Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Facing Forward: Cyber Security in 2019 and Beyond
    Facing Forward: Cyber Security in 2019 and Beyond
    Christopher Porter, Chief Intelligence Strategist, FireEye Recorded: Dec 11 2018 57 mins
    As the door closes on 2018, we walk away armed with knowledge about what’s to come in 2019 and beyond. We know attackers will attack and defenders will be tasked with stopping them, but there is a lot more we can do to be prepared for upcoming threats and ensure we’re innovating faster than bad actors.

    Join Christopher Porter, Chief Intelligence Strategist at FireEye, as he shares his thoughts about cyber security in 2019. During the webinar, Christopher will touch on various topics discussed in our Facing Forward: Cyber Security in 2019 and Beyond report, which was developed based on insights from our senior leaders, FireEye Threat Intelligence, Mandiant incident responders, and FireEye Labs. Tune in to learn about:

    •Threats to the aviation industry, including cyber espionage and cybercrime
    •What to expect from established and emerging nation states
    •How threat actors are changing their tactics to stay ahead of defenders

    Register today to learn what lies ahead and stay one step ahead of cyber security threats.
  • Around the World with Privacy and Your Business
    Around the World with Privacy and Your Business
    Victoria McIntosh, Information and Privacy Professional, MLIS,CIPT, Information in Bloom Management Services Recorded: Dec 11 2018 54 mins
    Planning on doing business overseas? Establishing a new office in a foreign land, or selling online to consumers in a new country? When going over company requirements for working in your new neighbourhood, don’t forget to review corporate privacy practices.

    When it comes to privacy, expectations, safeguard minimums and rights of the data subject can vary between jurisdictions. From Canada and the United States, the European Union with its new GDPR, Japan, Australia, even between China and Hong Kong, there’s no single set of global standards. Fortunately however, many privacy legislations do contain common ground. There are also ways to proactively account for the differences.

    Information and Privacy Professional Victoria McIntosh presents a taste of privacy across the globe, with some of the ways businesses can prepare in dealing with data across borders.
  • Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Jacked, Extorted and Destroyed - The Threats of 2018 and Beyond
    Kevin Haley, Director Security Response, Symantec Recorded: Dec 11 2018 48 mins
    Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.

    Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.

    Key Learning Objectives:

    • Insights on cryptojacking, fileless threats and ransomware

    • Capabilities you need to protect yourself from these threats

    • Best practices for more efficient and effective endpoint security

    Please Join Us, Register Today
  • Threat Detection in TLS: The Good, the Bad, and the Ugly
    Threat Detection in TLS: The Good, the Bad, and the Ugly
    Ian Farquhar, Distinguished Sales Engineer, Gigamon Recorded: Dec 11 2018 59 mins
    While TLS (formerly known as SSL) has become the de facto way of encrypting data in motion on networks, it can also hide threats from your InfoSec team. As the volume of encrypted traffic continues to grow, organizations become even more vulnerable to encrypted attacks, hidden command and control threats and data exfiltration exploits that go undetected.

    To make this situation even more complex, the TLS 1.3 draft 28 proposal, ratified at the IETF 101 conference in London and now moving toward official RFC status, has actually removed the visibility which was widely deployed for threat identification in TLS 1.2.

    Once again, InfoSec teams find themselves at the fulcrum of a delicate balancing act. On one hand, encryption is moving toward ubiquity but on the other, we need to detect when threat actors use it too. And in detecting that misuse, we need to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns. For example, we can’t decrypt just at the edge of our networks if we believe “perimeter security is dead.” Proxies on the network edge are a step backwards.

    What can you do? “Threat Detection in TLS: The Good, the Bad and the Ugly” will discuss the necessity of deploying TLS decryption in the core of networks and will explore innovative architectures that deliver that capability while maintaining availability and reliability.

    Learn how organizations can manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.
  • Data Intelligence Drives Digital Business Success
    Data Intelligence Drives Digital Business Success
    Marcus MacNeill, SVP, Product Management, ASG Technologies Recorded: Dec 11 2018 39 mins
    In the digital era, an organization’s business strategy is inextricably linked to its data strategy.

    Yet increases in data volume, variety and velocity continue to challenge data management strategies and capabilities making it difficult for enterprises to effectively satisfy defensive (run the business) and offensive (drive the business) needs.

    In this session, we’ll explore the state of data management including key trends and their impact on the direction and evolution of ASG’s Data Intelligence offering.
  • Sunset of Windows Server 2008: Migrate with Docker Enterprise
    Sunset of Windows Server 2008: Migrate with Docker Enterprise
    David Hamdani Recorded: Dec 11 2018 33 mins
    The coming end-of-support for Windows Server 2008 leaves IT organizations with few viable options to receive security updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.

