Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked
    Cybersecurity Mythbusters: 6 Dangerous Cybersecurity Myths Debunked
    Louis Evans, Product Marketing Manager & Todd Thiemann, Director of Product Marketing - Arctic Wolf Networks Recorded: Apr 25 2019 48 mins
    At Arctic Wolf, we continually encounter IT security myths that persist among businesses of every size. Isn’t antivirus all you need for cybersecurity? Aren’t large enterprises the only ones affected by data breaches? 24x7 security monitoring is overkill, right? These myths can significantly impact strategic IT decisions and put your business operations at risk.

    These are the kinds of questions, myths, and cybersecurity urban legends we’ll explore in this webinar. Discover what’s true—and what’s simply a myth.

    The webinar covers:

    •6 common myths about cybersecurity and cyber risk
    •The threats these myths pose to your business
    •Cybersecurity facts you can use to protect yourself

    Let the Arctic Wolf Cybersecurity Mythbusters team educate and entertain you. Save your seat now!

    And click here: http://bit.ly/2B3lyFv for part one of our six-part “mythbuster” blog series.
  • Incident Response Masterclass: Investigate a Rogue Insider
    Incident Response Masterclass: Investigate a Rogue Insider
    Matt Radolec Recorded: Apr 25 2019 59 mins
    Join for a play-by-play of a live attack simulation and investigation of a rogue insider threat using DatAlert’s new DFIR capabilities.

    During this training session, our security analysts will execute a new attack scenario in our lab.

    Here’s the scenario:
    An insider was paid to exfiltrate sensitive organizational data
    To remain uncovered, he takes control on a service account
    Using the service account, he scans company filers for documents with indicating keywords
    Copies matching documents to his PC
    Creates an encrypted ZIP file
    To remain uncovered, he uses the service account to upload the ZIP file to an external Gmail account
  • Get a grip on cloud security: How to lasso your data and apps in Azure and AWS
    Get a grip on cloud security: How to lasso your data and apps in Azure and AWS
    Matt Peters is Chief Technology Officer at Expel & Peter Silberman is Director of Detection & Response at Expel Recorded: Apr 25 2019 43 mins
    The cloud is a new frontier and -- just like in those old westerns -- it sometimes seems lawless. Decision makers and developers with credit cards are moving their data to Microsoft Azure and AWS while IT rolls out Office 365. CISOs are getting left in the dust, trying to understand where all the data and apps went and -- once they find them --  figuring out how to reverse engineer security into the cloud.

    The good news is that a smart combination of controls, workflow and some of the basic tools your cloud providers give you can help you find and reign in outlaw activity.

    Good news: Matt Peters, Chief Technology Officer and Peter Silberman, Director of Detection and Response at Expel have your back. They’ll help you figure out how to think about cloud security and what approach makes the most sense for your organization.

    During this webinar, Peters and Silberman will lay out how to set up the right cloud security controls for your particular infrastructure mix, and how to create a workflow for your security team that supports those. Specific topics include:

    •A deep-dive look at how SaaS, infrastructure, and custom applications each require slightly different security controls

    •A new way to think about cloud security controls (Did someone say audit logs? Or configuration monitoring?) that’ll help you figure out what you should be doing based on the type of data you’re storing in the cloud and the cloud services you use

    •Real-world examples of companies that have already set up camp in the cloud and the new security controls and workflows they’ve created to support their new infrastructure

    Whether you’ve thrown a lasso or not, if your cloud security controls and processes could use some fine tuning or you’re just not sure where to start, then this session is for you.
  • Creating compelling customer experiences through MDM with Stibo Systems
    Creating compelling customer experiences through MDM with Stibo Systems
    Rob Long, Head of IoT & Senior Director Applied Technology at Stibo & Vishnu Samavedula, Senior Solution Engineer at MuleSoft Recorded: Apr 25 2019 35 mins
    Did you know that each retail customer transaction takes an average of 39 different backend systems to complete? Overlapping systems, complex backend integrations, and constant maintenance needs are crippling IT teams as they work to drive the innovation necessary to meet growing consumer expectations.

    This webinar examines how retailers are leveraging MuleSoft’s Anypoint Platform and Stibo Systems Master Data Management platform to bridge online and offline channels, resulting in deeper customer insights, simplified operations, and exceptional customer experiences. Retailers leveraging this approach are seeing an average of a 6% increase in profitability and a 6x increase in customer retention

    In this webinar, you will learn how to:
    - Streamline product lifecycle management processes with your eCommerce systems.
    - Leverage Master Data Management to gain visibility across inventory and customer data.
    - Deliver personalized customer experiences based on past behaviors and purchases.
  • Buying Down Risk in the New World of App Development - Imperva Part 2
    Buying Down Risk in the New World of App Development - Imperva Part 2
    Kim Lambert, Senior Product Marketing Manager, Imperva; Tim Garon (Moderator) Recorded: Apr 25 2019 47 mins
    In this era of rapid modern application development, organizations often deploy code into production with critical vulnerabilities that often lead to exploitation by cybercriminals. These bad actors are on the look-out, scanning for vulnerabilities that will allow them to establish a silent foothold into your environment. Join Imperva and (ISC)2 on April 25, 2019 at 1:00PM Eastern and discover a defense in depth security strategy to protect your most valuable web applications and your business from damaging cyber-attacks.
  • Take the Offensive: Unlock Your Siloed Content
    Take the Offensive: Unlock Your Siloed Content
    Tom DiRusso, ASG & Steve Studer, Zia Consulting Recorded: Apr 25 2019 43 mins
    Are you one of the many organizations with content in a variety of silos? You probably are – and you’re not alone - most organizations today are also siloed. It’s clear that this siloed approach creates a huge challenge for companies in meeting stringent compliance regulations. Sound familiar? Now, imagine if your Teams had the ability to search and action content as though it resided in one location – with easy access and usability. Get the picture?

