Hi [[ session.user.profile.firstName ]]

Health IT

  • Use of Computational Modelling in Specification Setting and Establishing Control
    Use of Computational Modelling in Specification Setting and Establishing Control
    Thomas O'Connor, Scientist at FDA and Sean Bermingham, Head of Formulated Products at PSE Ltd Recorded: Jul 15 2019 77 mins
    Full Title: Use of Computational Modelling in Specification Setting and Establishing Control Strategy

    The proportion of scientific evidence supporting medical product regulatory applications derived from modeling and simulation studies is expected to continue to grow into the future. In the Quality by Design framework, mathematical models can and have be utilized at every stage of product development and manufacturing. Thus, the regulatory assessment of product quality models is not unprecedented but the frequency, types of models, and applications are evolving. This evolution is being driven in part by the adoption of advanced manufacturing such as continuous pharmaceutical manufacturing.

    The ICH Quality Implementation Working Group points to consider document categorizes models based on the model’s contribution in assuring the quality of the product. Models utilized as part of the control strategy are typically categorized as either high or medium impact depending on the role of the model. Minimal guidance though is provided on model validation. A recent standard (ASME V&V 40) outlines a process for making risk-informed determinations as to whether a model is credible for decision-making for a specified context of use. The presentation will discuss how the framework could be used to develop model validation plans and support regulatory assessment using case studies from both drug substance and drug product manufacturing.
  • Webisode 2: On-Premises Archives - A Breach Waiting To Happen?
    Webisode 2: On-Premises Archives - A Breach Waiting To Happen?
    Martin Tuip - Senior Information Archive Strategist Recorded: Jul 11 2019 47 mins
    The world is changing and so are the targets cyber criminals are going after. On-premises archiving solutions have been around for almost 2 decades, but some of these solutions come with inherently increasing risks. What do these risks look like and what can you do to defend against them?

    Join this second of four webisodes to learn about:

    - Why cyber criminals might be targeting your archive
    - The top security risks of on-premises archives
    - How to reduce your risk
  • How icare built a digital insurance platform
    How icare built a digital insurance platform
    Ed Lee, Technical Director at icare and Dan Owen, Director, Customer Success Architecture at MuleSoft Recorded: Jul 11 2019 59 mins
    In this webinar, icare will share how they were able to create from scratch Australia's largest public sector self-insurer in just three years. Using an API-led approach to integration, they overcame the 'gravity' of legacy systems to move to the cloud and deliver patient-centric outcomes efficiently and fast.

    Join this webinar to learn how to:
    - De-risk legacy modernisation initiatives using APIs.
    - Decouple systems and data to build a future-proof cloud architecture that supports ongoing change.
    - Unlock data in machine-learning systems and support automated business process decisions.
  • A simple guide to getting ahead of the growing cyber security threat
    A simple guide to getting ahead of the growing cyber security threat
    Chris Wright, Account Director at UKCloud Recorded: Jul 11 2019 12 mins
    The field of Cyber Security can be incredibly confusing to understand and navigate, Your security landscape is constantly evolving and it can be impossible to understand where your vulnerabilities lie and what tools & technology you should be procuring to deter and mitigate cyber threats.

    To remedy this UKCloud & partner E2E assure have devised a solution - CloudSoc to make your organisations Cyber Security simple by providing you an end to end cyber security capability. This means continual cyber defence through alerts so you can Identify threats before they become incidents.

    Watch our webinar to learn more..

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Webisode 3: Email Fraud - Case Studies & Defense Strategies w/ US Secret Service
    Webisode 3: Email Fraud - Case Studies & Defense Strategies w/ US Secret Service
    Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret Service Recorded: Jul 10 2019 73 mins
    Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on.

    What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks?

    Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies.

    We’ll share:

    - Common identity deception tactics cyber criminals use to target your employees, business partners, and customers
    - How fraudsters use social engineering to reach the right person at the right time
    - How to identify and stop email fraud attacks before they reach the inbox
  • Railinc: Best Practices for Deploying and Adopting an Intelligent Data Catalog
    Railinc: Best Practices for Deploying and Adopting an Intelligent Data Catalog
    Ramesh Veerappan, Shawn Petway, - Railinc, Dharma Kuthanur- Informatica Recorded: Jul 10 2019 58 mins
    As Railinc modernizes its data infrastructure, critical data has become distributed across Oracle, data lake and tools like SAS, and business users have been challenged to find and understand the data they need. Railinc embarked on a major effort across business & IT to address this problem by cataloging all data assets and adding business context to the data to enable easy search and discovery. Confidence in the data was improved through visibility into how datasets were created and business descriptions and tags that added business context, along with a focused/phased approach to drive business user adoption. Railinc will share valuable lessons and best practices related to both: (1) deployment and scaling; (2) driving business user adoption.
  • How to Make Your Messages Stick!
    How to Make Your Messages Stick!
    Cathy McNally Recorded: Jul 10 2019 51 mins
    Cathy McNally joins us to discuss public speaking techniques and how to make your messages stand out to your audience!

