Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Задай вопрос эксперту
    Задай вопрос эксперту
    Дмитрий Иванюк, эксперт по решениям Commvault Live 60 mins
    Уважаемые коллеги!

    Приглашаем Вас и Ваших коллег принять участие в новом формате вебинара: "Задай вопрос эксперту".

    Дата: 23 января
    Время: 11:00 (МСК)
    Спикер: технический эксперт - Дмитрий Иванюк
    Язык вебинара: русский.

    Данный вебинар включает следующее:
    - возможность задать свой вопрос по программному продукту Commvault,
    - полный интерактив,
    - демонстрация сценариев,
    - детальные ответы на ваши вопросы.
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Recorded: Jan 23 2020 39 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • LogRhythm True Unlimited Data Plan for SIEM
    LogRhythm True Unlimited Data Plan for SIEM
    Bill Smith (LogRhythm) and Todd Weber (Optiv) Recorded: Jan 23 2020 39 mins
    If the volume of data in your environment is expanding exponentially, you have likely been surprised to see a rise in your SIEM contract each year. You may have even had to make the difficult — and risky — decision of which data not to protect to stay within your budget. Starting now, you don’t have to.

    With LogRhythm’s new True Unlimited Data Plan, your organization will pay one price to protect all data, users, and systems, even if those numbers increase year to year.

    Join Optiv and LogRhythm as we discuss how the True Unlimited Data Plan can help you reduce risk in your environment without spending millions of dollars to do so.

    This webinar will review how together, Optiv and LogRhythm can help you overcome the following challenges:

    > Increased headcount: more people means more data.
    > Infrastructure growth: adding networking and hardware increases your log volumes.
    > Increased revenue: the more your organization is worth, the larger the target it becomes.
    > Cloud-first initiatives: apps in the cloud generate more logs.
  • Privacy of Health Information, an IFHIMA Global Perspective
    Privacy of Health Information, an IFHIMA Global Perspective
    Lorraine M. Fernandes, RHIA | Jean L. Eaton, Practical Privacy Coach, Information Managers Recorded: Jan 22 2020 39 mins
    The increasingly mobile, rapidly digitizing world of data is transforming all aspects of information and leading to new policies and regulations to support data privacy.

    Beyond its primary purpose of improving personal healthcare outcomes, health data is being used for a wide range of purposes from improving population health, disease surveillance and the study of health economics. There are dramatic changes in how patients, consumers, or individuals access and use their health data. And, new technologies such as machine learning, artificial intelligence and biometric authentication are further compounding health information privacy challenges. Now more than ever, it is critical that the privacy of health information be protected.

    Lorraine Fernandes and Jean L. Eaton will share:

    - The role of The International Federation of Health Information Management Associations (IFHIMA)
    - he need for a privacy information sharing agreement (ISA) explored in the IFHIMA healthcare whitepaper
    - High level overview of global privacy trends impacting healthcare
    - Why privacy is a priority for business leaders in 2020
    - The importance of a privacy management program and privacy awareness training to protect personal information and secure critical data assets
    - Prepare for emerging privacy trends

    Register here (https://ifhima.org/sign-up-for-ifhima-global-news-whitepaper-and-events/) to receive this free white paper and learn more about IFHIMA.

    Presenters:
    Lorraine M. Fernandes, RHIA, Principal, Fernandes Healthcare Insights
    President, International Federation of Health Information Management Associations (IFHIMA)

    Jean L. Eaton, BA Admin (Healthcare), CHIM, Practical Privacy Coach, Information Managers Ltd.
  • The Importance of Privacy protection in the age of Technology
    The Importance of Privacy protection in the age of Technology
    Robin Gould-Soil, Former Chief Privacy Officer HSBC Canada Recorded: Jan 22 2020 44 mins
    This presentation will outline the important of building privacy protection into technology, what's up for discussion, understanding differences between privacy by design, privacy enhancing technologies, where we might see legislative reform, roles and responsibilities for developers, developer, coder, technological entrepreneur, researcher, academia.

    Key take aways will include:

    - Practical examples of privacy protection considerations if you are a developer, coder, technological entrepreneur, researcher or academia
    - Update on legislative reform for PIPEDA
    - Updates on changes within PHIPA
  • AI + Environment Automation = the PB + J of Observability
    AI + Environment Automation = the PB + J of Observability
    Maya Ber Lerner, CTO, Quali and Dror Mann, VP Product, Loom Systems Recorded: Jan 22 2020 28 mins
    Monitoring is a core Ops/SRE responsibility. If you operate an environment, you need to monitor it—this is Ops 101. But when releasing faster, monitoring the continuous output of code and infrastructure changes grows more challenging.

    Emerging technologies in AIOps and environment automation make it possible for Ops Engineers/SREs to take the practice to the next level; when paired together, they efficiently connect observability with DevOps—increasing speed without losing control.

