Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Penetration Testing or Vulnerability Scanning - Aren’t they the same thing?
    Mike Larmie, Federal Solutions Architect, Synack Live 53 mins
    Take a look behind the curtain and decide for yourself. Join government security expert Mike Larmie as he breaks down the key differences. He will share what your agency needs to know to make sure your security program is both identifying vulnerabilities and reducing risk of exploit. He will cover the techniques, tools, and tradecraft of each, as well as common questions such as:

    -Who performs the services?
    -How often do they run in a network environment?
    -What’s covered in their data output and reporting?
    -What’s their value?

    Mike will present how government agencies are reinventing how they conduct security testing to achieve greater efficiency and ROI. Learn how your agency’s security team CAN achieve security without compromise.

    BIO: Mike Larmie, Federal Solutions Architect at Synack has more than 20 years of IT Security Experience, and has been involved with countless missions within the DoD, Intel and Civilian Federal Agencies. He has a wealth of experience having worked at companies such as Tenable, Sourcefire, Rapid7, Infoblox, G2 and others.
  • Remote Access Tools: The Hidden Threats Inside Your Network
    Remote Access Tools: The Hidden Threats Inside Your Network
    David Pearson, Principal Threat Researcher, Awake Security Recorded: Dec 18 2018 24 mins
    Many remote access tools are used legitimately and not considered malware. However, these tools actively bypass network controls, obscuring which parties are communicating, when, and how. This ability to fly under the radar is attractive to malicious insiders and outside attackers alike. This talk will discuss common techniques these tools use and how security teams can find and understand them.

    In this webinar you will:

    1) Gain an understanding of why remote access tools should be on your radar
    2) Learn common techniques used by remote access tools to bypass conventional detections
    3) Learn how to dissect remote access tools within Wireshark
    4) Discover information that is sometimes leaked by these programs
    5) Learn how to abstract out detection capabilities for this class of programs
  • How to Accelerate Your GDPR Readiness
    How to Accelerate Your GDPR Readiness
    Argin Wong, Data Privacy and Compliance, Box | Vaishnav Gorur, Product Marketing, Box Recorded: Dec 18 2018 21 mins
    GDPR has been in effect for a few months now and we are starting to see hefty fines being levied for non-compliance.

    In a recent survey, 80% of companies said they are still in the early stages of planning and initial implementation. Where are you in your GDPR journey?

    Join this session to learn how to show that you are processing data in accordance to the GDPR, how Box helps you address critical GDPR requirements and how to easily execute your self-serve Data Processing Addendum (DPA).
  • Unlocking data to deliver a unified bank: The SunTrust story
    Unlocking data to deliver a unified bank: The SunTrust story
    David Shonk, SVP EIS Enterprise Solutions Delivery Manager, SunTrust Recorded: Dec 18 2018 55 mins
    Today’s digital era places strain on traditional financial firms, including increased customer expectations, the threat of disintermediation by market entrants, strict regulatory requirements, and more. How do banks, who face operational silos and aging systems, keep up?

    The answer lies in building a digital platform with APIs. In this session, hear directly from seasoned technologists to learn about the approach, tools, and operating model they use to successfully adapt and lead in the marketplace. Discover how to get more out of your existing legacy and cloud infrastructure and, in turn, deliver a flexible architecture that can easily adapt as new technologies emerge.
  • The Road Forward with ASG and the Mobius Content Services Platform
    The Road Forward with ASG and the Mobius Content Services Platform
    David Downing, EVP, Product Management and Marketing, ASG; Greg Wilson, Director, Content Services, ASG Recorded: Dec 18 2018 61 mins
    The advances in technology and the growth of information are dramatically changing the landscape – constantly & expeditiously.

    ASG’s Mobius Content Services Platform (CSP) enables your organization to establish a digital automation foundation on which to transform your business.

    In this session, learn how ASG and its Mobius CSP delivers the technology to help you and your company thrive in the rapidly changing information management environment, prepare for the emerging digital automation economy and use Mobius to bring people, process and information together at digital speeds with web scaling.
  • Security that Scales: Automating Security and Compliance for DevOps
    Security that Scales: Automating Security and Compliance for DevOps
    Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS Recorded: Dec 18 2018 49 mins
    There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.

    Join us on December 18th to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.

    During this session, you will learn:

    -How DevOps and InfoSec teams can align to the new DevSecOps paradigm

    -Why continuous compliance management is a new business imperative

    -How to build security in to your Continuous Integration/Continuous Development pipeline

    Register Today

    Free Giveaway: Register for this webinar and join the live session for your chance to win a $500 AWS promotional credit. You can use your AWS credit to offset your AWS infrastructure costs when getting started on the marketplace*. Five lucky live attendees will be the winners!

    * subject to the applicable terms and conditions currently available at https://aws.amazon.com/awscredits/.
  • Crowdsourcing IP Research: From Novelty to Best Practice
    Crowdsourcing IP Research: From Novelty to Best Practice
    Peter Vanderheyden, COO, RWS IP Research Recorded: Dec 18 2018 42 mins
    Join RWS IP Research COO Peter Vanderheyden for a live webinar on how crowdsourcing your prior art can serve as a best practice for your IP research. What was once a novel and uncertain methodology has been reliably used to kill bad patents in litigation, monetize patent portfolios and even provide competitive analyses. In 40 minutes, we will discuss:

    •Why crowdsourcing is particularly suited for infringement cases, monetization efforts and even competitive intelligence;
    •A walk through of results illustrative of a crowdsourced search;
    •How RWS uniquely approaches the crowdsourcing process for purposes of finding prior art;
    •How technology plays a role and the advantage of our AOP Connect™ platform;
    •How crowdsourcing can help you to efficiently and effectively manage discovery risk and confidentiality; and more.