    In this webinar, you’ll learn a “recipe” for creating “Sticky” messages that will help you persuade, influence, motivate, and more. We’re going far beyond “tell them what you’re going to tell them, tell them, and then tell them what you told them.” You will leave the webinar knowing the “6 Elements of Stickiness,” and how and why to use them.

    Cathy McNally has been making people laugh and helping them learn (usually at the same time) for nearly 20 years. Cathy brings her background as a comic and her expertise in powerful communication to create fun, interactive, and highly effective workshops, coaching, and keynotes.
  • State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users
    State of the Phish 2019: How to Stop Attackers That Are Phishing Your End-users
    Paul Down, Senior Director Proofpoint Security Awareness Training Recorded: Jul 10 2019 38 mins
    As phishing attacks continue to make global headlines, become more sophisticated and bypass traditional email security gateways; we need to empower our workforce to be aware and ready to detect them alongside the technology.

    Our fifth annual, 2019 State of the Phish Report explores this evolving threat landscape, offering insights drawn from tens of millions of simulated phishing attacks and our global survey of 15,000 infosec professionals over the last 12 months.

    Join Paul Down, Senior Director, Proofpoint Security Awareness Training as he discusses the key findings from our latest 2019 State of the Phish report. You'll learn:

    - How to build a people centric security strategy

    - Steps organizations are taking to mitigate end-user risk from phishing

    - The most devastating types of phishing emails

    - The most vulnerable industries and departments
  • Live Demo - Proofpoint Security Awareness Training
    Live Demo - Proofpoint Security Awareness Training
    Sean Walker, Enterprise Account Executive Recorded: Jul 9 2019 36 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a live demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 

    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • The Top Cyber Threats Today and How to Protect against Them
    The Top Cyber Threats Today and How to Protect against Them
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot Recorded: Jul 9 2019 49 mins
    The year 2018 and the first half of 2019 saw a significant number of major events showcasing cybercriminal innovation. We saw cryptojacking and botnets reach their most widespread, ransomware become more targeted, and phishing attacks transition their focus from financial to tech targets.

    Webroot believes it's possible to effectively protect businesses and clients, but only by understanding the adversary and the techniques they use.

    In this webinar, Webroot threat analyst Tyler Moffitt will offer insights into prevailing malware trends and tactics, and discuss how implementing a layered security strategy can help you protect your clients from multi-pronged attacks.

    We hope you can join us for this live, educational session.
  • G-Cloud 11 has arrived alongside 53 solutions to your biggest IT challenges
    G-Cloud 11 has arrived alongside 53 solutions to your biggest IT challenges
    Andy Webb, Head of Products Recorded: Jul 8 2019 25 mins
    The G-Cloud framework has been live since 2012 and allows UK Public Sector organisations to search over 25,000 services listings for hosting, software and support services from any one of the 2,800 suppliers. So far, over £6bn has been spent through this framework.

    July marks the launch of G-Cloud 11 which has been the busiest iteration of the marketplace yet for UKCloud with a total of 53 services being listed aimed at solving some of your biggest cloud computing challenges.

    To guide you through all of this our Head of Products Andy Webb has delivered a 20-minute webinar packed with invaluable guidance on how UKCloud’s latest updates can help you solve some of your greatest IT hurdles.

    By clicking through to this webinar you acknowledge that you are opting in to be contacted by email and phone by UKCloud LTD with promotional material. We will never sell your information to any third parties. You can, of course unsubscribe at any time. View our full Privacy Policy at https://ukcloud.com/legal/
  • Emerging Technologies & IoT: How AI, AR and Blockchain Are Shaping The Future
    Emerging Technologies & IoT: How AI, AR and Blockchain Are Shaping The Future
    Ed Maguire, Principal Partner, Momenta Partners Recorded: Jul 5 2019 57 mins
    When it comes to innovation, we've arguably seen more technological advancements over the last ten years than at any other point in time. Technology as we know it is changing before our eyes. We see the merging of the digital and physical worlds through technologies such as augmented reality; artificial intelligence enables computers to think faster than humans, and blockchain technology is considered by many to be the greatest technological innovation since the internet.

    More importantly, we're not only seeing new technologies but the convergence and intersection of multiple technologies as they extend and create new capabilities through their collaboration. The era of combinatorial innovation is upon us, and the combined impact of augmented reality, artificial intelligence, blockchain and other technologies on Connected Industry will be unprecedented.

