Hi [[ session.user.profile.firstName ]]

Health IT

  • Assessing IT Risk in a Healthcare Environment
    Assessing IT Risk in a Healthcare Environment Scott Breece - Community Health Systems, Sam Abadir - Lockpath Recorded: Jun 21 2018 59 mins
    In this webinar, Lockpath’s Sam Abadir and Community Health System’s Scott Breece will discuss the unique IT landscape of the healthcare industry and the challenges this presents for IT risk management.

    Abadir and Breece will discuss common strategies for identifying and managing IT risks including risk assessment methodologies, best practices for assessing business associates and third parties, incident response plans, and available toolsets to support these activities.
  • IoT & A.I. For Good
    IoT & A.I. For Good Wael Elrifai, Vice President of Solution Engineering, Big Data, IoT & A.I, Hitachi Vantara Recorded: Jun 21 2018 41 mins
    Wael Elrifai shares his experience working in the IoT and AI space; covering complexities, pitfalls, and opportunities to explain why innovation isn’t just good for business—it’s a societal imperative.
  • How Exclusion Risk Impacts Healthcare Providers and How to Manage It
    How Exclusion Risk Impacts Healthcare Providers and How to Manage It Scott Steinhardt - Kinney Services, Chris Swift, Lockpath Recorded: Jun 21 2018 46 mins
    For healthcare providers that receive Medicare and Medicaid reimbursements, managing exclusion risk is critical. Employees, business associates, suppliers, and more who land on state exclusion lists while employed or engaged by a provider can result in severe regulatory penalties. In this educational webinar, Lockpath and Kinney Services will guide you through the world of exclusion risk and point out what you need to know.

    Attendees will learn:

    * A definition of exclusion risk with real-world examples
    * Challenges encountered with managing exclusion risk
    * Strategies for implementing a consistent, repeatable review process
    * Technology's role in streamlining exclusion risk management

    Are you continually reviewing the exclusion status of employees and business entities? If not or reviews are conducted haphazardly, you run the risk of regulatory penalties and a potential crisis in the reimbursement process. Discover what you need to know to managing exclusion risk in this educational webinar.
  • Achieving superior care coordination: The Generic Telemedicine Platform
    Achieving superior care coordination: The Generic Telemedicine Platform Jonas Knudsen, IDC Research Director and Anne Friis Hansen, Team coordinator, The Region of Southern Denmark Recorded: Jun 21 2018 26 mins
    With 3rd Platform technologies, hospitals are entering an era when operations, processes, and technology are tightly linked to patients and other providers. Hospital boundaries blur, thereby triggering collaboration between sectors to enable a true integrated and personalized care service delivery model. Hospital managers (CEO, CIO, CMO) are challenged to move their enterprises to the next level — that of digital business transformation — implementing digital solutions, new business models, and innovation initiatives.
    But how is it done in real life? The Region of Southern Denmark has an enterprise wide adopted solution that include hospitals, GPs, Municipalities and regional authorities and they are happy to share their knowledge, experience and good ideas with you! During the webinar, the presenters will discuss and analyses:

    •What are the steps to be taken to effectively design, acquire and implement a digital collaboration and data integration platform in healthcare?
    •What are the challenges you may face in an integrated care and tele medicine project?
    •What are the effect and clinical outcomes when data sharing is a reality and not just a vision?
  • How to make digital work in medtech
    How to make digital work in medtech Bryn Davies (Critical Insights), Lars U. Diemer (Agnitio), Markus Ott (Ascensia), Jerome d'Astros (Edwards Lifesciences) Recorded: Jun 21 2018 71 mins
    The rise of mobile devices and apps, not to mention the involvement of non-medical technology players, is creating a wave of irrevocable digital change for medtech.
    It’s transforming how the sector reaches and engages with its stakeholders and customers, and in doing so provides vital opportunities to reshape a company’s commercial model.
    But although the sector can lay claim to some key success stories with digital technology, there remain a number of roadblocks impeding real digital progress for medtech.