    About the Presenter

    Peter Vanderheyden is COO of RWS IP Research where he brings over 30 years of experience across all business disciplines from finance to product management and entrepreneurial startups. Prior to joining RWS, Mr. Vanderheyden was the Chief Executive Officer of Article One Partners where he led a team that developed AOP Connect and helped revolutionize the way that IP research is conducted through crowdsourcing. While vice president and Managing Director of LexisNexis’s Global IP Solutions, his team developed both TotalPatent and PatentOptiimizer, while spearheading the first truly semantic search engine for technical/patent content.

    Mr. Vanderheyden earned a BS in Business from the University of Minnesota with undergrad certification in math, science and engineering. Mr. Vanderheyden also has a US Patent to his credit.

    https://www.rws.com/
  • Q4 2018 Community Update: Data Privacy & Information Management in 2019
    Q4 2018 Community Update: Data Privacy & Information Management in 2019
    Jill Reber, CEO, Primitive Logic and Kelly Harris, Senior Content Manager, BrightTALK Recorded: Dec 18 2018 47 mins
    Discover what's trending in the Enterprise Architecture community on BrightTALK and how you can leverage these insights to drive growth for your company. Learn which topics and technologies are currently top of mind for Data Privacy and Information Management professionals and decision makers.

    Tune in with Jill Reber, CEO of Primitive Logic and Kelly Harris, Senior Content Manager for EA at BrightTALK, to discover the latest trends in data privacy, the reasons behind them and what to look out for in Q1 2019 and beyond.

    - Top trending topics in Q4 2018 and why, including new GDPR and data privacy regulations
    - Key events in the community
    - Content that data privacy and information management professionals care about
    - What's coming up in Q1 2019

    Audience members are encouraged to ask questions during the Live Q&A.
  • Operationalizing Cyber AI: How do we trust it?
    Operationalizing Cyber AI: How do we trust it?
    Andrew Tsonchev, Director of Darktrace Industrial Recorded: Dec 18 2018 45 mins
    Today’s cyber security landscape is dominated by talk of AI - but should we really relinquish control to machines? In this webinar, we’ll discuss how to trust AI to combat today’s most advanced cyber-threats and protect our organizations for the long term.

    Join Andrew Tsonchev, Director of Technology at Darktrace, as he explores what it will take to bridge the trust gap between humans and AI.

    Learn:
    - The benefits and challenges of implementing AI in your security stack
    - How AI augments your security team by autonomously detecting and responding to emerging threats
    - How to build trust between your organization and cyber AI
  • How to Prepare for Windows Server 2008 End of Support
    How to Prepare for Windows Server 2008 End of Support
    Timothy Warner, Microsoft MVP, Pluralsight Recorded: Dec 18 2018 57 mins
    Are you running Microsoft Windows Server 2008 or 2003 for your business critical applications, like many enterprises? Server 2008 will reach End of Support in January 2020 and with that no more security and maintenance patches without costly alternatives.

    Join us at this webcast to learn the best ways to secure, migrate and future-proof your legacy Windows Server applications without having to recode them. You will learn how:

    A container platform can accelerate migration to Server 2016
    Containers are more than a development toolset used primarily to build new applications
    The Docker container platform gives enterprises a way to containerize and easily migrate existing applications
    Cut infrastructure and management costs for your legacy applications by up to 50%
    Learn how to simplify your migration!
  • Top 2018 Cyberattacks and How to Avoid Them in 2019
    Top 2018 Cyberattacks and How to Avoid Them in 2019
    Ethan Smart, Senior Solutions Engineer, Tufin Recorded: Dec 18 2018 49 mins
    Breached. Hacked. Cyberattack. These are all words that dominated headlines in 2018.

    While many of the attacks that prompted these headlines may have been avoided in hindsight, enforcing security policy across the legacy physical network is challenging. Furthermore, “cloud first” strategies and the increased adoption of containers introduce new risks to organizations and raise new security concerns that need to be anticipated.

    Join us on December 18 for a webinar with Ethan Smart, Senior Solutions Engineer, to learn from the mistakes of others in 2018 and how to avoid making them – and the headlines – in 2019.

    Key topics include how to:

    - Develop and deploy an enforceable security policy
    - Clear time for proactive security initiatives
    - Mitigate the inherent risk of DevOps’ CI/CD agility
    - Contain malware outbreaks
    - Anticipate security risks of containers
  • Data & Analytics Governance: From Current Challenges to Future Possibilities
    Data & Analytics Governance: From Current Challenges to Future Possibilities
    Saul Judah, Research Director, Gartner Research & Rex Ahlstrom, Chief Strategy & Technology Officer, BackOffice Associates Recorded: Dec 18 2018 51 mins
    Traditional methods for managing data and analytics landscapes are not evolving fast enough to meet the increased scale and demands of businesses facing a digital transformation program. If you are planning any major transformation involving data, such as a move to S/4HANA, hyper scale cloud, large scale analytics efforts, ML/AI implementations or other major changes to your current IT landscape, now is the time to think about how you will advance your data and governance strategy.

    Join Saul Judah from Gartner Research as he discusses the present state of data and analytics governance practices, provides guidance to help you get on (or back on) the right track, and previews where governance practices are heading in the future so that you can keep your strategy on track.
  • DFLabs’ New Open Integration Framework and Customer Community Portal
    DFLabs’ New Open Integration Framework and Customer Community Portal
    John Moran, Senior Product Manager, DFLabs and Heather Hixon, Senior Solutions Architect, DFLabs Recorded: Dec 18 2018 41 mins
    DFLabs’ innovative Open Integration Framework is designed to enable security teams to customize and easily add new automated integrations between their existing security tools and our IncMan SOAR platform, enabling SOCs and MSSPs to add unique incident response actions without the need for complex coding. The new framework is part of DFLabs’ commitment to delivering a more open, community-oriented solution to automation and orchestration, which also includes a new Community Portal.

