Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Stay Audit Ready with Continuous Cloud Compliance
    Stay Audit Ready with Continuous Cloud Compliance
    Speakers: John Martinez, Director of Public Cloud R&D at Palo Alto Networks; Matthew Todd, Compliance Expert Recorded: Mar 19 2019 63 mins
    Too often, organizations make the move to the cloud without considering the impact to compliance. Whether compliance serves regulatory or business obligations, it is best to move into the cloud with these requirements in mind. In this webinar, our experts will discuss common cloud compliance misconceptions, practical advice about how to get your cloud compliance program in the best shape possible.
  • Scaling PII/PI Discovery, Protection & Privacy in the Cloud - BigID, AWS, & CSA
    Scaling PII/PI Discovery, Protection & Privacy in the Cloud - BigID, AWS, & CSA
    Nimrod Vax, BigID Head of Product & Bill Reid, AWS Senior Manager, Leader, Security and Compliance Solution Architectu Recorded: Mar 19 2019 58 mins
    Protection & Privacy in the Cloud: Operationalizing Privacy in AWS Environments

    New privacy regulations like GDPR and CCPA make finding and protecting personal information more critical than ever. This means being able to identify both PII and contextual PI by person at scale. This Webinar featuring BigID’s Head of Product and AWS's Leader of Security and Compliance Solution Architecture will examine best practices for finding, protecting and automating PI/PII-centric privacy tasks at scale.

    What You Will Learn:
    - How to find PII/PI across AWS
    - The difference between Protection and Privacy
    - How to actualize privacy tasks like DSAR
    - The role of ML in cloud-first privacy engineering

    Speaker:
    - Nimrod Vax, BigID Head of Product
    - Bill Reid, AWS Senior Manager, Leader, Security and Compliance
    Solution Architecture
  • To SIEM, Not to SIEM? Find Out Your Options
    To SIEM, Not to SIEM? Find Out Your Options
    Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks Recorded: Mar 19 2019 42 mins
    A security information and event management (SIEM) platform has been touted as the cornerstone of cybersecurity. But, can such a stand-alone platform address your IT security challenges and compliance reporting needs? With the growing complexity of SIEM solutions and a shortage of people with cybersecurity skills to manage them, many organizations are looking for alternatives to building their own in-house SIEM and staffing a security operations center (SOC).

    In this webinar, security expert, Narayan Makaram, Sr. Director of Product Marketing at Arctic Wolf Networks, will examine the following:

    - Business drivers for a SIEM
    - What is/is-not included in a SIEM
    - SIEM deployment options
    - Outsourcing considerations – MSSP vs MDR

    Save your seat now to learn more!
  • Docker and IDC: Containers in Production
    Docker and IDC: Containers in Production
    Gary Chen, Research Manager at IDC and Jenny Fong, Director of Product Marketing at Docker Recorded: Mar 19 2019 40 mins
    Containers have evolved into a transformative technology for application development and portability, but containers alone are not sufficient for meeting today’s enterprise requirements. In IDC’s recent Container Infrastructure Survey, over 76% of enterprises surveyed stated they use containers in production for mission critical apps, with 83% of container deployers using containers on multiple public clouds.

    In this webinar, Docker and guest speaker IDC Research Manager Gary Chen will discuss why companies are turning to container platforms to support increasingly diverse IT environments, bolster security and governance, and power digital transformation initiatives - from cloud migration and application modernization to microservices.
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Mar 19 2019 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • How to Meet AWS MSP Partner Program Version 4.0 Requirements and Pass Your Audit
    How to Meet AWS MSP Partner Program Version 4.0 Requirements and Pass Your Audit
    Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: Mar 19 2019 19 mins
    Just as traditional Managed Service Providers (MSP) businesses are evolving with the rapid adoption of the cloud, the Amazon Web Services (AWS) MSP Partner Program criteria is always changing. The program recognizes highly skilled AWS Partner Network (APN) Consulting Partners that provide full lifecycle solutions to customers. AWS recently released Version 4.0 of its Validation Checklist, and is requiring all APN Partners to meet requirements by April 1, 2019.

    Achieving AWS MSP Partner Program Validation is possible and easy with the right preparation. In this webinar, attendees will hear a summary of the new requirements, how CloudCheckr helps MSPs meet those checklist items, and areas where MSPs can increase cloud growth and profit going forward.
  • How to Develop and Implement an Effective Cloud Assurance Program for Government
    How to Develop and Implement an Effective Cloud Assurance Program for Government
    Ron Bushar, Vice President & CTO - Government Solutions Recorded: Mar 19 2019 59 mins
    As departments and agencies move business operations to the cloud, protecting assets and data remains top priority. Identifying the steps and actions needed to structure, develop, and implement effective security controls in this new environment is the critical first step.

