Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Passive, Active or Hybrid Monitoring: What’s the right choice?
    Passive, Active or Hybrid Monitoring: What’s the right choice? Barak Perelman & Michael Rothschild Recorded: May 18 2018 63 mins
    They are the workhorses of industrial operations and critical infrastructure. Industrial Controllers such as PLCs, RTUs an DCSs have been around forever and control virtually everything. Back when these controllers were deployed, there was little concern for security; but times have changed. As a result, you are now exposed to consistent and confusing noise regarding various ICS security approaches. You must take action, but what is the right action to take?

    In this session we will help unravel the confusion and specifically:
    - Explain the different approaches for ICS security
    - Learn about the differences between active, passive and hybrid ICS security monitoring approaches
    - Understand the benefits and disadvantages of each
    - Learn which security gaps are addressed and not addressed by each approach
    - Know which approach is best suited for protecting your ICS network
  • SEP Deception – All you need to know
    SEP Deception – All you need to know Adam Licata, Product Marketing Manager, SEP, Symantec Recorded: May 18 2018 40 mins
    Deception is a new features of SEP 14.1. Learn how to deploy and utilize this unique feature to identify hackers and remove risks.
  • SEP Hardening– All you need to know
    SEP Hardening– All you need to know Adam Licata, Product Marketing Manager, SEP, Symantec Recorded: May 18 2018 40 mins
    Understand how and why to deploy the new SEP Hardening feature in an effort to increase your overall security posture.
  • Claves de una Gestión de Datos Eficiente con Commvault y Microsoft Azure
    Claves de una Gestión de Datos Eficiente con Commvault y Microsoft Azure Alberto González Ocaña – Commvault & Francisco Javier Castilla Luque - Microsoft Recorded: May 18 2018 42 mins
    ¿Sabes cuantos datos tienes en Cloud? ¿Cómo de rápido crecen? ¿Quién tiene acceso a ellos? ¿Estás preparado para las nuevas regulaciones como GDPR?

    Mover cargas a Cloud requiere de una estrategia integral de protección de datos y de recuperación ante desastres que cubra toda su infraestructura independientemente del origen. Commvault ofrece una plataforma de gestión de datos exhaustiva con automatización y orquestación para acelerar las migraciones a Microsoft Azure y Office 365 mientras realiza todas las tareas de gestión de los datos (backup, recuperación, gestión de políticas, e-discovery, etc.).

    Únete a nuestro webinar y conoce cómo la integración de Commvault con Microsoft Azure y O365 para la protección de datos te permite:
    •Mover, gestionar y usar datos desde una única plataforma independientemente de si estos residen on-premise o en Microsoft Azure.
    •Reducir tiempo, coste y esfuerzo aprovechando la automatización, orquestación y flexibilidad para reducir las tareas administrativas y manuales.
    •Simplificar la gestión de los datos y la recuperación ante desastres
    •Una eficiente integración en O365 para garantizar protección y recuperación granulares, cumplimiento de políticas de archivado y gobierno de información así como búsqueda avanzada de contenidos.
    •Backup consistente de Sharepoint (Base de datos y objetos).
  • Career Conversations w/ Kristin Demoranville; Manager of Global Policy
    Career Conversations w/ Kristin Demoranville; Manager of Global Policy Jessica Guilick Recorded: May 17 2018 61 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Kristin Demoranville is a triple threat in STEM, she holds a BS in Environmental Management, has worked in Information Technology since dial up modems were a thing, and is currently focusing on Manufacturing Security & Global Policy at Sony.
  • Hybrid Defense: How to Defeat 2018's Biggest Threats
    Hybrid Defense: How to Defeat 2018's Biggest Threats Louis Evans, Product Marketing Manager - Arctic Wolf Networks Recorded: May 17 2018 32 mins
    There’s one certainty in cybersecurity: 2018's attacks are going to be even worse than the ones we've faced. So, how are cybersecurity experts and vendors gearing up to meet these new threats?

    In this webinar, we’ll touch on major industry trends like User Behavior Analytics and automated incident response, and take a deep dive into how three key innovations—hybrid AI, hybrid cloud security, and hybrid IT teams—are enabling even cash-strapped organizations to deploy world-class defenses.

    We’ll discuss how:

    - Human-AI hybrid solutions deliver security that’s more than the sum of its parts
    - SIEM solutions are rising to the challenge of new hybrid-cloud architectures for business
    - Expert-as-a-service solutions are transcending the challenges posed by both in-house and traditional consulting staffing strategies

    To see how you can beat the big threats of 2018, register now!
  • How and Why Cost Optimization is Crucial to Cloud Management
    How and Why Cost Optimization is Crucial to Cloud Management Todd Bernhard, CloudCheckr Product Marketing Manager Recorded: May 17 2018 36 mins
    With the inception of the public cloud, including AWS and Azure, organizations have been introduced to a whole new range of financial issues that must be overcome. Furthermore, IT and financial teams need to understand, navigate, and address a highly dynamic and constantly changing enterprise cloud environment.