    Attend this webinar to learn how Docker can help you meet migration deadlines by providing a validated methodology for containerizing legacy Windows applications, quickly. The combination of the Docker Enterprise container platform and purpose-built tools, allow you to upgrade and improve application security and reliability; all while cutting costs by up to 50%.
  • Cracking The Code on OT Security
    Cracking The Code on OT Security
    Mille Gandelsman & Michael Rothschild Recorded: Dec 11 2018 67 mins
    A confluence of trends has caused the security of industrial operations to take center stage in the C-Suite. The convergence of IT and OT environments, migration of once isolated OT environments to IIoT, and of course increased targeting of industrial networks just to name a few. With these emerging trends, there is an even greater need to have 100% visibility, security and control across industrial environments.

    One of the key design decisions needed when implementing an industrial cyber security solution is the approach best suited for your industrial control environment - passive, active or hybrid. Join us for our next webcast where Mille Gandelsman, CTO and co-founder of Indegy will explain what “active” security is, what it does, why you need it, how it is safe and how to get there. Learn from Indegy's experience of implementing active technology for the past four years in some of the most demanding and sensitive environments globally, and gain the field knowledge needed to secure your industrial operations both now and into the future.
  • The No-BS Guide to Data Privacy in 2019 … and Beyond
    The No-BS Guide to Data Privacy in 2019 … and Beyond
    Kevin Moos, Kina Ratanjee, and Sarah Davis Recorded: Dec 11 2018 38 mins
    Now that data privacy has entered mainstream conversations around the world, some businesses are finding it difficult to separate fact from fiction — "Is an updated privacy policy all we really need?" "This company says their data tool will make us compliant — is that true?" "Can't I just use a survey to find out what we're doing with personal data?"

    Join Primitive Logic at our next webinar, where we'll bust the most common myths about data privacy as we show you how to adapt to the demands of our current environment and prepare for what lies ahead.

    You will learn:

    The most common myths around data privacy … and the real truth behind them
    How to build a foundation for alignment with present and future data privacy laws
    How to address the four key areas of data privacy compliance
    The realities of where technology products can help your compliance efforts
    Common challenges and pitfalls to avoid

    Speakers:

    Kevin Moos, President, Primitive Logic
    Kina Ratanjee, Delivery Director, Primitive Logic
    Sarah Davis, Senior Consultant, Primitive Logic
  • HR Data Privacy—Protecting Privacy in Global Diversity and Inclusion Initiatives
    HR Data Privacy—Protecting Privacy in Global Diversity and Inclusion Initiatives
    Jackie Wilkosz, Manager, Aleada Consulting & Bret Cohen, Partner, Hogan Lovells LLP Recorded: Dec 11 2018 49 mins
    Many companies are developing initiatives or programs to enhance the diversity and inclusiveness of their workforce and applicant pools. To implement such initiatives and track their progress, companies must collect, use, and store personal information such as race, gender, and ethnicity. Some jurisdictions consider these types of personal information sensitive and subject to special requirements or restrictions. Additionally, handling these types of data elements presents unique internal challenges for HR teams and data analysts.

    This webinar will explore ethical and privacy implications of corporate diversity and inclusion activities, with a focus on GDPR restrictions and requirements. We will discuss some best practice solutions for developing and implementing global diversity and inclusion initiatives that protect worker and applicant privacy while enabling companies to understand and enhance diversity and inclusiveness.

    Speakers:
    - Jackie Wilkosz, Manager, Aleada Consulting
    - Bret Cohen, Partner, Hogan Lovells LLP
  • The Rise of Targeted Ransomware
    The Rise of Targeted Ransomware
    Michelle Drolet, CEO, Towerwall Inc. Recorded: Dec 11 2018 32 mins
    What is targeted ransomware?
    Are you susceptible?
    What can you do to defend against it?
  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout Recorded: Dec 11 2018 61 mins
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    •The current threat landscape and unique security challenges healthcare organizations face
    •Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    •How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • IDC FutureScape: Worldwide Smart Cities and Communities 2019 Predictions
    IDC FutureScape: Worldwide Smart Cities and Communities 2019 Predictions
    Ruthbea Yesner, Vice President, Adelaide O'Brien, and Mark Zannoni, IDC Government Insights Recorded: Dec 11 2018 46 mins
    In this IDC FutureScape presentation, the IDC Worldwide Smart Cities team discusses the key predictions that will impact CIOs and IT professionals in the worldwide utilities industry over the one three to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.

    To learn more about IDC FutureScape 2019, please go to http://www.idc.com/events/FutureScape
  • 2019 Government Cybersecurity Predictions, Presented by Forcepoint & Raytheon
    2019 Government Cybersecurity Predictions, Presented by Forcepoint & Raytheon
    Forcepoint's George Kamis & Raffael Marty; Raytheon's Brett Scarborough Recorded: Dec 11 2018 53 mins
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your agency and the primary source of security breaches driving cyber risk to all-time highs.

    In 2019, attackers will stop at nothing to steal our identities, evade detection through new techniques, and bring disruption to our doorsteps. The stakes are high, the world more connected than we could have ever imagined.

