Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
They are the workhorses of industrial operations and critical infrastructure. Industrial Controllers such as PLCs, RTUs an DCSs have been around forever and control virtually everything. Back when these controllers were deployed, there was little concern for security; but times have changed. As a result, you are now exposed to consistent and confusing noise regarding various ICS security approaches. You must take action, but what is the right action to take?
In this session we will help unravel the confusion and specifically:
- Explain the different approaches for ICS security
- Learn about the differences between active, passive and hybrid ICS security monitoring approaches
- Understand the benefits and disadvantages of each
- Learn which security gaps are addressed and not addressed by each approach
- Know which approach is best suited for protecting your ICS network
¿Sabes cuantos datos tienes en Cloud? ¿Cómo de rápido crecen? ¿Quién tiene acceso a ellos? ¿Estás preparado para las nuevas regulaciones como GDPR?
Mover cargas a Cloud requiere de una estrategia integral de protección de datos y de recuperación ante desastres que cubra toda su infraestructura independientemente del origen. Commvault ofrece una plataforma de gestión de datos exhaustiva con automatización y orquestación para acelerar las migraciones a Microsoft Azure y Office 365 mientras realiza todas las tareas de gestión de los datos (backup, recuperación, gestión de políticas, e-discovery, etc.).
Únete a nuestro webinar y conoce cómo la integración de Commvault con Microsoft Azure y O365 para la protección de datos te permite:
•Mover, gestionar y usar datos desde una única plataforma independientemente de si estos residen on-premise o en Microsoft Azure.
•Reducir tiempo, coste y esfuerzo aprovechando la automatización, orquestación y flexibilidad para reducir las tareas administrativas y manuales.
•Simplificar la gestión de los datos y la recuperación ante desastres
•Una eficiente integración en O365 para garantizar protección y recuperación granulares, cumplimiento de políticas de archivado y gobierno de información así como búsqueda avanzada de contenidos.
•Backup consistente de Sharepoint (Base de datos y objetos).
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!
Kristin Demoranville is a triple threat in STEM, she holds a BS in Environmental Management, has worked in Information Technology since dial up modems were a thing, and is currently focusing on Manufacturing Security & Global Policy at Sony.
There’s one certainty in cybersecurity: 2018's attacks are going to be even worse than the ones we've faced. So, how are cybersecurity experts and vendors gearing up to meet these new threats?
In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.
We’ll discuss how:
- Human-AI hybrid solutions deliver security that’s more than the sum of its parts
- SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
- Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies
To see how you can beat the big threats of 2018, register now!
Today’s digital businesses face more complex threats than ever before. These range from IT services failures, application latency and outages to performance and security issues, none of which your customers will tolerate. They expect services and applications to be available 24/ 7, wherever they are, and from any device. With these digital offerings increasingly at the core of your business, ensuring good quality service must be your top priority. Therefore solving IT issues as quickly as possible is essential.
You’ve adopted ITIL and ITSM best practices and your IT teams use lots of point solutions and processes, but are your business users getting the full value of IT? How do you make improvements? Based on what metrics? Are your processes fully integrated? Are the cross-functional teams fully collaborative? How do you measure performance?
In this webinar, Troy DuMoulin, Vice President of Research and Development at Pink Elephant, and Vincent Geffray, Senior Director of Product marketing at Everbridge will explore:
How to deliver on four seemingly contradictory objectives: innovation, speed, security, and compliance
Value-stream thinking vs. framework thinking
Lean IT and Incident Response Automation to improve end-to-end performance
Applications for ITSM, DevOps, and agile development
For many companies, Amazon Web Services is the foundation of their software apps, containing valuable software code that is critical to protect. Join us to learn about mistakes to avoid when using AWS Identity and Access Management (IAM) - and how to address them.
AWS solution architect will touch on Federated Users, Trust & Access Policies and AWS Organizations, and you’ll see a demo of how to set up a secure OneLogin+AWS deployment.
