Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Nathan Burke, CMO @ AxoniusRecorded: Jul 19 20194 mins
By connecting to the management and security tools that customers already use and the network infrastructure, Axonius gives customers a credible, comprehensive asset inventory. From laptops & desktops, servers and VMs, cloud instances and mobile devices, to IoT and OT, if an asset is part of your environment it can be discovered.
Providing customers with a true, always up-to-date inventory of assets is the first step in uncovering security gaps and enforcing policies to take automated actions like enriching CMBD data and creating incidents when any asset is not in line with the overall security policy.
Guy Fletcher, CISO @ AppsFlyerRecorded: Jul 19 20192 mins
With a comprehensive inventory of all assets, users, and security solutions, AppsFlyer was able to get clear visibility into the deployment of the different security solutions and automate ongoing security policy adherence.
“Asset management and what Axonius provides is a core element. You can’t build a house without having a solid foundation. Asset management and understanding what you have is basic.” -- Guy Fletcher, CISO @ AppsFlyer
Dean Sysman, CEO & Co-Founder @ AxoniusRecorded: Jul 19 20194 mins
A security teams job is so difficult today - but they’re still spending time figuring out where things are and what they are. The more solutions you have the harder it is to understand where something is, who owns it, and does it actually fit your security policy.
Asset management isn’t sexy - but at the end of the day, everything you’re doing in your security program relies on a foundation of knowing what your assets are and if they’re fitting that security policy.
Learn how a Swiss insurance company designed its hybrid cloud monitoring solution around Amazon Web Services (AWS) and Red Hat OpenShift using best-of-their-kind metrics and monitoring tools.
In this session, a technical solution architect from Helvetia, together with senior consultants from Red Hat, who worked on the project, will show you how to use:
• Prometheus to gather the metrics for the platform.
• AWS CloudWatch to gather metrics for additional components/services.
• Grafana to centralize from multiple sources and visualize all of the cluster metrics.
• Prometheus Alert Manager to report on the health of Red Hat OpenShift Container Platform.
• Slack to notify the operations team.
• Dynatrace for application and end-to-end monitoring.
Ben Pritchett, Principal Systems Eng, IT and PaaS Ivan Atanasov, Principal Systems Eng, IT Application Delivery ServiceRecorded: Jul 19 201946 mins
You have access to clouds. You can build containers. How do you make them useful? Trying to build scalable and resilient services and deploying them across multiple sites and cloud providers can be tricky. Find out how Red Hat IT does it.
In this session recorded from Red Hat Summit, Tom Benninger, Red Hat, Ben Pritchett, and Ivan Atanasov, Red Hat Inc, review the patterns, processes, and tools Red Hat IT uses to deliver business critical application services across multiple sites, with Red Hat OpenShift Container platform.
•The Red Hat IT standard development and deployment pattern.
•How to automate your CI/CD delivery pipeline, from merge request to release.
•How to implement basic supply chain security to support application integrity.
•How we deal with security and change management requirements.
•The tools and processes needed to implement this model.
This recorded Red Hat Summit session shows how Red Hat and open source tools are used today to for fast, high-quality, more secure, and efficient digital delivery.
How many assets are in your environment? Most security teams don’t know. Asset management is a huge, nagging problem that is only getting worse. With the increase in the number and types of devices in today’s corporate environment, compounded by trends like BYOD, Cloud and IoT, it’s nearly impossible to understand how many devices are on our networks, what’s on them and whether they comply with the overall security policy. Until now.
Enter Axonius, a simple solution with a unique approach. By aggregating existing business data from over 130 management and security solutions, the Axonius Cybersecurity Asset Management Platform provides actionable visibility and automated security policy enforcement for every asset and user.
Dirk Thelen und Dirk SchülerRecorded: Jul 19 201949 mins
Der Wechsel in die Cloud wird stark von den Geschäftsbereichen bestimmt und die Geschwindigkeit ist so hoch, dass in einigen Fällen die Sicherheit in den Hintergrund tritt. Ihre Anwendungen und Daten müssen aber in Public Cloud Umgebungen genauso sorgfältig geschützt werden, wie lokale Anwendungen und Daten. Deshalb gilt: Zero Trust Security Modell must be everywhere!