    In this webinar, we'll examine topics such as:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale

    Join Forcepoint's Raffael Marty (VP Research & Intelligence) and George Kamis (CTO Global Governments & Critical Infrastructure) along with Raytheon's Brett Scarborough (Senior Manager, Cyber Business & Strategy Development) for a discussion around the most pressing cybersecurity issues for government – and what agencies can do to protect against them.
  • Siemens | Leveraging cognitive technologies to drive RPA innovation
    Siemens | Leveraging cognitive technologies to drive RPA innovation
    Nikolas Barth, Head of Innovation & Digitalization & Andrea Martschink, IT Strategy & Business Development Robotics, Siemens Recorded: Dec 11 2018 62 mins
    Innovation has always been at the heart of Siemens. In addition to being the largest manufacturing company in Europe, the German conglomerate continues to innovate in a startup fashion and has embraced Digital Transformation and has won their CIO Award based on the work they are doing with RPA.

    In this episode of our Blue Prism Café, discover how Siemens has been leveraging Robotic Process Automation as part of this Digital Transformation journey, and how their global RPA service, run jointly by the Shared Services and IT department, has enabled their lines of business in realizing true efficiency and quality gains along end-to-end processes. You will also get insight as and how they are leveraging some of the latest intelligent automation technologies such as IBM Watson, Celonis and MSFT Azure Chatbot Technology with their Blue Prism Digital Workforce.

    Key takeaways will include:
    • How Siemens built their RPA Centre of Excellence to future proof their RPA and Intelligent Automation Growth
    • Real-life scaled examples of automated processes across various lines of businesses
    • An overview of Siemens' use of Cognitive Automation leveraging RPA
    • Achievements and results from their service delivery model

    Speakers:
    • Nikolas Barth, Head of Innovation & Digitalization in Siemens Shared Services
    • Andrea Martschink, IT Strategy & Business Development Robotics
  • A View from the IT Practitioner: End User Predictions for 2019
    A View from the IT Practitioner: End User Predictions for 2019
    Michael Flouton - VP Security Strategy, Barracuda; Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd Recorded: Dec 11 2018 55 mins
    2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.

    We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.

    Join this webinar with Barracuda’s, VP Security Strategy, Michael Flouton and Erebus Technology's Jez Back, Founder & Principal, to find out:

    - What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
    - How their priorities have changed over the last 15 years and where they will focus for the next 15 years
    - Which cyber security trends have impacted their cyber security strategy
    - How to prepare your organisation for these new trends

    Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.
  • Can you protect against what you can’t see?
    Can you protect against what you can’t see?
    Richard Leadbetter, EMEA Security Technical Sales Specialist Recorded: Dec 11 2018 14 mins
    This webinar discusses how multiple levels of visibility are essential to the digital transformation process.
  • Emerging Cyber Threats for 2019
    Emerging Cyber Threats for 2019
    Steve Durbin, Managing Director, ISF LTD Recorded: Dec 11 2018 47 mins
    Organisations in 2019 will be increasingly faced with a hyper-connected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.

    In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:

    -The increased sophistication of cybercrime and ransomware
    -The impact of legislation
    -The myth of supply chain assurance
    -Smart devices challenge data integrity

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Dissecting XSS Flaw In Commercial Code: Why Open Source Isn't Your Only Concern
    Dissecting XSS Flaw In Commercial Code: Why Open Source Isn't Your Only Concern
    Matt Runkle, Application Security Consultant, Veracode Recorded: Dec 11 2018 49 mins
    It’s no secret that open source security is a hotly debated topic. However it’s important to keep in mind that commercially licensed third-party software carries much of the same risk as open source software. While helping a customer attain a Verified certification, one of Veracode’s application security consultants uncovered a cross-site scripting flaw in the popular Telerik Reporting project. The flaw has since been patched but it’s these types of unknown risks that organizations take when introducing third party code into their environment.

    During this talk, you’ll hear from Matt Runkle, the AppSec Consultant who uncovered the XSS flaw, to get insight into the mind of a hacker and hear how vulnerabilities like XSS are commonly exploited in third party software and how you can take action to prevent attacks like this in your own environment.
  • How to Ensure Your Applications are Secure by Design
    How to Ensure Your Applications are Secure by Design
    Chris Wysopal, Co-Founder and CTO, Veracode Recorded: Dec 11 2018 46 mins
    As software becomes a bigger component of the value delivered by companies in every industry, it’s no exaggeration to say that every company is becoming a software company.

    We find our customers pushing the envelope on how to tool up their internal software factory to make software better, faster and more efficiently. By necessity, software is more often assembled than it is created from scratch, as developers are more frequently incorporating open source libraries to speed up time-to-market. But as open source libraries increase, so do the number of vulnerabilities, resulting in increased risk.

