Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • GDPR Mini-Webinar Series - Episode 8 - Working with Third-Parties
    GDPR Mini-Webinar Series - Episode 8 - Working with Third-Parties Amar Singh & Chris Payne Recorded: Jun 23 2017 13 mins
    Our eight-part mini-webinar series aims to get you up to speed with the main articles of the GDPR with short, no nonsense and informative webinars. In this webinar we will discuss working with third-parties
  • Breach Prevention Week: High-Performance, Intelligent, Centralized Management
    Breach Prevention Week: High-Performance, Intelligent, Centralized Management Navneet Singh from Palo alto Networks Recorded: Jun 23 2017 23 mins
    Greater Visibility, Faster Access, Workflow Automation

    The most innovative, advanced technology loses value if not managed effectively. We will discuss how to get access to the richest, most comprehensive set of actionable data from the network as well as from the endpoints or other third-party sources. Combined with complete network visibility and increased automation, organizations are able to streamline management workflows and focus on the issues that matter most.
  • GDPR Compliance: Data Management Practices for Success
    GDPR Compliance: Data Management Practices for Success Tony Fisher, Senior Vice President of Business Development & Strategy Recorded: Jun 22 2017 34 mins
    You know GDPR is coming. And with it are substantial penalties for noncompliance. What do you need to do to ensure that you are ready?

    The General Data Protection Regulation (GDPR) is a European Union regulation set to go into effect May 25, 2018. This regulation requires that you strengthen data protection and management technologies and practices if you do business in the EU, have employees or customers that are EU citizens, or otherwise store or access data about European Union citizens. Among other things, GDPR addresses how personal data can be exported, the right for a citizen to control and delete their own personal data, data protection requirements and how data breaches are to be treated and a variety of other data and process-related rules and standards.

    In this webinar, Tony Fisher, Senior Vice President of Business Development & Strategy at Zaloni, will discuss where GDPR sits in the world of big data, overall data lake strategies that help with compliance, and how metadata management is key to that strategy.

    Topics covered:
    - Metadata management
    - GDPR compliance and best practices
    - GDPR technologies
    - Data lake governance
  • Building Secure Vehicular Software
    Building Secure Vehicular Software Dr. Mark Sherman, Technical Director, CERT / Software Engineering Institute, Carnegie Mellon University Recorded: Jun 22 2017 36 mins
    Software plays an expanding and critical role in the success of future vehicles such as automobiles and trucks. Novel technologies that depend on the flexibility of software create new vulnerabilities and new ways to attack systems. This talk explores the expanding landscape of vulnerabilities that accompany the increasing reliance on software and then examines some key steps to help mitigate the increased risk: development of appropriate requirements from an analysis of risks, techniques that can be applied during development, and evaluation approaches for existing systems. The talk will conclude with a view of emerging approaches to further improve the delivery and sustainment of such critical software.

    About the Presenter:
    Dr. Mark Sherman is the Director of the Cyber Security Foundations group at CERT within CMU’s Software Engineering Institute. His team focuses on foundational research on the life cycle for building secure software and on data-driven analysis of cyber security. Before coming to CERT, Dr. Sherman was at IBM and various startups, working on mobile systems, integrated hardware-software appliances, transaction processing, languages and compilers, virtualization, network protocols and databases. He has published over 50 papers on various topics in computer science.
  • Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security
    Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security Heidi Shey - Senior Analyst at Forrester and Nico Popp - SVP Engineering, Information Protection at Symantec Recorded: Jun 22 2017 57 mins
    Keeping data safe pays dividends for protecting your reputation and retaining trust. No-one wants to suffer a breach, let alone a mega breach, but how should you invest time and resources to prevent this?

    In this webinar, guest speaker Heidi Shey (Senior Analyst at Forrester) will join Nico Popp (SVP Engineering, Information Protection at Symantec) as they guide you through the evolving world of data protection and explain how a holistic approach to data security and identity puts you back in control.

    Such a data centric approach combines data discovery, protection and identity and delivers two key benefits:

    •Ensures data is only available to the right users, irrespective of location (including cloud), organization or device

    •Provides protection throughout the data lifecycle

    The webcast will include a review of best practices to help you understand how a proactive, data-centric approach makes best use of your resources, and safeguards your – and your customers’ – critical data.
  • Security Practices for a More Secure Cloud
    Security Practices for a More Secure Cloud Kurt Hagerman, CISO, Armor; Raj Goel, CTO, Brainlink; Keith Young, Security Official, Montgomery Cty Govt. Brandon Dunlap Recorded: Jun 22 2017 60 mins
    The cloud is full of potential – but also unwanted risks and guests. Threat actors of all skill levels and intentions seek to disrupt, destroy and derail your utilization of cloud hosting for your critical data workloads. How do you defend against this menace? Join Armor and (ISC)2 on June 22, 2017 at 1:00PM Eastern for a discussion on securing and maximizing your cloud investment. We’ll examine the expertise needed, the need to share responsibilities, leveraging proven and emerging technologies and the role integration and automation plays.
  • Threat Intelligence: Actionable Insights to Global Attack Trends
    Threat Intelligence: Actionable Insights to Global Attack Trends Dean Suzuki, Technical Architect, Microsoft; Anton Sarkisov, Technical Solutions Professional, Microsoft Recorded: Jun 22 2017 32 mins
    The average cost of a data breach has risen to $4 million, with costs incurred for litigation, brand or reputation damage, lost sales—and in some cases—complete business closure.*

    Your organization can stay ahead of threats with Office 365 Threat Intelligence, which leverages the Microsoft Intelligent Security Graph to analyze billions of data points from Microsoft global data centers, Office clients, email, user authentications, signals from our Windows and Azure ecosystems and other incidents that impact the Office 365 ecosystem. It provides information about malware families, including breach information with details down to the actual lines of code that are used for certain types of malware.