Wir zeigen Ihnen in dieser Ausgabe von „Die Zwei um Zwölf“, wie mit Automatisierungstools Public Cloud Umgebungen auf Knopfdruck mit virtuellen Firewalls (Prisma VM-Series) eingerichtet, verwaltet und abgesichert und wie Workloads und Sicherheitsmaßnahmen in wenigen Minuten bereitgestellt werden können.
Joe Foley, Director of Business Analytics at NumerifyRecorded: Jul 18 201934 mins
There is a treasure trove of insights in the text descriptions entered into your incident tickets regarding common symptoms, root causes, and resolutions. However, with thousands of incidents generated weekly, it can be hard to manually extract these insights and make them available to your Incident teams.
How can you leverage Natural Language Processing (NLP) techniques to make sense of the human-generated incident data?
Join Joe Foley, Director of Business Analytics at Numerify, to learn how organizations like yours:
- Achieve Smart Incident Management with AI-Powered Analytics
- Leverage NLP to help make sense of large volumes of unstructured text descriptions
- Identify related incidents using Incident Topic Clustering
- Benefit from using Topic Clustering for Smart Incident Management
Every use case differs in the way it defines and executes password resets, but ultimately it’s imperative for many platforms to verify users’ identities for each password reset request – from enterprise employees to government applications and even with e-commerce and other human-centric sites.
Platforms that integrate a secure identity verification method into their password reset process will benefit from having a greater level of assurance that the person initiating the reset is in fact who they say they are, and furthermore, will ensure that the user isn’t a bot or a bad actor impersonating an active user.
For industries like finance, insurance, and healthcare that deal with a lot of personally identifiable information (PII) and other highly sensitive data, leveraging more rigorous verification standards for password resets becomes especially critical.
In this webinar, we’ll discuss a range of identity verification methods with various assurance levels so that organizations of all sizes and industries can better understand how to build a password reset program that meets their specific security needs.
- Level set on why identity verification is important for account security and password reset interactions and how it affects every type of organization.
- In-depth review of the most effective identity verification methods for successful (and secure) password resets.
- Explore how identity verification works with multi-factor authentication for password resets.
Nancy Wu, Sales and Customer Support, SkyStemRecorded: Jul 18 201956 mins
[Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.
Please note: CPE credit not available for this playback
Ales Raszka, Software Engineer, Red Hat and Stanislav Ochotnicky, Principal Software Engineer, Red HatRecorded: Jul 18 201944 mins
The journey to DevOps will revolutionize how you manage your business and shorten delivery time for a variety of IT resources. It’s about not only the tools, but also the change in culture to accept this new style of work. But how do you get from here to there?
Join us for this webinar to learn how Red Hat's DevOps team moved applications deployed in Red Hat® Virtualization and managed with Ansible® to a full-fledged containerized format using OpenShift®.
In this webinar, we’ll cover:
•Challenges of brownfield migrations.
•Things to consider before, during, and after migration.
•Phases of the example migration.
Gary Marsden, Senior Director of Data Protection Services at ThalesRecorded: Jul 18 201944 mins
Although most major cloud providers now offer native cloud Hardware Security Module (HSM) services, how do you choose the right cloud HSM? According to 451 Research, 69% of enterprises now have a hybrid, multi-cloud strategy. With hybrid, multi-cloud environments likely to be the norm as we move into 2020, managing multiple cloud HSMs will increase complexity, cost of ownership and operational overhead.
Join us as we discuss the complexities of managing native cloud HSMs separately, leading to islands of security with different features and rules for each. We’ll show you how the smarter and simpler route is to use a cloud HSM provider that can centrally manage and secure your entire cryptographic operations across all cloud environments.
This informative webinar will cover:
• A current view of the cloud’s impact on IT business models
• Why HSMs are critical to data security on premise or in the cloud
• How creating centralized key management and security strategy will make your cloud life a whole lot easier
• Building blocks for an HSM strategy for security across all cloud and hybrid IT environments
Conrad Chuang, Director of Product Marketing; Cormac Reidy, SAE - FSI; Ian Pestell, Senior Data ScientistRecorded: Jul 18 201949 mins
Is your risk infrastructure showing signs of strain in the face of FRTB, Basel III, and BCBS 239? Imagine a risk function where discrepancies among business, risk and finance views are eliminated, setting the stage for advanced technologies, robotic process automation, and machine learning.