    In this webinar we will discuss key digital lessons for medtech from other healthcare sectors, steps to take for a successful digital transformation and how to ensure ROI from digital technology.
    The free webinar will also see our expert panel:
    •Explore the practical impacts of the new medtech business model
    •Re-think the customer experience for payers and HCPs
    •Learn how digital technology enables you to deliver more customer value – while powering commercial success
    •Find out how virtual engagement technologies can make it happen
    •See best practices and use cases from your peers
  • Why Cloud Adoption is Different in Europe?
    Why Cloud Adoption is Different in Europe? Carla Arend and Angela Vacca Recorded: Jun 20 2018 41 mins
    The common wisdom is that cloud adoption in Europe is trailing behind the US and that we will eventually “get there”. In this webcast, Carla Arend and Angela Vacca will debunk this myth and provide proof points about why customer journeys to the cloud actually follow a different pattern in Europe. They will outline the technical, cultural and geopolitical reasons for why cloud adoption is different and how different industry verticals are adopting cloud.
    IT vendors need to understand their customer’s cloud maturity to tailor their messaging adequately.
  • Der IT Brennpunkt: GDPR/DSGVO
    Der IT Brennpunkt: GDPR/DSGVO Oliver Stöeckl - Solution Strategist Recorded: Jun 20 2018 43 mins
    Datenschutz und -absicherung sind für Ihre Organisation von entscheidender Bedeutung und keine Verordnung hat weltweit weiter reichende Anforderungen als die DSGVO. Cherwell ISMS bietet eine einfache Möglichkeit, die DSGVO-Artikel Ihren Sicherheitskontrollen zuzuordnen. Darüber hinaus können Sie mit dem Incident Management die Meldefrist von 72 Stunden einhalten und die betroffenen Personen kontaktieren. Schließlich können Sie unser Self-Service-Portal erweitern, um EU-Bürgern eine einfache Möglichkeit zu bieten, Anfragen in Bezug auf Datenzugriff, Berichtigung, Löschung und Portabilität zu erstellen und zu verfolgen.
  • Connecting Clinical and Non-Clinical Systems Using Anypoint Platform
    Connecting Clinical and Non-Clinical Systems Using Anypoint Platform Matt Serna, Healthcare Marketing Manager; Gregg Prothero, Solution Consulting; Maxim Abrams, Product Management Recorded: Jun 19 2018 34 mins
    The healthcare industry is witnessing an explosion of medical data from EHRs, fitness trackers, mobile health applications, and more.

    To provide compelling patient experiences, providers must think beyond just driving interoperability across clinical data stores, and consider how to extend interoperability across healthcare partners and non-clinical applications. Doing so requires a new integrated healthcare strategy that extends beyond those traditionally offered by HL7 interface engines.

    Attendees will learn:

    - Why healthcare organizations are leaning on their IT teams to drive business critical and care-centric strategic initiatives.
    - How MuleSoft’s Anypoint Platform and Edifecs’ solution can help health organizations unlock medical data from EHRs and other systems, to better improve the patient experience.
    - How pre-built connectors, such as the Anypoint Connector for the Edifecs XEngine Server, can enable connectivity and validation of healthcare data––providing patients with vital information, at the right time and place.
  • Customer Interview - CNO Financial - Full Interview
    Customer Interview - CNO Financial - Full Interview Shelly Hogan - CNO Financial, Sam Abadir - Lockpath Recorded: Jun 19 2018 13 mins
    Hear how CNO Financial is streamlining their Compliance and Policy Management program with the Keylight GRC Platform.

    See the Attachments tab to access the full list of interview excerpts.
  • Customer Interview - CNO Financial - Who is Involved
    Customer Interview - CNO Financial - Who is Involved Shelly Hogan - CNO Financial, Sam Abadir - Lockpath Recorded: Jun 19 2018 1 min
    Hear how CNO Financial governs their policy review process.

    See the Attachments tab to access the full list of interview excerpts.
  • Customer Interview - CNO Financial - Building a Compliance Program
    Customer Interview - CNO Financial - Building a Compliance Program Shelly Hogan - CNO Financial, Sam Abadir - Lockpath Recorded: Jun 19 2018 2 mins
    Hear how CNO Financial is streamlining their Compliance and Policy Management program with the Keylight GRC Platform.