    Join Maya Ber Lerner, CTO at Quali, and Dror Mann, VP Product at Loom Systems, in this fireside chat and demo as they reveal strategies for:

    -Connecting monitoring data to continuous delivery through Environment as a Service
    -Using AI to intelligently interpret data
    -Achieving stronger product reliability and accountability without slowing down innovation
  • Privacy: Regulatory Pressure is the Consequence of a Broader Problem
    Privacy: Regulatory Pressure is the Consequence of a Broader Problem
    Matthew Karnas, Senior Manager, Cybersecurity at EY Recorded: Jan 22 2020 48 mins
    Many organizations are feeling the pressure to find privacy compliance solutions as an ever-increasing number of regulatory requirements are being introduced locally, nationally, and globally. In their attempts to demonstrate prompt compliance with multiple regulations, organizations could be speeding past their actual privacy problems. To avoid a “tail wagging the dog” situation with a compliance-driven approach, organizations should focus on examining why these privacy regulations are being introduced in the first place In this webinar, we will discuss common privacy problems facing organizations through examples with an emphasis on the privacy needs of customers over compliance checklists.

    In this presentation, you will learn:
    The current state and drivers of organizational privacy programs.
    How to identify areas of focus within privacy programs based on customer needs which drives compliance requirements.
    How to lead discussions with colleagues in support of a customer focused, need-based privacy program at your organization.
  • Top 5 Data Predictions
    Top 5 Data Predictions
    Jason Nadeau Recorded: Jan 22 2020 35 mins
    As we concluded 2019, what can you expect in 2020 in terms of key data trends, particularly when it comes to cloud data lakes? Who will emerge as the winner in the cloud data game?

    Data usage is growing exponentially, and with this growth comes a variety of new use cases, challenges, and opportunities. Join this live webinar on January 21 at 11 am PT with Jason Nadeau, Dremio VP of Strategy, who looks to next year to predict the data technology trends that will impact businesses in 2020.

    Watch the webinar to learn:

    - What are the key data industry predictions for 2020?
    - What’s the future of cloud data lakes?
    - How can you take advantage of these data trends?

    Wherever you’re at on your data lake journey, don’t miss this chance to hear about the top data industry predictions for 2020. Can’t make it? Register anyway, and we’ll send you the recording.
  • Security without Boundaries: SASE Architecture for 2020 & Beyond
    Security without Boundaries: SASE Architecture for 2020 & Beyond
    Amit Bareket (Perimeter 81) and Jayant Thakre (SonicWall) Recorded: Jan 22 2020 40 mins
    Introduced by Gartner in 2019, Secure Access Service Edge (SASE) is a cloud architecture model that combines different functions of network and security solutions into a unified cloud security platform to be delivered as a service — without any or minimal hardware involved. This joint session between SonicWall and Perimeter 81 will explain why the SASE model was created, the challenges it's fixing and how the movement is redefining a future of network security without traditional perimeters.
  • Infrastructure migration for IT optimization in financial service
    Infrastructure migration for IT optimization in financial service
    James Labocki and Brad Davis, Red Hat Recorded: Jan 22 2020 34 mins
    With decades of technical debt inadvertently accumulating over the years in banks, insurance companies, and capital markets firms, IT departments are finding themselves blocked in their ability to adopt new approaches for digital innovation.

    Join us to discover how the Red HatⓇ infrastructure migration solution can help you:

    • Free capital from heritage system maintenance to investments for more innovative projects.
    • Migrate from expensive, proprietary virtualization technologies to more modern and efficient infrastructure.
    • Create your own migration plan to map existing infrastructure to this more modern approach.

    Featuring:
    James Labocki, Director of Product Management, Red Hat
    Brad Davis, Senior Director of FSI Solutions, Red Hat
  • Privacy-2020: A Millennial Perspective
    Privacy-2020: A Millennial Perspective
    Deveeshree Nayak, IT Security Professional Recorded: Jan 22 2020 42 mins
    Webinar Take-Aways:

    - What millennials think about privacy and What’s their expectation?
    - Diversity in Privacy in 2020
    - Impact on Criminology and Criminal Justice System in Privacy.
    - Career in Privacy

    About the Speaker:
    Deveeshree Nayak
    Faculty, School of Engineering & Technology (SET)
    University of Washington, Tacoma

    Disclaimer: My views in this webinar are my own.
  • Guide to Application Security: What to Look For and Why
    Guide to Application Security: What to Look For and Why
    Utsav Sanghani, Senior Product Manager, Staff, Synopsys; Anna Chiang, Product Marketing Manager, Senior Staff, Synopsys Recorded: Jan 22 2020 34 mins
    If your organization does software development in-house, there are many development workflows and processes to choose from. With all the different AppSec tools available (e.g., SAST, DAST, IAST), how do developers stay productive while ensuring that their code is secure?
    Register for this webinar to learn more about application security and how to leverage it in enterprise application development. You’ll learn:
    - About development workflows and the tools developers need to stay productive
    - How to evaluate different AppSec tools
    - What features to look for in an AppSec tool
  • The Edge: Mission Critical Computing
    The Edge: Mission Critical Computing
    Luca Beltramino, Senior Vice President, Global Programs, Uptime Institute Recorded: Jan 22 2020 55 mins
    Join us for a discussion about the growing opportunity to bring computing closer to both users and data for reasons of simplicity, quicker deployment and cost avoidance. We’ll explore what it takes to leverage this edge capacity in mission critical infrastructures as well as the key value and application drivers for these distributed deployments. In addition, we’ll demonstrate that the core requirements for mission-critical continue to apply regardless of deployment size, edge to core.
  • The Effects of Ransomware Don’t End with the Ransom for Healthcare Organizations
    The Effects of Ransomware Don’t End with the Ransom for Healthcare Organizations
    James McQuiggan, John Riggi Recorded: Jan 22 2020 60 mins
    Ransomware is back with a vengeance, impacting healthcare organizations like yours around the globe. While it appeared ransomware cases might be decreasing for a brief time, these incidents rose dramatically over the past year. This increase in malicious activity has serious business ramifications — from increasing downtime to causing revenue loss. Ransomware attacks also can impact an organization's' ability to treat patients.