    This webinar explores considerations for CFOs, procurement, and FinOps teams, including:
    -why visibility and control is critical for budgeting and forecasting;
    -how governance and accountability tactics can prevent cloud sprawl;
    -how CFOs can ensure their organization is taking advantage of optimization opportunities;
    -and cross-departmental challenges and strategies to ensure alignment around cloud initiatives.
  • Use value-stream thinking to define metrics and Automation to improve processes.
    Use value-stream thinking to define metrics and Automation to improve processes. Troy DuMoulin VP, Research & Development, Pink Elephant & Vincent Geffray Senior Director, Product Marketing, Everbridge Recorded: May 17 2018 58 mins
    Today’s digital businesses face more complex threats than ever before. These range from IT services failures, application latency and outages to performance and security issues, none of which your customers will tolerate. They expect services and applications to be available 24/ 7, wherever they are, and from any device. With these digital offerings increasingly at the core of your business, ensuring good quality service must be your top priority. Therefore solving IT issues as quickly as possible is essential.

    You’ve adopted ITIL and ITSM best practices and your IT teams use lots of point solutions and processes, but are your business users getting the full value of IT? How do you make improvements? Based on what metrics? Are your processes fully integrated? Are the cross-functional teams fully collaborative? How do you measure performance?

    In this webinar, Troy DuMoulin, Vice President of Research and Development at Pink Elephant, and Vincent Geffray, Senior Director of Product marketing at Everbridge will explore:

     How to deliver on four seemingly contradictory objectives: innovation, speed, security, and compliance
     Value-stream thinking vs. framework thinking
     Lean IT and Incident Response Automation to improve end-to-end performance
     Applications for ITSM, DevOps, and agile development
  • Mastering AWS IAM: Using Automation to Secure Access to AWS
    Mastering AWS IAM: Using Automation to Secure Access to AWS Scott Ward, Solutions Architect, AWS, Nathan Chan, Solutions Architect, OneLogin, Jonathan Bennun, PMM, OneLogin Recorded: May 17 2018 60 mins
    For many companies, Amazon Web Services is the foundation of their software apps, containing valuable software code that is critical to protect. Join us to learn about mistakes to avoid when using AWS Identity and Access Management (IAM) - and how to address them.

    AWS solution architect will touch on Federated Users, Trust & Access Policies and AWS Organizations, and you’ll see a demo of how to set up a secure OneLogin+AWS deployment.

    In this webinar you will learn:

    - IAM misconfigurations made by AWS customers
    - Best practices for AWS access security
    - How to extend AWS IAM security using SAML integration, Multi-Factor Authentication, and AWS Roles
    - How to get your own Free OneLogin for AWS Account
  • The Challenges of Archiving - Archive Solution Live Demo
    The Challenges of Archiving - Archive Solution Live Demo Kieran Stewart, Archive Specialist & Jason Colvin, Senior Engineer Recorded: May 17 2018 55 mins
    Financial institutions - specifically FINRA and SEC regulated organizations - are required to protect their firm’s and clients’ data, capture and archive business records and make them discoverable.

    They face challenges of swiftly producing required records during legal discovery and regulatory audits + demonstrating ongoing supervision of their employees despite an increased regulatory landscape, exponential data growth, decreases in staff and ongoing demand to lower costs

    Join us to take an in-depth look at the technology that positions Proofpoint as a leader in enterprise information archiving and how it helps organizations in the financial services industry:

    -Mitigate reputational risk
    -Stay compliant with industry rules and regulations through Enterprise Archiving, Intelligent Supervision, E-discovery and Analytics and Social Media Compliance.
  • Beyond Security Orchestration - The Urgent Need for Intelligent Automation
    Beyond Security Orchestration - The Urgent Need for Intelligent Automation Tom D'Aquino, Director of Security Solutions, LogicHub Recorded: May 17 2018 49 mins
    When it comes to security automation, you’re not limited to simple orchestration. Intelligent Automation can deliver the most value by removing the decision fatigue plaguing security analysts, allowing them to focus more effectively at stopping and resolving advanced threats.

    Join this webinar to see Intelligent Automation in action and gain insights into:
    * What is Intelligent Automation
    * Why Orchestration alone doesn’t solve analyst fatigue
    * Key capabilities of Intelligent Automation
    * Demos of working examples
    * Implementation best practices

    Go beyond simple orchestration. Prepare yourself for the future of security automation.
  • How Cyber (measured in dollars) Earns a Spot on the Risk Register
    How Cyber (measured in dollars) Earns a Spot on the Risk Register Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security Recorded: May 17 2018 47 mins
    Cyber has yet to be fully integrated into the suite of business functions and monitored risks within most organizations. GRC is the mechanism to align cyber and the business, but it’s current state is not sufficient. Governance hierarchy is ineffective (CISOs reporting to the CIO or COO), Risk leveraging ambiguous risk measurements, and Compliance mistaken as security. Moving forward, Governance must be redefined, making CISOs business leaders, reporting to the Board. Risk should leverage traceable data to measure in a common business language. Compliance should be the baseline for security initiatives, not the end goal. When these initiatives can be achieved, GRC will transform cyber into a business enabler.

    Jerry Caponera is the VP Cyber Risk Strategy at Nehemiah Security where he leads the effort to quantify cyber risk in financial terms. Prior to Nehemiah he founded PivotPoint Risk Analytics which focused on cyber risk quantification through value-at-risk modeling and simulations. Jerry has a broad background in cyber, having worked for incident response, malware analysis, and services companies. He has spoken at a number of conferences worldwide including ISS World MEA in Dubai, InfoSecurity Russia in Moscow, and TM World Forum in Nice, France. He holds an MBA from the University of Massachusetts, an MS in Computer Science from the University of Pennsylvania, and a BS in Electrical Engineering from the University of Buffalo.
  • Looking to the Future with CloudNine, Concordance and LAW PreDiscovery
    Looking to the Future with CloudNine, Concordance and LAW PreDiscovery Doug Austin Recorded: May 17 2018 66 mins
    This webcast provides an overview of CloudNine, the vision for our new robust suite of products and how they will extend and enhance your data and legal discovery efforts.

