Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • The evolution of automation
    The evolution of automation
    Belkacem Moussouni, Business Development Lead, EMEA, Automation, Red Hat Live 44 mins
    IDC and Red Hat® know that companies all over the world are optimizing their IT infrastructure with a variety of strategic projects based on emerging technologies. One such technology is automation, a must-have for achieving digital transformation success and modernizing the enterprise IT.

    Red Hat® Ansible® Automation Platform delivers the agility and flexibility to scale automation with control and insight, and bring the power of automation to your whole organization.

    Join this webinar with Red Hat and IDC to discover:

    Why automation is an essential capability.
    The benefits of the Ansible Automation Platform.
  • Adapt easily with affordable and  secure cloud data protection
    Adapt easily with affordable and secure cloud data protection
    Peter Elliman- Director of Product Marketing Druva and Steven Manley Chief Technologist Druva Recorded: Jun 1 2020 58 mins
    Protecting business data and ensuring continuity are top-of-mind priorities for IT professionals as their organizations navigate the new normal of working remotely. Cloud data protection offers the reliability, flexibility, and cost savings that organizations need to adapt quickly.

    How flexible and resilient is your data center backup and disaster recovery solution? Are you able to protect and manage your workloads in a data center as well as remote offices from a centralized platform - while ensuring security and compliance with local regulations?

    Join this webinar with our solution expert to learn:

    - How cloud backup and disaster recovery allow IT to adapt and respond quickly
    - How a cloud approach minimizes the risk of data loss from ransomware attacks
    - How to find significant cost savings today - with up to 50% lower TCO
    - What to consider when evaluating SaaS backup and disaster recovery
  • DLT Security Framework for the Finance Industry
    DLT Security Framework for the Finance Industry
    Jyoti Ponnapalli, DLT Lead, DTCC and Kurt Seifried, Chief Blockchain Officer, Cloud Secur Recorded: May 30 2020 34 mins
    DLT introduces a multitude of value propositions for the financial services industry. The pace of innovation is aggressively picking up in use cases pertaining to finance such as digital assets, tokenization and cryptocurrency. However, the security measures are significantly inadequate to support innovation. There is a growing need for increased vigilance and an industry-standard security framework. Please join us as DTCC & CSA speak about the current state of security in the DLT world and announce the launch of the Blockchain working group to address the needs of industrywide DLT Security Framework.
  • Innovative Enterprise Architecture Techniques to Complete your Digital Transform
    Innovative Enterprise Architecture Techniques to Complete your Digital Transform
    Jon-Michael Brook, Principal: Security, Cloud & Privacy, Guide Holdings LLC Recorded: May 30 2020 38 mins
    A successful digital transformation requires a lot of moving parts. Even greenfield opportunities challenge organizations in catching all business, IT, DevOps, and security tactics in the effort. The Cloud Security Alliance's Enterprise Architecture, Cloud Controls Matrix, and Security Guidance products help create innovative, manageable, repeatable, and measurable processes. In this session, Jon-Michael C. Brook will discuss how the CSA toolset, a sprinkling of open source or third-party products, and a little elbow grease can bring a positive transition to the cloud for your business.
  • How to Future-Proof the Cloud, from the POVs of a CISO, CPO & Ethical Hackers
    How to Future-Proof the Cloud, from the POVs of a CISO, CPO & Ethical Hackers
    Kevin Fielder, CISO, Just Eat and Peter Blanks, Chief Product Officer & Head of Engineering, Synack Recorded: May 30 2020 31 mins
    IDC predicts that by 2022, over 90% of enterprises worldwide will be relying on a cloud solution to meet their infrastructure needs, in large part driven by the COVID-19 remote working environments. This rapid migration to the cloud has created new attack surfaces and opportunities for cybercriminals to gain access to sensitive data and wreak havoc to organizations. Join us as we share how organizations are rapidly deploying dynamic security testing to future proof the connected world from the perspective of a CISO, ethical hackers from the Synack Red Team (SRT), and a solutions architect.

    o Kevin Fielder, CISO of leading food delivery app Just Eat, shares his approach for creating a more secure cloud environment as they scale up to address an uptick in food deliveries during the pandemic and a recent merger.

    o Ethical hackers from the Synack Red Team (SRT) share their perspective on the attacks in the cloud environment and ways to harden cloud-deployed resources.

    o A technical expert from Synack’s Solutions Architect team shares his insights from the frontline helping customers deploy rapid crowdsourced security testing to harden their cloud assets against cybercriminals.

