Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • Get a Credible, Comprehensive Asset Inventory
    Get a Credible, Comprehensive Asset Inventory
    Nathan Burke, CMO @ Axonius Recorded: Jul 19 2019 4 mins
    By connecting to the management and security tools that customers already use and the network infrastructure, Axonius gives customers a credible, comprehensive asset inventory. From laptops & desktops, servers and VMs, cloud instances and mobile devices, to IoT and OT, if an asset is part of your environment it can be discovered.

    Providing customers with a true, always up-to-date inventory of assets is the first step in uncovering security gaps and enforcing policies to take automated actions like enriching CMBD data and creating incidents when any asset is not in line with the overall security policy.
  • How AppsFlyer Automates Security Policy Validation with Axonius
    How AppsFlyer Automates Security Policy Validation with Axonius
    Guy Fletcher, CISO @ AppsFlyer Recorded: Jul 19 2019 2 mins
    With a comprehensive inventory of all assets, users, and security solutions, AppsFlyer was able to get clear visibility into the deployment of the different security solutions and automate ongoing security policy adherence.

    “Asset management and what Axonius provides is a core element. You can’t build a house without having a solid foundation. Asset management and understanding what you have is basic.” -- Guy Fletcher, CISO @ AppsFlyer
  • Highlighting the Asset Management Problem in Cybersecurity in 3 Minutes
    Highlighting the Asset Management Problem in Cybersecurity in 3 Minutes
    Dean Sysman, CEO & Co-Founder @ Axonius Recorded: Jul 19 2019 4 mins
    A security teams job is so difficult today - but they’re still spending time figuring out where things are and what they are. The more solutions you have the harder it is to understand where something is, who owns it, and does it actually fit your security policy.

    Asset management isn’t sexy - but at the end of the day, everything you’re doing in your security program relies on a foundation of knowing what your assets are and if they’re fitting that security policy.
  • Hybrid Cloud Monitoring on AWS and Red Hat OpenShift
    Hybrid Cloud Monitoring on AWS and Red Hat OpenShift
    Red Hat & Helevetia Recorded: Jul 19 2019 32 mins
    Learn how a Swiss insurance company designed its hybrid cloud monitoring solution around Amazon Web Services (AWS) and Red Hat OpenShift using best-of-their-kind metrics and monitoring tools.

    In this session, a technical solution architect from Helvetia, together with senior consultants from Red Hat, who worked on the project, will show you how to use:

    • Prometheus to gather the metrics for the platform.
    • AWS CloudWatch to gather metrics for additional components/services.
    • Grafana to centralize from multiple sources and visualize all of the cluster metrics.
    • Prometheus Alert Manager to report on the health of Red Hat OpenShift Container Platform.
    • Slack to notify the operations team.
    • Dynatrace for application and end-to-end monitoring.
  • Developing and Deploying Applications in a Multisite Hybrid Cloud
    Developing and Deploying Applications in a Multisite Hybrid Cloud
    Ben Pritchett, Principal Systems Eng, IT and PaaS Ivan Atanasov, Principal Systems Eng, IT Application Delivery Service Recorded: Jul 19 2019 46 mins
    You have access to clouds. You can build containers. How do you make them useful? Trying to build scalable and resilient services and deploying them across multiple sites and cloud providers can be tricky. Find out how Red Hat IT does it.

    In this session recorded from Red Hat Summit, Tom Benninger, Red Hat, Ben Pritchett, and Ivan Atanasov, Red Hat Inc, review the patterns, processes, and tools Red Hat IT uses to deliver business critical application services across multiple sites, with Red Hat OpenShift Container platform.

    We’ll cover:

    •The Red Hat IT standard development and deployment pattern.
    •How to automate your CI/CD delivery pipeline, from merge request to release.
    •How to implement basic supply chain security to support application integrity.
    •How we deal with security and change management requirements.
    •The tools and processes needed to implement this model.

    This recorded Red Hat Summit session shows how Red Hat and open source tools are used today to for fast, high-quality, more secure, and efficient digital delivery.
  • Know Your Assets, Identify Gaps, and Automate Security Policy Enforcement
    Know Your Assets, Identify Gaps, and Automate Security Policy Enforcement
    Nathan Burke, CMO Recorded: Jul 19 2019 2 mins
    How many assets are in your environment? Most security teams don’t know. Asset management is a huge, nagging problem that is only getting worse. With the increase in the number and types of devices in today’s corporate environment, compounded by trends like BYOD, Cloud and IoT, it’s nearly impossible to understand how many devices are on our networks, what’s on them and whether they comply with the overall security policy. Until now.

    Enter Axonius, a simple solution with a unique approach. By aggregating existing business data from over 130 management and security solutions, the Axonius Cybersecurity Asset Management Platform provides actionable visibility and automated security policy enforcement for every asset and user.