    This webinar provides an opportunity to explore and consider the applications of new technologies as they related to IoT and Connected Industry.

    We'll take a look at:

    - The current status of AI, AR, blockchain and distributed ledger technologies and their role in empowering Connected Industry
    - Benefits and risks of evolution
    - Use cases across multiple industries
    - Future timelines and predictions
  • Modernise your System of Agreements
    Modernise your System of Agreements
    Jamie Corrigan Recorded: Jul 4 2019 19 mins
    Every organisation has a system of agreement process, from contracts to offer letters to purchase orders, agreements are the foundation of doing business. Yet many organisations still rely on manual, disconnected processes costing the business time, money and increasing errors and risk.

    To modernise and unify their systems of agreement, organisations are adopting the DocuSign Agreement Cloud. Most start with DocuSign eSignature, then connect and automate other parts of the agreement process to more than a dozen applications and more than 350 integrations that covere the entire agreement process, from preparing to signing, acting on, and managing agreements.

    At each step, the result is the ability to do business faster, simpler, greener, and more cost-efficiently, while delivering a better experience for customers, partners, and employees.

    Join this live webinar and see how you can automate your agreement processes before, during and after eSignature. You will learn to:

    - Prepare agreements with a high degree of automation
    Sign Agreements quickly and securely and complete the process faster with automated routing
    - Act on agreement terms after signing and update records or trigger actions in other systems
    - Manage agreements and leverage features like secure retention, retrieval, and reporting
  • Get Agile - Companies shifting from data generating to data powered organization
    Get Agile - Companies shifting from data generating to data powered organization
    Tom Christensen, CTO & Customer Advocacy, Northern EMEA, Hitachi Vantara Recorded: Jul 2 2019 31 mins
    Get insights on Hitachi Vantaras own digital journey over the past years and learn from 4 use cases in Scandinavia (Pharmaceutical Industry, Shipping Industry, Train Industry, Payment Industry)
  • NERC CIP Compliance
    NERC CIP Compliance
    Lockpath Recorded: Jul 1 2019 2 mins
    Compliance with NERC CIP requires not only controlling your own environment but also cybersecurity and third party risk. See how the Keylight Platform is the solution you need for NERC CIP compliance.
  • Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use
    Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use
    Kevin Mitnick, Perry Carpenter Recorded: Jun 28 2019 70 mins
    Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows.

    The truth is that it is shockingly easy to gather detailed intelligence on individuals and organizations. Everything the bad guys need to specifically target your end users is out there for the taking. Banking and credit card accounts, driver's license numbers, geolocation details and even IT secrets can be found easily and through public resources! There’s even a name for it: Open Source Intelligence (OSINT).

    In this mind-blowing webinar, Kevin and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, give you an inside look into some of Kevin’s most prized, underground OSINT secrets and how the bad guys use those techniques to target your users and your organizations.

    Find out what to watch out for and learn how to strengthen your end-user “human firewall” against OSINT-fueled attacks before it's too late!
  • Security Awareness: Securing the Human Layer
    Security Awareness: Securing the Human Layer
    Roger Grimes, Scott Lowe Recorded: Jun 28 2019 59 mins
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys
    10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys
    Roger Grimes Recorded: Jun 28 2019 68 mins
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Your Ultimate Guide to Phishing Mitigation
    Your Ultimate Guide to Phishing Mitigation
    Roger Grimes Recorded: Jun 28 2019 62 mins
    Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait.

    This webinar, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, covers a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We didn't just cover one angle. We’ll came at it from all angles!

    Join Roger as he dives deep to teach you how to develop a comprehensive, defense-in-depth plan, introduces technical controls all organizations should consider, covers the benefits of new-school security awareness training, and goes over the best practices for creating and implementing security policies, all while staying phish-free!
  • What's your Big Data Vision?
    What's your Big Data Vision?
    Matthew Monahan, Senior Product Manager Recorded: Jun 27 2019 15 mins
    With the amount of data being created and collected by organizations, it’s imperative that senior executives at these data-driven companies have a solid vision of where they want to go, and how they’ll get there.

    To achieve this vision, the way we find, understand, and use data needs to shift.

    Join Matthew Monahan, Zaloni’s Senior Product Manager, and Eric Kavanagh, CEO of the Bloor Group, as they discuss big data vision in this excerpt from the DM Radio podcast. They’ll also address:
    - Data governance concerns
    - Self-service data
  • Webisode 1: 2019 FINRA and SEC Compliance
    Webisode 1: 2019 FINRA and SEC Compliance
    Raymond Mcgrath, Services, Supervision Policy Consultant; Roman Tobe, Manager, Product Marketing Recorded: Jun 27 2019 56 mins
    Every year, FINRA and the SEC tell broker-dealers exactly what they perceive as heightened risks to the market and investors. In this way, regulators send a clear message of what to expect during exams in the coming year. As a compliance officer, this is the roadmap that sets the tone for your efforts for the rest of 2019 and beyond.