    Tune in to learn how organizations have embraced rapid, easily deployable crowdsourced security testing solutions for the cloud and why the future of cloud security is linked to the future of trusted crowdsourced security intelligence.
  • Cyber Risk Exchanges: Mastering a New Approach to Vendor Risk & Performance Moni
    Cyber Risk Exchanges: Mastering a New Approach to Vendor Risk & Performance Moni
    Randy Ferree, Third-Party Risk Consultant, OneTrust Vendorpedia Recorded: May 30 2020 20 mins
    Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, sourcing, IT, and privacy teams struggle to vet and manage vendor risks and performance in real time. So, how can organizations proactively monitor vendors to protect against emerging issues? Additionally, how can cyber risk exchanges help organizations manage the third-party risk management lifecycle with more efficiency? In this session, we'll answer these questions and breakdown how cyber risk exchanges offer a more streamlined approach to vendor risk monitoring.
  • SDP – The Yellow Brick Road to Zero Trust
    SDP – The Yellow Brick Road to Zero Trust
    Juanita Koilpillai Founder and CEO Waverley Labs LLC Recorded: May 29 2020 42 mins
    Today’s network security architectures, tools and platforms fall short of meeting the challenges presented by current security threats. Zero Trust is emerging as a popular anti-hack strategy and, as the concept implies, requires that users are not allowed any access to anything until they are authenticated. Attaching the moniker “Zero Trust” to solutions, while popular, misleads one into a false sense of security (no pun intended).

    In this webinar, you’ll learn how a Zero Trust implementation using SDP is applied to network connectivity, meaning it is agnostic of the underlying untrusted IP-based infrastructure, and hones in on securing connections. The webinar will delve into the steps to implement SDP and facilitate organizations to defend from new variations of old attack methods that are constantly surfacing in existing perimeter-centric networking and infrastructure models.

    Separating the control plane where trust is established, from the data plane where actual data is transferred.
    Hiding the infrastructure using a dynamic deny-all firewall - the point where all unauthorized packets are dropped for logging and analyzing traffic.
    Using single packet authorization to authenticate and authorize users and validate devices for access to protected services and least privilege is implicit.
  • The Private Life of Data: Using to Improve Data Usage, Governance & Compliance
    The Private Life of Data: Using to Improve Data Usage, Governance & Compliance
    Secure World Panel Experts & Michael McGrath, Sr. Dir. of Compliance & Digital Risk at Proofpoint Recorded: May 29 2020 92 mins
    Legal, compliance and security pressures are evolving in the face of today’s data growth. Understanding the data lifecycle and looking at it through a different lens can help you identify opportunities to improve data usage, governance and compliance. So, what's the best way for you to improve the use and management of data from the perspective of security, cost, governance and regulatory compliance?

    Join this webinar and gain valuable insights as we cover:

    - How to control the costs associated with exponential data growth and storage

    - How to mitigate financial harm and reputation risk by protecting the data of your employees and clients

    - How to retain, discover and supervise your data while adhering to complex and changing international regulations
  • Enhance Security and Operational Efficiency with CASB
    Enhance Security and Operational Efficiency with CASB
    Itir Clarke Sr. Product Marketing Manager, Proofpoint and Dan "Hackerman", National Health Organization Recorded: May 29 2020 53 mins
    The move to the cloud and a mobile workforce has brought new security and compliance risks. Cloud account takeover, data loss and usage of unapproved cloud applications present big challenges to security teams. Protecting IT-approved applications - Microsoft Office 365, Google G Suite, Box, Dropbox, Salesforce, Slack, AWS, ServiceNow and more – is top of mind.

    Join Proofpoint and a healthcare customer as we discuss how CASB enhanced security and operational efficiency for this physician practice management company. We will cover:

    Why do you need a CASB?
    How to protect users from cloud account compromise
    How to defend your data and ensure compliance in the cloud
    How to manage third-party apps and risks of cloud to cloud access
  • On Track with Apache Kafka®: Building a Streaming ETL Solution with Rail Data
    On Track with Apache Kafka®: Building a Streaming ETL Solution with Rail Data
    Robin Moffatt, Developer Advocate, Confluent Recorded: May 29 2020 58 mins
    As data engineers, we frequently need to build scalable systems working with data from a variety of sources and with various ingest rates, sizes, and formats. This talk takes an in-depth look at how Apache Kafka can be used to provide a common platform on which to build data infrastructure driving both real-time analytics as well as event-driven applications.

    Using a public feed of railway data it will show how to ingest data from message queues such as ActiveMQ with Kafka Connect, as well as from static sources such as S3 and REST endpoints. We'll then see how to use stream processing to transform the data into a form useful for streaming to analytics in tools such as Elasticsearch and Neo4j. The same data will be used to drive a real-time notifications service through Telegram.