    Join this webinar to understand how your organization can become more secure through the powerful new features of Office 365 Threat Intelligence, including:

    - Interactive and intuitive tools to analyze prevalence and severity of threats in near real-time
    - Real-time and customizable threat alert notifications
    - Remediation capabilities for suspicious content


    * Source: The Ponemon Institute study
  • The Results Are In: Open Source 360 Survey
    The Results Are In: Open Source 360 Survey Tim Mackey, Sr. Technology Evangelist, Black Duck; Bob Canaway, CMO, Black Duck Recorded: Jun 22 2017 60 mins
    Today, open source drives technology and development, and its worldwide adoption ranges from companies with a single employee to large corporations like Microsoft and Apple. All of these organizations rely on open source to innovate, reduce development costs, and speed time to market. Recent research reports point out that open source comprises 80% to 90% of the code in a typical application. Our Open Source 360° survey provides an update on the rapid evolution of open source development, use and management.

    The 2017 Open Source 360° survey was conducted through Black Duck’s Center for Open Source Research & Innovation (COSRI), focusing on four important areas of open source – usage, risk, contributions and governance/policies. Our respondents include input from new players, established leaders, and influencers across vertical markets and communities. This range of respondents drives broad industry awareness and discussions of these key issues.

    Please join Technology Evangelist Tim Mackey (@timintech) and CMO Bob Canaway (@bobcanaway) to review the results from the Open Source 360 Survey. Please bring your questions! 

    Follow the conversation on Twitter, using the hashtag #OSS360.
  • The Future of ITSM – Speed & Suppliers
    The Future of ITSM – Speed & Suppliers Troy DuMoulin - VP, Research & Development at Pink Elephant. Peter Hubbard - Senior ITSM Consultant & Lecturer Recorded: Jun 22 2017 64 mins
    It is the nature of all things to constantly evolve based on the dynamics of a changing environment. This is equally true of the IT Service Management models we use. Two of the primary shifts we are seeing in the industry include:

    1.The demand for IT processes acceleration and agility driven by the growing rate of business demand

    2.Increased 3rd party integration in our service delivery models as organisations leverage cloud based services and externally source a growing percentage of their IT value chain

    In this engaging webinar hosted by both Pink Elephant UK and North America we will look at these two trends.

    (Process Speed/Agility & Supplier Integration)

    Join Peter Hubbard and Troy DuMoulin as they address the concepts of:

    •Agile Service Management: ITIL, Agile & Lean - Better Together


    •Service Integration & Management (SIAM) – building a “One Team” delivery approach.
  • eIDAS: Enabling Convenience and Confidence in Digital Transactions
    eIDAS: Enabling Convenience and Confidence in Digital Transactions Juan Asenjo, Senior Manager - Partner Marketing, Thales e-Security. Recorded: Jun 22 2017 53 mins
    The EU’s Electronic Identification and Trust Services (eIDAS) Regulation establishes legally binding electronic signatures for secure cross-border transactions. Businesses and consumers alike stand to benefit from the convenience and confidence that the new capability enables. To make this digital transformation a reality, an ecosystem of trusted identity, signature, time stamping, and validation services is being deployed across the continent. Whether you are one of these trust service providers, an organization accepting digital transactions form clients, or that consumer end user, eIDAS will impact your daily life.

    Thales and its technology partners play a critical role in the eIDAS ecosystem. As qualified signature creation devices (QSCDs), Thales nShield hardware security modules (HSMs) establish the root of trust for eIDAS trust services. Join this webcast to learn how Thales is serving the eIDAS community and helping you achieve the digital transformation.

    WHAT YOU WILL LEARN:
    • What eIDAS means to organizations and consumers
    • How eIDAS is changing the way we all do business
    • Why a robust root of trust is so important for security
    • Where eIDAS is having its initial impact – case stories
  • 6 Hidden Security Risks for Industrial Environments
    6 Hidden Security Risks for Industrial Environments Rob Caldwell, ICS Manager, FireEye Recorded: Jun 22 2017 35 mins
    Industrial enterprises – like electric utilities, petroleum companies, and manufacturing organisations – invest heavily in industrial control systems (ICS) to operate industrial processes efficiently, reliably, and safely. Without technology operating the plant floor, business halts or worse.

    Join our webcast to discuss six key plant floor weaknesses that adversaries exploit to undermine plant operations. Subversive and difficult to detect, explore the implications and a step-by-step checklist for mitigating these risks firsthand with our experts.
  • Change Liability for Accountability - GDPR with Cyber Security Risk Measurement
    Change Liability for Accountability - GDPR with Cyber Security Risk Measurement Christopher Strand, Carbon Black, Andrew Barratt, Coalfire, Adrian Davis, (ISC)² EMEA Recorded: Jun 22 2017 63 mins
    This webcast will introduce a discussion of several threat models that help to illustrate how organizations can look to strengthen their security posture while supporting their GDPR strategy. Areas of concentration will include:

    • How to reduce the potential risk and liability associated with the GDPR data residency and data protection accountability requirements.
    • Focus on specific controls used to provide clarity and measure to any GDPR strategy within the enterprise.
    • An introduction of cybersecurity control measure that can help reduce threats to the enterprise, while ensuring acceleration of data and security regulatory accountability for any GDPR program.

