Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • webMethods 10.7: Something big is coming—get a sneak peek
    webMethods 10.7: Something big is coming—get a sneak peek
    Subhash Ramachandran, SVP, Product Management, Software AG Recorded: Nov 27 2020 56 mins
    We are excited to announce the launch of webMethods 10.7. In this webinar we will give you a sneak peek into its new capabilities. Please join Subhash Ramachandran, SVP of Product Management, who will present several exciting highlights including:
    - A brand new look for the Integration Server administration and monitoring console
    - AppMesh (leveraging API Gateway & Microgateway) for simplifying service mesh implementations
    - Cross-version support and zero downtime fixes for Universal Messaging
    - B2B and EDI migrations to webMethods.io B2B using Cloud Container
    - Ease of use for Installs and Upgrades

    We will also showcase the evolution of the cloud-based webMethods.io platform including highlights from all of the Integration, B2B and API Management SaaS releases in 2020, including:
    - Multi-cloud & Multi-region availability
    - Multi-persona user experience and smart mapping in webMethods.io Integration
    - Self service trading partner on-boarding in webMethods.io B2B
    - Geo based routing & Zero downtime upgrades for webMethods.io API
    - End-to-end hybrid monitoring across cloud and on-premises
    - New Connectors & Recipes
  • Data Breach – Tools and tips for managing a cyber attack
    Data Breach – Tools and tips for managing a cyber attack
    Paul Benedek, Consultant Director, Excis Networks Ltd and Bernadette Tyson, Consultant Director, Excis Networks Ltd Recorded: Nov 26 2020 45 mins
    Every day we see news of cyber-attacks. We get the impression that they may only be affecting
    larger companies, but this is far from the truth. In fact, the statistics clearly show that smaller
    companies are also being targeted. Cyber-attacks are not diminishing, and sadly whatever the size of
    your company, you are a target in today’s connected world. But despite this, many businesses are
    not prepared, technically or operationally to deal with the impact of cyber-attacks made against
    them.

    In this talk we look at the steps that all companies, small or large can take to mitigate and deal with
    cyber-attacks, as well as incident response and the human elements that feature in an attack. We
    also cover the key areas of cyber breach management and examine it from an attacker,
    organisational and customer perspective, revealing the impact not only your organisation but to
    others in your value chain.
  • Friction, Fraud, and Fintech: Delivering Speed and Security with Digital Trust &
    Friction, Fraud, and Fintech: Delivering Speed and Security with Digital Trust &
    Jim Payne and Adam Gibson Recorded: Nov 26 2020 42 mins
    Consumers and businesses rely on fintech services to manage capital with flexibility, transparency, and speed—but fraudsters are standing by to take advantage. So how do fintech services create quick and frictionless experiences for users without putting them at risk, or compromising growth? With a Digital Trust & Safety approach, you can reduce roadblocks, proactively stop fraud and grow your business.
  • 5 Reasons CISOs are Turning to Security-as-a-Service
    5 Reasons CISOs are Turning to Security-as-a-Service
    Jo Peterson, Clarify 360; Dan Bowden, Sentara Healthcare; Tyler Cohen Wood, Private Consultant; Mark Lynd, NETSYNC Recorded: Nov 26 2020 61 mins
    The global security as a service market size is expected to grow from USD 11.1 billion in 2020 to USD 26.4 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 18.9% during that time period. Driven by a cloud-based delivery model, options abound for organizations in areas such as application security, data security, identity and access management, infrastructure protection and integrated risk management to name a few. These options include off the shelf security as a service products as well as those provided and managed by an MSSP.

    In today’s session we’ll explore these 5 key points:
    1. Security budgets and priorities in a post Covid-19 world
    2. When to outsource
    3. Selecting an MSSP
    4. Tools, Tools and More Tools
    5. Upskilling your team
  • Cyber Threats in 2021: Real impact of COVID on Cyber Security
    Cyber Threats in 2021: Real impact of COVID on Cyber Security
    Himanshu Dubey, Director of Security Labs and Harshad Bhujbal, Technical Architect, Quick Heal Technologies Ltd. Recorded: Nov 26 2020 33 mins
    2020 has seen many Cyber Attacks using the COVID-19 pandemic as the central theme. For most
    part though these have been the same attacks that have existed since the last few years; just
    the packaging was changed.

    We expect the real cyber security repercussions of changes brought in by the COVID-19
    pandemic to be felt in 2021. In this talk we explore what the repercussions might be and what we
    can do to prepare and protect ourselves against them.

    We will cover:
    - Major Cyber Attack trends of 2020
    - What can be expected to continue in 2021
    - Potential repercussions of COVID-19 induced changes and new attack types in 2021
  • I've Been Hit By Ransomware: Now What?
    I've Been Hit By Ransomware: Now What?
    Mark D Rasch, Chief Legal Officer, Unit221B Recorded: Nov 26 2020 44 mins
    This session will focus on specific technical, legal and policy responses to ransomware attacks.

    Join to learn more about:
    * History of Ransomware
    * Most common forms of Ransomware
    * Costs of Ransomware and Mitigation
    * Ransomware Insurance
    * Ransomware prevention
    * Ransomware training and education
    * Legal Issues in Ransomware Payment (with October 2020 developments)
    * Ransomware mitigation
    * Threat intelligence and investigation in ransomware cases
    * Ransomware inoculation
    * Disaster recovery in ransomware
  • Managing secrets sprawl – 3 reasons why you need a root of trust
    Managing secrets sprawl – 3 reasons why you need a root of trust
    John Boero, Sr. Solutions Engineer, HashiCorp and Juan C. Asenjo, Ph.D., CISSP, nCipher Security Recorded: Nov 26 2020 58 mins
    As organizations migrate to the cloud to manage workloads in a more flexible and cost-effective manner, the number of passwords, PINs, keys, tokens, and other secrets used to access application platforms and data is increasing exponentially. Maintaining centralized repositories of secrets enables organizations to apply consistent protection policies that strengthen security and facilitate auditing and compliance.