    If you're wondering how to build your next scalable data platform, how to reconcile the impedance mismatch between stream and batch, and how to wrangle streams of data—this talk is for you!
  • Continuous Audit - Achieve More Through Analytics
    Continuous Audit - Achieve More Through Analytics
    Greg Jordan (Nationwide), Pat Shanahan (Nationwide), Emigdio Zambada (Nationwide), and Brian Sampsel (Covail) Recorded: May 29 2020 50 mins
    In honor of International Internal Audit Awareness Month (May 2020), come hear from Greg Jordan, Nationwide's Senior Vice President and Chief Audit Executive, Pat Shanahan, AVP Information Technology Audit Office, Internal Audit and Emigdio Zambada, Nationwide's IA Data Analytics Director, discuss how their department expanded the use of data & analytics by building a continuous auditing program in the cloud. Partnering with Covail, they leveraged advanced analytics like AI and have provided education and resources to all of their auditors to enhance their data analytics skill set.
  • Secure your Cloud Investment by Unlocking the Network as a Data Source
    Secure your Cloud Investment by Unlocking the Network as a Data Source
    Ryan Davis Sr. Cloud Product Manager ExtraHop Recorded: May 29 2020 40 mins
    While the cloud may be a force multiplier for DevOps and IT Ops, for security teams, it can be a vulnerability. With SecOps taking the blame for stalled migration efforts, enterprises are recognizing the need to take a cloud-native approach to securing data and workloads rather than trying to retrofit old technology to new cloud security best practices. The cloud is proven to spur innovation and efficiency, but the speed at which new devices can be added—and new instances spun up—increases risk to data and applications. Traditional security tools focused on prevention, or those that rely on agents or logs for analysis, can’t keep up with the speed and scale of the cloud. They leave too many blind spots, add friction to development cycles, and slow down incident response. Without visibility into network traffic and the ability to analyze full packets, organizations are vulnerable to new and evolving threats, and security teams are forced to slow the pace of cloud migration.
  • Securing your Journey to the Hybrid Multi-Cloud – from Patchwork to Platform
    Securing your Journey to the Hybrid Multi-Cloud – from Patchwork to Platform
    Christopher Bontempo VP Security Marketing, Routes and Offerings, North America IBM Security |Patrick Vowles Team Lead for No Recorded: May 29 2020 38 mins
    As organization utilize the cloud for innovation and growth, security teams are challenged with ensuring those business initiatives and missions are successful. We need to drive change and integrate security into the business at many levels, from strategy to technology and incident response. We also need to extract as much value as possible from the tools and data sources we already have in place.



    Join us to see how what IBM has learned from thousands of engagements and how the industry is moving towards a true, open, interoperable platform for securing hybrid multicloud environments.



    Please feel free to reach out to Patrick and or Chris with any questions or requests at patrick.vowles1@ibm.com and cbontem@us.ibm.com
  • Presidio C-Suite Perspective Series with Dell Technologies
    Presidio C-Suite Perspective Series with Dell Technologies
    Presidio CEO, Bob Cagnazzi and Dell Technologies Chairman and CEO, Michael Dell Recorded: May 29 2020 45 mins
    Presidio CEO, Bob Cagnazzi and Dell Technologies Chairman and CEO, Michael Dell hosted a discussion on how Technology Leaders are Responding to the Global Pandemic’.

    Both leaders focused on how businesses are adjusting to the challenges of COVID-19 today and how it will impact technology investments and decisions in the future.
  • Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
    Don’t let the Attackers Weaponize Fear: Malware in the time of COVID-19
    Diana Kelley, Cybersecurity Field CTO, Microsoft Recorded: May 29 2020 39 mins
    Wherever we turn it feels like the news is all COVID-19 all the time. Many of us are feeling stressed and overwhelmed and attackers know it. At Microsoft, we've seen an increase in the success of phishing attacks, one of the common vectors for malware and ransomware infections. Rather than inventing entirely new exploits, attackers are pivoting their existing infrastructure for ransomware and other malware delivery tools to COVID-19 focused lures to get us to click. In this talk, we'll share insights into how the attackers have shifted their lures and provide recommendations for improving detect and response times to reduce the likelihood these attacks will work.
  • Trusting Your Data in a Digital Transformation
    Trusting Your Data in a Digital Transformation
    Garth Landers, Director of Product Marketing, Mimecast Recorded: May 29 2020 34 mins
    More than ever, the regulatory landscape is evolving. But between multiple communications channels, skyrocketing data volume and intense regulatory scrutiny from the SEC, FINRA and others, how can you trust your data is immutable and audit ready? How are financial services firms adapting in this transformation? How can you solve for next generation retention, supervision and e-discovery?

    Attend this session and learn best practices in process, policies and technology that will put your firm in the power position when responding to regulatory requirements and reducing risk.
  • An Interview with Sophos: Navigating Cloud Security
    An Interview with Sophos: Navigating Cloud Security
    Ganesh Krishnan, Richard Beckett, and Guy Davis, Sophos Recorded: May 29 2020 41 mins
    Curious about how a leader in cybersecurity moves to the cloud? Join us for an exclusive interview with Ganesh Krishnan, VP of Engineering, and Guy Davies, Principal Cloud Architect at Sophos.