You are invited to join TIBCO as we take a step beyond first generation data governance towards unified data and analytics across the enterprise. We’ll present how to achieve a digitally enabled risk function for credit, operation and accounting risk.
In this session we will cover:
▪ How CROs are mastering regulatory change as part of transforming the risk function, elevating knowledge and data resources through governance, MDM, data science, and analytics
▪ An overview of the key market challenges for delivering a unified data management and governance model
▪ Real-world case studies from G-SIBs focused on Data Governance, Master Data/Reference Data, Data Virtualization, and Data Science
Conrad Chuang, Director of Product Marketing, TIBCO
Cormac Reidy, Senior Account Executive - FSI, TIBCO
Ian Pestell, Senior Data Scientist, TIBCO
Amanvir Sangha, Consultant, SynopsysRecorded: Jul 18 201969 mins
We all know that fixing defects early in the SDLC is the right approach to building secure software. Security needs to be in every part of the pipeline but it’s often hard to get everybody onboard with software security initiatives.
Come join us on this webinar to explore how to build a culture of proactive secure programming in your technical organization and how to implement security as an enabler without disrupting the velocity of projects in modern development teams. See how Synopsys tools and services can allow you to build secure, reliable and quality software.
Rich Gibsen, CTO at SecureAuth and Robert Humphrey, CMO at SecureAuthRecorded: Jul 18 201942 mins
Digital experiences (portals, commerce sites, communities, etc.) are strategic resources for most organizations. Providing secure access to these experiences is a challenge for both security and business teams alike. While nearly all organizations are developing these digital experiences in the cloud, the typical IT infrastructure includes systems that are cloud based, on-prem or hybrid. Your identity access management systems should mirror your organization’s infrastructure and enable you to deploy on-prem, in the cloud or hybrid.
Hybrid Identity enables you to choose the deployment approach that fits your business, rather than fitting the approach of the vendor. Don’t compromise on experience and security, and don’t compromise on choice. Hybrid Identity gives you choice.
Join us to learn what Hybrid Identity is, and how it can help better secure all your workforce and consumer identities. You’ll see Hybrid Identity in action, and how it results in minimal impact to users with maximum visibility to administrators. You’ll also hear about SecureAuth’s latest offerings and get a sneak peek into the future of identity.
The Hybrid Identity journey is about to begin – sign up to find out how it can help better secure all your workforce and consumer identities.
Lacy Gruen, Tim Sedlack and Danny Kim, Micro FocusRecorded: Jul 18 201960 mins
Most organizations manage policies in silos across their organization. Even those managing group policy within Active Directory find it very difficult to effectively leverage those authorization and authentication policies in other systems. All systems within your environment require some kind of policy controls to be enforced and auditable – from Linux and UNIX servers to a wide variety of cloud resources such as virtual machines, SaaS, containers, etc. It becomes even more challenging when you must prepare your existing security policies for the cloud and find a way to migrate them to cloud services such as Intune. Managing policy in so many different places is highly inefficient and the lack of consistency opens the organization up to a great amount of risk. Bad actors are just waiting to find vulnerabilities when it comes to security policy and will exploit any gaps every chance they get.
Attend this webinar to learn how to transform the way you manage security policies to improve security, drive efficiency, and reduce the risk of a breach or failed audit. Industry experts Tim Sedlack and Danny Kim will discuss the five steps you can take to implement a modern universal policy strategy.
Jon Oltsik, Sr. Analyst, ESG and Bob Shaker, Adam Glick and Steve Meckl from SymantecRecorded: Jul 18 201958 mins
Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.
Join ESG and Symantec as we discuss how organizations are using solutions to improve their threat detection and response efforts, including:
- Trends impacting threat detection efforts
- How organizations are using EDR and MEDR solutions
- The benefits of using an MEDR service
Sean Anderson - Director of Product Marketing at StreamSets | Dash Desai - Technology Evangelist at StreamSetsRecorded: Jul 18 201958 mins
Your cloud database is helpful only if it is real-time, which means looking beyond migration and batch uploads. Whether synchronous and asynchronous syncing, we explore how users can design robust change/data/capture (CDC) jobs between Snowflake and on-premise data warehouses. We will configure a CDC pipeline with prebuilt origins for popular data warehouses and destinations to the Snowflake service. We will show an initial load with full table creation and a schedule to initiate incremental data captures.