    The Community Portal serves as a hub for customers, where they can get the latest information and support from DFLabs and interact with other like-minded customers. Moreover, this Community Portal aims to provide a cooperation ecosystem for companies and organizations, where they can share integrations of security tools and IncMan SOAR. This approach will enable our customers to tackle specific use cases by uploading or downloading integration files from the Portal to IncMan SOAR.

    Join this webinar to learn more about these two new exciting features, as well as DFLabs’ other latest developments and enhancements to IncMan SOAR v4.5 including:

    - Open Integration Framework
    - Community Portal
    - Enhanced REST API
    - Automated event triage (START Triage)
    - New bidirectional integrations
    - Improvements to existing integrations
    - And more...
  • Jingle Bells, Phishing Smells, Hackers Go Away!
    Jingle Bells, Phishing Smells, Hackers Go Away!
    Robert O'Brien, CEO MetaCompliance Recorded: Dec 18 2018 14 mins
    Phishing scams are a persistent problem for organisations at all times of the year, however there is a steep increase in the number of scams at Christmas as hackers take advantage of distracted staff to launch targeted attacks.

    When we’re distracted, mistakes happen, and Christmas tends to be the one time of the year when employees let their guard down which can result in a massive loss of sensitive data.

    Cybercriminals don’t care about your internal processes around Cyber Security awareness communication. They are not stifled by the rules around staff communication.

    Cyber Security awareness training needs to be a top priority and it has to be of “stand out” quality. Not the normal “techno porridge” that has been passing for Information Security and Privacy training over the last 15 years.

    Cyber Security awareness is about the hearts and minds of your staff and it’s one of the biggest challenges in this new digital economy. Join us at our short webinar to hear about the best practice approaches to getting employees to participate in securing your digital assets.

    This 15-minute webinar will cover:

    •The seasonal phishing scams your employees need to be wary of
    •The 5 key aspects of a Cyber Security Awareness program
    •How Cyber Security is not about indulging in wishful thinking.
  • Ask the expert: Cloud Adoption & Procurement in UK Public Sector
    Ask the expert: Cloud Adoption & Procurement in UK Public Sector
    Nicky Stewart Recorded: Dec 18 2018 14 mins
    After presenting your business case it's time to think about procurement - but how do you choose between the government's G-Cloud framework or TS2?

    This session will be presented by our Commercial Director Nicky Stewart who will be answering the most frequently asked questions surrounding procurement

    What you'll learn
    - The main differences between TS2 & G-Cloud
    - The Pros & Cons of using TS2 vs G-Cloud
    - Top Tips for making a succesful bid through either framework

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Wie rechtfertigen Sie die Kosten eines AppSec-Programms?
    Wie rechtfertigen Sie die Kosten eines AppSec-Programms?
    Julian Totzek-Hallhuber, Principal Solutions Architect at Veracode Recorded: Dec 18 2018 42 mins
    Traditionell haben die meisten Führungskräfte die IT Sicherheit als notwendiges Übel betrachtet - eine Investition, die nur erforderlich war, um ein schlechtes Ergebnis zu vermeiden, aber nicht als etwas, das neue Kunden einbringen oder den Umsatz steigern würde. Aber das scheint sich zu ändern. Wir stellen zunehmend fest, dass die Erstellung sicherer Software zu einem Wettbewerbsvorteil führt und das Endergebnis steigert.

    Dieses Webinar, das von Julian Totzek-Hallhuber - Principal Solutions Architect bei Veracode gehalten wird, hilft Ihnen dabei, AppSec zu unterstützen. Durch die Darstellung des möglichen ROI einer Cloud-basierten Anwendungssicherheitslösung, die in den Softwareentwicklungslebenszyklus integriert ist, stellen wir Ihnen die Tools zur Verfügung, die Sie zur Erstellung Ihres C-Level-Pitch benötigen.
  • Securing the IoT: Keeping planes in the air and the lights on at home
    Securing the IoT: Keeping planes in the air and the lights on at home
    Adam Brady & Mark Baker, LogRhythm Recorded: Dec 18 2018 48 mins
    The Internet of Things (IoT) will generate, process and share more data than ever before. Data that needs to be secured.

    The data generated by non-traditional sensors and systems can help detect anomalous behaviour and maintain the uptime we expect from the new wave of connected devices.

    In this webinar, LogRhythm’s security experts will explain how this data can be used, with examples from a range of industries – from jet turbine manufacturers to in-home automation providers.

    Join the webinar to discover:
    1. How IoT devices blur the boundaries between IT security, operational technology and security in the physical world
    2. How to gain visibility into the data generated by these devices – and what it really means
    3. What customers have experienced through real-life use cases
  • Happy Holidays from DataMotion
    Happy Holidays from DataMotion
    The DataMotion team Recorded: Dec 17 2018 1 min
    Greetings from DataMotion for a happy holiday!
  • What Do You Get With a SOC-as-a-Service? Find Out Now!
    What Do You Get With a SOC-as-a-Service? Find Out Now!
    Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: Dec 17 2018 2 mins
    In our recent "Top 5 Reasons Why SOCaaS is the Right Choice" webinar, security expert, Louis Evans dives into the top reasons why there's been an increasing shift towards outsourced security operations across businesses in a variety of industries.

    In this brief webinar clip, we share one of those reasons. To see what you get with SOC-as-a-Service, check out this clip now!

    To view the entire webinar, click here: http://bit.ly/2UPTTQp
  • More Things You Can Do with a Security Policy Management Solution
    More Things You Can Do with a Security Policy Management Solution
    Dania Ben Peretz, Product Manager Recorded: Dec 17 2018 38 mins
    Are you getting the most out of your Security Policy Management Solution?

    Today’s security policy management solutions do much more than automate traditional change management tasks. And yet, managing processes is becoming increasingly complex, time consuming and riddled with errors.