    Let us prove it - check out our 2 minute demo.
  • Keylight: Cloud-Based IT Risk Solutions for Every Business
    Keylight: Cloud-Based IT Risk Solutions for Every Business
    Lockpath Recorded: Jul 19 2019 2 mins
    Lockpath’s Keylight platform enhances an organization’s IT Risk Management and it's ability to manage, measure and report IT risks.
  • Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud
    Die Zwei um Zwölf: Automatisierung der VM-Series in der Public Cloud
    Dirk Thelen und Dirk Schüler Recorded: Jul 19 2019 49 mins
    Der Wechsel in die Cloud wird stark von den Geschäftsbereichen bestimmt und die Geschwindigkeit ist so hoch, dass in einigen Fällen die Sicherheit in den Hintergrund tritt. Ihre Anwendungen und Daten müssen aber in Public Cloud Umgebungen genauso sorgfältig geschützt werden, wie lokale Anwendungen und Daten. Deshalb gilt: Zero Trust Security Modell must be everywhere!

    Wir zeigen Ihnen in dieser Ausgabe von „Die Zwei um Zwölf“, wie mit Automatisierungstools Public Cloud Umgebungen auf Knopfdruck mit virtuellen Firewalls (Prisma VM-Series) eingerichtet, verwaltet und abgesichert und wie Workloads und Sicherheitsmaßnahmen in wenigen Minuten bereitgestellt werden können.
  • Keylight: Cloud-Based Compliance and Policy Solutions for Every Business
    Keylight: Cloud-Based Compliance and Policy Solutions for Every Business
    Lockpath Recorded: Jul 18 2019 2 mins
    Learn how the Keylight Platform provides and end-to-end solution for Compliance and Policy Management.
  • Smart Incident Management with AI-Powered Analytics & NLP Topic Clustering
    Smart Incident Management with AI-Powered Analytics & NLP Topic Clustering
    Joe Foley, Director of Business Analytics at Numerify Recorded: Jul 18 2019 34 mins
    There is a treasure trove of insights in the text descriptions entered into your incident tickets regarding common symptoms, root causes, and resolutions. However, with thousands of incidents generated weekly, it can be hard to manually extract these insights and make them available to your Incident teams.

    How can you leverage Natural Language Processing (NLP) techniques to make sense of the human-generated incident data?

    Join Joe Foley, Director of Business Analytics at Numerify, to learn how organizations like yours:
    - Achieve Smart Incident Management with AI-Powered Analytics
    - Leverage NLP to help make sense of large volumes of unstructured text descriptions
    - Identify related incidents using Incident Topic Clustering
    - Benefit from using Topic Clustering for Smart Incident Management
  • Identity Verification: A Reset for Password Resets
    Identity Verification: A Reset for Password Resets
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Jul 18 2019 48 mins
    Every use case differs in the way it defines and executes password resets, but ultimately it’s imperative for many platforms to verify users’ identities for each password reset request – from enterprise employees to government applications and even with e-commerce and other human-centric sites.

    Platforms that integrate a secure identity verification method into their password reset process will benefit from having a greater level of assurance that the person initiating the reset is in fact who they say they are, and furthermore, will ensure that the user isn’t a bot or a bad actor impersonating an active user.

    For industries like finance, insurance, and healthcare that deal with a lot of personally identifiable information (PII) and other highly sensitive data, leveraging more rigorous verification standards for password resets becomes especially critical.

    In this webinar, we’ll discuss a range of identity verification methods with various assurance levels so that organizations of all sizes and industries can better understand how to build a password reset program that meets their specific security needs.

    Key Takeaways
    - Level set on why identity verification is important for account security and password reset interactions and how it affects every type of organization.
    - In-depth review of the most effective identity verification methods for successful (and secure) password resets.
    - Explore how identity verification works with multi-factor authentication for password resets.
  • SkyStem: Spooky Tales from the SEC
    SkyStem: Spooky Tales from the SEC
    Nancy Wu, Sales and Customer Support, SkyStem Recorded: Jul 18 2019 56 mins
    [Live Recording] Join us in this webinar, where we arm ourselves with knowledge that can help our organization deter and detect organizational fraud. Learn the most common fraud practices, the best fraud detection and prevention activities, as well as recent SEC fraud cases.

    Please note: CPE credit not available for this playback
  • A DevOps Journey, Episode 2: Migrating Virtualized Workloads to OpenShift
    A DevOps Journey, Episode 2: Migrating Virtualized Workloads to OpenShift
    Ales Raszka, Software Engineer, Red Hat and Stanislav Ochotnicky, Principal Software Engineer, Red Hat Recorded: Jul 18 2019 44 mins
    The journey to DevOps will revolutionize how you manage your business and shorten delivery time for a variety of IT resources. It’s about not only the tools, but also the change in culture to accept this new style of work. But how do you get from here to there?

    Join us for this webinar to learn how Red Hat's DevOps team moved applications deployed in Red Hat® Virtualization and managed with Ansible® to a full-fledged containerized format using OpenShift®.

