Increasing expectations for good governance, effective risk management and complex demands for corporate compliance are presenting a growing challenge for organizations of all sizes. Join industry thought leaders as they provide you with practical advice on how to implement successful risk and compliance management strategies across your organization. Browse risk management resources in the form of interactive webinars and videos and ask questions of expert GRC professionals.
Todd Thiemann, Director Product Marketing - Arctic Wolf NetworksRecorded: Feb 21 201939 mins
The evidence is clear: law firms of all sizes need to securely handle sensitive information associated with their clients, investigators, and witnesses. According to the American Bar Association’s 2017 Legal Technology Survey Report, 22 percent of respondents suffered a security breach at their law firms.*
Compromised client information can destroy reputations and lead to decreased billables and lost business. While the need for improved security is evident, IT and security teams struggle to locate, retain and train talent needed to maintain and improve their security posture. So, what are optimal approaches for law firms to manage staffing needed to monitor and defend their valuable data and infrastructure?
In this Arctic Wolf webinar, you will:
- Discover why cybersecurity is top of mind in the legal community
- Recognize the IT and Cybersecurity skills shortage and its impact on security
- Understand how SOC-as-a-Service approaches enable law firms to rapidly improve their security posture and provide evidence to satisfy technology audits
John Masci, Principal Technologist - Cloud SolutionsRecorded: Feb 21 201959 mins
Today, 77 percent of enterprises have at least one application on the cloud (IDG State of the Enterprise Cloud, 2018). If you are part of that 77 percent, then cloud is now a critical element of your competitiveness. Heading into 2019, the growing pains of cloud will be cost and security: you’ll face the difficult balance between empowering your teams with the newest cloud technologies and ensuring those teams stay within budgets and comply with organization-wide policies.
As you take on this challenge, you need a cloud management platform that provides proactive ways to control and minimize costs, while enforcing governance and security.
In partnership with LiftOff IT, HyperGrid invites you to attend this webinar and demo, highlighting the capabilities we offer to help you optimally manage and benefit from your cloud strategy.
This webinar focuses on the following critical topics:
• How your cost, security & governance challenges will change at different stages of cloud adoption
• Key methods to manage costs including instance optimization, budget tracking, bill analysis and chargebacks
• Mitigating security risks using risk-based policies, and automated threat detection
• Maintaining compliance against internal and external standards corporate when operating in the public cloud
• How the HyperCloud™ platform can simplify all the above
Receive a complimentary copy of Gartner’s 2019 Magic Quadrant for Cloud Management Platform Report
As a webinar participant, you’ll receive a courtesy copy of Gartner’s new landmark overview of the CMP marketplace. Learn why Gartner singled out HyperGrid as the only “visionary” in this category in its Magic Quadrant for Cloud Management Platforms.
Matthew Webster, Senior Security Researcher, Secureworks Counter Threat UnitRecorded: Feb 21 201961 mins
All too often companies are learning the hard way — during an incident — how they could have been better prepared to stop the threat or reduce the damage. Join us for a one hour webcast, hosted by SC Magazine, featuring the key findings of Secureworks newly-released Incident Response Insights Report 2018: Risks, Remedies, and Best Practices for Defending Against Cyber Threats.
Webcast takeaways will include:
- Threat and attack trends identified by responders in 2017.
- Lessons learned by organizations in a wide variety of incident response (IR) scenarios.
- Key recommendations for IR planning, practices and capabilities that improve security defenses and mitigate business risk.
- Live Q&A with experts from our Counter Threat Unit™ (CTU) and Incident Response team.
In 2017, Secureworks’ team of incident responders helped hundreds of organizations navigate through complex and high-risk security incidents. Now the top insights from those collective engagements will be shared by speakers from the Secureworks Counter Threat Unit and Incident Response practice.
This program offers the support you need to prepare better for emerging threats, understand how you might be vulnerable, and respond more effectively when an incident does occur. Program content is appropriate for cybersecurity leaders, incident responders, CIOs, CTOs, and executives with responsibility for enterprise risk management.
Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, SymantecRecorded: Feb 21 201962 mins
Its your job to secure email, sensitive data and apps in Office 365. Now What?
Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.
Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:
- Get the most out of your Office 365 instance by enhancing the security
- Understand what Microsoft offers and how Symantec compliments their security offering
- Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps
Jason Price, Solutions Engineer at Spirion & Jacob Serpa: Product Marketing Manager at BitglassRecorded: Feb 21 201947 mins
Data is one of an organization's most valuable assets. Unfortunately, in today's dynamic, cloud-first world, protecting sensitive information without the right tools is incredibly difficult. However, through solutions like data discovery, data classification, and cloud access security brokers, the enterprise can rest assured that its data is secure. In this webinar, you will:
- Understand the benefits of data discovery and classification
- Learn about cloud access security brokers (CASBs)
- Discover how the two work together to protect the cloud-first enterprise from data leakage
Eric Carter, Director of Product Marketing, Sysdig & Shadi Albouyeh, Offering Manager, Developer Services - IBM CloudRecorded: Feb 21 201944 mins
If you’re involved with developing applications, chances are you’re being tasked with adapting to cloud-native infrastructure and being able to support cloud-native workloads with solutions like containers and Kubernetes. Join this discussion with Sysdig and IBM Cloud, who have recently built a partnership focused on improving monitoring and troubleshooting for your modern DevOps services. Together, IBM and Sysdig have launched a new offering that provides end-to-end monitoring capabilities in the IBM Cloud. You’ll come away with a better understanding of key visibility challenges and solutions that will help you successfully deliver the apps that drive your business.
Matt Smith, Chief Architect, Red Hat & Christopher Liljenstolpe, CTO, Solutions, TigeraRecorded: Feb 21 201963 mins
Join Red Hat Chief Architect, Matt Smith, along with Tigera CTO, Solutions, Christopher Liljenstolpe, as they share their experience and knowledge helping leading enterprises achieve their key business transformation initiatives around moving to secure cloud-based, containerized microservice applications. In this 60 minute webinar, they will cover their top lessons learned on network security and Red Hat OpenShift.
Damon Tepe & Jeff HickmanRecorded: Feb 21 201960 mins
Breaches continue to litter headlines, increasing in volume and severity. To protect critical systems and assets from attack many organizations rely on two-factor authentication (2FA). But that may be resulting in a false sense of security.
Join SecureAuth as we explore how evolved attackers are working around popular 2FA methods. And we will demonstrate how behind-the-scenes adaptive risk checks of device, location, IP address, account type, and behavior can elevate identity trust and stop attackers cold! Even if they have stolen credentials and can bypass 2FA.
Better breach protection starts with better identity trust!
During this session you’ll learn how:
• Attackers are getting around two-factor authentication
• Risk and context checks can raise trust in identities and identify attackers
• Adaptive authentication delivers better access security without slowing down your business
Damon Tepe - Director, Product Marketing, SecureAuth
Jeff Hickman - Director of Sales Engineering, SecureAuth
Mark Gaydos, CMO, at NlyteRecorded: Feb 21 201922 mins
Join this webinar where Mark Gaydos, CMO of Nlyte Software, will present the Next Generation of Asset Discovery.
Nlyte Asset Explorer uses agentless technology to scan your network from desktop to data center to cloud to inventory your hardware, software and networking assets. It supports all major protocols, integrates with your CMDB and creates a single source of knowledge of 100’s of data points.
You will learn:
- Security Officers report more than 10% of assets on network are undetected
- Only 10% of IT Operations managers believe that all assets are detectable and monitored
- 6% of Financial Officers feel they have no risk from a vendor software audit
- IT Managers report more than 69% of assets not current with software and patches
- 87% of Organizations believe 10% of assets or more are not in their CMDB
Andrew Bragdon, Principal Product Manager, MuleSoft and Sanjna Verma, Product Marketing Manager, MuleSoftRecorded: Feb 21 201950 mins
On average, a business supporting digital transactions now crosses 35 backend systems — and legacy tools haven’t been able to keep up. This session will cover how MuleSoft’s new monitoring and diagnostic solutions provide end-to-end actionable visibility to APIs and integrations to help customers identify and resolve issues quickly.
- Measure application performance across APIs and integrations in production
- How to query and retrieve log data across your network
- End-to-end walkthrough of priority issue identification and resolution
- Exciting new capabilities of Anypoint Monitoring
IT risk is always evolving, and in 2020 you need to be prepared what it may look like. New technologies and expanding trends such as cloud, digital transformation, and IT risk-related tasks being taken on directly by the business means IT risk will increase and potentially have greater impacts on the business without proper collaboration and management. Prepare for IT risk in 2020 and beyond by attending this live webinar led by Lockpath’s Sam Abadir. Topics to be discussed include:
· Evolution of IT landscapes and what it means to IT risk management
· IT risk management skillsets and disciplines
· Collaboration across departments and building consensus
· How organizational maturity impacts managing IT risk
· How to sustain growth in 2020 and beyond
Find out what you need to know to manage IT risk in 2020 and beyond by attending this educational webinar. Register now!