    In this webinar, the American Hospital Association’s Senior Advisor for Cybersecurity and Risk will share an overview of cybersecurity. KnowBe4’s James McQuiggan will cover some of the emerging trends in ransomware. You’ll learn about the recent highly targeted attack vectors and what you can do to prepare before an attack.

    Attendees Will Learn:
    - The new ways offenders are using ransomware to take control of your network.
    - Best practices for defending against and recovering from ransomware attacks.
    - How to detect potentially threatening phishing and social engineering emails.
    - Actionable steps to take if your organization does become a victim.
    - How to create a “human firewall.”
  • Avoiding fines and lost licenses in the iGaming industry: why identity proofing
    Avoiding fines and lost licenses in the iGaming industry: why identity proofing
    Peter-Paul de Goeij (Dutch online trade association) | James Baston-Pitt (Onfido) | Trent Wyatt (GeoComply) Recorded: Jan 22 2020 59 mins
    Harm minimisation might be the biggest challenge facing the gambling sector, especially as iGaming reaches an ever-increasing volume of players. With increasing scrutiny coming from politicians and the media, there is an urgent need for a wide-reaching industry response. But how does the industry tackle such a complex issue quickly enough to avoid fines or lost licenses?

    This panel, moderated by Peter Murray (Director, Alexem Services) and comprised of Peter-Paul de Goeij (Managing Director, Dutch online trade association), James Baston-Pitt (UK accounts lead, Onfido) and Trent Wyatt (Consultant, GeoComply) will be discussing how operators can effectively understand the behaviours of their customers, what an at risk player looks like, and how identity verification can help them better know their customers and introduce effective harm minimisation initiatives.

    Key Learnings:

    - How to better identify at risk players and their behaviour
    - The importance of data integrity in assessing your player base
    - How identity proofing at onboarding can help
    - How to implement reliable identity KYC practices without increasing friction
  • Digital Identity and Connected Cars - Leveraging the Power of IAM
    Digital Identity and Connected Cars - Leveraging the Power of IAM
    Dr. Heiko Klarl, CMO, iC Consult Group and Gerhard Zehethofer, Vice President IOT, ForgeRock Recorded: Jan 22 2020 40 mins
    As vehicles become smarter and more connected, their technology relies on digital identity to personalise and secure the customer experience. For the fleet manager, insurance provider, consumer, and anyone else in the modern connected vehicle environment, knowing “who” can access “what” is essential.

    In this joint webinar with iC Consult and ForgeRock you learn how to build up your connected identity strategy. Not only will you create synergies with other business areas, you also gain speed and a shorter time to market when rolling out connected services and explore new business models.

    Webinars / Webcasts
    With your registration you agree that we submit your data to the Sponsor of this webinar to enable them to contact you and to do follow-up marketing. The legal basis for processing your personal data this way is our legitimate interest according to Art. 6 (1) (f) GDPR, which would be the participation of our sponsors, which contribute large portions of the costs of the Webinars / Webcasts.
  • EMEA cybersecurity predictions 2020
    EMEA cybersecurity predictions 2020
    Haider Pasha Recorded: Jan 22 2020 60 mins
    Wondering what 2020 will bring to the cybersecurity world?

    Join us for our Cybersecurity Predictions Webinar, where you’ll hear from Palo Alto Networks experts. This is an opportunity to learn about what awaits us in the upcoming year, from both an EMEA and Benelux standpoint.

    Join our chief security officer for:

    -Predicted trends for 2020
    -Global and local cybersecurity developments
    -A brief recap of the Ignite Europe conference and announcements

    Register today to get fully prepared for the new year.
  • How to build a profitable MSP Business Model for Backup and Storage-as-a-Service
    How to build a profitable MSP Business Model for Backup and Storage-as-a-Service
    Jon Brooks - Director of EMEA MSP Sales Recorded: Jan 22 2020 31 mins
    Learn more about how Cloudian Object Storage for vCloud Director enables VMware cloud providers to deploy and manage an S3-compliant storage environment that is fully interoperable with the broad industry ecosystem of S3- compatible applications.
  • [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020
    [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020
    Panelists: K Royal, TrustArc; Ilia Sotnikov, Netwrix, Dr. Else van der Berg, Datawallet; and Harold Byun, Baffle. Recorded: Jan 22 2020 77 mins
    The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

    The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

    On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.