    In this webinar, we’ll cover:

    •Challenges of brownfield migrations.
    •Common pitfalls.
    •Things to consider before, during, and after migration.
    •Phases of the example migration.
  • Choosing the Right Cloud HSM
    Choosing the Right Cloud HSM
    Gary Marsden, Senior Director of Data Protection Services at Thales Recorded: Jul 18 2019 44 mins
    Although most major cloud providers now offer native cloud Hardware Security Module (HSM) services, how do you choose the right cloud HSM? According to 451 Research, 69% of enterprises now have a hybrid, multi-cloud strategy. With hybrid, multi-cloud environments likely to be the norm as we move into 2020, managing multiple cloud HSMs will increase complexity, cost of ownership and operational overhead.

    Join us as we discuss the complexities of managing native cloud HSMs separately, leading to islands of security with different features and rules for each. We’ll show you how the smarter and simpler route is to use a cloud HSM provider that can centrally manage and secure your entire cryptographic operations across all cloud environments.

    This informative webinar will cover:
    • A current view of the cloud’s impact on IT business models
    • Why HSMs are critical to data security on premise or in the cloud
    • How creating centralized key management and security strategy will make your cloud life a whole lot easier
    • Building blocks for an HSM strategy for security across all cloud and hybrid IT environments
  • Banking on Digitally Enabled Risk
    Banking on Digitally Enabled Risk
    Conrad Chuang, Director of Product Marketing; Cormac Reidy, SAE - FSI; Ian Pestell, Senior Data Scientist Recorded: Jul 18 2019 49 mins
    Is your risk infrastructure showing signs of strain in the face of FRTB, Basel III, and BCBS 239? Imagine a risk function where discrepancies among business, risk and finance views are eliminated, setting the stage for advanced technologies, robotic process automation, and machine learning.

    You are invited to join TIBCO as we take a step beyond first generation data governance towards unified data and analytics across the enterprise. We’ll present how to achieve a digitally enabled risk function for credit, operation and accounting risk.

    In this session we will cover:
    ▪ How CROs are mastering regulatory change as part of transforming the risk function, elevating knowledge and data resources through governance, MDM, data science, and analytics
    ▪ An overview of the key market challenges for delivering a unified data management and governance model
    ▪ Real-world case studies from G-SIBs focused on Data Governance, Master Data/Reference Data, Data Virtualization, and Data Science

    Speakers:
    Conrad Chuang, Director of Product Marketing, TIBCO
    Cormac Reidy, Senior Account Executive - FSI, TIBCO
    Ian Pestell, Senior Data Scientist, TIBCO
  • Building a Culture of Secure Programming in your Organisation
    Building a Culture of Secure Programming in your Organisation
    Amanvir Sangha, Consultant, Synopsys Recorded: Jul 18 2019 69 mins
    We all know that fixing defects early in the SDLC is the right approach to building secure software. Security needs to be in every part of the pipeline but it’s often hard to get everybody onboard with software security initiatives.

    Come join us on this webinar to explore how to build a culture of proactive secure programming in your technical organization and how to implement security as an enabler without disrupting the velocity of projects in modern development teams. See how Synopsys tools and services can allow you to build secure, reliable and quality software.
  • Hybrid Identity and What it Means to You
    Hybrid Identity and What it Means to You
    Rich Gibsen, CTO at SecureAuth and Robert Humphrey, CMO at SecureAuth Recorded: Jul 18 2019 42 mins
    Digital experiences (portals, commerce sites, communities, etc.) are strategic resources for most organizations. Providing secure access to these experiences is a challenge for both security and business teams alike. While nearly all organizations are developing these digital experiences in the cloud, the typical IT infrastructure includes systems that are cloud based, on-prem or hybrid. Your identity access management systems should mirror your organization’s infrastructure and enable you to deploy on-prem, in the cloud or hybrid.

    Hybrid Identity enables you to choose the deployment approach that fits your business, rather than fitting the approach of the vendor. Don’t compromise on experience and security, and don’t compromise on choice. Hybrid Identity gives you choice.

    Join us to learn what Hybrid Identity is, and how it can help better secure all your workforce and consumer identities. You’ll see Hybrid Identity in action, and how it results in minimal impact to users with maximum visibility to administrators. You’ll also hear about SecureAuth’s latest offerings and get a sneak peek into the future of identity.

    The Hybrid Identity journey is about to begin – sign up to find out how it can help better secure all your workforce and consumer identities.
  • Five steps to implement a universal policy strategy
    Five steps to implement a universal policy strategy
    Lacy Gruen, Tim Sedlack and Danny Kim, Micro Focus Recorded: Jul 18 2019 60 mins
    Most organizations manage policies in silos across their organization. Even those managing group policy within Active Directory find it very difficult to effectively leverage those authorization and authentication policies in other systems. All systems within your environment require some kind of policy controls to be enforced and auditable – from Linux and UNIX servers to a wide variety of cloud resources such as virtual machines, SaaS, containers, etc. It becomes even more challenging when you must prepare your existing security policies for the cloud and find a way to migrate them to cloud services such as Intune. Managing policy in so many different places is highly inefficient and the lack of consistency opens the organization up to a great amount of risk. Bad actors are just waiting to find vulnerabilities when it comes to security policy and will exploit any gaps every chance they get.