    This webcast will look at the growing challenge faced when deploying centralized secrets management tools and how to mitigate risks associated with aggregation of sensitive assets. Our speakers will examine how cloud migration, DevOps, and regulatory compliance require a root of trust, and will describe best practices for deploying these solutions.

    Join the webcast and learn:
    • What challenges secrets sprawl represents for organizations
    • How centralized key management ensures consistent policy
    • Why cloud, DevOps, and regulations require a focus approach
    • Where is a root of trust required for high assurance security

    This webinar is for you if you are responsible for:
    1. Managing digital transformation and cloud migration
    2. Overseeing security best practices in your organization
    3. Auditing and ensuring your organizational compliance
  • The Secrets to Pole Position in F1 and Network Security
    The Secrets to Pole Position in F1 and Network Security
    Ollie Sheridan, Principal Security Solutions Engineer, CISSP, David Coulthard & Bob Constanduros Recorded: Nov 26 2020 64 mins
    Join F1 star David Coulthard, leading F1 sports commentator Bob Constanduros and Gigamon experts for a unique session on optimising Network Detection and Response (NDR) and other security tools with uncompromised network visibility. Provide your InfoSec and IT teams with the fuel to race towards a winning performance.

    Full visibility of internal mechanics and external surroundings is crucial for F1 drivers racing on circuits at break-neck speed. Protecting your IT infrastructure is no different. Without clear visibility of ALL relevant traffic, deploying NDRs or any other security tool is so resource-intensive and time-consuming, it can take InfoSec teams away from detecting and hunting threats.

    Learn more about network security optimisation, Gigamon solutions and hear how customers are optimising their NDR investment. The final lap will see David Coulthard taking live questions from the audience and being interviewed by Bob Constanduros who has covered over 670 Grand Prix’s and interviewed multiple F1 legends throughout his career.
  • CYA Toolkit for CISOs
    CYA Toolkit for CISOs
    Michael Brooks, vCISO, Abacode Inc Recorded: Nov 26 2020 45 mins
    Perhaps you are like the 200 CISOs who shared their insights in the security leaders report, which revealed that organizations are using 57 separate security tools with 27% claiming they’re running a staggering 76 or more security products.

    These tools aren’t necessarily making your organization less vulnerable. In fact, many organizations find that they’re often flying blind when it comes to security.

    Join this session to learn:
    • Valuable techniques to optimize your cyber spend and offer risk balanced, cost effective security solutions for your organization
    • Key insights into the decision-making process to gain better visibility and control over your assets, attack surface and cyber defense posture
    • How to clearly define the business requirements and control objectives that should be driving your solution options and purchasing decision that will drive the most attractive ROI for your business and stakeholders
  • Office365: Protecting the largest, most popular SaaS application
    Office365: Protecting the largest, most popular SaaS application
    David Lomax, Kenin Orritt, Phil Howe Recorded: Nov 26 2020 26 mins
    Microsoft continues to grow as the world’s most adopted SaaS application provider with over 258 million Office 365 and 75 million Teams users, according to the company’s third-quarter earnings call in 2020. As a result, it has become a rich repository for critical business data and a tantalizing target for cyberattackers.

    Join us on November 26th at 11am to learn how Cognito Detect for Office 365 detects how cybercriminals use account take over and legitimate Office 365 services to bypass security controls to execute attacks. We’ll share insights from our recently published research in the 2020 Spotlight Report for Office 365, which identifies the tools and services within the cloud-based application commonly being leveraged by attackers. By observing 4 million Office 365 accounts over a 90-day period, Vectra were able to identify suspicious high-risk behaviours associated with attacker techniques exploiting built-in Office 365 capabilities.


    Key learnings
    • David Lomax, Vectra, will be walking you through the impact of Office 365 on security, how important keeping a watchful eye on the misuse of user access across on premises networks and cloud instances

    • Kevin Orritt, ICT Security Manager at Greater Manchester Mental Health Foundation Trust will be discussing his own experience with the Office 365 integration as well as outlining the part he has played in shaping this solution with Vectra.


    There will be a chance at the end to get any of your questions answered so stay tuned.

    Register today to save your seat.
  • Navigating Through a Pandemic as a CISO, and Beyond
    Navigating Through a Pandemic as a CISO, and Beyond
    Fabrice Bru, RSSI, Administrateur du CESIN, Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint Recorded: Nov 26 2020 28 mins
    Cybercriminals continue to leverage uncertainty and fear to launch malicious campaigns with one aim in mind – to get your people to click. These attacks are targeted at people and require social engineering to succeed. What’s more, the disruption we are all facing today has forced us all to quickly adapt, move to a WFH environment and potentially exposing our users to increased attacks – from phishing to business email compromise attacks.

    While the cybercriminals remain busy in their pursuit of exploiting our employees, the CISOs role has been pushed to new limits. So how must CISOs and their security teams evolve to better protect your organisation this year?

    Join Fabrice BRU, CISO, Administrator of ‘Club des Experts de la Sécurité de l’Information et du Numérique’ (CESIN) and Loïc Guézo, Senior Director, Cybersecurity at Proofpoint as they share real life experiences on how this community of CISOs have joined together to update their security programmes to ensure we thrive in this digital-first world, despite the pandemic.
  • Financial Industry: Speed, stability & security
    Financial Industry: Speed, stability & security
    John Feeney Solutions Architect GitLab Recorded: Nov 26 2020 55 mins
    As the financial services sector comes under increased competitive pressure from new entrants to the market, and with the need for accelerated innovation and time-to-market, we explore the importance of agile working practices and software automation. From traditional on-premise applications to modern cloud-native workloads, we look at how GitLab can help companies ship more secure code faster.
  • Using SD-WAN to build a secure digital enterprise | Solve remote work challenges
    Using SD-WAN to build a secure digital enterprise | Solve remote work challenges
    Gemma Allen, Consulting Solutions Architect, Barracuda, Felix Bueltmann, Senior Consulting Engineer, Barracuda Recorded: Nov 26 2020 17 mins
    Using SD-WAN to build a secure digital enterprise: Episode 3

    Remote and mobile users increasingly require access to corporate information and applications. This can create numerous challenges that call for SD-WAN.