    Where should you start? How do you prioritize activities? How can you leverage existing IT programs, processes, and policies that are already in place?

    Join FireEye’s Ron Bushar, Vice President & CTO - Government Solutions, as he shares steps and best practices to building a cloud assurance program, including:

    - Identifying roles and responsibilities of government, service provider, and third-party stakeholders
    - Adapting existing data classification scheme for cloud services and establishing a cloud-adapted risk assessment process
    - Implementing requirements baselines, risk assessments, and approaches to addressing unique risk scenarios
    - Selecting a cloud service delivery and deployment model
  • Cloud Security: Thinking Beyond the Perimeter
    Cloud Security: Thinking Beyond the Perimeter
    Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester Recorded: Mar 19 2019 55 mins
    Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.

    Join us on this webinar with Robert Arandjelovic from Symantec and guest speaker Heidi Shey from Forrester Research as they discuss;

    - The inherent security challenges of cloud

    - Security strategies and imperatives

    - How organizations are approaching and need to approach cloud security today.

    Please Join Us, Register Today
  • Network Automation: Getting from Automatable to Automated
    Network Automation: Getting from Automatable to Automated
    James Kelly Recorded: Mar 19 2019 50 mins
    Technology is constantly moving on, and business is constantly moving on with it. Automation is the key to keeping your enterprise on pace, not only with disruptive innovations, but with emerging security threats to your infrastructure, too.

    Now in the multicloud era, automation is an imperative to drive operational reliability, security and speed without tradeoffs.

    In this webinar, you’ll learn:

    -Why network automation is not the same as automated networks
    -How network reliability engineering can enable operational simplicity
    -The five-step journey towards automated NetOps
  • If Cloud is the Problem DataOps is the Solution
    If Cloud is the Problem DataOps is the Solution
    Kirit Basu - VP of Product - StreamSets Recorded: Mar 19 2019 44 mins
    According to research firm Gartner, at least 75% of large and global organizations will implement a multicloud-capable hybrid integration platform by 2021. Join StreamSets Head of Product Management, Kirit Basu, and Head of Product Marketing, Clarke Patterson as they discuss how StreamSets customers are taking a DataOps approach to hybrid-cloud integration.

    We explore how Fortune 500 customers are using StreamSets to streamline Apache Kafka and Data Lake projects using principles adopted from DevOps.

    During this webinar, we will discuss:

    -Pitfalls to avoid for any hybrid-cloud project
    -Key requirements to ensure continuous movement of data across any cloud
    -How StreamSets customers are using the platform to drive real value from DataOps
  • Medical Device Risk Assessments - HIPAA Happenings
    Medical Device Risk Assessments - HIPAA Happenings
    24By7Security, Inc. Recorded: Mar 19 2019 60 mins
    Medical Devices are continually increasing in use and popularity, with the advent of so many new technologies in the healthcare space. They could pose several security and privacy risks. Learn from a leading hospital Chief Information Security Officer (CISO) about Medical Device Risk Assessments.

    Featured Speaker: Mauricio Angee, CISO of Mount Sinai Medical Center

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • Join the Cyber Elite - Get a $30K+ Raise Before Your Degree - CISSP Exam Voucher
    Join the Cyber Elite - Get a $30K+ Raise Before Your Degree - CISSP Exam Voucher
    Dr. V. N. Berlin, CEO, Mission Critical Institute Recorded: Mar 19 2019 29 mins
    In this series, learn how to join the Cyber Elite and earn a $30K+ raise and a $500 CISSP Exam Voucher, even before you finish your cyber degree.

    You will learn what to add to your resume to get cyber employers to recruit you for top positions, even if you have not finished your degree. Then you will learn how to get employers to hire you.

    To motivate you to work to join the Cyber Elite in 2019, MCI offers qualified candidates CISSP Exam vouchers --- a $500 savings.

    In this series you will learn how employers pick candidates for $30K pay raises.
    •What project experience do they want?
    •What certifications must you have?
    •What additional credentials do you need?
    •How to motivate employers to hire you before you finish your degree

    You will also learn about the rapidly growing cyber sector: cloud security risk management.

    During these webinars you will also review profiles of candidates who have actually gotten $115K+ cyber positions and why they were able to get those jobs.