In this webinar you will learn:
- IAM misconfigurations made by AWS customers
- Best practices for AWS access security
- How to extend AWS IAM security using SAML integration, Multi-Factor Authentication, and AWS Roles
- How to get your own Free OneLogin for AWS Account
With the inception of the public cloud, including AWS and Azure, organizations have been introduced to a whole new range of financial issues that must be overcome. Furthermore, IT and financial teams need to understand, navigate, and address a highly dynamic and constantly changing enterprise cloud environment.
This webinar explores considerations for CFOs, procurement, and FinOps teams, including:
-why visibility and control is critical for budgeting and forecasting;
-how governance and accountability tactics can prevent cloud sprawl;
-how CFOs can ensure their organization is taking advantage of optimization opportunities;
-and cross-departmental challenges and strategies to ensure alignment around cloud initiatives.
Financial institutions - specifically FINRA and SEC regulated organizations - are required to protect their firm’s and clients’ data, capture and archive business records and make them discoverable.
They face challenges of swiftly producing required records during legal discovery and regulatory audits + demonstrating ongoing supervision of their employees despite an increased regulatory landscape, exponential data growth, decreases in staff and ongoing demand to lower costs
Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:
-Mitigate reputational risk
-Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
Cyber has yet to be fully integrated into the suite of business functions and monitored risks within most organizations. GRC is the mechanism to align cyber and the business, but it’s current state is not sufficient. Governance hierarchy is ineffective (CISOs reporting to the CIO or COO), Risk leveraging ambiguous risk measurements, and Compliance mistaken as security. Moving forward, Governance must be redefined, making CISOs business leaders, reporting to the Board. Risk should leverage traceable data to measure in a common business language. Compliance should be the baseline for security initiatives, not the end goal. When these initiatives can be achieved, GRC will transform cyber into a business enabler.
Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security where he leads the effort to quantify cyber risk in financial terms. Prior to Nehemiah he founded PivotPoint Risk Analytics which focused on cyber risk quantification through value-at-risk modeling and simulations. Jerry has a broad background in cyber, having worked for incident response, malware analysis, and services companies. He has spoken at a number of conferences worldwide including ISS World MEA in Dubai, InfoSecurity Russia in Moscow, and TM World Forum in Nice, France. He holds an MBA from the University of Massachusetts, an MS in Computer Science from the University of Pennsylvania, and a BS in Electrical Engineering from the University of Buffalo.
When it comes to security automation, you’re not limited to simple orchestration. Intelligent Automation can deliver the most value by removing the decision fatigue plaguing security analysts, allowing them to focus more effectively at stopping and resolving advanced threats.
Join this webinar to see Intelligent Automation in action and gain insights into:
* What is Intelligent Automation
* Why Orchestration alone doesn’t solve analyst fatigue
* Key capabilities of Intelligent Automation
* Demos of working examples
* Implementation best practices
Go beyond simple orchestration. Prepare yourself for the future of security automation.
This webcast provides an overview of CloudNine, the vision for our new robust suite of products and how they will extend and enhance your data and legal discovery efforts.
CloudNine recently acquired the Concordance, LAW PreDiscovery and Early Data Analyzer platforms. So, who is CloudNine, why did they acquire these products and what is their vision for them going forward? This presentation and technology demonstration led by CloudNine Vice President and eDiscovery Daily Blog author Doug Austin will provide attendees an overview of CloudNine and its capabilities and how the newly acquired products fit into the vision for the future of eDiscovery technology at CloudNine.
+ Who is CloudNine?
+ What We Do and How We Solve the Problems
+ Considerations for On-Premise, Off-Premise and Hybrid Approaches
+ What the Acquisition Means for Current On-Premise Customers
+ Looking to the Future with CloudNine Off-Premise and On-Premise Products
+ CloudNine Automated Legal Hold
+ CloudNine eDiscovery Platform (Upload/Process/Review/Produce)
+ CloudNine Automated Data Preservation and Collection
Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.
Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.
Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.
Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
The GDPR, or General Data Protection Regulation, will come into force on 25 May 2018 and has spurred many questions for IT teams trying to get up to speed on what the new regulation will require and how to achieve compliance in the most efficient way.
Join this webcast with John McLeod, AlienVault's CISO, and Dan Stocker, Coalfire's Practice Director of Cloud & Tech, to walk through frequently asked questions and best practices for GDPR compliance. John and Dan have been immersed in GDPR compliance efforts over the last several months and can share what they have learned, and answer your burning questions. The presenters will cover:
- What is GDPR and who is affected?
- How will GDPR impact organizations outside the EU?
- What is meant by personal data in the context of GDPR?
- What are some of the steps and effective tools you need to comply?
- What should your incident response plan look like in the event of a breach?
- What happens to companies that fail to comply?
We'll wrap up with a brief demo of the AlienVault Unified Security Management (USM) platform to illustrate how AlienVault can help accelerate and simplify your path to compliance.
Principal Product Marketing Manager, AlienVault
Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.
Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
In today’s environment data protection is more critical than ever and businesses are responding. This 13th edition of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales eSecurity, reveals how increased cloud use and accelerated compliance initiatives are driving adoption of new encryption strategies. Join Dr. Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:
• Growth in encryption and Hardware Security Module (HSM) usage
• The importance of performance, scalability and consistent policy enforcement across enterprise and cloud use cases for encryption solutions
• Trends in encryption deployment across multiple vertical markets and geographies that are useful for benchmarking
Since the GDPR is just around the corner, Balabit, a One Identity business, is holding a webinar session for facing difficulties fine-tuning their log management infrastructure to become compliant.
The GDPR mandates that Personal Data should be secured at all times, stored in an encrypted format, and only available to authorized personnel. As log messages can contain personal data they fall under the scope of the regulation.
In our 30 minute webinar session, you can find out how to make your logging infrastructure GDPR compliant with the use of syslog-ng.
The digital threat landscape moves too quickly for security teams to rely on disparate tools that slow down investigations and complicate protecting the organization. The time has come to embrace the power of a digital defense platform strategy to simultaneously reduce cost and business risk.
In this webinar featuring Frost & Sullivan Cyber Security Industry Principal, Jarad Carleton, we’ll cover:
How organizations should be leveraging “force multiplier’ platform technologies that provide unified insight and protection against threats across the Web, social media and mobile apps.
Why a platform approach is the best way for resource-constrained information security departments to reduce both mean time to detection (MTTD) and mean time to resolution (MTTR) of digital threats.
Customer mini-case studies that demonstrate the platform capabilities and ROI achieved.
How the RiskIQ platform maps to the Frost & Sullivan Cyber Resilience Framework.
Thank you for joining our Cloud Leaders Connect series!
To meet compliance requirements, governmental bodies and their subcontractors must store and process sensitive federal data separately from private sector workloads.
Leading cloud providers like AWS and Microsoft Azure have created isolated governmental regions to serve specific needs in the public sector, which has helped accelerate cloud adoption in the federal space.
But migrating to the cloud not only requires a different approach to regulatory compliance, but also operational management and application architecture as well.
In this webinar, you will learn:
- Benefits of the cloud in the public sector
- Key compliance frameworks that apply to governmental agencies
- Types of IaaS offerings available
- Cloud best practices
Last month, Congress authorized $380 million in federal funding for states to improve and enhance election security. Do you have a plan to take full advantage your allotted funding?
While the priorities for states differ, many experts are recommending careful consideration of cybersecurity improvements as your top priority.
RiskSense would like to invite you to join us this webinar titled "Do More to Safeguard Your Election Systems". In this presentation we will discuss how to improve the security of your election systems, voter registration, and vote tabulation systems. We will suggest industry best practices to establish a more secure, scalable, and more sustainable approach to improving your state’s election security.