    Join us for to hear how the acceleration of remote work brought on by Covid-19 has changed how we should approach networking. See for yourself how you can leverage SD-WAN to solve these challenges, including:

    •How to include your remote workforce when designing your WAN
    •Why using the cloud makes this simple.


    Don’t miss this third webinar in a five-part series on SD-WAN to understand the different deployments and what might work for your organization.

    Save your spot right now.
  • [Panel] How Financial Institutions Can Achieve Network Security and Compliance
    [Panel] How Financial Institutions Can Achieve Network Security and Compliance
    Asher Benbenisty, Director of Product Marketing and Yitzy Tannenbaum, Product Marketing Manager (AlgoSec) Recorded: Nov 26 2020 22 mins
    Financial institutions have strict network security requirements, which sometimes hinder innovation and digital transformation. Security and regulatory requirements act as a barrier to innovation. However, financial institutions can enable business innovation, while still achieving network security and compliance.
    Watch AlgoSec’s panel discussion, as Asher Benbenisty, Director of Product Marketing, and Yitzy Tannenbaum, Product Marketing Manager, discuss how financial institutions can simplify the network security management, reduce risk and ensure continuous compliance.
    They will discuss:
    • How intelligent automation helps overcome security management intricacy
    • How to make sure network changes meet compliance requirements and pass regulatory audits the first time
    • Industry metrics so you can benchmark your own organization as well as see how the finance sector compares to other industries
    • Case studies from other financial institutions
  • How to Gain Visibility and Boost Security in Public Cloud Hosted Operations
    How to Gain Visibility and Boost Security in Public Cloud Hosted Operations
    John Gudmundson Head of Technical Product Marketing, Gigamon and Lee Carass Solution Architect, Trend Micro Recorded: Nov 26 2020 50 mins
    Public Clouds are on the ascent. To ensure comprehensive security with superior performance you need full packet and application visibility. As such environments are also very dynamic and complex, automation is critical to success.

    Today, to acquire and forward traffic to various security and monitoring tools you must laboriously install agents on each compute node for every tool or potentially utilise native traffic mirroring services. Neither of these approaches provide you the full control nor detailed insights into network flows.

    There is a better way. Learn how next-gen Network Packet Brokers collaborate with cloud orchestration tools to automatically provision virtual TAPs to obtain all traffic. Next, app flows are identified, optimally processed and distributed to security tools such as anti-malware from Trend Micro. Network efficiency rises, user security enhanced, and tool effectiveness improved.
  • Single Sign-On & Password Management – Managing Every Access Point
    Single Sign-On & Password Management – Managing Every Access Point
    Barry McMahon, International Product Marketing Manager, IAM and Seamus McLaughlin, Senior Solutions Consultant, LastPass Recorded: Nov 26 2020 31 mins
    Employees need streamlined, secure and simple access to their work, otherwise lose productivity. But more apps, devices, networks and users entering the workplace makes it increasingly complex for IT to simply manage and protect user access.

    Discuss in this replay of this session to learn how the new LastPass Enterprise provides control and security for every access point in the business. The discussion will include:

    - How SSO and password management work together to manage every access point
    - The LastPass journey to evolve from a password manager to a holistic access solution
    - A product deep dive into the new LastPass Enterprise, now including an SSO portal with over 1,200 integrations

    Speakers:
    Brian McMahon, International Product Marketing Manager, IAM
    Seamus McLaughlin, Senior Solutions Consultant, LastPass
  • Gérer l’impact d’une pandémie sur l’entreprise en qualité de RSSI - Français
    Gérer l’impact d’une pandémie sur l’entreprise en qualité de RSSI - Français
    Fabrice Bru, RSSI, Administrateur du CESIN, Loïc Guézo, Senior Director, Cybersecurity Strategy, Proofpoint Recorded: Nov 26 2020 35 mins
    Les cybercriminels continuent d'exploiter nos craintes et nos incertitudes au moyen de campagnes malveillantes dont l'unique objectif est de nous inciter à cliquer sur des liens dangereux pour notre sécurité.

    Ces attaques visent directement les personnes et recourent à des techniques d'ingénierie sociale. De plus, la situation exceptionnelle que nous vivons aujourd'hui nous oblige à nous adapter rapidement et à adopter massivement le télétravail, une transition qui expose nos utilisateurs à davantage d'attaques, du phishing au piratage de la messagerie en entreprise (BEC, Business Email Compromise).

    Et tandis que les cybercriminels continuent de prendre pour cible nos collaborateurs, le rôle des RSSI évolue de façon inédite. Comment les RSSI et les équipes de sécurité peuvent-ils s'adapter pour mieux protéger l'entreprise en cette année difficile ?

    Fabrice Bru, RSSI, Administrateur du Club des Experts de la Sécurité de l'Information et du Numérique (CESIN), et Loïc Guézo, Senior Director, Cybersecurity Strategy de Proofpoint, font le point avec vous lors d'une intervention Live Talk de 30 minutes.

    Au programme :

    L'impact de la pandémie et l'évolution des campagnes de phishing exploitant le thème du COVID-19
    Partage de l'expérience d'un groupe de RSSI qui ont collaboré pour adapter leurs programmes de sécurité afin de garantir une utilisation sûre et productive de l'environnement numérique, malgré la pandémie
  • Key Strategies to Reduce your Attack Surface in 2021
    Key Strategies to Reduce your Attack Surface in 2021
    Sushila Nair, VP Security Services, Chief Digital Office and Brandon Swain, NTT DATA Recorded: Nov 26 2020 50 mins
    The year 2020 has accelerated organizations' digital transformations, particularly cloud migrations and the development of remote work capabilities. This rapid change has drastically altered the way that we work and consume data--creating exciting new paradigms, but also bringing new risks along with it. This session will analyze the security breaches that have occurred so far in 2020, and will discuss what defenses would have been vital for the prevention of these attacks. We’ll examine which security projects should be the “tip of the spear” in 2021 to help you reduce your attack surface, as well as look to the future to predict how the attack landscape may continue to change.