    We’ll discuss how to approach your transition to the cloud, cybersecurity fundamentals and how they need to be re-orientated to deal with cloud threats, and what they’ve learned after all these years of working with security and DevOps teams around the world.
  • The Impact of an Accelerated Remote Culture: How Regulated Firms Can Stay Ahead
    The Impact of an Accelerated Remote Culture: How Regulated Firms Can Stay Ahead
    Jasmine Wu, Director of Product Marketing - Proofpoint Recorded: May 29 2020 38 mins
    The majority of our interactions were face-to-face just two decades ago. Fast forward to today, the amount of time people spend on digital technologies and devices has fundamentally changed the way people interact, work, and communicate. For regulated firms and its governing bodies, the lasting impact this digital shift has created can no longer be ignored. In 2020, more than 80% of the world has gone remote. The amount of digital communication usage skyrocketed for every single industry with technologies including Slack, Zoom, Microsoft Teams and more. The digital world has already arrived, but the remote culture is here to stay. What does this mean for financial services and regulated industries, as well as the regulations that shape its foundation?

    During this session we will explore:

    − A timeline view of communications trends impacting regulated organizations

    − What are the observed challenges we can learn from along the way

    − What successful corporate strategies, technologies, and processes can help organizations stay ahead of an increasingly remote culture

    Speaker Bio: Jasmine Wu is the Director of Product Marketing at Proofpoint. She has more than 10 years of experience providing insight and thought leadership in the emerging communications and compliance space, including cloud collaboration technologies, digital risk protection, data governance and discovery.
  • The Top 7 Cyberattacks Threatening Your Organization
    The Top 7 Cyberattacks Threatening Your Organization
    Louis Evans, Product Marketing Manager, Arctic Wolf Recorded: May 29 2020 65 mins
    As IT staffs struggle to protect ever-increasing risk surfaces from ever-multiplying cyberattacks, cybersecurity has never felt more complicated. But while the number of specific bugs, viruses, bots, and exploits is seemingly beyond measure, attacks often fall within the same handful of types. Understanding these attacks types will enable you can to create a security detection and response practice that keeps you protected regardless of the specific attack.

    In this webinar, attendees will learn:

    Why cyberattacks continue to plague organizations, even after they’ve implemented security point products
    Which common cyberattacks are most likely to impact business operations, and how
    Strategies to protect your organization as cyberthreats continue to evolve
  • Account Takeover 101
    Account Takeover 101
    Matt Duench, Arctic Wolf | Chip Witt, Spycloud Recorded: May 29 2020 60 mins
    The reuse of corporate credentials has been the #1 attack tactic for the last 3-4 years, and with everything else to worry about, protecting your organization from breaches and account takeovers (ATO) has never been a bigger challenge. New tools make it possible for even unsophisticated actors to perform advanced, widespread attacks that put your organization at risk.

    Regardless of the thoughtful measures and policies you have in place, from threat detection to password managers, nothing can protect you from human behavior, and that is the weakest link when it comes to ATO. Your employees may be reusing compromised passwords to access corporate systems or signing up for 3rd party services like LinkedIn or Fantasy Football using their work credentials. When these services are breached, your organization is at risk.

    Watch this on-demand webinar with Arctic Wolf and SpyCloud as they shine a light on how ATO happens—the attack timeline and the surprisingly unsophisticated criminal tactics bad actors are using today—and how to defend your enterprise despite employee and consumer bad password hygiene.

    Learning Objectives:

    The anatomy of an account takeover attack
    Real-world examples of how employee password reuse can threaten your enterprise
    Potential holes in your account takeover plan
    Considerations for reducing digital risk exposure
    What you can do to strengthen your security posture
  • Why Your Cloud Migration Needs a New Approach to Security a
    Why Your Cloud Migration Needs a New Approach to Security a
    Brendan Hannigan, CEO & Co-Founder, Sonrai Security Recorded: May 29 2020 34 mins
    The very nature of how software applications are built today has changed from stem to stern, with public cloud at the foundation of this shift. Companies that have successfully ‘digitally transformed’ are thriving, while laggards continue to languish. While digital transformation continues at a rapid pace, security and governance]has just not kept up as evidenced by so many cloud data breaches. In this talk, you will learn:
    Why digital transformation turns old-security ways upside down
    How new approaches must be built for cloud from the ground up
    Why identity and data are the key critical control points for public cloud governance
    The ticking time-bomb of complexity hidden in cloud-provider IAM models
    5 steps organizations can take to de-risk their cloud
  • Presidio C-Suite Perspective Series with VMware
    Presidio C-Suite Perspective Series with VMware
    Presidio CEO, Bob Cagnazzi and VMware CEO, Pat Gelsinger Recorded: May 29 2020 58 mins
    Presidio CEO, Bob Cagnazzi and VMware CEO, Pat Gelsinger hosted a discussion on how Technology Leaders are Responding to the Global Pandemic’.