    Learning objectives are to gain insights on:

    - Understanding the nuances, ambiguities and challenges of the CCPA;
    - Creating compliance programs in the midst of the unknowns;
    - Developing a strategic action plan to become CCPA compliant;
    - How to avoid expensive fines, class-action lawsuits, and injunctions;
    - Getting ahead of the curve and enabling your business with alternate data sharing and privacy preserving techniques.
  • Identity Verification for CCPA Compliance: Trial & Error
    Identity Verification for CCPA Compliance: Trial & Error
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Jan 21 2020 44 mins
    The California Consumer Privacy Act (CCPA), which went into effect on January 1, 2020, gives consumers the right to access, delete, or opt out their personal data. Under CCPA, companies are not only obligated to furnish, delete, or opt consumers out of the sale of their data, they’re also required to verify every requestor’s identity to avoid inadvertently sharing sensitive data with fraudsters.

    After a giant GDPR loophole was exposed, it quickly became understood how easily cybercriminals were fraudulently submitting data subject requests in order to gain access to personal data that isn’t theirs. While this is certainly one reason to incorporate adequate identity verification into the consumer rights request workflow, cybercriminals aren’t the only threats that businesses need to worry about.

    Opportunistic data protection and privacy lawyers will be proactively scrutinizing processes to see if companies will make mistakes and accidentally furnish data to the wrong person so they can sue on behalf of their consumers. Additionally, CCPA consumer rights requests will likely shine a light on companies’ data protection practices, as the 2019 Carlton Fields Class Action Survey indicated that the next wave of class action suits will result from data breaches.

    In this webinar, we’ll discuss potential DSR threats from three different groups: cybercriminals, privacy lawyers, and data subjects, and how to avoid attacks with proper identity verification that offers an appropriate level of assurance that’s compatible with business’ specific needs.

    Key Takeaways:
    The importance of getting an automated DSR fulfillment workflow in place to handle a high volume of requests securely, consistently, and compliantly
    The role identity verification plays in avoiding DSR denial of service attacks
    Discuss how to implement “reasonable” verification that is frictionless for consumers and lawyers, but that keeps the bad guys out
  • SkyStem: Seducing the Auditors with Internal Controls
    SkyStem: Seducing the Auditors with Internal Controls
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jan 21 2020 57 mins
    With the auditors approaching (or maybe they just never left), the accounting team needs to put its best foot (and documentation) forward in order to avoid a long and drawn out affair with the auditors. Join us in this webinar, where we share the best ways to build and maintain your internal controls infrastructure to impress your auditors and make the year-end audit as quick and painless as can be.

    Please note: CPE credit not available for this playback.
  • Aligning Application Security & Compliance
    Aligning Application Security & Compliance
    Ed Adams, President and CEO, Security Innovation Recorded: Jan 21 2020 49 mins
    Regulatory compliance mandates have historically focused on IT & endpoint security as the primary means to protect data. However, as our digital economy has increasingly become software dependent, standards bodies have dutifully added requirements as they relate to development and deployment practices. Enterprise applications and cloud-based services constantly store and transmit data; yet, they are often difficult to understand and assess for compliance.

    This webcast will present a practical approach towards mapping application security practices to common compliance frameworks. It will discuss how to define and enact a secure, repeatable software development lifecycle (SDLC) and highlight activities that can be leveraged across multiple compliance controls. Topics include:

    * Consolidating security and compliance controls
    * Creating application security standards for development and operations teams
    * Identifying and remediating gaps between current practices and industry accepted "best practices”
  • The Next Wave of Digital Automation
    The Next Wave of Digital Automation
    Jesse McHargue and Stowe Boyd Recorded: Jan 21 2020 59 mins
    Between paper-based processes, manual approvals over emails, and excel sheets being passed around things get lost, missed or bottlenecks are created. Automating these processes eliminates that. It’s time to adopt a modern framework of digital processes and forms.

    Join GigaOm Research and expert in digital transformation analyst Stowe Boyd and special guest from Nintex, Jesse McHargue.

    Learn a step-by-step approach to transitioning through process mapping and information capture, to process automation, data management and process intelligence.

    Watch the webinar to learn:
    - The six pitfalls of paper
    - Six degrees of digital transformation
    - Best practices for digital processes and forms
  • Top Five Privacy Predictions for 2020
    Top Five Privacy Predictions for 2020
    Daniel Barber, CEO and Co-founder, DataGrail and Anthony Stark, General Counsel, ZoomInfo Recorded: Jan 21 2020 39 mins
    Join this webinar to hear from DataGrail's CEO and Co-founder Daniel Barber and ZoomInfo General Counsel Anthony Stark to learn more about the compliance landscape for 2020 and the trends we predict for the year ahead that will impact privacy and legal professionals.