Jeff Laskowski, Security Consulting Director, FireEye MandiantRecorded: Feb 21 201956 mins
Many breached organizations—of all sizes—believed they had effective security programs and incident response plans. Reality proved otherwise.
Now, executive leaders are far more concerned with incident preparedness. When the Board asks, ‘How ready are we, really?’ your security team must have a defensible response.
In this webinar, Jeff Laskowski, Security Consulting Director of FireEye Mandiant, explains how to achieve effective preparation:
• Test your team’s detection and response capabilities to protect key assets against real-world targeted attacks—without the consequences of a real incident
• Assess your organization’s crisis management capabilities through the lens of an executive team
• Improve your team’s detection and response capabilities in accordance with the latest attacker tactics, techniques, and motivations
Join this webinar today to learn what it takes for your team to know how they would perform under a real threat, before they actually have to.
Evan Blair, Co-Founder, Global VP Channel, ZeroFOX & Jeremy Wood, Vice President, Product Marketing, HootsuiteRecorded: Feb 21 201959 mins
In our connected world, most people engage with brands online prior to making a purchasing decision. With social media marketing on the rise, risks to your brand and reputation are also increasing, from account hacking to impersonating profiles and more. How can you increase engagement while protecting brand integrity from digital risks?
• Knowledge about social media security risks related to brand
• Tips for safe sharing on social media
• Step-by-step guide for protecting your brand
ISM Fellow - Ian MoyseRecorded: Feb 21 201930 mins
•What it is
•What it isn’t
•Turning Social into real engagements
•Is it just LinkedIn
•Receive a Personal Action Plan
Reasons to attend
Social Selling is the new sales skill in your toolbag to help you open doors, build your own reputation & have stronger engagement with prospects. Ian Moyse, is a respected authority on Sales Leadership and the new methodology of Social Selling, sitting as a non-exec on Digital Leadership Execs, a leading Social Selling firm. He has spoken widely on Social Selling. Ian is a judge on many Sales Awards and has interviewed hundreds of Salespeople and can share in today’s market a valuable skill that can help set you apart
Julian Totzek-Hallhuber, Solutions Architect at VeracodeRecorded: Feb 21 201931 mins
Software hat die Art und Weise verändert, wie wir kommunizieren, Gesundheitsfürsorge anbieten, Geschäfte abwickeln, Regierungen regieren, Führungspersönlichkeiten wählen, Revolutionen aufbauen und sogar soziale Veränderungen anstoßen. In der digitalen Welt wird die Erstellung von Software das Wirtschaftswachstum ankurbeln und unsere Lebensqualität verbessern. Unser größter Katalysator für Veränderungen ist jedoch auch die Ursache für Verwundbarkeit.
Wenn es um die Sicherung der von ihnen entwickelten Software geht, liegen europäische Unternehmen weit hinter ihren amerikanischen Kollegen. In diesem Live-Webinar Julian Totzek-Hallhuber, Solutions Architect für Veracode werden Daten aus dem jährlichen Bericht zum Zustand der Software-Sicherheit präsentiert, in dem der Vergleich europäischer Unternehmen mit US-amerikanischen Unternehmen im Mittelpunkt steht. Software wird unter Berücksichtigung der Benutzerfreundlichkeit und der Leistung erstellt, aber langjährige Daten sowie ein Angriff nach dem anderen zeigen jedoch, dass Software mit nicht ausreichenden Sicherheitskonzpeten im Hintergrund erstellt wird.
Nick Savvides, Chief Technology Officer, APACRecorded: Feb 21 201963 mins
2019 is poised to be a year of disruption. Artificial Intelligence (AI) is entering the cyber battlefield, with increased regulatory activities and many other developments for enterprises to further their digital transformation efforts. These are but some of the many things that CISOs must keep up with.
What should be the key areas of focus and considerations for CISOs in developing their organisations’ security posture? What should be top in their list of priorities for this year and beyond?
Join Nick Savvides, Symantec Chief Technology Officer for Asia Pacific, as he shares the top considerations and priorities that CISOs need to focus on.
- 2019 Threat Landscape in Asia Pacific
- Key security considerations for 2019
- Steps to stay ahead in cybersecurity
Panelists: Nick Hayes, Forrester; Idan Shoham, Hitachi-ID; Jason Bonds, Ping Identity; Perry Carpenter, KnowBe4Recorded: Feb 20 201976 mins
* This is a recording so CPE credit is unavailable.
