniently into their digital lives. To meet these expectations, organisations are now competing as digital businesses, offering unique, personalised services that are available from any device – all whilst maintaining security and compliance requirements.

    Join us on this webinar to learn how identity management can enable you to take the lead in today’s competitive digital landscape:
    · The evolving customer, regulatory and business requirements
    · The impact of PSD2, GDPR and Open Banking
    · How to ensure privacy and consent with UMA
  • Unpacking the Hype: What do the new privacy laws really mean to your business?
    Unpacking the Hype: What do the new privacy laws really mean to your business? Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan Recorded: Mar 20 2018 60 mins
    With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.

    Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.

    " Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
    " Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
    "Understand how these regulations can enable you to gain trust and enhance customer experiences
  • Our Cyberthreat Landscape: why collaboration is key
    Our Cyberthreat Landscape: why collaboration is key Nahim Fazal and Ramón Vicens Recorded: Mar 19 2018 58 mins
    As the ‘public profile’ of cybercrime continues to increase, enterprises are encouraged to look at how they keep their businesses and customers safe by sharing intelligence, best practice and defense measures.

    Join Nahim Fazal, Head of Cyberthreat Intelligence at Blueliv, for a webinar reflecting on the incidents and trends discussed in Blueliv’s annual cyberthreat report, and guidance on how organizations of all sizes can protect themselves in an ever-more sophisticated threat landscape.

    The report combines intelligence gathered through Threat Compass with insight from the Blueliv analyst team, leading to informed assessments about the current state of play and areas which require immediate attention.

    Register today to reserve your spot.

    Blueliv is leading a new wave of proactive, real-time threat monitoring that protects organizations from the outside in, radically reducing attack success rates and improving incident response performance through fresh, actionable intelligence. The in-house team is bolstered by the Blueliv Threat Exchange Network, a global community of thousands of security experts united in the fight against cybercrime.
  • Meet Box GxP Validation: Regulated and unregulated content now in the same cloud
    Meet Box GxP Validation: Regulated and unregulated content now in the same cloud Riju Khetarpal, Life Sciences Managing Director, Box & Manu Vohra, Life Sciences Vice President, Content Management, USDM Recorded: Mar 19 2018 58 mins
    To quickly bring life-saving therapies to market, the drug development process relies on secure collaboration across the extended enterprise. However, organizations find that today's legacy content management systems lead to silos between their regulated and unregulated content.

    With Box GxP Validation, pharma and life sciences companies can now validate Box so they can collaborate on, manage and distribute regulated clinical, lab and manufacturing content in Box. That means all of your content is standardized on a single content platform that meets regulatory and compliance standards, so you can eliminate inefficient silos, enable seamless collaboration and accelerate the validation process.

    Join our webinar to learn how to:
    - Leverage Box for your GxP content — such as collaborating with CROs — and consolidate expensive GxP-specific systems
    - Cut validation time in half and save up to 75% in validation costs with always-on testing
    - Meet CFR Part 11 requirements by integrating Box with e-signature providers, such as DocuSign

    Hear about this new game-changing model for maintaining GxP compliance in the cloud with Riju Khetarpal, Life Sciences Managing Director at Box, and Manu Vohra, VP of Content Management at USDM Life Sciences.
  • Mitigating Risk Outside the Firewall Needs a Strategy: Start with Risk Reporting
    Mitigating Risk Outside the Firewall Needs a Strategy: Start with Risk Reporting Edward Amoroso – TAG Cyber Founder & CEO, Vamsi Gullapalli – RiskIQ Product Manager, Sam Curcuruto – RiskIQ Product Marketing Recorded: Mar 16 2018 45 mins
    For most security professionals, fixing vulnerabilities and security gaps can feel like a game of Whack-a-Mole. New threats come online; new weaknesses are exploited, old gaps are exploited, new vulnerabilities are disclosed. The process is challenging to manage and prioritise. But a strategy that includes automated, up-to-date analysis of your security posture, especially as it relates to internet-exposed assets can help calm the storm.

    In this webinar, we cover how a CISO professional looks at risk as it relates to your digital footprint, and how RiskIQ’s Risk Reporting is different from other Risk Scoring and Risk Reporting solutions. We also cover essential perspectives, methods, and capabilities that are important for any digital threat management programme.

    Join us for our webinar to learn more from Edward Amoroso, former CISO of AT&T and current CEO of TAG Cyber as he offers his advice on a comprehensive Outside the Firewall strategy.
  • GDPR : plus que 2 mois
    GDPR : plus que 2 mois Symantec Recorded: Mar 16 2018 47 mins
    Il ne vous reste que quelques mois avant l’entrée en vigueur du GDPR. Que pouvez-vous faire dès aujourd’hui pour mieux vous y préparer ? Animé par Patrice Payen, Team leader Risk, Compliance & GDPR, et Hervé Doreau, Directeur Technique, ce webcast a pour but de vous aider à évaluer votre degré de préparation et vous indiquer les mesures à prendre avant la date butoir du mois de mai.