    Both leaders focused on how businesses are adjusting to the challenges of COVID-19 today and how it will impact technology investments and decisions in the future.
  • The Hits – and a Few Misses – in Vendor Security Assessments
    The Hits – and a Few Misses – in Vendor Security Assessments
    David Lenoe Sr. Sr. Director of Product Security Adobe Recorded: May 29 2020 44 mins
    Use of 3rd -party cloud technology and service vendors is common to pretty much any business. Maintaining your own security posture requires that you also ensure those vendors are maintaining comparable posture. However, what is the right way to assess a vendor’s security posture? What are the relevant questions to ask and documentation to request? What is not relevant in such an assessment? At Adobe, we are in an interesting position in the industry in that we are both a large technology and service vendor as well as one of the largest consumers of 3rd party technology and services. Through developing our own vendor assessment program, our ongoing work with industry standards groups and consortia, and evaluation of our own security practices by our own customers, we have learned a lot about what to do right with these assessments – as well as a few things that are not quite so productive. Join Dave Lenoe, director of product security for Adobe, as he presents our lessons learned and best practices that can help you develop a successful cloud vendor security assessment program.
  • Presidio C-Suite Perspective Series with Nutanix
    Presidio C-Suite Perspective Series with Nutanix
    Presidio CEO, Bob Cagnazzi and Nutanix Founder, Chairman & CEO, Dheeraj Pandey Recorded: May 29 2020 55 mins
    Presidio CEO, Bob Cagnazzi and Nutanix Founder, Chairman & CEO, Dheeraj Pandey hosted a discussion on how Technology Leaders are Responding to the Global Pandemic’.

    Both leaders focused on how businesses are adjusting to the challenges of COVID-19 today and how it will impact technology investments and decisions in the future.
  • Regulatory Reporting and Credit Risk Management on the Buy-Side
    Regulatory Reporting and Credit Risk Management on the Buy-Side
    Elena Kozhemyakina, Fintech4Funds | Igor Tesinsky, intelliBONDS | Parag Samarth, Magic Finserv Recorded: May 29 2020 60 mins
    Regulatory Reporting and Credit Risk Management on the Buy-Side: How FinTech Can Assist with Upcoming Challenges

    Over the past 3-4 years the avalanche of new Regulations has exceeded all our expectations and created a new challenging environment for market participants. EMIR, MIFIDII, the upcoming SFTR and other Regulations all require both buy and sell side clients to report to regulators in a timely manner. Banks and other larger institutions have faced these challenges by dramatically increasing their Compliance, Operations and IT departments and introducing a lot of manual work arounds while they were developing internal technical solutions that allowed them to automate the processes and meet new criteria. Buy-Side clients, especially the small to medium sized ones, have never had the luxury of expanding their compliance personnel nor did they have budgets to develop solutions internally. Order Management Systems Providers were not able to respond from their side on time and those of them that were not CLOUD based had to spend months developing new upgraded versions. However, each upgrade of the systems needs to be integrated separately into the environments of individual clients. As a result, smaller clients are suffering at the expense of larger buy-side clients who bring the larger contracts and cash flows to the Providers.
  • Maximise your security posture on Microsoft Azure
    Maximise your security posture on Microsoft Azure
    Aydin Aslaner, Microsoft, Chris Hill, Barracuda Newtorks, Gemma Allen, Barracuda Networks Jun 1 2020 10:00 am UTC 60 mins
    Do you have a comprehensive security plan for your cloud infrastructure?

    This eye-opening webinar will help you to combat ever-expanding business challenges and threats by strengthening your security posture.

    Join us for this webinar co-presented by Microsoft and Barracuda and discover:

    • How to secure your applications and data in Microsoft Azure
    • How to secure remote access tailored to your needs
    • How to easily protect your Office 365 data with advanced backup and recovery
    • How to automate public-cloud security compliance and remediation

    Plus, get answers to all your questions in the interactive Q&A session following the presentation.

    Let us secure your cloud journey.
  • Clarity: Organize Your Investments in Hierarchies
    Clarity: Organize Your Investments in Hierarchies
    Clarity from Broadcom Jun 1 2020 12:45 pm UTC 26 mins
    See how Clarity helps you organize investments the way your business actually runs.
  • Clarity: Roadmap Strategies to Business Objectives
    Clarity: Roadmap Strategies to Business Objectives
    Clarity from Broadcom Jun 1 2020 1:15 pm UTC 8 mins
    Understand how your products perform by aligning strategies to business objectives in Clarity.
  • Clarity: Make Ideas Come Alive
    Clarity: Make Ideas Come Alive
    Clarity from Broadcom Jun 1 2020 1:45 pm UTC 7 mins
    Add budgets and resources to your ideas in the ideation process. It all carries over as ideas turn into real work.
  • How Will Drupal 9 Enable My Site For The Future?
    How Will Drupal 9 Enable My Site For The Future?
    Dries Buytaert, Angie Byron, Gábor Hojtsy, Tim Lehnen Jun 1 2020 2:00 pm UTC 63 mins
    June 3rd, 2020 marks the launch date of the highly-anticipated release of Drupal 9 within the Drupal community.