Today’s organizations face a cybersecurity landscape more difficult to navigate than ever before. When it comes to data breaches, the risk for organizations is high, from the easily calculable costs of notification and business loss to the less tangible effects on a company's brand and customer loyalty. With large-scale data breaches continuing to make the headlines in 2018, organizations must be proactive, not reactive, in the face of looming cyber threats. Proactive threat intelligence can enable organizations to prevent breaches or compromises before they occur.
On this webinar our panel of experts will discuss some critical actions organisations can consider to prevent a data breach, and attendees will learn:
- Strategies you can implement now to help you protect against a breach.
- Best practices for gathering the intelligence to predict and prevent attacks.
- How to use threat intelligence to improve your organization’s security posture and reduce the risk of an attack.
- Steps to fortify your last line of defense.
Macie Thompson & Chris MurphyRecorded: Feb 20 201949 mins
How can you plan for, detect, and respond to attacks in your hybrid environment, including cloud and on-premise?
Join us for this webinar to find out. We'll explore differences and similarities between your approach for each, and what to keep in mind when looking for solution providers.
What you’ll learn:
•Why a solid incident response plan must account for hybrid cloud and on-premise environments
•What’s changed with the move to cloud apps and services, and what’s the same
•Who to include in your incident response planning
•What tools can help you detect attacks more quickly and efficiently
•How a solid plan can reduce recovery time from an attack
Macie Thompson is Director of Delta Risk’s Incident Response team, providing incident response and compromise assessment support to commercial customers. She has more than eight years of experience in cyber security operations and training. Macie supports federal training and exercise programs, using her operational experience to develop realistic offensive and defensive cyberspace training curriculum and exercise vignettes for government clients.
As Director of Critical Infrastructure Cyber Security at Delta Risk, Chris Murphy provides operational and strategic guidance for commercial and government clients. He specializes in helping organizations define and develop processes for incident response, monitoring infrastructures for security events, and detecting attacks. He has extensive experience in establishing and operating Computer Security Incident Response Teams (CSIRTs) and Computer Emergency Response Teams (CERTs), Cyber Security Operations Centers (SOCs), and investigative response teams, including those dealing with SCADA/Industrial Control Systems (ICS).
James Jones, Principal Solution Architect and Keith Mokris, Product Marketing LeadRecorded: Feb 20 201935 mins
In this webinar, learn a helpful model of viewing the different cloud-native technologies as a continuum, to address different scenarios and efficiently choose which combination of technologies work best for running different workloads.
The continuum starts with bare metal and VMs on the left, continues into “light” hypervisors (like Canonical’s LXD), and extends into containers and services like AWS Fargate and then, ultimately, serverless. Technologies to the left provide the most isolation and control with the tradeoff of greater management and performance overhead. Those to the right facilitate more agile development and app density with the tradeoff of less control.
Eric Sheridan, Chief Scientist, WhiteHat SecurityRecorded: Feb 20 201932 mins
For every 100KLOC, a monolithic application will have an average of 39 vulnerabilities whereas a microservice application will have an average of 180 vulnerabilities. You read that right. According to the data gathered from WhiteHat Security’s 2018 Stats Report, the transition of enterprise monolithic applications to distributed microservices architectures is actually increasing the overall average of total vulnerabilities. But why? Why is it that we seemingly continue to make the same mistakes again and again? And what does this say about the security of microservices architectures, or the developers that build them? The journey to a microservices architecture generally involves the decomposition of an already existing monolith application, wherein previous security assumptions and considerations are often questioned and sometimes invalidated.
Join Eric Sheridan, Chief Scientist at WhiteHat Security, for a dive into the security trends of microservice architectures. Participants of this talk will learn…
•Why we are seeing an increase in the number of vulnerabilities with the migration to microservices
•The most common vulnerability classes facing applications of microservices architectures
•Strategies that can be used to more readily find and fix vulnerabilities earlier in the development lifecycle
Danny Akacki, Sr. Technical Account Manager, Gigamon Insight and TJ Biehle,Sr. Technical Account Manager, Gigamon InsightRecorded: Feb 20 201947 mins
To whack, or not to whack, that is the question:
Whether ‘tis nobler in the mind to torch all
The compromised boxes on your poor network,
Or to take arms against a sea of malware
And by blocking stop them all.
