Hi [[ session.user.profile.firstName ]]

Health IT

  • 2018 Security Congress Preview – Cloud Security
    2018 Security Congress Preview – Cloud Security Mike Brannon, Dir, Infrastructure & Security, National Gypsum; Tim Sills,Accudata; Tyler Smith, IT Analyst, John Deere Jul 24 2018 5:00 pm UTC 75 mins
    (ISC)2 will hold its Security Congress 2018 in New Orleans, LA, October 8th – 10th. This conference will bring together 2000+ attendees and over 100 educational sessions. One of the 13 tracks that are being offered with focus on Cloud Security and challenges practitioners face when dealing with all things cloud. On July 24, 2018 at 1:00PM Eastern, join (ISC)2 and several of the speakers who’ll be presenting in the Cloud track as we preview their sessions, get an idea of what will be discussed and discuss the state of cloud security today.
  • What Most Computer Security Defenses Are Doing Wrong and How to Fix It
    What Most Computer Security Defenses Are Doing Wrong and How to Fix It Roger Grimes, Data-Driven Defense Evangelist Jul 24 2018 6:30 pm UTC 60 mins
    Most companies have huge gaps in their computer security defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”.

    But it doesn’t have to be that way!

    Join Roger A. Grimes, a 30-year computer security consultant and author of 10 books, for this on-demand webinar where he explores the latest research on what’s wrong with current network defenses and how they got this way. Roger will teach you what most organizations are doing wrong, why, and how to fix it. You’ll leave this webinar with a fresh perspective and an action plan to improve the efficiency and effectiveness of your current computer security defenses.

    Roger will teach you:

    - What most companies are doing wrong, why, and how to fix it
    - An action plan to improve the effectiveness of your computer security defenses
    - How to create your “human firewall”
  • Discovering a Competitive Advantage with ISO 27001 Certification
    Discovering a Competitive Advantage with ISO 27001 Certification Jason Eubanks - Lockpath Jul 26 2018 4:00 pm UTC 60 mins
    Organizations with mature, enterprise-wide information security risk management programs enjoy a competitive advantage, thanks to ISO 27001 certification that signifies an international standard for safeguarding information. In this webinar, Lockpath's Jason Eubanks, a governance, risk management, and compliance (GRC) consultant and former ISO auditor, will share the business case for earning ISO 27001 certification and the critical role of a GRC platform in implementing a successful information security management system (ISMS).

    You'll learn:

    • Challenges and pitfalls with ISO 27001 certification
    • Tips on establishing and maturing an ISMS
    • Strategies for preparing and passing ISO audits
    • Technology's role in earning and maintaining certification

    Learn how ISO 27001 can give you a competitive advantage and strategies for earning certification. Register now to attend this educational webinar.
  • How to Outsource your Security Monitoring 101
    How to Outsource your Security Monitoring 101 Mike LaPeters, VP of Global Channels, AlienVault Jul 26 2018 4:00 pm UTC 45 mins
    Today’s rapidly evolving world means that traditional security measures like firewalls and antivirus are not sufficient to protect a company from a devastating breach. While it’s usually the big companies that make the headlines, the reality is every organization is a target, regardless of size. In fact, attacks are on the rise for small and midsize businesses because most lack the essential security controls necessary to mitigate risk.

    With a major shortage of skilled resources in today’s cybersecurity market, more and more organizations are opting to outsource key security monitoring services to a managed security service providers (MSSPs). Whether for log management, managed detection and response (MDR), SIEM-as-a-service, or compliance management, organizations large and small are turning to MSSPs to deliver these solutions quickly and cost-effectively.