    Avant d’assister à ce webcast, faites le point avec l’évaluation d’IDC. Elle vous montrera où vous en êtes dans votre préparation au GDPR. http://symantecgdpr.idcready.net/fr/?utm=sLVdLk56zk
  • Produktinformationen als Grundlage für erfolgreiche Digitalisierung im Handel
    Produktinformationen als Grundlage für erfolgreiche Digitalisierung im Handel Vita Berneburg - Informatica GmbH, Marc auf der Mauern - Bayard Consulting Recorded: Mar 16 2018 31 mins
    Die Digitalisierung im Handel stellt Unternehmen vor gänzlich neue Herausforderungen.

    Notwendig ist eine Digitalisierungsstrategie, die Ihre Geschäftsprozesse effizient und bedarfsgerecht digital gestaltet.

    Genau hier unterstützt Product Information Management (PIM).

    Mit der führenden PIM Lösung von Informatica können alle weiterführenden Prozesse auf Ihre Unternehmensstrategie und –ziele abgestimmt werden. Ihre Metriken und KPI´s können definiert und gemessen werden und tragen so automatisch zur Optimierung Ihrer gesamten Wertschöpfung bei.

    Ihre Organisation und Prozesse werden ganzheitlich und von Beginn an in die digitale Umsetzung gebracht.

    In unserem 30-minütigen Webinar, das wir gemeinsam mit unserem Partner Bayard Consulting durchführen, zeigen wir typische Herausforderungen und Best Practices sowie passende Lösungen für Ihre Digitalisierungsstrategie.
  • Exclusive Q&A session : APT37
    Exclusive Q&A session : APT37 Benjamin Read, Senior Manager, Cyber Espionage at FireEye Recorded: Mar 16 2018 19 mins
    An exclusive 30-minute Q&A session with the presenter, Benjamin Read, Senior Manager, Cyber Espionage at FireEye

    Learn more about:
    •APT37’s historic support of North Korean interests.
    •Details on the malware suite employed by the actor.
    •Why APT37 is an emerging threat beyond the Korean peninsula.
  • APT37北朝鮮ハッカーの脅威分析 ウェブセミナー
    APT37北朝鮮ハッカーの脅威分析 ウェブセミナー Takeharu Yamaguchi Senior Director, Mandiant Consulting – Japan and Korea Recorded: Mar 16 2018 43 mins
    セキュリティご担当者 各位

    ファイア・アイでは、2015年からこのAPT37 をTEMP.Reaperとして追跡しており、彼らの手法やターゲットについてより深く理解するに至っています。

  • Boost Cyber Security with Human Augmented Machine Learning
    Boost Cyber Security with Human Augmented Machine Learning Matthew Thurston, Chief Architect - Arctic Wolf Networks Recorded: Mar 15 2018 48 mins
    Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

    In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

    We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

    After attending, you will be able to:

    - Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
    - Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
    - Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

    About our guest speaker:

    Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.
  • Risk-Centric Security in a World of Innovation
    Risk-Centric Security in a World of Innovation Lee Waskevich, VP, Security Solutions, ePlus; Mitchell Bezzina, Security Evangelist, SecDo Recorded: Mar 15 2018 62 mins
    This webinar will detail how to apply AI and automation to assist security team members, from CISOs to SOC/IR operators, allowing the team to become proactive in defense and best serve the new needs of innovative companies. We will cover:

    o Considerations of implementing automation without an increase in workload

    o How to reduce risk by 98% with current staff and no longer "overlooking" a de-prioritized or quarantined alert

    o What it takes to go from alert triage to incident response and remediation in less than 10 minutes

    o How to become proactive in defense by utilizing knowledge from investigations to increase network defense

    o An ROI template allowing you to justify costs for new budget
  • DevOps: Security Challenges and Solutions
    DevOps: Security Challenges and Solutions Natasha Gupta, Product Marketing Manager and Brian Anderson, Principal Security Engineer Recorded: Mar 15 2018 46 mins
    What is DevOps, and what does it mean for security? In this session, we’ll talk about trends driving adoption of DevOps, and what are the security challenges posed by automated, API-driven frameworks and agile application development. We’ll then jump into a demonstration of how Imperva SecureSphere can be leveraged in a DevOps environment to provide state of the art protections against application attacks.
  • Navigating Reserved Instances in Public Cloud Providers
    Navigating Reserved Instances in Public Cloud Providers Bobby Allen, CloudGenera CTO Recorded: Mar 15 2018 52 mins
    Several major public cloud providers now have reserved pricing. Which reserved services are worth the investment for your business? How much of a discount do reserved services typically offer?
  • Web Applications: Secure Your Most Exposed Attack Surface w/ Brinqa & Netsparker
    Web Applications: Secure Your Most Exposed Attack Surface w/ Brinqa & Netsparker Syed Abdur, Brinqa, Director of Product & Ferruh Mavituna, CEO, Netsparker Recorded: Mar 15 2018 64 mins
    Web applications are a prime target for hackers. According to the Verizon DBIR 2017 report, web application attacks were the #1 source of data breaches in the past year. With increasing attacker sophistication and a growing web application footprint for most businesses, investing in the cutting edge of web application vulnerability detection and remediation is crucial.