    Attend this webinar to learn how to transform the way you manage security policies to improve security, drive efficiency, and reduce the risk of a breach or failed audit. Industry experts Tim Sedlack and Danny Kim will discuss the five steps you can take to implement a modern universal policy strategy.
  • Explore the Benefits of Endpoint Detection and Response Tools and Services
    Explore the Benefits of Endpoint Detection and Response Tools and Services
    Jon Oltsik, Sr. Analyst, ESG and Bob Shaker, Adam Glick and Steve Meckl from Symantec Recorded: Jul 18 2019 58 mins
    Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.

    Join ESG and Symantec as we discuss how organizations are using solutions to improve their threat detection and response efforts, including:

    - Trends impacting threat detection efforts
    - How organizations are using EDR and MEDR solutions
    - The benefits of using an MEDR service
  • CDC for Snowflake
    CDC for Snowflake
    Sean Anderson - Director of Product Marketing at StreamSets | Dash Desai - Technology Evangelist at StreamSets Recorded: Jul 18 2019 58 mins
    Your cloud database is helpful only if it is real-time, which means looking beyond migration and batch uploads. Whether synchronous and asynchronous syncing, we explore how users can design robust change/data/capture (CDC) jobs between Snowflake and on-premise data warehouses. We will configure a CDC pipeline with prebuilt origins for popular data warehouses and destinations to the Snowflake service. We will show an initial load with full table creation and a schedule to initiate incremental data captures.

    In this webinar we will:
    -Show how to configure a CDC pipeline with prebuilt origins for popular data warehouses and destinations to the Snowflake service.
    -Show an initial load with full table creation and a schedule to initiate incremental data captures.
  • Get the Most Out of App-Aware Network Visibility
    Get the Most Out of App-Aware Network Visibility
    Shamus McGillicuddy, Research Director, EMA & Bassam Khan, VP Product & Technical Marketing Engineer, Gigamon Recorded: Jul 18 2019 59 mins
    Got apps? Most companies run hundreds. Application experience can make or break a digital enterprise. That’s why true application-level visibility is a must-have in today’s network operations. While achieving it with legacy solutions is difficult, the benefits of becoming app-aware are more than worth it.

    What the heck is application-aware networking? It’s a cool new way to boost network performance and get the most out of your tools. You can now instantly see all applications running in your network, and manage traffic flow not by packets, but by applications.

    Join EMA Research Director, Shamus McGillicuddy, and Gigamon VP, Product and Technical Marketing, Bassam Khan, for this interactive webinar where they will discuss key topics including:

    •Protect your operations from oversubscription
    •Interrogate and identify unknown apps
    •Protect critical applications from bandwidth hogs

    Best of all, you’ll see a live demo of how Gigamon, an application-aware network packet broker, delivers true application visibility to your organization.

    Register now to see it in action!
  • How to Qualify - $5000 in Tuition Vouchers for CISSP, CCRMP, CEH and CAP -Part 1
    How to Qualify - $5000 in Tuition Vouchers for CISSP, CCRMP, CEH and CAP -Part 1
    Dr. V. N. Berlin, CEO, Mission Critical Institute, Rob Chubbuck, Information Assurance Systems Engineer, CACI International Recorded: Jul 18 2019 50 mins
    If you want to fast-track your cyber security career in 2019, join our webinar and learn how to qualify for a Cyber Tuition Rebate Voucher.

    Save up to $5000 in tuition to earn your CISSP, CEH, CAP and CCRMP certifications. Finish your cyber certificate degree while you work full-time. Then get hired by a top cyber security employer with tuition vouchers from MCI!

    Hear from Rob Chubbuck, senior cyber security expert at CACI International, as he shares what employers want in cyber security professionals and how to get hired by a top cyber security employer.

    Register now and download the attachments to get exclusive access and save up to $5000 with your Cyber Tuition Rebate Voucher!

    You will learn the answers to these questions:

    1. Why is MCI offering these Cyber Tuition Vouchers?
    2. Should you apply for a Cyber Tuition Voucher?
    3. What are the opportunities for certified professionals?
    4. What do employers want in certified professionals?
    5. Why are the CISSP, CCRMP, CEH and CAP certifications important?
    6. What are the MCI Cyber Tuition Vouchers?
    7. How to qualify for the MCI Cyber Tuition Vouchers?
    8. What else do employers want in job candidates?
    9. Is the CCRMP certification enough?

    This webinar will tell you exactly how you qualify for a Cyber Tuition Rebate Voucher and then how you can become a certified professional and get hired by a top cyber security employer.

    Seating is limited to 75, so register now to reserve your spot!

    ADDED WEBINAR BENEFITS: Register for the webinar and download the attachments to become a CISSP certified professional. Download the Career Readiness Assessment and schedule an interview with an MCI Cybersecurity Education Specialist to fast-track your cyber security career today.

    Want more than a certification? Find out how you can transfer credits and earn your CCRMP in as little as five classes by downloading the webinar attachments.
  • Modernize Your Network Operations with Network Functions Virtualization
    Modernize Your Network Operations with Network Functions Virtualization
    Pano Xinos, Global Telco Marketing Lead, Red Hat Jul 22 2019 6:00 pm UTC 15 mins
    This webinar on Network Functions Virtualization (NFV) educates the audience on the benefits of NFV.