    As the systems have become more complex and the lines around ownership more blurred, the explosion in data collection - not just the volume but also the variety and velocity of data - has led to some major security and privacy concerns.

    While we’ve made headway with the data privacy regulations that exist today, we shouldn’t be surprised if consumers demand more. As we head into a new decade, 2020 will be the year that data privacy regulation finally takes off and the government begins to put stakes in the ground for a national privacy framework.
  • Mindhunter : Mon dialogue de 2 semaines avec une cellule de rançongiciel
    Mindhunter : Mon dialogue de 2 semaines avec une cellule de rançongiciel
    Stéphane Julhes, Security Presales Engineer France, SonicWall Jan 23 2020 9:00 am UTC 60 mins
    Rejoignez Stéphane Julhes, expert en sécurité de SonicWall, qui vous dévoilera le côté humain d’une cellule de rançongiciel moderne, et qui vous fera part de ses conseils pour les empêcher d’infiltrer votre organisation, de chiffrer vos terminaux, et de se propager à d’autres lecteurs et segments de votre réseau.
  • Mindhunter: My Two-week Conversation with a Ransomware Cell
    Mindhunter: My Two-week Conversation with a Ransomware Cell
    John Aarsen, SE - Benelux and Nordics, SonicWall Jan 23 2020 10:00 am UTC 60 mins
    Join SonicWall security expert John Aarsen as he gives you an inside look into the human-side of a modern ransomware cell, their advice on how to stop them from infiltrating your organization, encrypting your endpoints, and spreading to other drives and segments of your network.
  • The Next Wave of Digital Automation
    The Next Wave of Digital Automation
    Jesse McHargue and Stowe Boyd Jan 23 2020 10:00 am UTC 59 mins
    Between paper-based processes, manual approvals over emails, and excel sheets being passed around things get lost, missed or bottlenecks are created. Automating these processes eliminates that. It’s time to adopt a modern framework of digital processes and forms.

    Join GigaOm Research and expert in digital transformation analyst Stowe Boyd and special guest from Nintex, Jesse McHargue.

    Learn a step-by-step approach to transitioning through process mapping and information capture, to process automation, data management and process intelligence.

    Watch the webinar to learn:
    - The six pitfalls of paper
    - Six degrees of digital transformation
    - Best practices for digital processes and forms
  • 10 Jahre State of Software Security
    10 Jahre State of Software Security
    Julian Totzek - Hallhuber, Solution Architect at Veracode Jan 23 2020 10:00 am UTC 45 mins
    Für 10 Jahre verfolgt Veracode bereits den Status zur Softwaresicherheit. In unserer 10. Jubiläumsausgabe bestätigen wir das Teams einen großen Unterschied bei der Reduzierung von Sicherheitsfehlern machen können. Dieses Webinar befasst sich mit den bekannten Herausforderungen, denen Entwickler gegenüberstehen, bietet jedoch auch echte Gründe für Optimismus. Wir haben Veracode mit der Mission gegründet, die Software der Welt sichern zu machen. Diese Mission ist auch heute noch gültig, mit dem zusätzlichen Fokus, es Ihnen zu ermöglichen, mit Software, Innovationen zu entwickeln und die Welt zu verändern, ohne von Sicherheitsbedenken zurückgehalten zu werden.

    In diesem Webinar
    Informieren Sie sich über die Sicherheitsrealität von Anwendungsanbietern - die meisten Anwendungen entsprechen nicht den Industriestandards
    Sehen Sie, welche Sprachen die schlimmsten Sicherheitsverstöße aufweist
    Erfahren Sie, welche Fehler am häufigsten auftreten, wie häufig sie behoben werden, wie sie ausgenutzt werden und welche Kategorien zu den meisten Vorfällen führen
    Verstehen Sie, wie Teams in der Lage sind, die Sicherheitsfehler um das Fünffache zu senken
    Gewinnen Sie Einblicke darüber, wie Entwickler die durchschnittliche Zeit bis zur Fehlerbehebung (MTTR) um über 70% reduzieren können.
  • Mindhunter: Dos semanas de charla con una célula de ransomware
    Mindhunter: Dos semanas de charla con una célula de ransomware
    Alex Vázquez, Sales Engineer, SonicWall Iberia Jan 23 2020 11:00 am UTC 60 mins
    Únase a Alex Vázquez, experto en seguridad de SonicWall, que le presentará el lado humano de una célula moderna de ransomware y sus consejos para evitar que se infiltren en su organización, cifren sus endpoints y se propaguen a otras unidades y segmentos de su red.
  • Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Blue Prism RPA Platform Demo | Intelligent Automation & Digital Exchange Skills
    Daniel Welcel, Solution Engineer and Lisa Hackbarth, Global Marketing Jan 23 2020 11:00 am UTC 39 mins
    Join us for a 45-minute, interactive live demo. We’ll show you how Blue Prism’s connected-RPA platform works and answer your questions live.

    With the advent of Robotic Process Automation (RPA), today, humans and Digital Workers are working side by side.

    But how does it actually work?