So, what do you do during an active security incident? When is the proper time to whack-a-mole with your mallet? Is it better to light everything on fire and start over, or should you make observations a key component of your response and mitigation strategy? In this webinar, we'll discuss strategies for when it's time to scorch the earth versus sit back with a cup of tea, gaining intel into what active adversaries are doing in your house.
We’ll break down some of the most important points to remember during the commotion of an active incident response, including:
•Context is king. We’ll explain the important questions you need to be ask when scoping an incident to get an improved view of the situation.
•Thinking fast and slow. It’s understandable to want to nuke everything from orbit just to be thorough, but it’s usually not the smartest play. We’ll outline the potential benefits and risks of hasty containment and remediation efforts versus slow, thoughtful analysis when executing a response game plan.
•The law of diminishing returns. There can be a tipping point where the cost of your decisions and polices no longer justify the answers you’ll find. We’ll talk you through some tactics to find the sweet spot between effort and return.
Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²Feb 22 20196:00 amUTC60 mins
Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).
In this info-session, you will learn:
- How large is the cybersecurity workforce gap today
- Why you should pursue CCSLP
- How to earn the certifications – exam and experience requirements
- The recent updates on membership benefits and policies
- And, ask any question that will support your certification journey
Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.
CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².
Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.
Are you ready to prove yourself? Register and begin your CSSLP journey today!
Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst ForresterFeb 22 201910:00 amUTC62 mins
Three major trends define the Cloud Generation chaos that organizations face today:
1) Use of cloud applications
2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter
3) Use of both corporate owned and BYO devices (PC, Mac and Mobile)
On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.
Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
-Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
-Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
-Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
-Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
Many procurement professionals we speak with struggle to get the insights into software purchases, software and cloud usage, contract terms, outstanding invoices, expired quotes and renewal information that they require to do their roles effectively.
This information is often spread across multiple paper documents, systems, spreadsheets or databases, which makes it tedious and time consuming to gather the necessary data and often leaves Procurement Specialists unprepared at the time of software renewals.
Lack of visibility into software and cloud spend makes it difficult to negotiate optimal commercial terms and contracts.
This is why we developed the new Procurement Workbench in PyraCloud.
We wanted to provide Procurement Specialists with a quick and easy way to see all relevant information and insights needed for their role.
Join one of our experts, Rhys Williams, and learn how the PyraCloud Procurement Workbench can help you streamline your process by:
• Simplifying the management of quotes, orders and invoices
• Improving product search capabilities across multiple products and services in global catalogues
• Tracking software previously purchased, product favourites and subscriptions
• Consolidating multiple aspects of the procurement process in one place
PyraCloud provides a single platform to manage the software procurement process in one place – no need to login to multiple systems – saving you time and money. Join us on the webinar to find out more.
Asaf Lerner, Director IAM Solutions at GemaltoFeb 22 20193:00 pmUTC45 mins
As mid-sized and large organizations move to cloud based delivery for software, infrastructure and storage, hybrid environments are the de-facto reality. Perimeter security schemes no longer meet the security challenges of distributed software and application delivery, leading CISOs to try and mesh disparate solutions, or worse knowingly compromise on protection. Join Gemalto to hear best practices for applying consistent and effective access security and strong authentication to both on-prem and cloud apps.
Bob Liscouski, Juanita Koilpillai and David MorrisFeb 22 20196:00 pmUTC90 mins
How a Digital Risk Framework (an understanding of the differences between cyber security, cyber risk and digital risk) can help identify and mitigate risks to your Cloud Infrastructures.
In this session you will learn what a Digital Risk Framework is, how a Digital Risk Framework can help you comply with the onslaught of privacy regulations (CCPA, GDPR, HIPPA, etc) and its impact on your Cloud Infrastructures, which are most commonly used.
Tim Woods, Vice President of Technology Alliances | Elisa Lippincott, Director of Product MarketingFeb 22 20197:00 pmUTC60 mins
Many enterprises are adopting a cloud-first strategy in efforts to drive business innovation and growth. As cloud deployments grow, security requirements grow with them – leading to a trend of security responsibilities becoming dispersed as traditional security implementations impede the speed to delivery. Distributed responsibilities lead to fragmented security implementations - add to the problem the lack of skilled personnel, misconfiguration errors, overly permissive access, shadowed IT, and a lack of consistency between on-premise and cloud security controls, and you can end up with a recipe for disaster.