    In today’s day and age, NFV is the newest way to define, create and manage networks by replacing hardware with software and automation. Companies are leaving behind hardware to move into a future of cloud computing. With Red Hat OpenStack Platform, customers have a solid foundation for the NFV architecture.

    OpenStack provides NFV with features to be modular, high performance and open source. The foundation of Red Hat OpenStack has given NFV the foundation it needs to transform the telecommunications industry.
  • Symantec - Comprehensive about Security
    Symantec - Comprehensive about Security
    Darren Thomson, EMEA CTO Symantec Jul 22 2019 9:00 pm UTC 11 mins
    As a leading vendor in the security landscape, Symantec takes pride in providing clients with products that offer unparalleled protection and insight to reduce risk and lower costs across your entire organization.

    Join Darren Thomson, EMEA CTO discusses how Symantec is transforming itself to be worthy of this title.
  • Fix your Leaky Onboarding Funnel with Online Identity Verification
    Fix your Leaky Onboarding Funnel with Online Identity Verification
    Dean Nicolls, VP of Marketing, Jumio Corp. Jul 23 2019 7:00 am UTC 26 mins
    Customer acquisition is top of mind for most financial service organizations and their boards. Normally, when banks and other financial service institutions think customer acquisition, they think about launching a new advertising campaign with the hope of driving more online or in-branch traffic -- but these campaigns are iffy at best.

    Instead, why not rethink your online account opening process where FSIs lose about 20% of their prospects through abandonment. If you can plug that leaky funnel, you will see an immediate improvement in customer acquisition.

    Join us for this informative “how-to” webinar and discover how to…

    - Dissect the abandonment problem
    - Reduce the number of identity verification screens & clicks
    - Cast a wider net with omni-channel verification
    - To say “no” to verification “maybes”
  • Cyber Security Brief: Elfin research, ASUS attack, insider threats & mobile sec
    Cyber Security Brief: Elfin research, ASUS attack, insider threats & mobile sec
    Cyber Security Brief Podcast Jul 23 2019 8:00 am UTC 22 mins
    On this week’s Cyber Security Brief podcast, we discuss our new research into the Elfin espionage group, which we have seen targeting multiple organisations in Saudi Arabia and the U.S. We also talk about one of the big stories of the last week – ASUS’ software update system being hijacked to send out malicious updates, as well as discussing the ongoing issue of insider threats, and some new research into how mobile apps could be compromising your privacy and online security.
  • Why financial and professional services firms must get flexible working right
    Why financial and professional services firms must get flexible working right
    Kirsty Leighton Jul 23 2019 10:00 am UTC 60 mins
    Financial service companies will need to lead the charge in flexible and remote working if they are to attract the best possible talent. Something that has never been more important against a backdrop of Brexit and a growing millennial and Gen Z workforce.

    Today, only one in six (15%) employees work in businesses that don’t offer flexible working. What used to be a perk is now a mandatory offering.
    Alongside the importance of employee satisfaction, the UK is also facing a productivity challenge, on average the UK is 31% less productive than France.

    Join Mark Elwood, Director at TeleWare, Dr Lucy Green, CEO & Business Development Expert at Larato and David Mellard, Director and Founder at Bedrock HR, as they discuss:
    •The flexible working challenges financial services companies face – including security and data protection
    •Can financial services companies safely implement a bring your own device (BYOD) policy?
    •How to use tech to increase productivity
    •Scalable IT solutions for growing companies
  • Gain Control of Complex Applications Central to Your Digital Transformation
    Gain Control of Complex Applications Central to Your Digital Transformation
    John Gudmundson, Sr. Product Marketing Manager Gigamon Jul 23 2019 12:00 pm UTC 53 mins
    Today’s applications — complex, sprawling, multi-tiered, opaque — determine the success or failure of digital transformations. Isn’t it time you took control?

    Join us to learn about Application Intelligence, a pioneering set of capabilities for getting the visibility and the context needed to discover, manage and secure your sophisticated applications.

    During this live demonstration, you’ll see how Application Intelligence helps you:
    • Identify and extract traffic from over 3,000 applications
    • Detect and manage shadow IT and rogue apps
    • Separate unnecessary application traffic to greatly improve tool efficiency

    We’ll also preview its application metadata capabilities for help in solving a number of critical concerns such as troubleshooting subpar performance.

    Register now to see it in action >
  • How to Prevent Breaches with Phishing Threat Intelligence
    How to Prevent Breaches with Phishing Threat Intelligence
    Darrel Rendell, Principal Intelligence Analyst, Cofense, Brandon Dunlap, Moderator, (ISC)² Jul 23 2019 12:00 pm UTC 60 mins
    Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognise phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.

    This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organisations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.