    In this session, Veracode CTO Chris Wysopal talks about what it means to be secure by design, and why businesses need to focus on prevention. The days of detect-and-respond tactics are a thing of the past – we’re living in an age when the attacks will happen before you have the time to find and respond to them. Attendees will also learn about why an application security program is imperative to data protection, how to mitigate open source risk and ensure secure coding practices are in place to prove that security is a top priority for your organisation.
  • People Risk
    People Risk
    Grant Kennedy & Dr Aarti Anhal Recorded: Dec 11 2018 61 mins
    People are the single most important asset in any organisation, yet they can often be the most vulnerable. The opportunities and threats people present to the operations and strategic objectives of their organisations constitute “people risk” – an area of risk often ignored because of the perceived complexities involved in managing it effectively. This webinar will focus on “risk intelligence”, which refers to the way in which an individual’s values, risk competences and behaviours come together to drive their perception of risk, approach to risk-based thinking and decision-making. Th webinar will introduce the diagnostic tools that can be used by organisations to evaluate the “risk intelligence” of staff, whether in the operational 1st Line, the 2nd line’s risk and compliance functions or senior management.
  • Trends in the Industry: Setting the Stage on Open Source Trends
    Trends in the Industry: Setting the Stage on Open Source Trends
    Mark Curphey, VP of Strategy, Veracode Recorded: Dec 11 2018 42 mins
    Open source is here to stay. Iconic brands like Google, Facebook, and Twitter have pioneered the practice of building their platforms on a core of code that is shared with the public and free for anyone to use. Rather than build applications from scratch, today’s developers first look to third-party code to kick start their innovation in the form of open source libraries. Unfortunately, reusable code also means reusable vulnerabilities, and the bad guys are increasingly turning to attacking open-source. In a recent study by Veracode, a whopping 88% of Java applications had at least one flaw in an open-source library, leaving application security managers faced with the challenging question: how can we keep innovating quickly without introducing vulnerabilities into our code base?

    The solution is multi-faceted – part education, part technology, part process change. Join us for our Virtual Summit, The Open Source Conundrum: Managing your Risk, as we dig into all the pieces of this solution.
  • Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Ensuring Healthcare Delivery through Complete Visibility & Threat Defense
    Curt Aubley, VP WW Solution Architecture, CrowdStrike and Matt Hartley, VP Federal Solutions, ForeScout Recorded: Dec 11 2018 58 mins
    The Healthcare industry continues to be targeted by cyber threat actors. In 2018, large scale cybersecurity attacks caused disruptions in healthcare delivery, driving patient care operations to a grinding halt in several hospitals. Multiple breaches also exposed sensitive customer data for many thousands of individuals. Damages like these not only cost healthcare organizations billions of dollars, they can also hurt patient trust in the healthcare system and even risk lives.

    With limited security resources and budget, how should hospitals and healthcare providers approach cybersecurity to protect against current and future cyber threats?

    Join us to learn from Curt Aubley, VP Worldwide Solution Architecture at CrowdStrike and Matt Hartley, VP Commercial East & Federal Civilian at ForeScout as we discuss:

    • The current threat landscape and unique security challenges healthcare organizations face
    • Best practices on mitigating risk by streamlining network and endpoint security while maintaining systems and medical device reliability
    • How to maximize your security investments to provide your organization the greatest protection, security efficacy and operational efficiency
  • Defending Against Today's Sophisticated Attacks on Healthcare Organisations
    Defending Against Today's Sophisticated Attacks on Healthcare Organisations
    Axel Wirth, Distinguished Healthcare Architect Dec 12 2018 3:00 am UTC 67 mins
    In the eyes of cyber criminals, there are few targets more lucrative than healthcare organisations due to the comprehensive nature of the information held by them, and the high value of health data on the black market. And, it is not just about protecting information – cybersecurity incidents in healthcare can also impact hospitals' ability to deliver care, or could result in harm to patients should critical systems get taken down by a malicious actor.

    Join us in our upcoming 'Defending Against Today's Sophisticated Attacks on Healthcare Organisations' webinar as we discuss the specific cybersecurity challenges pertaining to the healthcare industry, including:

    • The latest threat trends and incidents
    • The challenges of securing healthcare ecosystems
    • Effective cybersecurity strategies
  • AWS Security: Securing AWS Workloads with Palo Alto Networks
    AWS Security: Securing AWS Workloads with Palo Alto Networks
    Dinah Barrett, Specialist Solutions Architect, AWS Marketplace & David Maclean, Cloud Engineer, Palo Alto Networks Dec 12 2018 9:30 am UTC 60 mins
    Today, AWS provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world with customers across all industries are taking advantage of low cost, agile computing.

    In this webinar, Dinah Barrett, Specialist Solutions Architect | Management Tools, AWS
    and David Maclean, Special Cloud Engineer, Palo Alto Networks will dive into the need for additional security, over and above native security to protect AWS workloads and developer environments, examining the shared responsibility model for cloud security & diving into specific use cases.
  • Why Is Open Source Use Risky?
    Why Is Open Source Use Risky?
    Adrian Lane, Analysis, Securosis Dec 12 2018 10:30 am UTC 43 mins
    When software development moves at the speed of DevOps, creating every line of code from scratch is simply not feasible. In turn, most development shops are increasingly relying on open source libraries to supplement their code.