    Join us for this one-hour discussion and learn how you can extend your IT team with managed security services:

    Topics Include:

    - Why Managed Security
    - Types of Managed Security Services
    - Benefits of Outsourcing Security
    - How to Select the right MSSP

    Hosted By
    Mike LaPeters
    VP of Global Channels
    Mike LaPeters joined AlienVault in 2015 and heads up the global channel initiative. Mike has more than 20 years’ experience building and leading channel organizations in security, infrastructure and storage software products. He has led teams at CA, VERITAS Software (Formerly Symantec) and he represented the sales and channel efforts from inception through acquisition at 4 startups (acquired by Microsoft, Hitachi (WD), SolarWinds, Nimboxx). He is a 3-time recipient of CRN’s Channel Chief award.
  • How to Secure Your Business: Getting Back to the Basics
    How to Secure Your Business: Getting Back to the Basics Roger Thornton, Chief Technology Officer, AlienVault Aug 2 2018 4:00 pm UTC 15 mins
    Roger Thornton, Chief Technology Officer of AlienVault, discusses why it is so important to start with cyber security basics and master that before adding all the latest shiny objects available in the InfoSec industry.

    Video highlights:

    - Detection and response of a breach is key to effectively mitigate risk for organizations of all sizes.
    - Democratizing data sharing through Open Threat Exchange to find the bad actors more quickly.
    - There are different strategic imperatives based on company size, industry and skilled resources.
    - The AlienVault approach: unified, simplified, democratized.

    To learn more about AlienVault, go to http://ow.ly/LMKB30kVijd. To join the AlienVault Open Threat Exchange, go to http://ow.ly/MuLJ30kVinb.

    Interview with
    Roger Thornton
    Chief Technical Officer, AlienVault

    Roger Thornton is the Chief Technical Officer for AlienVault. Roger’s career has been dedicated to the development of technology and new business ventures based on technical innovation. Over 25 years in the Silicon Valley and abroad, he has driven the formation and growth of dozens of new companies and hundreds of products, serving in a wide range of roles from engineering, marketing, and management, to investor/advisor.
  • From Reactive to Proactive - Getting the Most Out of Network Traffic Analytics
    From Reactive to Proactive - Getting the Most Out of Network Traffic Analytics Jeff Costlow, Dir of Security, ExtraHop; Kristy Westphal, VP, MUFG Union Bank; Brandon Dunlap (Moderator) Aug 2 2018 5:00 pm UTC 75 mins
    They say “Packets don’t lie”. Instead of waiting to respond to incidents and anomalies, SecOps teams are using the network to enable proactive measures such as threat hunting, auditing encryption and other suspicious and out-of-policy behaviors existing in the dark alleys of the traffic corridor. Real time network traffic analytics (NTA) tools can help an organization shift from defensive to offensive and cut investigation time, enabling analysts to quickly correlate activities and test hypotheses. Join ExtraHop and (ISC)2 on August 2, 2018 at 1:00PM Eastern as we discuss proactive measures that can work for an organization, what activities to look for and how machine learning can help speed up these efforts.
  • How GCI Built Its Security Compliance Program
    How GCI Built Its Security Compliance Program Lisa Hartford - GCI, Sam Abadir - Lockpath Aug 2 2018 5:00 pm UTC 60 mins
    General Communication Inc. (GCI), a telecommunications company based in Alaska, spent a year building its security compliance program from the ground up. In this webinar, you'll see how GCI did it, starting with one person using the Keylight Platform, through challenges like creating new process and tearing down silos, to where they are by year-end: a fully engaged team leveraging Keylight to manage security compliance.

    As a webinar attendee, you'll learn GCI's secret to:

    * Finding and training IT and security professionals
    * Developing new or streamlining existing processes
    * Scaling Keylight to address security compliance requirements.