    Attend our first of four webisodes to learn how you can help your firm meet these and other regulatory challenges in the year ahead. Our industry experts will discuss some of the risks spotlighted for 2019:

    - Supervision of Digital Assets Business
    - Regulatory technology
    - Adequacy of firms’ cybersecurity programs to protect sensitive information
  • How NIST-CSF Can Help Your Organization Recover and Respond From An Incident
    How NIST-CSF Can Help Your Organization Recover and Respond From An Incident
    24by7Security, Inc Recorded: Jun 27 2019 57 mins
    First rolled out in 2014 and updated to v1.1 in 2018, the NIST Cyber Security Framework has become widely known and used in the US and overseas. The NIST CSF sets down a framework of cyber security best practices that can be used by any organization, which also ties into many other frameworks, allowing it to be used alongside them.

    The NIST CSF has three components: the Core, Profile, and Tiers. The Core is the heart of the Framework, organizing activities into 5 functions: Identify, Protect, Detect, Respond, and Recover. These are divided into 23 categories, further divided into 108 subcategories, and these subcategories are cross referenced to several other frameworks and standards. The Profile is a way of setting a road map of activities, gathering an organization's current state, then setting down a desired future state. The Implementation Tiers are a way to clarify the organizations view of cyber security risk and its approach to addressing it.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • The Intelligent Edge: The Next Frontier of IoT Innovation
    The Intelligent Edge: The Next Frontier of IoT Innovation
    Ed Maguire, Momenta Partners Recorded: Jun 27 2019 57 mins
    Edge, mobile edge, and fog computing have emerged, offering a panacea to the pain points of IoT data. Companies such as Intel, SAP, Ericsson and Dell Technologies are creating their own solutions. Edge computing has the potential to impact the data infrastructure of the IoT, but what are the benefits and risks of moving away from the cloud? Edge computing comes with a suite of considerations that need to be carefully considered prior to adoption that we'll explore in turn.

    This webinar will cover:

    - The current state of fog and intelligent edge computing
    - What are the benefits/risks of moving away from the cloud?
    - What does this mean for cloud computing, data infrastructure and data analytics?
    - What are the best use cases of edge computing and what are its limitations?
    - Forecasts on future applications
  • Webisode 2: Strategic Cybersecurity Transformation - Why Now, Why People-Centric
    Webisode 2: Strategic Cybersecurity Transformation - Why Now, Why People-Centric
    Jinan Budge, Principal Analyst Security & Risk, Forrester; Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint Recorded: Jun 26 2019 66 mins
    Why is cybersecurity transformation critical right now, and what are the most effective frameworks for organizing change?

    Join guest Forrester speaker Jinan Budge and Proofpoint for an interactive discussion of the biggest challenges that today's CISOs face, and why a people-centric approach to security is necessary in today’s threat landscape.

    In this session, you'll learn:
    - How business transformation like the rise of Office 365 has driven cybersecurity transformation
    - Why you should pivot your transformation around people and culture, rather than infrastructure
    - 6 principles for successful cybersecurity transformation
  • The Gender Tipping Point: Women, Emotional Intelligence, and Leadership
    The Gender Tipping Point: Women, Emotional Intelligence, and Leadership
    Dr. Shawn Andrews Recorded: Jun 26 2019 63 mins
    Dr. Shawn Andrews joins us to discuss gender equality and if the gender parity is attainable.

    Dr. Shawn Andrews is a keynote speaker, organizational consultant, business school professor, and best-selling author. She has research expertise in the areas of Leadership, Emotional Intelligence, Gender, Unconscious Bias, and Diversity & Inclusion. She addresses the current leadership gender gap, barriers to leadership, gender-specific emotional intelligence, and gender culture differences. She explains how each of these show up every day in the workplace, how they affect perception and promotion, and provides recommendations for individuals to improve career advancement, and for organizations to enhance diversity and inclusion.
  • Making Stopping Phishing Your #1 Priority
    Making Stopping Phishing Your #1 Priority
    George Anderson, Director of Product Marketing, Webroot Jul 16 2019 3:00 pm UTC 60 mins
    Phishing is flying under most organisations radar. Yet more than nine of 10 successful security breaches start with a phish.

    Phishing takes many forms and is constantly adapting and morphing to become harder to detect and therefore harder to stop. We used to talk about polymorphic malware, but we now live in the age of polymorphic phishing.