    Plan to join the cyber elite in 2019. Use this valuable information to guide your cyber career planning decisions now.
  • 7 Reasons Asset Compliance Blows-up
    7 Reasons Asset Compliance Blows-up
    Mark Gaydos, CMO, at Nlyte Recorded: Mar 19 2019 29 mins
    Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation Asset Discovery - it is about what you don't know!

    In the 30 minutes you are watching this, find out:

    - What happens when compliance goes wrong
    - What you weren't worrying about that you should
    - How 7 best practices and a little technology can reduce your chance of a panic attack

    Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud, creating an inventory of your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.

    We look forward to seeing you there.
  • Demystifying Cyber for the Board and Beyond
    Demystifying Cyber for the Board and Beyond
    Griff James, Director, Damrod Analysis Ltd Recorded: Mar 19 2019 40 mins
    Successful security programs explain the situation, the risks, and the options available in a way that is both simple and true. Damrod draws on military analytical frameworks to develop map models that accurately depict the cyber terrain and guide the generation of a series of overlays. These build to create an Effects based plan suitable for Governance, Risk, and Compliance needs.

    Join this webinar for an introduction to the cyber-as-conflict model developed by Damrod.
  • Balancing Cybersecurity Risk for the State of Arizona
    Balancing Cybersecurity Risk for the State of Arizona
    Morgan Reed and John Dasher Recorded: Mar 19 2019 58 mins
    In this webinar, we’re joined by Morgan Reed, Chief Information Officer for the State of Arizona. Morgan’s extensive experience in both private enterprise and the public sector puts him in a unique position to help us understand and benefit from how cybersecurity risk is being measured and controlled at the State of Arizona. We’ll discuss relevant cybersecurity risk topics, including his environment, how he views and communicates cybersecurity risk, some frameworks, and how you can go about applying his experience to your own environment, regardless of sector or vertical industry.
  • The Email Security Goal: ONE Single Solution
    The Email Security Goal: ONE Single Solution
    Ken Bagnall, Vice President, Email Security, FireEye, moderated by Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Mar 19 2019 50 mins
    FireEye research recently indicated that an average of 14 thousand malicious emails per month were being missed by most email security solutions. Email is the number one threat vector and with impersonation and credential phishing or URL-based attacks on the rise your email security solution must keep up with the evolving threat landscape. In this webinar:

    -Get a brief overview on the latest email threat trends
    -Learn about the must haves for email security solutions and the benefits of having one provider
    -Find out about additional email security capabilities that can help you have an adaptable solution
    -Hear about a use case where FireEye helped detect and block impersonation techniques that the incumbent solution missed
  • What do you get when you cross a CEO and a CISO’s strategy
    What do you get when you cross a CEO and a CISO’s strategy
    Mark Chaplin, Principal, ISF Recorded: Mar 19 2019 45 mins
    While the board ‘get cyber’, questions remain around embedding cyber risk management into business strategy execution. For many CISOs, strategy alignment represents the best opportunity to engage with the board and ensure a business-driven approach to managing cyber risk.

    So how should business leaders develop, update and execute business strategy with so many cyber-related implications? How can organisations meet their business goals, against a backdrop of increasing cybersecurity costs, greater regulatory scrutiny and increased frequency and magnitude of data breaches?

    In this webinar, Mark Chaplin, Principal, ISF will discuss the significance of aligning security strategy with business strategy. Mark will draw on executive engagement, exploring the essential factors for success and highlighting the pitfalls to avoid.
  • The Advantages of Filtering Applications
    The Advantages of Filtering Applications
    Ollie Sheridan, Principal Engineer Security, Gigamon, Brandon Dunlap, Moderator, (ISC)² Recorded: Mar 19 2019 55 mins
    Traditional methods of filtering traffic have relied upon a knowledge of the network and transport behaviours of the applications running across the network. Whilst most applications being run across the network use standard ports, many threat actors will use methods to obfuscate their communications by abusing these standards, with port spoofing being one such example. This represents a challenge when gathering traffic to ensure that this simple evasion method does not create a blind spot to your security countermeasures.

    Join us for this webinar to learn more about how you can:

    •Ensure that the Application traffic regardless of port spoofing gets to the right tool
    •Improve tool efficiency by discarding irrelevant Application traffic
    •Filter the traffic based on the application rather than the IP & Port
  • Secure your CI/CD Pipeline from Start to Finish with CircleCI Orbs & WhiteSource
    Secure your CI/CD Pipeline from Start to Finish with CircleCI Orbs & WhiteSource
    Shiri Ivtsan, Product Manager @ WhiteSource | Angel Rivera, Developer Advocate @ CircleCI Recorded: Mar 19 2019 39 mins
    In the agile age of software development, speed is the name of the game. This is why CI/CD tools like CircleCI have played such a pivotal role in changing how we work, sending our software along through the pipes at a breakneck pace.