    Two technologies leading the charge are NetSparker and Brinqa.Netsparker is a scalable and dead accurate enterprise web application security solutions that enables businesses to easily identify vulnerabilities in web applications and APIs.Brinqa is a cyber risk management platform that helps security professionals triage and remediate application vulnerabilities in context of likelihood of weaponization and impact to business.

    In this webinar we discuss how these two innovative technologies work together to create a comprehensive web application security program that helps AppSec programs identify, prioritize, remediate and report the most imminent and impactful vulnerabilities in your organization's software infrastructure.
  • Using Prometheus Metrics for Monitoring Containers
    Using Prometheus Metrics for Monitoring Containers Eric Carter & Jorge Salamero Sanz Recorded: Mar 15 2018 50 mins
    Open source Prometheus is designed to help you monitor the performance and health of containers and application stacks in microservices deployments. It provides a wealth of metrics exposed via Prometheus endpoints for a wide range of applications and infrastructure components. Applications developers love Prometheus as it helps them see how their code behaves – especially as things move from development into production. Operations teams benefit as well by gaining insight into system performance and identifying anomalies during runtime.

    If you’re just getting started with containers or Prometheus, or if you’re looking for ways to optimize an existing deployment, join us to learn how Prometheus metrics can be best utilized for monitoring container-based microservices environments.

    In this webinar we’ll discuss and demo:

    -Methods for instrumenting your environment to collect and use -Prometheus metrics and time-series data for visibility into your application infrastructure
    -Correlating Prometheus and other metric types with like Kubernetes orchestration metadata to monitor service-oriented environments
    -How to build effective dashboards for keeping watch over critical systems and information running in development and production
    -Using Prometheus metrics to detect, alert, troubleshoot and resolve common scenarios you will face in your container-based cloud
  • How to Tackle Data Protection Risk in time for GDPR Compliance
    How to Tackle Data Protection Risk in time for GDPR Compliance Sunil Choudrie: Information Protection Strategist, Deena Thomchick: Sr. Dir. Product Mgmt, Steven Grossman: VP Bay Dynamics Recorded: Mar 15 2018 62 mins
    Leveraging state of the art technology to help you find personal data, spot risky users, and respond to incidents

    The General Data Protection Regulation (GDPR) sets a new standard in data protection that will impact not just EU, but global organizations. With the GDPR start date quickly approaching, organizations face plural priorities; how to stay on top of their existing security program, while building – and implementing - a compliance strategy by May 2018.

    The keys to success? First, ensuring you understand the data protection risks you face. Second, using state of the art technology to both reduce risk and free up your security team.

    Join us on March 15th to learn how to leverage state of the art technology to build an efficient data protection risk management strategy.

    During this session, you will learn:

    -Why good risk management and data-centric protection go hand in hand

    -How leading technology helps you discover, monitor and protect personal data, wherever it is

    -Using data analytics to detect, quantify, and prioritize insider threats and outsider risks

    -How to free up your security team by removing unnecessary alerts and distractions

    Please join us, register today
  • "Assessing the Impact of Web-Based Attacks" - a CFR exam topic
    "Assessing the Impact of Web-Based Attacks" - a CFR exam topic Stacey McBrine, CISSP, CASP, CFR, CEI, CEH, ECSA, CHFI, CCNA, CCSI Recorded: Mar 15 2018 62 mins
    The second part of this webinar will cover the topic "Assessing the Impact of Web-Based Attacks" from the "Analyzing Attacks on Computing and Network Environments" module of the official CFR course.

    Before we get to this, the introduction will include an overview of the CyberSec First Responder (CFR) course and certification from Logical Operations. The CFR course prepares IT professionals with the knowledge, ability, and skills necessary to defend information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes.

    The practicality and value of the certification including its DOD 8570 approval will be highlighted.


    - Learn about how the CFR certification from Logical Operations can improve your organization’s information security defensive readiness, response capabilities and investigation to cover all aspects of incident response and analysis including before, during and after the incident.
    - Learn why CFR is one of the most practical security certifications available providing excellent ROI
    - Learn about types of web based attacks and their impact on your organization
    - Learn through using OWASP ZAP to scan a vulnerable website
    - Learn by exploiting a vulnerable website using SQL injection and XSS
    - Learn about how to get discounted exam vouchers


    Stacey McBrine has more than 30 years’ experience analyzing, securing, designing and implementing such diverse systems as Microsoft Windows, Novell Netware, DEC VMS, IBM AIX, Solaris, SCO Unix, Linux, and MAC O/S and Cisco switches, routers and firewalls. He served as systems analyst for many software development projects using assembly language, C, dBase, Access, Visual Basic and Oracle.
  • Preparing for GDPR Compliance and Measuring Governance
    Preparing for GDPR Compliance and Measuring Governance CA Technologies hosts: Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor Recorded: Mar 15 2018 48 mins
    Today, it’s estimated that 80% of companies are not prepared to comply with GDPR. The most challenging use cases are managing portability, conducting certification campaigns, and overseeing data access approval. Are you ready?