    Join ASG & Zia to discover how you can gather and understand your content across various silos to ensure you are on the ‘Offensive’ with compliance regulations.

    During this session, we’ll discuss:
    - Why some of the largest financial institutions have taken an ‘Offensive Approach’ to managing static and streaming content to comply with laws and regulations
    - How you can federate, migrate and manage records in one place
    - New ways to identify, classify and dispose of records
    - Why it’s critical to have a records management solution that has a repository of records that is auditable and defendable
  • The Rise of Privacy in the Cloud Era
    The Rise of Privacy in the Cloud Era
    Neil Thacker, CISO, Netskope Recorded: Apr 25 2019 62 mins
    In a globally connected world where the number of cloud applications consumed by organisations rises daily, the challenges associated with protecting data and individual’s privacy are therefore also on the rise.

    In this webcast we will look at some of the challenges associated with privacy including:
    - Understanding contractual obligations
    - Managing the geolocation of data
    - Applying data transfers mechanisms and controls
  • [Earn 1 CPE] Key Steps to Identify Risk and Master Vendor Risk Management
    [Earn 1 CPE] Key Steps to Identify Risk and Master Vendor Risk Management
    Colin Whittaker, IRD; Jake Olcott, BitSight; Blake Brannon, OneTrust; Kelly White, RiskRecon; and Todd Boehler, ProcessUnity. Recorded: Apr 25 2019 78 mins
    In today’s interconnected technology ecosystem, companies increasingly rely on third party vendors to meet their operational needs. However, the current state of vendor risk management (VRM) is bleak. More than half of all information security breaches are caused by third-party vendors, and according to Deloitte 83% of today’s business leaders lack confidence in third party VRM processes.

    Understanding and managing cyber risk posed by vendors, suppliers, and third parties has proven to be a difficult task. The right mix of people, processes, and technology result in the most effective and comprehensive program. Join this CPE accredited panel webinar as our expert panel address some key steps to master VRM, including:

    - Implementing a scalable VRM program from the ground up,
    - Tips on managing vendor data and mapping the digital supply chain,
    - Assessing third, fourth, and fifth-party risk,
    - Performing quantifiable vendor security analyses,
    - Establishing pre-procurement standards.
  • Raising the bar on content moderation for social & gaming platforms
    Raising the bar on content moderation for social & gaming platforms
    Two Hat Security Recorded: Apr 25 2019 61 mins
    Social networks today are undergoing a massive paradigm shift when it comes to content moderation. From tragic shootings broadcast live on Facebook, to YouTube removing comments on children's videos due to child predator concerns, social platforms are under fire from users, governments, and law enforcement to adopt better technology and strengthen their content moderation practices.

    It’s not all bad news. Business leaders have also realized that accurate, efficient moderation, coupled with positive reinforcement, can increase user retention and encourage growth.

    But who is responsible for enforcing these policies and practices? How did hate speech, abuse, and extremism become the "cost of being online"? And how can like-minded businesses band together to raise the bar and make their social platforms engaging, safe for all users, and ultimately, more profitable?

    Join Two Hat CEO and founder Chris Priebe and veteran analyst and market influencer Brian Solis for an insightful talk about the changing landscape of online conversations and the role of content moderation. Social abuse and objectionable materials need no longer be the price of admission.

    Register today for this free event!

    You’ll learn:

    * How to start a dialogue in your organization around protecting your audience without imposing on free speech
    * The business benefits of joining the growing movement to "raise the bar"
    * Practical tips and content moderation strategies from industry veterans
    * Why Two Hat’s blend of AI+HI (artificial intelligence + human interaction) is the first step towards solving today’s content moderation challenges

    Speakers:

    * Brian Solis, Principal Digital Analyst at Altimeter, author of "Lifescale"
    * Chris Priebe, CEO & founder of Two Hat Security
    * Stewart Rogers, VentureBeat
  • Your Browser Betrays You
    Your Browser Betrays You
    Mark Sarbiewski and John Klassen Recorded: Apr 25 2019 45 mins
    Many believe your browser betrays you. Few have asked themselves: What is the cost of running a “free” local web browser in your organization? Can IT take control of the off-the-shelf unmanageable non-secure app that comes with our computers? Join this webinar to learn how IT can take control using a more secure, anonymous, disposable, productive, and compliant option to the web browser.
  • How to Get Hired for Top Cyber Security Job with No Degree – Part 2
    How to Get Hired for Top Cyber Security Job with No Degree – Part 2
    Dr. V. N. Berlin, CEO, Mission Critical Institute, Rob Chubbuck, Information Assurance Systems Engineer, CACI International Recorded: Apr 25 2019 63 mins
    Hear from a top cyber security employer exactly how you can get hired for a cyber breach prevention job without a degree in this four-part webinar series.

    Let Rob Chubbuck, senior cyber security expert at CACI International, tell you how he decides to hire candidates without degrees to cyber security teams.

    This webinar series will take you inside the recruiting process and you will learn the answers to these questions:

    1. How big is the opportunity for cyber breach prevention?
    2. How fast is that opportunity growing?
    3. Why will he consider candidates without a degree?
    4. What skills does he look for in a candidate?
    5. What tools does he want a candidate to have experience using?
    6. What experience should a candidate have for him to consider without a degree?
    7. What personal characteristics are essential to him?
    8. What academic credentials does he want a candidate to have?
    9. What additional academic credentials does he want a candidate to earn?
    10. What certifications does he want a candidate to have?
    11. What additional certifications does he want a candidate to earn?
    12. What does he look for in a resume to schedule a phone screen?
    13. What must a candidate do in a phone screen to get the interview?
    14. What kinds of questions are asked in the interview?
    15. What answers does he look for?
    16. What professional development plans does he want candidates to have?

