Hi [[ session.user.profile.firstName ]]

IT Governance, Risk and Compliance

  • 【パートナー様向けWebセミナー】 FireEye NX 最新バージョン OS 8.0のご紹介と 提案のポイント
    【パートナー様向けWebセミナー】 FireEye NX 最新バージョン OS 8.0のご紹介と 提案のポイント FireEye Japan Recorded: Dec 14 2017 38 mins
    ファイア・アイ製品の販売に携わるパートナー、リセラーの皆様
    日頃より、ファイア・アイの製品およびサービスの販売、サポートのご支援を賜り誠にありがとうございます。

    このたび、Web脅威対策製品である「FireEye NX シリーズ」の最新バージョン「OS 8.0」 がリリースされました。今回のバージョンでは、侵害後の水平展開の動きを検知できる「スマートビジョン」やアナリストの解析を支援するアラート画面の刷新など、他社製品と比べ格段に強力なセキュリティ機能が搭載されています。また、OS 8.0の性能を最大限に引き出す最新ハードウェアプラットフォームも合わせてリリースされます。
    つきましては、下記の通り、OS 8.0の新機能について詳細、および導入例やキャンペーン情報などをご紹介するWebセミナーを開催いたします。
    12月のお忙しい中とは存じますが、ぜひ本Webセミナーにご参加ください。また、当開催情報につきましては社内で共有いただき、より多くの営業ご担当またはSEの方にもご案内いただけましたら幸いです。
  • 【最新機能が満載】ファイア・アイWeb脅威対策製品「FireEye NX」まるわかりWebセミナー
    【最新機能が満載】ファイア・アイWeb脅威対策製品「FireEye NX」まるわかりWebセミナー FireEye Japan Recorded: Dec 14 2017 41 mins
    セキュリティご担当の皆様

    昨今のセキュリティ攻撃は、ますます高度化が進んでいます。企業、組織のお客様がこうした脅威に対抗するべく、ファイア・アイのWeb脅威対策製品「FireEye NX」はどんどん進化をしています。


    この10月にリリースされた最新バージョンでは、侵害後の水平展開の動きを検知できる「スマートビジョン」やアナリストの解析を支援するアラート画面の刷新など、他社製品と比べ格段に強力なセキュリティ機能が搭載されています。また、新バージョンの性能を最大限に引き出す最新ハードウェアプラットフォームも合わせてリリースされます。


    つきましては、下記の通り、FireEye NXの最新機能で何ができるようになり、どういった脅威対策が可能になるのかを紹介するWebセミナーを開催いたします。

    本セミナーでは、ファイア・アイの会社概要、サンドボックス技術について、FireEye NXの基本機能を紹介した後、最新機能をわかりやすく解説します。標的型攻撃対策のポイントやファイア・アイの優位性などもお話させていただきますので、新たにセキュリティ担当になられた方、最新の脅威対策について知りたい方に最適な内容となっています。ふるってご参加ください。
  • Which Cyber/Cloud Security Certification Should I Obtain?
    Which Cyber/Cloud Security Certification Should I Obtain? Dr. Victor Berlin, Mission Critical Institute Recorded: Dec 14 2017 21 mins
    We will be reviewing the Certifications in the Cyber/Cloud Security industry and explaining the benefits of each.
  • IoT Security Overview: Threat Detection vs. IoT Device Protection
    IoT Security Overview: Threat Detection vs. IoT Device Protection Keao Caindec, Vice President of Marketing at Mocana Corporation Recorded: Dec 13 2017 22 mins
    Protecting connected networks and the Internet of Things (IoT) is critical to ensuring data privacy and security of systems. In this webinar, you'll learn about hacking scenarios and defending against common cyber attack vectors. You'll also learn about the important differences between IoT threat detection and device protection and how to reduce your cyber risks.
  • IDC FutureScape: Worldwide Customer Experience (CX) 2018 Predictions
    IDC FutureScape: Worldwide Customer Experience (CX) 2018 Predictions Alan Webber, Research Director, Digital Strategy & Customer Experience Recorded: Dec 13 2017 34 mins
    In this IDC FutureScape presentation, IDC's Alan Webber will discuss covering the key predictions that will impact how enterprises address the customer experience over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • Machine Learning in Black and White
    Machine Learning in Black and White Chris Poulin, Principal/Director, Booz Allen Hamilton and Staffan Truvé, CTO and Co-Founder of Recorded Future Recorded: Dec 13 2017 58 mins
    Machine learning is no longer just the tool of tech companies. While it is now being baked into most security protection technologies, threat actors are a step ahead — adopting machine learning to conduct increasingly sophisticated attacks, and to circumvent AI-based defenses. In this webinar, Chris Poulin, Principal/Director with Booz Allen Hamilton and Staffan Truvé, CTO and Co-Founder of Recorded Future will show the good and bad of AI and machine-learning technologies, including:

    • How the collection and analysis of open source and technical data at unprecedented scale allows proactive decision making.
    • What humans can do — but beyond human scalability.
    • Examples of successful threat actor campaigns utilizing AI techniques.
  • Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security
    Healthcare Orgs: Empower Your Mobile Workforce Without Sacrificing Data Security Hussein Syed, RWJBarnabas Health; Alex Fry, Strong Crypto Innovations LLC; Mike Schuricht, Bitglass Recorded: Dec 13 2017 57 mins
    Mobile computing and the use of cloud applications are touted as ways to help healthcare providers deliver better patient care. Clinicians carrying tablets or other devices to exam rooms and patients’ bedsides can quickly access and update patient data and other vital resources necessary for accurate and expeditious treatment.

    No one disputes the value of “anytime, anywhere” computing in healthcare – indeed, in other industries as well – but there is a concern about the risk associated with access to sensitive and regulated data via unmanaged devices and unsanctioned cloud applications.

    In this CISO panel discussion moderated by Hussein Syed, CISO at RWJBarnabas Health and joined by panelists Alex Fry, Principal Security Consultant at Strong Crypto Innovations LLC and Mike Schuricht, VP of Product Management, Bitglass, you’ll learn about real-world approaches to some of the most vexing challenges of mobile and cloud computing.
  • The Veracode Platform: Behind the Scenes Tips and Tricks!
    The Veracode Platform: Behind the Scenes Tips and Tricks! Mitch Horton, CA Veracode Principal Security Program Manager Recorded: Dec 13 2017 47 mins
    Hear from one of our customer-facing Services experts to learn the ins and outs of the Veracode platform. See how Veracode can you started with assessing and managing security risk across your entire application portfolio. With a wide range of security testing and threat mitigation techniques, all hosted on a central, cloud-based platform – your security program will be up and running and ready to scale.

    During this webinar, you will see a demo of the Veracode platform’s ability to scan all of the applications and components you build or buy, covering all major languages, frameworks, and application types. As a central repository for your applications and components, Veracode’s platform provides you with full visibility into your risk posture and integrates into each stage of your software development lifecycle, so you are building and delivering secure software.
  • Cloud and IOT Security: Considerations for securing data
    Cloud and IOT Security: Considerations for securing data Ulf Mattsson, David Morris, Juanita Koilpillai Recorded: Dec 13 2017 46 mins
    As the adoption of cloud computing and Iot increases across many business sectors, your applications ingest and share data generated and stored within and beyond the limits of your own on premise firewalls and other security products. This has the potential of creating data blind spots that can affect your overall security posture—both for your internal data and those of your customers and clients. To protect your business, you need a balanced approach to managing IoT and cloud risk and respective security controls—combining compliance, responsiveness, and engineering without sacrificing usability and agility. During this Webinar, we will walk through a check list of questions to ask your business units to ensure your cloud usage is not putting your enterprise at risk.

    Cloud Security Platforms can provide cost effective Ecommerce, mobile, payment security, fraud management, and secure file transfer as a flexible software as a service (SaaS). These solutions, operating on tightly controlled secure data centers, provide a cloud security solution that adapts and integrates with a variety of business processes and organizations.

    Join this presentation to learn how to reduce risk associated with moving to the cloud while maintaining simplicity and efficacy.

    - IT is all about the data - Do you know what data you have, where it is, and how is protected?
    - What are your security responsibilities for IoT and those of your cloud service provider?
    - What is your current risk register regarding use of the your cloud service provider (confidentiality, integrity and availability)?
    - How do you perform a risk assessment for your current and emerging cloud services and IoT?
  • Managing compliance and risk with Data Center Automation
    Managing compliance and risk with Data Center Automation Megan Glick, Darren Blumenthal, Joe deBalquiere Recorded: Dec 13 2017 37 mins
    It’s no secret that IT compliance management requirements are on an upward spiral. From growing and ever-changing external regulatory policies to tightening internal requirements, getting a complete view across the infrastructure is a major challenge, let alone proving it’s in a compliant state. Micro Focus Data Center Automation addresses these obstacles, providing a single solution for internal and regulatory compliance across heterogeneous servers, database, and middleware.

