Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Please note that this webinar is postponed to October 18th.
SAP Education is launching a series of 30 minute live interactive sessions on Wednesdays as from September 13th. You will join thought leaders to find out how your company can benefit from SAP® Education best pratices to enable successful adoption of SAP S/4HANA in support of your transformation goals.
Howard Marks looks ahead at the storage trends rolling into IT Operations in the new year.
Today’s data center is a much more dynamic environment than ever before leaving IT organizations struggling to compete, and or integrate, with public cloud services with tools and hardware designed for the much more static datacenter of yesteryear. In this webinar long time industry observer Howard Marks will examine five of the trends that IT operators should pay attention to in the coming year.
Our discussion will focus on the promise, tools and challenges involved in moving to hybrid architectures that bridge private data centers and cloud resources to shift workloads, support data-intensive compute operations, manage unstructured data growth, build affordable archives, and prepare for disaster recovery. These technologies will consider macro-level trends as well as solving operational challenges that come with the growth of cloud.
Infrastructure architects, systems engineers, storage engineers, data strategists, HPC specialists and other enterprise IT professionals will learn:
- Current environment and challenges in building hybrid infrastructures that support traditional and object storage
- Five not-to-be-ignored trends ripe for adoption in 2018
- How compute and storage can mix in the new cloud-enabled world
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.
This session will discuss Identity and Data Protection solutions for enterprise security, organizations can take a data-centric approach to their security posture, all while controlling access to the infrastructure and applications they rely upon — both on-premises, and in public and private clouds.
SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.
AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:
Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Zero Trust also adds a layer of agility to modern networks that is impossible to do in traditional network designs. These 21st century networks have been adopted by government entities and large enterprises around the world.
In this session, John will discuss the concept of Zero Trust and explain why Zero Trust is the world's only true cybersecurity strategy. He will show a Zero Trust Strategy will achieve tactical and operational goals. This session will demonstrate how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives.
Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series
The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?
This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:
• Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.
• Improvements: Planning and processes are improved by incorporating lessons learned.
• Communications: Restoration activities are coordinated with internal and external parties.
To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
Join us for our follow-up webcast with a focus on Authentication, Global Protect, and User ID enhancements to get a quick overview of SAML Authentication, Global Protect Clientless VPN and other selected new features and enhancements that PAN-OS 8.0 adds to your Palo Alto Networks Security Platform. Attendees will:
•Learn about the key capabilities introduced by 8.0
•See the value of the update to security deployments
•Receive a voucher for 8.0 training course - $500 value
The move to digital business is exposing the limits of existing trust infrastructures. Rapid growth in the number of deployed certificate authorities (CAs). Increased burden on multiple PKI point solutions deployed to address specific problems. And while IT grapples to support tactical implementations of PKI, the demands of digital business overwhelmingly require a more strategic and holistic approach.
What's required is a centralized yet agile overarching trust framework that can easily accommodate multiple use cases today and in the future.
This webinar looks at the steps you can take to build an agile trust infrastructure with a centralized PKI deployment.
* Digital Trust at Scale Learn how to build a PKI that supports endpoint diversity, evolving and multiple use cases and integration with complimentary solutions.
* Streamline PKI Deployment Discover how a trust infrastructure can be deployed and managed across your organization to mete the requirements of today's dynamic and distributed business models
* Simplify 3rd Party CA Key Migration Find out how you can migrate certificates from other vendor systems without having to distribute a new trust anchor and without the need to generate new keys and certificates.
In this webinar, join Cisco and CSPi as they discuss how automated breach notification takes Cisco’s incident response services to a whole new level. With FirePOWER and nVoy the incident response process can start immediately after a breach is verified and therefore be completed faster, in some cases the full impact of a breach can be determined in minutes.
This can be extremely powerful for companies which rely on managed services providers for their cyber breach incident response strategy. With FirePOWER and nVoy Cisco’s IR professional services team will proactively monitor the solution for you and will receive email notifications when a potential incident is occurring against your organizations critical assets to trigger IR activity as per services contract.
Shortening the breach identification and investigation phase provides several benefits:
- Meet stringent data privacy compliance regulations, like GDPR
- Focus efforts on effective forensic analysis and remediation
- Limit breach exposure and the expenses related to handling breaches
The complexity of vendor risk management increases every day, as does its importance to organizations that rely on third parties. Regulators are increasing their focus on potential third-party risk. Risks assessments for business processes and vendor management are being integrated, mapped to organizational risks, and mined for patterns and trends. Some organizations are even extending vendor risk management to assess the vendors of vendors.