    Join this webinar to learn about:
    -The constantly changing threat landscape
    -Turning active, real threats into learning moments for your users
    -Speeding up response with timely, actionable intelligence
  • The perfect storm: the impact of fragmentation and complexity
    The perfect storm: the impact of fragmentation and complexity
    Darren Thomson, EMEA CTO, Symantec and Dr Chris Brauer Goldsmiths University Jul 23 2019 1:00 pm UTC 32 mins
    Complexity, technological change, and regulations are increasing the pressure on security professionals. Over half feel paralysed by the overwhelming volume of threat alerts, with a quarter saying the sheer volume of alerts makes it more difficult to keep their business safe. Over a quarter say they are vulnerable to avoidable incidents.

    A brand new survey of over 3,000 cyber security professionals reveals that intense pressure is affecting decision making and increasing the risk of critical mistakes. Put simply, today’s constant state of high alert is unsustainable.

    Join leading psychologist Dr Chris Brauer from Goldsmith’s College, University of London, and Symantec EMEA CTO Darren Thompson, as they present the survey findings, and analyse what they mean for organisations like yours, including:

    -What cyber security leaders and professionals really feel about their roles in 2019
    -How to build a plan to reduce stress and improve cyber security effectiveness
    -Why the Symantec Integrated Cyber Defense Platform can help put your plan into action.
  • Harnessing Multi-Cloud Disaster Recovery
    Harnessing Multi-Cloud Disaster Recovery
    Keith Townsend, CTO Advisor and Penny Gralewski, Commvault Jul 23 2019 2:00 pm UTC 53 mins
    The multi-cloud reality means never before imagined flexibility for recovery, but also the potential for unmanageable complexity. Harnessing the power of multi-cloud for your recovery is essential in order to meet increasingly strict data compliance rules, combat the prevalence of ransomware, and maintain business continuity.


    Managing a multi-cloud environment requires the use of policy-based automation, artificial intelligence and other tools that watch for anomalies in the data infrastructure and help ensure your multi-cloud recovery plan is continually ready.

    In this webinar you will learn:

    -How multi-cloud disaster recovery can help you meet multiple RTO and RPO targets with granular recovery

    -Lessons from real world customers involving physical infrastructure disruptions and ransomware outages

    -What omnidirectional cloud recovery means for your overall cloud strategy
  • Demo: Information Steward Accelerator (ISA) for Data Quality
    Demo: Information Steward Accelerator (ISA) for Data Quality
    Scott Wenzel, Sr. Value Engineer & Matt Creason Sr. Value Engineer at Syniti Jul 23 2019 3:00 pm UTC 60 mins
    The demonstration is a follow up to our Webinar “Get your business frictionless with clean data” and will focus on our SAP Solution Extension – Information Steward Accelerator. In this demo, you will see how this application covers all phases of a data quality project and adds value to your data governance needs by giving you a web-based platform that bridges the gap between IT and business users as well as increases your overall visibility into the quality of your data.
  • Scale-Out, Not Up: Introducing Commvault HyperScale Technology
    Scale-Out, Not Up: Introducing Commvault HyperScale Technology
    Greg Page, Senior Product Specialist, Hyperscale Solutions, Commvault Jul 23 2019 4:00 pm UTC 60 mins
    Is your organization struggling with inefficiencies from an outdated, scale-up approach to managing and protecting data? The need for a fully integrated data protection appliance to deliver greater availability and scalable services for on-premises applications and data is becoming a necessity.

    Join us as we discuss the benefits of a scale-out infrastructure and how the launch of Commvault HyperScale™ Appliance and Commvault HyperScale™ Software address the shift enterprises are making towards secondary storage as a means to drive key business and IT transformation initiatives.

    In this webinar, you will learn:
    •Scale-out vs. scale-up infrastructures
    •How to leverage a scale–out infrastructure
    •How you can save time and drive greater value with an integrated data protection appliance or reference design architecture
    •How Commvault HyperScale™ Appliance tightly integrates compute, storage, full lifecycle data protection and analytics into a single platform

    It’s time for a fresh approach to solving data management challenges. Register today and learn how you can achieve IT agility through a scale-out infrastructure.
  • Proofpoint Demo: Security Awareness Training
    Proofpoint Demo: Security Awareness Training
    Sean Walker, Enterprise Account Executive Jul 23 2019 5:00 pm UTC 36 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • Data Forensics: What is it?
    Data Forensics: What is it?
    David Morris, Lance James and Mark Rasch Jul 23 2019 5:00 pm UTC 75 mins
    This session will delve into the area of Data Forensics specifically addressing when and why a Data Forensic investigation would occur and how to conduct a Data Forensic investigation.
  • Why You Should Have Zero Trust in the Web
    Why You Should Have Zero Trust in the Web
    Menlo Security Jul 23 2019 5:00 pm UTC 38 mins
    "Trusted” Websites Are Not as Safe as First Thought!

    Phishing and spear-phishing campaigns drive the majority of today’s most significant data breaches, fooling users into clicking on apparently legitimate links. They force victims to expose themselves or their businesses to credential theft, malware infections, and possibly ransomware.

    Whether accessed for business or pleasure, the modern Internet is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, company-wide cyberattack.