    Webcast Overview:

    CloudNine recently acquired the Concordance, LAW PreDiscovery and Early Data Analyzer platforms. So, who is CloudNine, why did they acquire these products and what is their vision for them going forward? This presentation and technology demonstration led by CloudNine Vice President and eDiscovery Daily Blog author Doug Austin will provide attendees an overview of CloudNine and its capabilities and how the newly acquired products fit into the vision for the future of eDiscovery technology at CloudNine.

    Presentation Highlights:

    + Who is CloudNine?
    + What We Do and How We Solve the Problems
    + Considerations for On-Premise, Off-Premise and Hybrid Approaches
    + What the Acquisition Means for Current On-Premise Customers
    + Looking to the Future with CloudNine Off-Premise and On-Premise Products

    Demonstration Highlights:

    + CloudNine Automated Legal Hold
    + CloudNine eDiscovery Platform (Upload/Process/Review/Produce)
    + CloudNine Automated Data Preservation and Collection

    Expected Duration: 60 Minutes Presentation + Q&A (As Required)

    CloudNine Software Showcase Presenter: Doug Austin

    Doug is the VP of Products and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.
  • Moving on Up - Is it time to shift your Database strategy from IaaS to DBaaS?
    Moving on Up - Is it time to shift your Database strategy from IaaS to DBaaS? Bobby Allen, CloudGenera CTO Recorded: May 17 2018 61 mins
    Use CloudGenera's data to give you insight on the best venue and service model to run your relational databases. We'll focus on MySQL, PostgreSQL, Oracle and SQL Server across AWS, Azure and Google.
  • Verizon Risk Report - Streamline Security with Actionable Insights
    Verizon Risk Report - Streamline Security with Actionable Insights Katie Crammer, Director, Verizon Global Security Solutions Recorded: May 17 2018 39 mins
    Please join Katie Crammer, Director of Global Security Solutions as she provides an in-depth conversation about a new powerful tool to help enterprises quantify cyber risk and ROI.

    Enterprises routinely struggle to correlate security-related costs with cyber risks and have difficulty determining their security ROI and measuring their security posture. The Verizon Risk Report provides a comprehensive, automated, 360-degree security risk posture assessment, updated daily. The report provides a security score by measuring outside security posture against peers, evaluates control effectiveness, exposes gaps, weaknesses and associated risks, yielding actionable recommendations for mitigating real and likely risks.
  • GDPR: Have Questions? Ask the Experts!
    GDPR: Have Questions? Ask the Experts! Sacha Dawes Principal Product Marketing Manager, AlienVault Recorded: May 17 2018 63 mins
    The GDPR, or General Data Protection Regulation, will come into force on 25 May 2018 and has spurred many questions for IT teams trying to get up to speed on what the new regulation will require and how to achieve compliance in the most efficient way.

    Join this webcast with John McLeod, AlienVault's CISO, and Dan Stocker, Coalfire's Practice Director of Cloud & Tech, to walk through frequently asked questions and best practices for GDPR compliance. John and Dan have been immersed in GDPR compliance efforts over the last several months and can share what they have learned, and answer your burning questions. The presenters will cover:

    - What is GDPR and who is affected?
    - How will GDPR impact organizations outside the EU?
    - What is meant by personal data in the context of GDPR?
    - What are some of the steps and effective tools you need to comply?
    - What should your incident response plan look like in the event of a breach?
    - What happens to companies that fail to comply?

    We'll wrap up with a brief demo of the AlienVault Unified Security Management (USM) platform to illustrate how AlienVault can help accelerate and simplify your path to compliance.

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager, AlienVault

    Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.
  • Accudata's White-Hat Files | May 2018 Edition
    Accudata's White-Hat Files | May 2018 Edition Josh Berry, CISSP & OSCP, Principal Consultant for Risk & Compliance Recorded: May 17 2018 16 mins
    Welcome to the White Hat Files – a monthly series where the best white hat hackers give you what you need to know about the threat landscape.

    Our first White Hat File comes from Josh Berry, who holds OSCP, CISSP, and GIAC certifications.
    In this 15-minute webinar, he’ll give you the rundown on Accudata’s most-seen vulnerabilities, as well as best practices you can use to defeat attackers looking to dissect and destroy your business.

    Join us for our next edition in June! Register here: https://www.brighttalk.com/webcast/16347/322209?utm_source=Accudata+Systems&utm_medium=brighttalk&utm_campaign=322209
  • 2018 Global Encryption Trends:  The Effects of Multi-Cloud Use and Compliance
    2018 Global Encryption Trends: The Effects of Multi-Cloud Use and Compliance Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Sr. Director of Security Strategy, Thales eSecurity Recorded: May 17 2018 61 mins
    In today’s environment data protection is more critical than ever and businesses are responding. This 13th edition of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales eSecurity, reveals how increased cloud use and accelerated compliance initiatives are driving adoption of new encryption strategies. Join Dr. Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Growth in encryption and Hardware Security Module (HSM) usage
    • The importance of performance, scalability and consistent policy enforcement across enterprise and cloud use cases for encryption solutions
    • Trends in encryption deployment across multiple vertical markets and geographies that are useful for benchmarking
  • How can you ensure that your logging infrastructure is GDPR compliant?
    How can you ensure that your logging infrastructure is GDPR compliant? Istvan Molnar, John Murdoch Recorded: May 17 2018 60 mins
    Since the GDPR is just around the corner, Balabit, a One Identity business, is holding a webinar session for facing difficulties fine-tuning their log management infrastructure to become compliant.