    Sushila Nair is on the board of the GWDC, the Greater Washington, D.C. Chapter of ISACA and plays an active role in supporting best practices and skills development within the cybersecurity community.

    Sushila has worked as a Chief Information Security Officer for ten years and has twenty years’ experience in computing infrastructure, business and security. Sushila has consulted in many diverse areas including telecommunications, risk analysis, credit card fraud, and has served as a legal expert witness. She has worked with the insurance industry in Europe and America on methods of underwriting e-risk insurance based on ISO27001.

    She has published numerous articles in the computing press on risk and security, and has spoken at Segurinfo, CACS, TechMentor, FinSec and many other global technical events on diverse subjects ranging from managing risk to designing security baselines.
  • The Importance of SOAR in the Finance Services Industry
    The Importance of SOAR in the Finance Services Industry
    Andrea Fumagalli, VP of Engineering at DFLabs, and Enrico Benzoni, Marketing and Technology Alliances Director at DFLabs Recorded: Nov 26 2020 46 mins
    The financial services sector has always been and is likely to remain a high-risk target for cyber security attacks. Banks and other financial services institutions must leverage the latest incident response technologies, tools, and tactics in order to respond to these cyber threats in the most efficient manner.

    There is no denying that this industry is highly targeted due to the monetary value and volume of information it holds. Industry regulations, such as the Gramm Leach Bliley Act (GLBA), impose strict guidelines on handling potential security incidents in the financial services sector.

    DFLabs’ Patented SOAR Technology provides financial services organizations with a solution that enables incident response processes and workflows to be documented and standardized to meet industry-specific regulations while tracking and responding to every security alert in a timely and effective manner.

    Join our new webinar to learn about DFLabs’ IncMan SOAR benefits, which are specific to the needs for banking and financial services.

    Key benefits:

    - Standardized and documented workflow processes according to the industry standard regulations
    - Alerts can be triaged before being turned into full incidents to determine whether the alert is a genuine threat or a false positive
    - Deduplication feature which allows incidents with similar characteristics to be merged together
    - Progressive automation, providing ML-enabled checklist and workflow-based automation
    - Open Integration Framework, allowing clients to create an integration with little coding experience required
  • Школа правильного Backup’а Commvault – Лекция 7
    Школа правильного Backup’а Commvault – Лекция 7
    Дмитрий Иванюк, эксперт по решениям Commvault Recorded: Nov 26 2020 49 mins
    Приглашаем принять участие в седьмом вебинаре серии «Школы правильного Backup’a Commvault». Тема предстоящей лекции: «Storage policy&plan. Часть 2».
    В программе:
    • Создание политики хранения для аварийного восстановления
    • Процедуры, настройка, отчеты
    • Q&A
  • [APAC] A CISOs guide to Security Planning
    [APAC] A CISOs guide to Security Planning
    Jeffrey Gardner, Detection and Response Practice Advisor Recorded: Nov 26 2020 29 mins
    The Cybersecurity industry's resource gap has been well documented over the years, but in 2020 we've seen that gap widen. The attack surface has grown with remote workforces and a slew of new applications, but in many cases budgets are tightening and teams are wearing many hats.

    However getting buy-in from leadership can pose additional challenges for your team as you try to get final budget approval to move these important projects forward.

    To help, we asked former Information Security Officer, turned Rapid7 Detection and Response Practice Advisor, Jeffrey Gardner to share how he found success in his previous roles.

    Tune in to learn how to:
    -Build a compelling case
    -Present with confidence (and evidence)
    -Ultimately secure your budget
  • Increase Cyber Resilience with Zero Trust
    Increase Cyber Resilience with Zero Trust
    Simon Howe, Jinan Budge, Ashwin Pal, Jason Duerden Recorded: Nov 26 2020 61 mins
    Cyber attacks are exploding. This year, as of Q3 2020, 16 billion records have been exposed. This represents a 273% increase compared to the first half of 2019*.

    LogRhythm, joined by Forrester Principal Analyst serving Security & Risk Professionals Jinan Budge, Unisys, and Blackberry Cylance, discuss how you can effectively achieve true cyber resilience.

    Key Takeaways:
    1. What is Zero Trust and its alignment to the NIST-CSF
    2. How to detect, respond and mitigate common attacks (e.g. phishing) using a Zero Trust model
    3. How an organization can embark on a successful Zero Trust journey and avoid common pitfalls.



    * Source: Security Boulevard - https://securityboulevard.com/2020/08/5-biggest-data-breaches-of-2020-so-far
  • Beware of Holiday Phishing Scams - APAC, APJ
    Beware of Holiday Phishing Scams - APAC, APJ
    Andrew Warren-Nicholls, Cyber Security Specialist, APJ Recorded: Nov 26 2020 29 mins
    The holidays can be a threat to businesses and consumers alike. Fake offers and notices flood corporate and personal emails, mobile devices and social sites. Cybercriminals know people are distracted and cloak their intent as legitimate holiday commerce. The time is now to remind your users that extra caution and diligence is needed!

    Join Andrew Warren-Nicholls as he sets out the best practices for better protecting your end users as the holidays approach. In this session, he'll cover:

    - What methods and techniques do scammers use during the holiday season
    - Examples of scams and phishing emails cybercriminals will be deploying this holiday season
    - Steps and resources you can leverage during the holiday season to keep your end users safe

    Specific focus on Asia-Pacific Region
  • Thrive in the Era of Remote Work
    Thrive in the Era of Remote Work
    Kari Nelson, Director Product Marketing Cherwell & Phil Bowermaster Principal Product Marketing Manager Cherwell Recorded: Nov 25 2020 44 mins
    The largest ever remote work experiment is revealing the opportunities available for organizations that can provide the technological and practical supports required for remote workers. Discover how to ensure that your organization is resilient, and enables productivity and efficiency.
  • Maximizing Document Production Efficiency Using Renumbering in Nuix Discover
    Maximizing Document Production Efficiency Using Renumbering in Nuix Discover
    Wil Huging & Enzo Lisciotto Recorded: Nov 25 2020 61 mins
    Learn how to maximize the flexibility and reduce costs in your eDiscovery workflows in Nuix Discover. Nuix Customer Success Manager Wil Huging will demonstrate how to use renumbering and document production specifically for the Australian market.