    See the Attachments tab to access the full list of interview excerpts.
  • Rethinking the Identity Risk Equation
    Rethinking the Identity Risk Equation Jannie Wentzel & Randy Potts - Focal Point Data Risk Recorded: Jun 19 2018 41 mins
    Identity risk impacts multiple business functions within an organization. Vendor risk, business continuity, compliance, and more all strive to reduce risk exposure with limited regard to the holistic picture. This session discussed how to shape this breadth of exposure and provide guidance and strategy to Identity Risk Management.
  • How to Outsource your Security Monitoring 101
    How to Outsource your Security Monitoring 101 Mike LaPeters, VP of Global Channels, AlienVault Recorded: Jun 18 2018 43 mins
    Today’s rapidly evolving world means that traditional security measures like firewalls and antivirus are not sufficient to protect a company from a devastating breach. While it’s usually the big companies that make the headlines, the reality is every organization is a target, regardless of size. In fact, attacks are on the rise for small and midsize businesses because most lack the essential security controls necessary to mitigate risk.

    With a major shortage of skilled resources in today’s cybersecurity market, more and more organizations are opting to outsource key security monitoring services to a managed security service providers (MSSPs). Whether for log management, managed detection and response (MDR), SIEM-as-a-service, or compliance management, organizations large and small are turning to MSSPs to deliver these solutions quickly and cost-effectively.

    Join us for this one-hour discussion and learn how you can extend your IT team with managed security services:

    Topics Include:

    - Why Managed Security
    - Types of Managed Security Services
    - Benefits of Outsourcing Security
    - How to Select the right MSSP

    Hosted By
    Mike LaPeters
    VP of Global Channels
    Mike LaPeters joined AlienVault in 2015 and heads up the global channel initiative. Mike has more than 20 years’ experience building and leading channel organizations in security, infrastructure and storage software products. He has led teams at CA, VERITAS Software (Formerly Symantec) and he represented the sales and channel efforts from inception through acquisition at 4 startups (acquired by Microsoft, Hitachi (WD), SolarWinds, Nimboxx). He is a 3-time recipient of CRN’s Channel Chief award.
  • Short Tutorial: Techniques for Harvesting Adherent Cells
    Short Tutorial: Techniques for Harvesting Adherent Cells Corning Life Sciences Recorded: Jun 18 2018 5 mins
    Harvesting your cells is an important step in maintaining healthy cultures. Good technique will lead to a healthy single cell suspension. There are many harvesting options depending on the cell line and application. In this video, we will discuss some tips/tricks to harvesting cells.
  • Under the Hood with AlienVault Labs: Leveraging Threat Intelligence
    Under the Hood with AlienVault Labs: Leveraging Threat Intelligence Sacha Dawes, Principal Product Marketing Manager, AlienVault & Chris Doman, Threat Engineer, OTX, AlienVault Recorded: Jun 14 2018 56 mins
    Threat intelligence offers the ability to improve threat detection and response using information on attack methods previously reported by others, but only if it can be effectively integrated into security controls and processes. So, how do you go from threat data to actionable insights?

    Join AlienVault for this webcast to get a look under the hood at how the AlienVault Labs threat research team turns threat data and indicators of compromise (IoC’s) into comprehensive, actionable threat intelligence.

    We'll cover:

    - What threat intelligence is, and how it speeds threat detection and incident response
    - Key questions to help you evaluate threat intelligence sources
    - How the AlienVault Labs team analyzes threat data, and turns it into actionable information
    - How AlienVault USM Anywhere integrates threat intelligence with multiple security capabilities to accelerate threat detection and response

    Hosted By
    Sacha Dawes
    Principal Product Marketing Manager
    Sacha has over 15 years of experience in technology and information security across product management, product marketing and business management roles at Microsoft, NetIQ, Gemalto and Schlumberger where he delivered solutions to address the IT security, identity and management space. Before joining AlienVault, he worked in the office of the EVP for Cloud and Enterprise business at Microsoft. Originally from the UK, Sacha is based in Austin TX and holds a Masters in Computer Science from Vanderbilt University.