    Join us to see:

    Product in action including the new simplified portal for compliance use cases
    New risk and security dashboards that give you ultimate visibility into the state of compliance across the entire data center
  • Osterman Research Report: Assessing the Total Cost of Veritas Enterprise Vault
    Osterman Research Report: Assessing the Total Cost of Veritas Enterprise Vault Michael Osterman, Osterman Research Recorded: Dec 13 2017 57 mins
    Many organizations are evaluating cloud-based archiving solutions by performing comparative cost analyses against legacy on-premises systems. However, constructing a true comparative analysis can be difficult because the software, hardware, storage, and infrastructure costs of on-premises systems are often distributed across multiple IT cost centers or are simply difficult to estimate.

    Join Actiance and Michael Osterman of Osterman Research as we discuss the results of an Osterman survey on the actual costs of maintaining and operating a Veritas Enterprise Vault environment versus a cloud-based archiving solution.

    During this webinar, you will learn about:

    – Real world cost experiences in managing on-premise archives

    – How the survey results have led to the development of a TCO model to help you determine your own cost comparison

    – How the Actiance Platform offers a significantly lower cost of ownership while providing an architecture to support your archiving needs
  • Implementing a Cyber Security Rx to Support the Latest Healthcare Advances
    Implementing a Cyber Security Rx to Support the Latest Healthcare Advances Tracy Hillstrom, Director of Product Marketing, and Ryan Orsi, Director of Product Management Recorded: Dec 13 2017 58 mins
    The healthcare industry is experiencing a surge in transformative new technologies, and introducing telemedicine, more networked devices (Internet of Medical Things), and increases in protected EMR transmissions over Wi-Fi to enable better treatment, productivity, and communication within healthcare facilities. While they contribute to better overall outcomes - they can also open the door to new cyber security risks that need to be addressed with comprehensive security measures.
    Join Director of Product Marketing, Tracy Hillstrom, and Director of Product Management, Ryan Orsi, as they review the risks and the strategies to protect privileged information and support your compliance activities in Healthcare. You'll learn how medical providers can defend against malware with a cyber security “Rx” that supports a healthy technology adoption plan for every healthcare organization.
  • Do You Understand Your Risk with Your Vendors?
    Do You Understand Your Risk with Your Vendors? Jennifer Anderson, Jeff Avery, Ben Fagen Recorded: Dec 13 2017 56 mins
    You can source your processes, but you own the risk. How well are you managing your third parties and supply chain? Are you able to understand changes in your vendors' security status dynamically? We invite you to attend our webinar to see our RSA Archer and BitSight integration. Using these two systems, see how we bring qualitative and quantitative risk information together for a more comprehensive and holistic view of your vendors.
  • IDC FutureScape: Worldwide Operations Technology 2018 Predictions
    IDC FutureScape: Worldwide Operations Technology 2018 Predictions Lorenzo Veronesi, Research Manager, IDC Manufacturing Insights Recorded: Dec 13 2017 41 mins
    In this IDC FutureScape presentation, the IDC Worldwide Op Tech team discusses the key predictions that will impact CIOs and IT professionals in the worldwide operations technology industry over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • Healthcare Holiday Tales
    Healthcare Holiday Tales DataMotion Recorded: Dec 13 2017 6 mins
    A fun healthcare twist on a holiday tale reading. For anyone who has received health care from multiple providers, and all those working in the healthcare or technology industries. Happy holidays!
  • Blended Learning workshops
    Blended Learning workshops Kate Boothroyd Recorded: Dec 13 2017 33 mins
    The webinar will focus on the new interactive and face-to-face, Blended Learning workshops for the International Certificates which will reinforce your understanding of the material and help you develop the practical skills needed to put your learning into practice.
  • How today’s threats prey on the human factor | 2017 Human Factor Report
    How today’s threats prey on the human factor | 2017 Human Factor Report Patrick Wheeler, Director, Threat Intelligence, Proofpoint Recorded: Dec 13 2017 48 mins
    Ransomware. Business email compromise (BEC). Social media phishing. Counterfeit mobile apps. Today’s advanced attacks use different tactics and vectors, but they all have one thing in common: they target people, not just infrastructure.

    In this webinar, we use original research and data collected from real-world Proofpoint deployments around the world to explore who is being targeted, how attackers are getting people to click, and what you can do about it.