In this webinar we will:
-Show how to configure a CDC pipeline with prebuilt origins for popular data warehouses and destinations to the Snowflake service.
-Show an initial load with full table creation and a schedule to initiate incremental data captures.
Shamus McGillicuddy, Research Director, EMA & Bassam Khan, VP Product & Technical Marketing Engineer, GigamonRecorded: Jul 18 201959 mins
Got apps? Most companies run hundreds. Application experience can make or break a digital enterprise. That’s why true application-level visibility is a must-have in today’s network operations. While achieving it with legacy solutions is difficult, the benefits of becoming app-aware are more than worth it.
What the heck is application-aware networking? It’s a cool new way to boost network performance and get the most out of your tools. You can now instantly see all applications running in your network, and manage traffic flow not by packets, but by applications.
Join EMA Research Director, Shamus McGillicuddy, and Gigamon VP, Product and Technical Marketing, Bassam Khan, for this interactive webinar where they will discuss key topics including:
•Protect your operations from oversubscription
•Interrogate and identify unknown apps
•Protect critical applications from bandwidth hogs
Best of all, you’ll see a live demo of how Gigamon, an application-aware network packet broker, delivers true application visibility to your organization.
Dr. V. N. Berlin, CEO, Mission Critical Institute, Rob Chubbuck, Information Assurance Systems Engineer, CACI InternationalRecorded: Jul 18 201950 mins
If you want to fast-track your cyber security career in 2019, join our webinar and learn how to qualify for a Cyber Tuition Rebate Voucher.
Save up to $5000 in tuition to earn your CISSP, CEH, CAP and CCRMP certifications. Finish your cyber certificate degree while you work full-time. Then get hired by a top cyber security employer with tuition vouchers from MCI!
Hear from Rob Chubbuck, senior cyber security expert at CACI International, as he shares what employers want in cyber security professionals and how to get hired by a top cyber security employer.
Register now and download the attachments to get exclusive access and save up to $5000 with your Cyber Tuition Rebate Voucher!
You will learn the answers to these questions:
1. Why is MCI offering these Cyber Tuition Vouchers?
2. Should you apply for a Cyber Tuition Voucher?
3. What are the opportunities for certified professionals?
4. What do employers want in certified professionals?
5. Why are the CISSP, CCRMP, CEH and CAP certifications important?
6. What are the MCI Cyber Tuition Vouchers?
7. How to qualify for the MCI Cyber Tuition Vouchers?
8. What else do employers want in job candidates?
9. Is the CCRMP certification enough?
This webinar will tell you exactly how you qualify for a Cyber Tuition Rebate Voucher and then how you can become a certified professional and get hired by a top cyber security employer.
Seating is limited to 75, so register now to reserve your spot!
ADDED WEBINAR BENEFITS: Register for the webinar and download the attachments to become a CISSP certified professional. Download the Career Readiness Assessment and schedule an interview with an MCI Cybersecurity Education Specialist to fast-track your cyber security career today.
Want more than a certification? Find out how you can transfer credits and earn your CCRMP in as little as five classes by downloading the webinar attachments.
Pano Xinos, Global Telco Marketing Lead, Red HatJul 22 20196:00 pmUTC15 mins
This webinar on Network Functions Virtualization (NFV) educates the audience on the benefits of NFV.
In today’s day and age, NFV is the newest way to define, create and manage networks by replacing hardware with software and automation. Companies are leaving behind hardware to move into a future of cloud computing. With Red Hat OpenStack Platform, customers have a solid foundation for the NFV architecture.
OpenStack provides NFV with features to be modular, high performance and open source. The foundation of Red Hat OpenStack has given NFV the foundation it needs to transform the telecommunications industry.
Darren Thomson, EMEA CTO SymantecJul 22 20199:00 pmUTC11 mins
As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.
Join Darren Thomson, EMEA CTO discusses how Symantec is transforming itself to be worthy of this title.
Dean Nicolls, VP of Marketing, Jumio Corp.Jul 23 20197:00 amUTC26 mins
Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.
Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.
Join us for this informative “how-to” webinar and discover how to…
- Dissect the abandonment problem
- Reduce the number of identity verification screens & clicks
- Cast a wider net with omni-channel verification
- To say “no” to verification “maybes”
Cyber Security Brief PodcastJul 23 20198:00 amUTC22 mins
On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week – ASUS’ software update system being hijacked to send out malicious updates, as well as discussing the ongoing issue of insider threats, and some new research into how mobile apps could be compromising your privacy and online security.
Financial service companies will need to lead the charge in flexible and remote working if they are to attract the best possible talent. Something that has never been more important against a backdrop of Brexit and a growing millennial and Gen Z workforce.
Today, only one in six (15%) employees work in businesses that don’t offer flexible working. What used to be a perk is now a mandatory offering.
Alongside the importance of employee satisfaction, the UK is also facing a productivity challenge, on average the UK is 31% less productive than France.
Join Mark Elwood, Director at TeleWare, Dr Lucy Green, CEO & Business Development Expert at Larato and David Mellard, Director and Founder at Bedrock HR, as they discuss:
•The flexible working challenges financial services companies face – including security and data protection
•Can financial services companies safely implement a bring your own device (BYOD) policy?
•How to use tech to increase productivity
•Scalable IT solutions for growing companies
John Gudmundson, Sr. Product Marketing Manager GigamonJul 23 201912:00 pmUTC53 mins
Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?
Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.
During this live demonstration, you’ll see how Application Intelligence helps you:
• Identify and extract traffic from over 3,000 applications
• Detect and manage shadow IT and rogue apps
• Separate unnecessary application traffic to greatly improve tool efficiency
We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.
Darrel Rendell, Principal Intelligence Analyst, Cofense, Brandon Dunlap, Moderator, (ISC)²Jul 23 201912:00 pmUTC60 mins
Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognise phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.
This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organisations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.
Join this webinar to learn about:
-The constantly changing threat landscape
-Turning active, real threats into learning moments for your users
-Speeding up response with timely, actionable intelligence
Darren Thomson, EMEA CTO, Symantec and Dr Chris Brauer Goldsmiths UniversityJul 23 20191:00 pmUTC32 mins
Complexity, technological change, and regulations are increasing the pressure on security professionals. Over half feel paralysed by the overwhelming volume of threat alerts, with a quarter saying the sheer volume of alerts makes it more difficult to keep their business safe. Over a quarter say they are vulnerable to avoidable incidents.
A brand new survey of over 3,000 cyber security professionals reveals that intense pressure is affecting decision making and increasing the risk of critical mistakes. Put simply, today’s constant state of high alert is unsustainable.
Join leading psychologist Dr Chris Brauer from Goldsmith’s College, University of London, and Symantec EMEA CTO Darren Thompson, as they present the survey findings, and analyse what they mean for organisations like yours, including:
-What cyber security leaders and professionals really feel about their roles in 2019
-How to build a plan to reduce stress and improve cyber security effectiveness
-Why the Symantec Integrated Cyber Defense Platform can help put your plan into action.
Keith Townsend, CTO Advisor and Penny Gralewski, CommvaultJul 23 20192:00 pmUTC53 mins
The multi-cloud reality means never before imagined flexibility for recovery, but also the potential for unmanageable complexity. Harnessing the power of multi-cloud for your recovery is essential in order to meet increasingly strict data compliance rules, combat the prevalence of ransomware, and maintain business continuity.
Managing a multi-cloud environment requires the use of policy-based automation, artificial intelligence and other tools that watch for anomalies in the data infrastructure and help ensure your multi-cloud recovery plan is continually ready.
In this webinar you will learn:
-How multi-cloud disaster recovery can help you meet multiple RTO and RPO targets with granular recovery
-Lessons from real world customers involving physical infrastructure disruptions and ransomware outages
-What omnidirectional cloud recovery means for your overall cloud strategy
Scott Wenzel, Sr. Value Engineer & Matt Creason Sr. Value Engineer at SynitiJul 23 20193:00 pmUTC60 mins
The demonstration is a follow up to our Webinar “Get your business frictionless with clean data” and will focus on our SAP Solution Extension – Information Steward Accelerator. In this demo, you will see how this application covers all phases of a data quality project and adds value to your data governance needs by giving you a web-based platform that bridges the gap between IT and business users as well as increases your overall visibility into the quality of your data.