    We are always asking questions such as: How fast can we get a new version out to our customers? How can we add these new features and stay on schedule? How can we do these things with as little wasted time and effort as possible?

    Open source software components play an important role by providing us with the building blocks of our products. These free software components allow us to skip over the more monotonous work of writing basic features on our own by offering us tried-and-true code. This allows us to focus on our business logics instead of having to build our own frameworks and infrastructures from scratch. However, even as we enjoy the benefits of open source components, they are not without their challenges, especially when it comes to security vulnerabilities.

    In this webinar, you'll learn how:

    - WhiteSource can help teams catch vulnerabilities within open source components at early stages of the development cycle
    - You can start implementing the Whitesource CircleCI orb into your CI configuration
    - To gain insights into your software helping you make smarter decisions in working with open source components
  • Cybersecurity for Manufacturing
    Cybersecurity for Manufacturing
    Stefan Woronka, Director Customer Services Digital Factory Process at Siemens & Dharminder Debisarun Recorded: Mar 19 2019 36 mins
    With prominent incidents like WannaCry, Shamoon, and Trisis effecting plant operations, it’s no wonder IT security is on the rise in manufacturing.

    These incidents show the immense need to implement a holistic, automated security approach across the manufacturing – protecting plant floors, execution systems, corporate IT, IoT and the industrial cloud altogether.

    In the webinar, Siemens and Palo Alto Networks experts discuss overcoming manufacturing cybersecurity challenges by applying industrial automation and control systems to:

    • Seamlessly integrate IT and OT security
    • Increase visibility and enforcement points
    • Connect third-party apps with threat intelligence

  • Why Brexit will hurt productivity in Financial Services the most...
    Why Brexit will hurt productivity in Financial Services the most...
    Mark Elwood - Marketing Director, TeleWare Recorded: Mar 19 2019 44 mins
    ... and the technologies that will prevent it.

    Join this webinar to hear how technology is creating a mobility-enabled workforce to increase productivity in financial services and the lessons other sectors can learn.

    In the words of Nobel Laureate Paul Krugman ‘productivity isn't everything, but in the long run it is almost everything.’

    Creating a modern workforce that has access to the technology that will improve productivity is key to ending the productivity crisis. TeleWare, working with Financial Services clients are helping create a mobile-enabled workforce designed to improve productivity. These lessons can be adopted in many vertical sectors, particularly in a post-GDPR and Brexit world.

    Find out:
    • Why you should be focusing on increasing productivity in your business
    • How enabling your employees to use the latest technology with no cost to your business can improve employee satisfaction and create growth
    • Why mobility is the secret weapon in the fight against stagnant productivity growth
    • Which technologies you should be thinking about to create a mobility-enabled workforce

    Join us for this insightful webinar that explores the technologies firms are adopting to help increase productivity and to beat their competition.
  • Séminaire en ligne: Plan d'action pour la segmentation de votre réseau
    Séminaire en ligne: Plan d'action pour la segmentation de votre réseau
    Nicolas Liard, Pre Sales Engineer France, Benelux Mar 20 2019 9:00 am UTC 60 mins
    Un réseau segmenté opérationnalise votre politique de sécurité, permet un état de conformité continue avec un minimum d'effort et fournit des options d'atténuation des cyberattaques. Mais la segmentation du réseau n’est pas une tâche facile !

    Rejoignez les experts de Tufin le 20 février pour partager des conseils pratiques sur la segmentation du réseau, notamment :

    • Les pièges à éviter lors de la création d’une stratégie de segmentation
    • Cadre de segmentation
    • Lignes directrices pour appliquer et maintenir un réseau segmenté
  • Fix your Leaky Onboarding Funnel with Online Identity Verification
    Fix your Leaky Onboarding Funnel with Online Identity Verification
    Dean Nicolls, VP of Marketing, Jumio Corp. Mar 20 2019 10:00 am UTC 26 mins
    Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.

    Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.

    Join us for this informative “how-to” webinar and discover how to…

    - Dissect the abandonment problem
    - Reduce the number of identity verification screens & clicks
    - Cast a wider net with omni-channel verification
    - To say “no” to verification “maybes”
  • Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
    Webinar: Un Piano Applicabile Per Segmentare la Tua Rete
    Flavio Di Cosmo, Pre-Sales Engineer SEEMEA Mar 20 2019 1:30 pm UTC 60 mins
    Una rete segmentata rende operativa le policy di sicurezza, consente uno stato di compliance continua con il minimo sforzo e offre opzioni di mitigazione per gli attacchi informatici. Ma la segmentazione della rete non è un compito facile!