    Register now to learn about:
    •The latest social engineering targeting trends and techniques
    •Top email fraud tactics, including business email compromise (BEC) and social media account phishing
    •The rise of fraudulent mobile apps and how criminals target users on the go
  • Endpoint Security for Cloud Generation & New Integrations Extend Data Protection
    Endpoint Security for Cloud Generation & New Integrations Extend Data Protection Sam Tong, Senior Principal Systems Engineer, Symantec; Moderator: S.C. Leung, Member, Asia-Pacific Advisory Council, (ISC)² Recorded: Dec 13 2017 64 mins
    First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:

    •Defend against ransomware with multi-layered protection
    •Gain enhanced visibility into suspicious files via tunable protection to make better policy decisions
    •Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    •Extend advanced security to mobile devices
    •Use deception techniques to expose hidden adversaries and determine their intent to improve security posture
    •Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    New Integrations Extend Data Protection Beyond Traditional DLP

    Powered by the industry’s leading data loss prevention technology, to give you greater visibility and control over your confidential data.

    •Expanded Information Centric (ICE) Encryption integration
    •Enhanced data classification integration
    •Sensitive Image Recognition
    •Stronger endpoint controls
    •Enhanced data at rest discovery
    •Improved cloud app policy and incident management
    •Flexibility on cloud deployment
    •And More …

    Join Symantec and (ISC)² on Dec 13 at 14:00 (Hong Kong time) and learn about the latest Evolution of Endpoint Security & Data Protection.

    This webinar will be conducted in Cantonese.
  • Cloud Compliance with New Financial Services Cybersecurity Regulations
    Cloud Compliance with New Financial Services Cybersecurity Regulations Nathan Narayan, Director Product Mgt, Livius Feinbaum, Principal Sales Engineer, and Neelum Khan, Netskope Product Evangelist Recorded: Dec 13 2017 37 mins
    The coming into effect of New York's cybersecurity compliance requirements for financial institutions and their third party service providers marked a major development in the cyber risk regulatory environment. In this social webcast you’ll meet Netskope’s product experts as they discuss some practical steps to help you achieve cloud compliance with the regulations.

    In this webinar, they will review:

    - Common cloud compliance concerns from leading financial institutions and strategies to overcome these hurdles
    - Tips for implementing the key requirements outlined in the regulation within your cloud environment
    - The answers to your most common questions about cloud compliance

    PRESENTERS

    Nathan Narayan, Director of Product Management, Netskope

    Livius Feinbaum, Principal Sales Engineer, Netskope

    Neelum Khan, Product Evangelist, Netskope
  • Security Predictions for 2018: An APAC Viewpoint
    Security Predictions for 2018: An APAC Viewpoint Bryce Boland, Asia Pacific CTO Recorded: Dec 13 2017 37 mins
    As the sun sets on 2017, the major trends, biggest breaches and latest innovations provide us with a sense for what the future will bring. Not many things are absolute in the security industry, but we know for certain that threat actors will continue to attack and defenders will be tasked with stopping them.

    Join Bryce Boland, Asia Pacific CTO at FireEye, as he shares a glimpse into cyber security in 2018, with insights drawn from our senior leaders, Mandiant incident responders, FireEye iSIGHT Intelligence and FireEye Labs. Several timely topics will be covered in detail:

    •What types of nation-state activity we will be seeing
    •What new regulations such as GDPR mean for organizations
    •How to ensure a secure environment as more organizations migrate to the cloud

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service?
    Cybersecurity choices: SIEM, MSSP, or SOC-as-a-Service? Sridhar Karnam, Director of Product Strategy at Arctic Wolf; Terry R., Exec Editor at SC Media Recorded: Dec 12 2017 58 mins
    Gain insight into three cybersecurity solutions: SIEM, MSSP, and SOC-as-a-Service. Discover which solution is the best fit for your organization based on some of the following criteria:

    - company size offerings
    - detection and response capabilities
    - deployment times
    - support and expertise

    Think you're too small for a SIEM or SOC-as-a-Service? This webinar will explain why you're not. Think you're too big for an MSSP? Find out if that's truly the case.
  • IDC FutureScape: Worldwide Cloud 2018 Predictions
    IDC FutureScape: Worldwide Cloud 2018 Predictions Eric Newmark, Larry Carvalho, Deepak Mohan, Frank Gens Recorded: Dec 12 2017 49 mins
    In this IDC FutureScape presentation, IDC's Eric Newmark will lead a team discussion covering the key predictions that will impact the global market for cloud services over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • Insider Threats: Exclusive Peer Perspectives, Strategies and Tactics
    Insider Threats: Exclusive Peer Perspectives, Strategies and Tactics Rob Marti, Director of Privileged Access Management, CA Technologies Recorded: Dec 12 2017 53 mins
    Discover the trends and opinions about insider threats that your peers have revealed in the recently published Cybersecurity Insiders report.