Cloud…outsourcing…Platform as a Service…all of these could make IT irrelevant, so how do you prevent this? By providing value every day and by running IT as a Business. Great catch-phrase, but what does it mean? In a nutshell: knowing the services IT is providing, what they cost to operate and whether they provide value, and by staying on the cutting edge of technology even with todays fast pace of change, so that the business you support remains competitive. This webinar addresses the basic building blocks you need to run like a business: defining services and offerings, layering in financial management and charge-backs/show-backs so you understand the costs of these offerings and how to pull it all together in a way that helps you run as a business does, even if it’s only on paper.
The General Data Protection Regulation (GDPR) comes into force on May 25th, 2018. The GDPR changes the way that consent is sought and managed and it sets a high standard for consent. Consent means offering people genuine choice and control over how you use their data. When consent is used properly, it helps you build trust and enhance your reputation.
The changes from the GDPR reflect a more dynamic idea of consent: consent as an organic, ongoing and actively managed choice, and not simply a one-off compliance box to tick and file away. This webinar will help you to decide when to rely on consent for processing and when to look at alternatives. It explains what counts as valid consent, and how to obtain and manage consent in a way that complies with the GDPR.
About the Speaker:
Kristy Gouldsmith, CIPP/E, LLB, LLM, PGCE, BA, is a senior data protection GDPR consultant and the managing director of Sapphire Consulting Group, a leading UK data protection consultancy. Sapphire Consulting Group provide GDPR services such as audits, policies, data sharing agreements and training. Kristy is also the Data Protection Officer for a number of organisations including a multi-national software-as- a-service company, a large London-based serviced-office company and several firms of solicitors.
In this webinar, Mike reflects on Forrester’s forecast that 1 million US B2B salespeople will lose their jobs by the year 2020 and how disruptive technology is changing the game. Do you have the right sales model and skills to adapt? He will discuss what customers are demanding, plus the skills and behaviours required for B2B sales professionals to thrive.
In their attempt to defend against the increasing volume of advanced attack campaigns, organisations are buying more and more security solutions, unwittingly creating a complex and cumbersome cybersecurity architecture.
SIEM systems were supposed to be the industry’s solution to this problem, but they have failed miserably. Today’s SIEM systems create more problems than they solve, are very expensive, and ultimately ineffective.
This webcast led by Avi Chesla, empow founder and CTO, will review the evolution of SIEM technology over the years, the fundamental flaws in its design, and why it has failed. He will then dive into the technology behind next-generation SIEM, and the major role played by AI in it, so that InfoSec teams can cut through the noise in the cybersecurity arena and effectively evaluate the next wave of solutions: SIEM that finally works for you, instead of the other way around.
Come learn how NASDAQ used AWS Marketplace to purchase and launch AppDynamics unified Application Performance Management (APM) and business performance monitoring solution for their migration to AWS.
With AppDynamics, NASDAQ was able to move their critical applications to AWS and used AppDynamics to accelerate, visualize and validate the migration process. This allowed NASDAQ to improve their applications in AWS with business performance monitoring and make clear, understandable correlations between the quality of their customer experience with their applications.
The GDPR's enforcement date is finally around the corner: May 25th. Have you successfully conceived of this groundbreaking EU regulation as a business opportunity? Have you addressed the challenges of both compliance and customer trust in a more comprehensive fashion? In this webcast, ForgeRock experts Nick Caley, VP of Financial and Regulatory, and Eve Maler, VP of Innovation and Emerging Technology, and Carlos Scott, Digital Risk Consultant will:
- Discuss the GDPR in the context of regulatory compliance, digital innovation, and "ripped from the headlines" tensions in consumer trust and the personal data economy
- Describe important privacy, consent, and trust innovations made in recent times, including in the standards world (OAuth, UMA, and more)
- Demonstrate capabilities of the ForgeRock Identity Platform that address GDPR requirements, including a Profile and Privacy Management dashboard
As the band aptly named Europe said:
We're leaving together
But still it's farewell
And maybe we'll come back
To earth, who can tell?
I guess there is no one to blame
We're leaving ground
Will things ever be the same again?