    This webinar looks at the real threat that poses and defenses you can use to mitigate its effects on profitability.
  • Virtual Reality & Augmented Reality in Healthcare
    Virtual Reality & Augmented Reality in Healthcare
    VR/AR Association Jul 16 2019 5:00 pm UTC 90 mins
    The VR/AR Association Healthcare Committee will present the latest best practices and medical use cases for VR AR
  • Securing Your Organization & End-Users with Browser and Email Isolation
    Securing Your Organization & End-Users with Browser and Email Isolation
    Eric Schwake, Product Marketing Manager Jul 16 2019 5:00 pm UTC 60 mins
    Everyday threat actors are trying to infiltrate your organization with advanced attacks by going after your users via corporate email, personal web mail and personal browsing. When your people engage in personal browsing or webmail at work, they can become a target for attackers. IT and Security teams are struggling with the process of exception handling for particular user website while still ensuring their organizations’ security. What can you do to protect your organizations and end-users?

    Join Proofpoint as we discuss:
    • A people-centric approach to browser and email security
    • The benefits of adopting Isolation for personal browsing and webmail defense
    • Cost benefits using isolation for URL exception handling
  • Email Fraud Case Study: Real Attacks & Defense Strategies With US Secret Service
    Email Fraud Case Study: Real Attacks & Defense Strategies With US Secret Service
    Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret Service Jul 17 2019 3:30 am UTC 73 mins
    Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on.

    What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks?

    Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies.

    We’ll share:

    - Common identity deception tactics cyber criminals use to target your employees, business partners, and customers
    - How fraudsters use social engineering to reach the right person at the right time
    - How to identify and stop email fraud attacks before they reach the inbox
  • EMEA Threat Landscape: Volumes, Focus, & Shifting Targets
    EMEA Threat Landscape: Volumes, Focus, & Shifting Targets
    Ed Rowley, Senior Technical Engineer and Dan MarleyCook, Team Lead, Sales Engineer Jul 17 2019 9:00 am UTC 45 mins
    2019 is the year where individuals in organisations are taking center stage in the cybersecurity threat landscape. Bad actors have shifted their strategies beyond perimeter and endpoint attacks and now look at high value individuals who have privileged access or handle sensitive data.

    While not everyone is a VIP, anyone can be a VAP (Very Attacked Person). In this webinar, we explore the shifts in the EMEA threat landscape in the first quarter of 2019, the threats targeting VAPs, and share ways in which organisations can protect identified VAPs from targeted attacks.
  • Your Product is Your Best Salesperson
    Your Product is Your Best Salesperson
    Amanda Nielsen, Demand Generation and Strategic Partnerships at New Breed Jul 17 2019 4:00 pm UTC 60 mins
    This week Amanda Nielsen joins us to discuss how your company's product can be it's best salesperson.

    Product-led growth. It’s not just another B2B buzzword. Amanda will discuss why she only recommends one strategy for growth in the SaaS industry -- product-led growth. Product-led growth describes a business strategy that capitalizes on the merit and mileage of your product itself. And she knows it works because some of today’s most successful SaaS companies — from Slack to Atlassian to Calendly — were built on the inherent virality of their products.

    But how do you actually lead with your product? Does every company have the ability to use product-led growth to drive success? What if you can’t afford to offer your product for free?

    In this session, Amanda will answer those questions and more. You will walk away with a tangible plan for letting your products sell themselves.
  • Let’s Work Together! How to Drive SecOps and NetOps Collaboration
    Let’s Work Together! How to Drive SecOps and NetOps Collaboration
    John Smith, Princ Sales Eng, ExtraHop; Caroline Saxon, Sr Advisor to CIO, TSYS; Glenn Leifheit, Microsoft; B. Dunlap Jul 18 2019 5:00 pm UTC 60 mins
    The siloed, standalone operations of security operations (SecOps) and network operations (NetOps) resulted in teams with their own culture, technologies, processes, skillsets and lexicons. When SecOps and NetOps each have their own tools and workflows, this results in slower detection and response, higher costs and an ineffective use of cybersecurity personnel. Security has also become complex, fast moving and critical to all organizations and it no longer makes sense for the two functions to remain siloed. Join ExtraHop and (ISC)2 on July 18, 2019 at 1:00PM Eastern for a discussion on how to increase collaboration between SecOps and NetOps and the benefits derived from that.
  • How pharma marketing can stay ahead of the evolving customer journey
    How pharma marketing can stay ahead of the evolving customer journey
    Robb DeFilippis, Managing Director, Life Sciences, Tag, Steve Pitts, Business Director, Tag, Dominic Tyer, pharmaphorum Jul 23 2019 3:00 pm UTC 75 mins
    Overview
    Join our live webinar taking place on Tuesday 23rd July at 16:00 BST / 11:00 EST / 08:00 PST.