    Session attendees will take away many practical examples, solutions, and anecdotes on how their businesses can alleviate the pressures of balancing the confluence of security risks and the GDPR mandate. They will have some starting points on how they can create a plan to step beyond static regulatory alignment and apply collective intelligence, industry baseline initiatives and mandates, as well as shared industry intelligence, to better measure what’s most important to their cyber policy and regulatory GDPR requirements.
  • Countdown to GDPR with Symantec
    Countdown to GDPR with Symantec Symantec Recorded: Jun 22 2017 63 mins
    Keeping a handle on your organisation’s sensitive and personal information is a tough challenge. More data, more technology, more ways to communicate and more remote users. Start your journey to GDPR with the powerful integration of Symantec products and the join our webinar with our panel of experts to really understand how to navigate the technology to ensure your GDPR journey is a smooth one, and one that enhances your cyber and security processes at the same time.

    Now that the General Data Protection Regulation (GDPR) is almost here, you need better visibility over:

    1.Information risk – where it is, who uses it, and how much risk it’s at from breach, loss or misuse
    2.IT risk – so you can see how well protected information is within servers, networks, and the devices that house and transact it
    3.User risk – to know how much risk user behaviour poses to your information, systems, operations and brand reputation

    Join us for the first of our GDPR series, addressing technologies that help organisations determine data risk and protect data, devices, and networks against that risk.

    Register now for the second of our series in August looking at proactive technologies that can detect signs of a data breach and help respond more quickly and comprehensively.
  • Protect Against Ransomware
    Protect Against Ransomware Adam Licata, Senior Product Marketing Manager, Symantec; Damon Covey,Director of Product Management, Symantec Recorded: Jun 22 2017 56 mins
    Ransomware attacks are on the rise and wreaking havoc like never before. Attend this webinar to find out some of the key things you can do to greatly reduce the chance of Ransomware ever becoming an issue for your organization. We will discuss how to set up a strong defense across email, web, endpoints, and workloads.

    Join us for this free session today!
  • Is Hybrid AI SOC in Your Future?
    Is Hybrid AI SOC in Your Future? Narayan Makaram, Senior Director of Product Marketing, Arctic Wolf Networks; SC Magazine Recorded: Jun 21 2017 31 mins
    Watch this webcast for an in-depth conversation about Hybrid AI and get clarification on the following:

    - Artificial Intelligence versus Hybrid AI
    - Hybrid AI when applied to a SOC
    - Incident response (human versus machine-driven)

    There will also be discussions around the following questions:

    - Can machines make decisions?
    - Can Hybrid AI systems operate autonomously?
    - What is missing in a SOC? How can Hybrid AI be added to a SOC?
    - Can Hybrid AI help alleviate staffing shortage?
  • Defending IoT Devices Against Ransomware, Viruses and Worms
    Defending IoT Devices Against Ransomware, Viruses and Worms Dean Weber, CTO, Mocana Recorded: Jun 21 2017 45 mins
    Cyber attacks are on the rise and becoming more dangerous impacting the safety of smart cities, smart homes and the Industrial IoT. Stuxnet, Black Energy, Mirai, Brickerbot and Wannacry cyber incidents have used a variety of vectors of attack on IoT and industrial control systems made possible by vulnerable devices and a lack of strong cybersecurity controls. Hackers are not just interested in stealing data; they want control and can significantly impact the safety and reliability of systems that affects the risk profile of a company.

    Join this webinar to learn about the:
    - Details of the systems and software that were compromised in recent cyber attacks
    - Common vectors of cyber attack on IoT and industrial control systems
    - How to defend against cyber attacks by leveraging embedded security controls in IoT and ICS devices
    - How create a chain of trust workflow to harden devices and ensure secure communications.

    About the presenter:
    Dean Weber, CTO of Mocana, is an expert in cybersecurity for embedded systems, IoT and industrial control systems. He has more than 30 years of experience in security, cybersecurity and information systems, Dean is a trusted advisor to CISOs at Fortune 1000 companies. Prior to Mocana, he was the CTO of Applied Identity, which was sold to Citrix. He spent several years in the U.S. Navy working in physical and electronic security.
  • The Future of Cybersecurity and the Internet of Things
    The Future of Cybersecurity and the Internet of Things Demetrios "Laz" Lazarikos (Blue Lava), Mark Weatherford (vArmour), Robert M. Lee (Dragos) Recorded: Jun 21 2017 61 mins
    With the proliferation of the Internet of Things (IoT) into every aspect of our society, cyber attacks on a massive scale are becoming a possibility, and in some cases, a reality. Attackers can take out city grids, hijack control systems and engage in cyber war remotely.

    This panel of top cybersecurity experts will discuss how connected devices are affecting our critical infrastructure security, the IoT and cyber warfare, and what we need to do today to address the security challenges posed by IoT devices.

    Speakers:
    - Demetrios "Laz" Lazarikos, Three Time CISO, Founder of Blue Lava
    - Mark Weatherford, Chief Cybersecurity Strategist at vArmour
    - Robert M. Lee, CEO and Founder of Dragos, Inc.
  • Bitglass Webinar Express: Securing the Cloud for Financial Services
    Bitglass Webinar Express: Securing the Cloud for Financial Services Jacob Serpa, Product Marketing Manager, Bitglass Recorded: Jun 21 2017 28 mins
    Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they face heavier regulations than many other enterprises. As cloud adoption continues to spread within the industry, financial services firms must be particularly focused on ensuring cybersecurity. However, this means that they can no longer rely on traditional, on-premises security solutions. In this webinar, we will discuss cloud access security brokers (CASBs) and how they can help financial services firms solve their security, compliance, and deployment concerns.