    As with any major release of a new version of Drupal, this prompts many questions. "What will change from Drupal 8 to Drupal 9?", "What experience can I expect with Drupal 9?" and "How do I prepare my site today?" Whether you are on Drupal 6, Drupal 7 or Drupal 8, we have answers for you.

    Watch Dries Buytaert, the Founder of Drupal and Acquia’s Co-Founder & CTO, alongside Drupal experts Angela Byron & Gábor Hojtsy as they share insights on how to prepare for the release of Drupal 9, followed by an audience Q&A session moderated by Tim Lehnen, Drupal Association’s CTO.

    In this session, you’ll learn:
    - What to expect from Drupal 9
    - How you can prepare your site, whether you’re on Drupal 8 or previous versions of Drupal
    - The resources and tools available to make the upgrade as seamless as possible
    - What you can expect from the Drupal 9 experience and the benefits of upgrading
  • Putting the Power of Process and Workflow to Work Today and Tomorrow
    Putting the Power of Process and Workflow to Work Today and Tomorrow
    Matt Mayhew and Dan Stoll Jun 1 2020 5:00 pm UTC 27 mins
    There is no better time than now to fully understand your business processes and put the combined power of workflow automation, robotic process automation, and document automation to work for organization.

    As the industry leader, we know process and we know workflow. There’s a reason why thousands of organizations in more than 90 countries turn to the Nintex Process Platform for managing, automating and optimizing a wide-range of business processes and workflows.

    In fact, every day our partners and customers successfully solve process problems big to small with automated workflows and digital forms, RPA bots, and more. With the power and ease of our software, you too can build and deploy process apps fast, and without using code.

    Join us for an informative and interactive demo of the Nintex Platform. In less than an hour, we’ll show you all the capabilities we offer so your organization can save time and money, increase productivity, accelerate results, and focus your team’s energies on mission-critical work.

    In this session, you will learn:

    The importance of business processes, and how to map and manage them
    What technologies are best to automate repetitive tasks, departmental, and industry-specific business processes
    Valuable success resources available to every Nintex community member worldwide
    Nintex is here to help you navigate the rapidly changing world today and tomorrow. We remain committed to improving the way people work.
    We look forward to having you join us.
  • Phishing Threats in a Mobile-Enabled World
    Phishing Threats in a Mobile-Enabled World
    Chris Hazelton, Director Security Solutions, Lookout Jun 2 2020 12:00 am UTC 37 mins
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • タレスの暗号化ソリューションで対応できるPCI DSSの要件
    タレスの暗号化ソリューションで対応できるPCI DSSの要件
    タレスDIS CPLジャパン株式会社、データプロテクション事業本部パートナー営業部、部長 前田 俊一 Jun 2 2020 1:00 am UTC 45 mins
    PCIDSSコンプライアンス対応に留まらず、カード情報や個人情報の保護は企業の責任です。テレワークが増え、クラウドトランスフォーメーションが進む今、データそのものを保護する最後の砦となる暗号化の有効性と、実用例についてご紹介します。
  • Cloud Threat Landscape: Recent findings from Check Point Research (APAC AM)
    Cloud Threat Landscape: Recent findings from Check Point Research (APAC AM)
    Ashwin Ram, Cyber Security Evangelist Jun 2 2020 1:00 am UTC 30 mins
    "In the digital transformation era, cloud computing plays an integral role. Scalability, flexibility, agility and automation sound like magical words that make us more productive and innovative once we embrace cloud platforms and utilize cloud applications.

    But, how secure are these platforms and apps?

    This session reveals Check Point Research (CPR) latest cloud related findings. From a fraudulent wire transfer initiated through an email compromised on a cloud app to a vulnerability within a public cloud infrastructure, CPR analysis the latest risks and threat landscape of public cloud. The session will also include global threat intelligence stats related to COVID-19 and public cloud."
  • Your Journey to the Cloud – The Secure Way (APAC AM)
    Your Journey to the Cloud – The Secure Way (APAC AM)
    Gary Gardiner, Head of Security Engineering (APJ) Jun 2 2020 1:45 am UTC 30 mins
    "In 2020 cloud-related attacks and breaches made even more headlines and companies realized they needed to get their act together.

    So they started to abandon homegrown open-source security tools and focused on consolidated cloud-based threat prevention frameworks offering complete coverage to cloud-related attacks. Going into 2020 & 2021, we're seeing this trend grow as more cloud-related technologies are gaining great security from the industry with specific answers to security challenges of containers, Kubernetes environments, and serverless workloads. In this session, we will cover recent trends and highlight some of the advancements made in fending off threats and turning security into an enabler force in enterprise digital transformation."
  • Why You Should Have Zero Trust in the Web
    Why You Should Have Zero Trust in the Web
    Menlo Security Jun 2 2020 2:00 am UTC 38 mins
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • Hybrid Cloud Blueprint: Best Practices for Designing Secure Cloud Deployments AM
    Hybrid Cloud Blueprint: Best Practices for Designing Secure Cloud Deployments AM
    Richard Cove, Cloud Security Architect Jun 2 2020 2:30 am UTC 30 mins
    Protecting you from you is the #1 challenge in the age of SDE - Software Defined Everything. Using public clouds for enterprise data centers is now mainstream; the advantages are significant and the gained agility indisputable.