    Customer journeys in pharma are changing, with important implications for the marketing supply chain. How can pharmaceutical marketers capitalise on this trend and free up budget to invest in additional marketing channels?

    Focus
    New developments in data and digital are changing traditional customer journeys and forcing pharmaceutical companies to evolve in order to keep up.

    Companies like Apple and Amazon have elevated customer expectations for personalised content and interactions across multiple channels, in the process setting new standards for marketing. But, as they push the envelope, what are the implications for pharma’s work in customer engagement?

    This pharmaphorum webinar, in association with Tag, will examine the challenges that pharma marketing faces to stay ahead of the evolving customer journey and offer expert insight from both the pharma and FMCG sectors on how to convert these challenges into opportunities .

    The expert panel will consider exclusive research carried out by Tag and pharmaphorum across the US, Europe and Asia-Pacific among senior decision-makers in pharma and FMCG marketing.

    The webinar, which takes place on Tuesday 23rd July at 16:00 BST / 11:00 EST / 08:00 PST will also look at:
    •How pharma currently allocates its marketing budgets
    •Where marketers would like to have more money to invest
    •How much time is spent directing creative ideation and managing marketing production

    For more information, please visit:
    https://pharmaphorum.com/digital/how-pharma-marketing-can-stay-ahead-of-the-evolving-customer-journey/
  • 2019 Security Congress Preview – Cloud Security
    2019 Security Congress Preview – Cloud Security
    Richard Tychansky, Tim Sills, Travis Jeppson, Brandon Dunlap (Moderator) Jul 23 2019 5:00 pm UTC 60 mins
    (ISC)² will hold its Security Congress 2019 in Orlando, FL October 28th – 30th. This conference will bring together 4000+ attendees and over 170 educational sessions. One of the 18 tracks that are being offered with focus on Cloud Security and the challenges practitioners face when dealing with all things cloud related. On July 23, 2019 at 1:00PM Eastern, join (ISC)² and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • Proofpoint Demo: Security Awareness Training
    Proofpoint Demo: Security Awareness Training
    Sean Walker, Enterprise Account Executive Jul 23 2019 5:00 pm UTC 36 mins
    Engage your end users and arm them against real-world cyber attacks using personalized training based on our industry-leading threat intelligence. Instead of wasting time with one-size-fits-all content, we help you deliver the right training to the right people at the right time.
    Join us for a demo of Proofpoint Security Awareness Training to see for yourself! 

    You'll learn how to: 
    - Assess your users’ susceptibility to phishing attacks and knowledge of cybersecurity beyond the phish
    - Deliver customized training to your end users to drive behavior change and make them a stronger last line of defense
    - Enable your employees to report suspicious messages with a single mouse click
  • The Risks From Unsecured Networks
    The Risks From Unsecured Networks
    Jonathan Barnett, Sales Engineer Jul 24 2019 12:00 am UTC 27 mins
    More than 88% of malware trying to enter your network can be stopped with a DNS filtering solution. These allow admins to take back control of their network, securing all devices, preventing internet misuse, and improving productivity. A filtered DNS solution is capable of blocking DDoS attacks, botnets, cache poisoning, and other threats.

    In this webinar, we’ll discuss the importance of network security and how Webroot® DNS Protection can benefit your business and protect against attacks.
  • Trends in IT Security
    Trends in IT Security
    Tracy Pound, CompTIA Faculty, CompTIA Jul 24 2019 2:00 pm UTC 60 mins
    As technology becomes a critical component for digital organisations, security becomes an even higher priority. Most companies know security is important, but they aren’t sure how to best change their IT approach to reflect the new reality.

    This market intelligence session, based on CompTIA’s latest research, describes the areas that every business should focus on: the new technology that is needed, the new processes that must be adopted, and the education that must be given to end users.
  • Women as Business Leaders
    Women as Business Leaders
    Rachel Scherl; Business Builder, Marketing Strategist & Best-Selling Author Jul 24 2019 4:00 pm UTC 60 mins
    This week, Rachel Scherl joins us to discuss women as business leaders.

    In this webinar, Rachel will draw on decades of experience running businesses, raising money, and consulting to Fortune 500 companies. Rachel knows that being a leader means more than growing a successful business. Success in business leadership comes easier when one has an initial understanding of potential obstacles. As a female entrepreneur, Rachel has run into many challenges with funders, strategic partners, and boards. Rachel wants to help other women prepare and learn to anticipate similar challenges in business. This webinar will answer many key questions on how to grow brands and businesses -- in the context of some realities that female entrepreneurs face.
  • Webisode 4: Proofpoint Demo - Foundations of People-Centric Cybersecurity
    Webisode 4: Proofpoint Demo - Foundations of People-Centric Cybersecurity
    Dustin Anderson, Senior Sales Engineer, Proofpoint Jul 24 2019 5:00 pm UTC 41 mins
    What are the best practice elements of a people-centric cybersecurity strategy, and in what order should your organization prioritize them?