Assessing and monitoring vendors and third parties is an arduous task if conducted manually. A manual process of inputting data, assigning risk levels, and following up requires multiple employees dedicating numerous hours. A manual process also makes it difficult to ensure harmony between an organization’s policies, regulatory requirements and those of the vendor or supplier.
On the other hand, a robust governance, risk management, and compliance system like the Keylight Platform can help organizations identify, classify, monitor, and recommend risk mitigation to support business operations and regulatory requirements.
In this webinar, LockPath’s vendor risk management experts provide an overview of the challenges to efficient and effective vendor risk management, and they demonstrate how GRC can bring order to the chaos of vendor risk management.
The EU General Data Protection Regulation (GDPR) is the most important new regulation involving individuals’ information to emerge over the last few decades: it provides the foundation for how multi-national organisations and government agencies must protect sensitive customer information, and also how they can derive value from enterprise data.
MAKE COMPLIANCE GOOD FOR YOUR BUSINESS
In order to prepare for the May 2018 deadline, organisations must interpret the GDPR requirements, map processes and technology to them to ensure compliance, and quickly identify the correct information to be tightly managed and protected. Information insight is the key to solving these challenges of large volumes of data and high levels of complexity. The risks are high - lost customer confidence, security breaches, fines, sanctions, and potential lawsuits.
DO YOU KNOW WHERE YOUR DATA AND STORAGE SHOULD BE?
Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with unprecedented elasticity, scale, resiliency and availability, on a consumption based economic model. However, the choice between public cloud and on-premises infrastructure is not a binary one.
Register to attend our webinar on Tuesday 17th October at 11:00 GMT to discover how HPE Pointnext GDPR Consulting services can provide the expertise and support to de-risk your journey to compliance. Plus learn how Commvault Hyperconverged Architecture can help you to overcome the complexities of GDPR through the consolidation of all roles performed by discrete servers in the traditional data protection architecture into a single software defined stack.
In today’s era of ‘Bring your own device’ (BYOD) mobility and ‘Internet of Things’ (IoT) devices proliferating networks as unknown or unmanaged connections, the cyberattack surface for most any organization continues to grow at an alarming rate. No longer can organizations rely on guarding their perimeter and trusting they know everyone and everything that is accessing their network. Proactive threat prevention in today’s BYOD and IoT era requires continuous network access visibility and intelligence as well as being able to automatically apply context-aware security policies such as segmenting devices and users without having to re-build networks or knowing the devices upfront.
Webinar topics include:
- Network security trends and challenges, including the more destructive ransomware, cryptoransomware, wipers, etc.
- Risk prevention architecture considerations
- Best practices based on real world experiences
BAI will share some of its key learnings based on extensive experience implementing successful solutions that target attacks while creating more highly available, responsive, and automated networks. BAI is a team of Security Architects who have provided Automated Detection, Prevention, and Orchestration to protect Government Agencies, Higher Education and Fortune 1000 commercial accounts.
The signs that the security market is ready for disruption are here. Join in discussion with Nir Zuk, Palo Alto Networks co-founder and CTO, on how the security market is evolving and maturing and ultimately, ready for disruption.
The December 31, 2017 deadline for protecting Controlled Unclassified Information (CUI) and complying with the NIST Special Publication 800-171 standard is fast approaching.
Join PKH Enterprises and TITUS for a discussion on strategies to help federal agencies and contractors meet the main CUI requirements as established by NIST 800-171 and DFARS 252.204-7012. These experts will provide an analysis of the most challenging compliance areas, and offer insights to help organizations prioritize their next steps.
Building a culture of cybersecurity is critical to every organization no matter the size. Join Aaron Cohen, Director of Cyber Security Services, to learn more about how to strengthen your organization’s cyber resiliency.
Register for this webinar to:
Hear about the biggest threats and challenges facing organizations
Learn about the stages of the attack lifecycle and how to prepare for each stage
Understand how to increase your resiliency and train your team
Learn why organizations must ensure they understand what personal data they hold and where it exists across the organization. In this session, we will discuss data-centric technologies like DLP and examine how they help organizations to find personal data and understand risk.