    Join Rob Marti, Director of Privileged Access Management at CA Technologies, as he guides you through the report and examines technologies and preventative measures.

    Selecting the right insider threat solution is a pivotal decision; make sure you know your options.
  • Shift Left: How testing early and often is best for the business and customer
    Shift Left: How testing early and often is best for the business and customer Nancy Gohring 451 Research and Steve Feloney CA Technologies Recorded: Dec 12 2017 50 mins
    Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

    Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

    •Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
    •Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
    •Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.
  • Cyber Security Predictions: What is in store for the EMEA region
    Cyber Security Predictions: What is in store for the EMEA region Jens Monrad, Senior Intelligence Account Analyst, FireEye iSIGHT Intelligence Dec 14 2017 11:00 am UTC 60 mins
    2017 was an eventful year in cyberspace, especially in Europe and the surrounding areas. We saw politically motivated industrial espionage attacks, changes in cyber legislation, a constantly adapting criminal ecosystem targeting various industries throughout the region – and that’s not even the half of it.

    Join us for our webinar on Dec. 14, 11am GMT, as Jens Monrad, Senior Intelligence Account Analyst with FireEye, discusses various aspects about the cyber threat landscape in the EMEA region in 2018, including:

    •Continued political tension in the region
    •Upcoming elections
    •Mixed security maturity
    •The effect of new compliance and data protection laws

    Register today to learn what lies ahead, and stay one step ahead of cyber security threats.
  • Your Proxy Just Got Smarter with Web Isolation
    Your Proxy Just Got Smarter with Web Isolation Timothy Chiu - Senior Director of Product Marketing, Symantec Dec 14 2017 11:00 am UTC 60 mins
    Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.

    Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.

    In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.

    Key Learning Objectives:

    •Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks

    •Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.

    •Learn how to boost productivity for businesses without incurring any additional risk.

    Register Today
  • Filling the GDPR Compliance Gap
    Filling the GDPR Compliance Gap Adenike Cosgrove, Sr. Product Marketing Manager, Proofpoint Dec 14 2017 11:00 am UTC 45 mins
    Join this session to discuss: How your organization can drive towards compliance, how to embed "privacy by design" to your development lifecycles, and how to protect all identified EU personal data and prevent data breaches.
  • How to Stop a Security Breach Becoming a PR Disaster
    How to Stop a Security Breach Becoming a PR Disaster Adrian Davis, Managing Director, (ISC)² EMEA, Neil Stinchcombe, Director, Eskenzi PR Dec 14 2017 12:00 pm UTC 60 mins
    Your CEO has just called your mobile because a reporter from the BBC wants to know how many customers are affected by a hack into your payment database.
    How should you respond?
    What is the one thing you should not say to avoid turning a cyber incident into an event that has to be reported under GDPR?
    Why is Crisis Comms so different from all other types of PR?
    What things do you need to demonstrate that will limit the damage?
    Do you have a tried and tested Crisis Comms plan?
    Does everyone know who is on the Crisis Comms team?
    What they have to do?
    Who they need to inform?
    What they can and cannot say, and how they should say it?
    What type of skills do you need to manage media communications and prevent a cyber incident becoming a crisis?
  • IDC FutureScape: Worldwide Hospitality/Travel/Transportation 2018 Predictions
    IDC FutureScape: Worldwide Hospitality/Travel/Transportation 2018 Predictions Jaideep Thyagarajan, Senior Market Analyst, IT Spending/Solutions, IDC Retail Insights Dec 14 2017 2:00 pm UTC 60 mins
    In this IDC FutureScape presentation, IDC's Worldwide Hospitality, Travel and Transportation Team discusses the key predictions that will impact organizations and their ability to digitally transform over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their digital transformation investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • GDPR - Inside a Data Breach
    GDPR - Inside a Data Breach Patrick McGrath, Director of Solutions Marketing, Commvault Dec 14 2017 2:00 pm UTC 60 mins
    Many headlines for the General Data Protection Regulation (GDPR) mention the eye-watering fines for a data breach, but what happens when you realize you have actually been the victim of one? How hard will it really be to comply with a 72-hour breach notification? In this session, an insider will describe the data breaches, the approaches used to manage these incidents, key lessons learned and considerations for handling data breaches in a world with GDPR expectations.
  • Black Duck Container Security MasterClass - Deploying Containers at Scale
    Black Duck Container Security MasterClass - Deploying Containers at Scale Tim Mackey, Sr. Technology Evangelist, Black Duck Dec 14 2017 4:00 pm UTC 60 mins
    IT operations teams are now deploying and running hundreds or even thousands of containers at any given time. This rapid deployment surfaces challenges in validating the contents and security of container images being deployed. In this session, Black Duck container and virtualization expert Tim Mackey will provide an overview of technologies and solutions such as Red Hat OpenShift that enable organizations to deploy containers at scale securely.