    The GDPR mandates that Personal Data should be secured at all times, stored in an encrypted format, and only available to authorized personnel. As log messages can contain personal data they fall under the scope of the regulation.

    In our 30 minute webinar session, you can find out how to make your logging infrastructure GDPR compliant with the use of syslog-ng.
  • Understanding the ROI of Implementing Digital Threat Management
    Understanding the ROI of Implementing Digital Threat Management Jarad Carleton Industry Principal, Cybersecurity Practice – Frost & Sullivan, Sam Curcuruto Head of Product Marketing – RiskI Recorded: May 17 2018 59 mins
    The digital threat landscape moves too quickly for security teams to rely on disparate tools that slow down investigations and complicate protecting the organization. The time has come to embrace the power of a digital defense platform strategy to simultaneously reduce cost and business risk.

    In this webinar featuring Frost & Sullivan Cyber Security Industry Principal, Jarad Carleton, we’ll cover:

    How organizations should be leveraging “force multiplier’ platform technologies that provide unified insight and protection against threats across the Web, social media and mobile apps.
    Why a platform approach is the best way for resource-constrained information security departments to reduce both mean time to detection (MTTD) and mean time to resolution (MTTR) of digital threats.
    Customer mini-case studies that demonstrate the platform capabilities and ROI achieved.
    How the RiskIQ platform maps to the Frost & Sullivan Cyber Resilience Framework.
  • Metrics drive behaviours: How to avoid common IT metric mistakes
    Metrics drive behaviours: How to avoid common IT metric mistakes Steve Morgan, Director, Syniad IT Recorded: May 17 2018 33 mins
    As organisations seek to improve the quality of IT services, perhaps through SIAM or cloud provisioning, the traditional SLA targets and performance measures we hold dear are no longer appropriate.

    This talk will look at the common pitfalls and make some recommendations as to measures which will drive the correct behaviours in your internal and external support teams.
  • Cloud Leaders Connect: The Public Sector Guide to IaaS Success
    Cloud Leaders Connect: The Public Sector Guide to IaaS Success Adam Kranitz, Director of CloudLeaders.io, Matt Jordan, Vice President of Corporate Development at JHC Technology Recorded: May 16 2018 33 mins
    Thank you for joining our Cloud Leaders Connect series!

    To meet compliance requirements, governmental bodies and their subcontractors must store and process sensitive federal data separately from private sector workloads.

    Leading cloud providers like AWS and Microsoft Azure have created isolated governmental regions to serve specific needs in the public sector, which has helped accelerate cloud adoption in the federal space.

    But migrating to the cloud not only requires a different approach to regulatory compliance, but also operational management and application architecture as well.

    In this webinar, you will learn:
    - Benefits of the cloud in the public sector
    - Key compliance frameworks that apply to governmental agencies
    - Types of IaaS offerings available
    - Cloud best practices
  • From Cost Center to Profit Center
    From Cost Center to Profit Center Phyllis Drucker - Consultant, Linium Recorded: May 16 2018 41 mins
    Cloud…outsourcing…Platform as a Service…all of these could make IT irrelevant, so how do you prevent this? By providing value every day and by running IT as a Business. Great catch-phrase, but what does it mean? In a nutshell: knowing the services IT is providing, what they cost to operate and whether they provide value, and by staying on the cutting edge of technology even with todays fast pace of change, so that the business you support remains competitive. This webinar addresses the basic building blocks you need to run like a business: defining services and offerings, layering in financial management and charge-backs/show-backs so you understand the costs of these offerings and how to pull it all together in a way that helps you run as a business does, even if it’s only on paper.
  • From BI to AI
    From BI to AI Naser Ali, Head of Solutions Marketing, Hitachi Vantara Recorded: May 16 2018 38 mins
    Business intelligence is evolving from traditional look-back analysis to forward-thinking prediction and prescription. Join Naser Ali of Hitachi Vantara in this webinar where he'll cover the following concepts:

    - Understanding why AI isn’t an academic pursuit or anything like traditional analysis
    - Why the value of AI comes from developing whole new processes
    - What to expect and when on the journey to predictive and prescriptive outcomes
    - A skills and infrastructure checklist
    - Plus: Gotchas - spotting the pitfalls and roadblocks
  • De-Mystifying Consent Under the GDPR
    De-Mystifying Consent Under the GDPR Kristy Gouldsmith, Sr. Data Protection GDPR Consultant & Managing Director of Sapphire Consulting Group May 22 2018 8:00 am UTC 60 mins
    The General Data Protection Regulation (GDPR) comes into force on May 25th, 2018. The GDPR changes the way that consent is sought and managed and it sets a high standard for consent. Consent means offering people genuine choice and control over how you use their data. When consent is used properly, it helps you build trust and enhance your reputation.

    The changes from the GDPR reflect a more dynamic idea of consent: consent as an organic, ongoing and actively managed choice, and not simply a one-off compliance box to tick and file away. This webinar will help you to decide when to rely on consent for processing and when to look at alternatives. It explains what counts as valid consent, and how to obtain and manage consent in a way that complies with the GDPR.