    Many professionals believe they need additional sophisticated tools to address these challenges. However, you may already have what you need, up and running in your organization.

    Join us in this webinar to learn how AlgoSec’s solution simplifies and automates security policy management to make the enterprise more agile, more secure and more compliant across your ever-changing network:

    •Gaining visibility of unsecured traffic used by your business applications
    •Closing the gaps in your network map to get your automation in place faster
    •Tying cyberattacks to business impact
    •Being audit-ready all the time
  • CDD in a Digital World
    CDD in a Digital World
    Paul Westcott, Product Director for Compliance & Supply and Neil Isherwood, Due Diligence Subject Matter Expert Recorded: Dec 17 2018 61 mins
    The rise of technology within the Customer Due Diligence space is evident. There has been a significant influx of ‘Regtech’ or ‘Fintech’ businesses offering innovative software solutions to age old CDD problems. Moreover, the constant claims that Artificial Intelligence, Machine Learning and Automation can improve the CDD landscape are impossible to ignore. In this webinar we will discuss what digital means for CDD professionals operationally, and for their place in the organisation, and will explore the assumption that systems will do all the heavy lifting for you. Additionally, we will interrogate the view that automation and machine learning, or both, truly means less effort for the compliance professional.

    As more CDD problems are framed as potential ones that can be solved through new technology, this webinar will outline what support frameworks are needed to sit alongside the technology for it to be successfully implemented and achieve the goals it was set out to deliver, and ultimately how this transformation will require highly skilled Compliance experts to adapt to new skills as their roles change.

    Presenters:
    Paul Westcott - Product Director Global Customer Due Diligence Products, Dun & Bradstreet
    Neil Isherwood - Due Diligence Subject Matter Expert, Dun & Bradstreet
  • Ask the Multi-Cloud Expert: Why Cloud needs a new data centre strategy
    Ask the Multi-Cloud Expert: Why Cloud needs a new data centre strategy
    Tim Lawrence Recorded: Dec 16 2018 15 mins
    Join our latest webinar with Tim Lawrence & Andy Skipper as our expert covers topics such as

    - What the major strategic priorities are for UK Organisations in 2018
    - What the first steps are towards Cloud Adoption
    - How UKCloud can help

    By clicking through this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • [Video] Expert Panel: How to Protect Against Hackers in 2019
    [Video] Expert Panel: How to Protect Against Hackers in 2019
    Moderator: Graham Cluley | Panelists: Michael Howard, Louella Ferscunandes, Howard Roberts Recorded: Dec 14 2018 39 mins
    In this HP Security Panel webinar, we’ll look beyond The Wolf films to discuss the smartest ways of safeguarding against hackers.

    Listen and hear how our expert panelist address a series of pressing issues such as:

    • Are vendors using scaremongering to sell their own services?
    • If faces are the new fingerprints, what are the security risks?
    • How big a threat is IoT and what’s the next Mirai Botnet?
    • Is the public sector the weakest link?
    • Can security be baked into the hardware?

    This is an excellent opportunity to gain invaluable security insights from experts on the frontlines.

    Panelists include:

    Graham Cluley: Award-winning security blogger - moderator
    Michael Howard: Head of Security Practice, HP Inc.
    Louella Fernandes: Research Director Quocirca
    Howard Roberts: Print Technologist, HP Inc.

    Stay connected to the latest HP Security Solutions by visiting:

    http://www8.hp.com/us/en/solutions/business-solutions/printingsolutions/securityoverview.html?jumpid=sc_ucq8stx21w
  • Assessing Cyber Risk - Challenges and Solutions
    Assessing Cyber Risk - Challenges and Solutions
    STEPHEN HEAD - Experis Finance: Director of IT Risk Advisory Services Recorded: Dec 14 2018 60 mins
    Managing cyber risk in today’s digital environment is extremely challenging, whether your organization is public, private or governmental. In response to the growing frequency and severity of cyber-attacks, many organizations have decided it’s time to focus more of their efforts on cyber risk, starting with a cyber risk assessment. This approach to proactively dealing with the risk of cyber-attacks increases the organization’s awareness of the potential impacts and costs, and enables them to take actions that reduce the overall risk to the organization, minimize the impact of cyber-attacks, and more predictably ensure the continuity of essential services.

    This webinar will provide participants with a high-level overview of assessing cyber risk and explore the following:
    •Threats and root causes of breaches
    •The changing regulatory landscape
    •Security frameworks and tools
    •Practical ways to assess your risk and organizational exposure
    •Key elements of a successful cyber risk management program
  • How Process Owners Can Build Their Own ‘Apps’ in 15 Minutes Using SMAX Studio
    How Process Owners Can Build Their Own ‘Apps’ in 15 Minutes Using SMAX Studio
    Neville Ward, Senior Solutions Architect & Noel Hopkinson, Senior Solutions Architect Recorded: Dec 14 2018 28 mins
    Codeless configuration is commonly accepted as the only way to ensure that process modifications can be seamlessly incorporated into software upgrades without requiring teams of programmers to make the changes.

    Join this webinar to discover how Micro Focus Service Management Automation X (SMAX) Studio takes codeless configuration to the next level by enabling new process-based applications to be created in minutes. Designed for IT and line of business personnel, SMAX offers fast and risk-free configuration and extension of service management applications.

    With SMAX, Enterprise Service Management is delivered out of the box and is based on content such as HR workflow management, ideation and proposal management, and portfolio optimization—all of which can be easily extended or complemented with brand new content using SMAX Studio.

    In this webinar, you’ll learn:

    How SMAX Studio offers faster Time to Value and Lower TCO
    How our modern user interface enables the instant creation of new applications
    How the required data model, business rules, forms, notifications, reports, and user-defined actions can be created without coding
  • Advancing Cybersecurity in Health Care
    Advancing Cybersecurity in Health Care
    Julian Crowley and Vaughn Adams Dec 19 2018 12:00 am UTC 30 mins
    As the value of patient records, infrastructure, and services grows, the health care industry continues to become a major target for cyberattacks With an expanding attack surface — due to cloud infrastructure — it's critical this vulnerable industry continues to mature its security capabilities for its most valuable data and apps.