It's the final countdown
With GDPR coming, businesses are endeavouring to change how they collect and use personal data with more accountable and compliant processes. However, the GDPR’s data breach notification requirements continue to present a challenge for many.
Join Duncan Brown, IDC and Ilias Chantzos, Senior Director, Global CIP and Privacy Advisor, Symantec and panel hosts to discuss
•Findings from the current IDC GDPR Assessment
•Gain practical advice on GDPR breach notification rules
•Guidance issued from European Data Protection Authorities
•Data transfers and how a breach can affect multiple locations and jurisdictions.
The banking industry is a lucrative target for cybercriminals and the increase in attacks is a huge concern for CISOs in the industry. Threats are evolving, getting more sophisticated and insider threats are increasing. In particular, payment fraud is key concern for the industry and pressure is mounting on security teams to avoid breaches as well as complying with more and more regulations and frameworks.
With attackers more determined and sophisticated, we must be able to detect anomalous activity, such as fraud, quickly to reduce the risk of suffering a damaging consequence/breach. This is especially true within the SWIFT environment and its security controls framework aims to establish a security baseline for the SWIFT community to help maintain a secure environment for all its users.
In this presentation, LogRhythm experts will focus on specific security controls from the framework and outline how SIEM and UEBA can be used to detect anomalous activity in a user’s local environment and how it can be stopped with the right response and mitigation approach. We will also outline how to automate compliance and other processes to help free up time to focus on real, higher risk alerts.
Join this session to:
•Understand what a typical cyberattack on a user’s local environment would look like with a real use case.
•Discover how the SWIFT security controls can be supported by SIEM solutions.
•How compliance automation can enable your organisation to meet regulatory and compliance demands efficiently.
While Family Offices do rely extensively on the human touch to create and nurture relationships, technology can enable humans to do jobs that need to be done but still low-value.
Indeed, this is becoming a selling point, but how can you know what tech is worth it vs. what tech is just fun to say you have?
Further, what new business models exist that are driving value for clients?
This webinar will explore;
* Future tech that will enable increased output: BlockChain, AI & Automation
* Non-office technology that enables human connection: health & travel hacks
* What the best Family Offices are using to service their clients
* How to identify where you can be more efficient in your operations
You'll leave this webinar with an understanding of what technology exists to streamline operations, cut your work in half, and make you physically able to work more effectively, and what new business models exist.
Marc A. DePaul, J Jack Family Office
Michael L. Kalscheur, CFP®, Senior Financial Consultant, Castle Wealth Advisors, LLC
Learn how DFLabs IncMan Security Orchestration, Automation and Response (SOAR) platform can help to automate, orchestrate and measure your security operations and incident response processes and tasks.
Join this webinar and take a look at the latest version of IncMan SOAR, including a range of new features and integrations, and discover how we can help you to leverage your existing technologies and streamline your workflows.
Keep your cyber incidents under control by orchestrating the full incident response and investigation lifecycle, automate actions, fuse security intelligence and share knowledge with machine learning:
- Minimize Incident Resolution Time by 90%
- Maximize Analyst Efficiency by 80%
- Increase the Amount of Handled Incidents by 300%
May 25th 2018 is the deadline day for achieving General Data Protection Regulation (GDPR) compliance. It is also only the beginning of GDPR.
Discover what GDPR means for your organization, how it affects US businesses and why it's important to be GDPR compliant.
Join this interactive Q&A panel discussion with industry experts to learn more about:
- The intersection of GDPR, privacy and cybersecurity
- How GDPR affects data governance, breach disclosures and overall data protection
- Recommendations for improving your organization's cyber resilience
- Brian Rutledge, Principal Security Engineer at Spanning
- Kalani Enos, IT Security Manager, FARO Technologies
- Heather Stratford, CEO of Stronger.tech
With the deadline for General Data Protection Regulation (GDPR) compliance all but here, those companies that have taken the necessary steps are wondering “what’s next?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.
This webinar will provide you with:
- A refresh of the GDPR requirements and risks associated with the failure to comply.
- An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
- A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.