    About the Speaker:
    Kristy Gouldsmith, CIPP/E, LLB, LLM, PGCE, BA, is a senior data protection GDPR consultant and the managing director of Sapphire Consulting Group, a leading UK data protection consultancy. Sapphire Consulting Group provide GDPR services such as audits, policies, data sharing agreements and training. Kristy is also the Data Protection Officer for a number of organisations including a multi-national software-as- a-service company, a large London-based serviced-office company and several firms of solicitors.
  • The Death of the B2B Salesperson
    The Death of the B2B Salesperson Mike Wilkinson – MD of Advance May 22 2018 10:00 am UTC 60 mins
    In this webinar, Mike reflects on Forrester’s forecast that 1 million US B2B salespeople will lose their jobs by the year 2020 and how disruptive technology is changing the game. Do you have the right sales model and skills to adapt? He will discuss what customers are demanding, plus the skills and behaviours required for B2B sales professionals to thrive.
  • The SIEM That Gives SIEM a Good Name
    The SIEM That Gives SIEM a Good Name Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Avi Chesla, CTO and Founder, empow May 22 2018 11:00 am UTC 60 mins
    In their attempt to defend against the increasing volume of advanced attack campaigns, organisations are buying more and more security solutions, unwittingly creating a complex and cumbersome cybersecurity architecture.
    SIEM systems were supposed to be the industry’s solution to this problem, but they have failed miserably. Today’s SIEM systems create more problems than they solve, are very expensive, and ultimately ineffective.

    This webcast led by Avi Chesla, empow founder and CTO, will review the evolution of SIEM technology over the years, the fundamental flaws in its design, and why it has failed. He will then dive into the technology behind next-generation SIEM, and the major role played by AI in it, so that InfoSec teams can cut through the noise in the cybersecurity arena and effectively evaluate the next wave of solutions: SIEM that finally works for you, instead of the other way around.
  • Travel & Expense: Ein integrierter Ansatz
    Travel & Expense: Ein integrierter Ansatz SAP Concur Expert May 22 2018 1:00 pm UTC 45 mins
    - Lernen Sie, wie einfach es ist, eine Geschäftsreise mit SAP Concur zu buchen

    - Wie Sie als Manager einen unmittelbaren Überblick über die Buchungen Ihrer Mitarbeiter haben und nachvollziehen können, ob sie die Reiserichtlinien befolgen

    - Wie Ihre Geschäftsreisenden Reisekosten mit ExpenseIt mühelos erfassen und automatisch richtig aufschlüsseln
  • Applying Innovative Tools for GDPR Success
    Applying Innovative Tools for GDPR Success ForgeRock's Eve Maler, Nick Caley and Carlos Scott May 22 2018 1:00 pm UTC 60 mins
    The GDPR's enforcement date is finally around the corner: May 25th. Have you successfully conceived of this groundbreaking EU regulation as a business opportunity? Have you addressed the challenges of both compliance and customer trust in a more comprehensive fashion? In this webcast, ForgeRock experts Nick Caley, VP of Financial and Regulatory, and Eve Maler, VP of Innovation and Emerging Technology, and Carlos Scott, Digital Risk Consultant will:

    - Discuss the GDPR in the context of regulatory compliance, digital innovation, and "ripped from the headlines" tensions in consumer trust and the personal data economy

    - Describe important privacy, consent, and trust innovations made in recent times, including in the standards world (OAuth, UMA, and more)

    - Demonstrate capabilities of the ForgeRock Identity Platform that address GDPR requirements, including a Profile and Privacy Management dashboard

    As the band aptly named Europe said:

    We're leaving together
    But still it's farewell
    And maybe we'll come back
    To earth, who can tell?
    I guess there is no one to blame
    We're leaving ground
    Will things ever be the same again?
    It's the final countdown
  • Understand the Performance of Customer Facing Applications
    Understand the Performance of Customer Facing Applications Heather Abbott, SVP of Corporate Solutions, Nasdaq Barry Russell, GM, AWS Marketplace May 22 2018 1:00 pm UTC 45 mins
    Come learn how NASDAQ used AWS Marketplace to purchase and launch AppDynamics unified Application Performance Management (APM) and business performance monitoring solution for their migration to AWS.


    With AppDynamics, NASDAQ was able to move their critical applications to AWS and used AppDynamics to accelerate, visualize and validate the migration process. This allowed NASDAQ to improve their applications in AWS with business performance monitoring and make clear, understandable correlations between the quality of their customer experience with their applications.
  • Securing the banking industry: Detecting threats and mitigating cyberattacks
    Securing the banking industry: Detecting threats and mitigating cyberattacks Amardeep Sachdev, LogRhythm & Tony Masse, LogRhythm May 22 2018 1:00 pm UTC 60 mins
    The banking industry is a lucrative target for cybercriminals and the increase in attacks is a huge concern for CISOs in the industry. Threats are evolving, getting more sophisticated and insider threats are increasing. In particular, payment fraud is key concern for the industry and pressure is mounting on security teams to avoid breaches as well as complying with more and more regulations and frameworks.

    With attackers more determined and sophisticated, we must be able to detect anomalous activity, such as fraud, quickly to reduce the risk of suffering a damaging consequence/breach. This is especially true within the SWIFT environment and its security controls framework aims to establish a security baseline for the SWIFT community to help maintain a secure environment for all its users.

    In this presentation, LogRhythm experts will focus on specific security controls from the framework and outline how SIEM and UEBA can be used to detect anomalous activity in a user’s local environment and how it can be stopped with the right response and mitigation approach. We will also outline how to automate compliance and other processes to help free up time to focus on real, higher risk alerts.