    Join CA Technologies hosts, Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor as they review:

    • How compliance requirements align with legislation
    • What data collection and analysis are required
    • Informative case studies on GDPR readiness

    What’s more, we’ll demo a dashboard for the Data Protection Officer to use for compliance reporting .
  • CISO Perspective: How to Prepare for GDPR
    CISO Perspective: How to Prepare for GDPR Sacha Dawes, Principal Product Marketing Manager, AlienVault Recorded: Mar 15 2018 62 mins
    The GDPR, or General Data Privacy Regulation, will come into force on 25 May 2018 and requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance. If you don’t already have the required security tools and controls in place, your organization will need to start planning now to achieve compliance and mitigate the risk of high fines for failing to comply.

    That's where AlienVault can help. In this webcast, AlienVault CISO John McLeod will provide insights into how AlienVault has approached the GDPR compliance process internally, along with how our Unified Security Management (USM) platform can help accelerate and simplify your path to compliance.

    Join this webcast to learn:

    - Best practices for approaching GDPR compliance
    - How to assess your level of readiness and build your roadmap to compliance
    - How a unified security toolset can both expedite and simplify this process

    We'll also provide a brief demo of the USM platform to illustrate some of the technical controls you need in place TODAY for compliance.

    Hosted By
    Sacha Dawes
    AlienVault Principal Product Marketing Manager

    Sacha joined AlienVault in Feb 2017, where he is responsible for the technical marketing of the AlienVault Unified Security Management (USM) family of solutions. He brings multiple years of experience from product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he has delivered both SaaS-delivered and boxed-product solutions that address the IT security, identity and management space. Originally from the UK, Sacha is based in Austin, TX.
  • 2018 Data Threats - What will it take to stop the breaches?
    2018 Data Threats - What will it take to stop the breaches? Garrett Bekker, Principal Analyst, 451 Research Recorded: Mar 15 2018 57 mins
    Digital transformation initiatives and increased threats have put enterprise data at risk more than ever, with 67% already experiencing a breach, and over half of those breaches in the last year. In this webinar Garrett Bekker, Principal Analyst for Information Security at 451 Research, details critical findings from the 2018 Thales Data Threat Report around the rise in data breach rates, what IT security pros around the world are doing to respond, and best practice recommendations for how to keep from becoming another statistic.
  • TechTalk: Live Demo EMEA
    TechTalk: Live Demo EMEA Scott Fyffe, Sales Engineer Manager - EMEA Recorded: Mar 15 2018 35 mins
    You've heard about the many ways CloudCheckr can help keep your cloud in check. Now you can see CloudCheckr in action, including demos of our 500+ Best Practice Checks, our Cost Savings Reports and Right-Sizing tools, and our security & compliance features.

    In this webinar, you can view and ask questions as Scott Fyffe demonstrates popular features of this award-winning platform.
  • Artificial Intelligence in Cyber Warfare: A Primer
    Artificial Intelligence in Cyber Warfare: A Primer Michelle Cantos, Strategic Intelligence Analyst, FireEye Recorded: Mar 15 2018 55 mins
    Artificial intelligence (AI) is a transformative dual-use technology that can provide organizations with better cyber defense tools and help adversaries improve methods of attack. A better understanding of the current and potential future capabilities of AI will help users see how related emerging technologies can affect their business.

    Join Michelle Cantos, Strategic Intelligence Analyst, for the first installation of our three-part webinar series to:

    • Understand the fundamentals of AI, the differences between various techniques used to process data and the drawbacks to each approach.
    • Discuss how AI tools can be used for offensive and defensive purposes in the cyber domain.
    • Survey the future threat landscape and provide geopolitical context regarding how nations (U.S., Canada, Russia, China) will use AI tools given their current levels of technological development and AI integration in civilian applications.