This is the first in a two-part series on governance, risk and automation.
In Part I, we will explore concepts central to IT governance and risk. The presenters will use a conversational style to describe IT governance, how it works, and then go deeper into one central aspect, risk.
Part II will build on the foundation presented in part one and describe how these issues are managed in an automated solution.
While the Sarbanes-Oxley Act (SOX) has been in place for over a decade, many public companies still have questions regarding the efficiency, and even effectiveness, of their overall SOX compliance and audit programs. With room for improvement, companies are considering solutions to automate the process, reduce efforts to complete testing, and better manage the remediation process.
In this webinar, LockPath’s Vice President of Services, Dennis Keglovits, discusses the common challenges SOX compliance poses in today’s organizations, as well as strategies and techniques to assist your programs.
Up-front design of your cloud environment can be done in a way that creates a reliably secure and controlled environment no matter how the AWS resources are used. This session will focus on "Security by Design" principles and show how an AWS environment can be configured to provide a reliable operational security control capability across, such as:
- Organizational governance
- Asset inventory and control
- Logical access controls
- Operating system configuration
- Database security
- Applications security configurations
Why this session:
Cloud Computing is becoming the new normal, the question isn’t “if” anymore, it’s really just “how fast can we move?” and “what are we going to move first”
Because of this trend organizations need to understand their security and compliance capabilities and shared responsibilities for security as they migrate resources to the cloud. Whether its clinical trial simulations with Bristol Myers-Squibb, who uses AWS to run clinical trial simulations for 64% less cost; in 1.2 hours vs. 60 hours or Galata Chemicals who are running their development and test workloads in the cloud. Organizations need to start with a “Secure by Design approach, which support security at scale as they increase their use of cloud resources.”
Ok, so your data center may not catch on fire (at least we hope not). However, the consequences can be just as dire if critical data is lost, a virtual machine crashes or a portion of your data center becomes unavailable. In an emergency, how confident are you about restoring your company’s data in a timely fashion, especially when every minute of downtime may mean lost revenues from and credibility with your customers. What if your company can’t afford the cost of maintaining a disaster recovery site? How long would it take for you to recover from a site disaster?
Participants will learn:
- How you can leverage the public cloud for cost effective DR for your on-premises infrastructure
- What factors do you need to consider to use the Cloud for DR
- Different approaches to architecting DR in the Cloud, including pilot light, warm standby and hot site.
Business agility and faster speed to market are often primary drivers of enterprise cloud strategies. IT organizations often implement a Cloud Center of Excellence (CCoE) model to streamline operations, but without effective automation these teams can quickly become a bottleneck to the broader business strategy.
In this session, enterprise cloud thought leader Nathan Wallace, CEO & Founder of Turbot, will address how Software-Defined Operations can deliver agility, elevate the business value of the Cloud Center of Excellence, and ensure compliance for your organization.
- The business impact of moving to Software Defined Operations
- How to enable self-service cloud while improving security and compliance.
- How automation allows the CCoE to focus on higher value delivery.
- Benchmarks and KPIs to measure the effectiveness of your automation strategy
About the Speaker
Nathan Wallace is the Founder and CEO of Turbot HQ, Inc. Nathan is recognized as a transformational leader that has enabled some of the World's largest enterprise organizations to make the transition to public cloud. Nathan has recently been profiled by CIO Applications and was a featured guest on the AWS podcast. Prior to starting Turbot, Nathan was the Global Director of Cloud & DevOps for a Fortune 50 Multi-National Pharmaceutical Company.
This talk will focus on how compliance can be transitioned from a costly manual burden to a business enabler using automation. One of the biggest challenges faced by organizations today is the use of manual methods like spreadsheets and email for compliance management. This long-time practice is unable to keep pace with the myriad of workflows and processes required which leads to constant firefighting, fines, increased cost and loss of accountability. Adopting an automated platform brings the benefits of being compliant in less time using a streamlined assessment process with better business alignment, accountability, higher profits and lower costs.
Cloud adoption represents a major IT transformation, a shift in culture and a new way of financing your infrastructure. It presents new cost and security challenges, requiring governance and control across the organization. And it also needs a proactive team to take ownership and direction of the migration process.