Is your organization struggling with inefficiencies from an outdated, scale-up approach to managing and protecting data? The need for a fully integrated data protection appliance to deliver greater availability and scalable services for on-premises applications and data is becoming a necessity.
Join us as we discuss the benefits of a scale-out infrastructure and how the launch of Commvault HyperScale™ Appliance and Commvault HyperScale™ Software address the shift enterprises are making towards secondary storage as a means to drive key business and IT transformation initiatives.
In this webinar, you will learn:
•Scale-out vs. scale-up infrastructures
•How to leverage a scale–out infrastructure
•How you can save time and drive greater value with an integrated data protection appliance or reference design architecture
•How Commvault HyperScale™ Appliance tightly integrates compute, storage, full lifecycle data protection and analytics into a single platform
It’s time for a fresh approach to solving data management challenges. Register today and learn how you can achieve IT agility through a scale-out infrastructure.
Sean Walker, Enterprise Account ExecutiveJul 23 20195:00 pmUTC36 mins
Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
Join us for a demo of Proofpoint Security Awareness Training to see for yourself!
You'll learn how to:
- Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
- Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
- Enable your employees to report suspicious messages with a single mouse click
"Trusted” Websites Are Not as Safe as First Thought!
Phishing and spear-phishing campaigns drive the majority of today’s most significant data breaches, fooling users into clicking on apparently legitimate links. They force victims to expose themselves or their businesses to credential theft, malware infections, and possibly ransomware.
Whether accessed for business or pleasure, the modern Internet is no longer a place that can be trusted.
Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, company-wide cyberattack.
- Why the Internet remains a dangerous place
- Best practices for lowering the odds of a cyberattack
- Newer technologies that are solving this problem
Clarke Patterson - Head of Product MarketingJul 23 20195:00 pmUTC58 mins
Apache Kafka has become a popular choice for stream processing due to its throughput, availability guarantees and open source distribution. However, it also comes with complexity, and many enterprises struggle to get productive quickly as they attempt to connect Kafka to a diversity of data sources and destination platforms.
In this webinar, expert Clarke Patterson will discuss and demonstrate best practices that will help make your Kafka deployment successful, including:
-How to design any-to-any batch and streaming pipelines into and out of Kafka.
-How to monitor end-to-end dataflows through Kafka.
-How to operate continuous data movement with agility as data sources and architecture evolve.
As organizations migrate to the cloud, they often start by replicating their existing network architecture. This approach can be costlier and more difficult to manage than an architecture that leverages cloud-native capabilities that are not available in the data center. Microsoft Azure enables development teams to rapidly build and deploy global-scale applications, but with this ease and speed comes increased risk.
In this webinar, you will learn more about the best practices for deploying network virtual appliances in Microsoft Azure, including:
Designing network security for high availability and auto-scaling with Virtual Machine Scale Sets (VMSS) and Azure Load Balancer
Implement Accelerated Networking and deploy VM-Series virtualized firewalls with multiple NICs to increase throughput and performance
Automate virtualized firewall deployment configuration to ensure best practices are consistently implemented
Rise above the noise and confusion by using VM-Series virtualized firewall on Microsoft Azure that provides complete visibility across all of your workloads in Azure, and helps you automate security controls.
Holly Davis, CEO, KomplementJul 23 20196:00 pmUTC39 mins
Safeguarding K-12 networks is a delicate yet critical undertaking. Connectivity is critical. Student safety is paramount. Yet access to budgets, staff and resources is limited. This unique webinar brings together a panel of experts from security, networking and education to outline how districts can expand wireless security to the edge — even without firewalls. The must-attend session will explore:
•Emerging threats to both network safety, insider threats and student privacy
•Seamless ways to monitor and manage access to dangerous content
•How to simplify wireless deployment, management and analytics
•Methods to enhance campus-wide WiFi performance, coverage and capacity
•Opportunities to leverage the federal E-rate program to help eligible districts simultaneously stretch budgets, improve security and protect students
Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat CitrixJul 23 20196:00 pmUTC46 mins
Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.