    Be sure to register for part two of the three-part series “The Role of Artificial Intelligence in the Cyber Domain” - https://www.brighttalk.com/webcast/7451/307729
  • Overcoming Objections through Creating Certainty
    Overcoming Objections through Creating Certainty Paul Blair Mar 20 2018 11:00 am UTC 60 mins
    I will share my thoughts on how we overcome a lot of objections by creating certainty around our products/services, us and our companies. Increase credibility, position ourselves as the expert or authority figure to gain control of an inquiry so we may find it easier to close. I will also look at how this will have a positive impact upon your prospect.
  • The Rise and Rise of Ransomware: Prepare and Protect
    The Rise and Rise of Ransomware: Prepare and Protect Nick Frost, Principal Consultant, ISF Mar 20 2018 1:00 pm UTC 45 mins
    The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

    With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

    In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

    About the presenter:

    Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
  • As Attackers Evolve, So Must Machines:Advancing Machine Learning Beyond the Hype
    As Attackers Evolve, So Must Machines:Advancing Machine Learning Beyond the Hype Adrian Davis, Director of Cybersecurity Advocacy, (ISC)² EMEA, Jon Ross, Director of Engineering, Carbon Black Mar 20 2018 1:30 pm UTC 60 mins
    The demand for machine learning (ML) in security is growing fast. There are countless approaches, but there’s also a lot of hype. This webinar provides a frank assessment of the strengths and weaknesses of static analysis, decompilation, detonation, in-context analysis, artificial intelligence and other emerging approaches, all grounded in real-world examples and specific algorithmic details.
  • Best Practices for the prevention of SaaS threats
    Best Practices for the prevention of SaaS threats Anuj Sawani, Product Marketing Manager, Palo Alto Networks Mar 20 2018 2:00 pm UTC 60 mins
    Almost every line of business within enterprise organizations has adopted SaaS apps to be more productive and successful. Meanwhile, IT organizations are embracing SaaS apps by approving them for company-wide use, in part to regain control of these applications and the data residing within them. This transition often prompts questions from security teams: Who has access to the data? Is sensitive data at risk? Are my users exposed to malware in my SaaS application?

    Join this webinar where you will learn:
    •Best practices to build a strategy for securing your SaaS environment
    •Real-world examples of risks seen in enterprise SaaS environments
    •Steps to protect against the new threats and prevent data exposure
    •How to comply with data residency regulations within Europe
  • Live Webinar: Integrierte Buchung & Reisekostenabrechnung
    Live Webinar: Integrierte Buchung & Reisekostenabrechnung SAP Concur Jochen Alig Senior Solutions Consulting Stas Litau Inside Sales Representative Mar 20 2018 2:00 pm UTC 45 mins
    Aufwendige Reisekostenabrechnungen auf Papier oder in Excel-Tabellen gehören in Unternehmen der Vergangenheit an. Erfahren Sie, warum Automatisierung die Lösung auch für komplexe Reisetätigkeit ist.
  • The State of Cyber Resiliency in the Age of Attacks
    The State of Cyber Resiliency in the Age of Attacks Dave Klein (GuardiCore) | Craig Dods (Juniper) | Troy Vennon (Columbus Collaboratory) | Jeannie Warner (WhiteHat Security) Mar 20 2018 3:00 pm UTC 60 mins
    Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.

    Join this panel of experts as they discuss:
    - The biggest trends in cyber crime
    - Impact of Cryptocurrencies
    - Breaches and preventing future fraud and cyber attacks
    - Advancements in security technology
    - Why security awareness training should be a key part of your overall data protection strategy

    - Dave Klein, Senior Director Security Engineering and Architecture at GuardiCore
    - Craig Dods, Chief Architect for Security, Juniper Networks' Strategic Verticals
    - Troy Vennon, Cyber Threat Engineer, Columbus Collaboratory
    - Jeannie Warner, Security Manager, WhiteHat Security
  • Guide to Protecting Your People & Safeguarding Your Business from Ransomware
    Guide to Protecting Your People & Safeguarding Your Business from Ransomware Richard Davis, Director Cybersecurity Strategy and Patrick Wheeler, Director of Threat Intelligence Mar 20 2018 3:00 pm UTC 45 mins
    The evolving threat of ransomware is more dangerous than ever and is here to stay! In early 2017, ‘Wannacry’ and ‘Petya’ created havoc and made it to mainstream media. Even more recently, in Q4 2017, ransomware remained the top payload distributed by malicious messages accounting for 57% of all malicious message volume. Showing no signs of abating, cybersecurity professionals must reassess their ransomware-readiness. The best protection from ransomware is to stay informed and learn what critical safety measures your organisation can take to prevent such an attack from occurring.

    Join this webinar for an overview of:

    - How ransomware works and the latest attacks
    - The most common challenges organizations face in combating ransomware
    - Strategies for mitigating ransomware attacks of all varieties
  • How To Identify And Measure Your Strategy Execution Risk
    How To Identify And Measure Your Strategy Execution Risk Jorge Tabacman Mar 20 2018 4:00 pm UTC 60 mins
    What sank the Titanic and is sinking some of our great companies? What will separate future winners from losers?

    50% of the Fortune 500 companies in the year 2000 do not longer exist because they were not able to measure and predict their strategy execution risk and link their decisions to the results of their decisions.

    By the end of the webinar you will be in a better position to identify the risk to your strategy execution and understand why identifying and measuring your strategy execution risk must be an important component of your operational risk.