In this Cloud Leaders Panel: Industry Perspectives from a CEO, CISO, & CFO, Steve Hall, VP of Marketing at CloudCheckr, will be joined by Bob Hale - CEO at Alterian, Mike Pinch - CISO at University of Rochester, and Dan Wacker - CFO at ClubReady. During this interactive discussion, we’ll uncover what the cloud means to each panel expert from their own unique perspective and learn what the key drivers are to successfully shift an organization to a cloud-first approach.
Join our guest, Dr. Ted Marra as he introduces his new strategic leadership course in Global Risk Academy.
During the webinar we will cover:
How does a truly strategic organization think? What is strategic thinking versus strategic planning? What are the vital few factors that will determine your organisation’s long-term success or failure and are they on your radar screen?
Who should attend.
People with 10 years management experience minimum up to and including C-Level in all disciplines responsible for strategic decisions or large scale operational issues - so they have large budget and many people reporting to them.
Managers and senior management from all areas of the organisation having responsibility for planning and achievement of key business objectives.
Why you should attend.
- Reflect on how you got where you are as an organisation;
- What factors were critical to your success? What factors were the basis for your success?
- What held you back – prevented you from being even more successful?
- What could you have done differently
Understand what are the most critical factors that will better ensure your organisation is a “winner” in the future (e.g., next 3-5 years).
Find out which ones you may be missing and what to do about it before it’s too late and you become just an “average or good” organisation when, with a little effort and the right strategic thinking and creativity, you could take the organisation to the next level of performance and move toward “greatness”.
How to build exceptional stakeholder relationships and why doing this is critical in especially in turbulent times.
What is Software Asset Management (SAM) and how can you develop a SAM practice to reduce risk, save money and empower business agility?
This educational and interactive webinar provides an introduction to SAM for those new to the field. Martin Thompson, founder of ITAM Review, and Michael Krutikov, Global Product Marketing with Snow Software will share how organizations like yours have driven quantifiable efficiencies and delivered ROI by managing their cloud and on-premise software more efficiently.
Learn the key steps to implementing a best-in-class SAM practice and how to avoid the most common pitfalls when starting a SAM practice.
During this webinar you will learn:
•What SAM is and how it differs from basic asset management
•The ROI you can deliver with a SAM practice
•Top 3 common hurdles to avoid when starting your implementation
•Tips to getting your SAM solution started successfully
•Best practices from other successful organizations such as Carnival and Sky.
Register today and all attendees will enter a prize draw to win one of 20 free copies of Practical ITAM – The Essential Guide for IT Asset Managers: Getting started and making a difference in the field of IT Asset Management, by Martin Thompson from ITAM Review. Please click here for full terms and conditions http://ow.ly/7sSW30f6b3W
Join Jack Hamm and Simon Gibson from the Gigamon SecOps as they demonstrate how to use automation and visibility to take the boredom out of repetitive tasks. One of the featured use case will be how to automate tasks to find and block Kaspersky in government organizations.
Security practitioners use a variety of tools and information sources to spot potential threats, evaluate each event and then act to mitigate. They are challenged by little interoperability between security tools, plus the cost of these tools across the network and cloud can be prohibitive.
During this lively webinar, hosted by Security Solutions leader, Graham Melville, you will see how Gigamon and the Phantom security automation and orchestration platform can help you reduce mean time to resolution. The team will show how you can provide wider visibility and automate the tasks your security staff repeats on a frequent basis.
Simon and Jack will demonstrate:
•How to generate indicators of compromise to trigger Phantom to execute customized playbooks with specific actions.
•How to automate tasks to find and block the use of Kaspersky in government organizations.
•How to streamline dozens of sources to gain insight into security events.
•How to gain visibility to the necessary traffic from all segments of your networks without buying more security tools.
•How you can reduce the load and turn on more features on your security tools such as Next Gen Firewalls.
Large corporations aren’t the only targets for sophisticated advanced attacks. In fact, cyber criminals find that small and midsize enterprise (SME) companies are easier targets because their security is not as advanced and they don’t have proper cyber defenses.
FireEye SME customers are more prepared to defend their company’s digital assets. Join us for a live problem-solving webinar based on real-world examples from your peers and learn:
•What best practices will increase cyber awareness
•How to conduct a security assessment to identify gaps and a
•How to align security needs and reduce vulnerabilities
Register today to gain insights into SME cyber warfare and more effectively protect your business from advanced attacks.
Join Rick Howard, CSO at Palo Alto Networks to learn about must-read books for all cybersecurity practitioners – be they from industry, government or academia — where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.