    In this webinar, Tim Mackey explores this new era of large scale container deployments and how to manage and secure them.

    Attend and you'll learn:

    - How to maintain visibility and control for the open source deployed in hundreds of containers
    - How to help your development and operations teams work together to maintain the security of containers in production
    - How to build security into your deployment of container orchestration platforms
    - Measures you can take to proactively identify risks and remediate risks on containers in production
    - How you can use Black Duck OpsSight to scan containers being created, updated or deployed through their container orchestration platforms
  • Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead
    Symantec Monthly Threat Briefing - 2017 in review, 2018 ahead Jeff Barto and Angelique Pereira, Trust Strategists at Symantec Dec 14 2017 4:00 pm UTC 60 mins
    As we wrap up another year, let's take a moment to discuss what 2017 brought to the industry, and what we should expect to see next year.
  • Oracle Town Hall
    Oracle Town Hall Theo Gray (PwC), Abhi Joshi (PwC), Kevin Cardenas (Snow Software) Dec 14 2017 5:00 pm UTC 60 mins
    Moderator:
    Abhi Joshi - PwC Forensic Services, Partner & US Software Asset Management Leader

    Speakers:
    Theo Gray - PwC Forensic Services, Sr. Associate - Former Oracle Licensing Consultant
    Kevin Cardenas - Snow Software - Oracle Licensing Consultant

    Join Snow Software and PwC for a lively and informative conversation about managing your Oracle software footprint.

    Topics of discussion will include:
    1.Oracle Licensing
    2.Oracle Policy
    3.Oracle ULA Renewals
    4.Oracle Certification
    5.Oracle and VMware Observations
  • 2018 GRC Predictions
    2018 GRC Predictions Tom Garrubba, Santa Fe Group; David Grazer, Tevora; Peter Tessin, Discover Financial Services; Christina Whiting, Tevora Dec 14 2017 5:00 pm UTC 60 mins
    “It was the best of times, it was the worst of times,” wrote Dickens. 2017 has been a tumultuous year for governance, risk management, and compliance (GRC). 2018 could be just as stormy with cybersecurity, GDPR, and new risks caused by the shift to digital business. In this webinar, our panel of industry experts will recap the year’s highlights and offer their thoughts on what to expect in 2018.

    Discussion topics include:

    • Ramifications of major data breaches in 2017
    • The continuing shift in risk perspective from department to enterprise
    • Navigating third-party risk management on the road ahead
    • The role and influence of the board in 2018
    • GDPR and the trend toward data privacy and security

    Plan now to attend this special webinar on 2017 trends and 2018 predictions for GRC.
  • Lean Cloud Security: Your Guide to SecOps Efficiency in the Cloud
    Lean Cloud Security: Your Guide to SecOps Efficiency in the Cloud Chris Gervais, VP of Engineering at Threat Stack, Sabino Marquez, CISO, at Allocadia Dec 14 2017 6:00 pm UTC 60 mins
    You’re a security professional, or not, but sometimes get asked to sort of be one? You don’t have enough people, you don’t have enough budget, and you don’t have enough time. But you know that’s not an acceptable excuse now that we are all running fast in the cloud.