    Proofpoint has developed a three-phase cybersecurity maturity model to help organizations go from simply protecting their email to stopping compromised cloud accounts and data loss to executing a comprehensive people-centric security program.

    Join us for a live demo to learn about the first phase of this maturity model, and see for yourself how the tools work. We'll demonstrate how to:

    - Protect your people from email-based attacks
    - Gain visibility into who in your organization is getting the most attacks
    - Solve for user awareness through threat simulation and training
  • Is Real-Time Threat Prevention Possible?
    Is Real-Time Threat Prevention Possible?
    24by7Security, Inc Jul 25 2019 3:00 pm UTC 60 mins
    Unarguably, the need for a cybersecurity paradigm shift has never been greater. Machine learning is a big step forward in this era of cybersecurity, but traditional machine learning techniques are not optimal with preventing unknown, never-before-seen cyber threats. Fortunately, AI technologies are maturing and deep learning is now proven to be the most effective cybersecurity solution, resulting in unmatched detection and prevention rates.

    CPE/ CEU Credits: You may be eligible for CEUs or CPE credits at some professional associations by attending this webinar. Please check with your professional association and its policies to see if you may apply for CEUs or CPE credits for this webinar. You can download a certificate of completion from BrightTALK after viewing the entire webinar.
  • How to improve threat detection and response with the MITRE ATT&CK™ framework
    How to improve threat detection and response with the MITRE ATT&CK™ framework
    Tawnya Lancaster, Sr Product Marketing Manager & Aaron Genereaux, Sales Engineer; AT&T Cybersecurity Jul 25 2019 4:00 pm UTC 59 mins
    The speed and sophistication with which cybercriminals are launching attacks is increasing year-over-year. In fact, a recent 2019 threat report showed that the time from initial compromise of a network by an adversary to lateral movement can be as little as 19 minutes.* This is challenging threat detection and incident response teams to keep up — especially as cybercriminals are also continuously changing their methods. To drive more resilient threat detection and response, defenders need to incorporate threat intelligence and threat detection frameworks that look beyond simple indicators of compromise (IOCs) to protect their network and speed response.

    Join us in discussing:

    - What MITRE ATT&CK™ is and how it complements other cyber frameworks such as NIST and the Cyber Kill Chain
    - How AT&T Alien Labs maps correlation rules to the tactics and techniques of MITRE ATT&CK™ so customers can better understand the context and scope of an attack
    - How to detect, investigate, and respond to a multi-vector attack (TrickBot) using USM Anywhere and the MITRE ATT&CK™ — within one dashboard

    *2019 Global Threat Report, Adversary Tradecraft and the Importance of Speed. CrowdStrike, 2019.
  • Data Security and Patient Safety - Two Sides of the Same Coin!
    Data Security and Patient Safety - Two Sides of the Same Coin!
    Iliana Peters, Polsinelli Jul 25 2019 4:00 pm UTC 60 mins
    Iliana Peters, who is a Shareholder at Polsinelli, and a former Acting Deputy Director for HIPAA at the Department of Health and Human Services (HHS), will discuss emerging issues in data security, including major areas of information security risk, new threats to data security, helpful guidance and resources, and enforcement by HHS, the State Attorneys General, and the Federal Trade Commission.
  • Webisode 3: Future-Proof Your Legacy and Cloud Archive
    Webisode 3: Future-Proof Your Legacy and Cloud Archive
    John Pepe Archiving Specialist; Martin Tuip, Sr Product Marketing Manager Jul 25 2019 5:00 pm UTC 58 mins
    Many organizations have already deployed a compliance solution but continuing adoption of the cloud for business processes eventually results in the reevaluation of the existing compliance infrastructure. With email and collaboration data in Office 365 growing daily and the need to meet compliance and legal requirements, you need to come up with a strategy of how to address legacy and cloud archive data that is future-proof.

    Join the third of four webisodes to discuss what a modern archiving strategy looks like, and how you can get there.

    In this session we'll discuss:

    - What’s involved in the move – policy, planning, and people
    - Challenges with O365 from a compliance and legal view
    - The ins and outs of archiving with Office 365
    - Industry trends
  • Want to be a Better Blue Teamer? Think Like an Attacker!
    Want to be a Better Blue Teamer? Think Like an Attacker!
    Tarik Saleh, DomainTools; Rob Armstrong, Mathan Cyber Security, LLC; Keith Young, Mont. Co., MD; Brandon Dunlap, Moderator Jul 25 2019 5:00 pm UTC 60 mins
    “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”
    – Sun Tzu.