    Chris Doman
    Threat Engineer, OTX
    Chris works on Alienvault OTX as a Threat Engineer. He’s had a long interest in security, but joined the industry after winning the civilian section of the Department of Defense's forensics competition. Chris runs a popular threat intelligence portal (ThreatCrowd.org) in his spare time, and holds a CCHIA (Certified Host Intrusion Analyst) from CREST and a degree in Computer Science from the University of Cambridge.
  • What’s Your Network Firewall Hiding from You?
    What’s Your Network Firewall Hiding from You? Chris McCormack, Sen Prod Mgr, Sophos; Bruce Beam, Dir, TPO, (ISC)2; Brandon Dunlap, Moderator Recorded: Jun 14 2018 53 mins
    Your network firewall isn’t being honest with you. According to a recent survey conducted by Sophos that gathered responses from 2,700 IT managers at mid-sized organization, network firewalls can’t disclose what up to 45% of the bandwidth is being consumed by. Additionally, they are failing to protect the organizations they are deployed in and this inefficiency is costing time and money. Why is this happening? What can be done to correct it? Join Sophos and (ISC)2 on June 14, 2018 at 12:00PM Eastern for a wide ranging discussion about this survey, the results and what can be done to get the best information and performance from your network firewall.
  • How to Ensure High-Performing Microsoft .NET Applications
    How to Ensure High-Performing Microsoft .NET Applications John Worthington, Director of Product Marketing, at eG Innovations Recorded: Jun 12 2018 35 mins
    In today’s distributed application ecosystems, with various inter-dependencies and dynamic infrastructures, it is extremely challenging to detect and resolve application failures and performance slowdowns. This is especially true in a Microsoft .NET application stack. Developers, IT Operations Staffs and Site Reliability Engineers often get involved in long war room sessions to isolate the root cause of poor customer experience in the digital business service.

    Join this webinar “How to Ensure High-Performing Microsoft .NET Applications”, by John Worthington, Director of Product Marketing at eG Innovations, as he explores the various problems that could affect .NET application performance and discusses industry best practices for effective performance monitoring.

    Learn how a converged application and infrastructure monitoring strategy can help:

    - Detect digital experience issues in real time
    - Analyze critical business transactions and diagnose slowdowns
    - Get .NET method-level visibility to fix application code issues
    - Understand application dependencies with underlying infrastructure (IIS, Hyper-V, SQL, Azure, etc.)
    - Auto-correlate alerts and isolate the root cause of performance problems

    Join the webinar and become a .NET performance guru
  • Taming the Cloud Together – CCSP & CCSK Cloud Certification Synergy
    Taming the Cloud Together – CCSP & CCSK Cloud Certification Synergy David Shearer, CEO, (ISC)2; Jim Reavis, CEO, CSA; Kevin Jackson, GovCloudNetwork ; Rich Mogull, Securosis; B. Dunlap (Mod) Recorded: Jun 12 2018 58 mins
    Certain things go together to make the sum of their parts that much better. Peanut Butter and Jelly. Lennon and McCartney. Batman and Robin. In the ever-changing world of the cloud, cyber security professionals need continuous training and certifications to stay up-to-speed and pairing (ISC)2’s CCSP (Certified Cloud Security Professional) with CSA’s CCSK (Certificate of Cloud Security Knowledge) can put any cyber security practitioner ahead in terms of knowledge, skills and job opportunities. On June 12, 2018 at 1:00PM Eastern, join David Shearer, (ISC)2’s CEO and Jim Reavis, CSA’s CEO, along with other subject matter expects as we explore the differences between each program, the training options available for each, and how these programs are synergistic in nature and together were designed to build on one another.
  • Risk Management - The Three Pronged Approach
    Risk Management - The Three Pronged Approach Christopher Heinz - Guidewire Recorded: Jun 12 2018 36 mins
    Looking to improve on the standard approaches to risk management? Guidewire has taken a more holistic approach. By using multiple, interwoven workflows within a single Keylight application, Guidewire's Information Security teams are able to deliver more than just tactical value to the organization and subsequently, our customers. See how Guidewire leveraged Keylight's flexible nature to allow for multiple avenues of assessing and mitigating risk.
  • Digital Transformation: Market Spend & Trend Outlook
    Digital Transformation: Market Spend & Trend Outlook Eileen Smith, Shawn Fitzgerald, Craig Simpson Recorded: Jun 7 2018 47 mins
    Love it or hate it, Digital Transformation is at the center of industry leading organizations. Digital Transformation is not simply a list of IT projects, it involves completely rethinking how an organization uses technology to pursue new revenue streams, products, services and business models. In this webinar we will share with you IDC's concept of building a business case around digital transformation, and the broader strategic priorities of organizations connected to digital transformation working together to deliver business objectives. We will share market insight into the regional and industry use cases driving investment in Digital Transformation, providing an in-depth view of the Digital Transformation spending outlook connected to business use cases.
  • Scientific Data Explosion: Adapting IT Infrastructure So Research Can Thrive
    Scientific Data Explosion: Adapting IT Infrastructure So Research Can Thrive Adam Kraut, BioTeam - Scott Jeschonek, Avere Systems - Tim Carroll, Microsoft Azure Recorded: Jun 6 2018 57 mins
    The advancements in scientific computing and healthcare are coming fast—from next generation sequencing onto precision medicine, “big data” and artificial intelligence. We’re embarking on a massive convergence of clinical analysis and information systems, and many are not prepared. With these advancements in technologies, comes higher demand for both compute and storage to degrees difficult to comprehend. An NCBI published study predicts that up to 40 exabytes of storage capacity will be needed by 2025 just to support the growth of sequenced human genomes.
    Adapting to this exciting shift in science will require changes in the way we think about IT infrastructure. In this webinar, BioTeam’s Adam Kraut will discuss…