    If you’re ready to see Blue Prism’s Intelligent Automation in action, join us for our next 45-minute demo where we’ll showcase the simplicity and security of the leading RPA platform on the market.

    In this foundational look at what it takes to implement Blue Prism connected-RPA, you will:
    • Experience the integral role that the human worker plays in our evolving workforce
    • Take a tour of the Blue Prism Process and Object Studio where you’ll teach your Digital Workers what to do and how to do it
    • Learn how to incorporate our pre-built, out-of-the-box processes without the need for coding, and get your Digital Workforce up and running quickly
    • See examples of processes that Digital Workers can help to automate
    • Learn how to manage your Digital Workers to achieve maximum productivity using the included Control Room, Work Queues, and Scheduler
    • Get a detailed look at Blue Prism’s security, access control, and audit log features that reduce automation audit risk

    Ready to unleash the human potential at your organization by freeing up your team to do the valuable, skilled work they were hired to do? Register to view the demo to take the next step on your digital transformation journey and get ready to see what’s possible.
  • Osterman Research: Why you need a third-party backup for Office 365
    Osterman Research: Why you need a third-party backup for Office 365
    Michael Osterman of Osterman Research; W. Curtis Preston Chief Technologist, Druva Jan 23 2020 11:15 am UTC 37 mins
    Do you think Office 365 is enough to protect your business data? Would you bet your career on it? Hear from industry expert, Michael Osterman of Osterman Research on how to step up your data protection game.

    Join us for this live webinar and learn how to:

    •Protect against ransomware, accidental deletion, or corruption
    •Better align and respond faster to compliance and legal inquiries
    •More efficiently manage departing employee and long-term archiving of data
  • Forrester: The Business Case for IT Analytics
    Forrester: The Business Case for IT Analytics
    Charles Betz, Principal Analyst, Forrester Jan 23 2020 4:00 pm UTC 66 mins
    IT Leaders are under a constant mandate to drive and support innovation throughout their entire organizations. All too often, however, this mandate is not accompanied by increased budget and resources forcing leaders to "do more with less." It is vitally important for IT leaders to have the visibility they need to continually monitor and tune their operations, enabling them to shift from fixing issues to driving innovation.

    How can you leverage IT Business Analytics to deliver value across your organization?

    Join Srikant Gokulnatha (Chief Product Officer at Numerify) and our guests, Charles Betz (Lead DevOps Analyst at Forrester), and Line Larrivaud (Forrester Consulting) as they share:

    - Why IT needs Business Analytics to transform customer experience, now more than ever
    - How you can save $4M through reduced incident volume, analytics automation, and better vendor management
    - What are the best practices for using AI and BI across the IT Planning, Development, and Operations functions
    - How customers can achieve a three-year 214% ROI with Numerify IT Business Analytics and other independent findings from our commissioned Forrester Consulting Total Economic Impact™ (TEI) study
  • New (and free) analysis tools for the cyber threat hunter
    New (and free) analysis tools for the cyber threat hunter
    Chris Doman, Tawnya Lancaster, Amy Pace, Michael Vaughn - AT&T Cybersecurity Jan 23 2020 5:00 pm UTC 59 mins
    Today’s threat detection systems are highly effective for most attacks however no single system can detect 100 percent of attacks all the time. In response, security teams are turning to proactive threat hunting to help find the bad actors in their environment that have slipped past initial defenses.

    Join AT&T Cybersecurity to see how you use the AT&T Alien Labs Open Threat Exchange (OTX™), among the world’s largest open threat-sharing communities, along with free malware and threat analysis tools to improve your threat hunting program.

    In this webinar, we’ll cover:

    ● New features in OTX for threat hunting, including how to submit suspicious files and URLs for analysis

    ● Enhanced functionality for our indicator of compromise (IoC) extraction tool, which now includes the ability to auto-extract indicators from emails and PCAP files

    ● How OTX can help you quickly identify and investigate new and evolving threat trends

    ● How Alien Labs is using analytics and machine learning for threat analysis that is then fed back into the OTX community
  • Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Proofpoint Live Demo: Prevent Phishing Attacks with Security Awareness Training
    Sean Walker, Enterprise Account Executive Jan 23 2020 5:00 pm UTC 45 mins
    99% of the phishing attacks Proofpoint observed in 2019 require human interaction to succeed, resulting in malware installation, wire fraud, unwitting data disclosures, and more. Educate your staff and limit cyber attacks through Proofpoint’s industry-leading security awareness training. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Join our live demo to learn how to:

    - Assess your users’ susceptibility to phishing attacks as well as other cyber threats
    - Deliver customized training to your end users that will drive behavior change, making them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • The 2019 Open Source Year in Review
    The 2019 Open Source Year in Review
    Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Jan 23 2020 5:00 pm UTC 60 mins
    Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, partner at DLA Piper and general counsel for the Open Source Initiative, and Tony Decicco, shareholder at GTC Law Group & Affiliates.