    Many of our Nuix Discover clients across Australia have commented on the ease and speed with which they can apply the Australian numbering format across their cases. In this session, we’ll focus on best practices enabling our clients to build efficiency into their eDiscovery programs.

    Join us to learn:

    - How to utilize the map view for QC before document production
    - Best practices for achieving protocol-compliant exports and productions
    - Load file customization
    - Tricks to take the mystery out of exporting data.
  • AS SIMPLE AS A TO E:  AN ENTERPRISE APPROACH TO DATA QUALITY IMPROVEMENT
    AS SIMPLE AS A TO E: AN ENTERPRISE APPROACH TO DATA QUALITY IMPROVEMENT
    Nigel Turner, Mark Humphries Nov 27 2020 12:15 pm UTC 45 mins
    Data quality remains a daunting challenge as poor data quality is sadly still the norm in many companies and organisations. This webinar explores why data quality is so hard to get right and outlines an effective approach to identifying, prioritising and tackling data quality problems. The approach also applies some of the artefacts of systems thinking to help demonstrate the multi-dimensionality of data quality and the need for holistic solutions.
  • The Science of Cybersecurity: Best Practices for Business in Asia Pacific
    The Science of Cybersecurity: Best Practices for Business in Asia Pacific
    Theresa Lanowitz Director, AT&T Cybersecurity Phil Quade CISO, Fortinet Nov 27 2020 5:00 pm UTC 60 mins
    As organizations across Asia Pacific continue to adapt to large-scale WFH policies, CISOs and cybersecurity leaders must work in parallel to address new and heightened cyber risks to meet evolving business demands. Adjusting to how you help to protect employees, critical data, and intellectual property requires a new way of thinking.

    Join us for a fireside chat with Phil Quade, the CISO of Fortinet and the author of “The Digital Big Bang: The Hard Stuff, The Soft Stuff, And The Future of Cybersecurity.” We will discuss best practices organizations can put in place to quickly, efficiently, and effectively help protect workers at all locations, critical data, and intellectual property as part of a business continuity plan - now and in the future. We’ll discuss:

    What we’ve learned about enhancing cyber defenses for the “new normal” business expectations
    Why training your employees for cybersecurity resiliency is critical for your business
    Best practices to help protect your network and remote workers against threats
    How to be prepared and plan for what’s next
  • Managing Data Transfers After the EU-U.S. Privacy Shield Invalidation
    Managing Data Transfers After the EU-U.S. Privacy Shield Invalidation
    Debbie Reynolds, Founder, CEO & Chief Data Privacy Officer, Debbie Reynolds Consulting LLC Nov 27 2020 8:00 pm UTC 64 mins
    Join us for a pre-recorded web conference where we discuss the EU-U.S. Privacy Shield Framework, and the impact of its invalidation on business in the U.S. and worldwide, specifically its impact on Standard Contract Clauses (SCCs), and what companies can do now to navigate this new world of data transfers.

    The invalidation of the EU-U.S. Privacy Shield Framework created a ripple effect throughout the world related the movement of data from the European Union to the United States. Because of the “Schrems II” decision of the Court of Justice of the European Union in July of 2020, more than 5,300 U.S. companies that used the EU-U.S. Privacy Shield Framework as the legal basis for trans-Atlantic data transfers have scrambled to find alternate legal means to continue these data transfers or other avenues of doing business with EU data. Besides the invalidation of this framework, the CJEU also pressed companies to strengthen their agreements, including standard contractual clauses to consider the surveillance laws in the country of data processing, and the ability of data processors to protect data.
  • SSCPオンラインチャレンジセミナー
    SSCPオンラインチャレンジセミナー
    安田良明, CISSP, SSCP, (ISC)² 認定講師; 小熊慶一郎, CISSP, (ISC)² Director of Business Development, Japan Nov 30 2020 7:00 am UTC 120 mins
    経営陣が情報セキュリティやリスクマネジメントの取り組みを推進してはいるものの、期待するほど情報セキュリティが向上していない声をよく耳にします。その理由の1つとして経営陣は情報セキュリティの課題を解決するために必要となる現場を把握する仕組みづくりにうまくいっていないことが挙げられます。

    経営陣が情報セキュリティの活動を宣言したとしても現場の実務者が経営陣が期待する活動を行わない限り情報セキュリティは向上していきません。しかし、現場の実務を支える実務者の育成は耳ざわりがよい知識と技術を身に着ければよいというわけではなく、「組織」という観点を理解し、情報セキュリティ専門家や経営陣とコミュニケーションを図れる人材でなければなりません。そのため、IT全体にわたる知識とスキルがあり、ネットワークやシステムの開発・運用などに従事する人に必要な知識に加え、確実なセキュリティ対策を実装・維持できる技術的な観点だけではなく「組織」という観点から情報セキュリティを理解している必要があります。

    SSCPの7ドメインは、情報セキュリティの運用から基本的な情報セキュリティの実務に必要な知識を取り扱い、情報セキュリティを専業としていない実務経験年数が少ない方にとっても、より実践に近い内容をグローバルの標準に則って理解することが期待できます。今回のオンラインセミナーでは、「現場の情報セキュリティ担当者に必要な情報セキュリティの知識と考え方」として、IT全般のエンジニアやサポート技術者、アナリスト担当者が知っておくべき情報セキュリティの知識をわかりやすくお教えします。

    SSCPを受験させてみたいけど、どのような内容になっているのかわからないというユーザー企業の管理職の皆さんにも理解しやすい内容で提供させていただきます。

    システム開発や情報システム担当者の皆さんにも効果的な内容となっています。
  • Continuous Assurance for the AWS Well-Architected Framework [ISRAEL EVENT]
    Continuous Assurance for the AWS Well-Architected Framework [ISRAEL EVENT]
    Rob Melka - Senior Solutions Architect at AWS, Ori Tabachnik - CRO at CloudZone, Avi Aharon - VP Cloud at Continuity Software Nov 30 2020 9:00 am UTC 42 mins
    Join us to learn all about the AWS Well-Architected Framework’s five pillars, including why it’s important for your business, how it helps build best-of-breed infrastructure for applications, and how it provides a method for the maintenance of optimal infrastructure.