    What you’ll learn:
    - Understand the specifics of how a CASB can provide comprehensive security for financial institutions that use cloud apps.
    - Find out how to select a security solution that can solve the compliance problems faced by financials.
    - Learn about what is needed for smooth security solution deployment (and employee buy-in).
  • [Webinar] Cyber ranges: Because you don't #wannacry
    [Webinar] Cyber ranges: Because you don't #wannacry Amritam Putatunda,Technical Product,Ixia, Alex Handy,Tech Journalist,THENEWSTACK,Pascal Joly,Tech Partnerships ,Quali Recorded: Jun 21 2017 58 mins
    Despite billions of dollars invested in cyber security measures, companies are still falling behind when it comes to cyber attack prevention. Case in point, The recent malware campaign “WannaCry” that was able to infect more than 300 thousand systems in short duration of time. This is a testimony to the fact that investments in proactive, rather than reactive defense strategy is acutely needed. Current cyber range solutions are often siloed efforts that takes weeks to set up and cover limited scenarios.
    Addressing these problems requires a new approach with on demand self-service environments to train incident response teams in a holistic manner across the entire organization and simulate a comprehensive set of attacks on IT infrastructure.
    In this webinar you will learn how you can use the power of Quali sandboxes and Ixia Breaking Point solution in creation of a Cyber Range training environment to
    -Rapidly provision full-stack, real-world cyber threat environments
    -Generate thousands of unique attacks mixed with a large variety of real life traffic profiles
    -Reports and grades that measures trainees abilities to neutralize attacks while maintaining traffic continuity.
  • Medical Device Security: An Industry Under Attack and Unprepared to Defend
    Medical Device Security: An Industry Under Attack and Unprepared to Defend Larry Ponemon, Chairman of Ponemon Institute & Mike Ahmadi, Director of Critical Systems Security of Synopsys Recorded: Jun 21 2017 49 mins
    A recent survey commissioned by Synopsys was designed to understand the risks to clinicians and patients due to insecure medical devices. The resulting report identified some expected findings, but others were extremely surprising. For instance, 67% of medical device manufacturers and 56% of healthcare delivery organizations believe an attack on a medical device built or in use by their organization is likely to occur over the next 12 months. Join Larry Ponemon of the Ponemon Institute and Mike Ahmadi of Synopsys as they discuss report highlights. They will also provide insight and predictions regarding the future of security in the medical device and healthcare industries.
  • Security at Speed: Integrating AppSec into the Tools you Already Use
    Security at Speed: Integrating AppSec into the Tools you Already Use Tim Jarrett, Sr. Director, Product Marketing Recorded: Jun 21 2017 56 mins
    Did you know the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you already use? And our flexible APIs allow you to create your own custom integrations or use community integrations, built by the open source community.

    Join us for a webinar as we explore ways in which you can use integrations to help you go faster, without sacrificing security. Below are a few ways Veracode can integrate into your Agile and DevOps processes:

    • Integrated Development Environments (IDEs)
    • Build Servers
    • Defect Tracking Systems
    • Governance, Risk and Compliance Solutions
  • Smart Cities, a Hacker's Playground
    Smart Cities, a Hacker's Playground Tony Gillespie, US Public Sector Strategist, ForeScout Technologies Recorded: Jun 21 2017 31 mins
    It’s clear that smart technologies and the Internet of Things (IoT) are the future of our communities. Is government ready for billions – soon to be trillions – of sensors and devices connected to one another that will transform our society? This session explores the role of government in using, exploiting, controlling and surviving the hyper-connected world of IoT and how it will affect our communities.
  • Real-time IoT Analytics: 4.5 Million Telco Devices Managed at Scale
    Real-time IoT Analytics: 4.5 Million Telco Devices Managed at Scale Eric Tran-Le, Global Chief Marketing Officer, Logtrust Recorded: Jun 21 2017 60 mins
    With more than 4.5 million digital devices in the field, delivering billions of data streams for TV and Video On-Demand services, this Fortune Global 500 Telco needed to improve Quality of Experience (QoE) and Quality of Service (QoS) – in real-time. Because every second counts and time-to-insight matters, managing the volume, variety and velocity of data streaming in real-time, and analyzing against historical data needed to be effortless, seamless and lightning fast. Using Logtrust’s Big Data-in-Motion technology, Tran-Le will showcase how the Telco giant analyzes in real-time billions of data for 20 million customers each day, and has reduced call volume, improved QoE/S, and saved millions of dollars a year.

    Key Takeaways:

    • Understanding current IoT data management challenges
    • Overcoming the technology and data scalability wall
    • Analyzing past and present “events of interest” across millions of IoT devices
    • Making sense out of chaos for time-sensitive IoT/Big Data applications for rapid time-to-insight and value

    Eric Tran-le is the Global Chief Marketing Officer at Logtrust, a Big Data-in-Motion as-a-Service solution provider for fast data, big data analytics. He has more than 20+ years’ experience in both product management and operational system engineering for managing private and native cloud applications at scale. Tran-Le is leading real-time threat hunting, security and IoT analytics initiatives at Logtrust. Formerly, Tran-Le was VP Oracle Management Cloud Services, VP Enterprise Cloud Management, and VP Product Management at Oracle, as well as Network Business Unit Manager at Microsoft.
  • Kick Start Your Data Classification Initiative
    Kick Start Your Data Classification Initiative Guest Speaker: Heidi Shey, Forrester Research - Martin Sugden, CEO, Boldon James Recorded: Jun 21 2017 61 mins
    Key considerations to make your data classification project a success.