    Unisciti agli esperti di Tufin il 20 Marzo 14:30 mentre condividono consigli utili per la segmentazione della rete, tra cui:

    •Insidie da evitare durante la creazione di una strategia di
    segmentazione
    •Framework per la segmentazione
    •Linee guida per l'applicazione e il mantenimento di una rete
    segmentata
  • How to Build a Simple and Profitable Business Through CSP Indirect
    How to Build a Simple and Profitable Business Through CSP Indirect
    Paul O'Connor, Global Lead CSP Indirect Program; Clare Richards, Partner Business Manager; Kathy Jones, SPLA Business Manager Mar 20 2019 2:00 pm UTC 60 mins
    If you are a Microsoft partner that falls into one of the following categories and you are unsure what benefits the new Microsoft CSP Indirect program brings to you, we recommend joining this webinar:

    •System Integrator (SI) Partners – these partners will now be able to offer software and support to customers that they were not able to access in the past providing the partner with new sources of revenue and a differentiated value proposition.

    •Hosters/SPLAs – the CSP Indirect program allows these partners to forego their existing infrastructures, which may not be viable long-term, and work through SoftwareONE and Microsoft to help end-customers.

    •ISVs – providing help with scale and reach; working with SoftwareONE’s CSP Indirect team can help them get to market faster and at a greater scale ensuring faster returns for ISV startup stakeholders.

    Finding new business in your customer base this year may seem daunting. Building a new practice may be a costly venture that won’t return value to the business for years. However, delivering long-term customer value is paramount and critical to growing your business.

    SoftwareONE is a certified member of the CSP Indirect program and it’s an exciting time for those in the Microsoft ecosystem, benefiting partners and end customers alike.

    Find out more about the new opportunities available to you and specifics about SoftwareONE’s additional value and services delivered through our unique CSP Indirect program called ONEClub.
  • Panel: Network Security and Compliance best practices for Financial Institutions
    Panel: Network Security and Compliance best practices for Financial Institutions
    Asher Benbenisty, Director Product Marketing; Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) Mar 20 2019 2:00 pm UTC 30 mins
    Financial institutions are forced to invest heavily in digital transformation to gain a competitive edge, especially with customer-facing technology innovations. However, delivery often trails behind the need. New apps are developed, but network security policy management is often perceived as holding up progress, impeded by manual change-management processes, growing compliance requirements and never-ending audits.

    There’s a better way to manage your network security!

    Watch our special panel discussion to learn how you can simplify your network security management, reduce risk and ensure continuous compliance.

    Topics include:

    •How to overcome security management complexities with automation
    •How to pass compliance audits in the face of demanding regulations
    •Key industry metrics that compare security environments within and beyond the finance industry
    •Real financial customers case studies
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    John Grim, David Kennedy Mar 20 2019 2:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the Verizon Insider Threat Report and the current cybersecurity threat landscape.

    We'll cover:
    •The time it takes to discover a breach after the first action
    •5 insider threat types identified by our caseload
    •Top 3 insider threat motivations
    •Top industries suffering sensitive data breaches

    Our Verizon Threat Research Advisory Center presenters will be:
    •John Grim, Senior Manager, Investigative Response - America
    •Domingo Jesus Alvarez-Fernandez, Senior Dark Web Hunter, Threat Intelligence
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will also cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address: Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Safe, Secure, Convenient: The 30-Minute Enterprise File Sharing Buyer’s Guide
    Safe, Secure, Convenient: The 30-Minute Enterprise File Sharing Buyer’s Guide
    Nick Scholz, Robin Redgrave and Devadas Kovilakath, Micro Focus Mar 20 2019 3:00 pm UTC 60 mins
    As companies undergo digital transformations—with a laser focus on simplifying operations and boosting productivity—users are being asked to get more done faster and with fewer resources.

    In this climate, it’s not surprising that employees independently turn to cloud file sharing services they may already be using at home to help them sync and share their files and get their work done.

    But these consumer-grade services lack the security, control, and management features that many organizations need to protect themselves from data loss, breaches, and business continuity failures, so many IT leaders are stuck: how do they enable productivity and ease the sharing of critical files without compromising their security and compliance needs?