Alongside an expanding attack surface resulting from the growth of cloud, mobile and IoT, organizations are now increasingly faced by internal threats. Insider threats, compromised accounts, administrator abuse and other user-based threats are some of the most damaging vulnerabilities and the hardest to detect. This has led to the evolution of user and entity-based analytics (UEBA) solutions, designed to address user based threats, and through the use of artificial intelligence (AI) and machine learning these solutions are advancing threat detection capabilities in modern security operation centers.
In this webinar, Mark Settle, LogRhythm Product Marketing Manager, and Samir Jain, Senior Product Manager, UEBA, will discuss the evolving UEBA market, and advancements in the technology fueling these solutions.
Webinar attendees will learn:
•How advancements in AI and machine learning technology are enabling security analytics and in particular UEBA.
•Why security analytics solutions are moving to cloud infrastructure, and the security implications compared to on premise platforms.
•What security mature organizations are asking for versus what is being delivered
•Whether UEBA solutions are better delivered via security analytics/SIEM platforms, or via stand alone solutions
By now, the majority of us have likely been inundated with stories about third party data breaches and how one vendor’s vulnerability can cost your organization millions. But how do you know if you’re doing enough to stop third party risk?
As we enter 2018, new U.S. and European cyber regulations are going into effect, and organizations can no longer check the box when it comes to their vendors’ cybersecurity. You are not only liable for knowing where you are most at-risk, but now you must also understand how that risk affects your organization and identify a solution for mitigating that risk.
This webinar features guest speaker Nick Hayes, Senior Analyst at Forrester and LookingGlass VP of Intelligence Operations Eric Olson. They will delve into the third party risk landscape: our current state of affairs, and where the industry is moving, as well as how you can take a different approach to third party risk prevention, including:
• How to see where your vendors are already compromised
• The importance of actionable intelligence for real-time mitigation
• Why a continuous monitoring solution is the future of third party risk
Security operations center (SOC) teams are continually faced with new alerts and events. Security information and event management (SIEM) solutions such as Splunk help by making it easier to collect and analyze data generated by your technology infrastructure, security systems, and business applications. However, working with this volume of data risks SOCs being overloaded and rapidly available and readable information is vital to prioritize how you respond.
See how a pre-integrated solution between Recorded Future and Splunk gives you full context of emerging threats from the widest breadth of open, technical, and dark web sources. Join this webinar to:
• Alleviate alert fatigue and speed decision making with machine and human-analyzed threat context.
• Identify threats already in your system by correlating network traffic with known bad from outside your network.
• Get a live walkthrough of how to utilize real-time threat intelligence in Splunk Enterprise.
The February 2018 deadline for complying with PCI DSS 3.2 is fast looming. Most of the new requirements in the latest PCI DSS guidelines are focused on the need to extend multi-factor authentication (MFA) to additional use cases and user groups within organisations who handle Credit Card Data. From February 2018 onwards, all individuals who access systems such as databases, network modules and email servers which hold credit card data will be required to authenticate themselves with MFA.
Join (ISC)² EMEA and Gemalto to learn:
- What’s new in PCI DSS 3.2
- How to effectively map PCI DSS MFA requirements to business use cases and user groups in your organisations
- Best practices for organisations that need to extend their MFA footprints to additional use cases, and for those that are starting to think about how to comply with PCI DSS’s authentication requirements.
Introduced in 2016, the General Data Protection Regulation (2016/679)—or GDPR—was created for the purpose of strengthening the European Union’s (EU) procedures and practices related to data protection. GDPR will impact organisations worldwide and implement maximum fines of up to €20,000,000 (or 4% of global turnover) if they fail to ensure compliance. Join BitSight’s Philip East and Metro Bank’s Julian Parkin as they discuss:
- The checklist organisations should review to align their business with GDPR.
- Noteworthy articles within GDPR and how they affect data governance/usage.
- BitSight’s recommendations for monitoring the GDPR alignment of third parties.
The care and handling of personal information is a top concern for consumers and governments alike. Unlike many issues which gain public attention and struggle to keep it, an endless stream of publicised data breaches serves to keep data privacy in the public eye. As a result we’re seeing increasingly onerous regulation coming into effect in an effort to improve the data management practices of organisations and protect the confidential information of citizens. Major Internet players are also weighing in in an effort to make the user experience more secure.