    Data classification is no longer a nice to have -- it's a necessity. Join experts from Forrester Research and Boldon James for a webinar to learn more about the state of the data classification market today, pitfalls to avoid at a strategic and tactical level when classifying data, and what to consider when evaluating a classification solution.

    Watch this webcast to learn:
    • State of data classification today
    • What you need to know when classifying data
    • What to consider when evaluating a classification solution
  • Focusing Your Cloud Visibility: Extending Control Across the Hybrid Network
    Focusing Your Cloud Visibility: Extending Control Across the Hybrid Network Amnon Even Zohar Sr. Product Manager, Cloud Security Recorded: Jun 21 2017 45 mins
    For many security teams, the primary challenge of cloud adoption is how to gain the same level of visibility that exists for on-prem platforms.

    The Tufin Orchestration Suite has been a key solution for gaining central visibility and control across security vendors and platforms in the physical network and for reducing the complexities associated with a distributed environment.

    Join this session to learn how Tufin can provide you with the insight you need into your private and public cloud platforms. You’ll hear how you can leverage the Tufin console to manage security, connectivity, and compliance across your hybrid networks, and much more.
  • Lessons Learned from the S3 Breach
    Lessons Learned from the S3 Breach Todd Bernhard, Product Marketing Manager, CloudCheckr Jun 26 2017 6:00 pm UTC 60 mins
    Industry-leading security analysts have identified publicly available S3 storage buckets on at least one high profile site. While this is a legitimate concern, it presents a timely opportunity for all cloud administrators to revisit their own security policies and take action. Security breaches can rapidly burn through budgets—and destroy businesses.

    While public cloud providers provide the foundational security services, the responsibility is on organizations and end users to ensure their cloud infrastructure is secure. CloudCheckr’s Best Practice Checks enable proactive security monitoring and automation to prevent hacks through available S3 buckets, vulnerable ports, and more. Join us to learn tools and tips to keep your cloud secure:

    - Best Practice Checks that can detect such concerns before they become an issue
    - Fix Now automation tools that can automatically correct such issues
    - Regulatory tools to ensure compliance with security standards
  • Best Practices and Future Direction of Security Awareness Training
    Best Practices and Future Direction of Security Awareness Training Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 Jun 26 2017 6:00 pm UTC 60 mins
    While reported numbers fluctuate from industry study to industry study, they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start.

    Join security awareness expert Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and former Gartner Research Analyst for this live webinar “Best Practices and Future Direction of Security Awareness Training”. We will discuss emerging industry trends and provide the actionable information you need to train your last line of defense, your employees.

    Perry will cover these topics:

    - Practical security awareness and behavior management tips
    - Outline how and where tools are helpful
    - Discuss emerging industry trends
    - How to create a “human firewall”
  • What should you do when a director gets arrested?
    What should you do when a director gets arrested? Chin Yong Kwek, Associate Managing Director, Kroll Jun 27 2017 5:00 am UTC 90 mins
    Join Kroll’s expert as we discuss some of the issues relating to the legal, operational, reputational risks which companies must consider when facing such incidents, and how these risks can be mitigated.
  • Voorkom onnodige financiële risico's door SAP 'Indirect Gebruik'
    Voorkom onnodige financiële risico's door SAP 'Indirect Gebruik' Henk Dibbets - Director IT Asset Management at CGI, Koen Schaeffers - Product Specialist SAP at Snow Software Jun 27 2017 8:00 am UTC 75 mins
    Samen met onze partner CGI organiseren wij een webinar waarin wij u uitleggen hoe u onnodige financiële risico's door 'Indirect Gebruik' van SAP kunt voorkomen. Als software experts zien wij in de praktijk dat de licentiering voor SAP nogal complex is. Zoals u vermoedelijk wellicht weet werkt SAP met custom contracts en daarnaast zorgen 3rd party applicaties en add-ons voor veel verwarring. Dit type toegang is bekend als indirect usage.

    SAP-klanten lopen steeds vaker tegen financiële risico’s aan door audits. Wilt u dit voorkomen? Volg dan ons Webinar en wij leggen u binnen een uur uit:
    - Hoe identificeert u “inactive users” binnen uw SAP domein
    - Hoe analyseert u zogenaamde overspent of underspent situatie’s
    - Hoe identificeert u Indirect Usage binnen uw organisatie.
    - Welke SAP condities en voorwaarden leiden tot financiële risico’s
    - Wat kunt u al doen aan indirect usage?

    Voorkom een hoge audit boete voor uw organisatie! Zorg ervoor dat u volledig voorbereid bent en verlaag uw risico tot een minimum.

    Mocht u nog vragen hebben over het Webinar neem dan gerust contact op via infonl@snowsoftware.com
  • Identifier rapidement ses assets et gérer au mieux les attaques type WannaCry
    Identifier rapidement ses assets et gérer au mieux les attaques type WannaCry Leif Kremkow, Directeur Technique, SEMEA Jun 27 2017 8:00 am UTC 60 mins
    On ne vous explique plus ce qu’est WannaCry et l’impact que le ransomware a eu avec plus de 200 000 infections dans 150 pays depuis le 12 mai dernier.