    •How science changes faster than IT infrastructure, and what we can do to keep pace.
    •Converged infrastructures and their impact on research productivity.
    •How machine learning and microservices are changing the way we architect Cloud solutions.

    In addition, you’ll hear how companies are already supporting HPC workloads in hybrid cloud environments to increase analytic throughput efficiently. These workloads supply adaptability to changing research needs, integration into existing resources, and scalability to support growing demand for both compute and storage capacity.
  • Compliance Lifecycle 101
    Compliance Lifecycle 101 Lisa Hartford & Molly Stolpman - GCI Recorded: Jun 5 2018 43 mins
    Have you ever wondered how to get from point A to point B in the compliance world? This session walked through a complete compliance lifecycle showing you how to go from identifying what security framework to follow to providing reports to management.
  • Short Tutorial: Corning® Matrigel® Matrix: Thin Coating Method Best Practices
    Short Tutorial: Corning® Matrigel® Matrix: Thin Coating Method Best Practices Corning Life Sciences Recorded: Jun 4 2018 3 mins
    Looking for tips using Matrigel matrix before you coat and plate your cells? We’ve got you covered. Watch our short tutorial for best practices on how to coat Matrigel Matrix as a thin gel layer.
    In search of more Matrigel matrix user information? We’ve summarized some other great tips and tricks for Matrigel in our newly published "Ultimate Guide to Matrigel Matrix" – download it today: https://goo.gl/9Nq5Td
  • Short Tutorial: Corning® Matrigel® Matrix: Thin, Non-gelled Protein Layer Method
    Short Tutorial: Corning® Matrigel® Matrix: Thin, Non-gelled Protein Layer Method Corning Life Sciences Recorded: Jun 4 2018 3 mins
    Trying to use Matrigel matrix for cell attachment? Watch our short video to learn the best way to coat Matrigel matrix in a thin, non-gelled protein layer.
    Interested in some more Matrigel matrix best practices? We’ve summarized some other great tips and tricks for Matrigel in our newly published "Ultimate Guide to Matrigel Matrix" – download it today: https://goo.gl/9Nq5Td
  • Digital Therapeutics: Trends and Growth Opportunities
    Digital Therapeutics: Trends and Growth Opportunities Frost & Sullivan's Global Digital Health Team, Wolf Shlagman CEO - Care Angel, Amer Haider CEO - Doctella Jun 26 2018 5:00 pm UTC 75 mins
    Digital therapeutics presents a significant opportunity for traditional pharmaceutical therapeutics and information technology (IT) capabilities to influence a new approach to increase positive patient outcomes while reducing the overall cost of healthcare.

    Key Takeaways:
    · Gain expert insight into the accurate definition of digital therapeutics and market participants.
    · Learn about new solutions from mHealth companies that will combine apps, patient education, professional intervention and peer support to increase patient engagement and medication adherence by augmenting or replacing traditional drug therapeutics.
    · Hear opportunities to utilize digital therapeutics to improve medical workflow and patient communications.
    · Learn about some of the critical milestones related to digital therapeutics.
  • Twelve Ways to Defeat Two-Factor Authentication
    Twelve Ways to Defeat Two-Factor Authentication Roger Grimes, Data-Driven Defense Evangelist Jun 27 2018 7:00 pm UTC 90 mins
    Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!
     
    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite 2FA solution. 