About the presenters:
Shawn Ryan, MBA is a Senior Product Marketing Manager within the data security team at Imperva, a cybersecurity company with leading data and application security solutions protecting business-critical information in hybrid environments. In developing and executing marketing strategies and content that support the company’s data security portfolio, and enabling various stakeholders and partners, Shawn keeps a close eye on global privacy and regulatory changes, and ever-evolving customer needs.
Timothy Yim, CIPP/US/E, CIPT, CIPM, FIP, is Senior Regulatory Counsel at Imperva, a cybersecurity company with leading data and application security solutions protecting business-critical information in hybrid environments. He leads Imperva’s global data privacy program and other compliance initiatives. Timothy speaks frequently on data privacy at conferences and events, and is often quoted on current privacy events by the media.
Find out why data protection and encryption is an essential component of preparing for your GDPR readiness process.
Specifically, we will cover:
What is considered "Personal Data" and why it needs to be "protected"
The Legal Aspects of Data Protection under GDPR.
The technical ways to protect/pseudonymization
In this Session you will learn from the leading experts:
- Ulf Mattsson: The father of database Encryption.
- Martyn Hope: The Co-Founder of the GDPR Institut.
- Mark Rasch: Former Chief Cybersecurity Evangelist at Verizon and led the DOJ's Cyber Crime Unit.
There is a lot of discussion nowadays on how to use containers in production - are you there already?
When operating a production platform we should prepare for failure and in addition to monitoring working metrics, we cannot forget about the most common failure points. From an agnostic monitoring solution perspective, and following a use-case driven approach, we will learn the most common failure points in a Kubernetes infrastructure and how to detect them (metrics, events, checks, etc).
The advantages offered by a cloud-based environment make it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. In this session we will define hybrid cloud and talk about best practices to secure your company application and data assets as you start managing across both cloud and traditional IT environments.
Every company, regardless of size or industry, needs the advanced security capabilities provided by a security operations center (SOC). Until recently, only large enterprises had the means and resources to implement these essential technologies. So, where does that leave small to midsize enterprises (SMEs)?
In this upcoming webinar, Tuesday, May 22, at 11am PT/2 pm ET, Co-founder and COO of CyberEdge Group, Mark Bouchard, will share insights on the cybersecurity challenges facing small to midsize enterprises (SMEs), drawing on data from the recently published 2018 Cyberthreat Defense Report. We will also hear from Sr. Director of Product Marketing of Arctic Wolf Networks, Narayan Makaram, on the SOC options available to SMEs and will help to identify the top 10 capabilities to look for in a SOC-as-a-service.
By attending this webinar you will learn about:
• Cybersecurity challenges facing the IT organization in small to midsize enterprises (SMEs)
• Insights into what is driving the need for managed threat detection and response
• The top 10 essential elements of a SOC-as-a-Service
To discover how SMEs can get access to a SOC in the form of a SOC-as-a-service, register today!
About our key speaker:
Mark Bouchard, CISSP, is the Chief Operating Officer at CyberEdge Group, an award-winning research, marketing and publishing firm serving the needs of high-tech organizations worldwide. Before CyberEdge, Mark founded AimPoint Group, an independent IT research and consulting company specializing in information security. Prior to AimPoint Group, Mark was a Vice President at META Group (acquired by Gartner) where he helped hundreds of organizations worldwide address their IT challenges. A veteran of the U.S. Navy, Mark is passionate about ensuring the success of his clients.
With the effective date of GDPR only weeks away, many businesses are correctly concerned about their readiness to comply with its stricter standards for protecting the personal data of EU residents. This 30-minute webinar offers practical steps that your business or public-sector organization can take today to improve your GDPR compliance posture, with tips on how to:
•Understand GDPR terminology and roles
•Assess your inventory of personal data, its locations and movements
•Honor your new obligations to users on handling their personal data
•Deal with heightened regulatory scrutiny on data breaches
•Reinforce your data storage, backup and security policies and infrastructure to support your GDPR compliance efforts
The complexity and occasional ambiguity of GDPR regulations can freeze some IT organizations into inaction. But neither your management nor your customers will wait forever for evidence of your progress toward GDPR compliance. Learn how to get out of the starting gate with these pragmatic, actionable tactics.