    Epic Systems is a market-leading Electronic Health Records (EHR) vendor widely used by large hospitals and health systems to access, organize, store, and share patient medical records. Given the volume and sensitivity of personal data on Epic platforms, it’s critical to ensure threats to patient privacy are detected and mitigated quickly.

    In this webinar you’ll learn how organizations in health care are using LogRhythm’s Epic Hyperspace App, combined with traditional security data, to provide greater value and network visibility. Members of LogRhythm’s Strategic Integration team and Health Care Sales Engineering team will show you how LogRhythm’s Epic Hyperspace App provides a focused point solution for real time visibility — as well as detection of suspicious activity within an Epic deployment. See how this app provides real-time visibility (including alarms and reports) into:

    · Inappropriate access or access attempts to patient medical records
    · Inappropriate attempts to record or download patient medical records
    · Users and systems trying to access the EHR
    · Context of the user who is accessing the patient records
    · Logic or reasoning behind the attempted access to medical records

    If you have Epic and LogRhythm, this is a must-see webinar. If you use another EHR, use the information from this webinar as a template on how and why to monitor your EHR platform.

    Speakers:
    - Julian Crowley, Strategic Integration Engineer
    - Vaughn Adams, Enterprise Sales Engineer
  • Reduce your Attack Surface Marginalise the Breach (APAC)
    Reduce your Attack Surface Marginalise the Breach (APAC)
    Vijay Chauhan, Sr. Director of Product Marketing, at Illumio Dec 19 2018 12:00 am UTC 38 mins
    Reducing your data centre and cloud attack surface decreases your exposure, limits an attacker's mobility, and minimises the impact of a breach.

    In this webinar, you'll learn:

    - How to identify your high-value assets
    - Tools to visualise vulnerabilities
    - Ways to prioritise patching
    - How to detect and stop lateral movement

    About the presenter:

    Vijay Chauhan is Sr. Director of Product Marketing at Illumio, where he leads Product Launches and Content. Prior to Illumio, he spent 4+ years at Splunk running Product Management and Strategic Alliances for Splunk’s Security business. He started his career as a Security Practitioner in Financial Services, spending 7+ years at Barclays Bank handling core information security functions. He has an MS in Computer Science from Stanford.
  • Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Enzo Greco, Chief Strategy Officer, Nlyte, Kollengode Anand, Segment Leader - DC Solutions, United Technologies Dec 19 2018 9:00 am UTC 53 mins
    In this webinar, Infrastructure experts at UTC and Nlyte Software discuss how you can:

    - Leverage sophisticated data center ecosystems, such as precision cooling
    - Provide insight into your ITSM solution
    - Improve resilience and reduce risk to your critical infrastructure
    - Create tighter integration between facilities and IT
  • Reduce your Attack Surface Marginalise the Breach (EMEA)
    Reduce your Attack Surface Marginalise the Breach (EMEA)
    Vijay Chauhan, Sr. Director of Product Marketing, at Illumio Dec 19 2018 9:00 am UTC 38 mins
    Reducing your data centre and cloud attack surface decreases your exposure, limits an attacker's mobility, and minimises the impact of a breach.

    In this webinar, you'll learn:

    - How to identify your high-value assets
    - Tools to visualise vulnerabilities
    - Ways to prioritise patching
    - How to detect and stop lateral movement

    About the presenter:

    Vijay Chauhan is Sr. Director of Product Marketing at Illumio, where he leads Product Launches and Content. Prior to Illumio, he spent 4+ years at Splunk running Product Management and Strategic Alliances for Splunk’s Security business. He started his career as a Security Practitioner in Financial Services, spending 7+ years at Barclays Bank handling core information security functions. He has an MS in Computer Science from Stanford.
  • Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Verizon Threat Research Advisory Center Monthly Intelligence Briefing
    Bryan Sartin, Chris Novak, Bruce Benedict, Jimmy Nilsson, Rodolphe Simonetti, Dave Kennedy, John Grim Dec 19 2018 3:00 pm UTC 90 mins
    Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss the current cybersecurity threat landscape.

    Our Verizon Threat Research Advisory Center presenters will be:

    •John Grim, Senior Manager, Investigative Response – Americas
    •David Kennedy, Managing Principal, Open Source Intelligence

    This webinar will cover:

    •Current Intelligence Overview
    •Attacks and Threat Indicators
    •Latest Malware Trends
    •Significant Vulnerabilities

    If you have any questions related to social attacks and data breaches that you'd like us to cover on the call, please send them to the following email address prior to December 14, 2018:

    Intel.Briefing@verizon.com

    Then tune in for an information-packed session brought to you by our very own Verizon Threat Research Advisory Center investigators, analysts, assessors, and researchers!
  • Optimizing Your AppSec Program with Veracode
    Optimizing Your AppSec Program with Veracode
    Brad Smith, Principal Security Program Manager, Veracode Dec 19 2018 5:00 pm UTC 45 mins
    Hear from one of our customer-facing Services experts to learn how you can leverage the Veracode platform to optimize your application security program. You will start with assessing and managing security risk across your entire application portfolio and gain additional insights into how Veracode can help you adopt application security best practices in a simple and cost-effective way. Based on first-hand customer interactions, you will come away practical guidance to integrating testing into the software development lifecycle- all the way to scaling an application security program using the Veracode cloud-based platform.
  • Reduce your Attack Surface Marginalize the Breach (NA)
    Reduce your Attack Surface Marginalize the Breach (NA)
    Vijay Chauhan, Sr. Director of Product Marketing, at Illumio Dec 19 2018 5:00 pm UTC 38 mins
    Reducing your data center and cloud attack surface decreases your exposure, limits an attacker's mobility, and minimizes the impact of a breach.