    The use of these open source libraries is not in itself a bad thing, on the contrary, it’s best practice, and not taking advantage of this code would put your organization at a competitive disadvantage. The risky part lies with the visibility. What happens when it’s revealed that an open source library contains a major vulnerability? Would you know if you are using that library? What about where or how you are using it? Could you find out fast enough to patch it? Attend this session to get up to speed on open source library use, including its risks and best practices.
  • Find And Fix Open Source Vulnerabilities Within GitHub With WhiteSource Bolt
    Find And Fix Open Source Vulnerabilities Within GitHub With WhiteSource Bolt
    Victoria Oiknine, Project Manager at WhiteSource Dec 12 2018 11:00 am UTC 15 mins
    Meet WhiteSource Bolt for GitHub - the new free app which will allow you to harness the power of open source without having to compromise on security or agility ever again!

    WhiteSource Bolt continuously scans all your repos, detects vulnerabilities in open source components and provides fixes, all in real-time, in your GitHub native environment. The tool supports both private and public repositories, and covers over 200 programming languages.

    Sign up to this short webinar to learn more about the different capabilities of this new app and how to use it in your GitHub native environment.
  • Underground Cyber Threats: Social Engineering. From Staff to C-suite.
    Underground Cyber Threats: Social Engineering. From Staff to C-suite.
    Anthony St Clair and Farzad Seihoun Dec 12 2018 2:00 pm UTC 45 mins
    This webinar will provide insight into what Verizon anticipates will be the most prolific cyber threats for 2019. Members of the Verizon Threat Research Advisory Team offer their outlook on social engineering trends for the next twelve months, summarizing thousands of man-hours spent in customer investigations, along with our dark web research, threat libraries, and identified cyber anomalies drawn from our vast IP network. We will explain how Verizon addresses these types of threats on behalf of our customers, and our top recommendations for ways that organizations can take proactive steps on their own to secure their network.
  • Are You Compliant? Meet Complex Cybersecurity Regulations with PAM
    Are You Compliant? Meet Complex Cybersecurity Regulations with PAM
    Chad Carter Dec 12 2018 4:00 pm UTC 45 mins
    Meeting the ever-increasing array of IT security regulations can be intimidating, but failing to comply risks severe penalties. Can you afford to leave your most critical resources unsecured from insider threat and cyber attack, or to face millions in fines for non-compliance?

    Privileged Access Management (PAM) streamlines your organization's compliance with cybersecurity measures including GDPR, the NIS Directive, PCI DSS, HIPAA, and many other state- and industry-level regulations.

    Learn how you can tackle these standards with a simple all-in-one PAM solution for robust IT security compliance!
  • 2019 Predictions - What to Expect from Cybercrime in the Coming Year
    2019 Predictions - What to Expect from Cybercrime in the Coming Year
    Uri Rivner, Chief Cyber Officer, BioCatch Dec 12 2018 4:00 pm UTC 60 mins
    2018 seemed a dismal year for cybersecurity and identity. Massive data breaches, new forms of malware and increasingly sophisticated social engineering attacks hit businesses and consumers at a steady pace. This pace does not seem to be slowing down. Can we expect any better in 2019?

    In this webinar, BioCatch’s Chief Cyber Officer, Uri Rivner, will examine the top trends he sees happening in the industry in 2019. Uri has been fighting cybercrime for over 15 years, during which he lived through massive changes in the payments and banking industries. With faster payments now taking hold in Canada and the US, legislative changes coming to help thwart the rise of synthetic identity, large organizations making moves around passwordless authentication, artificial intelligence driving many more backend decision making processes and more, it is clear that 2019 will bring many new opportunities and challenges. Join us as Uri presents his predictions for what this means for financial institutions, global enterprises and digital identity at large.
  • IDC FutureScape: Worldwide Oil & Gas 2019 Predictions
    IDC FutureScape: Worldwide Oil & Gas 2019 Predictions
    Kevin Prouty, Vice President, IDC Energy Insights Dec 12 2018 4:00 pm UTC 60 mins
    In this IDC FutureScape presentation, the IDC Worldwide Oil & Gas team discusses the key predictions that will impact CIOs and IT professionals in the worldwide oil & gas industry over the next one to five years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within a typical five-year business planning cycle. Each prediction is assessed based on its impact (a mix of cost and complexity to address) and time frame to expected stated adoption level.
  • 2019: A Cybersecurity Reality Check
    2019: A Cybersecurity Reality Check
    David Morris, Barak Engell and Mark Rasch Dec 12 2018 4:00 pm UTC 90 mins
    Will 2019 bring any real transformative cybersecurity technology advancements that will have an impact? Tune into this controversial eye opening session on what's in store for 2019 in the cybersecurity space.
  • App and Network Attacks
    App and Network Attacks
    Akhilesh Dhawan, Director of Prod Marketing- Cloud and Darshant Bhagat, Director of Product Management, Citrix Dec 12 2018 4:00 pm UTC 47 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This webinar deep dives into:

    - Protection of applications from on-premise to the cloud
    - Hypervisor protection of servers before the threat hits the operating system
    - Device and user protection from external threats