Join Tim Woods, VP of Technology Alliances at FireMon and Elisa Lippincott, Director of Product Marketing at FireMon, in this webinar where they will discuss:
• Steps you need to take to gain full visibility and control to secure your hybrid environment
• How to ensure consistency of your security controls within hybrid cloud and multi-cloud environments
• How to manage risk and complexity in your hybrid cloud with a cloud security posture management strategy
Hervé Doreau, Directeur Technique, Symantec FranceFeb 25 20191:00 pmUTC42 mins
À l'ère de la génération cloud, les collaborateurs exigent une flexibilité à toute épreuve et un accès où qu'ils se trouvent, ce qui peut mettre vos données les plus sensibles en danger.
Les environnements distribués, comme ceux mis en place pour les télétravailleurs et les employés mobiles, créent de nouvelles surfaces d’attaque qu’il est impératif de protéger. De même, le recours aux applications cloud SaaS rend encore plus nécessaires les contrôles de conformité et de sécurité.
Résultat, les équipes IT et sécurité sont obligées de repenser la conception de leur réseau pour mieux répondre aux interrogations suivantes :
- Comment encadrer efficacement l’accès aux données, aux applications et aux systèmes ?
- Comment lutter contre les menaces avancées qui ciblent notre entreprise via le Web, le cloud et l’e-mail ?
- Comment sécuriser les informations qui circulent entre notre réseau, les terminaux et le cloud ?
Retrouvez nos experts pour ce webcast sur les grands défis de sécurité que les grands comptes clients de Symantec doivent relever avec la génération cloud. Vous découvrirez comment les solutions Cloud de sécurité de Symantec peuvent protéger les utilisateurs, les terminaux et les données d’entreprise, où qu’elles se trouvent.
Tony Vizza, Director of Cyber Security Advocacy - APAC, (ISC)²Feb 26 20196:00 amUTC60 mins
Accelerate your cybersecurity career with the CISSP certification.
Join this online info-session hosted by (ISC)² and learn everything you need to know about the globally recognized credential CISSP!
During the online info-session, you will:
- Gain an insight into the CISSP credential-its domains and career benefits for credential holders
- Hear about the practical application of the CISSP related to real world issues for security professionals
- Ask questions about the credential, exam and experience requirements
- Learn everything you need to know about getting certified
Each presentation is followed by a Q&A period to answer your questions about your certification journey. Registration is required.
Earning the CISSP proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. With a CISSP, you validate your expertise and become an (ISC)² member, unlocking a broad array of exclusive resources, educational tools, and peer-to-peer networking opportunities.
Prove your skills, advance your career, and gain the support of a community of cybersecurity leaders here to support you throughout your career.
Дмитрий Иванюк, эксперт по решениям CommvaultFeb 26 20198:00 amUTC90 mins
У Вас есть вопросы по:
- основным компонентам решения Commvault?
- методам настройки решения Commvault и архитектурным особенностям решения?
- каковы приёмы конфигурирования и повышения производительности?
- как устранить неполадки? И какие есть для этого инструменты?
- вы хотите увидеть демонстрацию решения!?
И у Вас есть вопросы, на которые Вы хотите получить оперативный ответ в режиме диалога. Все это и намного больше вы сможете узнать, посетив наш вебинар
Курс предназначен для менеджеров по продукту, архитекторов, инженеров, администраторов.
Christian Husemeyer, Senior Sales EngineerFeb 26 201910:00 amUTC45 mins
Seien Sie E-Mail-Angriffen einen Schritt voraus
Der größte Teil des eingehenden Datenverkehrs erreicht Unternehmen per E-Mail und bietet damit ein beliebtes Einfallstor für Hacker. Unter den 269 Milliarden täglich versendeter E-Mails verbergen sich heute mehr Versuche von Identitätsdiebstahl als je zuvor. Spear-Phishing und Ransomware Attacken nehmen gleichermaßen zu.
Erfahren Sie in unserem Webinar wie Sie mit einer effektiven Email Sicherheit verdächtige Emails erkennen und blockieren. Wir geben Ihnen einen Überblick zu folgenden Themen:
- Moderne URL-Sicherheitsfunktionen
- Erkennung von falschen Identitäten
- Reduzierte Anzahl der Warnmeldungen und Fehlalarmen
Saravanan Rajagopal, Aruba TAC teamFeb 26 201910:00 amUTC90 mins
ClearPass OnGuard agents perform endpoint posture assessment and ensure that compliance is met before granting access to the network. This session will cover the ClearPass OnGuard Agent components and work-flow in detail.
John Kindervag, Field CTO, Palo Alto NetworksFeb 26 201910:00 amUTC60 mins
“Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks
Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy?