    In this webinar, you'll learn:

    - How to identify your high-value assets
    - Tools to visualize vulnerabilities
    - Ways to prioritize patching
    - How to detect and stop lateral movement

    About the presenter:

    Vijay Chauhan is Sr. Director of Product Marketing at Illumio, where he leads Product Launches and Content. Prior to Illumio, he spent 4+ years at Splunk running Product Management and Strategic Alliances for Splunk’s Security business. He started his career as a Security Practitioner in Financial Services, spending 7+ years at Barclays Bank handling core information security functions. He has an MS in Computer Science from Stanford.
  • Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Five Simple Ways to Bolster Critical Infrastructure Efficiency
    Enzo Greco, Chief Strategy Officer, Nlyte, Kollengode Anand, Segment Leader - DC Solutions, United Technologies Dec 19 2018 5:00 pm UTC 53 mins
    In this webinar, Infrastructure experts at UTC and Nlyte Software discuss how you can:

    - Leverage sophisticated data center ecosystems, such as precision cooling
    - Provide insight into your ITSM solution
    - Improve resilience and reduce risk to your critical infrastructure
    - Create tighter integration between facilities and IT
  • Getting your Security Program to Shift Left: Operationalizing Security Controls
    Getting your Security Program to Shift Left: Operationalizing Security Controls
    Tony UcedaVelez, CEO & Founder, VerSprite Security Dec 19 2018 6:00 pm UTC 60 mins
    The latest talk in managing security programs is the ability to make “shift left” in terms of implementing controls. This concept translates to being able to not apply security controls post-implementation but rather during pre-implementation phases in a System or Software Development Lifecycle. These stages (such as the Definition, Design, or even Development phase) can allow for security requirements to be conceptualized and applied before an Implementation phase. The rise of regulations and demand for more agile engineering practices is forcing CISOs and security programs to develop more sophisticated ways to adhere to security requirements from regulations, internal governance, and clients. This talk will focus on how DevSecOps efforts are changing how we govern security controls via greater automation tools that are readily available to leverage. This talk will also show how the future can support for more cost effective governance models, regardless of industry or size of IT environment.
  • Break the chains of legacy virtualization
    Break the chains of legacy virtualization
    Bhavani Yellapragada, AVP of DevOps, Nasdaq Dec 19 2018 6:00 pm UTC 60 mins
    IT leaders look to technology as a business differentiator and rely on it to foster innovation. Enterprises have discovered that hyper-converged infrastructure (HCI) can be the foundation of a modern, cloud-like datacenter. But don’t stop there — going beyond HCI delivers more savings, increases IT agility, and supports multi-cloud goals when you add virtualization as an integral part of your stack.

    How do you harness the power of HCI and virtualization? Sure, there are a wide variety of tools on the market, but choosing the wrong HCI platform could limit your options in how you operate your datacenter or could impede cloud goals — including those associated with virtualization.

    To learn more about the power of HCI and virtualization, how virtualization can remove complexity and increase efficiency, and how to choose the right HCI tool, don’t miss this VB live event!

    Registration is free.

    Attend and learn:
    * How virtualization platform options on the market compare
    * Why to consider changing virtualization solutions
    * How to choose the right virtualization solution
    * How to save thousands in virtualization licensing costs

    Speakers:
    * Bhavani Yellapragada, AVP of DevOps, Nasdaq
    * Mike Wronski, Principal Marketing Manager, Nutanix
    * Stewart Rogers, Analyst-at-Large, VentureBeat
    * Rachael Brownell, Moderator, VentureBeat

    Sponsored by Nutanix
  • Top Cybersecurity Trends for 2019
    Top Cybersecurity Trends for 2019
    Terry Ray, CTO, Imperva and Kim Lambert, Sr. Product Marketing Manager, Imperva Dec 19 2018 6:00 pm UTC 60 mins
    Equipped with Imperva’s own research, interactions with our customers, and a wealth of crowdsourced data analyzed from installations around the world, we’ve looked ahead to the future of Internet security and have come up with three key overriding trends that we see taking center stage in 2019. Join Terry Ray, CTO of Imperva, as he provides insight into cybersecurity trends for 2019, including:

    -Increasing focus on compliance due to expanding data breaches
    -The business benefits of moving to the cloud
    -Using AI and machine learning to bridge staffing and skills gaps

    About the presenter:
    Terry Ray has global responsibility for Imperva’s technology strategy. He was the first U.S.-based Imperva employee and has been with the company for 14 years. He works with organizations around the world to help them discover and protect sensitive data, minimize risk for regulatory governance, set data security strategy and implement best practices.
  • Leveraging Kubernetes Services & DNS
    Leveraging Kubernetes Services & DNS
    Christopher Liljenstolpe, Chief Technical Officer, Solutions at Tigera Dec 19 2018 6:00 pm UTC 60 mins
    The Domain Name System (DNS) is used to associate IP addresses with meaningful names. By default, Kubernetes clusters configure internal DNS to provide for service discovery automatically. This makes it easy for workloads to locate and work with each other on Kubernetes clusters.
    In this webinar, learn:

    * How DNS resolution works in Kubernetes with a network security solution like Tigera

    * How services and pods get assigned fully qualified domain names (FQDN)

    * The relationship between services and pods
  • Brinqa Enterprise Vulnerability Management Webinar part 4 of 4
    Brinqa Enterprise Vulnerability Management Webinar part 4 of 4
    Syed Abdur from Brinqa and Pezhman Nikpour from Slalom Consulting Dec 19 2018 7:00 pm UTC 27 mins
    Part 4: Technical Capabilities Necessary for Effective Vulnerability Management

    In this part, we discuss the technical capabilities needed by vulnerability management programs to proactively protect an organization. We will look at the nuances of risk modeling, data connectors, automation, remediation and analytics as they apply to vulnerability management and discuss how they come together in an effective vulnerability management program. We will also present 10 rules of thumb that all solution architects must consider as they build vulnerability management programs for their organization.