    This session will help you ensure your new apps are built in line with AWS design principles and best practices, and show you how you can continuously and automatically be sure you're adhering to AWS Well-Architected Framework to reach better business outcomes.

    Topics of discussion will include:

    - Challenges to building and maintaining robust infrastructure
    - Removing threats to Well-Architected adherence
    - How the solution works in a joint customer case study

    The session's guest speakers are:

    - Rob Melka, Senior Solutions Architect at AWS
    - Ori Tabachnik, CRO at CloudZone
    - Avi Aharon, VP Cloud at Continuity Software
  • MINDHUNTER #3: Storms Ahead: The Dark Side of the Rush to the Cloud
    MINDHUNTER #3: Storms Ahead: The Dark Side of the Rush to the Cloud
    John Aarsen, SE - Benelux and Nordics, SonicWall Nov 30 2020 10:00 am UTC 60 mins
    Join SonicWall Cybersecurity expert John Aarsen as he explores the biggest threats to cloud environments — and why new ways of looking at cybersecurity, such as “Shift Left,” are required for safe and productive cloud use.
  • Establishing Business Agility for Uncertain Times – The Power of APIs
    Establishing Business Agility for Uncertain Times – The Power of APIs
    John Donaldson, Integration Services Mgr, Newcastle University & Ray Christopher, Sr Product Marketing Mgr, Talend Nov 30 2020 10:00 am UTC 32 mins
    Learn how Newcastle University increased business agility, improved operations, and responded to COVID-19 using APIs and on-demand data with Talend.
  • Podcast: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!
    Podcast: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!
    Digital Shadows Threat Researchers, Stefano De Blasi, Dylan Gray, Adam Cook, and Kim Bromley Nov 30 2020 10:30 am UTC 50 mins
    ShadowTalk hosts Stefano, Kim, Dylan, and Adam bring you the latest in threat intelligence. This week they cover:

    - RegretLocker’s approach to quickly encrypting files - how their
    efficiency compares to counterpart Ryuk
    - Vx Underground’s code used in ransomware attacks
    - APT32, or OceanLotus, using social media and news sites to draw in
    users and redirect them to phishing pages
    - U.S. DoJ seizes $24 Million in cryptocurrency, assisting the Brazilian
    government
  • Faciliter la vie des familles grâce aux datas et aux API, Babilou Family&Talend
    Faciliter la vie des familles grâce aux datas et aux API, Babilou Family&Talend
    Florian Petitjean, Head of Data & Flows Architecture, Babilou Family & JM Franco, Sr Director Product Marketing, Talend Nov 30 2020 12:00 pm UTC 39 mins
    Avec un réseau de plus de 800 crèches dans 12 pays, Babilou Family est devenu en quelques années un des leaders mondiaux du Early Education. Découvrez comment Babilou Family facilite la vie des 50 000 familles accueillies chaque jour en leur mettant à disposition de nouveaux services digitaux, modernes, modulaires, basé sur le Cloud et centré sur les API.
  • Agil in die Mobilitätswende, Hamburger Hochbahn & Quinscape
    Agil in die Mobilitätswende, Hamburger Hochbahn & Quinscape
    Marcus Ringe, Hamburger Hochbahn & Kevin Haferkamp, Quinscape Nov 30 2020 1:00 pm UTC 34 mins
    Die Hamburger Hochbahn betreibtdasU-Bahn-SystemundgroßeTeile des städtischen Busnetzes und ist Teil des kürzlich verabschiedeten „Hamburger Takt“, der eine Mobilitätswende in Hamburg einläutet: mit rasch steigender Passagierzahlen, der Vernetzung traditioneller Verkehrsmittel mit Sharing und Mitfahrdiensten, dem Versprechen, bis 2030 CO2-neutral zu sein und die Wartezeiten für Passagiere drastisch zu reduzieren. Talend wurde ursprünglich eingeführt, um die Data- Warehouse-Modernisierung mit einer Cloud-basierten Data-Vault- Architektur zu unterstützen. Erfahren Sie, wieTalend es ermöglicht, die nun mit dem „Hamburger Takt“ wachsenden betrieblichen Anforderungen für Advanced Analytics flexibel zu erfüllen.
  • Communications Mining: Enabling Intelligent Automation in Capital Markets
    Communications Mining: Enabling Intelligent Automation in Capital Markets
    Stephen Mackintosh, Reinfer & Jerry Wallis, Blue Prism & Rushabh Shah, Deutsche Bank Nov 30 2020 2:00 pm UTC 60 mins
    In this Blue Prism webinar, we invite Deutsche Bank and Re:infer to explore how technology trends are shaping Capital Markets for a new digital future.

    Technology has been a foundational component for growth in Capital Markets. In 2020 and the years ahead, digitisation, advanced analytics and automation offer huge potential for value creation.

    The term ‘HyperAutomation’ is increasingly used to paint this vision of the future. It describes the need for rapid discovery and automation of processes, clients journeys and knowledge worker activity. To enable this vision, the capital markets need digital ecosystems of complementary technologies, citizen developers and intelligent infrastructures.

    Learn how communications mining and robotic process automation are enabling a new value story in capital markets innovation.
  • Ransomware Survival Guide: Ransomware Kill Switch
    Ransomware Survival Guide: Ransomware Kill Switch
    Ritesh Agrawal, CEO, Airgap Networks Nov 30 2020 4:00 pm UTC 29 mins
    Ransomware attacks continue to plague K–12 schools nationwide, and they’re not slowing down anytime soon. In the pandemic, more than 1,000 educational institutions have fallen victim to ransomware, according to a report by security firm Armor. With most schools implementing some form of online instruction this school year, these attacks have only increased in volume and speed, and their impact is much more significant.