    This unique webinar series will tell you exactly what motivates an employer to hire a candidate without a degree into a top cyber breach prevention position.

    Seating is limited to 75, so register now to reserve your spot!

    ADDED WEBINAR BENEFITS: Register for the webinar and download the attachments to prepare for the interview. Download the CCRMP Career Readiness Assessment and schedule an interview with an MCI Cybersecurity Education Specialist to fast-track your cyber security career today.

    Also included are complimentary $500 CISSP Exam Vouchers and $1995 CISSP Exam Prep Course Vouchers.
  • It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    It’s OK to be Selfish: Getting the Best of CTI Sharing Without the Hassle
    George Johnson, Vice President of Cyber Solutions, NC4 and Thanh Nguyen, Vice President of Technology, NC4 Recorded: Apr 25 2019 43 mins
    We get it: sharing information about cyber threats is cumbersome, and all the barriers to sharing just make it sound exhausting. Your first responsibility is to protect your organization, but what if you could do that and share intelligence at the same time without additional work?

    NC4® is a leader in providing sharing communities the tools they need to be successful, and we’ve learned a thing or two over the years. In this presentation, we’ll talk about the barriers to information sharing and the lessons we’ve learned in overcoming them. When it comes to information sharing, see how you can be selfish and altruistic at the same time without breaking a sweat.
  • Top 10 Application Security Vulnerabilities for Developers
    Top 10 Application Security Vulnerabilities for Developers
    Mark Rogan, DAST Manager, WhiteHat Security & Calvin Nguyen, Director of Product Management, WhiteHat Security Recorded: Apr 25 2019 33 mins
    Today’s applications touch millions if not billions of people on a daily basis. With virtually every business using applications to grow, they are critical to companies’ success—yet the vulnerabilities and risks associated with them continue to increase exponentially.

    To help educate the market on avoiding breaches of this nature, the experts at the WhiteHat Security Threat Research Center (TRC) have compiled a Top 10 Application Security Vulnerabilities for Developers, detailing the most common web exploits used by malicious attackers during the past 12 months.

    Join Mark Rogan from the WhiteHat Security Threat Research Center and Calvin Nguyen, Director of Product Management, as they discuss the top vulnerabilities and give valuable prevention tips for enterprises to implement.
  • [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    [Panel] Harnessing Knowledge: The State of Enterprise Application Security
    Daniel Blander, Virtual Clarity (Moderator), Joseph Feiman, CSO, WhiteHat Security & Paul Farrington, CTO, Veracode EMEA Recorded: Apr 25 2019 61 mins
    As organizations strive to transform themselves for the digital economy, application development is moving further into the spotlight - and right behind it is application security.

    So in 2019, AppSec can make or break a business. Instead of being overwhelmed by this pressure, there are tools and processes on the market that can help your application both meet and exceed business and security demands.

    From infrastructure-as-code models to API security and DevOps, learn from this panel of global experts how to harness knowledge and accelerate application release cycles, improve security and transform your business.

    Moderator: Daniel Blander, Virtual Clarity
    Panelists:
    Joseph Feiman, Chief Strategy Officer, WhiteHat Security
    Paul Farrington, CTO, Veracode EMEA
  • Email Security.cloud: A walkthrough of the latest product enhancements
    Email Security.cloud: A walkthrough of the latest product enhancements
    Jimmy Lin, Sr. Product Manager, Symantec Recorded: Apr 25 2019 61 mins
    On 29 March 2019, we further extended the capabilities of Symantec Email Security.cloud. As a SaaS security service, it undergoes many upgrades throughout the year, allowing us to make improvements and add new capabilities. We have always understood the importance of ensuring our products are designed around the user’s needs. This is critical as our customers rely on Symantec to provide a highly practical solution.

    In this webinar, we’ll do a deep dive into some of the recent enhancements of our Email Security.cloud solution:

    Indicators of Compromise Blacklisting
    Service Configuration Health
    Symantec Email Security.cloud App for QRadar
    And more
  • How to Classify and Protect Your Data in One Easy Step
    How to Classify and Protect Your Data in One Easy Step
    Bill Belcher, Amit Kharat, Kristina Scott Recorded: Apr 25 2019 45 mins
    Recent innovations have made data security achievable for organizations of all sizes and industries. It’s now possible to quickly and effectively reduce the risk of data breaches and leaks.
    Get up to speed with the 5 innovations every Security and IT professional should be aware of – to gain the confidence that their organization’s most sensitive information stays secure, these include:

    1. Classification-driven protection
    2. DLP-driven protection
    3. Email auto-protection
    4. Automated protection with enterprise applications
    5. Orchestrated policy management, identity federation, and data tracking for compliance

    Join this webinar to learn how integrated data classification and data protection from two industry leaders, Boldon James and Seclore, makes data security as straightforward as 1-2-3.
  • Show and Tell: Discover Blue Prism v6.5 & Digital Exchange Updates
    Show and Tell: Discover Blue Prism v6.5 & Digital Exchange Updates
    Robert Nicklin, Product Owner, Blue Prism | Bart Peluso, SVP of Product Marketing, Blue Prism Recorded: Apr 25 2019 60 mins
    Join us on April 25th for a preview of find out what is coming with Blue Prism’s v6.5.