    Regardless of your program's status, hearing GCI's lessons learned can inspire and guide you in building or improving your company's security compliance program. Register for this educational webinar today.
  • The Impact of Artificial Intelligence in Medical Imaging
    The Impact of Artificial Intelligence in Medical Imaging Nadim Daher,Industry Principal, Siddharth Shah, Industry Analyst, Frost & Sullivan Aug 9 2018 3:00 pm UTC 60 mins
    Medical imaging has become a leader for the application of artificial intelligence technologies in the healthcare space, especially recently with deep learning techniques. This is evident from the fact that over 90 companies have set out to develop and commercialize AI-based solutions for the medical imaging industry. The number continues to grow as new start-ups emerge, as incumbents develop native AI solutions, and as tech companies move into the field, creating a highly dynamic ecosystem. With various countries edging past the innovator adoption phase and into the early adopter one, the time is now for stakeholders to refine and test their value proposition, partnership approach, and go-to-market strategies.

    Key Takeaways:
    • How far we have reached over the past five years and the current lay of the land
    • Where we are headed over the next five years and the direction of industry progress
    • Deep-dive into the opportunity for automation, acceleration and augmentation of medical image analysis
    • Anticipate the advent of intelligent medical imaging machines with embedded AI
  • Adding the S to MSP: Making Money in a Competitive Market
    Adding the S to MSP: Making Money in a Competitive Market Mike LaPeters, VP Global Channel Sales & Mike Calonica, VP American Sales Aug 9 2018 4:00 pm UTC 45 mins
    Anybody can deliver technology, but these days Managed Service Providers (MSPs) also need to protect their customers’ networks and data. Cyber threats are a growing concern, and if you can’t provide security, your customers will find a provider who can. That’s why adding security to an MSP’s palette of services isn’t just an option; it’s a must.

    In this webcast, experts from Penton and AlienVault will discuss how to turn your MSP into a profitable MSSP by adding security for customers to protect their business from the scourge of cybercrime. Join this session to learn more about:
    - Current threats and how they are evolving
    - Comprehensive threat protection for the cloud
    - Unified security for detecting threats and responding to incidents
  • Beyond Office 365: How Your Peers are Taming the Long Tail of SaaS Apps
    Beyond Office 365: How Your Peers are Taming the Long Tail of SaaS Apps Salim Hafid, Marketing Manager, Bitglass; Brandon Dunlap (Moderator) Aug 9 2018 5:00 pm UTC 75 mins
    The long tail of SaaS is growing rapidly. Today, thousands of unmanaged "Shadow IT" applications are used in every major enterprise around the globe and IT departments have little visibility or control over these rogue apps. While the challenge was first simply to secure major SaaS platforms like Office 365, the new reality is a “cloud and mobile-first world” where employees often use new applications that aren’t approved and put corporate data at risk. Join Bitglass and (ISC)2 on August 9, 2018 at 1PM Eastern for the final part of this Security Briefings series where we’ll discuss how leading organizations are evolving their security to solve these challenges, what organizations are prioritizing when evaluating a solution and how zero-day technologies built for a cloud-first world are able to identify, categorize, and secure unknown apps.
  • Roadmap to Smarter Audits
    Roadmap to Smarter Audits Sam Abadir, VP of Industry Solutions, Lockpath Aug 15 2018 4:00 pm UTC 60 mins
    Audits provide a vital checks and balances function in an organization. But what if audit's role as the third line of defense was more efficient and strategic? Doing so would enhance the role of the internal auditor. In this live webinar, Lockpath's Sam Abadir will share the roadmap to smarter audits, including:

    • Critical capabilities required for the audit process
    • Importance of customizing messaging to stakeholder audiences
    • The pros and cons of current audit management strategies
    • Strategic, effective audits that can scale with future growth

    More strategic and effective audits won't come from current processes. Discover the road to smarter audits by attending this educational webinar. Register now!
  • How to Simplify PCI DSS Compliance with a Unified Approach to Security
    How to Simplify PCI DSS Compliance with a Unified Approach to Security Sanjay Ramnath, AlienVault; Jacques Lucas, Terra Verde; Zuri Cortez, AlienVault Aug 16 2018 4:00 pm UTC 60 mins
    Demonstrating compliance with PCI DSS is far from a trivial exercise. The 12 requirements of PCI DSS often translate into a lot of time and effort to access the necessary data and reports from many different systems and tools. And, after an audit is complete many teams struggle to maintain compliance.