    The webinar is based on the SIMMETHOD risk and performance methodology and C-suite risk alerts, a top 10 innovation product from the Department of Trade in NSW Australia with top 1% views in LinkedIn’s Slideshare and frequently consulted by over 300 global Universities.

    In spite of Billions of dollars spent on Enterprise Risk Management and analytics, why do companies continue to fail or miss their targets? Can industrial era metrics mislead you into the incorrect decisions?

    According to IBM’s CFO Insights, 53% of CFOs think that they are not effective at measuring and managing performance and according to Deloitte, one of the top CFO concerns is predicting execution missteps.

    According to John Chambers, Cisco’s Chairman, 70% of the S&P 500 will attempt digital transformations during the next years but only 30% will succeed? Why?

    The missing ingredient

    Although the C-suite is aware that digital transformations entail new processes, management procedures, information systems and customer relationships, we continue to use industrial era metrics that were designed for a business environment that does not longer exist. And… in digital transformations, the way you measure will determine your results.

    Additionally, the webinar will assist you to identify C-level metrics linked to the Best In Class and develop a bridge between you and your C-suite via holistic and industry agnostic actionable indicators.
  • Is Ransomware the New Normal?
    Is Ransomware the New Normal? Ulf Mattsson, Lance James, Barak Engel, David Morris Mar 20 2018 5:00 pm UTC 60 mins
    Ransomware was the word on everybody’s mind in 2017 with Petya, WannaCry and more. Will this continue into 2018? And if so, how can you ensure your business is protected from the threat of ransomware?
    This session will cover:
    - An overview of how Ransomware works.
    - Can you realistically prevent Ransomware from infiltrating your organization?
    - What can you do to protect yourself from an attack?
  • Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation
    Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation Naveen Palavalli, Director, Product & GTM Strategy & Anant Vadlamani, Principal Product Manager, Symantec Corporation Mar 20 2018 5:00 pm UTC 60 mins
    Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

    This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

    Join us to learn how Symantec Email Security can:

    - Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.

    - Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.

    - Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.

    - Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.

    In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.
  • Build AI and ML in the Cloud and Reduce IoT Solution Costs with Azure IoT Edge
    Build AI and ML in the Cloud and Reduce IoT Solution Costs with Azure IoT Edge Arjmand Samuel, Principal Program Manager , Microsoft; Chipalo Street, Senior Program Manager, Microsoft Mar 20 2018 5:00 pm UTC 75 mins
    In today’s connected world, devices and data can be found far outside traditional data centers or offices, in places like oil wells, hospitals or factory floors. For these businesses, connectivity can be expensive and unreliable and get in the way of implementing effective IoT solutions.

    Azure IoT Edge is a service that allows cloud intelligence to run on your IoT devices locally. With Azure IoT Edge, you can deploy cloud workloads such as Artificial Intelligence, Azure Machine Learning, Azure Stream Analytics, Azure Functions or custom code via containers directly on your IoT device to enable real-time insights.

    Curious to learn more? Join us in this webinar, presented by IoT engineering experts, to learn:

    - Why and when you should use edge computing as important part of your IoT solution
    - How to get started with Azure IoT Edge
    - How to create and deploy containers using IoT Edge portal
    - Securing your edge devices and solution
  • Focus on the Right Stuff – Agile Metrics Matter
    Focus on the Right Stuff – Agile Metrics Matter Andy Jordan, Project Management.com Mar 20 2018 5:00 pm UTC 60 mins
    There could be many reasons why you started down your Agile journey. There will be many more reasons why you continue with that journey today and in the future. But ultimately you have to deliver meaningful business results, and that requires you to validate your achievements and adjust as needed.

    In many organizations this requires change. You might not be measuring the most important factors, which could result in a misunderstanding of the value of Agile.

    Join ProjectManagement.com SME and industry expert Andy Jordan to discuss:

    -The importance of tying Agile performance to business results
    -Establishing the right, business focused metrics
    -How customer focused metrics drive business performance
    -The need to evolve and mature your metrics over time

    As always in one of Andy’s webinars he will not only make you think and challenge your assumptions, he will provide a tangible plan to help you take the concepts of effective metrics and measurement into your organization to drive even greater Agile success.
  • Surviving the Ransomware Plague
    Surviving the Ransomware Plague Orli Gan, Head of Product Management and Product Marketing, Threat Prevention, Check Point Software Mar 20 2018 6:00 pm UTC 45 mins
    Ransomware reached epidemic proportions in 2017. Organizations of all sizes and sectors fell victim to malware that locked down, encrypted – and in some cases threatened to destroy – critical systems and data.

    - How does your organization avoid becoming tomorrow’s headline?
    - How can businesses continue to operate without disruption despite this looming threat?