    Vous savez également que Wannacry utilise l’exploit ETERNALBLUE et vise donc la vulnérabilité Microsoft (MS17-010).
    Mais ce que vous ne savez peut-être pas c’est que seulement 28 jours sont nécessaires pour que l’attaque soit effective​ ​!
    Autrement dit, les entreprises qui scannent leurs vulnérabilités mensuellement ou moins fréquemment sont à risque.

    Lors de ce webcast, Leif Kremkow Directeur Technique, Qualys vous expliquera comment :

    * Patcher et limiter les effets de WannaCry et d’attaque​s​ du même type
    * Détecter et obtenir une visibilité complète des assets touchés pour agir au mieux et au plus vite
    * Mettre en place un processus priorisé de remédiation des menaces pour limiter et gérer ​de façon optimum.​
    * Enfin pour lutter contre WannaCry, nous avons offert à nos clients un service gratuit et illimité de 30 jours pour identifier et remédier. Nous ferons un bilan de cette opération.

    Inscrivez-vous au webcast et découvrez comment Qualys peut vous aider.

    Session question/réponse en fin de webinar.

    Au plaisir de vous retrouver prochainement
  • Prepare for GDPR: how do you prove you’ve trained your people appropriately?
    Prepare for GDPR: how do you prove you’ve trained your people appropriately? Amanda Maguire- Education Solution Architect, SAP Education EMEA Jun 27 2017 10:00 am UTC 60 mins
    GDPR – if you haven’t heard of it yet, you soon will.  The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is intended to strengthen and unify data protection for all individuals within the European Union and it will apply from 25th May 2018.
     
    SAP’s strong offerings in terms of Governance, Risk, Compliance and Security help protect organisations at the level of systems, processes and in-built controls.  But what about the people part of the picture? SAP Education offers support for both training your people and, testing them so you can prove you’ve taken every step to fulfil the regulation and prevent compliance breaches.
     
    Join us live on June 27th for a 50-minute FREE webinar& demo to find out how SAP Assessment Management by Questionmark can reduce risk and help you comply through thorough and verifiable assessment.
     
    Amanda Maguire is a senior education architect with over 20 years' experience on business transformation programmes. With a career focused on the impacts on people – project team members, end users, suppliers and customers, Amanda has a passion for effective and engaging education, enabling people through innovative learning interventions. Her experience is wide ranging - from national to global programmes in a variety of industries.
  • Mastering Operational Risk. Theory and Practice in a single package.
    Mastering Operational Risk. Theory and Practice in a single package. Boris Agranovich, Calvin Lee Jun 27 2017 2:00 pm UTC 90 mins
    Join me and our guest, Calvin Lee, Operations Director at RISKID, for a lively discussion as we aim to dispel confusion surrounding many of the elements of the Operational Risk framework.


    Operational risk is perhaps the most significant risk organizations face. Virtually every major loss that has taken place during the past 30 years, from Enron, Worldcom and Baring's Bank to the unauthorized trading incident at Société Générale and the subprime credit crisis, has been driven by operational failures.

    Many financial institutions have spent millions of dollars trying to develop a robust framework for measuring and managing operational risk. Yet, in spite of this huge investment, for many firms developing a viable operational risk management (ORM) program remains an elusive goal.

    This webinar is designed for both current students of the “Mastering Operational Risk” - http://www.globalriskacademy.com/p/orm online course and for other busy risk professionals who are interested in studying both theoretical and practical application of ORM but don’t have time to attend in-person classes.

    The goal is three-fold:

    1. Existing students will be able to understand more on how to work with the RISKID tool and get an opportunity to ask questions about the subject matter.
    2. People who are planning to join the course will get some explanation in what is the course about, how the e-learning system works.
    3. People who are just interested to know more about ORM

    During the webinar we will cover:

    1. 3 things most organizations are focusing on right now.
    2. What are the major steps to take control of operational risks.
    3. How to use Collaborative Risk Management tools to conduct your ORM operations and why traditional risk management practices involving risk registers and Excel are not effective anymore.
  • 3 Reasons Network Security Policy Management is a Big Deal
    3 Reasons Network Security Policy Management is a Big Deal Ron Kehoe CISSP, CISA, CISM, GCIH Senior Solutions Engineer Jun 27 2017 3:00 pm UTC 45 mins
    If you missed Data Center World conference in April 2017, then you also missed the session explaining what is Network Security Policy Management (NSPM) and why it's a big deal.
    Join this Webinar to learn how the complex nature of data centers today drives the adoption of NSPM and what are the benefits to your organization.

    Ron Kehoe has over 30 years of experience in security solutions architecture and consulting, and was a network security manager at First Republic Bank prior to joining Tufin as a senior solutions engineer.
  • 3 Pro Tips for Black Duck Hub & Ask the Experts
    3 Pro Tips for Black Duck Hub & Ask the Experts Black Duck Product and Implementation Team Jun 27 2017 3:00 pm UTC 60 mins
    Join our next customer webinar where YOU are the star of the show! Our Ask the Experts panel features Hal Hearst, Principal Product Manager; Utsav Sanghani, Product Manager; and Don Mulrenan, Manager Implementation Services. They’ll present their top three tips for scanning your code, helping you use Black Duck Hub’s features most effectively. We’ll leave plenty of time for Q&A with the panel. Submit your questions now by emailing jenny@blackducksoftware.com, or ask them during the webinar. We’re excited to have this opportunity to answer your questions and hear your feedback about Black Duck Hub. Register today.
  • Scaling Security Workflows for Enterprise
    Scaling Security Workflows for Enterprise Scott Jeschonek & Keith Ober, Avere Systems Jun 27 2017 3:00 pm UTC 45 mins
    For most enterprises dealing with increased security threats, limiting machine data collection is not an option. But with finite IT budgets, few organizations can continue to absorb the high costs of scaling high-end Network Attached Storage (NAS) or moving to and expanding a block-based storage footprint. Join this webinar to discover options for more cost-effective solutions that enable large-scale machine data ingestion and fast data access for security analytics.