    Learn how to proactively counter internal and external threats through analytics.
  • DigiCert Monthly Threat Briefing - December - 2018 in review, 2019 ahead
    DigiCert Monthly Threat Briefing - December - 2018 in review, 2019 ahead
    Jeff Barto and Angelique Pereira, Trust Strategists at DigiCert Dec 12 2018 4:00 pm UTC 60 mins
    Let's wrap up 2018 with a recap of last year's major events, and a forecast on what's coming next year.
  • Beyond Open Source Compliance: Security in M&A Due Diligence
    Beyond Open Source Compliance: Security in M&A Due Diligence
    Nabil Hannan, Managing Principal, Synopsys Dec 12 2018 5:00 pm UTC 30 mins
    The headline of Wall Street Journal article from March read “Due Diligence on Cybersecurity Becomes Bigger Factor in M&A.” In April, Gartner reported, “Cybersecurity is Critical to the M&A Due Diligence Process.” Companies that invest in open source license compliance as part of diligence are starting to dive more deeply into security issues.
     
    A first step in assigning the security of software assets is looking at known vulnerabilities in open source components. But, now as part of the Synopsys Software Integrity Group, Black Duck can bring much broader capabilities to bear to analyze the overall security of code assets, including proprietary code.
     
    This webinar will discuss application security issues at a high level and the security services that you can include with a due diligence audit.
  • The Evolution of the Secure Software Lifecycle
    The Evolution of the Secure Software Lifecycle
    Setu Kulkarni, Vice President Strategy and Business Development, WhiteHat Security Dec 12 2018 5:00 pm UTC 53 mins
    Findings from the 2018 Application Security Statistics Report on the evolution of the secure software lifecycle. WhiteHat partnered with Coalfire and NowSecure to produce the report.

    - How to measure the effectiveness of your application security investment to help mitigate overall business risk
    - How to defend your applications by evaluating how your vulnerability levels and remediation times compare with industry benchmarks
    - How to develop software more securely by partnering with the security team to adopt tools and methodologies compliant with your software development lifecycle (SDLC)

    Presented by Setu Kulkarni, Vice President Strategy and Business Development, WhiteHat Security
  • 2018 eDiscovery Year in Review
    2018 eDiscovery Year in Review
    Doug Austin and Tom O'Connor Dec 12 2018 6:00 pm UTC 60 mins
    2018 was a very busy and significant year from an eDiscovery standpoint. This year has had everything from new data privacy laws here and in Europe to the use of Internet of Things (IoT) devices in discovery to important trends regarding the use (or non-use) of Technology Assisted Review (TAR) to a landmark SCOTUS case regarding accessing cell phone location data without a warrant. What do you need to know about important 2018 events and how they impact your eDiscovery efforts? This CLE-approved* webcast will discuss key events and trends in 2018, what those events and trends mean to your discovery practices and predictions for 2019. Topics include:

    + Technology Competence Trends and Developments
    + CLOUD Act and the Microsoft Ireland Case
    + General Data Protection Regulation (GDPR) and California Data Privacy Law
    + Data Privacy and Cybersecurity Trends and Challenges
    + SCOTUS Ruling in Carpenter v. US
    + Technology Assisted Review (TAR) Trends
    + Internet of Things (IoT) Devices as Sources of ESI
    + Business and Investment Trends within eDiscovery
    + Form of Production Trends and Disputes
    + New Resources for eDiscovery Best Practices

    Presentation Leaders:

    Doug Austin is the VP of Products and Professional Services for CloudNine where he manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.
  • Protecting Payments During the Holidays: Your Guide to Prevent Credit Card Fraud
    Protecting Payments During the Holidays: Your Guide to Prevent Credit Card Fraud
    Cole Valadez, Integrations Manager, PayJunction; Aaron Lumnah, Semafone Dec 12 2018 6:00 pm UTC 60 mins
    With the Holiday Shopping Season now upon us, consumers are opening their wallets in earnest, with some estimates putting spending at over $1 trillion in the US alone. Brands everywhere can expect to see a huge spike in sales, and along with it, an increase in payment fraud. Not only does the influx of transactions make it harder to detect fraudulent activity, but swarms of temporary seasonal workers can become insider threats that compromise an organization’s security procedures.

    Join Semafone and PayJunction for an insightful webinar where you’ll learn the following:

    - Why payment fraud spikes during the Holiday Season
    - Ways to train and properly vet seasonal workers to ensure security
    - How to implement technology solutions to help cut down on fraud rates during this holiday season

    Make sure to reserve your seat by registering now!
  • Perception vs. Reality: How does the current state of Healthcare Cyber Preparedn
    Perception vs. Reality: How does the current state of Healthcare Cyber Preparedn
    Mark Sangster, Chief Security Strategist eSentire Dec 12 2018 6:00 pm UTC 60 mins
    Like recent Cyber targets, Marriott and Quora, Healthcare providers, insurers and med-tech firms present a rich target for cyber criminals, offering lucrative gains. eSentire conducted independent research, interviewing 1,250 senior executives, leaders and security practitioners to understand the risks that face their organizations, and the strategies and investments they are making to protect their businesses. What emerges is a paradox of perceived readiness when it comes to responding to cyberattacks, which is not supported by the underlying data when it comes to spend, security programs, reporting, and attack data from eSentire’s security operations centers.
    Recent cyber-attacks allow for a prescriptive baseline in order to explore those findings and delve into the conflicting evidence to provide a clear picture of where healthcare security stands, and where it needs to go to meet the threats posed by the cyber criminals actively hunting them.
  • Brinqa Enterprise Vulnerability Management Webinar - Part 3 of 4
    Brinqa Enterprise Vulnerability Management Webinar - Part 3 of 4
    Syed Abdur from Brinqa and Pezhman Nikpour from Slalom Consulting Dec 12 2018 7:00 pm UTC 32 mins
    Part 3: A real-world vulnerability management scenario