    This annual review will highlight the most significant legal developments related to open source software in 2019, including:

    •Evolution of open source: control, sustainability, and politics
    •Litigation update: Cambium and Artifex cases
    •Patents and the open source community
    •Impacts of government sanctions
    •The shift left for compliance and rise of bug bounty programs
    •And much, much more

    Live attendees will earn CLE credit for this webinar. Don’t miss out—register today.

    CLE:
    DLA Piper LLP (US) has been certified by the State Bar of California, the Board on Continuing Legal Education of the Supreme Court of New Jersey, and the New York State Continuing Legal Education Board as an accredited CLE provider.
    The following CLE credit is being sought:
    •California: 1.0 Credit (1.0 General, 0.0 Ethics)
    •New Jersey: 1.2 Credits (1.2 General, 0.0 Professional Responsibility)
    •New York: 1.0 Transitional & Non-Transitional Credit (1.0 Professional Practice, 0.0 Ethics and Professionalism)
    CLE credit will be applied for in other states where DLA Piper has an office with the exception of Minnesota, North Carolina, Pennsylvania, and Puerto Rico.
  • The Self-Defending Inbox: An Immune System for Email
    The Self-Defending Inbox: An Immune System for Email
    Mariana Pereira & Dan Fein Jan 23 2020 5:30 pm UTC 25 mins
    Email and collaboration platforms represent the connective tissue of any digital business. Information is shared, plans are hatched, and alliances are formed in the digital realm of written correspondence. Yet as a human-driven medium, email will always be fueled by a pervasive assumption of trust that stands as the ‘weakest link’ in an organization’s security strategy.

    Join Mariana Pereira and Dan Fein, Directors of Email Security at Darktrace, as they uncover how Cyber AI detected and responded to threats that emerged in the inbox.

    •WeTransfer phishing attack at a university
    •Supply chain compromise via email in the energy sector
    •CEO spoofing at an electricity disruption company
    •Spear Phishing attack at a US municipality
  • [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense
    [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense
    Panelists: Dr. Anton Chuvakin, Google Cloud; with Sumedh Thakar, Qualys; Roger Grimes, KnowBe4; and Vivian Tero, Illumio. Jan 23 2020 6:00 pm UTC 75 mins
    The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

    Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

    - Understand the changing cyberattack landscape,
    - Create a company-wide cybersecurity task force,
    - Evaluate your security budget against your threat level,
    - Fortify your cybersecurity defense with systems hardening, adaptive authentication, and endpoint protection.
  • Security Investigation: Restoring Calm from Chaos
    Security Investigation: Restoring Calm from Chaos
    Jae Lee Director, Product Marketing Splunk Inc. Jan 23 2020 6:00 pm UTC 66 mins
    Security teams are underfunded, understaffed and overwhelmed by constantly putting out fires. They struggle to deal with threats and attacks, while having to answer hard questions from management. Everyone is demanding detailed, accurate answers about cyberthreats and risk and compliance – and they all need answers NOW.

    So, how useful is it to know that you’re not alone, since others are in the same boat? The answer is “not useful at all.” What IS useful, is knowing how to work smarter and get answers faster.

    Join us in this one-hour technical deep dive and demo to learn:
    - How to analyze events from three common data sources to look for malicious activity
    - How to get more efficient at discovery, triage and the investigation of potential security incidents
    - How to leverage automation methods to accelerate investigations and get answers faster
  • Combat Phishing in 2020: How to Turn Links Into Read Only
    Combat Phishing in 2020: How to Turn Links Into Read Only
    Jonathan Lee, Sr. Product Manager - Menlo Security Jan 23 2020 6:00 pm UTC 53 mins
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • SD-WAN Cautionary Tale: Retailer Replaces Cisco
    SD-WAN Cautionary Tale: Retailer Replaces Cisco
    Mitesh Patel, VP of Engineering at CloudGenix Jan 23 2020 6:00 pm UTC 60 mins
    A large national retailer headquartered in Georgia USA recently deployed an SD-WAN solution in order to deploy Internet broadband, migrate to AWS and Azure cloud, migrate voice to UCaaS and enable new customer experiences at the retail stores.

    Unfortunately, after deploying an SD-WAN solution from their legacy vendor, the customer faced numerous challenges that threatened to erase the multiple benefits of an SD-WAN deployment and negatively affect their overall performance. The team faced issues with VPN scalability challenges, LTE, poor availability of key business applications, visibility and troubleshooting; as well as a very complex integration of cloud-security solutions.

    However, all was not lost! Learn the 4 crucial decisions the customer made to overcome their SD-WAN challenges, set their project back on track, and deliver tangible results to their business.
  • Deep dive with network connection plugins
    Deep dive with network connection plugins
    Ganesh Nalawade, Red Hat, and Nathaniel Case, Red Hat Jan 23 2020 7:00 pm UTC 41 mins
    In Ansible 2.6 release we added network_cli/httpapi/netconf as first-class connection plugins within Ansible. Most of the network platforms supported by the community still continue to use the local connection type.