    We’d love to answer all of your questions by email, ask them during the session in the chat window, you can email them to me at troy.vera@brinqa.com to be answered by email, or tweet @brinqa with the hashtag of #BrinqaWebinars and we will cover everyone’s questions.
  • 10 Key Strategies to Optimize Costs and Govern AWS
    10 Key Strategies to Optimize Costs and Govern AWS
    Jason Monden, VP, Cloud Solutions & Technology Services Dec 19 2018 7:00 pm UTC 60 mins
    The public cloud with its unlimited resource, requires higher financial discipline from IT when compared to traditional data center budgeting/spending. Without any cost controls and governance in place, cloud spend could blow past budgets and derail projects. Customer needs to adopt a proactive approach to avoid out of control spend and poor governance, which can result in significant security issues.

    In this webinar, we will provide 10 strategies to help you
    • Choose wisely among all available AWS alternatives
    • Streamline your operations in AWS, and
    • Continuously optimize your deployment to take advantage of best practices and available arbitrage opportunities within the hundreds of millions of combinations available to you on AWS

    You will have the opportunity to listen to Burwood Group’s Cloud Architect, James Anderton, on tips and tricks to continuously optimize your cloud, take advantage of new technologies from AWS and get more bang for your AWS buck. Learn how you can kick it up a notch with intelligence, analysis and automation to deliver faster results for new and existing workloads.

    You’ll also receive a complimentary copy of our e-book that provides valuable insights into how you can optimize your AWS environment while saving 30-50% of your cloud computing costs.
  • Securing Your APIs like the Pros: A Panel Discussion
    Securing Your APIs like the Pros: A Panel Discussion
    Bernard Harguindeguy, Kin Lane, and James Higginbotham Dec 19 2018 7:00 pm UTC 64 mins
    APIs are presenting new opportunities for hackers to reach into data and systems, and predefined rules, policies and attack signatures can’t keep up with this evolving threat landscape.

    Join us for a panel discussion surrounding today’s API threat landscape, and how enterprises are combining access control with advanced API cybersecurity for comprehensive API protection.

    The panel will feature discussion from nationally recognized thought leaders in the API space listed below, as well as open dialog and Q&A.

    - Bernard Harguindeguy, VP of Intelligence, Ping Identity
    - Kin Lane, The API Evangelist
    - James Higginbotham, API Consultant, LaunchAny
  • Beyond the Marriott Breach - What to Expect in 2019
    Beyond the Marriott Breach - What to Expect in 2019
    Speakers: Nir Gaist, CTO/Founder and Robert Zamani, Director of Solutions Architect. Moderator: Rene Kolga, Product Dec 19 2018 9:30 pm UTC 60 mins
    What will 2019 bring for the security landscape? How many Marriott-like breaches should you expect? What new types of attacks are you likely to see, and what can you do now to prepare for them? Nyotron’s team of security experts will have the answers for you during our December 19th live webinar.

    Making informed predictions first requires thinking back on 2018 with a critical eye. We will review a few of the most significant vulnerabilities and data breaches that made national headlines, from the City of Atlanta to Meltdown and Spectre, to the Marriott debacle and why the healthcare industry appears unable to defend itself. Our panel will also discuss the issues and trends they expect will dominate 2019, including adversarial artificial intelligence (AI) and destructive attacks on ICS.

    We will wrap up with ideas on how you can make an effective case for additional security budget and how to educate yourself about the changing threat landscape (and to get those CPE’s before the year’s end).
  • What is your Security Strategy with Vanishing Perimeter?
    What is your Security Strategy with Vanishing Perimeter?
    Vamsi Ponnekanti, Director, Systems Engineering, Symantec Dec 20 2018 10:00 am UTC 60 mins
    Employees are increasingly remote and mobile, and they need access to cloud applications. Traditional concepts of network security are fading away. Organizations are turning to cloud-delivered security services that offer complete, "Direct-to-Net" protection. But not all service providers are the same - and the stakes are high. If you are looking at cloud service solutions to simplify your network security infrastructure while improving performance, be sure you make the right choice.

    Are you Responsible for:
    - Setting security objectives and strategies for your IT department
    - Identifying, controlling and reporting security incidents
    - Developing enterprise wide security programs
    - Driving security or compliance or regulatory initiates

    Then this webinar is for you!

    What will the webinar address?
    - How to plan for security in the move to the cloud?
    - How to protect your users from an evolving threat landscape?
    - How to make sure your data is secured and maintains compliance with legal regulations?
    - How to effectively manage new types of devices and your mobile/remote users?

    Register Now!
  • Franklin American's Innovation Journey Adopting DevOps Culture in a Modern Enter
    Franklin American's Innovation Journey Adopting DevOps Culture in a Modern Enter
    Don Bauer - DevOps Lead, Franklin American, Mike Noe - Lead DevOps Engineer, Franklin American, Harish Jayakumar - Director Dec 20 2018 5:00 pm UTC 60 mins
    Franklin American Mortgage, a Citizens company, set their sights on creating a culture that promotes fast-fail, atomic workloads for rapid development, testing, and release cycles. This metamorphosis began with setting behavior expectations and implementing Docker Enterprise. By utilizing the container platform as the underpinning for its software development lifecycle, Franklin American Mortgage is able to quickly, and automatically create the environments and resources we need at will. That change in turn promoted the desired culture of tackling work at the most atomic level.

    In this webinar, you'll hear from the DevOps team at Franklin American and learn how to:
    - Create a DevOps culture in an otherwise traditional industry
    - Accelerate innovation with continuous delivery and a modern toolset
    - Establish a secure software build workflow, all the way from development to production.
  • Lighten Your Compliance Burden using ServiceNow GRC and the Unified Compliance F
    Lighten Your Compliance Burden using ServiceNow GRC and the Unified Compliance F
    Jon Zayicek and Ben Condie Dec 20 2018 6:00 pm UTC 38 mins
    Join Cask if you're having trouble protecting your data?

    We get it. It's a complex job for compliance teams that are required to comply with specific regulations and standards such as GLBA, HIPAA, PCI-DSS, SOX, NIST, ISO, SOC 1/2/3, etc.

    Here's what you'll learn:
    • Tie risk scoring to the CIA Triad (Confidentiality, Integrity and Availability)
    • Begin your journey toward zero touch compliance: reduce risk through automation of monitoring compliance activities
    • Decrease repetitive compliance activities for employees by leveraging a set of common controls across NIST, SOX, HIPAA, PCI-DSS and other standards.

    We'll see you there.
  • Best Practices for Implementing an Effective Security Awareness Training Program
    Best Practices for Implementing an Effective Security Awareness Training Program
    Michael D. Osterman, Principal Analyst, Osterman Research & Michael Madon, SVP & GM of Security Awareness Programs, Mimecast Dec 20 2018 7:00 pm UTC 60 mins
    More than 90% of security breaches involve human error. These acts are not always malicious, but often careless and preventable. To change security behavior effectively, employees must know what to do, care enough to improve, and then do what’s right when it matters.
     
    An effective – and we stress effective – security awareness program is proven to change organizational behavior and lower risk. Join Michael Osterman, President, Osterman Research Inc. and Michael Madon, SVP & GM, Mimecast Security Awareness Products to learn more about the state of the industry and best practices for implementing an effective security awareness training program to change employee behavior and make your company more secure.
     
    SPEAKER BIOS:
    Michael D. Osterman, Principal Analyst, Osterman Research
    Osterman Research was founded by Michael Osterman in 2001. Since that time, the company has become one of the leading analyst firms in the messaging and collaboration space, providing research, analysis, white papers and other services to global technology companies.
     
     
    Michael Madon, Senior Vice President & GM of Security Awareness Products, Mimecast
    Michael currently serves as the Senior Vice President and General Manager of Security Awareness Products at Mimecast. Prior to joining Mimecast, he was an early member of RedOwl, a software security company that was acquired by Raytheon. Michael also served on the Board of Directors of TeleCommunication Systems (NASDAQ: TSYS), a world leader in secure and highly reliable wireless communication technology which was acquired by Comtech Telecommunications Corp. in 2016.
     
  • GDPR: What You Need to Know Now
    GDPR: What You Need to Know Now
    Florin Lazurca, Technical Security Strategist, Citrix and Stephen Twynam ,Senior Sales Engineer, Citrix Dec 20 2018 7:00 pm UTC 55 mins
    In May 2018, the General Data Protection Regulation (GDPR) takes effect. Are you ready? In a recent Ponemon study, 67% of respondents were aware of the GDPR, but only 50% of the organisations had allocated budget and started to prepare for these new regulations. GDPR will impose new rules on businesses, government agencies, and other organisations that offer goods and services to people in the European Union.

    In this webinar you will learn:

    • More about GDPR and how it will impact you
    • How you can work towards GDPR compliance
  • Career Conversations w/ Maggie Powell, Exelon
    Career Conversations w/ Maggie Powell, Exelon
    Jessica Gulick, CEO, Katzcy Dec 21 2018 12:00 am UTC 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Maggy Powell , MIA, International Economic Policy, Eastern Europe

    Maggy Powell is the Senior Manager, Real Time Systems Security for Exelon. Her teams include security engineering, a security operations center and security compliance focused on real time systems across the enterprise. She is responsible for vulnerability assessment, threat management and incident response for industrial control systems and operational technology as well as compliance fulfillment for applicable CIP cyber security standards.
  • Scared of data security in SaaS applications? Don’t worry, we have your back
    Scared of data security in SaaS applications? Don’t worry, we have your back
    Akhilesh Dhawan, Dir. Product Marketing, Networking/Security; Praveen Raghuraman, Dir. Product Management, Networking, Citrix Dec 28 2018 7:00 pm UTC 39 mins
    Most organizations have some data stored in SaaS applications or are thinking of moving to SaaS. Some of this migration to SaaS is controlled by IT (sanctioned SaaS apps), while most of this migration is undertaken by individual business units (unsanctioned SaaS apps) in order to achieve better productivity or to get some tasks done. While IT has deployed methods like single sign-on to sanctioned applications, they cannot control access to any unsanctioned SaaS applications using the same SSO solution. And traditional single sign-on solutions don’t provide any control on what actions a user can take after they login to SaaS applications, nor do they provide security policies for IT to control user access to the Internet.

    In this session, you will learn about a single solution that helps:

    • Improve user experience with single sign-on to SaaS, web and virtual apps
    • Implement enhanced security policies for SaaS apps to control user actions after login
    • Enable Web filtering to control what users cannot access on the Internet
    • Securely browse the internet
    • Provide end to end visibility and user behavior analytics with Citrix Analytics
  • The Future of Threat Hunting & Incident Response
    The Future of Threat Hunting & Incident Response
    Justin Falck, Senior Product Manager & Gun Akkor, Director of Technical Product Management Jan 3 2019 10:00 am UTC 58 mins
    As the pioneer in the endpoint detection and response market, year after year Carbon Black has continued to innovate and deliver mission-critical incident response and threat hunting capabilities to advanced security operations teams worldwide. Join us for a look back at where we’ve been, what we’re doing, and what the future holds for Cb Response and our latest offering on to the Cb Predictive Security Cloud, Cb ThreatHunter.