    Join Nick Scholz, Robin Redgrave and Devadas Kovilakath to see what experts are saying about what to look for in an EFSS solution, and how to figure out which one fits your needs.

    You’ll learn:
    • What features help users adopt
    • The state of the EFSS landscape
    • The benefits and shortfalls of Cloud vs. On Premises solutions
    • How to maximize security AND collaboration
    • And more!
  • Live global security roundtable: perspectives, threats and risks per region
    Live global security roundtable: perspectives, threats and risks per region
    BT's Security experts: Steve Benton, Hila Meller, Juni Yan, and Gary Symes Mar 20 2019 3:00 pm UTC 30 mins
    Join four of our top security experts to hear their point of view and their vision for security across the globe. Our vice presidents from Asia, Middle East, Australia and Africa, America, Europe and the UK will share their frontline experience of dealing with some of the security challenges in their region.

    Cybersecurity is a truly global concern with attacks and threats emanating from all over the world. The way each region tackles the cyber threat is subtly different. Our experts will take you through some effective security strategies and programmes that you can put in place to protect your "crown jewels" against the evolving global threats.

    Whether you're a multinational organisation with worldwide operations, or based in one particular region, our webinar will give you a local and global view on how to find your way around the security minefield.

    Speakers:
    - Steve Benton, BT Deputy CSO, GM Cyber and Physical Security Operations and Programmes
    - Hila Meller, Vice President, Security, Europe
    - Juni Yan, Vice President, Security, Asia Middle East, Australia and Africa
    - Gary Symes, Vice President, Security, Americas
  • Configuration Compliance Management for 2020 and Beyond
    Configuration Compliance Management for 2020 and Beyond
    Sam Abadir, Lockpath Mar 20 2019 4:00 pm UTC 60 mins
    Planning and managing for hardened, secure assets is a key requirement for managing IT Risk and is mandated by many compliance sources such as PCI, NIST, FISMA and HIPAA – yet many organizations are not fully assessing their IT hosts and applications for secure configuration. In this live webinar, Lockpath’s Sam Abadir will share what configuration compliance management for 2020 and beyond looks like, including:

    •What configuration compliance management encompasses
    •Who should care about secure configuration management
    •Why organizations are not doing this today and how this impacts the business beyond IT


    Discover the future for configuration compliance management by attending this educational webinar. Register now!
  • Expert Q&A 5 Steps to Implementing Security Automation
    Expert Q&A 5 Steps to Implementing Security Automation
    Joe Schreiber, Technical Director, Business Development, Tufin & Karen Crowley, Sr. Product Marketing Manager, Tufin Mar 20 2019 4:00 pm UTC 60 mins
    Join automation expert Joe Schreiber on March 20th as he shares his experiences automating himself out of a job (in a good way), and discusses where to start and how to avoid risk.

    Joe will present his five steps and answer questions from the audience on how to:

    Collaborate with the rest of your team on automation
    Organize your multi-vendor toolbox and use APIs to ensure success
    Empower your teams to write reusable, value-driven code
    Leverage modern applications in containers, microservices, and serverless environments
    Got questions? Send them to Joe ahead of time to be included in the discussion.
  • Smart Energy in the Data Center
    Smart Energy in the Data Center
    Andy Lawrence, Executive Director of Research, Uptime Institute Intelligence Mar 20 2019 4:00 pm UTC 60 mins
    Smart energy is a trending concept in a field crowded with competing and complementary terms, technologies, and approaches – but has the business case yet been made? Andy Lawrence will share his views on where this technology segment is headed.
  • Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection
    Kubernetes & Zero Trust Security: Supporting a CARTA with Anomaly Detection
    Christopher Liljenstolpe, CTO, Solutions, Tigera Mar 20 2019 5:00 pm UTC 75 mins
    Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments. Anomaly Detection identifies outliers in Kubernetes clusters by building profiles of typical workloads and components to know when they start to deviate from the norm. It also manages network risk by continuously monitoring for activities such as reconnaissance scan, service connections anomaly, service bytes anomaly, and pod outlier activity detection.
  • Rethinking Enterprise Security Models
    Rethinking Enterprise Security Models
    Lee Fisher, Head of Security Business EMEA, Juniper Networks Mar 20 2019 5:00 pm UTC 22 mins
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • The Round the Clock Third Party Advantage
    The Round the Clock Third Party Advantage
    Brandon Dobrec, LookingGlass Cyber Solutions and Paul Roberts, Security Ledger Mar 20 2019 6:00 pm UTC 60 mins
    Vendors, suppliers, and independent subsidiaries are gaining more and more access to your network and sensitive data because today’s business models include outsourcing of non-mission critical programs and tasks, which brings a whole new world of risk to your organization. These not so new cyber risks make traditional perimeter defense no longer enough. Companies need continuous visibility and monitoring of their external partners threat landscapes. Use a cyber situational awareness platform that provides you with a map of your cyber risks you can identify vulnerabilities before the adversary does.

    In this webinar, LookingGlass Product Manager, Brandon Dobrec and Security Ledger Editor-in-Chief, Paul Roberts will discuss what you need to assess vendors in the modern cyber environment, providing you with the right map to assess your external risk.

    This webinar will answer:

    - Why point-in-time scorecards are a necessary component of third party risk management, but are woefully inadequate for proactively defending against future attacks

    - How a cyber situational platform delivers an outside-in view of your network, allowing you to see gaps in your network

    - Tools, capabilities, features, and functionalities are needed to assess vendor risk – continuous monitoring, alerting, reporting, and dynamic collection & scoring, among others

    - Common attack vectors, why these vectors remain open, and what attack vectors are emerging regularly
  • Don’t Get Jacked: 4 Steps to Protect Your Xaas in the Cloud
    Don’t Get Jacked: 4 Steps to Protect Your Xaas in the Cloud
    Speaker: Matt Chiodi, CSO, Palo Alto Networks Mar 20 2019 6:00 pm UTC 60 mins
    The good news is that AWS, GCP and Azure provide better core security than your data center could ever provide. The bad news is that your users can also provision a complete stack with only a few clicks... without any security oversight. This session will dissect the latest cloud-based high-profile breaches and highlight four critical steps organizations of all sizes can take to prevent them.
  • End-User Experience Monitoring: Nothing Else Matters
    End-User Experience Monitoring: Nothing Else Matters
    Alex Duncan, Senior Director of Microsoft Solutions Mar 20 2019 7:00 pm UTC 45 mins
    Monitoring is critical to any IT organization and most organizations have advanced monitoring of their core IT infrastructure. While this is important, the need to bring monitoring closer to the end-user is becoming of greater importance. With the proliferation of SaaS applications and more complex integrations of applications and datasets, end-user experience monitoring will help close the visibility gap to IT organizations, reducing help desk calls and increasing productivity.

    Riverbed’s SteelCentral Aternity tool can assist organizations with making this vision a reality.
  • Rethinking Enterprise Security Models
    Rethinking Enterprise Security Models
    Lee Fisher, Head of Security Business EMEA, Juniper Networks Mar 21 2019 3:00 am UTC 22 mins
    No matter where we look, everyday there is news of another hack, another data breach and another headache for security teams to deal with. Is it time to look at the security models we use and ask, if they are not effective today, how are they expected to be suitable going forwards? What models should our businesses adopt?

    Lee Fisher, Head of Security Business EMEA, at Juniper Networks discusses how security has matured, and proposes a new approach to protect our future.
  • Measure and Mature: Security Operations under the spotlight
    Measure and Mature: Security Operations under the spotlight
    Andrew Hollister, Chief Architect and Product Manager, LogRhythm Labs Mar 21 2019 10:00 am UTC 45 mins
    Effective security operations are the first line of defence when it comes to preventing cyberattacks. In order to accomplish this, organisations need a mature security program that leverages people, process, and technology to enable rapid detection and response.

    Yet some organisations struggle with the overall effectiveness of their security operations. They lack a model for maturing their capabilities. A mature security operation enables threats to be detected earlier in the cyberattack lifecycle which is critical.

    Join this webinar to discover LogRhythm's Security Operations Maturity Model (SOMM) which was developed to help organisations assess their level of maturity and plan for making improvements over time.

    Organisations can use this model to evaluate their current security operations and develop a roadmap to achieve the level that is appropriate in the light of their resources, budget, and risk tolerance. You will also hear about the critical measures of security operations effectiveness.
  • Part 2 SQL & Win Server End of Support : Migration Options and Cloud Migration
    Part 2 SQL & Win Server End of Support : Migration Options and Cloud Migration
    David Bloxham - SoftwareONE; Kaz Traverso - SoftwareONE; Paul Manaton - RiverMeadow Mar 21 2019 10:00 am UTC 26 mins
    With support for SQL Server 2008 and 2008 R2 ending on 9th July, 2019 and Windows Server January 2020, what are your upgrade options?

    End of support means the end of security updates, which can cause security and compliance issues and put applications and business at risk so it’s important to create an upgrade transition plan.