    The latest version of our software will include:

    • Full Japanese and simplified Chinese language capabilities - Through a simple drop-down box a customer can select their preferred language on the Blue Prism UI.
    • Data gateways - A new mechanism that allows customers much more control of their data, with the option to send data as duplicates of what is stored in the BP database or to send the information only to the external end point, significantly reducing the amount of database space used for data storage.
    • IPv6 support - Through this feature Blue Prism customers can be confident our connected-RPA platform is ready to evolve with customer environments as they plan, test and take actions to start their transition to using IPv6.
    • Latest updates from the Blue Prism Digital Exchange

    Speakers:
    • Robert Nicklin, Product Owner, Blue Prism
    • Bart Peluso, SVP of Product Marketing, Blue Prism
    • Richard Pauly, Head of Digital Exchange, Blue Prism

    If you have a burning product question to ask, make sure to pre-register and join us on April 25th for this live webinar. If you can’t make it on the day, you can easily watch a recording of the session from our webinar page, after the event.
  • Top Cybersecurity Practices (HICP) to Mitigate Cyber Threats in Healthcare
    Top Cybersecurity Practices (HICP) to Mitigate Cyber Threats in Healthcare
    Erik Decker, CISO & CPO, University of Chicago Medicine & Ellen Sundra, VP of Engineering at Forescout Recorded: Apr 25 2019 59 mins
    Join Erik Decker, Chief Information Security Officer and Chief Privacy Officer of the University of Chicago Medicine and Ellen Sundra, VP of Engineering at Forescout, to learn how to protect patients by applying the recommended principles and practices from Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients (HICP).

    Over the past decade, threats to the health care industry has increased dramatically along with the sophistication of cyber-attacks. As a result, the Healthcare Sector Coordinating Council and the US Department of Health and Human Services collaborated to establish cybersecurity practices that can be used across the healthcare industry. Our guest, Erik Decker, serves as the industry lead on the development of, “Health Industry Cybersecurity Practices (HICP)”, which resulted from insights of the task group and over 150 health IT professionals.

    Ellen Sundra leads this discussion to gain insights into actionable steps that health industry IT and HTM security professionals can establish, implement and maintain in their organizations to thwart cyber-attacks before they occur.

    What you will learn in this webinar:
    - How to reduce risk to the business by implementing solid security practices
    - Which are top security practices to consider when facing some of healthcare’s top issues
    - How using policy-based controls can simplify processes and protect the organization
  • Qualité des données : reprenez confiance dans vos prises de décision
    Qualité des données : reprenez confiance dans vos prises de décision
    Anass Bezzari, Senior Pre-Sales Consultant Recorded: Apr 25 2019 41 mins
    Selon une étude de la Harvard Business Review, en moyenne 47% des nouvelles données ont, au moins, une erreur importante.

    Que vos données soient structurées, non structurées, stockées sur site ou dans le Cloud, vous devez pouvoir vous fier à leur exactitude. Vous concrétiserez leur valeur métier en veillant à ce que tous les projets et les processus importants soient alimentés en données fiables et pertinentes.

    Avec les produits de qualité et de gouvernance des données d'Informatica, vous avez la possibilité d'accroître la valeur métier en veillant à ce que tous les projets et les processus importants soient alimentés en données fiables et pertinentes.

    Participez à ce webinar jeudi 25 avril à 14h30.
  • Quoi de neuf chez Box? 
    Quoi de neuf chez Box? 
    Vincent Lieffroy, Senior Lead Engineer Recorded: Apr 25 2019 43 mins
    Les entreprises doivent agir plus rapidement que jamais dans un monde caractérisé par une hyper-concurrence et par les attentes grandissantes des clients.
    C'est pourquoi nous avons conçu le Cloud Content Management (CCM) - une plate-forme unique pour accélérer vos processus métier, augmenter la satisfaction de vos employés et protéger vos informations les plus précieuses. Découvrez les nouveautés du cloud content management (CCM) en assistant à ce webinaire:

    - Collaboration aisée et sécurisée dans Google Docs, Sheets et Slides, grâce à notre nouvelle intégration avec G-Suite
    - Productivité permanente avec Mark for Offline - emportez vos fichiers Box avec vous lorsque vous n'êtes pas en ligne (vos modifications sont automatiquement enregistrées dans Box lorsque vous vous reconnectez)
    - Des workflows de contenus fiabilisés avec Box pour ServiceNow Integration Hub
    - Des cycles de développement d'applications accélérés avec Box Elements
  • Get Enterprise Provisioning Right Finally
    Get Enterprise Provisioning Right Finally
    Alex Binotto - Sr. Product Manager, One Identity Recorded: Apr 25 2019 46 mins
    Discover how to take the risk out of enterprise identity and access management by managing the challenges of distributed applications and an ever-changing workforce.

    This webinar discusses what to look for in an IAM / IAG solution, and shows best practice examples of:

    - How to react to business changes within the user lifecycle
    - How to ensure people's permissions and access are appropriate to the business function they perform
  • 5 Steps to Delivering Many Sites, Lowering Costs, and Improving Governance
    5 Steps to Delivering Many Sites, Lowering Costs, and Improving Governance
    Jenni Lee, Product Marketing Manager, Acquia Recorded: Apr 25 2019 28 mins
    In this webinar, we will cover the following topics:

    - How to transform your IT digital team from a “bottleneck” to a trusted service provider
    - How to implement a site-governance strategy across your organization
    - Best practices for expediting website development and delivery
  • The changing face of Privileged Access Management
    The changing face of Privileged Access Management
    Tyler Reese, One Identity Recorded: Apr 25 2019 41 mins
    Discover how a next-generation PAM solution can help your organisation address common challenges such as:

    - How to secure solutions that protect privileged accounts
    - How to satisfy both auditors and admins with frictionless security
    - How to leverage the cloud without sacrificing security
  • Live Demo: Email Fraud Defense
    Live Demo: Email Fraud Defense
    Ash Valeski, Director Product Management, Proofpoint Recorded: Apr 25 2019 30 mins
    Email fraud often doesn’t use malware attachments or malicious URLs, making it invisible to even “next-generation” email defenses.