    Discover:

    - Why the Internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • Making Apache Kafka Dead Easy With StreamSets
    Making Apache Kafka Dead Easy With StreamSets
    Clarke Patterson - Head of Product Marketing Jul 23 2019 5:00 pm UTC 58 mins
    Apache Kafka has become a popular choice for stream processing due to its throughput, availability guarantees and open source distribution. However, it also comes with complexity, and many enterprises struggle to get productive quickly as they attempt to connect Kafka to a diversity of data sources and destination platforms.

    In this webinar, expert Clarke Patterson will discuss and demonstrate best practices that will help make your Kafka deployment successful, including:

    -How to design any-to-any batch and streaming pipelines into and out of Kafka.
    -How to monitor end-to-end dataflows through Kafka.
    -How to operate continuous data movement with agility as data sources and architecture evolve.
  • Top 10 Security Best Practices for Azure
    Top 10 Security Best Practices for Azure
    Jigar Shah Jul 23 2019 5:00 pm UTC 60 mins
    As organizations migrate to the cloud, they often start by replicating their existing network architecture. This approach can be costlier and more difficult to manage than an architecture that leverages cloud-native capabilities that are not available in the data center. Microsoft Azure enables development teams to rapidly build and deploy global-scale applications, but with this ease and speed comes increased risk.

    In this webinar, you will learn more about the best practices for deploying network virtual appliances in Microsoft Azure, including:
    Designing network security for high availability and auto-scaling with Virtual Machine Scale Sets (VMSS) and Azure Load Balancer
    Implement Accelerated Networking and deploy VM-Series virtualized firewalls with multiple NICs to increase throughput and performance
    Automate virtualized firewall deployment configuration to ensure best practices are consistently implemented

    Rise above the noise and confusion by using VM-Series virtualized firewall on Microsoft Azure that provides complete visibility across all of your workloads in Azure, and helps you automate security controls.
  • How K-12 Districts Use Wireless Security to Protect Students, Faculty and Staff
    How K-12 Districts Use Wireless Security to Protect Students, Faculty and Staff
    Holly Davis, CEO, Komplement Jul 23 2019 6:00 pm UTC 39 mins
    Safeguarding K-12 networks is a delicate yet critical undertaking. Connectivity is critical. Student safety is paramount. Yet access to budgets, staff and resources is limited. This unique webinar brings together a panel of experts from security, networking and education to outline how districts can expand wireless security to the edge — even without firewalls. The must-attend session will explore:

    •Emerging threats to both network safety, insider threats and student privacy
    •Seamless ways to monitor and manage access to dangerous content
    •How to simplify wireless deployment, management and analytics
    •Methods to enhance campus-wide WiFi performance, coverage and capacity
    •Opportunities to leverage the federal E-rate program to help eligible districts simultaneously stretch budgets, improve security and protect students
  • Citrix Security Approach: App and Network Attacks
    Citrix Security Approach: App and Network Attacks
    Akhilesh Dhawan, Dir of Prod Marketing- Cloud/Security Citrix & Darshant Bhagat, Dir of Prod Management/Strat Citrix Jul 23 2019 6:00 pm UTC 46 mins
    Find out how the Citrix Security approach brings together the entire Citrix portfolio to address internal and external threats by providing holistic visibility and proactive protection of your company assets.

    This on-demand webinar deep dives into: protection of applications from on-premise to the cloud, hypervisor protection of servers before the threat hits the operating system, and device and user protection from external threats. Proactively counter internal and external threats through analytics.
  • Top 10 Security Changes in Red Hat Enterprise Linux 8
    Top 10 Security Changes in Red Hat Enterprise Linux 8
    Mark Thacker, Principal Technology Product Manager, Red Hat Jul 23 2019 6:30 pm UTC 23 mins
    Do you know how to improve the entire cryptographic policy on a system with one command? How about being able to record exactly what an admin typed in the system - and what happened as a result?

    In this webinar, we'll provide an overview of the most notable enhancements to the many security capabilities in Red Hat Enterprise Linux 8 and how to use them to enhance the security posture of your systems.
  • IT & OT Security Best Practices-Survey Results of Over 700 Global Practitioners
    IT & OT Security Best Practices-Survey Results of Over 700 Global Practitioners
    Robert Healey | Senior Director Marketing, Asia Pacific, Tenable Jul 24 2019 3:00 am UTC 60 mins
    Security teams are frequently blind to the IT and Operational Technology (OT) assets, internal and external connections, and vulnerabilities on their industrial control system networks. This visibility gap is one of the key challenges highlighted in a new survey report from the Ponemon Institute.

    To learn more about the report and how its findings compare with your organization’s experience, please join Robert Healey, APAC Marketing Director, Tenable, for the webinar: “Cybersecurity in Operational Technology: 7 Insights You Need to Know.”

    All infosec professionals responsible for and interested in effectively securing converged IT/OT environments are encouraged to join this webinar.
  • 시만텍 글로벌 인텔리전스와 활용방안
    시만텍 글로벌 인텔리전스와 활용방안
    김영표 부장, 시만텍코리아 SE 본부 Jul 24 2019 5:00 am UTC 60 mins
    우리회사에 유입되는 각종 IP, URL, 파일들의 보안적인 위협 혹은 컴플라이언스를 어떻게 대응하고 계신가요?