This on-demand webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
Mark Thacker, Principal Technology Product Manager, Red HatJul 23 20196:30 pmUTC23 mins
Do you know how to improve the entire cryptographic policy on a system with one command? How about being able to record exactly what an admin typed in the system - and what happened as a result?
In this webinar, we'll provide an overview of the most notable enhancements to the many security capabilities in Red Hat Enterprise Linux 8 and how to use them to enhance the security posture of your systems.
Robert Healey | Senior Director Marketing, Asia Pacific, TenableJul 24 20193:00 amUTC60 mins
Security teams are frequently blind to the IT and Operational Technology (OT) assets, internal and external connections, and vulnerabilities on their industrial control system networks. This visibility gap is one of the key challenges highlighted in a new survey report from the Ponemon Institute.
To learn more about the report and how its findings compare with your organization’s experience, please join Robert Healey, APAC Marketing Director, Tenable, for the webinar: “Cybersecurity in Operational Technology: 7 Insights You Need to Know.”
All infosec professionals responsible for and interested in effectively securing converged IT/OT environments are encouraged to join this webinar.
Viktor Gamov, Developer Advocate, ConfluentJul 24 201910:00 amUTC43 mins
Apache Kafka® has become the de facto technology for real-time event streaming. Confluent Platform, developed by the creators of Apache Kafka, is an event-streaming platform that enables the ingest and processing of massive amounts of data in real time.
In this session, we will cover the easiest ways to start developing event-driven applications with Apache Kafka using Confluent Platform. We will also demo a contextual event-driven application built using our ecosystem of connectors, REST proxy, and a variety of native clients.
Register now to learn:
-How to create Apache Kafka topics in minutes and process event streams in real time
-Check the health of an Apache Kafka broker using Confluent Control Center
-The latest enhancements to Confluent Platform that make it easier to run Apache Kafka at scale
Scott McCarty, Principal Product Manager, Red Hat and Dan Walsh, Senior Distinguished Engineer, Red HatJul 24 20192:00 pmUTC48 mins
When building and managing container-based applications, it's important to consider every element of the proposed deployment, from selecting a base image on which to build, to understanding the security, scalability, and ease of use of the deployment platform.
With the introduction of the Red Hat container tools suite, comprising podman, buildah and skopeo and the availability of base images and container runtimes based on Red Hat Enterprise Linux, developers and users alike have a comprehensive set of tools at their disposal. In this webinar, we'll demonstrate how to replace Docker with podman and demonstrate podman.
We'll also demonstrate additional new features like management of pods, and better security features available in podman.
Phil Odence & Emmanuel Tournier at SynopsysJul 24 20193:00 pmUTC60 mins
Understanding the risks associated with open source software has become the norm in tech due diligence but not all approaches are created equal. Are you approaching open source diligence in the most efficient and effective way possible? Do you understand the difference between a point in time open source analysis for M&A and ongoing open source management?
Join us for this live webinar and learn how a purpose-built M&A open source audit differs from open source management tools and why it matters in tech due diligence. We’ll cover:
•The types of risk around open source software
•Why depth of analysis matters, and what it results in during M&A diligence
•Why accuracy, reporting and expert human analysis are keys to thorough diligence
Don’t miss this informative webinar. Register today.
Chaitanya Yinti, ForgeRock and Steve Giovannetti, Hub City MediaJul 24 20193:00 pmUTC60 mins
What is the value of replacing a legacy IAM system with a more modern, flexible platform? Why make the investment when everything seems manageable as it is now?
Join ForgeRock and Hub City Media to learn exactly how much value a modern IAM platform can bring to your organization, and how much time, money and resources it will save you in the long run.
Legacy IAM vs. Modern IAM - Should you stay or should you go?
•Keeping pace with current market demands
•Preview of what a modern IAM deployment looks like
•Short-term and long-term benefits of modernizing IAM
•Potential roadblocks to consider and how to overcome them
Bring your thoughts, questions and challenges to the table as we uncover the true value of modernizing your Identity and Access Management system.
By registering for this webinar you agree ForgeRock will maintain and process your personal information for communicating with you.
The following partner(s) of the the above webinar(s) will have access to the list of registrants, including your contact information:
Hub City Media (https://www.hubcitymedia.com/privacy-policy)