    You’ll learn:
    - The common challenges companies see when scaling security workflows
    - Why a high-performance cache works to solve these issues
    - How to integrate cloud into processing and storage for additional scalability and efficiencies

    Presenters will build an actionable framework in just thirty minutes and then take questions.
  • Breach Detection: The Fly In The Cyber Ointment
    Breach Detection: The Fly In The Cyber Ointment Jim Ambrosini, Managing Director, CohnReznick and Tony Thompson, GM Threat Detection, SS8 Jun 27 2017 5:00 pm UTC 45 mins
    Most companies list cyber security as one of their top priorities. Many have implemented various technologies and increased headcount to protect their digital assets and comply with regulations. However, despite making these investments, they continue to struggle with identifying a breach and knowing what to do or how to respond when it happens. In this Webinar, “The Fly in the Cyber Ointment – The Ability to Identify and Assess Indicators of Compromise,” cyber security risk expert Jim Ambrosini from CohnReznick will join Tony Thompson from SS8 Networks to discuss current trends in cyber security, the evolving threat landscape and present best practices on how to identify and respond to breaches.
  • The RNC Files: Inside the Largest US Voter Data Leak
    The RNC Files: Inside the Largest US Voter Data Leak Dan O'Sullivan, UpGuard Analyst Jun 27 2017 5:00 pm UTC 45 mins
    In what is the largest known data exposure of its kind, UpGuard's Cyber Risk Team confirmed that a misconfigured database containing the sensitive personal details of over 198 million American voters was left exposed to the internet by a firm working on behalf of the Republican National Committee (RNC).

    Dan O'Sullivan takes us through exactly what happened and why. As the analyst who first broke the story that is now being referenced in the House Intelligence Committee hearing, he will shed more light on the events leading up to the finding and what was exposed.

    For the original article: www.upguard.com/breaches/the-rnc-files
  • Data-Centric Security for GDPR Compliance
    Data-Centric Security for GDPR Compliance Moderated by Mark Chaplin, ISF; with panelists: Carole Murphy, HPE; Les McMonagle, Blue Talon; Cheryl Tang, Imperva. Jun 27 2017 5:00 pm UTC 75 mins
    In today’s threat landscape, traditional approaches to securing data are falling short. Since 2015 we have seen some of the largest data breaches ever and it is clear that no industry or organization is immune from cyber attacks. The threat landscape is increasingly dangerous, while new technologies are distributing sensitive data farther across locations, devices and repositories. Starting in May 2018, enforcement will kick in on the European Union’s General Data Protection Regulation (GDPR), a move that could have a stronger privacy/security standardization effect than any technological effort has to date. Globalization efforts will make GDPR compliance essential for global companies wherever they are located.

    The development of a comprehensive data-centric security program, including data discovery, classification, encryption, and file protection, can uniquely position your organization to protect what matters most, and make security move with your data to comply with global regulations such as GDPR. On this webinar our panel of experts will discuss the key points that you should consider when developing such a program for your organization.
  • Next Generation Firewalls (NGFW) – 2017 Group Test Results
    Next Generation Firewalls (NGFW) – 2017 Group Test Results Thomas Skybakmoen, Bhaarath Venkateswaran, Michael Lynge Jun 27 2017 6:00 pm UTC 45 mins
    The Next Generation Firewall (NGFW) market is one of the largest and most mature security markets. You might expect that the seventh iteration of an NSS Labs NGFW Group Test would prove that leading vendors were catching all attack traffic. However, the test results tell a different story. Most vendors missed evasions which contributed to four products receiving a Caution rating. This webinar will step through the test methodology and group test results. Make sure to watch and find out how your NGFW did.
  • Compliance-as-a-Crisis: Managing Cloud Compliance
    Compliance-as-a-Crisis: Managing Cloud Compliance Tricia Pattee, VP of Product at HOSTING, Brandon Bennett, VP of Customer Success, and Jeff Bennett, CEO of Allgress Jun 27 2017 6:00 pm UTC 60 mins
    The minimum investment to meet cloud compliance obligations is $200,000 per year, and the fees for not complying can start at $100,000. So while the investment is worthwhile, many companies are unable to achieve such standards due mainly to budget constraints and a lack of expertise.

    Join Tricia Pattee, VP of Product at HOSTING, Brandon Bennett, VP of Customer Success at Allgress, and Jeff Bennett, CEO of Allgress for the webinar, Compliance as a Crisis: Managing Compliance in the Cloud. During the live event, they will discuss the following:

    •Public cloud (AWS and Azure) compliance considerations
    •Compliance standards and common industry trends
    •SecComp cloud best practices
    •Factors that contribute to a Compliance Crisis

    We’ll also demo a couple new solutions such as an industry-leading compliance dashboard and a (free) Compliance Posture Evaluation tool recently launched to provide you with actionable items for passing an audit.
  • Best Practices for Applying Threat Intelligence
    Best Practices for Applying Threat Intelligence Chris Pace Technology Advocate - EMEA, Recorded Future Jun 27 2017 6:00 pm UTC 45 mins
    Threat intelligence is certainly one of the most talked-about areas of information security today. Recent research conducted by SC Media revealed that 46 percent of security professionals expect threat intelligence to be a very important part of their strategy in 2017.