    인텔리전스 자체도 여전히 중요한 요소 이지만, 지금의 보안에 더 중요한 요소는 공격자에 대한 인텔리전스를 이해하는 것입니다. 그들이 가지고 있는 전술, 기술, 절차, 공격자 캠페인 등이 어떻게 이루어 지는지 궁금하지 않으신가요?

    똑똑한 시만텍 인텔리전스는 어떤 답을 줄 수 있을지 지금 만나보시겠습니다.

    이번 웨비나에서는 아래와 같은 내용을 다룹니다.
    •웹포털에서 최신 보안 동향을 손쉽게 검색하기
    •우리가 가지고 있는 SIEM과 잘 연동하기
    •인텔리전스에 API를 활용하여 감염된 파일의 이상유무를 손쉽게 확인하기
    •시만텍 보안전문가한테 우리 회사의 보안 문제를 물어보기

    시만텍 웹 세미나에 참여하여 관련 동향에 대해 알아보십시오.
  • Building Event-Driven Applications with Apache Kafka & Confluent Platform
    Building Event-Driven Applications with Apache Kafka & Confluent Platform
    Viktor Gamov, Developer Advocate, Confluent Jul 24 2019 10:00 am UTC 43 mins
    Apache Kafka® has become the de facto technology for real-time event streaming. Confluent Platform, developed by the creators of Apache Kafka, is an event-streaming platform that enables the ingest and processing of massive amounts of data in real time.

    In this session, we will cover the easiest ways to start developing event-driven applications with Apache Kafka using Confluent Platform. We will also demo a contextual event-driven application built using our ecosystem of connectors, REST proxy, and a variety of native clients.

    Register now to learn:
    -How to create Apache Kafka topics in minutes and process event streams in real time
    -Check the health of an Apache Kafka broker using Confluent Control Center
    -The latest enhancements to Confluent Platform that make it easier to run Apache Kafka at scale
  • Red Hat Enterprise Linux 8 Container Tools
    Red Hat Enterprise Linux 8 Container Tools
    Scott McCarty, Principal Product Manager, Red Hat and Dan Walsh, Senior Distinguished Engineer, Red Hat Jul 24 2019 2:00 pm UTC 48 mins
    When building and managing container-based applications, it's important to consider every element of the proposed deployment, from selecting a base image on which to build, to understanding the security, scalability, and ease of use of the deployment platform.

    With the introduction of the Red Hat container tools suite, comprising podman, buildah and skopeo and the availability of base images and container runtimes based on Red Hat Enterprise Linux, developers and users alike have a comprehensive set of tools at their disposal. In this webinar, we'll demonstrate how to replace Docker with podman and demonstrate podman.

    We'll also demonstrate additional new features like management of pods, and better security features available in podman.
  • Why All Open Source Scans Aren’t Created Equal
    Why All Open Source Scans Aren’t Created Equal
    Phil Odence & Emmanuel Tournier at Synopsys Jul 24 2019 3:00 pm UTC 60 mins
    Understanding the risks associated with open source software has become the norm in tech due diligence but not all approaches are created equal. Are you approaching open source diligence in the most efficient and effective way possible? Do you understand the difference between a point in time open source analysis for M&A and ongoing open source management?

    Join us for this live webinar and learn how a purpose-built M&A open source audit differs from open source management tools and why it matters in tech due diligence. We’ll cover:

    •The types of risk around open source software
    •Why depth of analysis matters, and what it results in during M&A diligence
    •Why accuracy, reporting and expert human analysis are keys to thorough diligence

    Don’t miss this informative webinar. Register today.
  • Part 1 - Migrating to a Modern IAM Platform: Long-term Value and Risks
    Part 1 - Migrating to a Modern IAM Platform: Long-term Value and Risks
    Chaitanya Yinti, ForgeRock and Steve Giovannetti, Hub City Media Jul 24 2019 3:00 pm UTC 60 mins
    What is the value of replacing a legacy IAM system with a more modern, flexible platform? Why make the investment when everything seems manageable as it is now?

    Join ForgeRock and Hub City Media to learn exactly how much value a modern IAM platform can bring to your organization, and how much time, money and resources it will save you in the long run.

    Legacy IAM vs. Modern IAM - Should you stay or should you go?

    •Capabilities comparison
    •Keeping pace with current market demands
    •Preview of what a modern IAM deployment looks like
    •Short-term and long-term benefits of modernizing IAM
    •Potential roadblocks to consider and how to overcome them

    Bring your thoughts, questions and challenges to the table as we uncover the true value of modernizing your Identity and Access Management system.

    By registering for this webinar you agree ForgeRock will maintain and process your personal information for communicating with you.
    The following partner(s) of the the above webinar(s) will have access to the list of registrants, including your contact information:
    Hub City Media (https://www.hubcitymedia.com/privacy-policy)