    The ability to understand your adversary is always a good skill for any security practitioner to have. But beyond understanding, one really needs to know how an attacker thinks. This enables better defense and cooperation between “Blue Teams” and “Red Teams”. Join DomainTools and (ISC)² on July 25, 2019 at 1:00PM Eastern for a discussion on defense and protection, how an attacker thinks and goes about breaching your enterprise, and the trend in “Purple Teaming”.
  • Cybersecurity in Healthcare: 3 Ways Organizations Can Mitigate Security Risks
    Cybersecurity in Healthcare: 3 Ways Organizations Can Mitigate Security Risks
    Mike Jude, Ph.D., Research Manager, Frost & Sullivan, Erin Benson, Director, Market Planning, LexisNexis Risk Solutions Jul 25 2019 7:00 pm UTC 60 mins
    What is complicating healthcare cybersecurity?

    Solution providers need to articulate their value proposition, not only in business terms, but also in terms of the impact their technology will have on the delivery of healthcare and, ultimately, the wellbeing of the patient.

    Key Takeaways:

    • Identify primary barriers to establishing excellent healthcare cybersecurity.
    • What impact will IoT and cloud services, including computing and storage, have on healthcare cybersecurity?
    • What are the substantial growth opportunities?
  • Live Demo – Browser & Email Isolation to Protect Your Users in Minutes
    Live Demo – Browser & Email Isolation to Protect Your Users in Minutes
    Eric Schwake, Product Marketing Manager & Paul Wang, Technical Product Marketing Manager Jul 30 2019 5:00 pm UTC 45 mins
    When your employees are browsing the web or accessing webmail, your organization can be facing a wide range of online threats. These can include ransomware, web-based & file exploitation, leaks of sensitive and confidential information, and catastrophic data breaches. Web isolation technology is one of the best ways to help you protect against these risks.

    Join Proofpoint’s Browser and Email Isolation live demo as we share:

    • How Proofpoint protects your users within minutes from web born threats from risky browsing and malicious email in both corporate and personal email
    • How Proofpoint’s new integration with Targeted Attack Protection (TAP) allows us to provide adaptive controls within corporate email to enhance security
    • How Proofpoint’s people-centric approach to Isolation stacks up against competitors
  • Beyond the Phish: A Snapshot of End-User Behavior
    Beyond the Phish: A Snapshot of End-User Behavior
    Gretel Egan, Security Awareness and Training Strategist & Dale Zabriskie CISSP, CCSK, Security Awareness Training Evangelist Jul 31 2019 5:00 pm UTC 60 mins
    Phishing is one of InfoSec's longstanding threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end users about cybersecurity threats beyond email-based social engineering
    - The strengths and weaknesses among end users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization
    - A more wholistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks
    - How you can use this information to reduce the risk of successful cyberattacks within your organization

    Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.
  • Achieving Big Business Value from Big Data Initiatives
    Achieving Big Business Value from Big Data Initiatives
    Rick Karl, Vice President of Value Engineering, Zaloni Jul 31 2019 6:00 pm UTC 60 mins
    ROI.
    Risk reduction.
    Cost savings.

    Ask 3 different people what their idea of business value means and you’ll often get three different answers. When you’re trying to implement an enterprise-wide data hub, it’s often necessary to show value early and often but how can that be easily done when there are multiple stakeholders?

    To justify the investment, it’s critical to show how your new data hub will meet the goals of IT, Finance, and any other departments involved in the initiative. By accurately measuring value, your project will be poised to cut costs, generate revenue, and radically transform the business.

    Join Rick Karl, Zaloni’s VP of Value Engineering, as he shows what’s needed when trying to highlight the value an enterprise data hub can provide to an organization.

    Topics include:
    - Challenges in demonstrating business value for complex data initiatives
    - How to perform a business value assessment for modern data efforts
    - Making the business case that aligns IT and Finance objectives
  • SMBs Market Overview and Technology Buying Trends
    SMBs Market Overview and Technology Buying Trends
    Sue Gilkes, CompTIA Faculty, CompTIA Aug 7 2019 2:00 pm UTC 60 mins
    Small businesses are rightly described as the lifeblood of the global economy. This isn’t hyperbole, as SMBs account for the vast majority of business entities while serving as a key driver of job growth and innovation. Success as a small business owner means overcoming challenges on many fronts, but also embracing new opportunities in technology and business.

    CompTIA’s latest research explores the business relevance of technology to SMBs and the factors affecting their perceptions, decisions, and investments in established and emerging technologies. We also explore the professional services industry, taking a look at their decision to offer technology to their own customers.