    However, the number of services and options being offered is daunting. And with these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.

    Join this session to learn the best practices to providing advanced threat prevention security for applications and data in private, public, and hybrid clouds.

    APAC Edition
  • It ain't done till it's automated. Security at the speed of DevOps (APAC AM)
    It ain't done till it's automated. Security at the speed of DevOps (APAC AM)
    Dean Houari, Head of DevSecOps (APAC) Jun 2 2020 3:15 am UTC 30 mins
    Amidst the growing buzz for shift-left developer centric security methods, this session will highlight the need for a common ground between security and DevOps and offer guidance on how to build in security without impeding agility.
  • SD-WAN Security: Best-of-Breed or Unified Approach? (APAC AM)
    SD-WAN Security: Best-of-Breed or Unified Approach? (APAC AM)
    Nils Ujma, Solution Architect Jun 2 2020 4:00 am UTC 30 mins
    As enterprises move their branch applications to the cloud, they are adopting Software Defined Wide Area Networking (SD-WAN) for better application performance by intelligently and efficiently routing traffic directly to the internet without passing it through the data center.

    But this needs to happen without compromising security. This talk will address how using both application performance and security can be assured without one compromising the other.
  • Lessons on Open Source Governance From the 2020 OSSRA Report
    Lessons on Open Source Governance From the 2020 OSSRA Report
    Tim Mackey, Principal Security Strategist, Synopsys Jun 2 2020 5:00 am UTC 57 mins
    The 2020 Open Source Security and Risk Analysis report looks at the state of open source use in over 1,250 distinct applications created by organizations in 17 industries. As we’ve seen in past years, the use of open source in commercial applications continues to grow, and businesses of all sizes are now powered by open source software. Whether your organization uses open source intentionally or via commercial vendors, understanding how open source communities update their software is a key factor when planning any cyber security response plan. In this webinar, we’ll walk through the findings from the 2020 OSSRA report with an eye on how teams can use the data to inform their overall open source governance plans.
  • Meet the Experts – Ask Us Anything!
    Meet the Experts – Ask Us Anything!
    Gary Gardiner, Head of SE (APJ) & Doug Farndale, MD (Growth Technologies) Jun 2 2020 6:00 am UTC 45 mins
    Meet our cloud security experts and evangelists, share your top cloud security challenges and hear their responses.
  • Cloud Threat Landscape: Recent findings from Check Point Research (APAC PM)
    Cloud Threat Landscape: Recent findings from Check Point Research (APAC PM)
    Smit Kotadiya, Security Evangelist Jun 2 2020 7:00 am UTC 30 mins
    In the digital transformation era, cloud computing plays an integral role. Scalability, flexibility, agility and automation sound like magical words that make us more productive and innovative once we embrace cloud platforms and utilize cloud applications.

    But, how secure are these platforms and apps?

    This session reveals Check Point Research (CPR) latest cloud related findings. From a fraudulent wire transfer initiated through an email compromised on a cloud app to a vulnerability within a public cloud infrastructure, CPR analysis the latest risks and threat landscape of public cloud. The session will also include global threat intelligence stats related to COVID-19 and public cloud.
  • Your Journey to the Cloud – The Secure Way (APAC PM)
    Your Journey to the Cloud – The Secure Way (APAC PM)
    Gary Gardiner, Head of Security Engineering (APJ) Jun 2 2020 7:45 am UTC 30 mins
    In 2020 cloud-related attacks and breaches made even more headlines and companies realized they needed to get their act together.

    So they started to abandon homegrown open-source security tools and focused on consolidated cloud-based threat prevention frameworks offering complete coverage to cloud-related attacks. Going into 2020 & 2021, we're seeing this trend grow as more cloud-related technologies are gaining great security from the industry with specific answers to security challenges of containers, Kubernetes environments, and serverless workloads. In this session, we will cover recent trends and highlight some of the advancements made in fending off threats and turning security into an enabler force in enterprise digital transformation.
  • Задай вопрос эксперту по Commvault
    Задай вопрос эксперту по Commvault
    Дмитрий Иванюк, эксперт по решениям Commvault Jun 2 2020 8:00 am UTC 90 mins
    Уважаемые коллеги!
    Приглашаем Вас принять участие в традиционном ежеквартальном вебинаре «Задай вопрос эксперту».
    В рамках трансляции вам предоставляется возможность интерактивного общения с экспертом Commvault в режиме реального времени.
    Данный вебинар включает следующее:
    • возможность задать свой вопрос по программному продукту Commvault,
    • полный интерактив,
    • демонстрация сценариев,
    • детальные ответы на ваши вопросы.