    Learn how Check Point Anti-Ransomware technology protects against every type of ransomware attack, ensuring continuous access to your data.
  • Three Minutes Until the Apocalypse
    Three Minutes Until the Apocalypse John Bradshaw, Director, Solutions Engineering, Acalvio Mar 20 2018 6:00 pm UTC 45 mins
    Three minutes. In general, front-line security operations analysts have three minutes to evaluate an alert on their front pane of glass and determine if it warrants further investigation or can be dismissed as "not impactful to the organization". Your analysts must be right every single time in order to prevent a breach that could cost millions of dollars, the adversary - they only need to be right one time.

    This session will illustrate:

    - How SOC / IR teams can utilize high-fidelity alerts such as those generated by Deception-based solutions.
    - Power of correlation and data analytics to reduce the time it takes to answer basic triage questions on an alert.
    - How to develop actionable visualizations that improve the hunt for adversaries in your network.
  • Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For
    Fighting Cybercrime: Discover the Top 5 Attack Vectors to Watch For Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Mar 20 2018 7:00 pm UTC 60 mins
    With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

    In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

    After attending you will:

    - Recognize what are the top 5 attack vectors and the counter-measures you can take
    - Understand the importance of detection and response in the kill-chain for each attack vector
    - Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

    Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.
  • Cómo Scale-Out resuelve los dolores de cabeza del almacenamiento secundario
    Cómo Scale-Out resuelve los dolores de cabeza del almacenamiento secundario Ivan Abad - Director Técnico Iberia Mar 21 2018 8:30 am UTC 45 mins
    Muchos departamentos de TI no se dan cuenta de que más del 70% de sus datos vive en almacenamiento secundario. Pero conocen de primera mano los dolores de cabeza asociados con el enfoque scale-up para lidiar con el crecimiento de ese almacenamiento y la necesidad de migrar a sistemas cada vez más grandes a medida que se expanden los datos.

    La alternativa es una arquitectura scale-out que le permite simplemente expandir la capacidad a medida que la necesita. Además de resolver el problema de escalabilidad, este enfoque es más barato, más fiable y ofrece un coste de rendimiento predecible.

    Gartner dice que el 30%1 de los datos ya se ha movido a una infraestructura scale-out, principalmente para almacenamiento primario. Su éxito ahora está impulsando el interés en aplicar los mismos principios al almacenamiento secundario.

    En este webinar examinaremos cómo la infraestructura Scale-Out:
    •Simplifica la gestión del almacenamiento
    •Reduce los costes de infraestructura
    •Mejora la fiabilidad y disponibilidad
    •Dirige el rendimiento
    •Expande el almacenamiento sin fisuras

    1Gartner Magic Quadrant for Distributed File Systems and Object Storgae, October 2017
  • Verizon Threat Research Advisory Center - Protected Health Information
    Verizon Threat Research Advisory Center - Protected Health Information John Grim and David Kennedy, Verizon Enterprise Solutions Mar 21 2018 2:00 pm UTC 90 mins
    Fellow Cybersecurity Practitioner:
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing to discuss the current cybersecurity threat landscape.
    This month's theme: Protected Health Information
  • Weakest Link to Strongest Asset: Let's Focus on the Culture
    Weakest Link to Strongest Asset: Let's Focus on the Culture Tarun Samtani, Group DPO for Vectura Group Plc, & SkyePharma Mar 21 2018 3:00 pm UTC 45 mins
    It is commonly said that staff are the weakest link to security but is it really? Or we have missed something? Computers process and transmit data and we have been patching them for last 20 odd years or longer but how about humans?

    This session will be all about how you turn your so called weakest link (the people) in to your strongest asset in the fight for cybercrime. Especially, with the new upcoming regulation GDPR it has become even more crucial.

    About the Speaker:
    Tarun Samtani is the Group DPO for Vectura Group Plc, & SkyePharma. Tarun holds over 18+ years of experience across various sectors like Retail, Leisure, Telecommunications, ISP's, Financial Services, Gambling and most recently Pharmaceuticals. Tarun has worked across UK, Europe, Asia & Middle East on different assignments.
  • Crucial Components of  your SWIFT Customer Security Programme (CSP) Compliance
    Crucial Components of your SWIFT Customer Security Programme (CSP) Compliance Matt Buller, CTO Financial Services, ForeScout & Adam Kohler, Sr. Engineer, ForeScout Mar 21 2018 3:00 pm UTC 60 mins
    In the wake of the high-profile, multi-million-dollar breaches using their infrastructure, SWIFT created the Customer Security Programme (CSP) to ensure their customers meet the required levels of security and compliance. Learn how ForeScout plays a crucial role in helping ensure SWIFT CSP compliance from ForeScout experts Matt Buller and Adam Kohler.
  • Software Development with Open Source: Securing Applications and IP
    Software Development with Open Source: Securing Applications and IP Tim Mackey, Sr. Technology Evangelist at Black Duck by Synopsys Mar 21 2018 3:00 pm UTC 60 mins
    Open source software is embraced by developers, enterprises, and governments at every level, and with it comes many strong opinions and few facts. How much open source is really being used in the applications you buy? Does the "many eyes" theory make open source more secure? Does traditional security testing address vulnerabilities in open source?