    In this part, we present a case study detailing vulnerability management at a Fortune 100 Utility company. The case study describes the challenges faced by this large organization and how they were able to systematically address them to achieve vulnerability management success. We will discuss process improvements, key risk and performance metrics, and the risk prioritization model implemented to ensure that critical assets and business functions were protected.

    If you have questions you'd like to submit before or after the webinars, we're here for you! Email me at troy.vera@brinqa.com or Tweet to @Brinqa using the hashtag #BrinqaWebinars
  • GRC & IT Security Series: Financial & Banking Service Regulations: SEC, PII, PCI
    GRC & IT Security Series: Financial & Banking Service Regulations: SEC, PII, PCI
    Jeffrey Lush, CEO and Co-founder, BAP Paul Schoeny, VP Cybersecurity, BAP Dec 12 2018 7:00 pm UTC 30 mins
    Join the GRC & IT Webinar Series for byte-sized sessions aimed at making federal regulations understandable and actionable. Often understanding the interpretation of SEC Cybersecurity Guidance, PII and PCI can be difficult and is often more of an art than a science. The objective of every organization is to provide cybersecurity protection and compliance with the standards established within these regulations. Join us to discover the steps you need to develop your cyber strategy and:

    -Understand the SEC, PII and PCI regulations
    -Focus on the security objectives all regulations are hoping to achieve
    -Learn how to leverage your existing cyber investment, augment the tools you already have for real-time threat detection
    -Understand how continuous monitoring of Policy control health can eradicate failing scores.
    -Automate cyber standards, policy, and compliance
    -Learn how to build and discover your cyber standard needs
    -Analyze and validate the implementation of those standards
  • Cybersecurity Trends for 2019
    Cybersecurity Trends for 2019
    Jonathan Cran, Head of Research and Jeff Aboud, Director of Product Marketing, Kenna Security Dec 12 2018 9:00 pm UTC 60 mins
    Every year the cyber threat landscape is different than the year before as new technologies replace the old and new means of digital disruption replace those that came before.

    2018 was anything but quiet with an uptick in cyber activity from major geopolitical actors, and vulnerabilities and techniques weaponized faster than ever. Despite fewer reported breaches in 2018, the cyber landscape continued to evolve rapidly.

    Join us for our next webinar: A Retrospective on Cybersecurity in 2018 and Trends to Watch in 2019; Kenna Security’s Jonathan Cran, Head of Research, and Jeff Aboud, Director of Product Marketing will dissect key data points to chart a path for how we must approach security challenges in 2019, as well as:

    - Major threat trends in 2018
    - Cybersecurity hype and lessons learned
    - Predictions for the next wave of cybersecurity challenges in 2019

    Take control of cyberthreats in 2019. Register now.
  • Symantec's Security Predictions: 2019 and Beyond
    Symantec's Security Predictions: 2019 and Beyond
    Dr. Hugh Thompson, Chief Technology Officer, Symantec | Nick Savvides, CTO APAC, Symantec Dec 13 2018 3:00 am UTC 45 mins
    The threat landscape is ever changing. New threats are rapidly evolving with increasing sophistication, leveraging new and advanced technology. With the new year being just around the corner, how can we be prepared for the shifting threat landscape?

    Join Dr. Hugh Thompson, Symantec Chief Technology Officer in our webinar, as he shares his thoughts on Security Predictions in 2019 and beyond. Based on insights gathered from our intelligence, he will touch on new trends that will likely take the limelight in the coming year.

    Learn more about:

    - How Artificial Intelligence (AI) will be leveraged in cyber security
    - How growing 5G deployment and adoption will catalyze new attacks
    - Where attacks will be targeted at

    Attend our webinar. Learn what to expect and be prepared in your security posture for 2019.

    Register Now »
  • Big-Guy Security for the Little Guy
    Big-Guy Security for the Little Guy
    Claudio Scarabello Director Product, APAC FireEye Inc Dec 13 2018 3:00 am UTC 60 mins
    Threats Actors Target Vendors to Large Organisations

    We observe that state-sponsored espionage groups steal intellectual property for economic advantage. While the main players appear to understand this threat, many smaller supply-chain vendors and contractors may not. The targeting of third-party vendors and contractors is a tactic these threat actors are increasingly using to spy on hardened targets. A recent discovery of a treasure trove of openly available sensitive data is a reminder and call-to-action for many smaller enterprises to improve their cyber resilience. Attend this session to hear more about this case and threat actors potentially using these tactics.
    Join if you’re from a large organization that needs to understand third-party risk or if you’re from a small organization that needs to demonstrate due diligence to your largest customers.
  • Could millennials be the key to ending the productivity crisis?
    Could millennials be the key to ending the productivity crisis?
    Mark Elwood, Marketing Director, TeleWare Dec 13 2018 10:00 am UTC 50 mins
    By 2025, it is estimated that 75% of the workforce will be millennials. With rapidly changing expectations on how, when and where employees want to work, technology is going to play an increasingly important role in attracting and retaining talent.