High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage.
Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks.
Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will:
• Learn specific outcomes of implementing a Zero Trust architecture
• Hear recommendations on where to start when planning and implementing a Zero Trust framework
• See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
• Get your questions answered in our Live Q&A
Brandon Dunlop, Moderator, (ISC)², David Warburton, Senior Threat Research Evangelist, F5 LabsFeb 26 20191:00 pmUTC60 mins
Encrypting data-in-transit with SSL/TLS is standard practice among organisations today. Important security initiatives, such as built-in web browser warnings and stronger legislative GDPR changes, have significantly improved privacy awareness and helped to prevent data breaches. However, cybercriminals commonly hide threats within encrypted payloads and use encrypted channels to propagate malware and exfiltrate data, knowing they can bypass traditional security inspection solutions.
Join us for this webinar to learn more about:
• Challenges with encrypted traffic and risks to your business
• How to efficiently decrypt and orchestrate traffic to reduce latency
• How to intelligently manage decryption and re-encryption across your entire security inspection solutions (IPS, NGFW, DLP, WAF, Anti-Malware, etc.)
Mike Fowler, CISSP - VP of Professional Services, DFLabsFeb 26 20194:00 pmUTC15 mins
Security analysts are subjected to such a volume and frequency of alerts that over time they can become desensitized to the information they are analyzing, resulting in critical alerts potentially being disregarded or missed.
When responding to tens of thousands of security alerts a month, how can you reliably distinguish what's important from what's just a noise in the background?
Join our new webinar to learn how a Security Orchestration, Automation and Response (SOAR) solution can help your overwhelmed cyber response team to "SOAR" above the noise when detecting, responding to and remediating a potential security incident. Our VP of Professional Services, Mike Fowler, will present proven best practices to reduce and avoid alert fatigue.
● What is “Alert/Alarm Fatigue” and why should you care?
● What is the impact of alert fatigue on Security Operations and Incident Response?
● How you can cultivate a state of continuous alertness by applying the SOC Analyst Sanity Saver
● How to reinforce the front line
● How to leverage SOAR capabilities that act as a Force Multiplier in Incident Response
Want to learn more on the topic ahead of the webinar? Download our white paper "Automation as a Force Multiplier in Cyber Incident Response" here: https://bit.ly/2SKN9pL
The CQRM (Certified in Quantitative Risk Management) has become the fastest-growing professional qualification in quantitative risk management and quantitative methods applicable to all industries. It is an international certification awarded by the International Institute of Professional Education and Research (IIPER). This webinar will showcase how individuals can maximize and update their skills, knowledge, and experience in quantitative methods and risk management, ensuring clear paths to success within their current roles as well as fast tracking to future careers.
Prof. Dr. Mun is the IIPER-CQRM Program Director, coordinating worldwide executive programs, professional accreditations, and education standards in quantitative methods and risk management, and is also responsible for ensuring high-quality teaching and continuing education among the IIPER Certified Trainers.
Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD; Ernesto DiGiambattista, CEO, CYBRICFeb 26 20195:00 pmUTC37 mins
Defending your applications, infrastructure and network is constant in today’s persistent threat environment. Organizations can’t do it alone and the tools of detection, defense and response can no longer work in isolation of each other. Resiliency and collaboration are topical, consistent themes, reinforced by the innovation coming out of the cybersecurity industry. But what does this really mean for IT, security and development teams day-to-day?
Join Mike Brown, RADM, USN (Ret), former Director, Cybersecurity Coordination for DHS and DOD for a discussion on industry direction, the type of collaboration that can yield immediate results to teams and the criticality of protecting application infrastructure.
Michael Brown is Founder & President, Spinnaker Security LLC, a cybersecurity consultancy focused on understanding, identifying and mitigating business risks associated with cybersecurity. Brown brings executive leadership, including crisis management, from both public and private sector experiences. Prior, he was President, RSA Federal LLC and VP/GM Global Public Sector of RSA Security LLC. Responsibilities also included RSA Information Technology, Security and Enterprise Risk Mgmt portfolios.
Brown joined RSA after over 31 years in the US Navy. Brown’s last position on active duty was as Dir, Cybersecurity Coordination for DHS, responsible for increasing interdepartmental collaboration in strategic planning for the Nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities for the Depts of Defense and Homeland Security. He also served as DHS Deputy Asst Secretary, Cybersecurity & Comms, Acting Asst Secretary, Cybersecurity & Comms and as Asst Deputy Dir Joint Interagency Task Force for the Office of the Dir of National Intelligence. Brown also had various leadership positions, including command of the Naval Information Warfare Activity.