    Join this session to:
    •Understand what a typical cyberattack on a user’s local environment would look like with a real use case.
    •Discover how the SWIFT security controls can be supported by SIEM solutions.
    •How compliance automation can enable your organisation to meet regulatory and compliance demands efficiently.
  • GDPR: Identifying and Responding to a Data Breach
    GDPR: Identifying and Responding to a Data Breach Duncan Brown IDC, Ilias Chantzos, Sunil Choudrie and Giampiero Nanni,Symantec May 22 2018 1:00 pm UTC 60 mins
    With GDPR coming, businesses are endeavouring to change how they collect and use personal data with more accountable and compliant processes. However, the GDPR’s data breach notification requirements continue to present a challenge for many.

    Join Duncan Brown, IDC and Ilias Chantzos, Senior Director, Global CIP and Privacy Advisor, Symantec and panel hosts to discuss

    •Findings from the current IDC GDPR Assessment
    •Gain practical advice on GDPR breach notification rules
    •Guidance issued from European Data Protection Authorities
    •Data transfers and how a breach can affect multiple locations and jurisdictions.
  • The Future of GDPR: Compliance beyond Deadline Day
    The Future of GDPR: Compliance beyond Deadline Day Brian Rutledge (Spanning) | Kalani Enos (FARO Technologies) | Heather Stratford (Stronger.tech) May 22 2018 3:00 pm UTC 60 mins
    May 25th 2018 is the deadline day for achieving General Data Protection Regulation (GDPR) compliance. It is also only the beginning of GDPR.

    Discover what GDPR means for your organization, how it affects US businesses and why it's important to be GDPR compliant.

    Join this interactive Q&A panel discussion with industry experts to learn more about:
    - The intersection of GDPR, privacy and cybersecurity
    - How GDPR affects data governance, breach disclosures and overall data protection
    - Recommendations for improving your organization's cyber resilience

    Speakers:
    - Brian Rutledge, Principal Security Engineer at Spanning
    - Kalani Enos, IT Security Manager, FARO Technologies
    - Heather Stratford, CEO of Stronger.tech
  • DFLabs IncMan SOAR Platform Overview
    DFLabs IncMan SOAR Platform Overview Mike Fowler, Vice President of Professional Services at DFLabs and John Moran, Senior Product Manager at DFLabs May 22 2018 3:00 pm UTC 45 mins
    Learn how DFLabs IncMan Security Orchestration, Automation and Response (SOAR) platform can help to automate, orchestrate and measure your security operations and incident response processes and tasks.

    Join this webinar and take a look at the latest version of IncMan SOAR, including a range of new features and integrations, and discover how we can help you to leverage your existing technologies and streamline your workflows.

    Keep your cyber incidents under control by orchestrating the full incident response and investigation lifecycle, automate actions, fuse security intelligence and share knowledge with machine learning:

    - Minimize Incident Resolution Time by 90%
    - Maximize Analyst Efficiency by 80%
    - Increase the Amount of Handled Incidents by 300%
  • [Panel] The New Business Models & Technologies that Drive Family Offices
    [Panel] The New Business Models & Technologies that Drive Family Offices Marc DePaul, Stephen Wall, Michael L. Kalscheur May 22 2018 3:00 pm UTC 60 mins
    While Family Offices do rely extensively on the human touch to create and nurture relationships, technology can enable humans to do jobs that need to be done but still low-value.

    Indeed, this is becoming a selling point, but how can you know what tech is worth it vs. what tech is just fun to say you have?

    Further, what new business models exist that are driving value for clients?

    This webinar will explore;
    * Future tech that will enable increased output: BlockChain, AI & Automation
    * Non-office technology that enables human connection: health & travel hacks
    * What the best Family Offices are using to service their clients
    * How to identify where you can be more efficient in your operations

    You'll leave this webinar with an understanding of what technology exists to streamline operations, cut your work in half, and make you physically able to work more effectively, and what new business models exist.

    Panellists
    Marc A. DePaul, J Jack Family Office
    Michael L. Kalscheur, CFP®, Senior Financial Consultant, Castle Wealth Advisors, LLC

    Moderator
    Stephen Wall, The Wealth Mosaic
  • The GDPR World Is Upon Us!
    The GDPR World Is Upon Us! Shawn Ryan, Senior Product Marketing Manager, Imperva, and Timothy Yim, Senior Regulatory Counsel, Imperva May 22 2018 4:00 pm UTC 45 mins
    With the deadline for General Data Protection Regulation (GDPR) compliance all but here, those companies that have taken the necessary steps are wondering “what’s next?”, while those lagging behind must quickly mobilize to eliminate gaps and mitigate the risks associated with failure to comply.

    This webinar will provide you with:

    - A refresh of the GDPR requirements and risks associated with the failure to comply.
    - An overview of the key actions and requirements for organizations that are already at, or near compliance, and those that are still ramping their compliance efforts.
    - A deep dive into how your data security program can facilitate GDPR compliance and the various solutions available to support organizational readiness efforts.

    About the presenters:

    Shawn Ryan, MBA is a Senior Product Marketing Manager within the data security team at Imperva, a cybersecurity company with leading data and application security solutions protecting business-critical information in hybrid environments. In developing and executing marketing strategies and content that support the company’s data security portfolio, and enabling various stakeholders and partners, Shawn keeps a close eye on global privacy and regulatory changes, and ever-evolving customer needs.