    Join our discussion to find out how the millennial demand for mobility in the workplace could help solve the productivity crisis. Our panel of experts will share their views on:

    • Understanding the needs of the millennial worker
    • The key steps to providing the right technology within your digital transformation programme
    • Why mobility and flexible working is the key to hiring and retaining a millennial workforce
    • Demonstrating the proven link between mobility and productivity

    This webinar will be hosted by Mark Elwood, Marketing Director, TeleWare. Panellists will include Andrew Fawcett, product manager, TeleWare and guest experts, Dr Lucy Green from Larato and Vicky Ryder from Microsoft
  • Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Bridge to Cloud: Using Apache Kafka to Migrate to AWS
    Priya Shivakumar (Confluent) + Konstantine Karantasis (Confluent) + Rohit Pujari (AWS) Dec 13 2018 10:00 am UTC 58 mins
    Speakers: Priya Shivakumar, Director of Product, Confluent + Konstantine Karantasis, Software Engineer, Confluent + Rohit Pujari, Partner Solutions Architect, AWS

    Most companies start their cloud journey with a new use case, or a new application. Sometimes these applications can run independently in the cloud, but often times they need data from the on premises datacenter. Existing applications will slowly migrate, but will need a strategy and the technology to enable a multi-year migration.

    In this session, we will share how companies around the world are using Confluent Cloud, a fully managed Apache Kafka service, to migrate to AWS. By implementing a central-pipeline architecture using Apache Kafka to sync on-prem and cloud deployments, companies can accelerate migration times and reduce costs.

    In this online talk we will cover:
    •How to take the first step in migrating to AWS
    •How to reliably sync your on premises applications using a persistent bridge to cloud
    •Learn how Confluent Cloud can make this daunting task simple, reliable and performant
    •See a demo of the hybrid-cloud and multi-region deployment of Apache Kafka
  • IBOR transition – a certainty not a choice
    IBOR transition – a certainty not a choice
    Scott O’Malia, ISDA, Ian Fox, Lloyds Banking Group, and Shankar Mukherjee, EY Dec 13 2018 3:00 pm UTC 60 mins
    After more than 40 years of relying on Interbank Offered Rates (IBOR) as a reference rate for more than $350 trillion in contracts across a range of financial products, the industry is preparing for a discontinuation of IBOR by 2021.

    The transition away from IBOR is a certainty, and will be significant for all market participants. The pace of the transition is rapidly accelerating with considerable developments in fallback language, selection of alternate reference rates (ARR), and increasing liquidity in derivatives and cash markets linked to the new ARR.

    The webinar will focus on the key market developments, transition timelines, market adoption and liquidity, term rates, and operational readiness. The panellists will discuss the pace of progress, leading practices, and key transition challenges.

    The panel will be moderated by Roy Choudhury, Principal, Global IBOR Leader, EY.

    Panellists include:
    ➢Scott O’Malia, CEO, ISDA
    ➢Ian Fox, Group Funding and Liquidity Management Director, Lloyds Banking Group
    ➢Shankar Mukherjee, UK IBOR Leader, EY

    Topics for discussion include:
    ➢Lessons learned from the “Dear CEO Letter” submissions and supervisory expectations
    ➢What is going to drive the adoption of ARR in the markets
    ➢Developing fallbacks for LIBOR and other key IBORs
    ➢What organizations can do to make the transition path easier and what they should focus on now

    For more information please visit ey.com/ibor.
  • Machine Identity Protection LIVE
    Machine Identity Protection LIVE
    Jeff Hudson, CEO, Venafi Dec 13 2018 5:00 pm UTC 75 mins
    As the number of machines on our networks continues to explode how can we make sure that connections and communications between them remain secure? A new era of machine identity protection begins on December 13 at 9 pmPT/12 pm ET.

    Join top industry analysts and executives for an hour of innovative and groundbreaking insights about bold new ways to extend your machine identity protection. Hear directly from industry leaders who are excited about this new development, including:

    •Andras Cser, Vice President and Principal Analyst, Forrester Research
    •Rich Baich, CISO, Wells Fargo
    •Armon Dadgar, Co-founder and CTO, HashiCorp
    •Dan Timpson, CTO, DigiCert
    •John Morgan, GM, Security Business Unit, F5 Networks
    •Jeff Hudson, CEO, Venafi

    Venafi’s goal is to provide organizations the freedom to operate with confidence through secure communication and connections, with a high level of trust in their machine identities on their network. Please join this innovative and ground breaking discussion about Machine Identity Protection. Register now!