About the speaker:
James R. Slaby works in product marketing at Acronis, where his focus includes security-oriented issues like ransomware and GDPR. Before Acronis, Slaby was an industry analyst covering IT security, cloud computing, and networking at Forrester Research, HfS Research, Yankee Group, and The Info Pro. With over 300 published IT research reports, he has been quoted in The Economist, Wall Street Journal, New York Times, and countless tech publications. Slaby has also held campaign, solutions, vertical and product marketing roles at a variety of tech vendors including Sonus, Acme Packet, Bay Networks and Motorola.
D-Day is right around the corner. By now, most companies are nearly completed with putting the necessary steps in place to meet the requirements. However, it is suspected that many companies will end up spending significantly more money per year meeting these regulations. Also, it is most likely that most of these changes have added more complexity to their business operations.
Yet, it doesn’t have to be this way. This webinar will highlight the 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted. It will then breakdown methods to optimize the processes and technology used to address these requirements in a way that will significantly lower the effort and cost of your company’s operations.
Join us to discuss:
- How to assess the level of exposure your company has to this regulation
- Recognizing the 10 key new data management requirements that have been put in place
- Identifying processes and tools that will significantly reduce the effort required to meet regulations
Organisations are still worried that they may still be open to GDPR legal issues and legal interpretation. Join our speakers Nick Pollard, Nuix and Gareth Atkinson, StartRiskLab who will explore where you should be right now with your GDPR preparations.
In this webinar, you will learn:
1. How to cross-reference your preparations
2. Understand the legal position on various GDPR schedules
Getting your company ready for GDPR isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.
GDPR requires a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.
Join Jill Reber and Kevin Moos of Primitive Logic to learn:
- How to work with third parties who process personal data on your behalf
- How preparing for GDPR helps you understand your data on a whole new level (and why that’s a good thing)
Customer data falling into the hands of cybercriminals. It’s the stuff of nightmares for any organisation. Today the insider threat has the potential to pose a bigger risk to cybersecurity than external hackers.
In this webinar, LogRhythm experts will take you through a real use case in which data worth millions of pounds was stolen. And they will explain how the incident could have been stopped with the right response and mitigation approach.
Join the webinar to:
• Learn how cybercrime has evolved so much that insider threats now rival external threats
• See a live display of activity generated by an insider threat
• Discover cybersecurity innovations that can detect and respond to insider threats in real time
Join us to get a better understanding of the insider threat – and how to combat rogue elements in your organisation.
Die DSGVO ist da! Wenn Sie jetzt nicht vorbereitet sind, kann Sie das teuer zu stehen kommen.
Am 25. Mai endet der Countdown für die DSGVO-Umsetzung. Ab dann gelten neue gesetzliche Bestimmungen zum Schutz sensibler Kundendaten – und zwar für alle Unternehmen, die personenbezogene Daten von EU-Bürgern verarbeiten, speichern oder weitergeben, unabhängig davon, ob ihr Sitz in oder außerhalb der EU liegt. Die DSGVO definiert strenge Regeln für den Umgang mit kritischen Daten, und es ist alles andere als einfach, Compliance sicherzustellen. Hinzu kommt, dass die Bestimmungen sofort in Kraft treten – und bei Verstößen hohe Bußgelder drohen.
Sprechen Sie mit den Symantec-Experten!
•Erfahren Sie, was die DSGVO für Sie bedeutet – und was Sie bei einem Angriff tun müssen
•Wir helfen Ihnen, Risiken richtig einzuschätzen, und geben Ihnen Tipps für die Zeit nach der Einführung.
•Was kommt noch auf Sie zu? Alles über die anstehenden gesetzlichen Neuerungen
•Bleiben Sie durchgehend auf dem Laufenden