    Proofpoint Email Fraud Defense provides a comprehensive solution that stops all forms of email fraud, no matter the tactic used or the person being targeted.

    Join us for a live demo of the Proofpoint Email Fraud Defense and learn how to:

    •Block malicious emails spoofing your domains before they reach your VAPs, or Very Attacked People

    •Monitor all inbound impostor threats from your domains and those of third parties

    •Accurately distinguish between legitimate emails and fraudulent emails
  • Want Better Network Visibility with Less Complexity? Here's How!
    Want Better Network Visibility with Less Complexity? Here's How!
    Bob Laliberte, Senior Analyst, ESG and Sam Kumarsamy, Senior Product Marketing Manager, Gigamon Apr 29 2019 8:00 am UTC 53 mins
    Enable IT Collaboration with a Common Distributed Data Services Layer.

    The IT environment is rapidly changing, becoming more distributed and complex as organizations transform themselves to provide better digital experiences. Because these improved experiences will be more dependent on the network, it’s imperative for organizations to properly plan and prepare now to eliminate security blind spots. The bottom line is that companies need complete visibility into their physical, virtual and cloud infrastructure to detect and contain data breaches and mitigate risk.

    To accomplish this, successful organizations resist the legacy mentality that relies on more people and more tools at every location. Instead, they are turning to a new architectural approach that disaggregates the speed of the network from the speed of the tools inspecting traffic on that network. This innovative approach allows enterprises to absorb change in network speed and technology without compromising security.

    ESG believes the foundational step in this approach is to ensure comprehensive infrastructure visibility across data centers and distributed edge and cloud environments. To do this, organizations must have a common distributed data services layer that can collect, process and distribute the right information to the right tools at the right time.

    Join us to learn how a consolidated network architecture that includes security delivers better visibility, reduces complexity and increases tool efficiency.
  • What's New in Test Data Manager (TDM) 4.8?
    What's New in Test Data Manager (TDM) 4.8?
    Jeff Hughes and Keith Puzey Apr 29 2019 5:00 pm UTC 60 mins
    CA Test Data Manager has just released version 4.8 with exciting new features including Portal Masking which includes an independent masking engine and Docker-Based masking. These new features, along with others, will help your testing teams speed up the process of finding and delivering test data when it's needed. Join Jeff Hughes and Keith Puzey for a complete discussion and demonstration of the latest features in TDM 4.8
  • Leading with threat intelligence – How to select the right security provider
    Leading with threat intelligence – How to select the right security provider
    Shantanu Mahajan, Regional Security Architect at FireEye Apr 30 2019 5:30 am UTC 60 mins
    Today’s sophisticated attackers often hide within the noise of abundant alerts generated by a myriad of security products. Limited budgets, a shortage of skilled security staff, and rigid regulatory requirements make it difficult for organizations to effectively identify and understand these threats—negatively affecting risk-based decision making and asset protection.

    Effective cyber security requires an understanding of who is likely to target you, and how they operate.

    As security leaders and executives turn to service providers to evaluate their security maturity, manage business risks and build sustainable security programs, they often ask ‘how do I select the right security partner for my organization?’

    Join Shantanu Mahajan, Regional Security Architect at FireEye, as he shares insights on:

    • Selecting the right service provider for your organization
    • Realizing limitations of providers who apply traditional and compliance-focused approaches
    • Working with providers who intimately monitor attackers across the evolving threat landscape
    • Understanding the role of cyber threat intelligence in effective cyber security services
    • Asking the right questions of your security providers to enable critical business decisions
  • How to have it all - Mobility, Productivity and Employee Engagement
    How to have it all - Mobility, Productivity and Employee Engagement
    Mark Elwood, Director Marketing Apr 30 2019 8:00 am UTC 27 mins
    Research indicates employees that work remotely are more likely to feel anxious, isolated and have higher levels of technology related frustration than office-based staff. So, finding ways of connecting people, so they can be as productive, engaged and satisfied is key.

    Find out how TeleWare helped a tier 1 bank improve their mobile communications as part of their digital transformation programme.

    Join Mark Elwood, Director Marketing as he discusses:

    • How digital transformation projects are creating more productive, remote employees
    • How Re: Call is helping businesses take a new approach to mobile communications
    • What you can do to create connected, collaborative and productive employees
  • Airheads Tech Talks:  Clarity and AirWave Glass
    Airheads Tech Talks: Clarity and AirWave Glass
    Sreedhar R, Aruba TAC Team Apr 30 2019 9:00 am UTC 90 mins
    Clarity is a new module that interacts with Aruba AirWave to deliver powerful and intuitive forensics, allowing IT teams to anticipate and quickly resolve connectivity problems before the user is affected. AirWave Glass is built from grounds up using the latest cloud computing technologies primarily the ELK (Elastic, Logstash, Kibana) stack. Unlike the master console, Glass aggregates and stores the data that is required to build dashboards and reports onto the platform itself.