    In addition to the ransom itself, these attacks can exact a heavy cost: school district operation disruption, remediation costs, and job implication.

    In this BrightTalk session, Edu tech and IT will learn:
    How ransomware is surging in a remote/online learning environment?
    What is the fundamental mind shift in network design required?
    What to do before, during, and after a ransomware attack with Zero Trust solution?
    Why you shouldn’t and cannot pay ransoms?
    What is Ransomware Kill Switch and how it can protect you?
    How to stop ransomware propagation in seconds?
  • Continuous Assurance for the AWS Well-Architected Framework [US EVENT]
    Continuous Assurance for the AWS Well-Architected Framework [US EVENT]
    Rob Melka - Senior Solutions Architect at AWS, Ori Tabachnik - CRO at CloudZone, Avi Aharon - VP Cloud at Continuity Software Nov 30 2020 4:00 pm UTC 42 mins
    Join us to learn all about the AWS Well-Architected Framework’s five pillars, including why it’s important for your business, how it helps build best-of-breed infrastructure for applications, and how it provides a method for the maintenance of optimal infrastructure.

    This session will help you ensure your new apps are built in line with AWS design principles and best practices, and show you how you can continuously and automatically be sure you're adhering to AWS Well-Architected Framework to reach better business outcomes.

    Topics of discussion will include:

    - Challenges to building and maintaining robust infrastructure
    - Removing threats to Well-Architected adherence
    - How the solution works in a joint customer case study

    The session's guest speakers are:

    - Rob Melka, Senior Solutions Architect at AWS
    - Ori Tabachnik, CRO at CloudZone
    - Avi Aharon, VP Cloud at Continuity Software
  • Ransomware Battleground: The Ryuk Ransomware
    Ransomware Battleground: The Ryuk Ransomware
    Anonymous Security Expert and Syya Yasotornrat Nov 30 2020 6:00 pm UTC 45 mins
    This unique BrightTALK session is your 1-on-1 meetup with the most recent ransomware attack - Ryuk - in UHS Universal Health Services Ryuk's operators are known to go "big game hunting" and have previously targeted large organizations, including shipping giant Pitney Bowes and the U.S. Coast Guard. UHS has 400 hospitals and healthcare facilities in the U.S. and the U.K., and serves millions of patients each year. In this session, you will get to know how Ryuk ransomware behave in your organization and how you can use Zero Trust Isolation to prevent the attack proactively.
  • Podcast: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!
    Podcast: RegretLocker, OceanLotus, Millions Seized in Cryptocurrency, and more!
    Digital Shadows Threat Researchers, Stefano De Blasi, Dylan Gray, Adam Cook, and Kim Bromley Nov 30 2020 7:00 pm UTC 50 mins
    ShadowTalk hosts Stefano, Kim, Dylan, and Adam bring you the latest in threat intelligence. This week they cover:

    - RegretLocker’s approach to quickly encrypting files - how their
    efficiency compares to counterpart Ryuk
    - Vx Underground’s code used in ransomware attacks
    - APT32, or OceanLotus, using social media and news sites to draw in
    users and redirect them to phishing pages
    - U.S. DoJ seizes $24 Million in cryptocurrency, assisting the Brazilian
    government
  • EDRM Privilege Log Protocol Project: Fireside Chat
    EDRM Privilege Log Protocol Project: Fireside Chat
    David R. Cohen and Cristin Traylor Nov 30 2020 8:15 pm UTC 60 mins
    David Cohen, Partner at Reed Smith and EDRM Chair of Project Trustees and Privilege Log Protocol Project Trustee Cristin Traylor, Discovery Counsel, McGuire Woods sit down for a fireside discussion on the project's recent unanimous selection at Georgetown's Judges Tank and updates on the nearly completed work product.
  • Zero-Trust-Sicherheit für IoT-Geräte
    Zero-Trust-Sicherheit für IoT-Geräte
    Daniel Künzli, Pre-sales Engineer, Forescout Technologies Dec 1 2020 8:00 am UTC 52 mins
    Durch die wachsende Zahl von IoT- und OT-Geräten in Unternehmensnetzwerken ist eine vollständige Durchsetzung von Zero-Trust-Sicherheit häufig schwierig.

    Laut Gartner haben „fast 20 % aller Unternehmen in den vergangenen drei Jahren mindestens einen IoT-basierten Angriff verzeichnet.“ (Gartner, 2019)

    Um das Risiko einer Sicherheitsverletzung zu verringern, müssen Sicherheitsteams geeignete Maßnahmen ergreifen, mit denen IoT-Geräte proaktiv geschützt werden.
    Erfahren Sie, wie Sie den Zero-Trust-Ansatz für IoT-Geräte in Ihrem Unternehmen implementieren können.

    Nehmen Sie an unserem Webinar mit folgenden Themen teil:
    • Erkennen und Klassifizieren von IoT-Geräten
    • Erstellen von vertrauenswürdigen Zonen für alle Geräte in Ihrem Netzwerk
    • Durchsetzen von Least-Privilege-Richtlinien
    • Permanente Überwachung auf ungewöhnliche Aktivitäten
    • Koordinieren und Automatisieren von Reaktionsmaßnahmen
  • Driving Real Behaviour Change: Build a Security Awareness Program that Works
    Driving Real Behaviour Change: Build a Security Awareness Program that Works
    Paul Down, Director & Matt Cooke, Cybersecurity Specialist, Proofpoint EMEA Dec 1 2020 10:00 am UTC 36 mins
    When it comes to modern Cybersecurity – ultimately your users are your last line of defence. So you need to arm them with both knowledge and practice to mould dynamic, alert guardians of both your organisation and your data. The key to your success is engaging, entertaining - and crucially - topical security awareness training.

    So where to start, or how to renew your program? Are you one of the 80% of organisations who allocate two hours or less per year for security awareness, how useful do you judge this small amount of user training to effect behaviour change?