For organisations with a large digital presence, identifying all the places that personal information, or in the case of GDPR, personally identifiable information, is collected can be a daunting task. Are those forms collecting data securely? Are they accompanied by compliant statements and controls? Research carried out by RiskIQ suggests that there is much more to do in this area.
Join us for a closer look at the security and compliance issues surrounding the collection of personal information on the Internet and learn how you can automatically discover and assess all forms and persistent cookies across your web presence.
With the greatest shake-up of data protection regulation in a generation looming, CISOs, DPOs and IT Administrators are busy planning for the changes needed for their organisations to be compliant. But with 60% of IT executives suggesting staff as their biggest threat to adherence (Bluesource, 2017) and 90% of staff admitting to violating policies designed to prevent security incidents (BSI, 2017), have they really addressed the issue of friendly fire?
In this live, informative and interactive webinar led by Amar Singh, Global CISO & CEO of Cyber Management Alliance. A panel of data security and policy experts will discuss, why staff remain such an active threat to GDPR compliance, why policies are being ignored and how to ensure that your staff are on-board with the GDPR before May 2018.
Amar Singh, Global CISO & CEO, Cyber Management Alliance
Chris Payne, Data Privacy Expert & Managing Director, Advanced Cyber Solutions
Dominic Saunders, CTO and Co-Founder, NETconsent
Joe Lee – UK and Ireland Commercial Manager, NETconsent
The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.
In this joint webinar with 451 Research, we will cover topics including:
-Building a multi-cloud security strategy for encryption and key management
-Best practices, benefits and pitfalls of managing your own security
-Impact of regulations on data protection in the next few years
-Understanding the different CSP requirements for key management:
oCustomer-Supplied Encryption Key (CSEK)
oBring Your Own Key (BYOK)
oHold Your own Key (HYOK)
oGeneral cloud service provider key management services overview
Brought to you by Entrust Datacard and IDG Research
As organizations expand on legacy infrastructures and build new digital business models, what is the role of trusted identity? This webinar will illustrate how trusted identity technologies — including authentication and PKI — are essential as organizations capitalize on the full potential of cloud and mobile technologies. We will also discuss how to avoid the pitfalls of misaligned identity strategies.
DevOps teams are building applications faster than ever before, and utilizing large amounts of open-source software to increase agility. However, that introduces the possibility of open-source security risk. The landscape of attacks has changed in recent years, with cyber-attacks increasingly happening on the application layer. This means DevOps teams need to be involved in the security process.
This task is made more daunting as modern applications are a mix of custom code and open source in their applications. How do you protect your DevOps? Register for this webinar where security experts from Micro Focus Fortify and Black Duck discuss:
- Understanding the mindset of an attacker
- Ways to automate the process of risk identification
- The ability to gate builds when finding risk elements
The use of Information Technology in business has become so ubiquitous that just about every audit has an IT component. Operational and business process auditors must embrace technological advances rather than resist them in order to perform audits in an effective and efficient manner. This webinar will provide all auditors with a foundational understanding of application controls and data reliability.
The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.
Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
Creating a culture of cybersecurity is critical for all organizations. Join the conversation with our own security pros to learn how they keep employees ahead of phishing attacks, share best practices for phishing education and explain how to use innovative technologies to strengthen cyber resilience.
A current increasingly uncertain and complex regulatory environment has made it challenging for firms tasked with creating and maintaining a “culture of compliance”. The business demands access to new forms of communications to increase engagement with employees, partners and customers, only increasing the quantity and complexity of the data you manage. Join Proofpoint to gain an understanding of the challenges that compliance faces and the consequences of not meeting the expectations of the regulators
Join us to
•Develop insight into the rapidly changing regulatory environment
•Hear how new forms of communications are bringing about the digital revolution
•Discover how to protect your organization from reputational risk and stay out of the cross hairs of the regulators
Cloud Security Protection is improving, but how can we protect against Evolving Security Threats? How can we win?
In this session we will delve into some of the security risks associated with cloud environments and what can be done to protect your applications and data that reside in the cloud by utilizing a new technology known as Software-Defined Perimeter (SDP) as well as encryption and tokenization.
Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.
Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organization needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.
The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.
In this webinar learn:
• Why Proxy architecture is more important than ever as a critical security component of your network
• How a web proxy can serve as a platform for advanced threat detection and data protection
• Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line.