    During this webinar we will cover the below topics:

    · Clarity configuration & Workflow
    · Basic Clarity troubleshooting.
    · AirWave Glass Basic Workflow.
    · Glass and AMP configuration.
    · Basic Glass troubleshooting
  • What's new in G-Cloud 11?
    What's new in G-Cloud 11?
    Nicky Stewart, Commercial Director at UKCloud Apr 30 2019 10:00 am UTC 60 mins
    Join our Commercial Director Nicky Stewart as she guides you through :
    - What's new in G-Cloud
    - Important G-Cloud Rules, Guidelines, Dates and Deadlines


    and much more..

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Making Applications and Docker Containers Secure with Veracode
    Making Applications and Docker Containers Secure with Veracode
    Julian Totzek-Hallhuber, Solutions Architect at Veracode Apr 30 2019 10:00 am UTC 45 mins
    Containerisation of software is helping firms to completely change how applications are deployed to meet the demands of the business. The technology has the potential to radically reduce the cost of ownership of capability, and puts enormous power in the hands of the DevOps engineer.

    These benefits also change the nature of how risk may need to be addressed in the development lifecycle. Not only does the software application need to meet the security standards of the organisation within the Docker Container, but also the base image needs to be free from exploitable vulnerabilities.

    Join Julian Totzek-Hallhuber - Solution Architect at Veracode - for this live webinar where he will explore approaches that embrace the secure use of containers in pipelines.
  • Disrupting the Payment Sector
    Disrupting the Payment Sector
    Rob Parker-Cole, Dr. Heiko Klarl Apr 30 2019 2:00 pm UTC 60 mins
    Payment Service Directive 2 was inured in 2018 by the European Commission to enable a competitive, regulated environment for banking and non-banking organizations within the European Union. Competitive markets such as China’s fast growing mobile payment market, Australia’s New Payment Platform, and evolving FinTech Start-ups strongly impact the disintermediation of payment transactions, disrupting the banking sector globally. The need for fulfilling future customer needs by providing convenient payment solutions demand for faster adoption, agile methods and MVP (Minimal Viable Product) approaches that must lead to cultural changes in the banking sector to keep up with the market. How can one bank bear up to the competing environment by investing in digital payment solutions without losing control over regulation and cost?
  • Rethinking the Human Factor in Security
    Rethinking the Human Factor in Security
    Bruce Hallas, Founder Marmalade Box and Martin Sugden CEO Boldon James Apr 30 2019 3:00 pm UTC 60 mins
    Today’s world of data protection and governance is awash with talk of machine learning and automation. But what about the role of the human in security, isn’t this being overlooked?

    Join this interesting and insightful webinar with recognised speaker and author Bruce Hallas and data security expert Martin Sugden, CEO at Boldon James, who will explore how organisations need to empower the user and go beyond training and education to ensure human behaviours are positively influenced to deliver real security and business value.

    Watch this webinar to learn:
    • Learnings from research into the impact of human behaviour on user trust and security posture
    • How to design a security approach that empowers humans
    • The challenges associated with implementing security automation (e.g. AI/ML)
    • Practical ways to engage the user to influence positive security behaviour
  • Securosis: Making an Impact with Security Awareness Training
    Securosis: Making an Impact with Security Awareness Training
    Mike Rothman, Lead Analyst and President at Securosis and Michael Madon, SVP of Awareness Training Products at Mimecast Apr 30 2019 4:00 pm UTC 33 mins
    Employees remain the last line of defense, and in all too many cases, those defenses fail. Despite the modest improvement of security awareness programs, few organizations rave about their training, which means we still have work to do.

    We know that the vast majority of cyber security incidents – 75 to 95% - are a result of simple mistakes made by employees who have the best of intentions. We also know that, until now, the training solutions available to you were just not up to the task of changing employee behavior. So, we set about changing the game.

    Join this webinar to learn how you can rapidly shift your corporate cybersecurity posture by implementing a thoughtful, pragmatic awareness training program.
  • The Office 365 Dilemma – How Secure is Secure?
    The Office 365 Dilemma – How Secure is Secure?
    Sunil Choudrie, Senior Strategist, Symantec Apr 30 2019 5:00 pm UTC 31 mins
    Office 365 has captured the imagination of many organizations, offering a wide range of productivity applications in a single platform. However, as organizations race to the cloud they realise that solving the security challenges may not be as straightforward as they hoped.

    The Office 365 platform encompasses communication, content creation and distribution applications stored in a cloud environment that’s open to all (any user, any device). In short, this single platform reflects the full range of security challenges that any organisation faces, so no wonder security deserves a deeper think.

    Join Sunil Choudrie, a Security Strategist from Symantec where he will discuss the security implications and key considerations for organizations that have moved, or are planning to move to Office 365.
  • SkyStem: Overview of the SEC's Whistleblower Program
    SkyStem: Overview of the SEC's Whistleblower Program
    Nancy Wu, Sales and Customer Support, SkyStem Apr 30 2019 6:00 pm UTC 57 mins
    [Live Recording] Join us for an overview of the SEC's Whistleblower Program. Learn about how the program is set up, the extent of damages awarded to date, and the resulting benefits the program has produced for our society at large.