    Join our Security Awareness Training experts as we review valuable strategies on how to create and sustain an impactful cybersecurity awareness education program. Plus we delve deep into thought-leadership on the following questions:

    - How do I ensure my users embrace the training? Who are the key influencers internally?
    - What is the minimum – and maximum – levels of training shown to have been successful?
    - How do I motivate and reward my last line defenders?
    - What reporting and measures are the most pertinent to the IT team and alternatively to the C-suite?
  • Operationalize Threat Intelligence with Mandiant Security Validation
    Operationalize Threat Intelligence with Mandiant Security Validation
    Alexis Bourbion, Sales, Mandiant Threat Intelligence & David Grout, Director Southern Europe Sales Engineering Dec 1 2020 10:00 am UTC 60 mins
    A recent SANS study showed that while organizations used threat intelligence to hypothesize where attackers may be found, they lack the investigative skills to conduct searches. This limitation exacerbates their struggle to justify the high-cost of cyber defenses and organizations often rely on assumptions to guide decisions and justify decisions.

    This session reveals the actual state of cyber security based on real world data around cyber security controls across enterprise networks, from email, endpoint, network and the cloud. It also explains how security validation can validate, consolidate, recoup and maximize the value from existing investments.
  • Rise Above the Unexpected. Create Extraordinary Customer Experiences.
    Rise Above the Unexpected. Create Extraordinary Customer Experiences.
    Andre Durand, CEO of Ping Identity and Molly Bloom, Entrepreneur & Author of Molly's Game Dec 1 2020 10:00 am UTC 36 mins
    Join Andre Durand, CEO of Ping Identity in a fireside chat with Molly Bloom, olympic-class skier, entrepreneur and author of "Molly’s Game".

    From running one of the most exclusive high-stakes poker games in Hollywood to becoming a successful entrepreneur, Molly’s amazing story of failures and perseverance is truly remarkable and is particularly relevant to businesses in 2020.

    Learn about the repeatable strategies she used to create exclusive, personalised experiences for her players and to recover from disastrous circumstances. Hear how her strategies can help businesses turn their customers into loyal advocates.
  • Maze ransomware: Use threat research & MITRE ATT&CK to turn analysis into action
    Maze ransomware: Use threat research & MITRE ATT&CK to turn analysis into action
    Randy Franklin Smith (Ultimate Windows Security), Dan Kaiser (LogRhythm) and Sally Vincent (LogRhythm) Dec 1 2020 10:00 am UTC 59 mins
    Threat research can be an invaluable asset to security teams' proactive and reactive response plans. However, general recommendations found in threat research don't always easily translate into practical steps to defend against particular attacks.

    During this webinar with Ultimate Windows Security, LogRhythm Labs' Dan Kaiser and Sally Vincent will demonstrate how to translate a recent report on Maze ransomware into actionable steps for your SOC.

    They'll review how to:

    - Turn threat details into new monitoring and threat hunting techniques
    - Configure your security solution to incorporate those actionable takeaways
    - Use samples of Maze that have been reverse engineered to test your newly configured solution
  • Get the most out of your DevOps investments
    Get the most out of your DevOps investments
    Alistair Russell, Steve Davies, Colin Fletcher & Sam Hill Dec 1 2020 10:00 am UTC 61 mins
    Cost Saving and Business Benefits of Using SCM, CI and CD for Enterprises Enabled by GitLab
    As an IT leader you are leaning on DevOps methodologies to help your business meet market needs; to do so, your DevOps teams must find ways to accelerate the speed of delivery, decrease code flaws and improve time to market.

    The Total Economic ImpactTM of GitLab - a commissioned study conducted by Forrester Consulting - examined the potential return on investment (ROI) enterprises may realize by deploying GitLab. The purpose of this study was to demonstrate, justify, and realize the tangible value of using one complete DevOps application to both senior management and other key business stakeholders.
    Join our panellists for an in-depth discussion about understanding the fundamentals of value and cost reduction in the ever-changing agile world of software development.

    In this roundtable our experts will cover:
    A framework to evaluate the potential financial impact of DevOps your organisation - DevOps best practices to reduce your ’toolchain tax’
    How some companies improved development and delivery efficiency by over 87%, resulting in over US$23 million in savings
    How applying the right DevOps principles and tooling will help you increase revenue by enabling your organizations to deploy 12 times as many releases
    How with one complete DevOps solution will allow your teams to strengthened quality and security while increasing productivity and collaboration
  • How to Manage Cloud Data at Scale: A Commvault Tech Demo
    How to Manage Cloud Data at Scale: A Commvault Tech Demo
    Penny Gralewski and Ryan O'Connor Dec 1 2020 11:00 am UTC 25 mins
    Complex and high-volume cloud environments need data protection that scales. Meet business demands for data and security with a modern, proactive cloud data management platform. Take the burden off of IT with automation and orchestration, while still maintaining granularity and control.



    See a tech demo that answers your cloud data management questions:



    How to manage public cloud data, including Microsoft Azure, Amazon AWS, and Google Cloud Platform workloads?
    Where to find time and cost savings in cloud deployments?
    When can a single view of cloud data improve availability and compliance?
    What steps are involved in scaling from backup and archive to managing virtual machines?
    How to create cloud data management reports for compliance and recovery readiness?
  • Datenschutz A-Z  - Pertubierung: Manchmal ist weniger besser
    Datenschutz A-Z - Pertubierung: Manchmal ist weniger besser
    Christian Herzog, Senior Sales Engineer DACH bei Privitar Dec 1 2020 1:00 pm UTC 45 mins
    Begleiten Sie unsere Datenschutz-Experten, die sich mit der Entmystifizierung einiger grundlegender, aber häufig falsch verstandener Elemente des Datenschutzes befassen. Zu jedem Thema geben wir einen kurzen Überblick, Beispiele für Anwendungsfälle aus der Praxis und wie Sie diese im Rahmen Ihrer Datenschutzbemühungen implementieren können. Darauf folgt eine kurze Fragerunde.

    In dieser Sitzung werden wir die Perturbierung untersuchen: Wann sollte sie verwendet werden? Was sind die Vor- und Nachteile für verschiedene Anwendungsfälle?