    Tune into our webinar to learn how you can make the most of your people, processes, and technology:
    - Despite security talent shortage, leverage your small team and other resources most effectively.
    - Make sure automated processes handle 99% of the noise, so you’re left to manage real threats.
    - Buy and manage the least amount of tools to do the most
  • Let's talk about OSSTMM with Pete Herzog from inside out
    Let's talk about OSSTMM with Pete Herzog from inside out Pete Herzog, Managing Director at ISECOM Dec 14 2017 6:00 pm UTC 60 mins
    In early 2000, the Open Source Security Testing Methodology Manual (OSSTMM) was released with the primary objective of improving how the enterprise conducted security testing. Key sections of this methodology include operational, human, physical, wireless, telecommunication, and data network security testing. Today, OSSTMM is widely regarded as a methodology for penetration testing world-wide, offering a standard approach to conducting security testing. Frank Shirmo of ITPG Secure Compliance, a Cyber Security Boutique in Northern Virginia will be joined by Pete Herzog, the creator of OSSTMM, to answer key questions, and provide clarifications on OSSTMM for CTOs, CISOs, CIOs, Security Engineers and Analysts, and all other stakeholders interested in the topic of security testing.
  • Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model
    Rideshare to the Cloud: Cloud Security & the Shared Responsibility Model Ananda Rajagopal, VP, Products, Gigamon, Dan Watson, Managing Consultant CyberSecurity, IBM, Glenn Hernandez, Frm USCG CISO Dec 14 2017 6:00 pm UTC 75 mins
    Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.
  • IDC FutureScape: Worldwide Services 2018 Predictions
    IDC FutureScape: Worldwide Services 2018 Predictions Rebecca Segal, Group Vice President, Worldwide Services Dec 14 2017 7:00 pm UTC 60 mins
    In this IDC FutureScape presentation, IDC's Rebecca Segal will lead a team discussion covering the key predictions that will impact the global services market over the next one to three years. Senior IT leaders and line-of-business executives will come away with guidance for managing the implications these predictions harbor for their IT investment priorities and implementation strategies.

    About IDC FutureScape
    IDC FutureScape reports are used to shape enterprise IT strategy and planning by providing a basic framework for evaluating IT initiatives in terms of their value to business strategy now and in the foreseeable future. IDC's FutureScapes are comprised of a set of predictions designed to identify a range of pending issues that CIOs and senior technology professionals will confront within the typical three-year business planning cycle. Each prediction is assessed on the basis of its complexity, organizational impact, and time frame to expected mainstream adoption.
  • 2018 Cyber Security Predictions: The Identity-Aware Perimeter Comes to the Fore
    2018 Cyber Security Predictions: The Identity-Aware Perimeter Comes to the Fore Chris Sullivan (SecureAuth+Core Security) & Garrett Bekker (451 Research) Dec 14 2017 7:00 pm UTC 45 mins
    Join 451 Research and SecureAuth+Core Security for a peek into the emerging trends in cyber security and identity in 2018. Register today and learn how these trends will impact your strategy, organization, and job in the coming year.

    Security experts Garrett Bekker, 451 Research and Chris Sullivan, SecureAuth+Core Security will share insight on these trends and more:

    •Why network-based approaches to security are no longer sufficient in the age of cloud and IoT
    •Why identity is the new gating factor for access to sensitive resources
    •How various methods for securing cloud resources – CASB and IDaaS - need to converge
    •The need for risk-based approaches to authenticating users – and machines
  • 2018 RI Planning for AWS and Azure
    2018 RI Planning for AWS and Azure Marit Hughes, Billing Solutions Architect/SME and Todd Bernhard, Product Marketing Manager Dec 14 2017 7:00 pm UTC 60 mins
    As 2017 comes to a close, you may have budget that falls under “use it or lose it.” If so, consider purchasing a credit towards discounted Reserved Instances for 2018 and beyond! RIs from AWS and more recently Microsoft Azure are a great way to save up to 75% compared to On Demand rates, as long as you know you’ll have a long-term need. You can use that end-of-year budget surplus to make an up-front payment towards a one or three year commitment, making your monthly cloud spend much less.

    In this webinar, attendees will:
    -Learn how to decide between the various types of RIs including Standard and Convertible
    -Understand the terms and payment options
    -Explore the tools available to make informed recommendations
  • What Your Vulnerability Scanner is Not Telling You
    What Your Vulnerability Scanner is Not Telling You Anand Paturi and Barry Cogan Dec 14 2017 7:30 pm UTC 45 mins
    A recent, significant data breach in 2017 has caused people to take a deeper look into Apache Struts vulnerabilities. This weakness emphasized the impending risks for Apache Struts-based applications. Even today, scanners do not detect all known vulnerabilities. As of November 2017, the leading scanners still missed 14 total unique Common Vulnerabilities and Exposures (CVEs).