    Please note: CPE credit not available for this playback
  • Align Your Security Efforts with the NIST Cybersecurity Framework
    Align Your Security Efforts with the NIST Cybersecurity Framework
    Rob Campbell- Director of Sales, User and Cloud Security Apr 30 2019 6:00 pm UTC 60 mins
    Often, when implementing the NIST Cybersecurity Framework, security teams spend too much time responding to alerts and security events, and far too little on concurrently and continuously focusing on post-breach planning and recovery.
    Watch this webinar to learn how adopting a risk-adaptive security approach can help agencies better align resources and better plan for evolving security requirements.
  • IT Security Audit - What, me worry?
    IT Security Audit - What, me worry?
    Cavirin Security Experts Apr 30 2019 6:00 pm UTC 45 mins
    I’m not going to lie, IT Security Audits suck. The dreaded time(s) of year when an outside organization comes in and conducts an official determination of a company’s security posture further determining that the company is in, or out of, compliance regarding given frameworks and regulations. IT departments scramble everywhere, spending countless hours testing and documenting security controls (typically using spreadsheets) to meet auditor’s requirements. Although painful, the security audit measures the organization's security posture and can be effective in finding areas that need attention. Although the security audit will never be pain-free, on this webinar we will share with you our 7 Tips and Tricks for making the IT Security Audit a Little Easier.
  • CloudHealth Upgrade Assistance: Make the Switch, for the Better
    CloudHealth Upgrade Assistance: Make the Switch, for the Better
    Todd Bernhard, CloudCheckr Product Marketing Manager Apr 30 2019 6:00 pm UTC 60 mins
    If you've outgrown the capabilities of CloudHealth and are making the switch to CloudCheckr, this educational webinar will translate the comparable functions and reports from CloudHealth to CloudCheckr. Additionally, attendees will be introduced to numerous features not available to CloudHealth users such as Total Compliance, SnapBack, Automation, White Labeling and more.

    This webinar is the "Rosetta Stone" to help you make the transition for the better.
  • Five Ways to Find an Active Attacker
    Five Ways to Find an Active Attacker
    Kasey Cross, Sr. Product Marketing Manager and Bryan Lee, Unit 42 Principal Researcher, Apr 30 2019 6:15 pm UTC 60 mins
    Today’s attackers are using elusive tactics like leveraging stolen credentials and managing compromised systems from the internet.

    That said, it’s possible to locate and stop attackers from within your infrastructure with the help of automated detection and response.

    Watch the webinar as Palo Alto Networks' Bryan Lee, Unit 42 Principal Researcher, and Kasey Cross, Sr. Product Marketing Manager, explain in detail:

    ●Best practices to detect and stop sophisticated attacks
    ●Five tactics attackers often use to find, access and steal data
    ●How to identify highly-evasive as well as low and slow attacks

    Join us on April 30 at 11:15 a.m. PT for the webcast and live Q&A session.
  • Top 5 Data Protection Gaps in Office 365
    Top 5 Data Protection Gaps in Office 365
    W. Curtis Preston, Chief Technical Architect, Druva May 1 2019 10:00 am UTC 54 mins
    Do you think Office 365 is enough to protect your business data? Would you bet your career on it? Hear from industry expert, Michael Osterman of Osterman Research on how to step up your data protection game.

    Join this session to learn how to:

    - Protect against ransomware, accidental deletion, or corruption
    - Better align and respond faster to compliance and legal inquiries
    - More efficiently manage departing employee and long term archiving of data
  • Tackling new Gaming regulations without impacting customer experience
    Tackling new Gaming regulations without impacting customer experience
    Christina Thakor-Rankin, Principal Consultant at 1710 Gaming and James Baston-Pitt, Sr. Business Development Manager at Onfid May 1 2019 2:00 pm UTC 58 mins
    The move towards responsible gambling and stricter regulations means knowing your customer is more important than ever. But for operators, that’s easier said than done. Guidance is unclear – so what CDD measures do you need to perform and when, and how do you do it without scaring off your customers?

    Watch this webinar to learn about new regulations and how to tackle them, including:

    - Age verification
    - Money laundering and POCA
    - Multi-accounting and ID rental
    - Gamstop and responsible gambling

    In collaboration with iGaming Business.
  • Law Day Webinar - A Practical Guide to Information Governance
    Law Day Webinar - A Practical Guide to Information Governance
    EDRM and Knovos May 1 2019 4:00 pm UTC 60 mins
    Participate in this live online discussion with our esteemed panel of experts as they discuss the importance of information governance in the current business landscape. Talking points will include an overview of the current state, the use of governance plans and procedures, driving forces behind the need for protocols, and the impact of data privacy and cybersecurity on data governance practices. Attendees will have the opportunity to submit questions before and during this interactive program.

    Topics to be addressed include:
    •Defining information governance and why it matters
    •Current triggers for information governance
    •Examining an information governance program
    •Important elements and benchmarks for your program
    •Steps you can take to mature your organization’s information governance strategy

    Submit your information governance questions to the panel before the webinar webinar@knovos.com.

    Speakers:
    Christa Haskins, Associate Director – E-Discovery, Amneal
    George Socha, Managing Director - Technology and Business Transformation Services, BDO
    Ronald J. Hedges, Senior Counsel, Litigation and Dispute Resolution Practice Group, Dentons US LLP
    Joseph C. Bartolo, J.D., Information Governance & Risk Solutions, Knovos
  • How to Get Hired for Top Cyber Security Job with No Degree – Part 3
    How to Get Hired for Top Cyber Security Job with No Degree – Part 3
    Dr. V. N. Berlin, CEO, Mission Critical Institute, Rob Chubbuck, Information Assurance Systems Engineer, CACI International May 1 2019 4:30 pm UTC 60 mins
    Hear from a top cyber security employer exactly how you can get hired for a cyber breach prevention job without a degree in this four-part webinar series.

    Let Rob Chubbuck, senior cyber security expert at CACI International, tell you how he decides to hire candidates without degrees to cyber security teams.