    Присоединяйтесь и приглашайте коллег!
  • Последние изменения в продуктах ArcSight и планы на будущее развитие
    Последние изменения в продуктах ArcSight и планы на будущее развитие
    Вячеслав Тупиков, архитектор решений ArcSight, Micro Focus Jun 2 2020 8:00 am UTC 75 mins
    Уже ставший традиционным для Форума пользователей ArcSight открывающий доклад, в котором мы рассмотрим последние изменения в продуктовой линейке Security Operations и а также заглянем в возможное будущее продуктов и решений Micro Focus в области информационной безопасности.
  • Hybrid Cloud Blueprint: Best Practice for Designing Secure Cloud (APAC PM)
    Hybrid Cloud Blueprint: Best Practice for Designing Secure Cloud (APAC PM)
    Richard Cove, Cloud Security Architect Jun 2 2020 8:30 am UTC 30 mins
    Protecting you from you is the #1 challenge in the age of SDE - Software Defined Everything. Using public clouds for enterprise data centers is now mainstream; the advantages are significant and the gained agility indisputable.

    However, the number of services and options being offered is daunting. And with these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.

    Join this session to learn the best practices to providing advanced threat prevention security for applications and data in private, public, and hybrid clouds.
  • Phishing Threats in a Mobile-Enabled World
    Phishing Threats in a Mobile-Enabled World
    Chris Hazelton, Director Security Solutions, Lookout Jun 2 2020 9:00 am UTC 37 mins
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • What really matters to security teams?
    What really matters to security teams?
    Dave Gruber Jun 2 2020 9:00 am UTC 58 mins
    A business may have sound security measures in place to protect the normal course of business, but they cannot simply be “cut and pasted” and applied to an increasingly remote workforce.

    Telecommuting presents its own unique set of security challenges, including a number of environmental changes and increased reliance on the digital world, all of which must come into consideration.

    What devices will employees be using, and where will they be using them? Could others have easy access to information that is proprietary, either in physical proximity or through a shared WiFi connection?
    How will we share information with each other, and is that source being proactively secured?

    Join this webinar to learn why Cybereason are on our radar because of the holistic nature of their offering.
  • DevSecOps - Sécurisez vos applications à la vitesse du DevOps
    DevSecOps - Sécurisez vos applications à la vitesse du DevOps
    Nabil Bousselham | Solution Architect at Veracode Jun 2 2020 9:00 am UTC 45 mins
    C’est au moment où vous pensez que les cybermenaces ne peuvent pas devenir critiques qu’elles empirent.
    Les cyberattaques ont doublé au cours des 12 derniers mois. Ce n'est pas seulement les risques cyber qui mettent en péril vos ressources, c'est aussi l’effort nécessaire pour y remédier qui les épuisera. Il est donc important aujourd’hui d’adopter les stratégies, politiques et processus du DevSecOps.

    Veracode affirme que les technologies natives du cloud aident les développeurs à réduire le temps nécessaire pour éliminer les failles de sécurité. Gartner indique que, d'ici 2022, les organisations qui utilisent une infrastructure cloud pour automatiser la protection et la sécurité subiront 60% d'incidents de sécurité en moins. Les équipes DevSecOps qui travaillent de cette manière résoudront les problèmes de sécurité trois fois plus rapidement.
    Mais comment ? Rejoignez Nabil Bousselham, Solutions Architect EMEA chez Veracode, qui vous montrera en pratique ce que signifie DevSecOps, ainsi que les étapes nécessaires pour obtenir des résultats rapides et efficaces.
    Dans ce webinaire, vous découvrirez :

    Comment lancer et établir un programme DevSecOps en interne
    Les gains rapides qui renforceront votre posture de sécurité en quelques semaines
    Comment placer l'analyse de la sécurité dans les pipelines CI / CD
    Où vous devriez concentrer les ressources pour obtenir des résultats
    Comment développer une bonne culture d’entreprise pour produire du code sécurisé
  • MINDHUNTER #1 - Social Engineering: The Threat Is Coming From Inside The House
    MINDHUNTER #1 - Social Engineering: The Threat Is Coming From Inside The House
    John Aarsen, SE - Benelux and Nordics, SonicWall Jun 2 2020 9:00 am UTC 60 mins
    Join SonicWall expert John Aarsen as he goes through the anatomy of social engineering attacks to demonstrate how people are manipulated into performing actions or divulging confidential information. These attacks have become more frequent and aggressive as attackers attempt to exploit the circumstances surrounding COVID-19. In the case of both users and organizations, overconfidence can lead to complacency, allowing such attacks to succeed. That’s why it’s crucial that you consider social engineering as your company builds its boundless cybersecurity strategy.