    Timothy Yim, CIPP/US/E, CIPT, CIPM, FIP, is Senior Regulatory Counsel at Imperva, a cybersecurity company with leading data and application security solutions protecting business-critical information in hybrid environments. He leads Imperva’s global data privacy program and other compliance initiatives. Timothy speaks frequently on data privacy at conferences and events, and is often quoted on current privacy events by the media.
  • 15 Failure Points in Kubernetes and How to Monitor Them
    15 Failure Points in Kubernetes and How to Monitor Them Jorge Salamero Sanz May 22 2018 5:00 pm UTC 30 mins
    There is a lot of discussion nowadays on how to use containers in production - are you there already?

    When operating a production platform we should prepare for failure and in addition to monitoring working metrics, we cannot forget about the most common failure points. From an agnostic monitoring solution perspective, and following a use-case driven approach, we will learn the most common failure points in a Kubernetes infrastructure and how to detect them (metrics, events, checks, etc).
  • Solving Mobile Security: Peer-tested Strategies That Work
    Solving Mobile Security: Peer-tested Strategies That Work Brian Duckering,Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC May 22 2018 5:00 pm UTC 60 mins
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?

    - What is your advice to your peers who are starting their mobile security journey?

    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • GDPR: Protecting Your Data
    GDPR: Protecting Your Data Ulf Mattsson, Martyn Hope, Mark Rasch, David Morris May 22 2018 5:00 pm UTC 90 mins
    Find out why data protection and encryption is an essential component of preparing for your GDPR readiness process.

    Specifically, we will cover:

    What is considered "Personal Data" and why it needs to be "protected"

    The Legal Aspects of Data Protection under GDPR.

    The technical ways to protect/pseudonymization

    In this Session you will learn from the leading experts:
    - Ulf Mattsson: The father of database Encryption.
    - Martyn Hope: The Co-Founder of the GDPR Institut.
    - Mark Rasch: Former Chief Cybersecurity Evangelist at Verizon and led the DOJ's Cyber Crime Unit.
  • Security in the Age of Hybrid Cloud
    Security in the Age of Hybrid Cloud Ajay Uggirala and Marty Jost — Product Marketing, Imperva May 22 2018 5:00 pm UTC 60 mins
    The advantages offered by a cloud-based environment make it an easy decision for most companies to have apps and data both on-premises and in the cloud. Still, there are numerous critical choices to be made that can transform the complexities of the migration process into a relatively smooth transition—especially regarding application and data security. In this session we will define hybrid cloud and talk about best practices to secure your company application and data assets as you start managing across both cloud and traditional IT environments.
  • 12 Practical Steps toward GDPR Compliance
    12 Practical Steps toward GDPR Compliance James R. Slaby, Senior Manager, Product Marketing May 22 2018 6:00 pm UTC 45 mins
    With the effective date of GDPR only weeks away, many businesses are correctly concerned about their readiness to comply with its stricter standards for protecting the personal data of EU residents. This 30-minute webinar offers practical steps that your business or public-sector organization can take today to improve your GDPR compliance posture, with tips on how to:

    •Understand GDPR terminology and roles
    •Assess your inventory of personal data, its locations and movements
    •Honor your new obligations to users on handling their personal data
    •Deal with heightened regulatory scrutiny on data breaches
    •Reinforce your data storage, backup and security policies and infrastructure to support your GDPR compliance efforts


    The complexity and occasional ambiguity of GDPR regulations can freeze some IT organizations into inaction. But neither your management nor your customers will wait forever for evidence of your progress toward GDPR compliance. Learn how to get out of the starting gate with these pragmatic, actionable tactics.


    About the speaker:

    James R. Slaby works in product marketing at Acronis, where his focus includes security-oriented issues like ransomware and GDPR. Before Acronis, Slaby was an industry analyst covering IT security, cloud computing, and networking at Forrester Research, HfS Research, Yankee Group, and The Info Pro. With over 300 published IT research reports, he has been quoted in The Economist, Wall Street Journal, New York Times, and countless tech publications. Slaby has also held campaign, solutions, vertical and product marketing roles at a variety of tech vendors including Sonus, Acme Packet, Bay Networks and Motorola.
  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service
    Analyst Insights: Trends Driving the Need for a SOC-as-a-Service Mark Bouchard, Co-Founder and COO - CyberEdge Group & Narayan Makaram, Sr. Director, Product Marketing - Arctic Wolf Networks May 22 2018 6:00 pm UTC 60 mins
    Every company, regardless of size or industry, needs the advanced security capabilities provided by a security operations center (SOC). Until recently, only large enterprises had the means and resources to implement these essential technologies. So, where does that leave small to midsize enterprises (SMEs)?

    In this upcoming webinar, Tuesday, May 22, at 11am PT/2 pm ET, Co-founder and COO of CyberEdge Group, Mark Bouchard, will share insights on the cybersecurity challenges facing small to midsize enterprises (SMEs), drawing on data from the recently published 2018 Cyberthreat Defense Report. We will also hear from Sr. Director of Product Marketing of Arctic Wolf Networks, Narayan Makaram, on the SOC options available to SMEs and will help to identify the top 10 capabilities to look for in a SOC-as-a-service.

    By attending this webinar you will learn about:

    • Cybersecurity challenges facing the IT organization in small to midsize enterprises (SMEs)
    • Insights into what is driving the need for managed threat detection and response
    • The top 10 essential elements of a SOC-as-a-Service

    To discover how SMEs can get access to a SOC in the form of a SOC-as-a-service, register today!