    This webinar series will take you inside the recruiting process and you will learn the answers to these questions:

    1. How big is the opportunity for cyber breach prevention?
    2. How fast is that opportunity growing?
    3. Why will he consider candidates without a degree?
    4. What skills does he look for in a candidate?
    5. What tools does he want a candidate to have experience using?
    6. What experience should a candidate have for him to consider without a degree?
    7. What personal characteristics are essential to him?
    8. What academic credentials does he want a candidate to have?
    9. What additional academic credentials does he want a candidate to earn?
    10. What certifications does he want a candidate to have?
    11. What additional certifications does he want a candidate to earn?
    12. What does he look for in a resume to schedule a phone screen?
    13. What must a candidate do in a phone screen to get the interview?
    14. What kinds of questions are asked in the interview?
    15. What answers does he look for?
    16. What professional development plans does he want candidates to have?

    This unique webinar series will tell you exactly what motivates an employer to hire a candidate without a degree into a top cyber breach prevention position.

    Seating is limited to 75, so register now to reserve your spot!

    ADDED WEBINAR BENEFITS: Register for the webinar and download the attachments to prepare for the interview. Download the CCRMP Career Readiness Assessment and schedule an interview with an MCI Cybersecurity Education Specialist to fast-track your cyber security career today.

    Also included are complimentary $500 CISSP Exam Vouchers and $1995 CISSP Exam Prep Course Vouchers.
  • Battle-Tested Strategies for Supercharging Office 365 Security
    Battle-Tested Strategies for Supercharging Office 365 Security
    John Hawley & Joseph Acosta May 1 2019 5:00 pm UTC 30 mins
    Cloud solutions such as Microsoft Office 365 have simplified IT operations for thousands of companies. But trusting your business to off-site servers can present unique challenges as well.

    If your servers are hosted in the cloud, you can save money on your network's operational costs. However, you may be giving up control of your own security. How can you position yourself to proactively detect and prevent security incidents before they occur?

    In this presentation, Delta Risk experts will share their experience gained through securing thousands of Office 365 environments. They will discuss the technical, business, and strategic aspects of securing this cloud environment, including:

    - The relationship between Microsoft and your business under the Office 365 Shared Responsibility Model (hint: in many ways, you're on your own!)
    - Top Office 365 security risks, and how to combat them
    - How to maximize Office 365's native security functions, and where third-party solutions can help fill the gaps

    If you’re curious about the answers to these questions, we invite you to join us!
  • 3 Reasons to Use Veeam Backup for Office 365
    3 Reasons to Use Veeam Backup for Office 365
    Bob Hunt, Microsoft Solutions Architect, Presidio; Tim Smith, Solution Architect - Emerging Technologies, Veeam May 1 2019 7:00 pm UTC 45 mins
    Microsoft protects your data in Office 365 from data center outages, but when data is compromised or accidentally deleted and needs restoration, other tools are required. Many of our O365 customers are finding significant benefits of utilizing Veeam Backup for Office 365.
  • Operational Technology Security: Building a System of Trust
    Operational Technology Security: Building a System of Trust
    Nick Savvides, Chief Technology Officer, APAC, Symantec May 2 2019 12:00 am UTC 60 mins
    As the 4th Industrial Revolution drives tremendous progress in energy, manufacturing, mining, transportation, and countless other Industrial Control Systems (ICS), threats targeting these systems are on the rise.

    Operational Technology (OT) is mission-critical in these industries, but legacy systems are often outdated and nearly impossible to secure with traditional corporate security controls. The infamous Symantec-discovered Stuxnet malware that manipulated centrifuges in Iranian nuclear, was carried in via USB, demonstrating the devastating physical consequences of outdated security controls to OT.

    Join Nick Savvides, CTO, Asia-Pacific, Symantec, to learn how Symantec can help you protect your factories, refineries, hospitals, building management and infrastructure by embedding security directly into industrial equipment, and helping you better monitor industrial networks for cyber threats..

    During this webinar, Nick will discuss:

    - The fundamentals of OT security and the importance OT security analytics for advanced threats
    - How to defend against USB-borne malware, network intrusion and zero-day attacks on operational technology
    - Recommendations for securing OT environments and building a system of trust.
  • CISO Says with Abeer Khedr, Information Security Dir. at National Bank of Egypt
    CISO Says with Abeer Khedr, Information Security Dir. at National Bank of Egypt
    Abeer Khedr, InfoSec. Dir. at National Bank of Egypt, Brandon Dunlap, Moderator, (ISC)² May 2 2019 12:00 pm UTC 60 mins
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format.

    In this session Abeer Khedr, Information Security Director at the National Bank of Egypt will provide insight into the path she took to become a Cybersecurity Leader and how she is reinventing the role in the face of accelerating industry change.
  • Open Source Risk in M&A by the Numbers
    Open Source Risk in M&A by the Numbers
    Phil Odence, General Manager, Black Duck On-Demand May 2 2019 4:00 pm UTC 60 mins
    In over 1,000 codebases audited in 2018, Black Duck Audits found that nearly every one contained open source components. Not only that, but a significant percentage of “proprietary code” overall was open source. Virtually every company building software now depends on open source, and with great reason. However, left unmanaged, open source can lead to license compliance issues plus security and code quality risks. Whether you’re on the buy side or sell side, these risks could negatively affect valuation in an M&A transaction.

    Many acquirers have come to understand all this in concept; the Black Duck audit services group has the data. Join us for this webinar as we answer questions about the code of tech companies being acquired today. We’ll cover:

    • Open source license and security risks by the numbers
    • Why audits have become the norm in M&A tech due diligence
    • How you can get a complete picture of open source risks

    Don’t miss this informational webinar – register today.