    But when it comes time to choose threat intelligence services and products it can be hard to know where to start. During this webinar, we’ll look at what types of intelligence will prove truly beneficial to your organization and how to get the greatest return on your investment.

    Join this webinar to:

    • Get best practices and case studies for implementing threat intelligence as part of your own information security strategy.
    • Understand the important distinction between threat data and intelligence.
    • Gain insight into the value of different intelligence sources and how to work with them.
    • Learn about the importance of context in threat intelligence.
  • Discover Hidden Threats with User Behaviour Analytics (UBA)
    Discover Hidden Threats with User Behaviour Analytics (UBA) Tom Salmon, Sales Engineer, LogRhythm Jun 28 2017 12:00 am UTC 60 mins
    As a cyber security professional, you already know that users are both an organisation’s greatest asset and its greatest vulnerability. Users can do great damage - and they’re notoriously difficult to catch. Many companies are confronting this challenge with User Behaviour Analytics (UBA), which can help you detect and respond to user threats, such as when:
    - An insider turns against your organisation
    - A cyber attacker steals a user’s credentials
    - An administrator abuses account privileges

    If you’re focused on addressing user threats, UBA can be a powerful tool in your kit.

    Join Tom Salmon from LogRhythm, as he discusses the elements of an effective user threat detection program. You’ll learn:
    - Why detecting user threats is so important—and so difficult
    - Different approaches to UBA
    - The value of data from across your business
    - How to maximise the efficiency of your security analysts

    Watch this on-demand webinar to learn how UBA can help you discover hidden user threats, reduce false-positives and prioritise the most concerning threats.
  • How UEM Uses Machine Learning to Transform Building Management
    How UEM Uses Machine Learning to Transform Building Management Microsoft & UEM Jun 28 2017 3:00 am UTC 20 mins
    Our buildings now talk, they tell us what ails them, when they need servicing. Through the power of machine learning, they have their own nervous system.

    Listen to how UEM gained new insights from data and now leverage the power of machine learning to digitally transform the way we think about building management.
  • Harnessing Digital Transformation to Drive Change
    Harnessing Digital Transformation to Drive Change Grant Fenn, CEO, Downer Group Jun 28 2017 3:00 am UTC 30 mins
    Grant Fenn, CEO of Downer Group, talks about how a venerable business in the engineering and infrastructure management services industry harnessed Digital Transformation to drive the next generation of operational capabilities.

    With customers spanning a broad range of industries, including public and private transport, energy, infrastructure, communications and resources sectors, it's vital for Downer Group to implement a digital transformation strategy that can encompass platforms, systems, integrations and needs across the board. Join this webcast to discuss a strategic, fool-proof approach to modernizing your IT operations.
  • Power-up Your Business with Big Data (Full Track)
    Power-up Your Business with Big Data (Full Track) Just Analytics & Microsoft Jun 28 2017 3:00 am UTC 90 mins
    Your customers are creating data at a rapid pace. The data can be overwhelming if not properly managed, categorized, and visualized. Businesses fall short at every stage, and often all three. This webinar will cover how to get to customer insights easier, quicker and at scale, minus infrastructural challenges. Speakers from Just Analytics and Microsoft will discuss how to create a big data journey that leads actionable insight with examples from the real world.

    For enterprises to embrace the full power of digital transformation, both technology and business leaders must work together to ensure they leverage the power of the cloud to stay ahead of the game. Join this webinar to discover ways to not let your big data make a big mess.
  • Revolutionize your Business with Cloud AI & Machine Learning (Full Track)
    Revolutionize your Business with Cloud AI & Machine Learning (Full Track) Microsoft Jun 28 2017 3:00 am UTC 90 mins
    Get industry insights on leveraging machine learning for building smart businesses. Interactive sessions take you through integrating virtual agents, Azure Cognitive Services and more.
  • Big Data on Azure Overview
    Big Data on Azure Overview Darmadi Komo, Product Marketing Manager, Microsoft Jun 28 2017 3:00 am UTC 20 mins
    Darmadi Komo, Product Marketing Manager, talks about Microsoft's best in class big data and analytics solutions and how it can power your journey into adopting, analyzing and utilizing big data.
  • Driving Digital Transformation with Azure IoT (Full Track)
    Driving Digital Transformation with Azure IoT (Full Track) Microsoft Jun 28 2017 3:00 am UTC 90 mins
    Digital transformation can help businesses modernize products, enter new markets and drive change. In the Internet of Things (IoT) era, it's becoming increasingly important to modernize your legacy applications in order to transcend the digital transformation, as well as enhance security of your IoT solutions and connected device authentication across multiple platforms.

    Learn how Azure's IoT cloud solutions took these companies from ground-up to the cloud without costly infrastructure investments.
  • Big Data Warehouse Technologies: Customer Case Study with Just Analytics
    Big Data Warehouse Technologies: Customer Case Study with Just Analytics Just Analytics Jun 28 2017 3:20 am UTC 20 mins
    Learn more about Just Analytics' consulting practice journey towards being data-focused and customer-centric using Microsoft's Big Data and Data Warehouse technologies.

    Understand what it means to take the journey from a data-focused approach and get faster insight without infrastructure concerns. Learn how Just Analytics helps their customers tackle cultural challenges in data centric decision making.