Ran Rayn & Michael RothschildFeb 26 20195:00 pmUTC75 mins
A confluence of factors has put OT networks online and more susceptible to cyber attacks. Without addressing threats targeting the OT network, any manufacturing facility, industrial operation or critical infrastructure can be ground zero to a devastating attack. When tasked with creating the rule sets that are optimized for ICS environments, security experts must take into consideration a number of key areas.
Nathan Swetye - Sr. Manager of Platform Engineering - Cox AutomotiveFeb 26 20196:00 pmUTC62 mins
Cox Automotive comprises more than 25 companies dealing with different aspects of the car ownership lifecycle, with data as the common language they all share. The challenge for Cox Automotive was to create an efficient engine for the timely and trustworthy ingest of data capability for an unknown but large number of data assets from practically any source. Working with StreamSets, they are populating a data lake to democratize data, allowing analysts easy access to data from other companies and producing new data assets unique to the industry.
In this webinar, Nathan Swetye from Cox Automotive will discuss how they:
-Took on the challenge of ingesting data at enterprise scale and the initial efficiency and data consistency struggles they faced.
-Created a self-service data exchange for their companies based on an architecture that decoupled data acquisition from ingestion.
-Reduced data availability from weeks to hours and developer time by 90%.
Jim Haas, Vice President of Managed Services at NtiretyFeb 26 20196:00 pmUTC77 mins
On July 9th, 2019 Microsoft will end all support for SQL Server 2008. How can you prepare your organization? Start by understanding your options.
Why should you attend?
Doing nothing is not an option this time. Data security is a risk to your organization, as all critical patches and security updates for SQL Server 2008 will end. Your Lack of compliance with industry standards and applicable regulations may lead to security breaches, data loss, litigation, and reputational risk.
Join Jim Haas, Vice President of Managed Services at Ntirety (a Division of Hostway|HOSTING), as he discusses how you can go about making a compelling case:
• Upgrade Options: Migrate to Azure, Upgrade SQL Server, or Purchase Extended Security
• The many advances since SQL 2008.
• How to get started. What you can do yourself. Where you may need help and where to find
Are common security pitfalls putting your network at risk? We get it. More and more users are working wherever they please — not always using the VPN. And you may not have visibility to all the apps in use across your organization. While firewalls are ok, they won’t protect users when they are off network. There’s a lot standing between you and a safe network. Your security shouldn’t be one of them. Join us for our webinar, "6 Degrees of Network Security," and learn how to avoid 6 common security pitfalls that put your users, their devices, and your data at risk.
Gerry Grealish, Symantec and Salah Nassar, SymantecFeb 26 20196:00 pmUTC60 mins
Zero Trust is an architectural model that guides security teams on how to apply Zero Trust tenants to address the modern threat landscape. The model advocates a holistic approach to information security and puts special focus on processes and technologies that secure your data, wherever it resides.
The objective is to strengthen data security and obfuscation – to limit risk derived from excessive user privileges and access. Benefits also include improved security detection and response with analytics and automation.
Understanding key concepts at a high level is one thing. Properly implementing the model can be much more challenging.
Join us in this webinar where we’ll look at:
• Requirements for adopting a Zero Trust model across the entire security stack
• Key considerations as you plan your Zero Trust programs
• Benefits of a platform versus fragmented approach
You’ll gain valuable insight whether you’re well on your way to Zero Trust implementation or are just considering it.
Nimrod Vax, Co-Founder and Head of Product at BigID and Steve Touw, Co-Founder and CTO at ImmutaFeb 26 20197:00 pmUTC60 mins
Before modern organizations can even think about protecting data to avoid regulatory repercussion or utilizing their most important asset for advanced analytics, they must gain complete understanding of whose data they hold, where and in what context.
Join BigID and Immuta for a webinar to learn how our new partnership provides the building blocks for this necessary level of data understanding and utilization.
In this webinar, BigID’s Co-Founder and Head of Product Nimrod Vax and Immuta’s Co-Founder and CTO Steve Touw will discuss the partnership and how organizations can better prepare and implement data into model building for compliant AI and machine learning initiatives.
In this webinar, you will learn how:
• Balance the pressure for greater insights from data analytics with growing expectations of data privacy ethics and compliance
• Leverage data knowledge to enable data science teams to make the right access decisions
• Build complex policies based on dynamic data insights to unlock data value even in highly regulated environments