    The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
     
    You'll learn about the good and bad of 2FA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around two-factor authentication
    - How to defend your two-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Dell EMC | OEM Solutions and VMware: Better Together
    Dell EMC | OEM Solutions and VMware: Better Together Alan Brumley, CTO Dell EMC OEM Solutions & Scott Trapp, Architect -VMWare Embedded & Jeffrey Sullivan, Dell EMC OEM Solutions Jun 28 2018 2:00 pm UTC 45 mins
    Please join us for an in-depth conversation on how the blend of your IP, Dell EMC hardware and VMware software makes your solutions more scalable, available, secure and cloud ready.

    VMware on Dell EMC OEM appliances allows your solution to run multiple operating systems on one physical machine. It adds fault and security isolation at the hardware level, and makes it easy to move and copy virtual machines. It also simplifies lifecycle management as there is an easier transition between hardware generation changes.

    Additionally, VMware helps your solution to become cloud ready and relevant when your customer is looking for a hosted or cloud solution.

    In the session we will be covering:
    •Trends in the industry impacting OEMs today and what’s driving the need for virtualized appliances.
    •Hear directly from Dell EMC OEM’s CTO and VMware’s embedded architects on how the inherent benefits of virtualization can help both the OEM’s solutions and their customers.
    •How solution builders can leverage Dell EMC OEM for a turn-key combined solution that includes support and distribution globally.

    We hope you’ll be able to join us for this informative and valuable session.
  • Roadmap to Smarter Business Continuity Management
    Roadmap to Smarter Business Continuity Management Sam Abadir, VP of Industry Solutions, Lockpath Jul 11 2018 4:00 pm UTC 60 mins
    Business interruptions can upset customers, cost sales, and put companies in a bad light. That's where business continuity management (BCM) comes in. A BCM plan details the impact of various disaster scenarios and formalizes steps for ensuring critical operations remain open during a crisis. In this live webinar, Lockpath's Sam Abadir will share a roadmap to smarter business continuity management.

    You'll learn:

    * The role of business continuity management on operations
    * How to identify risks that could potentially lead to disruptions
    * Strategies for modeling the business impact of various disasters
    * Importance of mapping plans to risk, controls, processes, and vendors

    Learn how to better prepare your recovery plans by attending this webinar on smarter business continuity management. Register now!
  • Inside (ISC)²: Virtual Town Hall – Enrich. Enable. Excel
    Inside (ISC)²: Virtual Town Hall – Enrich. Enable. Excel Jessica Hardy, (ISC)² Director of CX, Mirtha Collin, (ISC)² Sr. Ed. & Training Mgr., Michelle Schweitz, (ISC)² Media Mgr. Jul 17 2018 5:00 pm UTC 75 mins
    (ISC)² is committed to delivering value to our members, providing a transparent view of the organization’s developments and plans for the future. To that end, please join (ISC)² for a virtual Town Hall meeting on July 17, 2018 at 1:00PM Eastern to review many of our new member benefits, service offerings and look at what is still to come in 2018, including enriching professional development opportunities, Security Congress and more. Members and non members alike will enjoy the opportunity to learn how (ISC)² is delivering on its value promise.
  • The Practitioner’s Guide to Security Monitoring in the Cloud
    The Practitioner’s Guide to Security Monitoring in the Cloud Danielle Russell, Group Product Marketing Manager & Brian Bledsoe, Sr. Technical Manager, Sales Enablement for NA, AlienVault Jul 19 2018 4:00 pm UTC 60 mins
    Cloud computing continues to transform the way organizations use, store, and share data, applications, and workloads, but has also introduced a host of new security threats and challenges. With so much data going into the cloud—and into public cloud services in particular—these resources become natural targets for bad actors. And, contrary to what you may think, the primary responsibility for protecting corporate data in the cloud lies with the cloud customer, not with the service provider.

    AlienVault is at the leading edge of cloud security with AlienVault USM Anywhere. Whether you are looking to secure your AWS & Azure cloud environments, cloud applications like Office 365 and G Suite or on-premises assets, USM Anywhere delivers essential security capabilities in a single SaaS platform.