    This talk will cover how to identify which connection plugin to use for a given network platform and do a deep dive into how to port existing modules from local connection to either nework_cli or httpapi or netconf for a particular network OS.
  • Podcast: Musings with Marc & Mary
    Podcast: Musings with Marc & Mary
    Mary Mack & Marc Zamsky Jan 23 2020 7:30 pm UTC 17 mins
    Marc Zamsky, COO at Compliance Discovery Solutions and Mary Mack, CEO and Chief Legal Technologist at EDRM muse about Legalweek upcoming, what to do and see, BIG news Compliance is sharing and industry trends.
  • SkyStem: From Caterpillar to Butterfly
    SkyStem: From Caterpillar to Butterfly
    Nancy Wu, Sales and Customer Support, SkyStem Jan 23 2020 8:00 pm UTC 58 mins
    [Live Recording] Metamorphosis describes the process of transformation from a child form to a mature form in two or more distinct stages. Within your organization, some of the key finance processes have worked the same way for decades, and could probably benefit from a transformation of sorts. Join us in this webinar where we explore common technologies that can be easy incorporated into your current processes to modernize the traditional workplace. We'll cover everything from time and expense reporting, to accounts payable, to budgeting as well as financial close automation.

    Please note: CPE credit not available for this playback
  • [Panel] Open Source in the Enterprise: Predictions for 2020
    [Panel] Open Source in the Enterprise: Predictions for 2020
    Chris Aniszczyk; Gil Yehuda; Kevin Wang; Taylor Udell Jan 23 2020 8:00 pm UTC 60 mins
    What will be the biggest challenges around Enterprise Open Source adoption in 2020?
    What do they experts predict for licensing? Security vulnerabilities? Code quality?
    How will enterprise usage of open source across the software team evolve in 2020? Beyond?

    FOSSA has assembled a panel of experts to share their forecast for Open Source changes throughout the coming year. Panelists include:

    * Chris Aniszczyk — founder of the TODO Group and CTO of the Linux Foundation

    * Gil Yehuda — Senior Director of Open Source, Verizon Media

    * Kevin Wang — founder and CEO of FOSSA and TLDRLegal

    Chris, Gil and Kevin will discuss their predictions around open source usage in the enterprise, and then open up the floor to Q & A.
  • Career Conversations with Olanike Akanbi-Ayomide
    Career Conversations with Olanike Akanbi-Ayomide
    Jessica Gulick, WSC VP Jan 24 2020 12:00 am UTC 60 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Host: Jessica Gulick, VP WSC

    Guest: Olanike Akanbi-Ayomide
    Olanike, founder of Mosaic Consulting, is an Equity, Diversity, and Inclusion (EDI) expert with experience integrating EDI into all aspects of workplace management and leadership. She is also the VP of Business Strategy, Operations and Engagement for the technology/cyber division of a Bank of America

    With nearly 20 years of organizational development experience in the non-profit and corporate sectors, Olanike founded Mosaic Consulting (www.mosaic4equity.com) to offer EDI training, coaching, and consulting to individuals and institutions seeking transformation. She partners with clients to achieve greater workplace equity via diversity and inclusion strategies that actually work!

    In her role as the VP of Business Strategy, Operations and Engagement of a cyber security organization, she leads organizational strategy including diversity and inclusion, workforce management, and designs and governs a change management program with enterprise-wide impact.

    She is obsessed with building equity in the world via diversity and inclusion (EvDI TM), starting with the workplace! She's also slightly obsessed with playing competitive tennis and has been known to play on up to 3 competitive leagues or ladders in the same season.
  • Il predatore: la mia conversazione di 2 settimane con un gruppo ransomware
    Il predatore: la mia conversazione di 2 settimane con un gruppo ransomware
    Antonio Cancellara, Sales Engineer, SonicWall Jan 24 2020 10:00 am UTC 60 mins
    Venite ad ascoltare l’esperto di sicurezza Antonio Cancellara di SonicWall, che vi farà conoscere il lato umano di un moderno gruppo ransomware, i suoi consigli su come impedire ad esso di infiltrarsi nella vostra organizzazione, crittografare gli endpoint e diffondersi ad altre unità e segmenti della rete.
  • Data-Driven Insights from Safely Combined Datasets
    Data-Driven Insights from Safely Combined Datasets
    Federico Benedetto, Product Manager, Privitar Jan 24 2020 5:00 pm UTC 30 mins
    Linkability between datasets is essential, as some of the most valuable insights in data science come from connecting different data sources.

    But as you combine these different datasets, the data becomes increasingly sensitive and at risk. Seemingly innocuous attributes can be combined together to give reveal sensitive information.

    This webinar will demonstrate how to safely collect and join data from various sources, as well as control linkage of disseminated datasets.

    Join this session to:

    - Learn about the benefits and risks of linking datasets.

    - Learn about the techniques that can be employed to control direct and indirect linkability with Protected Data Domains and generalisation techniques.
  • A Practical Data Privacy and Security Approach to FFIEC, GDPR and CCPA
    A Practical Data Privacy and Security Approach to FFIEC, GDPR and CCPA
    Ulf Mattsson, Head of Innovation, TokenEx Jan 24 2020 6:00 pm UTC 61 mins
    With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.

    This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.

    Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.