    In this webcast, you'll hear from Jacques Lucas, a Qualified Security Assessor (QSA) with Terra Verde, and Sanjay Ramnath, VP of Product Marketing at AlienVault, sharing best practices to help you simplify implementation of PCI DSS security controls and reporting.

    Join us for this webcast to learn:

    - The most common challenges in meeting and maintaining compliance with PCI DSS
    - Best practices to help you plan and prepare for an audit
    - The core security capabilities you need to demonstrate compliance
    - How AlienVault Unified Security Management can simplify the compliance process

    Hosted By
    Sanjay Ramnath
    VP of Product Marketing at AlienVault
    Jacques Lucas
    Qualified Security Assessor (QSA) with Terra Verde
    Zuri Cortez
    Sales Engineer at AlienVault
  • Leveraging Security Automation for Improved Management
    Leveraging Security Automation for Improved Management Ken Wilson, Dir, Sales Central U.S., Skybox, Brandon Dunlap (Moderator) Aug 16 2018 5:00 pm UTC 75 mins
    Security automation technologies can help drive improvements in managing security policies, including their implementation in firewalls and other network devices. However, whether you’re struggling with continuous compliance, auditing and reporting or managing firewall changes, deciding what to automate can be challenging. Join Skybox Security and (ISC)2 on August 16, 2018 at 1:00PM Eastern for a discussion where we’ll examine which automated processes in security policy management deliver the biggest rewards while introducing the least risk to your organization. Areas to be examined include why automation, visibility and context should be the indivisible, foundational components of any security policy management solution, which processes in security policy management are ripe for automation and where human intervention is still valuable. We’ll also explore how to educate security stakeholders in your organization on what’s needed to make automation initiatives a success.
  • SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection
    SIEM 2.0 - How Unified Security Management SIEMplifies Threat Detection Sacha Dawes, Principal Product Marketing Manager, AlienVault Aug 23 2018 4:00 pm UTC 60 mins
    SIEM solutions have been widely adopted to help IT teams collect and correlate data from a variety of security point products. However, traditional SIEM deployments require a great deal of time, money & expertise to properly normalize data feeds, create correlation rules to detect threats & continuously tune those rules to limit false positives. And, after all that work is done, it has to be continuously re-done as the network & threat landscape changes.

    AlienVault takes a different approach to SIEM. Join this webcast to learn how AlienVault Unified Security Management (USM) overcomes the most common SIEM challenges with:
    - Built-in capabilities like asset discovery, vulnerability assessment, intrusion detection, orchestrated incident response, and log management
    - Continuously updated correlation directives, vulnerability signatures, incident response guidance, and more
    - Fully integrated, real-time threat intelligence from the AlienVault Labs Security Research Team and the AlienVault Open Threat Exchange (OTX)
    - The ability to monitor on-premises and cloud environments including AWS and Azure, as well as cloud applications like Office 365
  • CISO Perspective: How using the NIST Cyber Security Framework improves security
    CISO Perspective: How using the NIST Cyber Security Framework improves security John McLeod, CISO, AlienVault Sep 6 2018 4:00 pm UTC 60 mins
    The National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) is widely recognized as an effective roadmap for improving threat detection and compliance. However, many smaller IT security teams with limited resources have trouble implementing and maintaining the recommended security controls and processes. That's where AlienVault can help.

    In this webcast, AlienVault CISO John McLeod will provide insights into how AlienVault approached implementation of NIST CSF and accelerated the process using their own Unified Security Management (USM) platform.

    Join this webcast for:
    - An overview of security controls recommended by NIST CSF
    - Best practices for approaching adoption of NIST CSF
    - How a unified security toolset can greatly simplify this process
    - A demo of the AlienVault Unified Security Management (USM) platform