    About our key speaker:

    Mark Bouchard, CISSP, is the Chief Operating Officer at CyberEdge Group, an award-winning research, marketing and publishing firm serving the needs of high-tech organizations worldwide. Before CyberEdge, Mark founded AimPoint Group, an independent IT research and consulting company specializing in information security. Prior to AimPoint Group, Mark was a Vice President at META Group (acquired by Gartner) where he helped hundreds of organizations worldwide address their IT challenges. A veteran of the U.S. Navy, Mark is passionate about ensuring the success of his clients.
  • Simplifying Data Access & Management for GDPR Compliance
    Simplifying Data Access & Management for GDPR Compliance Nathan Rowe, CPO & Co-Founder Evident May 22 2018 7:00 pm UTC 45 mins
    D-Day is right around the corner. By now, most companies are nearly completed with putting the necessary steps in place to meet the requirements. However, it is suspected that many companies will end up spending significantly more money per year meeting these regulations. Also, it is most likely that most of these changes have added more complexity to their business operations.

    Yet, it doesn’t have to be this way. This webinar will highlight the 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted. It will then breakdown methods to optimize the processes and technology used to address these requirements in a way that will significantly lower the effort and cost of your company’s operations.

    Join us to discuss:
    - How to assess the level of exposure your company has to this regulation
    - Recognizing the 10 key new data management requirements that have been put in place
    - Identifying processes and tools that will significantly reduce the effort required to meet regulations
  • GDPR - Let’s talk legal, the implications of GDPR and your data
    GDPR - Let’s talk legal, the implications of GDPR and your data Nick Pollard, Head of Region, Southern & Eastern Europe, Emerging Markets at Nuix and Gareth Atkinson, StartRiskLab May 22 2018 7:00 pm UTC 45 mins
    Organisations are still worried that they may still be open to GDPR legal issues and legal interpretation. Join our speakers Nick Pollard, Nuix and Gareth Atkinson, StartRiskLab who will explore where you should be right now with your GDPR preparations.

    In this webinar, you will learn:

    1. How to cross-reference your preparations
    2. Understand the legal position on various GDPR schedules
  • GDPR - Is Data Still the New Currency?
    GDPR - Is Data Still the New Currency? Primitive Logic CEO Jill Reber & President Kevin Moos May 22 2018 9:00 pm UTC 60 mins
    Getting your company ready for GDPR isn’t about putting a few new processes in place — it’s about rethinking your entire approach to personal data, including how to get value from it. For decades, companies have collected and stored all kinds of personal information “just in case” they ever needed it.

    GDPR requires a different approach. You need to be proactive in thinking about how to get value from your data, and you need to understand exactly what your company is doing with personal data and why.

    Join Jill Reber and Kevin Moos of Primitive Logic to learn:
    - How to work with third parties who process personal data on your behalf
    - How preparing for GDPR helps you understand your data on a whole new level (and why that’s a good thing)
  • Hunting Rogue Elements: Fighting the Insider Threat
    Hunting Rogue Elements: Fighting the Insider Threat Kevin Eley, LogRhythm & Jonathan Zulberg, LogRhythm May 23 2018 12:00 am UTC 45 mins
    Customer data falling into the hands of cybercriminals. It’s the stuff of nightmares for any organisation. Today the insider threat has the potential to pose a bigger risk to cybersecurity than external hackers.

    In this webinar, LogRhythm experts will take you through a real use case in which data worth millions of pounds was stolen. And they will explain how the incident could have been stopped with the right response and mitigation approach.

    Join the webinar to:

    • Learn how cybercrime has evolved so much that insider threats now rival external threats
    • See a live display of activity generated by an insider threat
    • Discover cybersecurity innovations that can detect and respond to insider threats in real time

    Join us to get a better understanding of the insider threat – and how to combat rogue elements in your organisation.
  • Der Stichtag. Die DS-GVO Umsetzung fängt jetzt erst richtig an.
    Der Stichtag. Die DS-GVO Umsetzung fängt jetzt erst richtig an. Alexander Peters May 23 2018 9:00 am UTC 60 mins
    Die DSGVO ist da! Wenn Sie jetzt nicht vorbereitet sind, kann Sie das teuer zu stehen kommen.

    Am 25. Mai endet der Countdown für die DSGVO-Umsetzung. Ab dann gelten neue gesetzliche Bestimmungen zum Schutz sensibler Kundendaten – und zwar für alle Unternehmen, die personenbezogene Daten von EU-Bürgern verarbeiten, speichern oder weitergeben, unabhängig davon, ob ihr Sitz in oder außerhalb der EU liegt. Die DSGVO definiert strenge Regeln für den Umgang mit kritischen Daten, und es ist alles andere als einfach, Compliance sicherzustellen. Hinzu kommt, dass die Bestimmungen sofort in Kraft treten – und bei Verstößen hohe Bußgelder drohen.

    Sprechen Sie mit den Symantec-Experten!
    •Erfahren Sie, was die DSGVO für Sie bedeutet – und was Sie bei einem Angriff tun müssen
    •Wir helfen Ihnen, Risiken richtig einzuschätzen, und geben Ihnen Tipps für die Zeit nach der Einführung.
    •Was kommt noch auf Sie zu? Alles über die anstehenden gesetzlichen Neuerungen
    •Bleiben Sie durchgehend auf dem Laufenden