    With organizations becoming more agile but facing increasing regulatory governance, understanding how open source software development works, and how to secure open source, is increasingly important. In this session we’ll cover:
    - Code contribution and IP management
    - Fork management
    - Release process
    - Security response processes
    - Realities of IP risk and open source
    - Pass through security risk and responsibility
    - Keeping up with scope of impact changes within a single disclosure
    - Automating awareness of security risk from development through integration and delivery to deployment
  • Dynamic Scanning with CA Veracode
    Dynamic Scanning with CA Veracode Patrick Hayes, CA Veracode Solution Architect Mar 21 2018 3:30 pm UTC 30 mins
    Test any web application with as little as a URL!

    Join this 20-minute webinar to see how Veracode can help you unlock the capabilities of DynamicDS and DynamicMP. With these deeper scanning abilities, your organization can identify and remediate application vulnerabilities and comply with several compliance standards, such as PCI and other financial industry regulations. See firsthand how Veracode’s dynamic scanning capabilities enable teams to:

    •Secure individual web apps during SDLC or while in production
    •Automate the overall dynamic scanning process to become an easy-to-use self-service offering
    •Improve quality through vulnerability verification and login configuration assistance
  • GDPR: The AppSec Twist
    GDPR: The AppSec Twist Roman Garber, Development Manager at Security Innovation and Edward Skraba, Lead Penetration Tester at Smarttech247 Mar 21 2018 4:00 pm UTC 60 mins
    When GDPR becomes law in a few months, it will be the most wide-ranging and stringent data protection initiative in history. To prepare for this sea change, most organizations have streamlined and detailed their information security policies; however, many are unaware that immature application security programs arguably pose the biggest threat of a data breach. This oft-forgotten piece of data protection puts organizations at risk of GDPR fines.  

    Attend this joint webinar with Security Innovation and Smarttech247 to learn practical tips on incorporating application security best practices into an InfoSec program to achieve GDPR compliance. 

    Topics include:  
    * Summary of GDPR key concepts
    * Security of data processing in software and the CIA triad
    * The people and process problem of GDPR: Governance
    * Using Data Protection by Design for secure design and business logic
    * Assessments to verify the security of processing

    Roman Garber, Security Innovation
    Edward Skraba, Smarttech247
  • Data: Don't Let Your Greatest Asset Become a Liability
    Data: Don't Let Your Greatest Asset Become a Liability Laurence Pitt, Global Security Strategy Director at Juniper Networks Mar 21 2018 4:00 pm UTC 60 mins
    A discussion around the role and the evolution of data. We will also cover the importance of protecting data throughout its lifecycle.

    We will look at:
    - Fundamental changes in the way we live, work and communicate
    - How we have become highly reliant on data, so it means more to us
    - The increasing value of data and why we need to protect it

    Presenter: Laurence Pitt, Global Security Strategy Director at Juniper Networks
  • How to Automate Phishing Investigations
    How to Automate Phishing Investigations Tom D’Aquino, Director of Security Solutions at LogicHub Mar 21 2018 5:00 pm UTC 45 mins
    Get to Inbox Zero everyday with Automated Threat Ranking

    Do you struggle with getting too many phishing alerts? Does it take a long time to investigate and respond effectively?

    Join us for a special presentation to see how some of the most sophisticated security teams are applying automated threat ranking to phishing reports from their users and detection tools, helping them get to inbox zero every single day.

    Timely analysis and response is key to combating phishing threats while tracking and rewarding submissions helps keep submitters engaged and participating.

    Join this webinar to gain insight into:
    * The basics of Phishing investigations
    * What automation can and cannot accomplish
    * How to build the automation steps easily
    * Best practices from industry experts

    Learn how you can help make your phishing reporting initiative an asset that drives other security capabilities rather than a burden that exhausts your team!

    Speaker: Tom D’Aquino, Director of Security Solutions at LogicHub
  • [Webcam Panel] Threats and Cyber Resilience
    [Webcam Panel] Threats and Cyber Resilience Dan Paltiel (US Bank) | Matt Wolff (Obsidian) | Roselle Safran (Rosint Labs) Mar 21 2018 5:00 pm UTC 60 mins
    Cybersecurity is a key priority for CISOs in 2018. What are the cyber threats CISOs should be aware of? How can we build more resilient enterprises in an age of relentless cyber attacks?

    Join this interactive panel to learn more about:
    - The latest cyber threats
    - New attack trends
    - Fighting cyber crime in an age of breaches and stolen personal information
    - Understanding your cyber risk
    - CISO priorities for 2018

    - Dan Paltiel, Security Intelligence Analyst, ‎U.S. Bank
    - Matt Wolff, Co-Founder & Chief Scientist, Obsidian Security
    - Roselle Safran, President of Rosint Labs