    Join this webcast to learn more about cloud security challenges and how to address them with USM Anywhere. You'll learn:

    - What the shared responsibility model means for the security of your cloud assets
    - Challenges with trying to use traditional on-prem security monitoring tools in your cloud environments
    - How USM Anywhere gives you visibility into all assets across your cloud and on-premises environments
    - Benefits of an all-in-one security solution for threat detection, incident response and compliance management

    Hosted By
    Danielle Russell
    Group Product Marketing Manager
    Danielle is a Group Product Marketing Manager at AlienVault, responsible for product messaging and positioning, go-to-market strategy, and sales enablement.

    Brian Bledsoe
    Sr. Technical Manager, Sales Enablement for North America
    Brian is a member of AlienVault's Sales Enablement team. He was previously a Sales Engineer, and then Sales Engineering manager at AlienVault.
  • Culture Club: Developing a Culture of Security at an Organization
    Culture Club: Developing a Culture of Security at an Organization Erich Kron, KnowBe4, Brandon Dunlap (Moderator) Jul 19 2018 5:00 pm UTC 75 mins
    Human error. Then an unintended security incident. It will happen at every organization. Sooner or later, someone will click on a rogue link or open an attachment they shouldn’t, exposing your organization to malware, phishing and ransomware. Training, testing and policies are critical to mitigating risk and must be reinforced by leadership. Actions need to replace rhetoric. Join KnowBe4 and (ISC)2 on July 19, 2018 at 1:00PM Eastern for a discussion on how to build a security-centric culture that can benefit any size organization. We’ll examine how to establish a solid foundation, making sure everyone is on the same page and leveraging leadership to help with accountability.
  • 2018 Security Congress Preview – Cloud Security
    2018 Security Congress Preview – Cloud Security Mike Brannon, Dir, Infrastructure & Security, National Gypsum; Eric Fiteman, Consultant, Tyler Smith, IT Analyst, John Deere Jul 24 2018 5:00 pm UTC 75 mins
    (ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • Discovering a Competitive Advantage with ISO 27001 Certification
    Discovering a Competitive Advantage with ISO 27001 Certification Jason Eubanks - Lockpath Jul 26 2018 4:00 pm UTC 60 mins
    Organizations with mature, enterprise-wide information security risk management programs enjoy a competitive advantage, thanks to ISO 27001 certification that signifies an international standard for safeguarding information. In this webinar, Lockpath's Jason Eubanks, a governance, risk management, and compliance (GRC) consultant and former ISO auditor, will share the business case for earning ISO 27001 certification and the critical role of a GRC platform in implementing a successful information security management system (ISMS).

    You'll learn:

    • Challenges and pitfalls with ISO 27001 certification
    • Tips on establishing and maturing an ISMS
    • Strategies for preparing and passing ISO audits
    • Technology's role in earning and maintaining certification

    Learn how ISO 27001 can give you a competitive advantage and strategies for earning certification. Register now to attend this educational webinar.
  • How GCI Built Its Security and Compliance Program
    How GCI Built Its Security and Compliance Program Lisa Hartford - GCI, Sam Abadir - Lockpath Aug 2 2018 5:00 pm UTC 60 mins
    General Communication Inc. (GCI), a telecommunications company based in Alaska, spent a year building its security and compliance program from the ground up. In this webinar, you'll see how GCI did it, starting with one person using the Keylight Platform, through challenges like creating new process and tearing down silos, to where they are by year-end: a fully engaged team leveraging Keylight to manage security and compliance.

    As a webinar attendee, you'll learn GCI's secret to:

    * Finding and training IT and security professionals
    * Developing new or streamlining existing processes
    * Scaling Keylight to address security and compliance requirements.

    Regardless of your program's status, hearing GCI's lessons learned can inspire and guide you in building or improving your company's security and compliance program. Register for this educational webinar today.
  • Roadmap to Smarter Audits
    Roadmap to Smarter Audits Sam Abadir, VP of Industry Solutions, Lockpath Aug 15 2018 4:00 pm UTC 60 mins
    Audits provide a vital checks and balances function in an organization. But what if audit's role as the third line of defense was more efficient and strategic? Doing so would enhance the role of the internal auditor. In this live webinar, Lockpath's Sam Abadir will share the roadmap to smarter audits, including:

    • Critical capabilities required for the audit process
    • Importance of customizing messaging to stakeholder audiences
    • The pros and cons of current audit management strategies
    • Strategic, effective audits that can scale with future growth

    More strategic and effective audits won't come from current processes. Discover the road to smarter audits by attending this educational webinar. Register now!