    SoftwareONE and migration acceleration specialists, RiverMeadow, will discuss the key considerations to ensure a successful transition including:

    •What are the available options: on-premise upgrades, migrate to cloud or do nothing?
    •Best practice methodologies
    •Cloud tooling options for migration acceleration
    •Cloud migration framework for success

    Organisations have options. Each is worth exploring and you may use multiple options to move workloads from SQL Server, depending on the workload.

    This webinar will primarily focus on cloud migration.
  • Wired Security -Don`t go breaking my Network!
    Wired Security -Don`t go breaking my Network!
    Richard Leadbetter, Technical Sales Specialist, EMEA & Derin Mellor, ClearPass Specialist, EMEA Mar 21 2019 10:00 am UTC 45 mins
    We’re all waking up to the fact that we need to start securing our wired edge networks. In theory this should be no different from securing wireless; and covered by the same access policies. The trouble is that the wire has always worked, instantly – and understandably we don’t like to mess with that! How do we recommend that wired security is approached to ensure a successful deployment? Join us to find out!
  • UK supermarkets - the longest cold war?
    UK supermarkets - the longest cold war?
    ISM Fellow - Andrew Grant Mar 21 2019 11:00 am UTC 30 mins
    Why you should attend:

    An up to date analysis of the UK supermarket sector - mergers, acquisitions, consolidation, relentless pressure - but why no all-out price war for the past 15 plus years - would Amazon's entry be the final straw?

    What you will learn

    •Unmissable for anyone selling into the UK supermarkets
    •Get yourself fully up to date with the latest changes that could impact your business
    •Delivered by an acknowledged industry expert
  • Avoiding Commodity Cybercrime
    Avoiding Commodity Cybercrime
    David Carroll, CEO, XQ Cyber & Andy Webb, Head of Products, UKCloud Mar 21 2019 11:00 am UTC 60 mins
    Join us for our upcoming webinar: Avoiding Commodity Cybercrime with David Carroll, CEO at XQ Cyber and Andy Webb, Head of Products at UKCloud.

    This webinar will explore the cyber risks faced by organisations with a particular focus on commodity cybercrime. Over the course of the webinar, XQ Cyber CEO David Carroll will delve into some infamous incidents of cybercrime, the possible implications organisations face from having poor cybersecurity. He will discuss why it's going to get worse, why should we care and what we can do about it.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • The digital disruption butterfly effect across European industries in 2019
    The digital disruption butterfly effect across European industries in 2019
    Angela Vacca, Giulia Carosella Mar 21 2019 2:00 pm UTC 30 mins
    The European vertical market digital scenario is more vibrant than ever, – with some industries that are on the edge of technological change, and others that are rapidly catching-up and showing interesting pockets of growth.
    In this IDC Web Conference Angela Vacca and Giulia Carosella from the IDC Customer Insights and Analysis team will discuss how European industries, such as transportation, finance, public sector and others, are ripe for the 2019 digital evolution, answering questions such as:
    •What are the key vertical trends that are driving IT spending in Europe?
    •How to spot technology hypergrowth pockets?
    •What is the digital disruption ‘butterfly effect’, and how will it affect European industries?
    Our webinar will help you improve your vertical go-to-market strategy and tactical planning, – highlighting what is under the spotlight for European industries, learning about real-life examples, and charting out a successful vertical digital roadmap for 2019.
  • Reimagining Identity Management
    Reimagining Identity Management
    Husayn Kassai (Onfido), Jeremy Grant (The Better Identity Coalition), Nathan Spanier (Remitly), Neil Chapman (ForgeRock) Mar 21 2019 2:00 pm UTC 45 mins
    Our panelist will discuss:
    -The benefits of a secure digital identity system
    -Where does blockchain come into play?
    -Cutting through the hype: real use cases
    -Reducing risk and mitigating fraud
    -New advancements in biometrics
  • How to Plan & Execute a Successful SAP Migration to AWS
    How to Plan & Execute a Successful SAP Migration to AWS
    Ricardo Casanovas, CTO & Co-Founder Linke / Guillem Torres, Solution Architect and SAP expert. Mar 21 2019 3:00 pm UTC 45 mins
    Join us to learn how to:

    - Plan & Execute SAP Business workloads migrations on AWS.

    - Cover the routes on each scenario: OS/DB platform, database size, downtime window and connection bandwidth.

    - Impact of each variable on the overall migration project and combine all together to shape the right migration strategy to AWS.

    This is a technical webinar aimed for Infrastructure Engineers, SAP Basis and OS/DB migration experts and technical decision makers.