    In this webinar, we will analyze Apache Struts-related vulnerability weaponization patterns spanning the last decade. We will also provide insight into exploit patterns through a live exploit demonstration and explain how these patterns can define an organization’s risk management strategy.

    Hear from RiskSense’s Anand Paturi (VP of Research and Development) and Barry Cogan (Senior Security Analyst) as they guide us through the live demonstration and provide insights into exploit patterns
    and how attacks can be avoided.
  • Votre proxy gagne en agilité grâce à l’isolation web
    Votre proxy gagne en agilité grâce à l’isolation web Hervé Doreau, Directeur Technique, Symantec France Dec 15 2017 10:00 am UTC 45 mins
    Saviez-vous que des millions d’hôtes (domaines, sous-domaines ou adresses IP) apparaissent chaque jour et que, dans bien des cas, leur durée de vie ne dépasse pas 24 heures ?
    De nombreuses entreprises choisissent d’instaurer des politiques de passerelles web sécurisées afin d’empêcher les utilisateurs d’accéder à des sites non classifiés à cause du risque qu’ils représentent, même si la plupart sont tout à fait légitimes dans le cadre d’un usage professionnel.
    De la même façon, beaucoup d’entreprises décident de bloquer des sites dès lors que le niveau de risque est fort, sans être totalement avéré.
    En découle un blocage excessif des sites web qui nourrit l’insatisfaction des utilisateurs.
    Certains sites sont réputés pour leur fiabilité, d’autres pour leur dangerosité. Les sites qui posent vraiment problème sont ceux qui se situent entre les deux, lorsqu’il n’y a pas suffisamment de recul ou d’informations.
    Principaux thèmes abordés :
    - Découvrez le plus grand réseau civil d’intelligence sur les menaces au monde et la protection qu’il peut vous apporter face aux attaques de malware.
    - Apprenez à définir des politiques permettant d’isoler tout le trafic dont le risque est indéterminé ou non classifié par le Global Intelligence Network.
    - Sachez comment booster la productivité de l’entreprise sans créer de risques supplémentaires.
    Inscrivez-vous dès aujourd'hui.
  • Paysage des menaces : tendances cyber sécurité 2017 et au-delà
    Paysage des menaces : tendances cyber sécurité 2017 et au-delà Laurent Heslault, Directeur des Stratégies de Sécurité, Symantec France Dec 15 2017 1:00 pm UTC 60 mins
    L’année qui s’achève a été essentiellement marquée par des attaques coûteuses, des fuites de données retentissantes et plusieurs cas de ransomwares et d’espionnage économique. La cyber criminalité a gagné en ampleur et en audace, avec des retombées financières bien plus élevées. Les cyber attaques sont désormais régulièrement citées dans les médias.
    Ce webcast aborde les points suivants :
    • Le paysage des menaces en 2017
    • Les personnes ou les erreurs qui ont conduit à ces incidents
    • Les enseignements à tirer de cette année pour les professionnels de la sécurité comme vous
    • Les solutions qui peuvent renforcer votre sécurité à l’approche de 2018
    Inscrivez-vous
  • How Cryptocurrencies are Changing the Face of Financial Services
    How Cryptocurrencies are Changing the Face of Financial Services Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy Dec 15 2017 4:00 pm UTC 60 mins
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • [Webinar] Shifting Left Without Sacrificing Security and Compliance
    [Webinar] Shifting Left Without Sacrificing Security and Compliance Maya Ber Lerner, VP of Product, Quali Dec 15 2017 6:00 pm UTC 60 mins
    Deliver Production-like Environments Early in the Dev/Test Lifecycle
    As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.
  • 2018 Predictions & Recommendations: Financial Services
    2018 Predictions & Recommendations: Financial Services Lawrence Chin, Security Market Architect, Palo Alto Networks Dec 18 2017 2:00 pm UTC 30 mins
    Join Lawrence as he looks into the SWIFT mandatory security controls and what that means for financial institutions in 2018.

    Discover more by reading the blog in the attachments.
  • How to Prepare for GDPR: A Gemalto Case Study
    How to Prepare for GDPR: A Gemalto Case Study Jean-Pierre Mistral, Director of Global Data Privacy and Alex Hanway, Encryption Product Marketing Dec 18 2017 4:00 pm UTC 60 mins
    Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •What is GDPR?
    •Case Study: A look at how Gemalto has prepared for GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations